prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"{\"version\":3,\"file\":\"index.js\",\"sourceRoot\":\"\",\"sources\":[\"index.ts\"],\"names\":[],\"mappings\":\";;AAAA,qCAAqC;AACrC,6BAA6B;AAE7B,MAAa,cAAc;IAA3B;QACC,QAAG,GAAW,EAAE,CAAC;IAOlB,CAAC;IALA,QAAQ;QACP,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;SAC1C;IACF,CAAC;CACD;AARD,wCAQC... | [
0
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\"version\":3,\"file\":\"index.js\",\"sourceRoot\":\"\",\"sources\":[\"index.ts\"],\"names\":[],\"mappings\":\";AAAA,4BAA4B;;AAE5B,qCAAqC;AACrC,6BAA6B;AAE7B,MAAa,cAAc;IAA3B;QACC,QAAG,GAAW,EAAE,CAAC;IAOlB,CAAC;IALA,QAAQ;QACP,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;SAC1C;IACF,CAAC;CA... | [
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"import * as confinit from \"../index\";\nimport * as path from \"path\";",
"export class Section1Config implements confinit.IConfigSection {\n\turl: string = \"\";",
"\tvalidate(): void {\n\t\tif (!this.url) {\n\t\t\tthrow new Error(\"Section 1 url not set.\");\n\t\t}\n\t}\n}",
"export class WebServerC... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"// See README.md for details\n",
"import * as confinit from \"../index\";\nimport * as path from \"path\";",
"export class Section1Config implements confinit.IConfigSection {\n\turl: string = \"\";",
"\tvalidate(): void {\n\t\tif (!this.url) {\n\t\t\tthrow new Error(\"Section 1 url not set.\");\n\t\t}\n\t}\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"use strict\";\nObject.defineProperty(exports, \"__esModule\", { value: true });\nconst assert = require(\"assert\");",
"const __1 = require(\"..\");",
"describe('setDeepProperty', () => {\n it('should set a property with deep 1', () => {\n const obj = {\n test: \"A\"\n };",
" ... | [
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"use strict\";\nObject.defineProperty(exports, \"__esModule\", { value: true });\nconst assert = require(\"assert\");",
"const index_1 = require(\"../index\");",
"describe('setDeepProperty', () => {\n it('should set a property with deep 1', () => {\n const obj = {\n test: \"A\"\n }... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\"version\":3,\"file\":\"setDeepProperty.test.js\",\"sourceRoot\":\"\",\"sources\":[\"setDeepProperty.test.ts\"],\"names\":[],\"mappings\":\";;AAAA,iCAAiC;AACjC,0BAAqC;AAErC,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;IAE/B,EAAE,CAAC,mCAAmC,EAAE,GAAG,EAAE;QAC3C,MAAM,GAAG,GAAG;YACV,IAAI,EAAE,GAAG;SACV,CAAA;QACD,mBAAe,CAAC,GAA... | [
0
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"{\"version\":3,\"file\":\"setDeepProperty.test.js\",\"sourceRoot\":\"\",\"sources\":[\"setDeepProperty.test.ts\"],\"names\":[],\"mappings\":\";;AAAA,iCAAiC;AACjC,oCAA2C;AAE3C,QAAQ,CAAC,iBAAiB,EAAE,GAAG,EAAE;IAE/B,EAAE,CAAC,mCAAmC,EAAE,GAAG,EAAE;QAC3C,MAAM,GAAG,GAAG;YACV,IAAI,EAAE,GAAG;SACV,CAAA;QACD,uBAAe,CAAC,GAA... | [
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"import * as assert from 'assert';",
"import { setDeepProperty } from '..';",
"\ndescribe('setDeepProperty', () => {",
" it('should set a property with deep 1', () => {\n const obj = {\n test: \"A\"\n }\n setDeepProperty(obj, \"test\", \"B\");\n assert.equal(obj.test, \"B\");\n });",
" i... | [
1,
0,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"import * as assert from 'assert';",
"import { setDeepProperty } from '../index';",
"\ndescribe('setDeepProperty', () => {",
" it('should set a property with deep 1', () => {\n const obj = {\n test: \"A\"\n }\n setDeepProperty(obj, \"test\", \"B\");\n assert.equal(obj.test, \"B\");\n });",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [10, 89, 2, 113, 43, 2, 44, 20, 2, 23], "buggy_code_start_loc": [9, 61, 1, 78, 1, 1, 0, 4, 1, 2], "filenames": ["index.d.ts", "index.js", "index.js.map", "index.ts", "sample/index.js", "sample/index.js.map", "sample/index.ts", "test/setDeepProperty.test.js", "test/setDeepProperty.test.js.map", "t... | 746 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n ASN.1 utility functions\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n ASN.1 utility functions\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Bitmap decompression routines\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Bitmap decompression routines\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - Clipboard functions\n Copyright 2003 Erik Forsberg <forsberg@cendio.se> for Cendio AB\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 2003-2008\n Copyright 2017 Henrik Andersson <hean01@cendio.se> for ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - Clipboard functions\n Copyright 2003 Erik Forsberg <forsberg@cendio.se> for Cendio AB\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 2003-2008\n Copyright 2017 Henrik Andersson <hean01@cendio.se> for ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Miscellaneous protocol constants\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2017-2018 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GN... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Miscellaneous protocol constants\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2017-2018 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GN... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n CredSSP layer and Kerberos support.\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Publi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n CredSSP layer and Kerberos support.\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Publi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Support for the Matrox \"lspci\" channel",
" Copyright (C) 2005 Matrox Graphics Inc. ",
"\n This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as publ... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Support for the Matrox \"lspci\" channel",
" Copyright (C) 2005 Matrox Graphics Inc.\n Copyright 2018 Henrik Andersson <hean01@cendio.se> for Cendio AB",
"\n This program is free software: you can redistribute it and/or mod... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - Multipoint Communications Service\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2005-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2018 Henrik Andersson <hean... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - Multipoint Communications Service\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2005-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2018 Henrik Andersson <hean... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n RDP order processing\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n RDP order processing\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Copyright (C) Matthew Chapman 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either ver... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Copyright (C) Matthew Chapman 1999-2008",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Public License as published by\n the Free Software Foundation, either ver... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - RDP layer\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2003-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2011-2018 Henrik Andersson <hean01@cendio.se> for C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - RDP layer\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2003-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2011-2018 Henrik Andersson <hean01@cendio.se> for C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2004-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2010-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB\n Copyright 2017 Karl M... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2004-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2010-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB\n Copyright 2017 Karl M... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Sound Channel Process Functions\n Copyright 2006-2010 Pierre Ossman <ossman@cendio.se> for Cendio AB\n Copyright 2009-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2017 Henrik Andersson <hean01@cendio.se> for ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Sound Channel Process Functions\n Copyright 2006-2010 Pierre Ossman <ossman@cendio.se> for Cendio AB\n Copyright 2009-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2017 Henrik Andersson <hean01@cendio.se> for ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Seamless Windows support\n Copyright 2005-2008 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2007-2008 Pierre Ossman <ossman@cendio.se> for Cendio AB\n Copyright 2013-2017 Henrik Andersson <hean01@cendio.se> for C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Seamless Windows support\n Copyright 2005-2008 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2007-2008 Pierre Ossman <ossman@cendio.se> for Cendio AB\n Copyright 2013-2017 Henrik Andersson <hean01@cendio.se> for C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - RDP encryption and licensing\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2005-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2017-2018 Henrik Andersson <hean... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* -*- c-basic-offset: 8 -*-\n rdesktop: A Remote Desktop Protocol client.\n Protocol services - RDP encryption and licensing\n Copyright (C) Matthew Chapman <matthewc.unsw.edu.au> 1999-2008\n Copyright 2005-2011 Peter Astrand <astrand@cendio.se> for Cendio AB\n Copyright 2017-2018 Henrik Andersson <hean... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Parsing primitives\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Publ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Parsing primitives\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2012-2017 Henrik Andersson <hean01@cendio.se> for Cendio AB",
" This program is free software: you can redistribute it and/or modify\n it under the terms of the GNU General Publ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Common data types\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2014 Henrik Andersson <hean01@cendio.se> for Cendio AB\n Copyright 2017 Karl Mikaelsson <derfian@cendio.se> for Cendio AB",
" This program is free software: you can redistribute ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n rdesktop: A Remote Desktop Protocol client.\n Common data types\n Copyright (C) Matthew Chapman 1999-2008\n Copyright 2014 Henrik Andersson <hean01@cendio.se> for Cendio AB\n Copyright 2017 Karl Mikaelsson <derfian@cendio.se> for Cendio AB",
" This program is free software: you can redistribute ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [26, 848, 128, 753, 657, 136, 114, 1265, 228, 2015, 876, 446, 372, 890, 58, 44], "buggy_code_start_loc": [25, 797, 120, 753, 597, 4, 48, 1261, 166, 286, 856, 271, 170, 298, 57, 44], "filenames": ["asn.c", "bitmap.c", "cliprdr.c", "constants.h", "cssp.c", "lspci.c", "mcs.c", "orders.c", "proto.h",... | 747 |
Determine whether the {function_name} code is vulnerable or not. | [
"// This file implements methods from the QPDF class that involve\n// encryption.",
"#include <qpdf/QPDF.hh>",
"#include <qpdf/QPDFExc.hh>",
"#include <qpdf/QTC.hh>\n#include <qpdf/QUtil.hh>\n#include <qpdf/Pl_RC4.hh>\n#include <qpdf/Pl_AES_PDF.hh>\n#include <qpdf/Pl_Buffer.hh>\n#include <qpdf/Pl_SHA2.hh>\n#i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [934], "buggy_code_start_loc": [481], "filenames": ["libqpdf/QPDF_encryption.cc"], "fixing_code_end_loc": [929], "fixing_code_start_loc": [482], "message": "An issue was discovered in QPDF before 7.0.0. There is a stack-based out-of-bounds read in the function iterate_rc4 in QPDF_encryption.cc.",... | 748 |
Determine whether the {function_name} code is vulnerable or not. | [
"// This file implements methods from the QPDF class that involve\n// encryption.",
"#include <qpdf/QPDF.hh>",
"#include <qpdf/QPDFExc.hh>",
"#include <qpdf/QTC.hh>\n#include <qpdf/QUtil.hh>\n#include <qpdf/Pl_RC4.hh>\n#include <qpdf/Pl_AES_PDF.hh>\n#include <qpdf/Pl_Buffer.hh>\n#include <qpdf/Pl_SHA2.hh>\n#i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [934], "buggy_code_start_loc": [481], "filenames": ["libqpdf/QPDF_encryption.cc"], "fixing_code_end_loc": [929], "fixing_code_start_loc": [482], "message": "An issue was discovered in QPDF before 7.0.0. There is a stack-based out-of-bounds read in the function iterate_rc4 in QPDF_encryption.cc.",... | 748 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$tpl = erLhcoreClassTemplate::getInstance('lhcannedmsg/showsuggester.tpl.php');",
"$chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$tpl->set('chat',$chat);",
"if ( erLhcoreClassChat::hasAccessToRead($chat) ) {",
" $tpl->s... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');",
"\n$tpl = erLhcoreClassTemplate::getInstance('lhcannedmsg/showsuggester.tpl.php');",
"$chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$tpl->set('chat',$chat);",
"if ( erLhcoreClassChat::... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$tpl = erLhcoreClassTemplate::getInstance('lhcannedmsg/subject.tpl.php');\n$canned = erLhcoreClassModelCannedMsg::fetch($Params['user_parameters']['canned_id']);",
"if ($canned instanceof erLhcoreClassModelCannedMsg)\n{\n if (ezcInputForm::hasPostData()) {",
" if (!isset($_SERVER['HTTP_X_C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$tpl = erLhcoreClassTemplate::getInstance('lhcannedmsg/subject.tpl.php');\n$canned = erLhcoreClassModelCannedMsg::fetch($Params['user_parameters']['canned_id']);",
"if ($canned instanceof erLhcoreClassModelCannedMsg)\n{\n if (ezcInputForm::hasPostData()) {",
" if (!isset($_SERVER['HTTP_X_C... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$response = erLhcoreClassChatEventDispatcher::getInstance()->dispatch('chat.blockuser', array());",
"$chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$currentUser = erLhcoreClassUser::instance();",
"// We are just in modal window\nif (... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$response = erLhcoreClassChatEventDispatcher::getInstance()->dispatch('chat.blockuser', array());",
"$chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$currentUser = erLhcoreClassUser::instance();",
"// We are just in modal window\nif (... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$tpl = erLhcoreClassTemplate::getInstance('lhchat/changestatus.tpl.php');\n$chat = erLhcoreClassChat::getSession()->load('erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$tpl->set('chat', $chat);",
"if (erLhcoreClassChat::hasAccessToRead($chat)) {\n $currentUser = erLhcoreClassUse... | [
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"$tpl = erLhcoreClassTemplate::getInstance('lhchat/changestatus.tpl.php');\n$chat = erLhcoreClassChat::getSession()->load('erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\n$tpl->set('chat', $chat);",
"if (erLhcoreClassChat::hasAccessToRead($chat)) {\n $currentUser = erLhcoreClassUse... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$activated = 'false';\n$result = 'false';\n$ott = '';\n$ru = '';",
"$tpl = erLhcoreClassTemplate::getInstance('lhchat/checkchatstatus.tpl.php');\n$tpl->set('theme',false);",
"if (isset($Params['user_parameters_unordered']['theme']) && ($themeId = erLhcoreClassChat::extractTheme($Params['user... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');",
"\n$activated = 'false';\n$result = 'false';\n$ott = '';\n$ru = '';",
"$tpl = erLhcoreClassTemplate::getInstance('lhchat/checkchatstatus.tpl.php');\n$tpl->set('theme',false);",
"if (isset($Params['user_parameters_unordered']['theme']) && ($themeId = er... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r",
"\r\ntry {\r\n $chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\r\n\r\n if ( erLhcoreClassChat::hasAccessToRead($chat) )\r\n {\r\n if (is_numeric($Params['user_parameters']['msg_id'])) {\r\n $lastMessageObj = er... | [
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r\n\r\nheader('Content-type: application/json');\r",
"\r\ntry {\r\n $chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\r\n\r\n if ( erLhcoreClassChat::hasAccessToRead($chat) )\r\n {\r\n if (is_numeric($Params['user_parameters']['... | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"",
"\r\ntry {\r\n\t$Chat = erLhcoreClassChat::getSession ()->load ( 'erLhcoreClassModelChat', $Params ['user_parameters'] ['chat_id'] );\r\n\t\r\n\tif (erLhcoreClassChat::hasAccessToRead ( $Chat )) {\r\n\t\t\t\t\t\r\n\t\t$msg = erLhcoreClassModelmsg::fetch ( $Params ['user_parameters'] ['msgid'] );\... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"\r\nheader('Content-type: application/json');\r",
"\r\ntry {\r\n\t$Chat = erLhcoreClassChat::getSession ()->load ( 'erLhcoreClassModelChat', $Params ['user_parameters'] ['chat_id'] );\r\n\t\r\n\tif (erLhcoreClassChat::hasAccessToRead ( $Chat )) {\r\n\t\t\t\t\t\r\n\t\t$msg = erLhcoreClassModelmsg::fe... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"",
"\r\n$db = ezcDbInstance::get();\r\n\r\n$db->beginTransaction();\r\n\r\ntry {\r\n $chat = erLhcoreClassModelChat::fetchAndLock($Params['user_parameters']['chat_id']);\r\n\r\n if (!($chat instanceof erLhcoreClassModelChat)) {\r\n throw new Exception('Chat could not be found!');\r\n ... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"\r\nheader('Content-type: application/json');\r",
"\r\n$db = ezcDbInstance::get();\r\n\r\n$db->beginTransaction();\r\n\r\ntry {\r\n $chat = erLhcoreClassModelChat::fetchAndLock($Params['user_parameters']['chat_id']);\r\n\r\n if (!($chat instanceof erLhcoreClassModelChat)) {\r\n throw ne... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php \r",
"\r\nif (is_numeric($Params['user_parameters']['chat_id']))\r\n{\r\n $chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\r\n if ( erLhcoreClassChat::hasAccessToRead($chat) )\r\n {\r\n $browse = erLhcoreClassCoBrowse::getBrow... | [
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r\nheader('Content-type: application/json');\r",
"\r\nif (is_numeric($Params['user_parameters']['chat_id']))\r\n{\r\n $chat = erLhcoreClassChat::getSession()->load( 'erLhcoreClassModelChat', $Params['user_parameters']['chat_id']);\r\n if ( erLhcoreClassChat::hasAccessToRead($chat) )\r\n {\r\n ... | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"",
"\r\nif (is_numeric($Params['user_parameters']['chat_id'])) {\r\n /*\r\n * If online user mode we have to make different check\r\n * */\r\n $browse = false;\r\n if ($Params['user_parameters_unordered']['cobrowsemode'] == 'onlineuser') {\r\n $onlineUser = erLhcoreClassModel... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"\r\nheader('Content-type: application/json');\r",
"\r\nif (is_numeric($Params['user_parameters']['chat_id'])) {\r\n /*\r\n * If online user mode we have to make different check\r\n * */\r\n $browse = false;\r\n if ($Params['user_parameters_unordered']['cobrowsemode'] == 'onlineuser'... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$currentUser = erLhcoreClassUser::instance();\n$userData = $currentUser->getUserData(true);",
"if (!isset($_SERVER['HTTP_X_CSRFTOKEN']) || !$currentUser->validateCSFRToken($_SERVER['HTTP_X_CSRFTOKEN'])) {\n echo json_encode(array('error' => true, 'active' => true));\n exit;\n}",
"// We... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"header('Content-type: application/json');",
"\n$currentUser = erLhcoreClassUser::instance();\n$userData = $currentUser->getUserData(true);",
"if (!isset($_SERVER['HTTP_X_CSRFTOKEN']) || !$currentUser->validateCSFRToken($_SERVER['HTTP_X_CSRFTOKEN'])) {\n echo json_encode(array('error' => true, 'ac... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"try {\n\t$chatTransfer = erLhcoreClassTransfer::getSession()->load( 'erLhcoreClassModelTransfer', $Params['user_parameters']['tr... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');\n",
"$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"try {\n\t$chatTransfer = erLhcoreClassTransfer::getSession()->load( 'erLhcoreClassM... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$transfer = erLhcoreClassTransfer::getTransferByChat($Params['user_parameters']['chat_id']);",
"$chatTransfer = erLhcoreClas... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$transfer = erLhcoreClassTransfer::getTransferByChat($Params['user_parameters']['ch... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$chat = erLhcoreClassModelChat::fetch($Params['user_parameters']['chat_id']);",
"if ( erLhcoreClassChat::hasAccessToRead($chat... | [
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');\n",
"$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$chat = erLhcoreClassModelChat::fetch($Params['user_parameters']['chat_id']);",
"... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"//erLhcoreClassLog::write(print_r($_POST,true));\n//[chats] => 2|5,2,5,2;8|0,5,2,0,5,2\n//$_POST['chats'] = '6|5,1,4;8|0,5,2... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"//erLhcoreClassLog::write(print_r($_POST,true));\n//[chats] => 2|5,2,5,2;8|0,5,2,0,... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"// Debug\n//erLhcoreClassLog::write(print_r($_POST,true));",
"",
"\n@ini_set('session.cookie_samesite', 'None');\n@ini_set('session.cookie_secure', true);",
"$currentUser = erLhcoreClassUser::instance();",
"if ($currentUser->authenticate($_POST['username'],$_POST['password']))\n{ \n e... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"// Debug\n//erLhcoreClassLog::write(print_r($_POST,true));",
"\nheader('Content-type: application/json');",
"\n@ini_set('session.cookie_samesite', 'None');\n@ini_set('session.cookie_secure', true);",
"$currentUser = erLhcoreClassUser::instance();",
"if ($currentUser->authenticate($_POST['usernam... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"",
"$currentUser = erLhcoreClassUser::instance();\r\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\r\n{\r\n exit;\r\n}\r\n\r\n$userData = $currentUser->getUserData(true);\r\necho json_encode(array('online' => $userData->hide_online == 1));\r\... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"header('Content-type: application/json');\r\n\r",
"$currentUser = erLhcoreClassUser::instance();\r\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\r\n{\r\n exit;\r\n}\r\n\r\n$userData = $currentUser->getUserData(true);\r\necho json_encode(arra... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$onlineUsers = erLhcoreClassChat::getOnlineUsers(array($currentUser->getUserID()));",
"echo json_encode(array('result' => $o... | [
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"\nheader('Content-type: application/json');",
"\n$currentUser = erLhcoreClassUser::instance();\nif (!$currentUser->isLogged() && !$currentUser->authenticate($_POST['username'],$_POST['password']))\n{\n exit;\n}",
"$onlineUsers = erLhcoreClassChat::getOnlineUsers(array($currentUser->getUserID()));... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"",
"\r\n$tpl = erLhcoreClassTemplate::getInstance( 'lhxml/userinfo.tpl.php' );\r\n\r\ntry {\r\n\t$onlineUsers = erLhcoreClassModelChatOnlineUser::fetch((int)$Params['user_parameters']['user_id']);\r\n\t$tpl->set('onlineUsers',$onlineUsers);\r\n\techo json_encode(array('user' => $tpl->fetch()));\r\n}... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\r",
"\r\nheader('Content-type: application/json');\r",
"\r\n$tpl = erLhcoreClassTemplate::getInstance( 'lhxml/userinfo.tpl.php' );\r\n\r\ntry {\r\n\t$onlineUsers = erLhcoreClassModelChatOnlineUser::fetch((int)$Params['user_parameters']['user_id']);\r\n\t$tpl->set('onlineUsers',$onlineUsers);\r\n\techo js... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [1, 44, 91, 46, 1, 2, 1, 1, 2, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "buggy_code_start_loc": [1, 44, 87, 15, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 4, 1, 1, 1], "filenames": ["lhc_web/modules/lhcannedmsg/showsuggester.php", "lhc_web/modules/lhcannedmsg/subject.php", "lhc_web/modules/lhchat/blockuser.php", "lh... | 749 |
Determine whether the {function_name} code is vulnerable or not. | [
"/***\n SPDX-License-Identifier: LGPL-2.1+",
" systemd is free software; you can redistribute it and/or modify it\n under the terms of the GNU Lesser General Public License as published by\n the Free Software Foundation; either version 2.1 of the License, or\n (at your option) any later version.\n***/",
"L... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"/***\n SPDX-License-Identifier: LGPL-2.1+",
" systemd is free software; you can redistribute it and/or modify it\n under the terms of the GNU Lesser General Public License as published by\n the Free Software Foundation; either version 2.1 of the License, or\n (at your option) any later version.\n***/",
"L... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* SPDX-License-Identifier: LGPL-2.1+ */",
"#include <endian.h>\n#include <netdb.h>\n#include <poll.h>\n#include <pthread.h>\n#include <signal.h>\n#include <stdlib.h>\n#include <sys/mman.h>\n#include <sys/stat.h>\n#include <sys/wait.h>\n#include <unistd.h>",
"#include \"sd-bus.h\"",
"#include \"alloc-util.h\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* SPDX-License-Identifier: LGPL-2.1+ */",
"#include <endian.h>\n#include <netdb.h>\n#include <poll.h>\n#include <pthread.h>\n#include <signal.h>\n#include <stdlib.h>\n#include <sys/mman.h>\n#include <sys/stat.h>\n#include <sys/wait.h>\n#include <unistd.h>",
"#include \"sd-bus.h\"",
"#include \"alloc-util.h\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* SPDX-License-Identifier: LGPL-2.1+ */\n#ifndef foosdbushfoo\n#define foosdbushfoo",
"/***\n systemd is free software; you can redistribute it and/or modify it\n under the terms of the GNU Lesser General Public License as published by\n the Free Software Foundation; either version 2.1 of the License, or\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* SPDX-License-Identifier: LGPL-2.1+ */\n#ifndef foosdbushfoo\n#define foosdbushfoo",
"/***\n systemd is free software; you can redistribute it and/or modify it\n under the terms of the GNU Lesser General Public License as published by\n the Free Software Foundation; either version 2.1 of the License, or\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [687, 4209, 209], "buggy_code_start_loc": [687, 4209, 209], "filenames": ["src/libsystemd/libsystemd.sym", "src/libsystemd/sd-bus/sd-bus.c", "src/systemd/sd-bus.h"], "fixing_code_end_loc": [689, 4234, 211], "fixing_code_start_loc": [688, 4210, 210], "message": "A heap use-after-free vulnerability... | 750 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nrequire_once(DIR . '/plugins/gimmie/functions.php');\nrequire_once(DIR . '/plugins/gimmie/OAuth.php');",
"$my_player_uid = $vbulletin->userinfo['email'];",
"$key = $gimmie['gimmie_key']; \n$secret = $gimmie['gimmie_secret']; \n$access_token = $my_player_uid;\n$access_... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [65], "buggy_code_start_loc": [39], "filenames": ["Upload/plugins/gimmie/trigger_ratethread.php"], "fixing_code_end_loc": [65], "fixing_code_start_loc": [39], "message": "A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2. Affected is an unknown function of the fi... | 751 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\nrequire_once(DIR . '/plugins/gimmie/functions.php');\nrequire_once(DIR . '/plugins/gimmie/OAuth.php');",
"$my_player_uid = $vbulletin->userinfo['email'];",
"$key = $gimmie['gimmie_key']; \n$secret = $gimmie['gimmie_secret']; \n$access_token = $my_player_uid;\n$access_... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [65], "buggy_code_start_loc": [39], "filenames": ["Upload/plugins/gimmie/trigger_ratethread.php"], "fixing_code_end_loc": [65], "fixing_code_start_loc": [39], "message": "A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2. Affected is an unknown function of the fi... | 751 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fs/f2fs/super.c\n *\n * Copyright (c) 2012 Samsung Electronics Co., Ltd.\n * http://www.samsung.com/\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1496, 304], "buggy_code_start_loc": [1496, 304], "filenames": ["fs/f2fs/super.c", "include/linux/f2fs_fs.h"], "fixing_code_end_loc": [1504, 311], "fixing_code_start_loc": [1497, 305], "message": "The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not va... | 752 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * fs/f2fs/super.c\n *\n * Copyright (c) 2012 Samsung Electronics Co., Ltd.\n * http://www.samsung.com/\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1496, 304], "buggy_code_start_loc": [1496, 304], "filenames": ["fs/f2fs/super.c", "include/linux/f2fs_fs.h"], "fixing_code_end_loc": [1504, 311], "fixing_code_start_loc": [1497, 305], "message": "The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not va... | 752 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * include/linux/f2fs_fs.h\n *\n * Copyright (c) 2012 Samsung Electronics Co., Ltd.\n * http://www.samsung.com/\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foun... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1496, 304], "buggy_code_start_loc": [1496, 304], "filenames": ["fs/f2fs/super.c", "include/linux/f2fs_fs.h"], "fixing_code_end_loc": [1504, 311], "fixing_code_start_loc": [1497, 305], "message": "The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not va... | 752 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * include/linux/f2fs_fs.h\n *\n * Copyright (c) 2012 Samsung Electronics Co., Ltd.\n * http://www.samsung.com/\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foun... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1496, 304], "buggy_code_start_loc": [1496, 304], "filenames": ["fs/f2fs/super.c", "include/linux/f2fs_fs.h"], "fixing_code_end_loc": [1504, 311], "fixing_code_start_loc": [1497, 305], "message": "The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not va... | 752 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\n\tFusionPBX\n\tVersion: MPL 1.1",
"\tThe contents of this file are subject to the Mozilla Public License Version\n\t1.1 (the \"License\"); you may not use this file except in compliance with\n\tthe License. You may obtain a copy of the License at\n\thttp://www.mozilla.org/MPL/",
"\tSoftware distribu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [127], "buggy_code_start_loc": [41], "filenames": ["resources/paging.php"], "fixing_code_end_loc": [161], "fixing_code_start_loc": [42], "message": "In FusionPBX up to v4.5.7, the file resources\\paging.php has a paging function (called by several pages of the interface), which uses an unsanitize... | 753 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/*\n\tFusionPBX\n\tVersion: MPL 1.1",
"\tThe contents of this file are subject to the Mozilla Public License Version\n\t1.1 (the \"License\"); you may not use this file except in compliance with\n\tthe License. You may obtain a copy of the License at\n\thttp://www.mozilla.org/MPL/",
"\tSoftware distribu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [127], "buggy_code_start_loc": [41], "filenames": ["resources/paging.php"], "fixing_code_end_loc": [161], "fixing_code_start_loc": [42], "message": "In FusionPBX up to v4.5.7, the file resources\\paging.php has a paging function (called by several pages of the interface), which uses an unsanitize... | 753 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Copyright (C) 2011 Instituto Nokia de Tecnologia\n *\n * Authors:\n * Aloisio Almeida Jr <aloisio.almeida@openbossa.org>\n * Lauro Ramos Venancio <lauro.venancio@openbossa.org>\n */",
"#define pr_fmt(fmt) KBUILD_MODNAME \": %s: \" fmt, __func__",
"#inc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [334], "buggy_code_start_loc": [331], "filenames": ["net/nfc/rawsock.c"], "fixing_code_end_loc": [338], "fixing_code_start_loc": [331], "message": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create r... | 754 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Copyright (C) 2011 Instituto Nokia de Tecnologia\n *\n * Authors:\n * Aloisio Almeida Jr <aloisio.almeida@openbossa.org>\n * Lauro Ramos Venancio <lauro.venancio@openbossa.org>\n */",
"#define pr_fmt(fmt) KBUILD_MODNAME \": %s: \" fmt, __func__",
"#inc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [334], "buggy_code_start_loc": [331], "filenames": ["net/nfc/rawsock.c"], "fixing_code_end_loc": [338], "fixing_code_start_loc": [331], "message": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create r... | 754 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nThis module defines environment variables used in MLflow.\n\"\"\"\nimport os",
"\nclass _EnvironmentVariable:\n \"\"\"\n Represents an environment variable.\n \"\"\"",
" def __init__(self, name, type_, default):\n self.name = name\n self.type = type_\n self.default = de... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [204, 1342, 42, 59, 1125, 93], "buggy_code_start_loc": [204, 87, 32, 41, 1047, 93], "filenames": ["mlflow/environment_variables.py", "mlflow/server/handlers.py", "mlflow/utils/uri.py", "tests/tracking/integration_test_utils.py", "tests/tracking/test_rest_tracking.py", "tests/utils/test_uri.py"], ... | 755 |
Determine whether the {function_name} code is vulnerable or not. | [
"\"\"\"\nThis module defines environment variables used in MLflow.\n\"\"\"\nimport os",
"\nclass _EnvironmentVariable:\n \"\"\"\n Represents an environment variable.\n \"\"\"",
" def __init__(self, name, type_, default):\n self.name = name\n self.type = type_\n self.default = de... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [204, 1342, 42, 59, 1125, 93], "buggy_code_start_loc": [204, 87, 32, 41, 1047, 93], "filenames": ["mlflow/environment_variables.py", "mlflow/server/handlers.py", "mlflow/utils/uri.py", "tests/tracking/integration_test_utils.py", "tests/tracking/test_rest_tracking.py", "tests/utils/test_uri.py"], ... | 755 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.