prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Performance events ring-buffer code:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011 Red Hat, Inc., Peter Zijlstra <pzijlstr@redhat.com>\n * Copyright � 2009 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Performance events ring-buffer code:\n *\n * Copyright (C) 2008 Thomas Gleixner <tglx@linutronix.de>\n * Copyright (C) 2008-2011 Red Hat, Inc., Ingo Molnar\n * Copyright (C) 2008-2011 Red Hat, Inc., Peter Zijlstra <pzijlstr@redhat.com>\n * Copyright � 2009 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * kernel/sched.c\n *\n * Kernel scheduler and related syscalls\n *\n * Copyright (C) 1991-2002 Linus Torvalds\n *\n * 1996-12-23 Modified by Dave Grothe to fix bugs in semaphores and\n *\t\tmake semaphores SMP safe\n * 1998-11-19\tImplemented schedule_timeout() and related stuff\n *\t\tby Andrea Arcang...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * kernel/sched.c\n *\n * Kernel scheduler and related syscalls\n *\n * Copyright (C) 1991-2002 Linus Torvalds\n *\n * 1996-12-23 Modified by Dave Grothe to fix bugs in semaphores and\n *\t\tmake semaphores SMP safe\n * 1998-11-19\tImplemented schedule_timeout() and related stuff\n *\t\tby Andrea Arcang...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Detect hard and soft lockups on a system\n *\n * started by Don Zickus, Copyright (C) 2010 Red Hat, Inc.\n *\n * this code detects hard lockups: incidents in where on a CPU\n * the kernel does not respond to anything except NMI.\n *\n * Note: Most of this code is borrowed heavily from softlockup.c,\n * so t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Detect hard and soft lockups on a system\n *\n * started by Don Zickus, Copyright (C) 2010 Red Hat, Inc.\n *\n * this code detects hard lockups: incidents in where on a CPU\n * the kernel does not respond to anything except NMI.\n *\n * Note: Most of this code is borrowed heavily from softlockup.c,\n * so t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * data_breakpoint.c - Sample HW Breakpoint file to watch kernel data address\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * data_breakpoint.c - Sample HW Breakpoint file to watch kernel data address\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, or\n * (at your ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [851, 483, 791, 587, 400, 187, 326, 531, 644, 521, 277, 163, 89, 1350, 648, 886, 334, 353, 67, 397, 669, 624, 218, 208, 1281, 342, 651, 806, 168, 188, 310, 442, 1343, 1007, 620, 974, 612, 532, 1169, 1148, 5236, 30, 131, 2224, 215, 45], "buggy_code_start_loc": [850, 482, 790, 254, 399, 186, 321, 5...
819
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2020 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [106], "buggy_code_start_loc": [24], "filenames": ["tensorflow/core/framework/full_type_util.cc"], "fixing_code_end_loc": [111], "fixing_code_start_loc": [25], "message": "Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-der...
820
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2020 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [106], "buggy_code_start_loc": [24], "filenames": ["tensorflow/core/framework/full_type_util.cc"], "fixing_code_end_loc": [111], "fixing_code_start_loc": [25], "message": "Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, TensorFlow might do a null-der...
820
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n** @file mruby/proc.h - Proc class\n**\n** See Copyright Notice in mruby.h\n*/", "#ifndef MRUBY_PROC_H\n#define MRUBY_PROC_H", "#include \"common.h\"\n#include <mruby/irep.h>", "/**\n * Proc class\n */\nMRB_BEGIN_DECL", "struct REnv {\n MRB_OBJECT_HEADER;\n mrb_value *stack;\n struct mrb_context *c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n** @file mruby/proc.h - Proc class\n**\n** See Copyright Notice in mruby.h\n*/", "#ifndef MRUBY_PROC_H\n#define MRUBY_PROC_H", "#include \"common.h\"\n#include <mruby/irep.h>", "/**\n * Proc class\n */\nMRB_BEGIN_DECL", "struct REnv {\n MRB_OBJECT_HEADER;\n mrb_value *stack;\n struct mrb_context *c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n** class.c - Class class\n**\n** See Copyright Notice in mruby.h\n*/", "#include <mruby.h>\n#include <mruby/array.h>\n#include <mruby/hash.h>\n#include <mruby/class.h>\n#include <mruby/numeric.h>\n#include <mruby/proc.h>\n#include <mruby/string.h>\n#include <mruby/variable.h>\n#include <mruby/error.h>\n#incl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n** class.c - Class class\n**\n** See Copyright Notice in mruby.h\n*/", "#include <mruby.h>\n#include <mruby/array.h>\n#include <mruby/hash.h>\n#include <mruby/class.h>\n#include <mruby/numeric.h>\n#include <mruby/proc.h>\n#include <mruby/string.h>\n#include <mruby/variable.h>\n#include <mruby/error.h>\n#incl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n** proc.c - Proc class\n**\n** See Copyright Notice in mruby.h\n*/", "#include <mruby.h>\n#include <mruby/class.h>\n#include <mruby/proc.h>\n#include <mruby/opcode.h>\n#include <mruby/data.h>\n#include <mruby/presym.h>\n#include <mruby/array.h>\n#include <mruby/hash.h>", "static const mrb_code call_iseq[] ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n** proc.c - Proc class\n**\n** See Copyright Notice in mruby.h\n*/", "#include <mruby.h>\n#include <mruby/class.h>\n#include <mruby/proc.h>\n#include <mruby/opcode.h>\n#include <mruby/data.h>\n#include <mruby/presym.h>\n#include <mruby/array.h>\n#include <mruby/hash.h>", "static const mrb_code call_iseq[] ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [96, 2573, 285], "buggy_code_start_loc": [95, 2572, 204], "filenames": ["include/mruby/proc.h", "src/class.c", "src/proc.c"], "fixing_code_end_loc": [96, 2573, 285], "fixing_code_start_loc": [95, 2572, 204], "message": "mruby is vulnerable to NULL Pointer Dereference", "other": {"cve": {"cisaActi...
821
Determine whether the {function_name} code is vulnerable or not.
[ "#================\n# FILE : KIWIRoot.pm\n#----------------\n# PROJECT : OpenSUSE Build-Service\n# COPYRIGHT : (c) 2006 SUSE LINUX Products GmbH, Germany\n# :\n# AUTHOR : Marcus Schaefer <ms@suse.de>\n# :\n# BELONGS TO : Operating System images\n# ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [934], "buggy_code_start_loc": [933], "filenames": ["modules/KIWIRoot.pm"], "fixing_code_end_loc": [934], "fixing_code_start_loc": [933], "message": "kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to ex...
822
Determine whether the {function_name} code is vulnerable or not.
[ "#================\n# FILE : KIWIRoot.pm\n#----------------\n# PROJECT : OpenSUSE Build-Service\n# COPYRIGHT : (c) 2006 SUSE LINUX Products GmbH, Germany\n# :\n# AUTHOR : Marcus Schaefer <ms@suse.de>\n# :\n# BELONGS TO : Operating System images\n# ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [934], "buggy_code_start_loc": [933], "filenames": ["modules/KIWIRoot.pm"], "fixing_code_end_loc": [934], "fixing_code_start_loc": [933], "message": "kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to ex...
822
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/*\n * This file is part of Twig.\n *\n * (c) Fabien Potencier\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */", "namespace Twig\\Loader;", "use Twig\\Error\\LoaderError;\nuse Twig\\Source;", "/**\n * Loads t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [226, 64], "buggy_code_start_loc": [224, 33], "filenames": ["src/Loader/FilesystemLoader.php", "tests/Loader/FilesystemTest.php"], "fixing_code_end_loc": [227, 70], "fixing_code_start_loc": [223, 34], "message": "Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15...
823
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "/*\n * This file is part of Twig.\n *\n * (c) Fabien Potencier\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */", "namespace Twig\\Loader;", "use Twig\\Error\\LoaderError;\nuse Twig\\Source;", "/**\n * Loads t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [226, 64], "buggy_code_start_loc": [224, 33], "filenames": ["src/Loader/FilesystemLoader.php", "tests/Loader/FilesystemTest.php"], "fixing_code_end_loc": [227, 70], "fixing_code_start_loc": [223, 34], "message": "Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15...
823
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Twig\\Tests\\Loader;", "/*\n * This file is part of Twig.\n *\n * (c) Fabien Potencier\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */", "use Twig\\Environment;\nuse Twig\\Error\\LoaderError;\nuse Twi...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [226, 64], "buggy_code_start_loc": [224, 33], "filenames": ["src/Loader/FilesystemLoader.php", "tests/Loader/FilesystemTest.php"], "fixing_code_end_loc": [227, 70], "fixing_code_start_loc": [223, 34], "message": "Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15...
823
Determine whether the {function_name} code is vulnerable or not.
[ "<?php", "namespace Twig\\Tests\\Loader;", "/*\n * This file is part of Twig.\n *\n * (c) Fabien Potencier\n *\n * For the full copyright and license information, please view the LICENSE\n * file that was distributed with this source code.\n */", "use Twig\\Environment;\nuse Twig\\Error\\LoaderError;\nuse Twi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [226, 64], "buggy_code_start_loc": [224, 33], "filenames": ["src/Loader/FilesystemLoader.php", "tests/Loader/FilesystemTest.php"], "fixing_code_end_loc": [227, 70], "fixing_code_start_loc": [223, 34], "message": "Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15...
823
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Copyright (C) 2011 Instituto Nokia de Tecnologia\n *\n * Authors:\n * Lauro Ramos Venancio <lauro.venancio@openbossa.org>\n * Aloisio Almeida Jr <aloisio.almeida@openbossa.org>\n *\n * Vendor commands implementation based on net/wireless/nl80211.c\n * whic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1264], "buggy_code_start_loc": [1247], "filenames": ["net/nfc/netlink.c"], "fixing_code_end_loc": [1264], "fixing_code_start_loc": [1247], "message": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space...
824
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Copyright (C) 2011 Instituto Nokia de Tecnologia\n *\n * Authors:\n * Lauro Ramos Venancio <lauro.venancio@openbossa.org>\n * Aloisio Almeida Jr <aloisio.almeida@openbossa.org>\n *\n * Vendor commands implementation based on net/wireless/nl80211.c\n * whic...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1264], "buggy_code_start_loc": [1247], "filenames": ["net/nfc/netlink.c"], "fixing_code_end_loc": [1264], "fixing_code_start_loc": [1247], "message": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space...
824
Determine whether the {function_name} code is vulnerable or not.
[ "libexif-0.6.x:\n * New translations: ms\n * Updated translations for most languages\n * Fixed C89 compatibility\n * Fixed warnings on recent versions of autoconf", "", "\nlibexif-0.6.21 (2012-07-12):\n * New translations: en_AU, uk\n * Updated translations: cs, da, de, en_CA, nl, pl, sk, sv, vi\n * Adde...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 434], "buggy_code_start_loc": [5, 37], "filenames": ["NEWS", "libexif/exif-data.c"], "fixing_code_end_loc": [7, 463], "fixing_code_start_loc": [6, 38], "message": "An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to e...
825
Determine whether the {function_name} code is vulnerable or not.
[ "libexif-0.6.x:\n * New translations: ms\n * Updated translations for most languages\n * Fixed C89 compatibility\n * Fixed warnings on recent versions of autoconf", " * Fix for recursion DoS CVE-2018-20030", "\nlibexif-0.6.21 (2012-07-12):\n * New translations: en_AU, uk\n * Updated translations: cs, da,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [5, 434], "buggy_code_start_loc": [5, 37], "filenames": ["NEWS", "libexif/exif-data.c"], "fixing_code_end_loc": [7, 463], "fixing_code_start_loc": [6, 38], "message": "An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to e...
825
Determine whether the {function_name} code is vulnerable or not.
[ "/* exif-data.c\n *\n * Copyright (c) 2001 Lutz Mueller <lutz@users.sourceforge.net>\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2 of the License, or ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 0, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 434], "buggy_code_start_loc": [5, 37], "filenames": ["NEWS", "libexif/exif-data.c"], "fixing_code_end_loc": [7, 463], "fixing_code_start_loc": [6, 38], "message": "An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to e...
825
Determine whether the {function_name} code is vulnerable or not.
[ "/* exif-data.c\n *\n * Copyright (c) 2001 Lutz Mueller <lutz@users.sourceforge.net>\n *\n * This library is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2 of the License, or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5, 434], "buggy_code_start_loc": [5, 37], "filenames": ["NEWS", "libexif/exif-data.c"], "fixing_code_end_loc": [7, 463], "fixing_code_start_loc": [6, 38], "message": "An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to e...
825
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare2 - LGPL - Copyright 2016-2017 - Davis, Alex Kornitzer */", "#include <r_util.h>", "#include \"mdmp.h\"", "ut64 r_bin_mdmp_get_paddr(struct r_bin_mdmp_obj *obj, ut64 vaddr) {\n\t/* FIXME: Will only resolve exact matches, probably no need to fix as\n\t** this function will become redundant on the opt...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [664], "buggy_code_start_loc": [365], "filenames": ["libr/bin/format/mdmp/mdmp.c"], "fixing_code_end_loc": [665], "fixing_code_start_loc": [365], "message": "The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based bu...
826
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare2 - LGPL - Copyright 2016-2017 - Davis, Alex Kornitzer */", "#include <r_util.h>", "#include \"mdmp.h\"", "ut64 r_bin_mdmp_get_paddr(struct r_bin_mdmp_obj *obj, ut64 vaddr) {\n\t/* FIXME: Will only resolve exact matches, probably no need to fix as\n\t** this function will become redundant on the opt...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [664], "buggy_code_start_loc": [365], "filenames": ["libr/bin/format/mdmp/mdmp.c"], "fixing_code_end_loc": [665], "fixing_code_start_loc": [365], "message": "The r_bin_mdmp_init_directory_entry function in mdmp.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based bu...
826
Determine whether the {function_name} code is vulnerable or not.
[ "Cacti CHANGELOG", "1.1.16\n-issue#875: When modifying Realm permissions, realms that are listed multiple times don't stay in sync", "", "-issue: Address additional corner cases around get_order_string usage", "1.1.15\n-issue: PHP Fatal Exception on upgrade from 1.1.11 or earlier\n-feature: Added test to de...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "Cacti CHANGELOG", "1.1.16\n-issue#875: When modifying Realm permissions, realms that are listed multiple times don't stay in sync", "-issue#877: Improving resolution to issue#847 and one additional vulnerability", "-issue: Address additional corner cases around get_order_string usage", "1.1.15\n-issue: PHP...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbit...
827
Determine whether the {function_name} code is vulnerable or not.
[ "use strict;\nuse inc::Module::Install 0.92;", "$|++;", "name 'Module-Signature';\nlicense 'CC0';\nall_from 'lib/Module/Signature.pm';\nreadme_from 'lib/Module/Signature.pm';\nrepository 'http://github.com/audreyt/module-signature';\ninstall_script 'script/cpansign';\nbuild_r...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "use strict;\nuse inc::Module::Install 0.92;", "$|++;", "name 'Module-Signature';\nlicense 'CC0';\nall_from 'lib/Module/Signature.pm';\nreadme_from 'lib/Module/Signature.pm';\nrepository 'http://github.com/audreyt/module-signature';\ninstall_script 'script/cpansign';\nbuild_r...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "NAME\n Module::Signature - Module signature file manipulation", "SYNOPSIS\n As a shell command:", " % cpansign # verify an existing SIGNATURE, or\n # make a new one if none exists", " % cpansign sign # make signature; overwrites existing...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "NAME\n Module::Signature - Module signature file manipulation", "SYNOPSIS\n As a shell command:", " % cpansign # verify an existing SIGNATURE, or\n # make a new one if none exists", " % cpansign sign # make signature; overwrites existing...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "package Module::Signature;", "$Module::Signature::VERSION = '0.73_01';", "\nuse 5.005;\nuse strict;\nuse vars qw($VERSION $SIGNATURE @ISA @EXPORT_OK);\nuse vars qw($Preamble $Cipher $Debug $Verbose $Timeout $AUTHOR);\nuse vars qw($KeyServer $KeyServerPort $AutoKeyRetrieve $CanKeyRetrieve);", "use constant CA...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1...
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "package Module::Signature;", "$Module::Signature::VERSION = '0.74';", "\nuse 5.005;\nuse strict;\nuse vars qw($VERSION $SIGNATURE @ISA @EXPORT_OK);\nuse vars qw($Preamble $Cipher $Debug $Verbose $Timeout $AUTHOR);\nuse vars qw($KeyServer $KeyServerPort $AutoKeyRetrieve $CanKeyRetrieve);", "use constant CANNO...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [12, 252, 953], "buggy_code_start_loc": [12, 251, 2], "filenames": ["Makefile.PL", "README", "lib/Module/Signature.pm"], "fixing_code_end_loc": [14, 252, 969], "fixing_code_start_loc": [13, 251, 2], "message": "The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to ...
828
Determine whether the {function_name} code is vulnerable or not.
[ "/************************************************************\n * Copyright (c) 1994 by Silicon Graphics Computer Systems, Inc.\n *\n * Permission to use, copy, modify, and distribute this\n * software and its documentation for any purpose and without\n * fee is hereby granted, provided that the above copyright\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [103], "buggy_code_start_loc": [103], "filenames": ["src/xkbcomp/expr.c"], "fixing_code_end_loc": [106], "fixing_code_start_loc": [104], "message": "Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer de...
829
Determine whether the {function_name} code is vulnerable or not.
[ "/************************************************************\n * Copyright (c) 1994 by Silicon Graphics Computer Systems, Inc.\n *\n * Permission to use, copy, modify, and distribute this\n * software and its documentation for any purpose and without\n * fee is hereby granted, provided that the above copyright\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [103], "buggy_code_start_loc": [103], "filenames": ["src/xkbcomp/expr.c"], "fixing_code_end_loc": [106], "fixing_code_start_loc": [104], "message": "Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer de...
829
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n$AVideoMobileAPP_UA = \"AVideoMobileApp\";\n$AVideoEncoder_UA = \"AVideoEncoder\";\n$AVideoStreamer_UA = \"AVideoStreamer\";\n$AVideoStorage_UA = \"AVideoStorage\";\n$mysql_connect_was_closed = 1;", "function forbiddenWords($text) {\n global $global;\n if (empty($global['forbiddenWords'])) {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5822], "buggy_code_start_loc": [5785], "filenames": ["objects/functions.php"], "fixing_code_end_loc": [5822], "fixing_code_start_loc": [5786], "message": "Cross Site Scripting (XSS) vulnerability in objects/function.php in function getDeviceID in WWBN AVideo through 11.6, via the yptDevice param...
830
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n$AVideoMobileAPP_UA = \"AVideoMobileApp\";\n$AVideoEncoder_UA = \"AVideoEncoder\";\n$AVideoStreamer_UA = \"AVideoStreamer\";\n$AVideoStorage_UA = \"AVideoStorage\";\n$mysql_connect_was_closed = 1;", "function forbiddenWords($text) {\n global $global;\n if (empty($global['forbiddenWords'])) {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [5822], "buggy_code_start_loc": [5785], "filenames": ["objects/functions.php"], "fixing_code_end_loc": [5822], "fixing_code_start_loc": [5786], "message": "Cross Site Scripting (XSS) vulnerability in objects/function.php in function getDeviceID in WWBN AVideo through 11.6, via the yptDevice param...
830
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 1999-2000 Image Power, Inc. and the University of\n * British Columbia.\n * Copyright (c) 2001-2003 Michael David Adams.\n * All rights reserved.\n */", "/* __START_OF_JASPER_LICENSE__\n * \n * JasPer License Version 2.0\n * \n * Copyright (c) 2001-2006 Michael David Adams\n * Copyright (c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [331, 289], "buggy_code_start_loc": [262, 232], "filenames": ["src/libjasper/ras/ras_dec.c", "src/libjasper/ras/ras_enc.c"], "fixing_code_end_loc": [349, 307], "fixing_code_start_loc": [263, 233], "message": "The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers ...
831
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 1999-2000 Image Power, Inc. and the University of\n * British Columbia.\n * Copyright (c) 2001-2003 Michael David Adams.\n * All rights reserved.\n */", "/* __START_OF_JASPER_LICENSE__\n * \n * JasPer License Version 2.0\n * \n * Copyright (c) 2001-2006 Michael David Adams\n * Copyright (c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [331, 289], "buggy_code_start_loc": [262, 232], "filenames": ["src/libjasper/ras/ras_dec.c", "src/libjasper/ras/ras_enc.c"], "fixing_code_end_loc": [349, 307], "fixing_code_start_loc": [263, 233], "message": "The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers ...
831
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 1999-2000 Image Power, Inc. and the University of\n * British Columbia.\n * Copyright (c) 2001-2003 Michael David Adams.\n * All rights reserved.\n */", "/* __START_OF_JASPER_LICENSE__\n * \n * JasPer License Version 2.0\n * \n * Copyright (c) 2001-2006 Michael David Adams\n * Copyright (c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [331, 289], "buggy_code_start_loc": [262, 232], "filenames": ["src/libjasper/ras/ras_dec.c", "src/libjasper/ras/ras_enc.c"], "fixing_code_end_loc": [349, 307], "fixing_code_start_loc": [263, 233], "message": "The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers ...
831
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 1999-2000 Image Power, Inc. and the University of\n * British Columbia.\n * Copyright (c) 2001-2003 Michael David Adams.\n * All rights reserved.\n */", "/* __START_OF_JASPER_LICENSE__\n * \n * JasPer License Version 2.0\n * \n * Copyright (c) 2001-2006 Michael David Adams\n * Copyright (c...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [331, 289], "buggy_code_start_loc": [262, 232], "filenames": ["src/libjasper/ras/ras_dec.c", "src/libjasper/ras/ras_enc.c"], "fixing_code_end_loc": [349, 307], "fixing_code_start_loc": [263, 233], "message": "The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers ...
831
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2001 Jens Axboe <axboe@kernel.dk>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be us...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1438], "buggy_code_start_loc": [1333], "filenames": ["block/bio.c"], "fixing_code_end_loc": [1442], "fixing_code_start_loc": [1334], "message": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has...
832
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2001 Jens Axboe <axboe@kernel.dk>\n *\n * This program is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License version 2 as\n * published by the Free Software Foundation.\n *\n * This program is distributed in the hope that it will be us...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1438], "buggy_code_start_loc": [1333], "filenames": ["block/bio.c"], "fixing_code_end_loc": [1442], "fixing_code_start_loc": [1334], "message": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has...
832
Determine whether the {function_name} code is vulnerable or not.
[ "", "2016-12-03 Even Rouault <even.rouault at spatialys.com>", "\t* tools/tiffcp.c: avoid potential division by zero is BitsPerSamples tag is\n\tmissing.\n\tReported by Agostino Sarubbo.\n\tFixes http://bugzilla.maptools.org/show_bug.cgi?id=2607", "2016-12-03 Even Rouault <even.rouault at spatialys.com>", "...
[ 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [0, 1352], "buggy_code_start_loc": [0, 1166], "filenames": ["ChangeLog", "tools/tiffcp.c"], "fixing_code_end_loc": [8, 1352], "fixing_code_start_loc": [1, 1166], "message": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alph...
833
Determine whether the {function_name} code is vulnerable or not.
[ "2016-12-03 Even Rouault <even.rouault at spatialys.com>", "\t* tools/tiffcp.c: fix uint32 underflow/overflow that can cause heap-based\n\tbuffer overflow.\n\tReported by Agostino Sarubbo.\n\tFixes http://bugzilla.maptools.org/show_bug.cgi?id=2610\n", "2016-12-03 Even Rouault <even.rouault at spatialys.com>", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [0, 1352], "buggy_code_start_loc": [0, 1166], "filenames": ["ChangeLog", "tools/tiffcp.c"], "fixing_code_end_loc": [8, 1352], "fixing_code_start_loc": [1, 1166], "message": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alph...
833
Determine whether the {function_name} code is vulnerable or not.
[ "/* $Id$ */", "/*\n * Copyright (c) 1988-1997 Sam Leffler\n * Copyright (c) 1991-1997 Silicon Graphics, Inc.\n *\n * Revised: 2/18/01 BAR -- added syntax for extracting single images from\n * multi-image TIFF files.\n *\n * New syntax is: sourceFileName,image#\n *\n * image# ranges ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0...
PreciseBugs
{"buggy_code_end_loc": [0, 1352], "buggy_code_start_loc": [0, 1166], "filenames": ["ChangeLog", "tools/tiffcp.c"], "fixing_code_end_loc": [8, 1352], "fixing_code_start_loc": [1, 1166], "message": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alph...
833
Determine whether the {function_name} code is vulnerable or not.
[ "/* $Id$ */", "/*\n * Copyright (c) 1988-1997 Sam Leffler\n * Copyright (c) 1991-1997 Silicon Graphics, Inc.\n *\n * Revised: 2/18/01 BAR -- added syntax for extracting single images from\n * multi-image TIFF files.\n *\n * New syntax is: sourceFileName,image#\n *\n * image# ranges ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [0, 1352], "buggy_code_start_loc": [0, 1166], "filenames": ["ChangeLog", "tools/tiffcp.c"], "fixing_code_end_loc": [8, 1352], "fixing_code_start_loc": [1, 1166], "message": "Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alph...
833
Determine whether the {function_name} code is vulnerable or not.
[ "Cacti CHANGELOG", "1.1.16\n-issue#875: When modifying Realm permissions, realms that are listed multiple times don't stay in sync", "", "-issue: Address additional corner cases around get_order_string usage", "1.1.15\n-issue: PHP Fatal Exception on upgrade from 1.1.11 or earlier\n-feature: Added test to de...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "Cacti CHANGELOG", "1.1.16\n-issue#875: When modifying Realm permissions, realms that are listed multiple times don't stay in sync", "-issue#877: Improving resolution to issue#847 and one additional vulnerability", "-issue: Address additional corner cases around get_order_string usage", "1.1.15\n-issue: PHP...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/*\n +-------------------------------------------------------------------------+\n | Copyright (C) 2004-2017 The Cacti Group |\n | |\n | This program is free software; you can redistribute it and/or ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [4, 1154, 74], "buggy_code_start_loc": [4, 1116, 46], "filenames": ["docs/CHANGELOG", "lib/html_form.php", "spikekill.php"], "fixing_code_end_loc": [6, 1154, 74], "fixing_code_start_loc": [5, 1116, 46], "message": "Cross-site scripting (XSS) vulnerability in aggregate_graphs.php in Cacti before 1...
834
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2012-15 Advanced Micro Devices, Inc.cls\n*\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2012-15 Advanced Micro Devices, Inc.cls\n*\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright 2012-15 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2016 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, cop...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2016 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, cop...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2016 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, cop...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n* Copyright 2016 Advanced Micro Devices, Inc.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights to use, cop...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [670, 716, 689, 502, 703, 788, 1079], "buggy_code_start_loc": [670, 716, 689, 502, 703, 788, 1079], "filenames": ["drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c", "drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c", "drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c", "drive...
835
Determine whether the {function_name} code is vulnerable or not.
[ "/* Authentication token and access key management\n *\n * Copyright (C) 2004, 2007 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as publi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Authentication token and access key management\n *\n * Copyright (C) 2004, 2007 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as publi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Key type used to cache DNS lookups made by the kernel\n *\n * See Documentation/networking/dns_resolver.txt\n *\n * Copyright (c) 2007 Igor Mammedov\n * Author(s): Igor Mammedov (niallain@gmail.com)\n * Steve French (sfrench@us.ibm.com)\n * Wang Lei (wang840925@gmail.com)\n *\t\tDa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Key type used to cache DNS lookups made by the kernel\n *\n * See Documentation/networking/dns_resolver.txt\n *\n * Copyright (c) 2007 Igor Mammedov\n * Author(s): Igor Mammedov (niallain@gmail.com)\n * Steve French (sfrench@us.ibm.com)\n * Wang Lei (wang840925@gmail.com)\n *\t\tDa...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Large capacity key type\n *\n * Copyright (C) 2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.\n * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Large capacity key type\n *\n * Copyright (C) 2017 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.\n * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2010 IBM Corporation\n * Copyright (C) 2010 Politecnico di Torino, Italy\n * TORSEC group -- http://security.polito.it\n *\n * Authors:\n * Mimi Zohar <zohar@us.ibm.com>\n * Roberto Sassu <roberto.sassu@polito.it>\n *\n * This program is free software; you can redistribute i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (C) 2010 IBM Corporation\n * Copyright (C) 2010 Politecnico di Torino, Italy\n * TORSEC group -- http://security.polito.it\n *\n * Authors:\n * Mimi Zohar <zohar@us.ibm.com>\n * Roberto Sassu <roberto.sassu@polito.it>\n *\n * This program is free software; you can redistribute i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Key garbage collector\n *\n * Copyright (C) 2009-2011 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public Licence\n * as published by the Free Software ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Key garbage collector\n *\n * Copyright (C) 2009-2011 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public Licence\n * as published by the Free Software ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Basic authentication token and access key management\n *\n * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Basic authentication token and access key management\n *\n * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Userspace key control operations\n *\n * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free S...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Userspace key control operations\n *\n * Copyright (C) 2004-5 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free S...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Keyring handling\n *\n * Copyright (C) 2004-2005, 2008, 2013 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free So...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Keyring handling\n *\n * Copyright (C) 2004-2005, 2008, 2013 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free So...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* procfs files for key database enumeration\n *\n * Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* procfs files for key database enumeration\n *\n * Copyright (C) 2004 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Manage a process's keyrings\n *\n * Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Fr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Manage a process's keyrings\n *\n * Copyright (C) 2004-2005, 2008 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Fr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Request a key from userspace\n *\n * Copyright (C) 2004-2007 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free So...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Request a key from userspace\n *\n * Copyright (C) 2004-2007 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published by the Free So...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Request key authorisation token key definition.\n *\n * Copyright (C) 2005 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836
Determine whether the {function_name} code is vulnerable or not.
[ "/* Request key authorisation token key definition.\n *\n * Copyright (C) 2005 Red Hat, Inc. All Rights Reserved.\n * Written by David Howells (dhowells@redhat.com)\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU General Public License\n * as published ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [367, 228, 283, 858, 155, 991, 905, 603, 250, 734, 602, 77, 1070, 166], "buggy_code_start_loc": [138, 227, 250, 857, 131, 404, 769, 417, 184, 733, 598, 76, 1069, 117], "filenames": ["include/linux/key.h", "net/dns_resolver/dns_key.c", "security/keys/big_key.c", "security/keys/encrypted-keys/encry...
836