prompt
stringclasses
1 value
completions
listlengths
1
63.8k
labels
listlengths
1
63.8k
source
stringclasses
1 value
other_info
stringlengths
2.06k
101k
index
int64
0
6.83k
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 0, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 0, 1, 0, 0, 0, 1, 0, 1, 1, 0, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<project xmlns=\"http://maven.apache.org/POM/4.0.0\"\n xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n xsi:schemaLocation=\"http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd\">\n <modelVersion>4.0.0</modelVersion>\...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<project xmlns=\"http://maven.apache.org/POM/4.0.0\"\n xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n xsi:schemaLocation=\"http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd\">\n <modelVersion>4.0.0</modelVersion>\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4...
72
Determine whether the {function_name} code is vulnerable or not.
[ "// +build linux", "package chroot", "import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"syscall\"\n\t\"time\"\n\t\"unsafe\"", "\t\"github.com/containers/buildah/bind\"\n\t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w...
73
Determine whether the {function_name} code is vulnerable or not.
[ "// +build linux", "package chroot", "import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"syscall\"\n\t\"time\"\n\t\"unsafe\"", "\t\"github.com/containers/buildah/bind\"\n\t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w...
73
Determine whether the {function_name} code is vulnerable or not.
[ "//go:build linux\n// +build linux", "package buildah", "import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"net\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"sync/atomic\"\n\t\"syscall\"\n\t\"time\"", "\t\"githu...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w...
73
Determine whether the {function_name} code is vulnerable or not.
[ "//go:build linux\n// +build linux", "package buildah", "import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"net\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"sync/atomic\"\n\t\"syscall\"\n\t\"time\"", "\t\"githu...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w...
73
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform...
74
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.", "Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at", " http://www.apache.org/licenses/LICENSE-2.0", "Unless required b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform...
74
Determine whether the {function_name} code is vulnerable or not.
[ "# Copyright 2018 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform...
74
Determine whether the {function_name} code is vulnerable or not.
[ "# Copyright 2018 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform...
74
Determine whether the {function_name} code is vulnerable or not.
[ "module github.com/containers/image/v5", "go 1.11", "require (\n\tgithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774 // indirect\n\tgithub.com/BurntSushi/toml v0.3.1\n\tgithub.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b\n\tgithub.com/containers/ocicrypt v0.0.0-20190930154801-b87a4a6...
[ 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by...
75
Determine whether the {function_name} code is vulnerable or not.
[ "module github.com/containers/image/v5", "go 1.11", "require (\n\tgithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774 // indirect\n\tgithub.com/BurntSushi/toml v0.3.1\n\tgithub.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b\n\tgithub.com/containers/ocicrypt v0.0.0-20190930154801-b87a4a6...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by...
75
Determine whether the {function_name} code is vulnerable or not.
[ "cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=\ngithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774/go.mod h1:6/0dYRLLXyJjbkIPeeGyoJ/eKOSI0eU6eTlCBYibgd0=\ngithub.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=\ngithub.com/BurntSushi/toml ...
[ 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by...
75
Determine whether the {function_name} code is vulnerable or not.
[ "cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=\ngithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774/go.mod h1:6/0dYRLLXyJjbkIPeeGyoJ/eKOSI0eU6eTlCBYibgd0=\ngithub.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=\ngithub.com/BurntSushi/toml ...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by...
75
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * main.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012, 2017, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs (...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * main.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012, 2017, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs (...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * main.h \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008, 2009, 2010, 2012, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs ...
[ 1, 1, 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * main.h \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008, 2009, 2010, 2012, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs ...
[ 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * pdf.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012-2013, 2017-19, Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/******************************************************************************\n * pdf.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012-2013, 2017-19, Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert...
76
Determine whether the {function_name} code is vulnerable or not.
[ "/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n * general function, usually for data manipulation pages\n *\n */", "/**\n * @var sql_box_locked lock for the sqlbox textarea in the querybox/querywindow\n */\nvar sql_box_locked = false;", "/**\n * @var array holds elements which content should only selected onc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy...
77
Determine whether the {function_name} code is vulnerable or not.
[ "/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n * general function, usually for data manipulation pages\n *\n */", "/**\n * @var sql_box_locked lock for the sqlbox textarea in the querybox/querywindow\n */\nvar sql_box_locked = false;", "/**\n * @var array holds elements which content should only selected onc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy...
77
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n *\n * @package PhpMyAdmin\n */\nif (! defined('PHPMYADMIN')) {\n exit;\n}", "/**\n *\n */\nif (isset($_REQUEST['GLOBALS']) || isset($_FILES['GLOBALS'])) {\n die(__(\"GLOBALS overwrite attempt\"));\n}", "/**\n * Sends http headers\n */\n$GLOBALS['now...
[ 1, 1, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy...
77
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n *\n * @package PhpMyAdmin\n */\nif (! defined('PHPMYADMIN')) {\n exit;\n}", "/**\n *\n */\nif (isset($_REQUEST['GLOBALS']) || isset($_FILES['GLOBALS'])) {\n die(__(\"GLOBALS overwrite attempt\"));\n}", "/**\n * Sends http headers\n */\n$GLOBALS['now...
[ 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy...
77
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * Module dependencies.\n */", "var debug = require('debug')('socket.io-parser');\nvar Emitter = require('component-emitter');\nvar binary = require('./binary');\nvar isArray = require('isarray');\nvar isBuf = require('./is-buffer');", "/**\n * Protocol version.\n *\n * @api public\n */", "exports.proto...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1...
PreciseBugs
{"buggy_code_end_loc": [327], "buggy_code_start_loc": [289], "filenames": ["index.js"], "fixing_code_end_loc": [324], "fixing_code_start_loc": [289], "message": "socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used."...
78
Determine whether the {function_name} code is vulnerable or not.
[ "/**\n * Module dependencies.\n */", "var debug = require('debug')('socket.io-parser');\nvar Emitter = require('component-emitter');\nvar binary = require('./binary');\nvar isArray = require('isarray');\nvar isBuf = require('./is-buffer');", "/**\n * Protocol version.\n *\n * @api public\n */", "exports.proto...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [327], "buggy_code_start_loc": [289], "filenames": ["index.js"], "fixing_code_end_loc": [324], "fixing_code_start_loc": [289], "message": "socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used."...
78
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h...
79
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0+\n/*\n * composite.c - infrastructure for Composite USB Gadgets\n *\n * Copyright (C) 2006-2008 David Brownell\n */", "/* #define VERBOSE_DEBUG */", "#include <linux/kallsyms.h>\n#include <linux/kernel.h>\n#include <linux/slab.h>\n#include <linux/module.h>\n#include <linux/d...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1990], "buggy_code_start_loc": [1990], "filenames": ["drivers/usb/gadget/composite.c"], "fixing_code_end_loc": [1994], "fixing_code_start_loc": [1991], "message": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain...
80
Determine whether the {function_name} code is vulnerable or not.
[ "// SPDX-License-Identifier: GPL-2.0+\n/*\n * composite.c - infrastructure for Composite USB Gadgets\n *\n * Copyright (C) 2006-2008 David Brownell\n */", "/* #define VERBOSE_DEBUG */", "#include <linux/kallsyms.h>\n#include <linux/kernel.h>\n#include <linux/slab.h>\n#include <linux/module.h>\n#include <linux/d...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1990], "buggy_code_start_loc": [1990], "filenames": ["drivers/usb/gadget/composite.c"], "fixing_code_end_loc": [1994], "fixing_code_start_loc": [1991], "message": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain...
80
Determine whether the {function_name} code is vulnerable or not.
[ "/* mqtt_client.c\n *\n * Copyright (C) 2006-2021 wolfSSL Inc.\n *\n * This file is part of wolfMQTT.\n *\n * wolfMQTT is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [911], "buggy_code_start_loc": [909], "filenames": ["src/mqtt_client.c"], "fixing_code_end_loc": [912], "fixing_code_start_loc": [909], "message": "wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacke...
81
Determine whether the {function_name} code is vulnerable or not.
[ "/* mqtt_client.c\n *\n * Copyright (C) 2006-2021 wolfSSL Inc.\n *\n * This file is part of wolfMQTT.\n *\n * wolfMQTT is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, o...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [911], "buggy_code_start_loc": [909], "filenames": ["src/mqtt_client.c"], "fixing_code_end_loc": [912], "fixing_code_start_loc": [909], "message": "wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacke...
81
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n# Copyright 2003-2015 Opmantek Limited (www.opmantek.com)\n#\n# ALL CODE MODIFICATIONS MUST BE SENT TO CODE@OPMANTEK.COM\n#\n# This file is part of Open-AudIT.\n#\n# Open-AudIT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU Affero General Public License as...
[ 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [72], "buggy_code_start_loc": [72], "filenames": ["code_igniter/application/controllers/util.php"], "fixing_code_end_loc": [89], "fixing_code_start_loc": [73], "message": "An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/applicati...
82
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n# Copyright 2003-2015 Opmantek Limited (www.opmantek.com)\n#\n# ALL CODE MODIFICATIONS MUST BE SENT TO CODE@OPMANTEK.COM\n#\n# This file is part of Open-AudIT.\n#\n# Open-AudIT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU Affero General Public License as...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [72], "buggy_code_start_loc": [72], "filenames": ["code_igniter/application/controllers/util.php"], "fixing_code_end_loc": [89], "fixing_code_start_loc": [73], "message": "An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/applicati...
82
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2022 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [114], "buggy_code_start_loc": [110], "filenames": ["ajax/common.tabs.php"], "fixing_code_end_loc": [109], "fixing_code_start_loc": [109], "message": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Versio...
83
Determine whether the {function_name} code is vulnerable or not.
[ "<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2022 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [114], "buggy_code_start_loc": [110], "filenames": ["ajax/common.tabs.php"], "fixing_code_end_loc": [109], "fixing_code_start_loc": [109], "message": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Versio...
83
Determine whether the {function_name} code is vulnerable or not.
[ "package rundeck.controllers", "import com.dtolabs.rundeck.app.api.plugins.ApiPluginListProvider\nimport com.dtolabs.rundeck.app.support.PluginResourceReq\nimport com.dtolabs.rundeck.core.authorization.AuthContext\nimport com.dtolabs.rundeck.core.config.Features\nimport com.dtolabs.rundeck.core.plugins.configurat...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "package rundeck.controllers", "import com.dtolabs.rundeck.app.api.plugins.ApiPluginListProvider\nimport com.dtolabs.rundeck.app.support.PluginResourceReq\nimport com.dtolabs.rundeck.core.authorization.AuthContext\nimport com.dtolabs.rundeck.core.config.Features\nimport com.dtolabs.rundeck.core.plugins.configurat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\">Plugin URL</span>\n <input\n style=\"border: 1px solid #d6d7d6;background: #fff; border-right:0; padding-left:1em;\"\n type=\"text\"\n cl...
[ 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1 ]
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\">Plugin URL</span>\n <input\n style=\"border: 1px solid #d6d7d6;background: #fff; border-right:0; padding-left:1em;\"\n type=\"text\"\n cl...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\" id=\"sizing-addon1\">Choose a file</span>", " <span class=\"control-fileupload\">\n <span class=\"label\">{{fileName}}</span>\n <input\n ...
[ 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\" id=\"sizing-addon1\">Choose a file</span>", " <span class=\"control-fileupload\">\n <span class=\"label\">{{fileName}}</span>\n <input\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "package rundeck.controllers", "import com.dtolabs.rundeck.core.authorization.AuthContextProvider\nimport com.dtolabs.rundeck.core.common.Framework\nimport com.dtolabs.rundeck.core.common.IFramework\nimport com.dtolabs.rundeck.core.config.FeatureService\nimport com.dtolabs.rundeck.core.plugins.PluginMetadata\nimp...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 0, 0, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1, 0...
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "package rundeck.controllers", "import com.dtolabs.rundeck.core.authorization.AuthContextProvider\nimport com.dtolabs.rundeck.core.common.Framework\nimport com.dtolabs.rundeck.core.common.IFramework\nimport com.dtolabs.rundeck.core.config.FeatureService\nimport com.dtolabs.rundeck.core.plugins.PluginMetadata\nimp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re...
84
Determine whether the {function_name} code is vulnerable or not.
[ "Sup's Hook System\n-----------------", "Sup can be easily customized via its hook system, which allows custom\nuser code to be injected into Sup's execution path by \"hooking\" the\ncode onto pre-defined events. When those events occur, the code is\nexecuted.", "To see which hooks are available, simply run sup...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell...
85
Determine whether the {function_name} code is vulnerable or not.
[ "Sup's Hook System\n-----------------", "Sup can be easily customized via its hook system, which allows custom\nuser code to be injected into Sup's execution path by \"hooking\" the\ncode onto pre-defined events. When those events occur, the code is\nexecuted.", "To see which hooks are available, simply run sup...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell...
85
Determine whether the {function_name} code is vulnerable or not.
[ "require 'tempfile'\nrequire 'rbconfig'\nrequire 'shellwords'", "## Here we define all the \"chunks\" that a message is parsed\n## into. Chunks are used by ThreadViewMode to render a message. Chunks\n## are used for both MIME stuff like attachments, for Sup's parsing of\n## the message body into text, quote, and ...
[ 1, 1, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell...
85
Determine whether the {function_name} code is vulnerable or not.
[ "require 'tempfile'\nrequire 'rbconfig'\nrequire 'shellwords'", "## Here we define all the \"chunks\" that a message is parsed\n## into. Chunks are used by ThreadViewMode to render a message. Chunks\n## are used for both MIME stuff like attachments, for Sup's parsing of\n## the message body into text, quote, and ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
PreciseBugs
{"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell...
85
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare - LGPL - Copyright 2009-2018 - pancake, maijin */", "#include \"r_util.h\"\n#include \"r_core.h\"\n#include \"r_anal.h\"", "static const char *help_msg_a[] = {\n\t\"Usage:\", \"a\", \"[abdefFghoprxstc] [...]\",\n\t\"aa\", \"[?]\", \"analyze all (fcns + bbs) (aa0 to avoid sub renaming)\",\n\t\"a8\", \...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1580], "buggy_code_start_loc": [1571], "filenames": ["libr/core/cmd_anal.c"], "fixing_code_end_loc": [1587], "fixing_code_start_loc": [1571], "message": "In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by ...
86
Determine whether the {function_name} code is vulnerable or not.
[ "/* radare - LGPL - Copyright 2009-2018 - pancake, maijin */", "#include \"r_util.h\"\n#include \"r_core.h\"\n#include \"r_anal.h\"", "static const char *help_msg_a[] = {\n\t\"Usage:\", \"a\", \"[abdefFghoprxstc] [...]\",\n\t\"aa\", \"[?]\", \"analyze all (fcns + bbs) (aa0 to avoid sub renaming)\",\n\t\"a8\", \...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1580], "buggy_code_start_loc": [1571], "filenames": ["libr/core/cmd_anal.c"], "fixing_code_end_loc": [1587], "fixing_code_start_loc": [1571], "message": "In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by ...
86
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2009-2012, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the followin...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2009-2012, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the followin...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {tags {\"hash\"}} {\n test {HSET/HLEN - Small hash creation} {\n array set smallhash {}\n for {set i 0} {$i < 8} {incr i} {\n set key __avoid_collisions__[randstring 0 8 alpha]\n set val __avoid_collisions__[randstring 0 8 alpha]\n if {[info exists sma...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {tags {\"hash\"}} {\n test {HSET/HLEN - Small hash creation} {\n array set smallhash {}\n for {set i 0} {$i < 8} {incr i} {\n set key __avoid_collisions__[randstring 0 8 alpha]\n set val __avoid_collisions__[randstring 0 8 alpha]\n if {[info exists sma...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {\n tags {\"set\"}\n overrides {\n \"set-max-intset-entries\" 512\n }\n} {\n proc create_set {key entries} {\n r del $key\n foreach entry $entries { r sadd $key $entry }\n }", " test {SADD, SCARD, SISMEMBER, SMISMEMBER, SMEMBERS basics - regular set} {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {\n tags {\"set\"}\n overrides {\n \"set-max-intset-entries\" 512\n }\n} {\n proc create_set {key entries} {\n r del $key\n foreach entry $entries { r sadd $key $entry }\n }", " test {SADD, SCARD, SISMEMBER, SMISMEMBER, SMEMBERS basics - regular set} {\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {tags {\"zset\"}} {\n proc create_zset {key items} {\n r del $key\n foreach {score entry} $items {\n r zadd $key $score $entry\n }\n }", " # A helper function to verify either ZPOP* or ZMPOP* response.\n proc verify_pop_response {pop res zpop_expected_resp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87
Determine whether the {function_name} code is vulnerable or not.
[ "start_server {tags {\"zset\"}} {\n proc create_zset {key items} {\n r del $key\n foreach {score entry} $items {\n r zadd $key $score $entry\n }\n }", " # A helper function to verify either ZPOP* or ZMPOP* response.\n proc verify_pop_response {pop res zpop_expected_resp...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
PreciseBugs
{"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi...
87