prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
0,
0,
1,
0,
1,
1,
0,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2019-2021 GeyserMC. http://geysermc.org\n *\n * Permission is hereby granted, free of charge, to any person obtaining a copy\n * of this software and associated documentation files (the \"Software\"), to deal\n * in the Software without restriction, including without limitation the rights\n * ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<project xmlns=\"http://maven.apache.org/POM/4.0.0\"\n xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n xsi:schemaLocation=\"http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd\">\n <modelVersion>4.0.0</modelVersion>\... | [
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<project xmlns=\"http://maven.apache.org/POM/4.0.0\"\n xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n xsi:schemaLocation=\"http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd\">\n <modelVersion>4.0.0</modelVersion>\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [52, 14, 18, 38, 25, 18, 18, 18, 10, 119, 84, 33, 116, 42, 43, 43, 44, 53, 42, 44, 42, 39, 46, 45, 74, 48, 43, 49, 42, 46, 44, 49, 38, 50, 46, 44, 42, 41, 41, 41, 47, 58, 44, 50, 57, 41, 42, 40, 41, 46, 39, 40, 100, 75, 38, 40, 39, 56, 42, 39, 39, 42, 40, 45, 47, 39, 44, 44, 46, 48, 41, 43, 39, 4... | 72 |
Determine whether the {function_name} code is vulnerable or not. | [
"// +build linux",
"package chroot",
"import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"syscall\"\n\t\"time\"\n\t\"unsafe\"",
"\t\"github.com/containers/buildah/bind\"\n\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w... | 73 |
Determine whether the {function_name} code is vulnerable or not. | [
"// +build linux",
"package chroot",
"import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"syscall\"\n\t\"time\"\n\t\"unsafe\"",
"\t\"github.com/containers/buildah/bind\"\n\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w... | 73 |
Determine whether the {function_name} code is vulnerable or not. | [
"//go:build linux\n// +build linux",
"package buildah",
"import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"net\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"sync/atomic\"\n\t\"syscall\"\n\t\"time\"",
"\t\"githu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w... | 73 |
Determine whether the {function_name} code is vulnerable or not. | [
"//go:build linux\n// +build linux",
"package buildah",
"import (\n\t\"bytes\"\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"io\"\n\t\"io/ioutil\"\n\t\"net\"\n\t\"os\"\n\t\"os/exec\"\n\t\"path/filepath\"\n\t\"runtime\"\n\t\"strconv\"\n\t\"strings\"\n\t\"sync\"\n\t\"sync/atomic\"\n\t\"syscall\"\n\t\"time\"",
"\t\"githu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [901, 1990], "buggy_code_start_loc": [900, 1967], "filenames": ["chroot/run.go", "run_linux.go"], "fixing_code_end_loc": [901, 1983], "fixing_code_start_loc": [900, 1966], "message": "A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug w... | 73 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform... | 74 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform... | 74 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2018 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform... | 74 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2018 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [400, 1516], "buggy_code_start_loc": [398, 1516], "filenames": ["tensorflow/core/kernels/list_kernels.h", "tensorflow/python/kernel_tests/data_structures/list_ops_test.py"], "fixing_code_end_loc": [403, 1526], "fixing_code_start_loc": [398, 1517], "message": "TensorFlow is an open source platform... | 74 |
Determine whether the {function_name} code is vulnerable or not. | [
"module github.com/containers/image/v5",
"go 1.11",
"require (\n\tgithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774 // indirect\n\tgithub.com/BurntSushi/toml v0.3.1\n\tgithub.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b\n\tgithub.com/containers/ocicrypt v0.0.0-20190930154801-b87a4a6... | [
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by... | 75 |
Determine whether the {function_name} code is vulnerable or not. | [
"module github.com/containers/image/v5",
"go 1.11",
"require (\n\tgithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774 // indirect\n\tgithub.com/BurntSushi/toml v0.3.1\n\tgithub.com/containers/libtrust v0.0.0-20190913040956-14b96171aa3b\n\tgithub.com/containers/ocicrypt v0.0.0-20190930154801-b87a4a6... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by... | 75 |
Determine whether the {function_name} code is vulnerable or not. | [
"cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=\ngithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774/go.mod h1:6/0dYRLLXyJjbkIPeeGyoJ/eKOSI0eU6eTlCBYibgd0=\ngithub.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=\ngithub.com/BurntSushi/toml ... | [
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by... | 75 |
Determine whether the {function_name} code is vulnerable or not. | [
"cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=\ngithub.com/14rcole/gopopulate v0.0.0-20180821133914-b175b219e774/go.mod h1:6/0dYRLLXyJjbkIPeeGyoJ/eKOSI0eU6eTlCBYibgd0=\ngithub.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=\ngithub.com/BurntSushi/toml ... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [28, 222], "buggy_code_start_loc": [27, 117], "filenames": ["go.mod", "go.sum"], "fixing_code_end_loc": [28, 228], "fixing_code_start_loc": [27, 118], "message": "The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by... | 75 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * main.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012, 2017, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs (... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * main.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012, 2017, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs (... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * main.h \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008, 2009, 2010, 2012, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs ... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * main.h \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008, 2009, 2010, 2012, 2019 Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs ... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * pdf.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012-2013, 2017-19, Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/******************************************************************************\n * pdf.c \n *\n * pdfresurrect - PDF history extraction tool\n *\n * Copyright (C) 2008-2010, 2012-2013, 2017-19, Matt Davis (enferex).\n *\n * Special thanks to all of the contributors: See AUTHORS.\n *\n * Special thanks to 757labs... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [299, 42, 1318], "buggy_code_start_loc": [75, 42, 125], "filenames": ["main.c", "main.h", "pdf.c"], "fixing_code_end_loc": [316, 45, 1311], "fixing_code_start_loc": [75, 43, 125], "message": "An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a cert... | 76 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n * general function, usually for data manipulation pages\n *\n */",
"/**\n * @var sql_box_locked lock for the sqlbox textarea in the querybox/querywindow\n */\nvar sql_box_locked = false;",
"/**\n * @var array holds elements which content should only selected onc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy... | 77 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n * general function, usually for data manipulation pages\n *\n */",
"/**\n * @var sql_box_locked lock for the sqlbox textarea in the querybox/querywindow\n */\nvar sql_box_locked = false;",
"/**\n * @var array holds elements which content should only selected onc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy... | 77 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n *\n * @package PhpMyAdmin\n */\nif (! defined('PHPMYADMIN')) {\n exit;\n}",
"/**\n *\n */\nif (isset($_REQUEST['GLOBALS']) || isset($_FILES['GLOBALS'])) {\n die(__(\"GLOBALS overwrite attempt\"));\n}",
"/**\n * Sends http headers\n */\n$GLOBALS['now... | [
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy... | 77 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/* vim: set expandtab sw=4 ts=4 sts=4: */\n/**\n *\n * @package PhpMyAdmin\n */\nif (! defined('PHPMYADMIN')) {\n exit;\n}",
"/**\n *\n */\nif (isset($_REQUEST['GLOBALS']) || isset($_FILES['GLOBALS'])) {\n die(__(\"GLOBALS overwrite attempt\"));\n}",
"/**\n * Sends http headers\n */\n$GLOBALS['now... | [
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [3222, 26], "buggy_code_start_loc": [131, 25], "filenames": ["js/functions.js", "libraries/header_http.inc.php"], "fixing_code_end_loc": [3222, 26], "fixing_code_start_loc": [131, 25], "message": "phpMyAdmin 3.5.x before 3.5.3 uses JavaScript code that is obtained through an HTTP session to phpmy... | 77 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * Module dependencies.\n */",
"var debug = require('debug')('socket.io-parser');\nvar Emitter = require('component-emitter');\nvar binary = require('./binary');\nvar isArray = require('isarray');\nvar isBuf = require('./is-buffer');",
"/**\n * Protocol version.\n *\n * @api public\n */",
"exports.proto... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [327], "buggy_code_start_loc": [289], "filenames": ["index.js"], "fixing_code_end_loc": [324], "fixing_code_start_loc": [289], "message": "socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used."... | 78 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * Module dependencies.\n */",
"var debug = require('debug')('socket.io-parser');\nvar Emitter = require('component-emitter');\nvar binary = require('./binary');\nvar isArray = require('isarray');\nvar isBuf = require('./is-buffer');",
"/**\n * Protocol version.\n *\n * @api public\n */",
"exports.proto... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [327], "buggy_code_start_loc": [289], "filenames": ["index.js"], "fixing_code_end_loc": [324], "fixing_code_start_loc": [289], "message": "socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used."... | 78 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2011-2014 Autronica Fire and Security AS\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms of the GNU General Public License as published by the Free\n * Software Foundation; either version 2 of the License, or (at your option)\n * any later version.\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [508, 126, 18], "buggy_code_start_loc": [489, 126, 18], "filenames": ["net/hsr/hsr_device.c", "net/hsr/hsr_framereg.c", "net/hsr/hsr_framereg.h"], "fixing_code_end_loc": [511, 139, 20], "fixing_code_start_loc": [489, 127, 19], "message": "In the Linux kernel before 5.0.3, a memory leak exits in h... | 79 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0+\n/*\n * composite.c - infrastructure for Composite USB Gadgets\n *\n * Copyright (C) 2006-2008 David Brownell\n */",
"/* #define VERBOSE_DEBUG */",
"#include <linux/kallsyms.h>\n#include <linux/kernel.h>\n#include <linux/slab.h>\n#include <linux/module.h>\n#include <linux/d... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1990], "buggy_code_start_loc": [1990], "filenames": ["drivers/usb/gadget/composite.c"], "fixing_code_end_loc": [1994], "fixing_code_start_loc": [1991], "message": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain... | 80 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0+\n/*\n * composite.c - infrastructure for Composite USB Gadgets\n *\n * Copyright (C) 2006-2008 David Brownell\n */",
"/* #define VERBOSE_DEBUG */",
"#include <linux/kallsyms.h>\n#include <linux/kernel.h>\n#include <linux/slab.h>\n#include <linux/module.h>\n#include <linux/d... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1990], "buggy_code_start_loc": [1990], "filenames": ["drivers/usb/gadget/composite.c"], "fixing_code_end_loc": [1994], "fixing_code_start_loc": [1991], "message": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain... | 80 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* mqtt_client.c\n *\n * Copyright (C) 2006-2021 wolfSSL Inc.\n *\n * This file is part of wolfMQTT.\n *\n * wolfMQTT is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, o... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [911], "buggy_code_start_loc": [909], "filenames": ["src/mqtt_client.c"], "fixing_code_end_loc": [912], "fixing_code_start_loc": [909], "message": "wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacke... | 81 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* mqtt_client.c\n *\n * Copyright (C) 2006-2021 wolfSSL Inc.\n *\n * This file is part of wolfMQTT.\n *\n * wolfMQTT is free software; you can redistribute it and/or modify\n * it under the terms of the GNU General Public License as published by\n * the Free Software Foundation; either version 2 of the License, o... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [911], "buggy_code_start_loc": [909], "filenames": ["src/mqtt_client.c"], "fixing_code_end_loc": [912], "fixing_code_start_loc": [909], "message": "wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacke... | 81 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n# Copyright 2003-2015 Opmantek Limited (www.opmantek.com)\n#\n# ALL CODE MODIFICATIONS MUST BE SENT TO CODE@OPMANTEK.COM\n#\n# This file is part of Open-AudIT.\n#\n# Open-AudIT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU Affero General Public License as... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [72], "buggy_code_start_loc": [72], "filenames": ["code_igniter/application/controllers/util.php"], "fixing_code_end_loc": [89], "fixing_code_start_loc": [73], "message": "An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/applicati... | 82 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n# Copyright 2003-2015 Opmantek Limited (www.opmantek.com)\n#\n# ALL CODE MODIFICATIONS MUST BE SENT TO CODE@OPMANTEK.COM\n#\n# This file is part of Open-AudIT.\n#\n# Open-AudIT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU Affero General Public License as... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [72], "buggy_code_start_loc": [72], "filenames": ["code_igniter/application/controllers/util.php"], "fixing_code_end_loc": [89], "fixing_code_start_loc": [73], "message": "An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/applicati... | 82 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2022 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [114], "buggy_code_start_loc": [110], "filenames": ["ajax/common.tabs.php"], "fixing_code_end_loc": [109], "fixing_code_start_loc": [109], "message": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Versio... | 83 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * ---------------------------------------------------------------------\n * GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2015-2022 Teclib' and contributors.\n *\n * http://glpi-project.org\n *\n * based on GLPI - Gestionnaire Libre de Parc Informatique\n * Copyright (C) 2003-2014 b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [114], "buggy_code_start_loc": [110], "filenames": ["ajax/common.tabs.php"], "fixing_code_end_loc": [109], "fixing_code_start_loc": [109], "message": "GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Versio... | 83 |
Determine whether the {function_name} code is vulnerable or not. | [
"package rundeck.controllers",
"import com.dtolabs.rundeck.app.api.plugins.ApiPluginListProvider\nimport com.dtolabs.rundeck.app.support.PluginResourceReq\nimport com.dtolabs.rundeck.core.authorization.AuthContext\nimport com.dtolabs.rundeck.core.config.Features\nimport com.dtolabs.rundeck.core.plugins.configurat... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"package rundeck.controllers",
"import com.dtolabs.rundeck.app.api.plugins.ApiPluginListProvider\nimport com.dtolabs.rundeck.app.support.PluginResourceReq\nimport com.dtolabs.rundeck.core.authorization.AuthContext\nimport com.dtolabs.rundeck.core.config.Features\nimport com.dtolabs.rundeck.core.plugins.configurat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\">Plugin URL</span>\n <input\n style=\"border: 1px solid #d6d7d6;background: #fff; border-right:0; padding-left:1em;\"\n type=\"text\"\n cl... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\">Plugin URL</span>\n <input\n style=\"border: 1px solid #d6d7d6;background: #fff; border-right:0; padding-left:1em;\"\n type=\"text\"\n cl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\" id=\"sizing-addon1\">Choose a file</span>",
" <span class=\"control-fileupload\">\n <span class=\"label\">{{fileName}}</span>\n <input\n ... | [
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"<template>\n <div>\n <div class=\"col-xs-12\">\n <div class=\"input-group input-group-lg\">\n <span class=\"input-group-addon\" id=\"sizing-addon1\">Choose a file</span>",
" <span class=\"control-fileupload\">\n <span class=\"label\">{{fileName}}</span>\n <input\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"package rundeck.controllers",
"import com.dtolabs.rundeck.core.authorization.AuthContextProvider\nimport com.dtolabs.rundeck.core.common.Framework\nimport com.dtolabs.rundeck.core.common.IFramework\nimport com.dtolabs.rundeck.core.config.FeatureService\nimport com.dtolabs.rundeck.core.plugins.PluginMetadata\nimp... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
0,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1,
0... | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"package rundeck.controllers",
"import com.dtolabs.rundeck.core.authorization.AuthContextProvider\nimport com.dtolabs.rundeck.core.common.Framework\nimport com.dtolabs.rundeck.core.common.IFramework\nimport com.dtolabs.rundeck.core.config.FeatureService\nimport com.dtolabs.rundeck.core.plugins.PluginMetadata\nimp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [461, 55, 76, 434], "buggy_code_start_loc": [15, 21, 29, 20], "filenames": ["rundeckapp/grails-app/controllers/rundeck/controllers/PluginController.groovy", "rundeckapp/grails-spa/packages/ui/src/pages/repository/components/PluginURLUploadForm.vue", "rundeckapp/grails-spa/packages/ui/src/pages/re... | 84 |
Determine whether the {function_name} code is vulnerable or not. | [
"Sup's Hook System\n-----------------",
"Sup can be easily customized via its hook system, which allows custom\nuser code to be injected into Sup's execution path by \"hooking\" the\ncode onto pre-defined events. When those events occur, the code is\nexecuted.",
"To see which hooks are available, simply run sup... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell... | 85 |
Determine whether the {function_name} code is vulnerable or not. | [
"Sup's Hook System\n-----------------",
"Sup can be easily customized via its hook system, which allows custom\nuser code to be injected into Sup's execution path by \"hooking\" the\ncode onto pre-defined events. When those events occur, the code is\nexecuted.",
"To see which hooks are available, simply run sup... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell... | 85 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'tempfile'\nrequire 'rbconfig'\nrequire 'shellwords'",
"## Here we define all the \"chunks\" that a message is parsed\n## into. Chunks are used by ThreadViewMode to render a message. Chunks\n## are used for both MIME stuff like attachments, for Sup's parsing of\n## the message body into text, quote, and ... | [
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell... | 85 |
Determine whether the {function_name} code is vulnerable or not. | [
"require 'tempfile'\nrequire 'rbconfig'\nrequire 'shellwords'",
"## Here we define all the \"chunks\" that a message is parsed\n## into. Chunks are used by ThreadViewMode to render a message. Chunks\n## are used for both MIME stuff like attachments, for Sup's parsing of\n## the message body into text, quote, and ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [57, 247], "buggy_code_start_loc": [52, 62], "filenames": ["doc/Hooks.txt", "lib/sup/message_chunks.rb"], "fixing_code_end_loc": [58, 262], "fixing_code_start_loc": [53, 63], "message": "Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell... | 85 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* radare - LGPL - Copyright 2009-2018 - pancake, maijin */",
"#include \"r_util.h\"\n#include \"r_core.h\"\n#include \"r_anal.h\"",
"static const char *help_msg_a[] = {\n\t\"Usage:\", \"a\", \"[abdefFghoprxstc] [...]\",\n\t\"aa\", \"[?]\", \"analyze all (fcns + bbs) (aa0 to avoid sub renaming)\",\n\t\"a8\", \... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1580], "buggy_code_start_loc": [1571], "filenames": ["libr/core/cmd_anal.c"], "fixing_code_end_loc": [1587], "fixing_code_start_loc": [1571], "message": "In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by ... | 86 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* radare - LGPL - Copyright 2009-2018 - pancake, maijin */",
"#include \"r_util.h\"\n#include \"r_core.h\"\n#include \"r_anal.h\"",
"static const char *help_msg_a[] = {\n\t\"Usage:\", \"a\", \"[abdefFghoprxstc] [...]\",\n\t\"aa\", \"[?]\", \"analyze all (fcns + bbs) (aa0 to avoid sub renaming)\",\n\t\"a8\", \... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1580], "buggy_code_start_loc": [1571], "filenames": ["libr/core/cmd_anal.c"], "fixing_code_end_loc": [1587], "fixing_code_start_loc": [1571], "message": "In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by ... | 86 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the following conditions are met:\n *\n * * Redistributions of source code must retain ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2009-2012, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the followin... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2009-2012, Salvatore Sanfilippo <antirez at gmail dot com>\n * Copyright (c) 2009-2012, Pieter Noordhuis <pcnoordhuis at gmail dot com>\n * All rights reserved.\n *\n * Redistribution and use in source and binary forms, with or without\n * modification, are permitted provided that the followin... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {tags {\"hash\"}} {\n test {HSET/HLEN - Small hash creation} {\n array set smallhash {}\n for {set i 0} {$i < 8} {incr i} {\n set key __avoid_collisions__[randstring 0 8 alpha]\n set val __avoid_collisions__[randstring 0 8 alpha]\n if {[info exists sma... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {tags {\"hash\"}} {\n test {HSET/HLEN - Small hash creation} {\n array set smallhash {}\n for {set i 0} {$i < 8} {incr i} {\n set key __avoid_collisions__[randstring 0 8 alpha]\n set val __avoid_collisions__[randstring 0 8 alpha]\n if {[info exists sma... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {\n tags {\"set\"}\n overrides {\n \"set-max-intset-entries\" 512\n }\n} {\n proc create_set {key entries} {\n r del $key\n foreach entry $entries { r sadd $key $entry }\n }",
" test {SADD, SCARD, SISMEMBER, SMISMEMBER, SMEMBERS basics - regular set} {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {\n tags {\"set\"}\n overrides {\n \"set-max-intset-entries\" 512\n }\n} {\n proc create_set {key entries} {\n r del $key\n foreach entry $entries { r sadd $key $entry }\n }",
" test {SADD, SCARD, SISMEMBER, SMISMEMBER, SMEMBERS basics - regular set} {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {tags {\"zset\"}} {\n proc create_zset {key items} {\n r del $key\n foreach {score entry} $items {\n r zadd $key $score $entry\n }\n }",
" # A helper function to verify either ZPOP* or ZMPOP* response.\n proc verify_pop_response {pop res zpop_expected_resp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Determine whether the {function_name} code is vulnerable or not. | [
"start_server {tags {\"zset\"}} {\n proc create_zset {key items} {\n r del $key\n foreach {score entry} $items {\n r zadd $key $score $entry\n }\n }",
" # A helper function to verify either ZPOP* or ZMPOP* response.\n proc verify_pop_response {pop res zpop_expected_resp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1130, 669, 4299, 76, 645, 2305], "buggy_code_start_loc": [1123, 668, 4292, 76, 645, 2305], "filenames": ["src/t_hash.c", "src/t_set.c", "src/t_zset.c", "tests/unit/type/hash.tcl", "tests/unit/type/set.tcl", "tests/unit/type/zset.tcl"], "fixing_code_end_loc": [1130, 669, 4299, 79, 651, 2308], "fi... | 87 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.