prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * af_llc.c - LLC User Interface SAPs\n * Description:\n * Functions in this module are implementation of socket based llc\n * communications for the Linux operating system. Support of llc class\n * one and class two is provided via SOCK_DGRAM and SOCK_STREAM\n * respectively.\n *\n * An llc2 connect... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [410], "buggy_code_start_loc": [313], "filenames": ["net/llc/af_llc.c"], "fixing_code_end_loc": [419], "fixing_code_start_loc": [314], "message": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": nul... | 88 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * af_llc.c - LLC User Interface SAPs\n * Description:\n * Functions in this module are implementation of socket based llc\n * communications for the Linux operating system. Support of llc class\n * one and class two is provided via SOCK_DGRAM and SOCK_STREAM\n * respectively.\n *\n * An llc2 connect... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [410], "buggy_code_start_loc": [313], "filenames": ["net/llc/af_llc.c"], "fixing_code_end_loc": [419], "fixing_code_start_loc": [314], "message": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", "other": {"cve": {"cisaActionDue": null, "cisaExploitAdd": nul... | 88 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Query API: WP_Query class\n *\n * @package WordPress\n * @subpackage Query\n * @since 4.7.0\n */",
"/**\n * The WordPress Query class.\n *\n * @link https://codex.wordpress.org/Function_Reference/WP_Query Codex page.\n *\n * @since 1.5.0\n * @since 4.5.0 Removed the `$comments_popup` property.\n *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * Query API: WP_Query class\n *\n * @package WordPress\n * @subpackage Query\n * @since 4.7.0\n */",
"/**\n * The WordPress Query class.\n *\n * @link https://codex.wordpress.org/Function_Reference/WP_Query Codex page.\n *\n * @since 1.5.0\n * @since 4.5.0 Removed the `$comments_popup` property.\n *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * WordPress environment setup class.\n *\n * @package WordPress\n * @since 2.0.0\n */\nclass WP {\n\t/**\n\t * Public query variables.\n\t *\n\t * Long list of public query variables.\n\t *\n\t * @since 2.0.0\n\t * @var string[]\n\t */",
"\tpublic $public_query_vars = array( 'm', 'p', 'posts', 'w', ... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * WordPress environment setup class.\n *\n * @package WordPress\n * @since 2.0.0\n */\nclass WP {\n\t/**\n\t * Public query variables.\n\t *\n\t * Long list of public query variables.\n\t *\n\t * @since 2.0.0\n\t * @var string[]\n\t */",
"\tpublic $public_query_vars = array( 'm', 'p', 'posts', 'w', ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * WordPress Version\n *\n * Contains version information for the current WordPress release.\n *\n * @package WordPress\n * @since 1.1.0\n */",
"/**\n * The WordPress version string\n *\n * @global string $wp_version\n */",
"$wp_version = '5.2.4-alpha-46473';",
"\n/**\n * Holds the WordPress DB r... | [
1,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n/**\n * WordPress Version\n *\n * Contains version information for the current WordPress release.\n *\n * @package WordPress\n * @since 1.1.0\n */",
"/**\n * The WordPress version string\n *\n * @global string $wp_version\n */",
"$wp_version = '5.2.4-alpha-46479';",
"\n/**\n * Holds the WordPress DB r... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [806, 18, 17], "buggy_code_start_loc": [541, 17, 16], "filenames": ["wp-includes/class-wp-query.php", "wp-includes/class-wp.php", "wp-includes/version.php"], "fixing_code_end_loc": [805, 18, 17], "fixing_code_start_loc": [540, 17, 16], "message": "In WordPress before 5.2.4, unauthenticated viewin... | 89 |
Determine whether the {function_name} code is vulnerable or not. | [
"--- occu/WebUI/www/config/cp_maintenance.cgi.orig\n+++ occu/WebUI/www/config/cp_maintenance.cgi\n@@ -61,10 +61,14 @@\n puts \"conInfo(\\\"EULA found\\\");\"\n puts \"jQuery('#fwUpload').hide();\"\n puts \"var dlg = new EulaDialog(translateKey('dialogEulaTitle'), data, function(result) {\"\n+ ... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [944, 37], "buggy_code_start_loc": [262, 2], "filenames": ["buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload.patch", "buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload/occu/WebUI/www/config/fileupload.ccc"], "fixing_code_end_loc": [992, 85], "fixing_code_start_loc": [262, 2], "me... | 90 |
Determine whether the {function_name} code is vulnerable or not. | [
"--- occu/WebUI/www/config/cp_maintenance.cgi.orig\n+++ occu/WebUI/www/config/cp_maintenance.cgi\n@@ -61,10 +61,14 @@\n puts \"conInfo(\\\"EULA found\\\");\"\n puts \"jQuery('#fwUpload').hide();\"\n puts \"var dlg = new EulaDialog(translateKey('dialogEulaTitle'), data, function(result) {\"\n+ ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [944, 37], "buggy_code_start_loc": [262, 2], "filenames": ["buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload.patch", "buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload/occu/WebUI/www/config/fileupload.ccc"], "fixing_code_end_loc": [992, 85], "fixing_code_start_loc": [262, 2], "me... | 90 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/sh",
"# shellcheck shell=dash disable=SC2169,SC2034,SC2154",
"\necho -ne \"Content-Type: text/html; charset=iso-8859-1\\r\\n\\r\\n\"",
"",
"\n# fake read boundary+disposition, etc.\nread -r boundary\nread -r disposition\nread -r ctype\nread -r junk",
"# get length\na=${#boundary}\nb=${#disposition... | [
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [944, 37], "buggy_code_start_loc": [262, 2], "filenames": ["buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload.patch", "buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload/occu/WebUI/www/config/fileupload.ccc"], "fixing_code_end_loc": [992, 85], "fixing_code_start_loc": [262, 2], "me... | 90 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/bin/sh",
"# shellcheck shell=dash disable=SC3036,SC3010,SC2034,SC3060,SC2116,SC3045 source=/dev/null",
"\necho -ne \"Content-Type: text/html; charset=iso-8859-1\\r\\n\\r\\n\"",
"\n# allow only POST requests\nif [[ \"${REQUEST_METHOD}\" != \"POST\" ]]; then\n echo \"ERROR: no POST request\"\n exit 1\nfi"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [944, 37], "buggy_code_start_loc": [262, 2], "filenames": ["buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload.patch", "buildroot-external/patches/occu/0031-WebUI-Fix-FileUpload/occu/WebUI/www/config/fileupload.ccc"], "fixing_code_end_loc": [992, 85], "fixing_code_start_loc": [262, 2], "me... | 90 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n'''\nSupport for the Git SCM\n'''\nfrom __future__ import absolute_import",
"# Import python libs\nimport os",
"",
"import subprocess",
"# Import salt libs\nfrom salt import utils\nfrom salt.exceptions import SaltInvocationError, CommandExecutionError\nfrom salt.ext.six.moves.urlli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [96, 39], "buggy_code_start_loc": [8, 39], "filenames": ["salt/modules/git.py", "tests/unit/modules/git_test.py"], "fixing_code_end_loc": [107, 58], "fixing_code_start_loc": [9, 40], "message": "salt before 2015.5.5 leaks git usernames and passwords to the log.", "other": {"cve": {"cisaActionDue"... | 91 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n'''\nSupport for the Git SCM\n'''\nfrom __future__ import absolute_import",
"# Import python libs\nimport os",
"import re",
"import subprocess",
"# Import salt libs\nfrom salt import utils\nfrom salt.exceptions import SaltInvocationError, CommandExecutionError\nfrom salt.ext.six.mo... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [96, 39], "buggy_code_start_loc": [8, 39], "filenames": ["salt/modules/git.py", "tests/unit/modules/git_test.py"], "fixing_code_end_loc": [107, 58], "fixing_code_start_loc": [9, 40], "message": "salt before 2015.5.5 leaks git usernames and passwords to the log.", "other": {"cve": {"cisaActionDue"... | 91 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n'''\n :codeauthor: :email:`Tarjei Husøy <git@thusoy.com>`\n'''",
"# Import Salt Testing Libs\nfrom salttesting import TestCase\nfrom salttesting.helpers import ensure_in_syspath",
"ensure_in_syspath('../../')",
"# Import Salt Libs\nfrom salt.modules import git",
"\nclass GitTest... | [
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [96, 39], "buggy_code_start_loc": [8, 39], "filenames": ["salt/modules/git.py", "tests/unit/modules/git_test.py"], "fixing_code_end_loc": [107, 58], "fixing_code_start_loc": [9, 40], "message": "salt before 2015.5.5 leaks git usernames and passwords to the log.", "other": {"cve": {"cisaActionDue"... | 91 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n'''\n :codeauthor: :email:`Tarjei Husøy <git@thusoy.com>`\n'''",
"# Import Salt Testing Libs\nfrom salttesting import TestCase\nfrom salttesting.helpers import ensure_in_syspath",
"ensure_in_syspath('../../')",
"# Import Salt Libs\nfrom salt.modules import git",
"\nclass GitTest... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [96, 39], "buggy_code_start_loc": [8, 39], "filenames": ["salt/modules/git.py", "tests/unit/modules/git_test.py"], "fixing_code_end_loc": [107, 58], "fixing_code_start_loc": [9, 40], "message": "salt before 2015.5.5 leaks git usernames and passwords to the log.", "other": {"cve": {"cisaActionDue"... | 91 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * jQuery.browser.mobile (http://detectmobilebrowser.com/)\n *\n * jQuery.browser.mobile will be true if the browser is a mobile device\n *\n **/\n(function(a){(jQuery.browser=jQuery.browser||{}).mobile=/(android|bb\\d+|meego).+mobile|avantgo|bada\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(h... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"/**\n * jQuery.browser.mobile (http://detectmobilebrowser.com/)\n *\n * jQuery.browser.mobile will be true if the browser is a mobile device\n *\n **/\n(function(a){(jQuery.browser=jQuery.browser||{}).mobile=/(android|bb\\d+|meego).+mobile|avantgo|bada\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(h... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database username dynamically, showing its prefix\nApp.Actions.DB.update_db_username_hint = function(elm, hint) {\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').html('');",
" } \n $(elm).parent().find('.hint').text(GLOBAL.DB_USER_PREFIX + hint);\n}",
"//\n//\n... | [
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database username dynamically, showing its prefix\nApp.Actions.DB.update_db_username_hint = function(elm, hint) {\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').text('');",
" } \n $(elm).parent().find('.hint').text(GLOBAL.DB_USER_PREFIX + hint);\n}",
"//\n//\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database dns record dynamically, showing its full domain path\nApp.Actions.DB.update_dns_record_hint = function(elm, hint) {\n // clean hint\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').html('');",
" }",
" // set domain name without rec in case of @ entri... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database dns record dynamically, showing its full domain path\nApp.Actions.DB.update_dns_record_hint = function(elm, hint) {\n // clean hint\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').text('');",
" }",
" // set domain name without rec in case of @ entri... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.MAIL_ACC.enable_unlimited = function(elm, source_elm) {\n $(elm).data('checked', true);\n $(elm).data('prev_value', $(elm).val()); // save prev value in order to restore if needed\n $(elm).val(App.Constants.UNLIM_TRANSLATED_VALUE);\n $(elm).attr('disabled', true);\n $(source_elm).css('op... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.MAIL_ACC.enable_unlimited = function(elm, source_elm) {\n $(elm).data('checked', true);\n $(elm).data('prev_value', $(elm).val()); // save prev value in order to restore if needed\n $(elm).val(App.Constants.UNLIM_TRANSLATED_VALUE);\n $(elm).attr('disabled', true);\n $(source_elm).css('op... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.WEB.update_custom_doc_root = function(elm, hint) {\n var prepath = $('input[name=\"v-custom-doc-root_prepath\"]').val();\n var domain = $('select[name=\"v-custom-doc-domain\"]').val();\n var folder = $('input[name=\"v-custom-doc-folder\"]').val();\n console.log(domain, folder);",
" $('... | [
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.WEB.update_custom_doc_root = function(elm, hint) {\n var prepath = $('input[name=\"v-custom-doc-root_prepath\"]').val();\n var domain = $('select[name=\"v-custom-doc-domain\"]').val();\n var folder = $('input[name=\"v-custom-doc-folder\"]').val();\n console.log(domain, folder);",
" $('... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database username dynamically, showing its prefix\nApp.Actions.DB.update_db_username_hint = function(elm, hint) {\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').html('');",
" } \n $(elm).parent().find('.hint').text(GLOBAL.DB_USER_PREFIX + hint);\n}",
"//\n//\n... | [
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database username dynamically, showing its prefix\nApp.Actions.DB.update_db_username_hint = function(elm, hint) {\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').text('');",
" } \n $(elm).parent().find('.hint').text(GLOBAL.DB_USER_PREFIX + hint);\n}",
"//\n//\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database dns record dynamically, showing its full domain path\nApp.Actions.DB.update_dns_record_hint = function(elm, hint) {\n // clean hint\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').html('');",
" }",
" // set domain name without rec in case of @ entri... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"//\n//\n// Updates database dns record dynamically, showing its full domain path\nApp.Actions.DB.update_dns_record_hint = function(elm, hint) {\n // clean hint\n if (hint.trim() == '') {",
" $(elm).parent().find('.hint').text('');",
" }",
" // set domain name without rec in case of @ entri... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.MAIL_ACC.enable_unlimited = function(elm, source_elm) {\n $(elm).data('checked', true);\n $(elm).data('prev_value', $(elm).val()); // save prev value in order to restore if needed\n $(elm).val(App.Constants.UNLIM_TRANSLATED_VALUE);\n $(elm).attr('disabled', true);\n $(source_elm).css('op... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"App.Actions.MAIL_ACC.enable_unlimited = function(elm, source_elm) {\n $(elm).data('checked', true);\n $(elm).data('prev_value', $(elm).val()); // save prev value in order to restore if needed\n $(elm).val(App.Constants.UNLIM_TRANSLATED_VALUE);\n $(elm).attr('disabled', true);\n $(source_elm).css('op... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- Begin toolbar -->\n<div class=\"l-center edit\">\n\t<div class=\"l-sort clearfix\">\n\t\t<div class=\"l-unit-toolbar__buttonstrip\">\n\t\t\t<a class=\"ui-button cancel\" dir=\"ltr\" id=\"btn-back\" href=\"/list/db/\"><i class=\"fas fa-arrow-left status-icon blue\"></i><?=_('Back');?></a>\n\t\t</div>\n\t\t<div... | [
1,
1,
1,
1,
1,
0,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- Begin toolbar -->\n<div class=\"l-center edit\">\n\t<div class=\"l-sort clearfix\">\n\t\t<div class=\"l-unit-toolbar__buttonstrip\">\n\t\t\t<a class=\"ui-button cancel\" dir=\"ltr\" id=\"btn-back\" href=\"/list/db/\"><i class=\"fas fa-arrow-left status-icon blue\"></i><?=_('Back');?></a>\n\t\t</div>\n\t\t<div... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- Begin toolbar -->\n<div class=\"l-center edit\">\n\t<div class=\"l-sort clearfix\">\n\t\t<div class=\"l-unit-toolbar__buttonstrip\">\n\t\t\t<a class=\"ui-button cancel\" dir=\"ltr\" id=\"btn-back\" href=\"/list/db/\"><i class=\"fas fa-arrow-left status-icon blue\"></i><?=_('Back');?></a>\n\t\t</div>\n\t\t<div... | [
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"<!-- Begin toolbar -->\n<div class=\"l-center edit\">\n\t<div class=\"l-sort clearfix\">\n\t\t<div class=\"l-unit-toolbar__buttonstrip\">\n\t\t\t<a class=\"ui-button cancel\" dir=\"ltr\" id=\"btn-back\" href=\"/list/db/\"><i class=\"fas fa-arrow-left status-icon blue\"></i><?=_('Back');?></a>\n\t\t</div>\n\t\t<div... | [
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [66, 17, 8, 214, 92, 17, 8, 192, 232, 131], "buggy_code_start_loc": [65, 6, 7, 144, 6, 6, 7, 122, 64, 129], "filenames": ["web/js/app.js", "web/js/pages/add_db.js", "web/js/pages/add_dns_rec.js", "web/js/pages/add_mail_acc.js", "web/js/pages/add_web.js", "web/js/pages/edit_db.js", "web/js/pages/e... | 92 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog",
"All notable changes to this project will be documented in this file.",
"The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),\nand this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).",
"## \\[2.0.0] - Unreleased\n### Added\n- Handle at... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog",
"All notable changes to this project will be documented in this file.",
"The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),\nand this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).",
"## \\[2.0.0] - Unreleased\n### Added\n- Handle at... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright (C) 2018-2022 Intel Corporation\n#\n# SPDX-License-Identifier: MIT",
"import itertools\nimport os\nimport sys",
"",
"import rq\nimport re\nimport shutil\nfrom distutils.dir_util import copy_tree\nfrom traceback import print_exception\nfrom urllib import parse as urlparse\nfrom urllib import reque... | [
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright (C) 2018-2022 Intel Corporation\n#\n# SPDX-License-Identifier: MIT",
"import itertools\nimport os\nimport sys",
"from rest_framework.serializers import ValidationError",
"import rq\nimport re\nimport shutil\nfrom distutils.dir_util import copy_tree\nfrom traceback import print_exception\nfrom url... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"attrs==21.2.0\nclick==7.1.2\nDjango==3.2.12\ndjango-appconf==1.0.4\ndjango-auth-ldap==2.2.0\ndjango-compressor==2.4\ndjango-rq==2.3.2\nEasyProcess==0.3\nPillow==9.0.1\nnumpy==1.22.0\npython-ldap==3.4.0\npytz==2020.1\npyunpack==0.2.1\nrcssmin==1.0.6\nredis==3.5.3\nrjsmin==1.1.0\nrequests==2.26.0\nrq==1.5.1\nrq-sche... | [
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"attrs==21.2.0\nclick==7.1.2\nDjango==3.2.12\ndjango-appconf==1.0.4\ndjango-auth-ldap==2.2.0\ndjango-compressor==2.4\ndjango-rq==2.3.2\nEasyProcess==0.3\nPillow==9.0.1\nnumpy==1.22.0\npython-ldap==3.4.0\npytz==2020.1\npyunpack==0.2.1\nrcssmin==1.0.6\nredis==3.5.3\nrjsmin==1.1.0\nrequests==2.26.0\nrq==1.5.1\nrq-sche... | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [83, 212, 54], "buggy_code_start_loc": [83, 8, 54], "filenames": ["CHANGELOG.md", "cvat/apps/engine/task.py", "cvat/requirements/base.txt"], "fixing_code_end_loc": [85, 256, 56], "fixing_code_start_loc": [84, 9, 55], "message": "CVAT is an opensource interactive video and image annotation tool fo... | 93 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * JBoss, Home of Professional Open Source\n *\n * Copyright 2013 Red Hat, Inc. and/or its affiliates.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://ww... | [
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98], "buggy_code_start_loc": [23], "filenames": ["api/src/main/java/org/xnio/StreamConnection.java"], "fixing_code_end_loc": [100], "fixing_code_start_loc": [24], "message": "A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a messa... | 94 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * JBoss, Home of Professional Open Source\n *\n * Copyright 2013 Red Hat, Inc. and/or its affiliates.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://ww... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [98], "buggy_code_start_loc": [23], "filenames": ["api/src/main/java/org/xnio/StreamConnection.java"], "fixing_code_end_loc": [100], "fixing_code_start_loc": [24], "message": "A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a messa... | 94 |
Determine whether the {function_name} code is vulnerable or not. | [
"import datetime\nfrom StringIO import StringIO\nfrom django.conf import settings\nfrom django.core.exceptions import ImproperlyConfigured\nfrom django.core.serializers import json\nfrom django.utils import simplejson\nfrom django.utils.encoding import force_unicode\nfrom tastypie.bundle import Bundle\nfrom tastypi... | [
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
0... | PreciseBugs | {"buggy_code_end_loc": [406], "buggy_code_start_loc": [31], "filenames": ["tastypie/serializers.py"], "fixing_code_end_loc": [406], "fixing_code_start_loc": [31], "message": "The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to... | 95 |
Determine whether the {function_name} code is vulnerable or not. | [
"import datetime\nfrom StringIO import StringIO\nfrom django.conf import settings\nfrom django.core.exceptions import ImproperlyConfigured\nfrom django.core.serializers import json\nfrom django.utils import simplejson\nfrom django.utils.encoding import force_unicode\nfrom tastypie.bundle import Bundle\nfrom tastypi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [406], "buggy_code_start_loc": [31], "filenames": ["tastypie/serializers.py"], "fixing_code_end_loc": [406], "fixing_code_start_loc": [31], "message": "The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to... | 95 |
Determine whether the {function_name} code is vulnerable or not. | [
"target\n.classpath\n.metadata\n.project\ndoc",
""
] | [
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"target\n.classpath\n.metadata\n.project\ndoc",
"*.class"
] | [
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (C) 2016 Southern Storm Software, Pty Ltd.\n *\n * Permission is hereby granted, free of charge, to any person obtaining a\n * copy of this software and associated documentation files (the \"Software\"),\n * to deal in the Software without restriction, including without limitation\n * the rights t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [5, 227, 275, 254, 132], "buggy_code_start_loc": [5, 188, 221, 217, 102], "filenames": [".gitignore", "src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java", "src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java", "src/main/java/com/southernstorm/noi... | 96 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Driver for the Conexant CX23885/7/8 PCIe bridge\n *\n * CX23888 Integrated Consumer Infrared Controller\n *\n * Copyright (C) 2009 Andy Walls <awalls@md.metrocast.net>\n */",
"#include \"cx23885.h\"\n#include \"cx23888-ir.h\"",
"#include <linux/kfifo.h>\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1171], "buggy_code_start_loc": [1170], "filenames": ["drivers/media/pci/cx23885/cx23888-ir.c"], "fixing_code_end_loc": [1175], "fixing_code_start_loc": [1170], "message": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.1... | 97 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-or-later\n/*\n * Driver for the Conexant CX23885/7/8 PCIe bridge\n *\n * CX23888 Integrated Consumer Infrared Controller\n *\n * Copyright (C) 2009 Andy Walls <awalls@md.metrocast.net>\n */",
"#include \"cx23885.h\"\n#include \"cx23888-ir.h\"",
"#include <linux/kfifo.h>\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1171], "buggy_code_start_loc": [1170], "filenames": ["drivers/media/pci/cx23885/cx23888-ir.c"], "fixing_code_end_loc": [1175], "fixing_code_start_loc": [1170], "message": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.1... | 97 |
Determine whether the {function_name} code is vulnerable or not. | [
"'use strict';",
"var doctypes = require('doctypes');\nvar makeError = require('pug-error');\nvar buildRuntime = require('pug-runtime/build');\nvar runtime = require('pug-runtime');\nvar compileAttrs = require('pug-attrs');\nvar selfClosing = require('void-elements');\nvar constantinople = require('constantinople... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508], "buggy_code_start_loc": [58], "filenames": ["packages/pug-code-gen/index.js"], "fixing_code_end_loc": [517], "fixing_code_start_loc": [59], "message": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control t... | 98 |
Determine whether the {function_name} code is vulnerable or not. | [
"'use strict';",
"var doctypes = require('doctypes');\nvar makeError = require('pug-error');\nvar buildRuntime = require('pug-runtime/build');\nvar runtime = require('pug-runtime');\nvar compileAttrs = require('pug-attrs');\nvar selfClosing = require('void-elements');\nvar constantinople = require('constantinople... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [508], "buggy_code_start_loc": [58], "filenames": ["packages/pug-code-gen/index.js"], "fixing_code_end_loc": [517], "fixing_code_start_loc": [59], "message": "Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control t... | 98 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1013], "buggy_code_start_loc": [1013], "filenames": ["MagickCore/blob.c"], "fixing_code_end_loc": [1015], "fixing_code_start_loc": [1014], "message": "In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an att... | 99 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1013], "buggy_code_start_loc": [1013], "filenames": ["MagickCore/blob.c"], "fixing_code_end_loc": [1015], "fixing_code_start_loc": [1014], "message": "In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an att... | 99 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog\nAll notable changes to this project will be documented in this file.",
"## v2.6-dev - Unreleased",
"### Improvements\n- Improve layout in \"My Checks\" for checks with long ping URLs (#745)\n- Add support for communicating with signal-cli over TCP (#732)\n- Add /api/v2/ (changes the status reporti... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Changelog\nAll notable changes to this project will be documented in this file.",
"## v2.6-dev - Unreleased",
"### Improvements\n- Improve layout in \"My Checks\" for checks with long ping URLs (#745)\n- Add support for communicating with signal-cli over TCP (#732)\n- Add /api/v2/ (changes the status reporti... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from datetime import timedelta as td",
"from django import forms\nfrom django.contrib.auth import authenticate\nfrom django.contrib.auth.models import User",
"from hc.accounts.models import REPORT_CHOICES, Member\nfrom hc.api.models import TokenBucket\nfrom hc.lib.tz imp... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from datetime import timedelta as td",
"from django import forms\nfrom django.contrib.auth import authenticate\nfrom django.contrib.auth.models import User",
"from hc.accounts.models import REPORT_CHOICES, Member\nfrom hc.api.models import TokenBucket\nfrom hc.lib.tz imp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from django.conf import settings\nfrom django.core import mail\nfrom django.test.utils import override_settings",
"from hc.accounts.models import Credential\nfrom hc.api.models import Check, TokenBucket\nfrom hc.test import BaseTestCase",
"\nclass LoginTestCase(BaseTestC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from django.conf import settings\nfrom django.core import mail\nfrom django.test.utils import override_settings",
"from hc.accounts.models import Credential\nfrom hc.api.models import Check, TokenBucket\nfrom hc.test import BaseTestCase",
"\nclass LoginTestCase(BaseTestC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from django.conf import settings\nfrom django.contrib.auth.models import User\nfrom django.core import mail\nfrom django.test import TestCase\nfrom django.test.utils import override_settings",
"from hc.accounts.models import Profile, Project\nfrom hc.api.models import Chan... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"from django.conf import settings\nfrom django.contrib.auth.models import User\nfrom django.core import mail\nfrom django.test import TestCase\nfrom django.test.utils import override_settings",
"from hc.accounts.models import Profile, Project\nfrom hc.api.models import Chan... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"import time\nimport uuid\nfrom datetime import timedelta as td\nfrom secrets import token_urlsafe\nfrom urllib.parse import urlparse",
"import pyotp\nimport segno\nfrom django.conf import settings\nfrom django.contrib import messages\nfrom django.contrib.auth import authen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"from __future__ import annotations",
"import time\nimport uuid\nfrom datetime import timedelta as td\nfrom secrets import token_urlsafe\nfrom urllib.parse import urlparse",
"import pyotp\nimport segno\nfrom django.conf import settings\nfrom django.contrib import messages\nfrom django.contrib.auth import authen... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"{% extends \"base.html\" %}",
"",
"\n{% block content %}\n<div class=\"row\">\n <div class=\"col-sm-6 col-sm-offset-3\">\n <div class=\"hc-dialog\">",
" <h1>Login Link Sent!</h1>",
" <br />\n <p>",
" We've sent you an email with login instructions... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"{% extends \"base.html\" %}",
"{% load hc_extras %}",
"\n{% block content %}\n<div class=\"row\">\n <div class=\"col-sm-6 col-sm-offset-3\">\n <div class=\"hc-dialog\">",
" <h1>Check Your Email!</h1>",
" <br />\n <p>",
" If a {% site_name %} accou... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"{% for error in form.identity.errors %}\n<p class=\"text-danger\">{{ error }}</p>",
"",
"{% endfor %}",
"\n{% if created %}\n<p class=\"text-success\">Account created, please check your email!</p>\n{% endif %}"
] | [
1,
0,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"{% for error in form.identity.errors %}\n<p class=\"text-danger\">{{ error }}</p>",
"{% empty %}\n<p class=\"text-success\">Please check your email!</p>",
"{% endfor %}",
""
] | [
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [19, 64, 58, 105, 214, 14, 8], "buggy_code_start_loc": [19, 33, 58, 19, 164, 1, 3], "filenames": ["CHANGELOG.md", "hc/accounts/forms.py", "hc/accounts/tests/test_login.py", "hc/accounts/tests/test_signup.py", "hc/accounts/views.py", "templates/accounts/login_link_sent.html", "templates/accounts/s... | 100 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * The main stop words configuration frontend.\n *\n * This Source Code Form is subject to the terms of the Mozilla Public License,\n * v. 2.0. If a copy of the MPL was not distributed with this file, You can\n * obtain one at http://mozilla.org/MPL/2.0/.\n *\n * @package phpMyFAQ\n * @author Anato... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [288, 196], "buggy_code_start_loc": [109, 195], "filenames": ["phpmyfaq/admin/stopwords.php", "phpmyfaq/src/phpMyFAQ/Stopwords.php"], "fixing_code_end_loc": [304, 196], "fixing_code_start_loc": [109, 195], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq pri... | 101 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * The main stop words configuration frontend.\n *\n * This Source Code Form is subject to the terms of the Mozilla Public License,\n * v. 2.0. If a copy of the MPL was not distributed with this file, You can\n * obtain one at http://mozilla.org/MPL/2.0/.\n *\n * @package phpMyFAQ\n * @author Anato... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [288, 196], "buggy_code_start_loc": [109, 195], "filenames": ["phpmyfaq/admin/stopwords.php", "phpmyfaq/src/phpMyFAQ/Stopwords.php"], "fixing_code_end_loc": [304, 196], "fixing_code_start_loc": [109, 195], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq pri... | 101 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * The main Stopwords class.\n *\n * This Source Code Form is subject to the terms of the Mozilla Public License,\n * v. 2.0. If a copy of the MPL was not distributed with this file, You can\n * obtain one at http://mozilla.org/MPL/2.0/.\n *\n * @package phpMyFAQ\n * @author Anatoliy Belsky\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [288, 196], "buggy_code_start_loc": [109, 195], "filenames": ["phpmyfaq/admin/stopwords.php", "phpmyfaq/src/phpMyFAQ/Stopwords.php"], "fixing_code_end_loc": [304, 196], "fixing_code_start_loc": [109, 195], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq pri... | 101 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * The main Stopwords class.\n *\n * This Source Code Form is subject to the terms of the Mozilla Public License,\n * v. 2.0. If a copy of the MPL was not distributed with this file, You can\n * obtain one at http://mozilla.org/MPL/2.0/.\n *\n * @package phpMyFAQ\n * @author Anatoliy Belsky\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [288, 196], "buggy_code_start_loc": [109, 195], "filenames": ["phpmyfaq/admin/stopwords.php", "phpmyfaq/src/phpMyFAQ/Stopwords.php"], "fixing_code_end_loc": [304, 196], "fixing_code_start_loc": [109, 195], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq pri... | 101 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [310, 689], "buggy_code_start_loc": [232, 681], "filenames": ["MagickCore/fourier.c", "coders/gif.c"], "fixing_code_end_loc": [306, 691], "fixing_code_start_loc": [232, 682], "message": "ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.", "other": ... | 102 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [310, 689], "buggy_code_start_loc": [232, 681], "filenames": ["MagickCore/fourier.c", "coders/gif.c"], "fixing_code_end_loc": [306, 691], "fixing_code_start_loc": [232, 682], "message": "ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.", "other": ... | 102 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [310, 689], "buggy_code_start_loc": [232, 681], "filenames": ["MagickCore/fourier.c", "coders/gif.c"], "fixing_code_end_loc": [306, 691], "fixing_code_start_loc": [232, 682], "message": "ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.", "other": ... | 102 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [310, 689], "buggy_code_start_loc": [232, 681], "filenames": ["MagickCore/fourier.c", "coders/gif.c"], "fixing_code_end_loc": [306, 691], "fixing_code_start_loc": [232, 682], "message": "ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.", "other": ... | 102 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar et al.\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */\n/*\n * normal.c:\tC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\tby Bram Moolenaar et al.\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */\n/*\n * normal.c:\tC... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for tagjump (tags and special searches)",
"source check.vim\nsource screendump.vim",
"\" SEGV occurs in older versions. (At least 7.4.1748 or older)\nfunc Test_ptag_with_notagstack()\n CheckFeature quickfix",
" set notagstack\n call assert_fails('ptag does_not_exist_tag_name', 'E433:')\n set ta... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"\" Tests for tagjump (tags and special searches)",
"source check.vim\nsource screendump.vim",
"\" SEGV occurs in older versions. (At least 7.4.1748 or older)\nfunc Test_ptag_with_notagstack()\n CheckFeature quickfix",
" set notagstack\n call assert_fails('ptag does_not_exist_tag_name', 'E433:')\n set ta... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* vi:set ts=8 sts=4 sw=4 noet:\n *\n * VIM - Vi IMproved\t\tby Bram Moolenaar\n *\n * Do \":help uganda\" in Vim to read copying and usage conditions.\n * Do \":help credits\" in Vim to see a list of people who contributed.\n * See README.txt for an overview of the Vim source code.\n */",
"#include \"vim.h\"",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [4474, 1400, 736], "buggy_code_start_loc": [4466, 1400, 736], "filenames": ["src/normal.c", "src/testdir/test_tagjump.vim", "src/version.c"], "fixing_code_end_loc": [4481, 1407, 739], "fixing_code_start_loc": [4467, 1401, 737], "message": "Use After Free in GitHub repository vim/vim prior to 8.2.... | 103 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"class admin_config extends AdminPanel {",
"\tvar $panelname = 'config';",
"}",
"class admin_config_default extends AdminPanelActionValidated {",
"\tvar $validators = array(\n\t\t// not needed anymore !\n\t\t// array('blog_root', 'blog_root', 'notEmpty', false, false, 'trim'),\n\t\tarray(\n\t\t\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [135], "buggy_code_start_loc": [127], "filenames": ["admin/panels/config/admin.config.php"], "fixing_code_end_loc": [135], "fixing_code_start_loc": [127], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository flatpressblog/flatpress prior to 1.3.", "other": {"cve": {"cisaActionDue... | 104 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"class admin_config extends AdminPanel {",
"\tvar $panelname = 'config';",
"}",
"class admin_config_default extends AdminPanelActionValidated {",
"\tvar $validators = array(\n\t\t// not needed anymore !\n\t\t// array('blog_root', 'blog_root', 'notEmpty', false, false, 'trim'),\n\t\tarray(\n\t\t\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [135], "buggy_code_start_loc": [127], "filenames": ["admin/panels/config/admin.config.php"], "fixing_code_end_loc": [135], "fixing_code_start_loc": [127], "message": "Cross-site Scripting (XSS) - Generic in GitHub repository flatpressblog/flatpress prior to 1.3.", "other": {"cve": {"cisaActionDue... | 104 |
Determine whether the {function_name} code is vulnerable or not. | [
"var pythonMirror = process.env.npm_config_python_mirror || process.env.PYTHON_MIRROR || 'https://www.python.org/ftp/python/'",
"var buildTools = {\n installerName: 'BuildTools_Full.exe',",
" installerUrl: 'http://download.microsoft.com/download/5/f/7/5f7acaeb-8363-451f-9425-68a90f98b238/visualcppbuildtools_f... | [
1,
1,
0,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6], "buggy_code_start_loc": [5], "filenames": ["src/constants.js"], "fixing_code_end_loc": [6], "fixing_code_start_loc": [5], "message": "windows-build-tools is a module for installing C++ Build Tools for Windows using npm. windows-build-tools versions below 1.0.0 download resources over HTTP, w... | 105 |
Determine whether the {function_name} code is vulnerable or not. | [
"var pythonMirror = process.env.npm_config_python_mirror || process.env.PYTHON_MIRROR || 'https://www.python.org/ftp/python/'",
"var buildTools = {\n installerName: 'BuildTools_Full.exe',",
" installerUrl: 'https://download.microsoft.com/download/5/f/7/5f7acaeb-8363-451f-9425-68a90f98b238/visualcppbuildtools_... | [
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [6], "buggy_code_start_loc": [5], "filenames": ["src/constants.js"], "fixing_code_end_loc": [6], "fixing_code_start_loc": [5], "message": "windows-build-tools is a module for installing C++ Build Tools for Windows using npm. windows-build-tools versions below 1.0.0 download resources over HTTP, w... | 105 |
Determine whether the {function_name} code is vulnerable or not. | [
"module github.com/TykTechnologies/tyk-identity-broker",
"go 1.13",
"require (\n\tgithub.com/Jeffail/gabs v1.4.0",
"\tgithub.com/TykTechnologies/tyk/certs v0.0.1",
"\tgithub.com/crewjam/saml v0.4.5\n\tgithub.com/go-ldap/ldap/v3 v3.2.3\n\tgithub.com/go-redis/redis/v8 v8.3.1\n\tgithub.com/gorilla/mux v1.7.4\n... | [
1,
1,
1,
0,
1,
0,
1,
0,
1,
0
] | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Determine whether the {function_name} code is vulnerable or not. | [
"module github.com/TykTechnologies/tyk-identity-broker",
"go 1.13",
"require (\n\tgithub.com/Jeffail/gabs v1.4.0",
"\tgithub.com/TykTechnologies/tyk v1.9.2-0.20210112201019-11dba25d812b",
"\tgithub.com/crewjam/saml v0.4.5\n\tgithub.com/go-ldap/ldap/v3 v3.2.3\n\tgithub.com/go-redis/redis/v8 v8.3.1\n\tgithub.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=",
"",
"github.com/Azure/go-ntlmssp v0.0.0-20200615164410-66371956d46c h1:/IBSNwUN8+eKzUzbJPqhK839ygXJ82sde8x3ogr6R28=\ngithub.com/Azure/go-ntlmssp v0.0.0-20200615164410-66371956d46c/go.mod h1:chxPXzSsl7ZWRAuOIE23GDNzjWuZqu... | [
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Determine whether the {function_name} code is vulnerable or not. | [
"cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=",
"cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=",
"cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU=\ncloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1m... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Determine whether the {function_name} code is vulnerable or not. | [
"package providers",
"import (\n\t\"context\"\n\t\"crypto/rsa\"\n\t\"encoding/json\"\n\t\"encoding/xml\"\n\t\"github.com/TykTechnologies/tyk/certs\"\n\t\"net/http\"\n\t\"net/url\"\n\t\"strings\"\n\t\"sync\"",
"\t\"github.com/markbates/goth\"",
"\t\"github.com/crewjam/saml\"",
"\t\"github.com/crewjam/saml/sa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Determine whether the {function_name} code is vulnerable or not. | [
"package providers",
"import (\n\t\"context\"\n\t\"crypto/rsa\"\n\t\"encoding/json\"\n\t\"encoding/xml\"\n\t\"github.com/TykTechnologies/tyk/certs\"\n\t\"net/http\"\n\t\"net/url\"\n\t\"strings\"\n\t\"sync\"",
"\t\"github.com/markbates/goth\"",
"\t\"github.com/crewjam/saml\"",
"\t\"github.com/crewjam/saml/sa... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [32, 195, 32], "buggy_code_start_loc": [7, 0, 31], "filenames": ["go.mod", "go.sum", "providers/saml.go"], "fixing_code_end_loc": [38, 885, 32], "fixing_code_start_loc": [7, 1, 31], "message": "The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authenticatio... | 106 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.