prompt stringclasses 1
value | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 1
value | other_info stringlengths 2.06k 101k | index int64 0 6.83k |
|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [70], "buggy_code_start_loc": [60], "filenames": ["tensorflow/core/kernels/ragged_gather_op.cc"], "fixing_code_end_loc": [76], "fixing_code_start_loc": [61], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.Rag... | 107 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2018 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [70], "buggy_code_start_loc": [60], "filenames": ["tensorflow/core/kernels/ragged_gather_op.cc"], "fixing_code_end_loc": [76], "fixing_code_start_loc": [61], "message": "TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.Rag... | 107 |
Determine whether the {function_name} code is vulnerable or not. | [
".. currentmodule:: werkzeug",
"Version 0.15.3\n--------------",
"Unreleased",
"- Properly handle multi-line header folding in development server in\n Python 2.7. (:issue:`1080`)\n- Restore the ``response`` argument to :exc:`~exceptions.Unauthorized`.\n (:pr:`1527`)\n- :exc:`~exceptions.Unauthoriz... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 69], "buggy_code_start_loc": [22, 69], "filenames": ["CHANGES.rst", "src/werkzeug/debug/__init__.py"], "fixing_code_end_loc": [25, 83], "fixing_code_start_loc": [23, 70], "message": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docke... | 108 |
Determine whether the {function_name} code is vulnerable or not. | [
".. currentmodule:: werkzeug",
"Version 0.15.3\n--------------",
"Unreleased",
"- Properly handle multi-line header folding in development server in\n Python 2.7. (:issue:`1080`)\n- Restore the ``response`` argument to :exc:`~exceptions.Unauthorized`.\n (:pr:`1527`)\n- :exc:`~exceptions.Unauthoriz... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [22, 69], "buggy_code_start_loc": [22, 69], "filenames": ["CHANGES.rst", "src/werkzeug/debug/__init__.py"], "fixing_code_end_loc": [25, 83], "fixing_code_start_loc": [23, 70], "message": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docke... | 108 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n\"\"\"\n werkzeug.debug\n ~~~~~~~~~~~~~~",
" WSGI application traceback debugger.",
" :copyright: 2007 Pallets\n :license: BSD-3-Clause\n\"\"\"\nimport getpass\nimport hashlib\nimport json\nimport mimetypes\nimport os\nimport pkgutil\nimport re\nimport sys\nimport time\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 69], "buggy_code_start_loc": [22, 69], "filenames": ["CHANGES.rst", "src/werkzeug/debug/__init__.py"], "fixing_code_end_loc": [25, 83], "fixing_code_start_loc": [23, 70], "message": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docke... | 108 |
Determine whether the {function_name} code is vulnerable or not. | [
"# -*- coding: utf-8 -*-\n\"\"\"\n werkzeug.debug\n ~~~~~~~~~~~~~~",
" WSGI application traceback debugger.",
" :copyright: 2007 Pallets\n :license: BSD-3-Clause\n\"\"\"\nimport getpass\nimport hashlib\nimport json\nimport mimetypes\nimport os\nimport pkgutil\nimport re\nimport sys\nimport time\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [22, 69], "buggy_code_start_loc": [22, 69], "filenames": ["CHANGES.rst", "src/werkzeug/debug/__init__.py"], "fixing_code_end_loc": [25, 83], "fixing_code_start_loc": [23, 70], "message": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docke... | 108 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1... | PreciseBugs | {"buggy_code_end_loc": [547, 2472], "buggy_code_start_loc": [301, 2472], "filenames": ["tensorflow/core/kernels/avgpooling_op.cc", "tensorflow/python/kernel_tests/nn_ops/pooling_ops_test.py"], "fixing_code_end_loc": [547, 2489], "fixing_code_start_loc": [301, 2473], "message": "TensorFlow is an open source platform for... | 109 |
Determine whether the {function_name} code is vulnerable or not. | [
"/* Copyright 2015 The TensorFlow Authors. All Rights Reserved.",
"Licensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at",
" http://www.apache.org/licenses/LICENSE-2.0",
"Unless required b... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [547, 2472], "buggy_code_start_loc": [301, 2472], "filenames": ["tensorflow/core/kernels/avgpooling_op.cc", "tensorflow/python/kernel_tests/nn_ops/pooling_ops_test.py"], "fixing_code_end_loc": [547, 2489], "fixing_code_start_loc": [301, 2473], "message": "TensorFlow is an open source platform for... | 109 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2015 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [547, 2472], "buggy_code_start_loc": [301, 2472], "filenames": ["tensorflow/core/kernels/avgpooling_op.cc", "tensorflow/python/kernel_tests/nn_ops/pooling_ops_test.py"], "fixing_code_end_loc": [547, 2489], "fixing_code_start_loc": [301, 2473], "message": "TensorFlow is an open source platform for... | 109 |
Determine whether the {function_name} code is vulnerable or not. | [
"# Copyright 2015 The TensorFlow Authors. All Rights Reserved.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless requ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [547, 2472], "buggy_code_start_loc": [301, 2472], "filenames": ["tensorflow/core/kernels/avgpooling_op.cc", "tensorflow/python/kernel_tests/nn_ops/pooling_ops_test.py"], "fixing_code_end_loc": [547, 2489], "fixing_code_start_loc": [301, 2473], "message": "TensorFlow is an open source platform for... | 109 |
Determine whether the {function_name} code is vulnerable or not. | [
"const Promise = require('bluebird');\nconst tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"",
"const models = require('../../models');\nconst ALLOWED_INCLUDES = ['count.posts'];",
"const messages = {\n notFound: 'Author not found.'\n};",
"",
"\nmodule.exports = {\n ... | [
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const Promise = require('bluebird');\nconst tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"const {mapQuery} = require('@tryghost/mongo-utils');",
"const models = require('../../models');\nconst ALLOWED_INCLUDES = ['count.posts'];",
"const messages = {\n notFound: 'Author n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"",
"const models = require('../../models');",
"const ALLOWED_INCLUDES = ['tags', 'authors', 'tiers'];",
"const messages = {\n pageNotFound: 'Page not found.'\n};",
"",
"\nmodule.exports = {\n docName: 'pages',",... | [
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"const {mapQuery} = require('@tryghost/mongo-utils');",
"const models = require('../../models');",
"const ALLOWED_INCLUDES = ['tags', 'authors', 'tiers'];",
"const messages = {\n pageNotFound: 'Page not found.'\n};",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const models = require('../../models');\nconst tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"",
"const postsPublicService = require('../../services/posts-public');",
"const allowedIncludes = ['tags', 'authors', 'tiers', 'sentiment'];",
"const messages = {\n postNotFound... | [
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const models = require('../../models');\nconst tpl = require('@tryghost/tpl');\nconst errors = require('@tryghost/errors');",
"const {mapQuery} = require('@tryghost/mongo-utils');",
"const postsPublicService = require('../../services/posts-public');",
"const allowedIncludes = ['tags', 'authors', 'tiers', 'se... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst localUtils = require('./utils');\nconst testUtils = require('../../../utils');\nconst configUtils = require('../../../utils/configUtils');\nconst config = require('../../../../core/shared/config');",
"describe('Authors Content API'... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst localUtils = require('./utils');\nconst testUtils = require('../../../utils');\nconst configUtils = require('../../../utils/configUtils');\nconst config = require('../../../../core/shared/config');",
"describe('Authors Content API'... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst testUtils = require('../../../utils');\nconst localUtils = require('./utils');\nconst configUtils = require('../../../utils/configUtils');\nconst config = require('../../../../core/shared/config');",
"let request;",
"describe('ap... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst testUtils = require('../../../utils');\nconst localUtils = require('./utils');\nconst configUtils = require('../../../utils/configUtils');\nconst config = require('../../../../core/shared/config');",
"let request;",
"describe('ap... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst _ = require('lodash');\nconst testUtils = require('../../../utils');\nconst localUtils = require('./utils');\nconst configUtils = require('../../../utils/configUtils');\nconst urlUtils = require('../../../utils/urlUtils');\nconst con... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"const should = require('should');\nconst supertest = require('supertest');\nconst _ = require('lodash');\nconst testUtils = require('../../../utils');\nconst localUtils = require('./utils');\nconst configUtils = require('../../../utils/configUtils');\nconst urlUtils = require('../../../utils/urlUtils');\nconst con... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"require('../../core/server/overrides');",
"// Utility Packages\nconst {sequence} = require('@tryghost/promise');\nconst debug = require('@tryghost/debug')('test:utils');",
"const _ = require('lodash');",
"// Ghost Internals\nconst models = require('../../core/server/models');",
"// Other Test Utilities\nco... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"require('../../core/server/overrides');",
"// Utility Packages\nconst {sequence} = require('@tryghost/promise');\nconst debug = require('@tryghost/debug')('test:utils');",
"const _ = require('lodash');",
"// Ghost Internals\nconst models = require('../../core/server/models');",
"// Other Test Utilities\nco... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [58, 68, 70, 19, 20, 24, 101], "buggy_code_start_loc": [3, 2, 3, 19, 20, 24, 101], "filenames": ["ghost/core/core/server/api/endpoints/authors-public.js", "ghost/core/core/server/api/endpoints/pages-public.js", "ghost/core/core/server/api/endpoints/posts-public.js", "ghost/core/test/regression/ap... | 110 |
Determine whether the {function_name} code is vulnerable or not. | [
"<div class=\"modal-dialog modal-lg\">\n <div class=\"modal-content\">\n <div class=\"modal-header\">\n <h4 class=\"modal-title\" id=\"myModalLabel\">\n <span class=\"material-icons\">info_outline</span> <?php echo erTranslationClassLhTranslation::getInstance()->getTranslati... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67, 5], "buggy_code_start_loc": [66, 4], "filenames": ["lhc_web/design/defaulttheme/tpl/lhchat/avatarbuilder.tpl.php", "lhc_web/modules/lhuser/avatarbuilder.php"], "fixing_code_end_loc": [67, 5], "fixing_code_start_loc": [66, 4], "message": "livehelperchat is vulnerable to Improper Neutralizatio... | 111 |
Determine whether the {function_name} code is vulnerable or not. | [
"<div class=\"modal-dialog modal-lg\">\n <div class=\"modal-content\">\n <div class=\"modal-header\">\n <h4 class=\"modal-title\" id=\"myModalLabel\">\n <span class=\"material-icons\">info_outline</span> <?php echo erTranslationClassLhTranslation::getInstance()->getTranslati... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67, 5], "buggy_code_start_loc": [66, 4], "filenames": ["lhc_web/design/defaulttheme/tpl/lhchat/avatarbuilder.tpl.php", "lhc_web/modules/lhuser/avatarbuilder.php"], "fixing_code_end_loc": [67, 5], "fixing_code_start_loc": [66, 4], "message": "livehelperchat is vulnerable to Improper Neutralizatio... | 111 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$tpl = erLhcoreClassTemplate::getInstance('lhchat/avatarbuilder.tpl.php');\n",
"$id = $Params['user_parameters']['id'];",
"\n$prefix = isset($_GET['prefix']) ? strip_tags($_GET['prefix']) : '';",
"if (empty($id)) {\n $id = erLhcoreClassModelForgotPassword::randomPassword();\n} else {\n $idProps ... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67, 5], "buggy_code_start_loc": [66, 4], "filenames": ["lhc_web/design/defaulttheme/tpl/lhchat/avatarbuilder.tpl.php", "lhc_web/modules/lhuser/avatarbuilder.php"], "fixing_code_end_loc": [67, 5], "fixing_code_start_loc": [66, 4], "message": "livehelperchat is vulnerable to Improper Neutralizatio... | 111 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n$tpl = erLhcoreClassTemplate::getInstance('lhchat/avatarbuilder.tpl.php');\n",
"$id = strip_tags($Params['user_parameters']['id']);",
"\n$prefix = isset($_GET['prefix']) ? strip_tags($_GET['prefix']) : '';",
"if (empty($id)) {\n $id = erLhcoreClassModelForgotPassword::randomPassword();\n} else {\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [67, 5], "buggy_code_start_loc": [66, 4], "filenames": ["lhc_web/design/defaulttheme/tpl/lhchat/avatarbuilder.tpl.php", "lhc_web/modules/lhuser/avatarbuilder.php"], "fixing_code_end_loc": [67, 5], "fixing_code_start_loc": [66, 4], "message": "livehelperchat is vulnerable to Improper Neutralizatio... | 111 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient matching and selection dialog.\n *\n * @package OpenEMR\n * @link https://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2013-2015 Rod Roark <rod@sunsetsystems.com>\n * @copyrigh... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Patient report\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2017-2018 Brady Miller <brady.g.miller@gmail.com>\n * @author Stephen Nielson <stephen@nielson.org>\n * @copyright Copyright (c)... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * Multi-Factor Authentication Management\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copy... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * App Based TOTP Support\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Anthony Zullo <anthonykzullo@gmail.com>\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2019 Anthony Zullo ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * FIDO U2F Support Module\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Rod Roark <rod@sunsetsystems.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @copyright Copyright (c) 2018 Rod Roark <rod@sunsetsystems.com>\n * @copyright Copyright (c) 2018 ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php",
"/**\n * This script Assign acl 'Emergency login'.\n *\n * @package OpenEMR\n * @link http://www.open-emr.org\n * @author Roberto Vasquez <robertogagliotta@gmail.com>\n * @author Brady Miller <brady.g.miller@gmail.com>\n * @author Daniel Pflieger <daniel@mi-squared.com> <daniel@growlingfl... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [56, 333, 169, 174, 105, 286], "buggy_code_start_loc": [55, 332, 139, 112, 104, 280], "filenames": ["interface/orders/patient_match_dialog.php", "interface/patient_file/report/patient_report.php", "interface/usergroup/mfa_registrations.php", "interface/usergroup/mfa_totp.php", "interface/usergrou... | 112 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/perl",
"package Catalyst::Plugin::Session;",
"use Moose;\nwith 'MooseX::Emulate::Class::Accessor::Fast';\nuse MRO::Compat;\nuse Catalyst::Exception ();\nuse Digest ();\nuse overload ();\nuse Object::Signature ();",
"",
"use Carp;\nuse List::Util qw/ max /;",
"use name... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [482], "buggy_code_start_loc": [11], "filenames": ["lib/Catalyst/Plugin/Session.pm"], "fixing_code_end_loc": [485], "fixing_code_start_loc": [12], "message": "A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the functio... | 113 |
Determine whether the {function_name} code is vulnerable or not. | [
"#!/usr/bin/perl",
"package Catalyst::Plugin::Session;",
"use Moose;\nwith 'MooseX::Emulate::Class::Accessor::Fast';\nuse MRO::Compat;\nuse Catalyst::Exception ();\nuse Digest ();\nuse overload ();\nuse Object::Signature ();",
"use HTML::Entities ();",
"use Carp;\nuse List::Ut... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [482], "buggy_code_start_loc": [11], "filenames": ["lib/Catalyst/Plugin/Session.pm"], "fixing_code_end_loc": [485], "fixing_code_start_loc": [12], "message": "A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the functio... | 113 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2007 Oracle. All rights reserved.\n *\n * This software is available to you under a choice of one of two\n * licenses. You may choose to be licensed under the terms of the GNU\n * General Public License (GPL) Version 2, available from the file\n * COPYING in the main directory of this source... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [527], "buggy_code_start_loc": [527], "filenames": ["net/rds/rdma.c"], "fixing_code_end_loc": [531], "fixing_code_start_loc": [528], "message": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a he... | 114 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright (c) 2007 Oracle. All rights reserved.\n *\n * This software is available to you under a choice of one of two\n * licenses. You may choose to be licensed under the terms of the GNU\n * General Public License (GPL) Version 2, available from the file\n * COPYING in the main directory of this source... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [527], "buggy_code_start_loc": [527], "filenames": ["net/rds/rdma.c"], "fixing_code_end_loc": [531], "fixing_code_start_loc": [528], "message": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a he... | 114 |
Determine whether the {function_name} code is vulnerable or not. | [
"<html>\n\t<head>\n\t\t<?php include('parts/head.html.part'); ?>\n\t</head>\n\t<body class=\"vflex\">\n\t\t<div class=\"header hflex\">\n\t\t\t<?php include('parts/header.html.part'); ?>\n\t\t</div>\n\t\t<div class=\"center hflex\">\n\t\t\t<div class=\"page\">",
"\t\t\t\t<?php include('pages/' . array_merge(array... | [
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [12], "buggy_code_start_loc": [11], "filenames": ["index.php"], "fixing_code_end_loc": [23], "fixing_code_start_loc": [11], "message": "A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of th... | 115 |
Determine whether the {function_name} code is vulnerable or not. | [
"<html>\n\t<head>\n\t\t<?php include('parts/head.html.part'); ?>\n\t</head>\n\t<body class=\"vflex\">\n\t\t<div class=\"header hflex\">\n\t\t\t<?php include('parts/header.html.part'); ?>\n\t\t</div>\n\t\t<div class=\"center hflex\">\n\t\t\t<div class=\"page\">",
"\t\t\t\t<?php\n\t\t\t\t\t$page_spec = array_merge(... | [
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [12], "buggy_code_start_loc": [11], "filenames": ["index.php"], "fixing_code_end_loc": [23], "fixing_code_start_loc": [11], "message": "A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of th... | 115 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.1\" encoding=\"UTF-8\"?>",
"<!--\n * See the NOTICE file distributed with this work for additional\n * information regarding copyright ownership.\n *\n * This is free software; you can redistribute it and/or modify it\n * under the terms of the GNU Lesser General Public License as\n * published... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [207], "buggy_code_start_loc": [203], "filenames": ["xwiki-platform-core/xwiki-platform-icon/xwiki-platform-icon-ui/src/main/resources/IconThemesCode/IconPickerMacro.xml"], "fixing_code_end_loc": [207], "fixing_code_start_loc": [203], "message": "xwiki-platform-icon-ui is vulnerable to Improper N... | 116 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?xml version=\"1.1\" encoding=\"UTF-8\"?>",
"<!--\n * See the NOTICE file distributed with this work for additional\n * information regarding copyright ownership.\n *\n * This is free software; you can redistribute it and/or modify it\n * under the terms of the GNU Lesser General Public License as\n * published... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [207], "buggy_code_start_loc": [203], "filenames": ["xwiki-platform-core/xwiki-platform-icon/xwiki-platform-icon-ui/src/main/resources/IconThemesCode/IconPickerMacro.xml"], "fixing_code_end_loc": [207], "fixing_code_start_loc": [203], "message": "xwiki-platform-icon-ui is vulnerable to Improper N... | 116 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-only\n/*\n * Xen event channels\n *\n * Xen models interrupts with abstract event channels. Because each\n * domain gets 1024 event channels, but NR_IRQ is not that large, we\n * must dynamically map irqs<->event channels. The event channels\n * interface with the rest of the ... | [
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1245], "buggy_code_start_loc": [35], "filenames": ["drivers/xen/events/events_base.c"], "fixing_code_end_loc": [1277], "fixing_code_start_loc": [36], "message": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows ev... | 117 |
Determine whether the {function_name} code is vulnerable or not. | [
"// SPDX-License-Identifier: GPL-2.0-only\n/*\n * Xen event channels\n *\n * Xen models interrupts with abstract event channels. Because each\n * domain gets 1024 event channels, but NR_IRQ is not that large, we\n * must dynamically map irqs<->event channels. The event channels\n * interface with the rest of the ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1245], "buggy_code_start_loc": [35], "filenames": ["drivers/xen/events/events_base.c"], "fixing_code_end_loc": [1277], "fixing_code_start_loc": [36], "message": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows ev... | 117 |
Determine whether the {function_name} code is vulnerable or not. | [
"var http = require('http');\nvar fs = require('fs');",
"",
"\nfs.exists = fs.exists || require('path').exists;",
"var SERVER_PORT = 8080;",
"var FILE_TYPE_GZIP = 1;",
"var FILE_EXT_GZIP = '.gz';\nvar FILE_EXT_CSS = '.css';\nvar FILE_EXT_JS = '.js';",
"// GZIP text/plain required to get Chrome XHR to de... | [
1,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39], "buggy_code_start_loc": [2], "filenames": ["http-server.js"], "fixing_code_end_loc": [57], "fixing_code_start_loc": [3], "message": "A vulnerability was found in saxman maps-js-icoads and classified as critical. This issue affects some unknown processing of the file http-server.js. The mani... | 118 |
Determine whether the {function_name} code is vulnerable or not. | [
"var http = require('http');\nvar fs = require('fs');",
"var path = require('path');",
"\nfs.exists = fs.exists || require('path').exists;",
"var SERVER_PORT = 8080;",
"var FILE_TYPE_GZIP = 1;",
"var FILE_EXT_GZIP = '.gz';\nvar FILE_EXT_CSS = '.css';\nvar FILE_EXT_JS = '.js';",
"// GZIP text/plain requi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [39], "buggy_code_start_loc": [2], "filenames": ["http-server.js"], "fixing_code_end_loc": [57], "fixing_code_start_loc": [3], "message": "A vulnerability was found in saxman maps-js-icoads and classified as critical. This issue affects some unknown processing of the file http-server.js. The mani... | 118 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n +----------------------------------------------------------------------+\n | Swoole |\n +----------------------------------------------------------------------+\n | This source file is subject to version 2.0 of the Apache license, |\n | tha... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0... | PreciseBugs | {"buggy_code_end_loc": [1531], "buggy_code_start_loc": [54], "filenames": ["swoole_serialize.c"], "fixing_code_end_loc": [1541], "fixing_code_start_loc": [55], "message": "The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized objec... | 119 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n +----------------------------------------------------------------------+\n | Swoole |\n +----------------------------------------------------------------------+\n | This source file is subject to version 2.0 of the Apache license, |\n | tha... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [1531], "buggy_code_start_loc": [54], "filenames": ["swoole_serialize.c"], "fixing_code_end_loc": [1541], "fixing_code_start_loc": [55], "message": "The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized objec... | 119 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include <config.h>",
"#include \"ftpd.h\"\n#include \"utils.h\"",
"#ifdef WITH_DMALLOC\n# include <dmalloc.h>\n#endif",
"#ifdef HAVE_LIBSODIUM\n# if !defined(pure_memzero) || !defined(pure_memcmp)\n# error pure_memzero/pure_memcmp not defined\n# endif\n#else",
"void pure_memzero(void * const pnt, const s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [49], "buggy_code_start_loc": [48], "filenames": ["src/utils.c"], "fixing_code_end_loc": [55], "fixing_code_start_loc": [48], "message": "An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.", "other": {"cve": {"cisaAct... | 120 |
Determine whether the {function_name} code is vulnerable or not. | [
"#include <config.h>",
"#include \"ftpd.h\"\n#include \"utils.h\"",
"#ifdef WITH_DMALLOC\n# include <dmalloc.h>\n#endif",
"#ifdef HAVE_LIBSODIUM\n# if !defined(pure_memzero) || !defined(pure_memcmp)\n# error pure_memzero/pure_memcmp not defined\n# endif\n#else",
"void pure_memzero(void * const pnt, const s... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [49], "buggy_code_start_loc": [48], "filenames": ["src/utils.c"], "fixing_code_end_loc": [55], "fixing_code_start_loc": [48], "message": "An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.", "other": {"cve": {"cisaAct... | 120 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2018 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2018 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2018 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2018 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright © 2014-2019 Red Hat, Inc\n *\n * This program is free software; you can redistribute it and/or\n * modify it under the terms of the GNU Lesser General Public\n * License as published by the Free Software Foundation; either\n * version 2.1 of the License, or (at your option) any later version.\n *\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [75, 276, 4127], "buggy_code_start_loc": [45, 111, 1465], "filenames": ["common/flatpak-bwrap-private.h", "common/flatpak-bwrap.c", "common/flatpak-run.c"], "fixing_code_end_loc": [79, 320, 4124], "fixing_code_start_loc": [46, 112, 1464], "message": "Flatpak is a system for building, distributing... | 121 |
Determine whether the {function_name} code is vulnerable or not. | [
"",
"2016-05-03 7.0.1-1 Cristy <quetzlzacatenango@image...>\n * New version 7.0.1-1, GIT revision 10723:9fc8a0c:20160503.",
"2016-05-03 7.0.1-1 Cristy <quetzlzacatenango@image...>\n * Sanitize input filename for http / https delegates (improved patch).\n * Fix for possible security vulnerabilities (refer... | [
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 6060], "buggy_code_start_loc": [0, 1434], "filenames": ["ChangeLog", "MagickCore/draw.c"], "fixing_code_end_loc": [4, 6073], "fixing_code_start_loc": [1, 1434], "message": "The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calcul... | 122 |
Determine whether the {function_name} code is vulnerable or not. | [
"2016-05-04 7.0.1-2 Cristy <quetzlzacatenango@image...>\n * Check for buffer overflow in magick/draw.c/DrawStrokePolygon().\n",
"2016-05-03 7.0.1-1 Cristy <quetzlzacatenango@image...>\n * New version 7.0.1-1, GIT revision 10723:9fc8a0c:20160503.",
"2016-05-03 7.0.1-1 Cristy <quetzlzacatenango@image...>\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [0, 6060], "buggy_code_start_loc": [0, 1434], "filenames": ["ChangeLog", "MagickCore/draw.c"], "fixing_code_end_loc": [4, 6073], "fixing_code_start_loc": [1, 1434], "message": "The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calcul... | 122 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 6060], "buggy_code_start_loc": [0, 1434], "filenames": ["ChangeLog", "MagickCore/draw.c"], "fixing_code_end_loc": [4, 6073], "fixing_code_start_loc": [1, 1434], "message": "The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calcul... | 122 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\n% %\n% %\n% ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [0, 6060], "buggy_code_start_loc": [0, 1434], "filenames": ["ChangeLog", "MagickCore/draw.c"], "fixing_code_end_loc": [4, 6073], "fixing_code_start_loc": [1, 1434], "message": "The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calcul... | 122 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n# MantisBT - A PHP based bugtracking system",
"# MantisBT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation, either version 2 of the License, or\n# (at your option) any later version.\n#\n# Mantis... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [303], "buggy_code_start_loc": [183], "filenames": ["account_sponsor_page.php"], "fixing_code_end_loc": [303], "fixing_code_start_loc": [183], "message": "Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inj... | 123 |
Determine whether the {function_name} code is vulnerable or not. | [
"<?php\n# MantisBT - A PHP based bugtracking system",
"# MantisBT is free software: you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation, either version 2 of the License, or\n# (at your option) any later version.\n#\n# Mantis... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [303], "buggy_code_start_loc": [183], "filenames": ["account_sponsor_page.php"], "fixing_code_end_loc": [303], "fixing_code_start_loc": [183], "message": "Cross-site scripting (XSS) vulnerability in account_sponsor_page.php in MantisBT 1.0.0 through 1.2.15 allows remote authenticated users to inj... | 123 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
0,
0,
0,
0,
0,
0,
0,
1,
1,
0,
1,
1,
0,
0,
0,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1,
0,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
0,
1,
1,
1,
0,
0,
1,
0,
1,
1,
1,
1,
0,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
0,
0,
1,
0,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
0,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
0,
1,
1,
1,
1,
1,
0,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Determine whether the {function_name} code is vulnerable or not. | [
"/*\n * Copyright 2020 ThoughtWorks, Inc.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\");\n * you may not use this file except in compliance with the License.\n * You may obtain a copy of the License at\n *\n * http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by appli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | PreciseBugs | {"buggy_code_end_loc": [138, 126, 343, 39, 395, 185, 209, 188, 69, 72, 97, 85, 72, 44, 35, 179, 204, 89], "buggy_code_start_loc": [137, 101, 71, 21, 332, 183, 35, 24, 28, 29, 61, 56, 28, 21, 20, 32, 52, 22], "filenames": ["api/api-server-maintenance-mode-v1/src/test/groovy/com/thoughtworks/go/apiv1/servermaintenancemod... | 124 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.