prompt
stringclasses
1 value
completions
listlengths
2
1.33k
labels
listlengths
2
1.33k
source
stringclasses
1 value
other_info
dict
index
int64
0
719
cwe
stringclasses
9 values
language
stringclasses
6 values
Determine whether the {function_name} code is vulnerable or not.
[ "tar_directory_for_file (GsfInfileTar *dir, const char *name, gboolean last)\n{\n\tconst char *s = name;", "\twhile (1) {\n\t\tconst char *s0 = s;\n\t\tchar *dirname;", "\t\t/* Find a directory component, if any. */\n\t\twhile (1) {\n\t\t\tif (*s == 0) {\n\t\t\t\tif (last && s != s0)\n\t\t\t\t\tbreak;\n\t\t\t\...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 676, "char_start": 596, "chars": "dir = GSF_IS_INFILE_TAR (subdir)\n\t\t\t\t\t? GSF_INFILE_TAR (subdir)\n\t\t\t\t\t: dir;\n\t\t\t\t" } ], "deleted": [ { "char_end": 669, "char_start": 634, "chars...
650
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "tar_directory_for_file (GsfInfileTar *dir, const char *name, gboolean last)\n{\n\tconst char *s = name;", "\twhile (1) {\n\t\tconst char *s0 = s;\n\t\tchar *dirname;", "\t\t/* Find a directory component, if any. */\n\t\twhile (1) {\n\t\t\tif (*s == 0) {\n\t\t\t\tif (last && s != s0)\n\t\t\t\t\tbreak;\n\t\t\t\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 676, "char_start": 596, "chars": "dir = GSF_IS_INFILE_TAR (subdir)\n\t\t\t\t\t? GSF_INFILE_TAR (subdir)\n\t\t\t\t\t: dir;\n\t\t\t\t" } ], "deleted": [ { "char_end": 669, "char_start": 634, "chars...
650
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)\n{\n\tstruct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);\n\tstruct skcipher_alg *alg = crypto_skcipher_alg(skcipher);", "\tif (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)\n\t\treturn crypto_init_skcipher_ops_blkcipher(tfm);", "\ti...
[ 1, 1, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 493, "char_start": 484, "chars": "skcipher_" } ], "deleted": [ { "char_end": 489, "char_start": 484, "chars": "alg->" } ] }, "commit_link": "github.com/torvalds/linux/commit/9933e11...
651
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)\n{\n\tstruct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);\n\tstruct skcipher_alg *alg = crypto_skcipher_alg(skcipher);", "\tif (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)\n\t\treturn crypto_init_skcipher_ops_blkcipher(tfm);", "\ti...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 493, "char_start": 484, "chars": "skcipher_" } ], "deleted": [ { "char_end": 489, "char_start": 484, "chars": "alg->" } ] }, "commit_link": "github.com/torvalds/linux/commit/9933e11...
651
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int __init fm10k_init_module(void)\n{\n\tpr_info(\"%s - version %s\\n\", fm10k_driver_string, fm10k_driver_version);\n\tpr_info(\"%s\\n\", fm10k_copyright);", "\t/* create driver workqueue */\n\tfm10k_workqueue = alloc_workqueue(\"%s\", WQ_MEM_RECLAIM, 0,\n\t\t\t\t\t fm10k_driver_name);", "", "\n\tfm...
[ 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 313, "char_start": 272, "chars": "\tif (!fm10k_workqueue)\n\t\treturn -ENOMEM;\n" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f", "file_name": "drivers/n...
652
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int __init fm10k_init_module(void)\n{\n\tpr_info(\"%s - version %s\\n\", fm10k_driver_string, fm10k_driver_version);\n\tpr_info(\"%s\\n\", fm10k_copyright);", "\t/* create driver workqueue */\n\tfm10k_workqueue = alloc_workqueue(\"%s\", WQ_MEM_RECLAIM, 0,\n\t\t\t\t\t fm10k_driver_name);", "\tif (!fm10k...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 313, "char_start": 272, "chars": "\tif (!fm10k_workqueue)\n\t\treturn -ENOMEM;\n" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f", "file_name": "drivers/n...
652
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void parse_class(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c,\n\t\t\t int class_index, int *methods, int *sym_count) {\n\tstruct r_bin_t *rbin = binfile->rbin;", "\tchar *class_name;\n\tint z;\n\tconst ut8 *p, *p_end;", "\tif (!c) {\n\t\treturn;\n\t}", "\tclass_name = dex_class_name (bin, c);\...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1457, "char_start": 1456, "chars": " " } ], "deleted": [] }, "commit_link": "github.com/radare/radare2/commit/1ea23bd6040441a21fbcfba69dce9a01af03f989", "file_name": "libr/bin/p/bin_dex.c", "func_name": "parse_class",...
653
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void parse_class(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c,\n\t\t\t int class_index, int *methods, int *sym_count) {\n\tstruct r_bin_t *rbin = binfile->rbin;", "\tchar *class_name;\n\tint z;\n\tconst ut8 *p, *p_end;", "\tif (!c) {\n\t\treturn;\n\t}", "\tclass_name = dex_class_name (bin, c);\...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1457, "char_start": 1456, "chars": " " } ], "deleted": [] }, "commit_link": "github.com/radare/radare2/commit/1ea23bd6040441a21fbcfba69dce9a01af03f989", "file_name": "libr/bin/p/bin_dex.c", "func_name": "parse_class",...
653
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "lexer_process_char_literal (parser_context_t *context_p, /**< context */\n const uint8_t *char_p, /**< characters */\n size_t length, /**< length of string */\n uint8_t literal_type, /**< final literal type */\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1610, "char_start": 1558, "chars": "if (length == 0)\n {\n has_escape = false;\n }\n\n " } ], "deleted": [] }, "commit_link": "github.com/jerryscript-project/jerryscript/commit/e58f2880df608652aff7fd35c45b242467ec0e...
654
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "lexer_process_char_literal (parser_context_t *context_p, /**< context */\n const uint8_t *char_p, /**< characters */\n size_t length, /**< length of string */\n uint8_t literal_type, /**< final literal type */\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1610, "char_start": 1558, "chars": "if (length == 0)\n {\n has_escape = false;\n }\n\n " } ], "deleted": [] }, "commit_link": "github.com/jerryscript-project/jerryscript/commit/e58f2880df608652aff7fd35c45b242467ec0e...
654
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "mrb_obj_clone(mrb_state *mrb, mrb_value self)\n{\n struct RObject *p;\n mrb_value clone;", " if (mrb_immediate_p(self)) {\n mrb_raisef(mrb, E_TYPE_ERROR, \"can't clone %S\", self);\n }\n if (mrb_type(self) == MRB_TT_SCLASS) {\n mrb_raise(mrb, E_TYPE_ERROR, \"can't clone singleton class\");\n }\n p =...
[ 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 569, "char_start": 568, "chars": "|" }, { "char_end": 616, "char_start": 595, "chars": " & MRB_FLAG_IS_FROZEN" } ], "deleted": [] }, "commit_link": "github.com/mruby/mruby/commit/55edae...
655
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "mrb_obj_clone(mrb_state *mrb, mrb_value self)\n{\n struct RObject *p;\n mrb_value clone;", " if (mrb_immediate_p(self)) {\n mrb_raisef(mrb, E_TYPE_ERROR, \"can't clone %S\", self);\n }\n if (mrb_type(self) == MRB_TT_SCLASS) {\n mrb_raise(mrb, E_TYPE_ERROR, \"can't clone singleton class\");\n }\n p =...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 569, "char_start": 568, "chars": "|" }, { "char_end": 616, "char_start": 595, "chars": " & MRB_FLAG_IS_FROZEN" } ], "deleted": [] }, "commit_link": "github.com/mruby/mruby/commit/55edae...
655
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int __init big_key_init(void)\n{", "\treturn register_key_type(&key_type_big_key);", "}" ]
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 42, "char_start": 40, "chars": "st" }, { "char_end": 68, "char_start": 43, "chars": "uct crypto_skcipher *ciph" }, { "char_end": 74, "char_start": 69, "chars": "r;\n\t...
656
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int __init big_key_init(void)\n{", "\tstruct crypto_skcipher *cipher;\n\tstruct crypto_rng *rng;\n\tint ret;", "\trng = crypto_alloc_rng(big_key_rng_name, 0, 0);\n\tif (IS_ERR(rng)) {\n\t\tpr_err(\"Can't alloc rng: %ld\\n\", PTR_ERR(rng));\n\t\treturn PTR_ERR(rng);\n\t}", "\tbig_key_rng = rng;", "\t...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 42, "char_start": 40, "chars": "st" }, { "char_end": 68, "char_start": 43, "chars": "uct crypto_skcipher *ciph" }, { "char_end": 74, "char_start": 69, "chars": "r;\n\t...
656
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int flattenSubquery(\n Parse *pParse, /* Parsing context */\n Select *p, /* The parent or outer SELECT statement */\n int iFrom, /* Index in p->pSrc->a[] of the inner subquery */\n int isAgg /* True if outer SELECT uses aggregate functions */\n){\n const char *zSave...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3753, "char_start": 3719, "chars": " /* (3a) */\n " }, { "char_end": 3806, "char_start": 3762, "chars": " /* (3b) */\n " }, { "char...
657
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int flattenSubquery(\n Parse *pParse, /* Parsing context */\n Select *p, /* The parent or outer SELECT statement */\n int iFrom, /* Index in p->pSrc->a[] of the inner subquery */\n int isAgg /* True if outer SELECT uses aggregate functions */\n){\n const char *zSave...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3753, "char_start": 3719, "chars": " /* (3a) */\n " }, { "char_end": 3806, "char_start": 3762, "chars": " /* (3b) */\n " }, { "char...
657
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge)\n{\n bool ok;\n XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL };\n enum xkb_file_type type;\n struct xkb_context *ctx = keymap->ctx;", " /* Collect section files and check for duplicates. */\n for (file = (XkbFi...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 691, "char_start": 501, "chars": "if (file->file_type == FILE_TYPE_GEOMETRY) {\n log_vrb(ctx, 1,\n \"Geometry sections are not supported; ignoring\\n\");\n } else {\n " ...
658
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge)\n{\n bool ok;\n XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL };\n enum xkb_file_type type;\n struct xkb_context *ctx = keymap->ctx;", " /* Collect section files and check for duplicates. */\n for (file = (XkbFi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 691, "char_start": 501, "chars": "if (file->file_type == FILE_TYPE_GEOMETRY) {\n log_vrb(ctx, 1,\n \"Geometry sections are not supported; ignoring\\n\");\n } else {\n " ...
658
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf,\n size_t size)\n{\n GetBitContext gb;\n AC3HeaderInfo *hdr;\n int err;", " if (!*phdr)\n *phdr = av_mallocz(sizeof(AC3HeaderInfo));\n if (!*phdr)\n return AVERROR(ENOMEM);\n hdr = *phd...
[ 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 316, "char_start": 310, "chars": "err = " }, { "char_end": 399, "char_start": 346, "chars": ";\n if (err < 0)\n return AVERROR_INVALIDDATA" } ], "deleted": [] }, "commit_link"...
659
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf,\n size_t size)\n{\n GetBitContext gb;\n AC3HeaderInfo *hdr;\n int err;", " if (!*phdr)\n *phdr = av_mallocz(sizeof(AC3HeaderInfo));\n if (!*phdr)\n return AVERROR(ENOMEM);\n hdr = *phd...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 316, "char_start": 310, "chars": "err = " }, { "char_end": 399, "char_start": 346, "chars": ";\n if (err < 0)\n return AVERROR_INVALIDDATA" } ], "deleted": [] }, "commit_link"...
659
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int mailimf_group_parse(const char * message, size_t length,\n\t\t\t size_t * indx,\n\t\t\t struct mailimf_group ** result)\n{\n size_t cur_token;\n char * display_name;\n struct mailimf_mailbox_list * mailbox_list;\n struct mailimf_group * group;\n int r;\n int res;", "", "\n cur_tok...
[ 1, 0, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 294, "char_start": 278, "chars": " clist * list;\n" }, { "char_end": 1203, "char_start": 908, "chars": ";\n goto free_display_name;\n }\n list = clist_new();\n if (list == NULL) {\n r...
660
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int mailimf_group_parse(const char * message, size_t length,\n\t\t\t size_t * indx,\n\t\t\t struct mailimf_group ** result)\n{\n size_t cur_token;\n char * display_name;\n struct mailimf_mailbox_list * mailbox_list;\n struct mailimf_group * group;\n int r;\n int res;", " clist * list;",...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 294, "char_start": 278, "chars": " clist * list;\n" }, { "char_end": 1203, "char_start": 908, "chars": ";\n goto free_display_name;\n }\n list = clist_new();\n if (list == NULL) {\n r...
660
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void srpt_handle_tsk_mgmt(struct srpt_rdma_ch *ch,\n\t\t\t\t struct srpt_recv_ioctx *recv_ioctx,\n\t\t\t\t struct srpt_send_ioctx *send_ioctx)\n{\n\tstruct srp_tsk_mgmt *srp_tsk;\n\tstruct se_cmd *cmd;\n\tstruct se_session *sess = ch->sess;\n\tuint64_t unpacked_lun;", "\tuint32_t tag = 0;", "\tint tcm_t...
[ 1, 0, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 884, "char_start": 870, "chars": "srp_tsk->task_" } ], "deleted": [ { "char_end": 275, "char_start": 256, "chars": "uint32_t tag = 0;\n\t" }, { "char_end": 814, "char_...
661
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void srpt_handle_tsk_mgmt(struct srpt_rdma_ch *ch,\n\t\t\t\t struct srpt_recv_ioctx *recv_ioctx,\n\t\t\t\t struct srpt_send_ioctx *send_ioctx)\n{\n\tstruct srp_tsk_mgmt *srp_tsk;\n\tstruct se_cmd *cmd;\n\tstruct se_session *sess = ch->sess;\n\tuint64_t unpacked_lun;", "", "\tint tcm_tmr;\n\tint rc;", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 884, "char_start": 870, "chars": "srp_tsk->task_" } ], "deleted": [ { "char_end": 275, "char_start": 256, "chars": "uint32_t tag = 0;\n\t" }, { "char_end": 814, "char_...
661
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,\n xkb_mod_mask_t *mods_rtrn, CompatInfo *info)\n{\n if (expr == NULL) {\n *pred_rtrn = MATCH_ANY_OR_NONE;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }", " *pred_rtrn = MATCH_...
[ 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 542, "char_start": 508, "chars": " ||\n !expr->action.args" } ], "deleted": [] }, "commit_link": "github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d", "file_name": "src/xkbcomp/...
662
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,\n xkb_mod_mask_t *mods_rtrn, CompatInfo *info)\n{\n if (expr == NULL) {\n *pred_rtrn = MATCH_ANY_OR_NONE;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }", " *pred_rtrn = MATCH_...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 542, "char_start": 508, "chars": " ||\n !expr->action.args" } ], "deleted": [] }, "commit_link": "github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d", "file_name": "src/xkbcomp/...
662
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)\n{\n\tint r;", "\tstatic const char resp[] =\n\t\t\"<u:%sResponse \"\n\t\t\"xmlns:u=\\\"%s\\\">\"\n\t\t\"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>\"\n\t\t\"</u:%sResponse>\";", "\tchar body[512];\n\tint bodylen;\n\ts...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1029, "char_start": 904, "chars": "if (!int_port || !ext_port || !protocol)\n\t{\n\t\tClearNameValueList(&data);\n\t\tSoapError(h, 402, \"Invalid Args\");\n\t\treturn;\n\t}\n\n\t" } ], "deleted": [] }, "commit_link": "git...
663
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)\n{\n\tint r;", "\tstatic const char resp[] =\n\t\t\"<u:%sResponse \"\n\t\t\"xmlns:u=\\\"%s\\\">\"\n\t\t\"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>\"\n\t\t\"</u:%sResponse>\";", "\tchar body[512];\n\tint bodylen;\n\ts...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1029, "char_start": 904, "chars": "if (!int_port || !ext_port || !protocol)\n\t{\n\t\tClearNameValueList(&data);\n\t\tSoapError(h, 402, \"Invalid Args\");\n\t\treturn;\n\t}\n\n\t" } ], "deleted": [] }, "commit_link": "git...
663
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "AP4_AtomSampleTable::GetSample(AP4_Ordinal index, \n AP4_Sample& sample)\n{\n AP4_Result result;", " // check that we have an stsc atom\n if (!m_StscAtom) {\n return AP4_ERROR_INVALID_FORMAT;\n }\n \n // check that we have a chunk offset table\n if (m_Stc...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1810, "char_start": 1784, "chars": "if (m_SttsAtom) {\n " }, { "char_end": 1870, "char_start": 1866, "chars": " " }, { "char_end": 1914, "char_start": 1908, ...
664
cwe-476
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "AP4_AtomSampleTable::GetSample(AP4_Ordinal index, \n AP4_Sample& sample)\n{\n AP4_Result result;", " // check that we have an stsc atom\n if (!m_StscAtom) {\n return AP4_ERROR_INVALID_FORMAT;\n }\n \n // check that we have a chunk offset table\n if (m_Stc...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1810, "char_start": 1784, "chars": "if (m_SttsAtom) {\n " }, { "char_end": 1870, "char_start": 1866, "chars": " " }, { "char_end": 1914, "char_start": 1908, ...
664
cwe-476
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "acc_ctx_cont(OM_uint32 *minstat,\n\t gss_buffer_t buf,\n\t gss_ctx_id_t *ctx,\n\t gss_buffer_t *responseToken,\n\t gss_buffer_t *mechListMIC,\n\t OM_uint32 *negState,\n\t send_token_flag *return_token)\n{\n\tOM_uint32 ret, tmpmin;\n\tgss_OID supportedMech;\n\tspnego_gss_ctx_id_t sc;\n\tunsi...
[ 1, 1, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 662, "char_start": 647, "chars": "== 0 || REMAIN " } ], "deleted": [] }, "commit_link": "github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b", "file_name": "src/lib/gssapi/spnego/spnego_mech.c", "func...
665
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "acc_ctx_cont(OM_uint32 *minstat,\n\t gss_buffer_t buf,\n\t gss_ctx_id_t *ctx,\n\t gss_buffer_t *responseToken,\n\t gss_buffer_t *mechListMIC,\n\t OM_uint32 *negState,\n\t send_token_flag *return_token)\n{\n\tOM_uint32 ret, tmpmin;\n\tgss_OID supportedMech;\n\tspnego_gss_ctx_id_t sc;\n\tunsi...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 662, "char_start": 647, "chars": "== 0 || REMAIN " } ], "deleted": [] }, "commit_link": "github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b", "file_name": "src/lib/gssapi/spnego/spnego_mech.c", "func...
665
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,\n\t\t\t struct mschmd_header *chm, int entire)\n{\n unsigned int section, name_len, x, errors, num_chunks;\n unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;\n struct mschmd_file *fi, *link = NULL;\n off_t offset, lengt...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6254, "char_start": 6116, "chars": ";\n\n /* ignore blank or one-char (e.g. \"/\") filenames we'd return as blank */\n if (name_len < 2 || !name[0] || !name[1]) continue" } ], "deleted": [ { "char_end"...
666
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,\n\t\t\t struct mschmd_header *chm, int entire)\n{\n unsigned int section, name_len, x, errors, num_chunks;\n unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;\n struct mschmd_file *fi, *link = NULL;\n off_t offset, lengt...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6254, "char_start": 6116, "chars": ";\n\n /* ignore blank or one-char (e.g. \"/\") filenames we'd return as blank */\n if (name_len < 2 || !name[0] || !name[1]) continue" } ], "deleted": [ { "char_end"...
666
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "filter_session_io(struct io *io, int evt, void *arg)\n{\n\tstruct filter_session *fs = arg;\n\tchar *line = NULL;\n\tssize_t len;", "\tlog_trace(TRACE_IO, \"filter session: %p: %s %s\", fs, io_strevent(evt),\n\t io_strio(io));", "\tswitch (evt) {\n\tcase IO_DATAIN:\n\tnextline:\n\t\tline = io_getline(fs->io...
[ 1, 1, 1, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [], "deleted": [ { "char_end": 478, "char_start": 409, "chars": "\n\tcase IO_DISCONNECTED:\n\t\tio_free(fs->io);\n\t\tfs->io = NULL;\n\t\tbreak;\n" } ] }, "commit_link": "github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903...
667
cwe-476
sbin/smtpd/lka_filter
Determine whether the {function_name} code is vulnerable or not.
[ "filter_session_io(struct io *io, int evt, void *arg)\n{\n\tstruct filter_session *fs = arg;\n\tchar *line = NULL;\n\tssize_t len;", "\tlog_trace(TRACE_IO, \"filter session: %p: %s %s\", fs, io_strevent(evt),\n\t io_strio(io));", "\tswitch (evt) {\n\tcase IO_DATAIN:\n\tnextline:\n\t\tline = io_getline(fs->io...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [], "deleted": [ { "char_end": 478, "char_start": 409, "chars": "\n\tcase IO_DISCONNECTED:\n\t\tio_free(fs->io);\n\t\tfs->io = NULL;\n\t\tbreak;\n" } ] }, "commit_link": "github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903...
667
cwe-476
sbin/smtpd/lka_filter
Determine whether the {function_name} code is vulnerable or not.
[ "int x86_decode_insn(struct x86_emulate_ctxt *ctxt, void *insn, int insn_len)\n{\n\tint rc = X86EMUL_CONTINUE;\n\tint mode = ctxt->mode;\n\tint def_op_bytes, def_ad_bytes, goffset, simd_prefix;\n\tbool op_prefix = false;\n\tbool has_seg_override = false;\n\tstruct opcode opcode;", "\tctxt->memop.type = OP_NONE;\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6463, "char_start": 6439, "chars": " && likely(ctxt->memopp)" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e", "file_name": "arch/x86/kvm/emulate.c", "f...
668
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "int x86_decode_insn(struct x86_emulate_ctxt *ctxt, void *insn, int insn_len)\n{\n\tint rc = X86EMUL_CONTINUE;\n\tint mode = ctxt->mode;\n\tint def_op_bytes, def_ad_bytes, goffset, simd_prefix;\n\tbool op_prefix = false;\n\tbool has_seg_override = false;\n\tstruct opcode opcode;", "\tctxt->memop.type = OP_NONE;\n...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6463, "char_start": 6439, "chars": " && likely(ctxt->memopp)" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e", "file_name": "arch/x86/kvm/emulate.c", "f...
668
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "int expand_downwards(struct vm_area_struct *vma,\n\t\t\t\t unsigned long address)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\tstruct vm_area_struct *prev;", "\tint error;", "\n\taddress &= PAGE_MASK;", "\terror = security_mmap_addr(address);\n\tif (error)\n\t\treturn error;", "\n\t/* Enforce stack_guard_...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 161, "char_start": 157, "chars": " = 0" }, { "char_end": 195, "char_start": 188, "chars": "if (add" }, { "char_end": 199, "char_start": 196, "chars": "ess" }, ...
669
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "int expand_downwards(struct vm_area_struct *vma,\n\t\t\t\t unsigned long address)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\tstruct vm_area_struct *prev;", "\tint error = 0;", "\n\taddress &= PAGE_MASK;", "\tif (address < mmap_min_addr)\n\t\treturn -EPERM;", "\n\t/* Enforce stack_guard_gap */\n\tprev = ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 161, "char_start": 157, "chars": " = 0" }, { "char_end": 195, "char_start": 188, "chars": "if (add" }, { "char_end": 199, "char_start": 196, "chars": "ess" }, ...
669
cwe-476
c
Determine whether the {function_name} code is vulnerable or not.
[ "rfbHandleAuthResult(rfbClient* client)\n{", " uint32_t authResult=0, reasonLen=0;\n char *reason=NULL;", "\n if (!ReadFromRFBServer(client, (char *)&authResult, 4)) return FALSE;", " authResult = rfbClientSwap32IfLE(authResult);", " switch (authResult) {\n case rfbVncAuthOK:\n rfbCli...
[ 1, 0, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 68, "char_start": 68, "chars": "" } ], "deleted": [ { "char_end": 102, "char_start": 66, "chars": ", reasonLen=0;\n char *reason=NULL" }, { "char_end": 502, "char_s...
670
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "rfbHandleAuthResult(rfbClient* client)\n{", " uint32_t authResult=0;", "\n if (!ReadFromRFBServer(client, (char *)&authResult, 4)) return FALSE;", " authResult = rfbClientSwap32IfLE(authResult);", " switch (authResult) {\n case rfbVncAuthOK:\n rfbClientLog(\"VNC authentication succeeded...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 68, "char_start": 68, "chars": "" } ], "deleted": [ { "char_end": 102, "char_start": 66, "chars": ", reasonLen=0;\n char *reason=NULL" }, { "char_end": 502, "char_s...
670
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "jbig2_image_compose(Jbig2Ctx *ctx, Jbig2Image *dst, Jbig2Image *src, int x, int y, Jbig2ComposeOp op)\n{\n uint32_t w, h;\n uint32_t shift;\n uint32_t leftbyte;\n uint8_t *ss;\n uint8_t *dd;\n uint8_t leftmask, rightmask;\n int early = x >= 0;\n int late;\n uint32_t bytewidth;\n uint3...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 617, "char_start": 367, "chars": "if ((UINT32_MAX - src->width < (x > 0 ? x : -x)) ||\n (UINT32_MAX - src->height < (y > 0 ? y : -y)))\n {\n#ifdef JBIG2_DEBUG\n jbig2_error(ctx, JBIG2_SEVERITY_DEBUG, -1, \"overflow in com...
671
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "jbig2_image_compose(Jbig2Ctx *ctx, Jbig2Image *dst, Jbig2Image *src, int x, int y, Jbig2ComposeOp op)\n{\n uint32_t w, h;\n uint32_t shift;\n uint32_t leftbyte;\n uint8_t *ss;\n uint8_t *dd;\n uint8_t leftmask, rightmask;\n int early = x >= 0;\n int late;\n uint32_t bytewidth;\n uint3...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 617, "char_start": 367, "chars": "if ((UINT32_MAX - src->width < (x > 0 ? x : -x)) ||\n (UINT32_MAX - src->height < (y > 0 ? y : -y)))\n {\n#ifdef JBIG2_DEBUG\n jbig2_error(ctx, JBIG2_SEVERITY_DEBUG, -1, \"overflow in com...
671
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "next_state_class(CClassNode* cc, OnigCodePoint* vs, enum CCVALTYPE* type,\n\t\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;", " if (*state == CCS_RANGE)\n return ONIGERR_CHAR_CLASS_VALUE_AT_END_OF_RANGE;", " if (*state == CCS_VALUE && *type != CCV_CLASS) {\n if (*type == CCV_SB)\n BITSET_SET_B...
[ 1, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 487, "char_start": 458, "chars": "if (*state != CCS_START)\n " }, { "char_end": 507, "char_start": 506, "chars": "\n" } ], "deleted": [] }, "commit_link": "github.com/kkos/oniguruma/...
672
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "next_state_class(CClassNode* cc, OnigCodePoint* vs, enum CCVALTYPE* type,\n\t\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;", " if (*state == CCS_RANGE)\n return ONIGERR_CHAR_CLASS_VALUE_AT_END_OF_RANGE;", " if (*state == CCS_VALUE && *type != CCV_CLASS) {\n if (*type == CCV_SB)\n BITSET_SET_B...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 487, "char_start": 458, "chars": "if (*state != CCS_START)\n " }, { "char_end": 507, "char_start": 506, "chars": "\n" } ], "deleted": [] }, "commit_link": "github.com/kkos/oniguruma/...
672
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int mpol_parse_str(char *str, struct mempolicy **mpol)\n{\n\tstruct mempolicy *new = NULL;\n\tunsigned short mode_flags;\n\tnodemask_t nodes;\n\tchar *nodelist = strchr(str, ':');\n\tchar *flags = strchr(str, '=');\n\tint err = 1, mode;", "\tif (flags)\n\t\t*flags++ = '\\0';\t/* terminate mode string */", "\ti...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 798, "char_start": 679, "chars": ", although later\n\t\t * we use first_node(nodes) to grab a single node, so here\n\t\t * nodelist (or nodes) cannot be empty." }, { "char_end": 940, "char_start": 899, "...
673
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int mpol_parse_str(char *str, struct mempolicy **mpol)\n{\n\tstruct mempolicy *new = NULL;\n\tunsigned short mode_flags;\n\tnodemask_t nodes;\n\tchar *nodelist = strchr(str, ':');\n\tchar *flags = strchr(str, '=');\n\tint err = 1, mode;", "\tif (flags)\n\t\t*flags++ = '\\0';\t/* terminate mode string */", "\ti...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 798, "char_start": 679, "chars": ", although later\n\t\t * we use first_node(nodes) to grab a single node, so here\n\t\t * nodelist (or nodes) cannot be empty." }, { "char_end": 940, "char_start": 899, "...
673
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "keycompare_mb (const struct line *a, const struct line *b)\n{\n struct keyfield *key = keylist;", " /* For the first iteration only, the key positions have been\n precomputed for us. */\n char *texta = a->keybeg;\n char *textb = b->keybeg;\n char *lima = a->keylim;\n char *limb = b->keylim;", " size...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6046, "char_start": 5977, "chars": "if (SIZE_MAX - lenb - 2 < lena)\n xalloc_die ();\n " }, { "char_end": 6072, "char_start": 6071, "chars": "n" }, { "char_end": 6...
674
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "keycompare_mb (const struct line *a, const struct line *b)\n{\n struct keyfield *key = keylist;", " /* For the first iteration only, the key positions have been\n precomputed for us. */\n char *texta = a->keybeg;\n char *textb = b->keybeg;\n char *lima = a->keylim;\n char *limb = b->keylim;", " size...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6046, "char_start": 5977, "chars": "if (SIZE_MAX - lenb - 2 < lena)\n xalloc_die ();\n " }, { "char_end": 6072, "char_start": 6071, "chars": "n" }, { "char_end": 6...
674
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,\n\t int* vs_israw, int v_israw,\n\t enum CCVALTYPE intype, enum CCVALTYPE* type,\n\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;", " switch (*state) {\n case CCS_VALUE:\n if (*type == CCV_SB) {", "", " BITSET_S...
[ 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 356, "char_start": 282, "chars": "if (*vs > 0xff)\n return ONIGERR_INVALID_CODE_POINT_VALUE;\n\n " } ], "deleted": [] }, "commit_link": "github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c5433...
675
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,\n\t int* vs_israw, int v_israw,\n\t enum CCVALTYPE intype, enum CCVALTYPE* type,\n\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;", " switch (*state) {\n case CCS_VALUE:\n if (*type == CCV_SB) {", " if (*vs > 0xff...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 356, "char_start": 282, "chars": "if (*vs > 0xff)\n return ONIGERR_INVALID_CODE_POINT_VALUE;\n\n " } ], "deleted": [] }, "commit_link": "github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c5433...
675
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,\n CodedBitstreamFragment *frag,\n int header)\n{\n AVBufferRef *data_ref;\n uint8_t *data;\n size_t data_size;\n int unit, start, end, marker, next_start, next_marker;\n ...
[ 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3493, "char_start": 3410, "chars": "if (length > end - start)\n return AVERROR_INVALIDDATA;\n\n " } ], "deleted": [] }, "commit_link": "github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e...
676
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,\n CodedBitstreamFragment *frag,\n int header)\n{\n AVBufferRef *data_ref;\n uint8_t *data;\n size_t data_size;\n int unit, start, end, marker, next_start, next_marker;\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3493, "char_start": 3410, "chars": "if (length > end - start)\n return AVERROR_INVALIDDATA;\n\n " } ], "deleted": [] }, "commit_link": "github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e...
676
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,\n int linesize_align[AV_NUM_DATA_POINTERS])\n{\n int i;\n int w_align = 1;\n int h_align = 1;\n AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);", " if (desc) {\n w_alig...
[ 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3818, "char_start": 3700, "chars": "if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) {\n w_align = 8;\n h_align = 8;\n }\n " }, { "char_end": 4158, "char_start": 4100, ...
677
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,\n int linesize_align[AV_NUM_DATA_POINTERS])\n{\n int i;\n int w_align = 1;\n int h_align = 1;\n AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);", " if (desc) {\n w_alig...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3818, "char_start": 3700, "chars": "if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) {\n w_align = 8;\n h_align = 8;\n }\n " }, { "char_end": 4158, "char_start": 4100, ...
677
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)\n\t{\n\tconst u_char* data_start = data;", "\tif ( len <= 0 )\n\t\treturn 0;", "\tfor ( ; len > 0; --len, ++data )\n\t\t{\n\t\tif ( offset >= buf_len )\n\t\t\tInitBuffer(buf_len * 2);", "\t\tint c = data[0];", "#define EMIT_LINE \\\n\t{ \...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1174, "char_start": 803, "chars": "// Weird corner-case:\n\t\t\t\t// this can happen if we see a \\r at the end of a packet where crlf is\n\t\t\t\t// set to CR_as_EOL | LF_as_EOL, with the packet causing crlf to be set to\n\t\t\t\t// 0 and...
678
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)\n\t{\n\tconst u_char* data_start = data;", "\tif ( len <= 0 )\n\t\treturn 0;", "\tfor ( ; len > 0; --len, ++data )\n\t\t{\n\t\tif ( offset >= buf_len )\n\t\t\tInitBuffer(buf_len * 2);", "\t\tint c = data[0];", "#define EMIT_LINE \\\n\t{ \...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1174, "char_start": 803, "chars": "// Weird corner-case:\n\t\t\t\t// this can happen if we see a \\r at the end of a packet where crlf is\n\t\t\t\t// set to CR_as_EOL | LF_as_EOL, with the packet causing crlf to be set to\n\t\t\t\t// 0 and...
678
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "idn2_to_ascii_4i (const uint32_t * input, size_t inlen, char * output, int flags)\n{\n uint32_t *input_u32;\n uint8_t *input_u8, *output_u8;\n size_t length;\n int rc;", " if (!input)\n {\n if (output)\n\t*output = 0;\n return IDN2_OK;\n }", " input_u32 = (uint32_t *) malloc ((inlen + 1) ...
[ 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1063, "char_start": 921, "chars": "size_t len = strlen ((char *) output_u8);\n\n if (len > 63)\n {\n\t free (output_u8);\n\t return IDN2_TOO_BIG_DOMAIN;\n }\n\n " }, { "char_end": 1125, ...
679
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "idn2_to_ascii_4i (const uint32_t * input, size_t inlen, char * output, int flags)\n{\n uint32_t *input_u32;\n uint8_t *input_u8, *output_u8;\n size_t length;\n int rc;", " if (!input)\n {\n if (output)\n\t*output = 0;\n return IDN2_OK;\n }", " input_u32 = (uint32_t *) malloc ((inlen + 1) ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1063, "char_start": 921, "chars": "size_t len = strlen ((char *) output_u8);\n\n if (len > 63)\n {\n\t free (output_u8);\n\t return IDN2_TOO_BIG_DOMAIN;\n }\n\n " }, { "char_end": 1125, ...
679
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int blosc_c(struct thread_context* thread_context, int32_t bsize,", " int32_t leftoverblock, int32_t ntbytes, int32_t maxbytes,", " const uint8_t* src, const int32_t offset, uint8_t* dest,\n uint8_t* tmp, uint8_t* tmp2) {\n blosc2_context* context =...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 143, "char_start": 140, "chars": "des" }, { "char_end": 147, "char_start": 144, "chars": "siz" }, { "char_end": 2607, "char_start": 2482, "chars": "if (ntbytes > dests...
680
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int blosc_c(struct thread_context* thread_context, int32_t bsize,", " int32_t leftoverblock, int32_t ntbytes, int32_t destsize,", " const uint8_t* src, const int32_t offset, uint8_t* dest,\n uint8_t* tmp, uint8_t* tmp2) {\n blosc2_context* context =...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 143, "char_start": 140, "chars": "des" }, { "char_end": 147, "char_start": 144, "chars": "siz" }, { "char_end": 2607, "char_start": 2482, "chars": "if (ntbytes > dests...
680
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "bool Scanner::fill(size_t need)\n{\n if (eof) return false;", " pop_finished_files();", " DASSERT(bot <= tok && tok <= lim);\n size_t free = static_cast<size_t>(tok - bot);\n size_t copy = static_cast<size_t>(lim - tok);", " if (free >= need) {\n memmove(bot, tok, copy);\n shi...
[ 1, 1, 1, 1, 1, 0, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 564, "char_start": 563, "chars": "t" }, { "char_end": 566, "char_start": 565, "chars": "k" }, { "char_end": 687, "char_start": 647, "chars": "\n DASSERT(lim + free ...
681
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "bool Scanner::fill(size_t need)\n{\n if (eof) return false;", " pop_finished_files();", " DASSERT(bot <= tok && tok <= lim);\n size_t free = static_cast<size_t>(tok - bot);\n size_t copy = static_cast<size_t>(lim - tok);", " if (free >= need) {\n memmove(bot, tok, copy);\n shi...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 564, "char_start": 563, "chars": "t" }, { "char_end": 566, "char_start": 565, "chars": "k" }, { "char_end": 687, "char_start": 647, "chars": "\n DASSERT(lim + free ...
681
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "input_csi_dispatch_sgr_colon(struct input_ctx *ictx, u_int i)\n{\n\tstruct grid_cell\t*gc = &ictx->cell.cell;\n\tchar\t\t\t*s = ictx->param_list[i].str, *copy, *ptr, *out;\n\tint\t\t\t p[8];\n\tu_int\t\t\t n;\n\tconst char\t\t*errstr;", "\tfor (n = 0; n < nitems(p); n++)\n\t\tp[n] = -1;\n\tn = 0;", "\tptr = co...
[ 1, 1, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 495, "char_start": 493, "chars": " {" }, { "char_end": 565, "char_start": 503, "chars": "\n\t\t\tif (n == nitems(p)) {\n\t\t\t\tfree(copy);\n\t\t\t\treturn;\n\t\t\t}\n\t\t}" } ], "deleted":...
682
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "input_csi_dispatch_sgr_colon(struct input_ctx *ictx, u_int i)\n{\n\tstruct grid_cell\t*gc = &ictx->cell.cell;\n\tchar\t\t\t*s = ictx->param_list[i].str, *copy, *ptr, *out;\n\tint\t\t\t p[8];\n\tu_int\t\t\t n;\n\tconst char\t\t*errstr;", "\tfor (n = 0; n < nitems(p); n++)\n\t\tp[n] = -1;\n\tn = 0;", "\tptr = co...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 495, "char_start": 493, "chars": " {" }, { "char_end": 565, "char_start": 503, "chars": "\n\t\t\tif (n == nitems(p)) {\n\t\t\t\tfree(copy);\n\t\t\t\treturn;\n\t\t\t}\n\t\t}" } ], "deleted":...
682
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "char *enl_ipc_get(const char *msg_data)\n{", "\tstatic char *message = NULL;", "\tstatic unsigned short len = 0;", "\tchar buff[13], *ret_msg = NULL;\n\tregister unsigned char i;\n\tunsigned char blen;", "\tif (msg_data == IPC_TIMEOUT) {\n\t\treturn(IPC_TIMEOUT);\n\t}\n\tfor (i = 0; i < 12; i++) {\n\t\tbuf...
[ 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 84, "char_start": 83, "chars": "z" }, { "char_end": 86, "char_start": 85, "chars": "_" } ], "deleted": [ { "char_end": 83, "char_start": 81, "chars": "un" ...
683
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "char *enl_ipc_get(const char *msg_data)\n{", "\tstatic char *message = NULL;", "\tstatic size_t len = 0;", "\tchar buff[13], *ret_msg = NULL;\n\tregister unsigned char i;\n\tunsigned char blen;", "\tif (msg_data == IPC_TIMEOUT) {\n\t\treturn(IPC_TIMEOUT);\n\t}\n\tfor (i = 0; i < 12; i++) {\n\t\tbuff[i] = m...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 84, "char_start": 83, "chars": "z" }, { "char_end": 86, "char_start": 85, "chars": "_" } ], "deleted": [ { "char_end": 83, "char_start": 81, "chars": "un" ...
683
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)\n{\n\tbool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;\n\tu32 chunk_size = mr->chunk_size, headroom = mr->headroom;\n\tunsigned int chunks, chunks_per_page;\n\tu64 addr = mr->addr, size = mr->len;", "\tint size_chk, err;", ...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1198, "char_start": 1194, "chars": "f (h" }, { "char_end": 1205, "char_start": 1199, "chars": "adroom" }, { "char_end": 1207, "char_start": 1206, "chars": ">" } ...
684
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)\n{\n\tbool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;\n\tu32 chunk_size = mr->chunk_size, headroom = mr->headroom;\n\tunsigned int chunks, chunks_per_page;\n\tu64 addr = mr->addr, size = mr->len;", "\tint err;", "\n\tif ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1198, "char_start": 1194, "chars": "f (h" }, { "char_end": 1205, "char_start": 1199, "chars": "adroom" }, { "char_end": 1207, "char_start": 1206, "chars": ">" } ...
684
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void gps_tracker( void )\n{\n\tssize_t unused;\n int gpsd_sock;\n char line[256], *temp;\n struct sockaddr_in gpsd_addr;\n int ret, is_json, pos;\n fd_set read_fd;\n struct timeval timeout;", " /* attempt to connect to localhost, port 2947 */", " pos = 0;\n gpsd_sock = socket( AF_INE...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2444, "char_start": 2438, "chars": "pos - " } ], "deleted": [] }, "commit_link": "github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/", "file_name": "src/airodump-ng.c", "func_name": "g...
685
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void gps_tracker( void )\n{\n\tssize_t unused;\n int gpsd_sock;\n char line[256], *temp;\n struct sockaddr_in gpsd_addr;\n int ret, is_json, pos;\n fd_set read_fd;\n struct timeval timeout;", " /* attempt to connect to localhost, port 2947 */", " pos = 0;\n gpsd_sock = socket( AF_INE...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2444, "char_start": 2438, "chars": "pos - " } ], "deleted": [] }, "commit_link": "github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/", "file_name": "src/airodump-ng.c", "func_name": "g...
685
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int tcp_test(const char* ip_str, const short port)\n{\n int sock, i;\n struct sockaddr_in s_in;\n int packetsize = 1024;\n unsigned char packet[packetsize];\n struct timeval tv, tv2, tv3;\n int caplen = 0;\n int times[REQUESTS];\n int min, avg, max, len;\n struct net_hdr nh;", " tv3...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2330, "char_start": 2265, "chars": " (len > 1024 || len < 0)\n continue;\n if" } ], "deleted": [] }, "commit_link": "github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b55...
686
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int tcp_test(const char* ip_str, const short port)\n{\n int sock, i;\n struct sockaddr_in s_in;\n int packetsize = 1024;\n unsigned char packet[packetsize];\n struct timeval tv, tv2, tv3;\n int caplen = 0;\n int times[REQUESTS];\n int min, avg, max, len;\n struct net_hdr nh;", " tv3...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2330, "char_start": 2265, "chars": " (len > 1024 || len < 0)\n continue;\n if" } ], "deleted": [] }, "commit_link": "github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b55...
686
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "mapi_attr_read (size_t len, unsigned char *buf)\n{\n size_t idx = 0;\n uint32 i,j;\n assert(len > 4);\n uint32 num_properties = GETINT32(buf+idx);", "", " MAPI_Attr** attrs = CHECKED_XMALLOC (MAPI_Attr*, (num_properties + 1));", " idx += 4;", " if (!attrs) return NULL;\n for (i = 0;...
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 195, "char_start": 158, "chars": "assert((num_properties+1) != 0);\n " }, { "char_end": 1305, "char_start": 1257, "chars": "len);\n\t\t assert((idx+(a->names[i].len*2)) <= " }, { ...
687
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "mapi_attr_read (size_t len, unsigned char *buf)\n{\n size_t idx = 0;\n uint32 i,j;\n assert(len > 4);\n uint32 num_properties = GETINT32(buf+idx);", " assert((num_properties+1) != 0);", " MAPI_Attr** attrs = CHECKED_XMALLOC (MAPI_Attr*, (num_properties + 1));", " idx += 4;", " if (!...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 195, "char_start": 158, "chars": "assert((num_properties+1) != 0);\n " }, { "char_end": 1305, "char_start": 1257, "chars": "len);\n\t\t assert((idx+(a->names[i].len*2)) <= " }, { ...
687
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static size_t WritePSDChannel(const PSDInfo *psd_info,\n const ImageInfo *image_info,Image *image,Image *next_image,\n const QuantumType quantum_type, unsigned char *compact_pixels,\n MagickOffsetType size_offset,const MagickBooleanType separate,\n ExceptionInfo *exception)\n{\n int\n y;", " MagickBoole...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1059, "char_start": 1054, "chars": "next_" } ], "deleted": [] }, "commit_link": "github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88", "file_name": "coders/psd.c", "func_name": "WritePSD...
688
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static size_t WritePSDChannel(const PSDInfo *psd_info,\n const ImageInfo *image_info,Image *image,Image *next_image,\n const QuantumType quantum_type, unsigned char *compact_pixels,\n MagickOffsetType size_offset,const MagickBooleanType separate,\n ExceptionInfo *exception)\n{\n int\n y;", " MagickBoole...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1059, "char_start": 1054, "chars": "next_" } ], "deleted": [] }, "commit_link": "github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88", "file_name": "coders/psd.c", "func_name": "WritePSD...
688
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int flb_gzip_compress(void *in_data, size_t in_len,\n void **out_data, size_t *out_len)\n{\n int flush;\n int status;\n int footer_start;\n uint8_t *pb;\n size_t out_size;\n void *out_buf;\n z_stream strm;\n mz_ulong crc;\n", " out_size = in_len + 32;", " out_...
[ 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 259, "char_start": 258, "chars": "\n" }, { "char_end": 324, "char_start": 263, "chars": "/*\n * GZIP relies on an algorithm with worst-case expansi" }, { "char_end": 418, ...
689
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int flb_gzip_compress(void *in_data, size_t in_len,\n void **out_data, size_t *out_len)\n{\n int flush;\n int status;\n int footer_start;\n uint8_t *pb;\n size_t out_size;\n void *out_buf;\n z_stream strm;\n mz_ulong crc;\n", "\n /*\n * GZIP relies on an algori...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 259, "char_start": 258, "chars": "\n" }, { "char_end": 324, "char_start": 263, "chars": "/*\n * GZIP relies on an algorithm with worst-case expansi" }, { "char_end": 418, ...
689
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,\n\t\tunsigned char **out, size_t *out_len,\n\t\tint verify_pin)\n{\n\tstruct sc_context *ctx = p15card->card->ctx;\n\tstruct sc_card *card = p15card->card;\n\tstruct sc_file *file = NULL;\n\tstruct sc_path path;\n\tsize_t sz;\n\tint rv;", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1110, "char_start": 1109, "chars": "s" }, { "char_end": 1114, "char_start": 1111, "chars": "ze_" }, { "char_end": 1124, "char_start": 1123, "chars": "s" }, ...
690
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,\n\t\tunsigned char **out, size_t *out_len,\n\t\tint verify_pin)\n{\n\tstruct sc_context *ctx = p15card->card->ctx;\n\tstruct sc_card *card = p15card->card;\n\tstruct sc_file *file = NULL;\n\tstruct sc_path path;\n\tsize_t sz;\n\tint rv;", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1110, "char_start": 1109, "chars": "s" }, { "char_end": 1114, "char_start": 1111, "chars": "ze_" }, { "char_end": 1124, "char_start": 1123, "chars": "s" }, ...
690
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "TfLiteStatus ResizeOutputTensor(TfLiteContext* context,\n const TfLiteTensor* data,\n const TfLiteTensor* segment_ids,\n TfLiteTensor* output) {", " int max_index = -1;", " const int segment_id_size = segment_ids->di...
[ 1, 0, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 274, "char_start": 237, "chars": "// Segment ids should be of same card" }, { "char_end": 279, "char_start": 276, "chars": "ali" }, { "char_end": 284, "char_start": 280, ...
691
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "TfLiteStatus ResizeOutputTensor(TfLiteContext* context,\n const TfLiteTensor* data,\n const TfLiteTensor* segment_ids,\n TfLiteTensor* output) {", " // Segment ids should be of same cardinality as first input dimension ...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 274, "char_start": 237, "chars": "// Segment ids should be of same card" }, { "char_end": 279, "char_start": 276, "chars": "ali" }, { "char_end": 284, "char_start": 280, ...
691
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,\n\t\t\t const struct host_cmd_ds_command *resp)\n{\n\tu8 *curr = (u8 *) &resp->params.get_wmm_status;\n\tuint16_t resp_len = le16_to_cpu(resp->size), tlv_len;\n\tint mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;\n\tbool valid = true;", "...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2114, "char_start": 2017, "chars": "if (wmm_param_ie->vend_hdr.len + 2 >\n\t\t\t\tsizeof(struct ieee_types_wmm_parameter))\n\t\t\t\tbreak;\n\n\t\t\t" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/...
692
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,\n\t\t\t const struct host_cmd_ds_command *resp)\n{\n\tu8 *curr = (u8 *) &resp->params.get_wmm_status;\n\tuint16_t resp_len = le16_to_cpu(resp->size), tlv_len;\n\tint mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;\n\tbool valid = true;", "...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2114, "char_start": 2017, "chars": "if (wmm_param_ie->vend_hdr.len + 2 >\n\t\t\t\tsizeof(struct ieee_types_wmm_parameter))\n\t\t\t\tbreak;\n\n\t\t\t" } ], "deleted": [] }, "commit_link": "github.com/torvalds/linux/commit/...
692
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static PyObject* patch(PyObject* self, PyObject* args)\n{\n char *origData, *newData, *diffBlock, *extraBlock, *diffPtr, *extraPtr;\n Py_ssize_t origDataLength, newDataLength, diffBlockLength, extraBlockLength;\n PyObject *controlTuples, *tuple, *results;\n off_t oldpos, newpos, x, y, z;\n int i, j,...
[ 1, 1, 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2284, "char_start": 2035, "chars": "\n if (newpos + y > newDataLength ||\n extraPtr + y > extraBlock + extraBlockLength) {\n PyMem_Free(newData);\n PyErr_SetString(PyExc_ValueError, \"corrupt pat...
693
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static PyObject* patch(PyObject* self, PyObject* args)\n{\n char *origData, *newData, *diffBlock, *extraBlock, *diffPtr, *extraPtr;\n Py_ssize_t origDataLength, newDataLength, diffBlockLength, extraBlockLength;\n PyObject *controlTuples, *tuple, *results;\n off_t oldpos, newpos, x, y, z;\n int i, j,...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2284, "char_start": 2035, "chars": "\n if (newpos + y > newDataLength ||\n extraPtr + y > extraBlock + extraBlockLength) {\n PyMem_Free(newData);\n PyErr_SetString(PyExc_ValueError, \"corrupt pat...
693
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "HandleRFBServerMessage(rfbClient* client)\n{\n rfbServerToClientMsg msg;", " if (client->serverPort==-1)\n client->vncRec->readTimestamp = TRUE;\n if (!ReadFromRFBServer(client, (char *)&msg, 1))\n return FALSE;", " switch (msg.type) {", " case rfbSetColourMapEntries:\n {\n /* TODO:\n int i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0...
SVEN
{ "char_changes": { "added": [], "deleted": [ { "char_end": 15608, "char_start": 15598, "chars": "(uint64_t)" } ] }, "commit_link": "github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae", "file_name": "libvncclient/rfbproto.c", "func_na...
694
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "HandleRFBServerMessage(rfbClient* client)\n{\n rfbServerToClientMsg msg;", " if (client->serverPort==-1)\n client->vncRec->readTimestamp = TRUE;\n if (!ReadFromRFBServer(client, (char *)&msg, 1))\n return FALSE;", " switch (msg.type) {", " case rfbSetColourMapEntries:\n {\n /* TODO:\n int i...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
SVEN
{ "char_changes": { "added": [], "deleted": [ { "char_end": 15608, "char_start": 15598, "chars": "(uint64_t)" } ] }, "commit_link": "github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae", "file_name": "libvncclient/rfbproto.c", "func_na...
694
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "int32_t *enc_untrusted_create_wait_queue() {\n MessageWriter input;\n MessageReader output;\n input.Push<uint64_t>(sizeof(int32_t));\n const auto status = NonSystemCallDispatcher(\n ::asylo::host_call::kLocalLifetimeAllocHandler, &input, &output);\n CheckStatusAndParamCount(status, output, \"enc_untruste...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 633, "char_start": 438, "chars": "f (!TrustedPrimitives::IsOutsideEnclave(queue, sizeof(int32_t))) {\n TrustedPrimitives::BestEffortAbort(\n \"enc_untrusted_create_wait_queue: queue should be in untrusted memory\");\n }\n i" ...
695
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "int32_t *enc_untrusted_create_wait_queue() {\n MessageWriter input;\n MessageReader output;\n input.Push<uint64_t>(sizeof(int32_t));\n const auto status = NonSystemCallDispatcher(\n ::asylo::host_call::kLocalLifetimeAllocHandler, &input, &output);\n CheckStatusAndParamCount(status, output, \"enc_untruste...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 633, "char_start": 438, "chars": "f (!TrustedPrimitives::IsOutsideEnclave(queue, sizeof(int32_t))) {\n TrustedPrimitives::BestEffortAbort(\n \"enc_untrusted_create_wait_queue: queue should be in untrusted memory\");\n }\n i" ...
695
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "bool FromkLinuxSockAddr(const struct klinux_sockaddr *input,\n socklen_t input_len, struct sockaddr *output,\n socklen_t *output_len,\n void (*abort_handler)(const char *)) {\n if (!input || !output || !output_len || input_len == 0) {\n outpu...
[ 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 526, "char_start": 442, "chars": "if (input_len < sizeof(struct klinux_sockaddr_un)) {\n return false;\n }\n\n " }, { "char_end": 1265, "char_start": 1182, "chars": " if (input_len < sizeof...
696
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "bool FromkLinuxSockAddr(const struct klinux_sockaddr *input,\n socklen_t input_len, struct sockaddr *output,\n socklen_t *output_len,\n void (*abort_handler)(const char *)) {\n if (!input || !output || !output_len || input_len == 0) {\n outpu...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 526, "char_start": 442, "chars": "if (input_len < sizeof(struct klinux_sockaddr_un)) {\n return false;\n }\n\n " }, { "char_end": 1265, "char_start": 1182, "chars": " if (input_len < sizeof...
696
cwe-787
cc
Determine whether the {function_name} code is vulnerable or not.
[ "opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,\n\t\t\t\t\t\t\t\t\t\topj_cp_t *p_cp,\n\t\t\t\t\t\t\t\t\t\tOPJ_UINT32 p_tile_no)\n{\n\t/* loop */\n\tOPJ_UINT32 pino;\n\tOPJ_UINT32 compno, resno;", "\t/* to store w, h, dx and dy fro all components and resolutions */\n\tOPJ_UINT32 * l_tmp_data;\n\tOPJ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2269, "char_start": 2140, "chars": "/* prevent an integer overflow issue */\n\tl_current_pi->include = 00;\n\tif (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U)))\n\t{\n\t\t" }, { "char_end": 2374, "char_start"...
697
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,\n\t\t\t\t\t\t\t\t\t\topj_cp_t *p_cp,\n\t\t\t\t\t\t\t\t\t\tOPJ_UINT32 p_tile_no)\n{\n\t/* loop */\n\tOPJ_UINT32 pino;\n\tOPJ_UINT32 compno, resno;", "\t/* to store w, h, dx and dy fro all components and resolutions */\n\tOPJ_UINT32 * l_tmp_data;\n\tOPJ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 2269, "char_start": 2140, "chars": "/* prevent an integer overflow issue */\n\tl_current_pi->include = 00;\n\tif (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U)))\n\t{\n\t\t" }, { "char_end": 2374, "char_start"...
697
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;", " /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;", "...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3370, "char_start": 3197, "chars": "if (parameters->numresolution == 1) {\n parameters->res_spec = 1;\n parameters->prcw_init[0] = 128;\n parameters->prch_init[0] = 128;\n } else {\n " }, { ...
698
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;", " /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;", "...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 3370, "char_start": 3197, "chars": "if (parameters->numresolution == 1) {\n parameters->res_spec = 1;\n parameters->prcw_init[0] = 128;\n parameters->prch_init[0] = 128;\n } else {\n " }, { ...
698
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;", " int contentlen = 0;", " int isform = 0;", " pp.inbuf = 0;\n pp.cp = param;", " buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetlinebuf...
[ 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 151, "char_start": 148, "chars": "uns" }, { "char_end": 153, "char_start": 152, "chars": "g" }, { "char_end": 156, "char_start": 154, "chars": "ed" }, { ...
699
cwe-787
c
Determine whether the {function_name} code is vulnerable or not.
[ "void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;", " unsigned contentlen = 0;", " int isform = 0;", " pp.inbuf = 0;\n pp.cp = param;", " buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetli...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 151, "char_start": 148, "chars": "uns" }, { "char_end": 153, "char_start": 152, "chars": "g" }, { "char_end": 156, "char_start": 154, "chars": "ed" }, { ...
699
cwe-787
c