prompt stringclasses 1
value | completions listlengths 2 1.33k | labels listlengths 2 1.33k | source stringclasses 1
value | other_info dict | index int64 0 719 | cwe stringclasses 9
values | language stringclasses 6
values |
|---|---|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"tar_directory_for_file (GsfInfileTar *dir, const char *name, gboolean last)\n{\n\tconst char *s = name;",
"\twhile (1) {\n\t\tconst char *s0 = s;\n\t\tchar *dirname;",
"\t\t/* Find a directory component, if any. */\n\t\twhile (1) {\n\t\t\tif (*s == 0) {\n\t\t\t\tif (last && s != s0)\n\t\t\t\t\tbreak;\n\t\t\t\... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 676,
"char_start": 596,
"chars": "dir = GSF_IS_INFILE_TAR (subdir)\n\t\t\t\t\t? GSF_INFILE_TAR (subdir)\n\t\t\t\t\t: dir;\n\t\t\t\t"
}
],
"deleted": [
{
"char_end": 669,
"char_start": 634,
"chars... | 650 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"tar_directory_for_file (GsfInfileTar *dir, const char *name, gboolean last)\n{\n\tconst char *s = name;",
"\twhile (1) {\n\t\tconst char *s0 = s;\n\t\tchar *dirname;",
"\t\t/* Find a directory component, if any. */\n\t\twhile (1) {\n\t\t\tif (*s == 0) {\n\t\t\t\tif (last && s != s0)\n\t\t\t\t\tbreak;\n\t\t\t\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 676,
"char_start": 596,
"chars": "dir = GSF_IS_INFILE_TAR (subdir)\n\t\t\t\t\t? GSF_INFILE_TAR (subdir)\n\t\t\t\t\t: dir;\n\t\t\t\t"
}
],
"deleted": [
{
"char_end": 669,
"char_start": 634,
"chars... | 650 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)\n{\n\tstruct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);\n\tstruct skcipher_alg *alg = crypto_skcipher_alg(skcipher);",
"\tif (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)\n\t\treturn crypto_init_skcipher_ops_blkcipher(tfm);",
"\ti... | [
1,
1,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 493,
"char_start": 484,
"chars": "skcipher_"
}
],
"deleted": [
{
"char_end": 489,
"char_start": 484,
"chars": "alg->"
}
]
},
"commit_link": "github.com/torvalds/linux/commit/9933e11... | 651 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)\n{\n\tstruct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);\n\tstruct skcipher_alg *alg = crypto_skcipher_alg(skcipher);",
"\tif (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)\n\t\treturn crypto_init_skcipher_ops_blkcipher(tfm);",
"\ti... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 493,
"char_start": 484,
"chars": "skcipher_"
}
],
"deleted": [
{
"char_end": 489,
"char_start": 484,
"chars": "alg->"
}
]
},
"commit_link": "github.com/torvalds/linux/commit/9933e11... | 651 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int __init fm10k_init_module(void)\n{\n\tpr_info(\"%s - version %s\\n\", fm10k_driver_string, fm10k_driver_version);\n\tpr_info(\"%s\\n\", fm10k_copyright);",
"\t/* create driver workqueue */\n\tfm10k_workqueue = alloc_workqueue(\"%s\", WQ_MEM_RECLAIM, 0,\n\t\t\t\t\t fm10k_driver_name);",
"",
"\n\tfm... | [
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 313,
"char_start": 272,
"chars": "\tif (!fm10k_workqueue)\n\t\treturn -ENOMEM;\n"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f",
"file_name": "drivers/n... | 652 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int __init fm10k_init_module(void)\n{\n\tpr_info(\"%s - version %s\\n\", fm10k_driver_string, fm10k_driver_version);\n\tpr_info(\"%s\\n\", fm10k_copyright);",
"\t/* create driver workqueue */\n\tfm10k_workqueue = alloc_workqueue(\"%s\", WQ_MEM_RECLAIM, 0,\n\t\t\t\t\t fm10k_driver_name);",
"\tif (!fm10k... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 313,
"char_start": 272,
"chars": "\tif (!fm10k_workqueue)\n\t\treturn -ENOMEM;\n"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f",
"file_name": "drivers/n... | 652 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void parse_class(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c,\n\t\t\t int class_index, int *methods, int *sym_count) {\n\tstruct r_bin_t *rbin = binfile->rbin;",
"\tchar *class_name;\n\tint z;\n\tconst ut8 *p, *p_end;",
"\tif (!c) {\n\t\treturn;\n\t}",
"\tclass_name = dex_class_name (bin, c);\... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1457,
"char_start": 1456,
"chars": " "
}
],
"deleted": []
},
"commit_link": "github.com/radare/radare2/commit/1ea23bd6040441a21fbcfba69dce9a01af03f989",
"file_name": "libr/bin/p/bin_dex.c",
"func_name": "parse_class",... | 653 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void parse_class(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c,\n\t\t\t int class_index, int *methods, int *sym_count) {\n\tstruct r_bin_t *rbin = binfile->rbin;",
"\tchar *class_name;\n\tint z;\n\tconst ut8 *p, *p_end;",
"\tif (!c) {\n\t\treturn;\n\t}",
"\tclass_name = dex_class_name (bin, c);\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1457,
"char_start": 1456,
"chars": " "
}
],
"deleted": []
},
"commit_link": "github.com/radare/radare2/commit/1ea23bd6040441a21fbcfba69dce9a01af03f989",
"file_name": "libr/bin/p/bin_dex.c",
"func_name": "parse_class",... | 653 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"lexer_process_char_literal (parser_context_t *context_p, /**< context */\n const uint8_t *char_p, /**< characters */\n size_t length, /**< length of string */\n uint8_t literal_type, /**< final literal type */\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1610,
"char_start": 1558,
"chars": "if (length == 0)\n {\n has_escape = false;\n }\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/jerryscript-project/jerryscript/commit/e58f2880df608652aff7fd35c45b242467ec0e... | 654 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"lexer_process_char_literal (parser_context_t *context_p, /**< context */\n const uint8_t *char_p, /**< characters */\n size_t length, /**< length of string */\n uint8_t literal_type, /**< final literal type */\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1610,
"char_start": 1558,
"chars": "if (length == 0)\n {\n has_escape = false;\n }\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/jerryscript-project/jerryscript/commit/e58f2880df608652aff7fd35c45b242467ec0e... | 654 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"mrb_obj_clone(mrb_state *mrb, mrb_value self)\n{\n struct RObject *p;\n mrb_value clone;",
" if (mrb_immediate_p(self)) {\n mrb_raisef(mrb, E_TYPE_ERROR, \"can't clone %S\", self);\n }\n if (mrb_type(self) == MRB_TT_SCLASS) {\n mrb_raise(mrb, E_TYPE_ERROR, \"can't clone singleton class\");\n }\n p =... | [
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 569,
"char_start": 568,
"chars": "|"
},
{
"char_end": 616,
"char_start": 595,
"chars": " & MRB_FLAG_IS_FROZEN"
}
],
"deleted": []
},
"commit_link": "github.com/mruby/mruby/commit/55edae... | 655 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"mrb_obj_clone(mrb_state *mrb, mrb_value self)\n{\n struct RObject *p;\n mrb_value clone;",
" if (mrb_immediate_p(self)) {\n mrb_raisef(mrb, E_TYPE_ERROR, \"can't clone %S\", self);\n }\n if (mrb_type(self) == MRB_TT_SCLASS) {\n mrb_raise(mrb, E_TYPE_ERROR, \"can't clone singleton class\");\n }\n p =... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 569,
"char_start": 568,
"chars": "|"
},
{
"char_end": 616,
"char_start": 595,
"chars": " & MRB_FLAG_IS_FROZEN"
}
],
"deleted": []
},
"commit_link": "github.com/mruby/mruby/commit/55edae... | 655 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int __init big_key_init(void)\n{",
"\treturn register_key_type(&key_type_big_key);",
"}"
] | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 42,
"char_start": 40,
"chars": "st"
},
{
"char_end": 68,
"char_start": 43,
"chars": "uct crypto_skcipher *ciph"
},
{
"char_end": 74,
"char_start": 69,
"chars": "r;\n\t... | 656 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int __init big_key_init(void)\n{",
"\tstruct crypto_skcipher *cipher;\n\tstruct crypto_rng *rng;\n\tint ret;",
"\trng = crypto_alloc_rng(big_key_rng_name, 0, 0);\n\tif (IS_ERR(rng)) {\n\t\tpr_err(\"Can't alloc rng: %ld\\n\", PTR_ERR(rng));\n\t\treturn PTR_ERR(rng);\n\t}",
"\tbig_key_rng = rng;",
"\t... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 42,
"char_start": 40,
"chars": "st"
},
{
"char_end": 68,
"char_start": 43,
"chars": "uct crypto_skcipher *ciph"
},
{
"char_end": 74,
"char_start": 69,
"chars": "r;\n\t... | 656 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int flattenSubquery(\n Parse *pParse, /* Parsing context */\n Select *p, /* The parent or outer SELECT statement */\n int iFrom, /* Index in p->pSrc->a[] of the inner subquery */\n int isAgg /* True if outer SELECT uses aggregate functions */\n){\n const char *zSave... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3753,
"char_start": 3719,
"chars": " /* (3a) */\n "
},
{
"char_end": 3806,
"char_start": 3762,
"chars": " /* (3b) */\n "
},
{
"char... | 657 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int flattenSubquery(\n Parse *pParse, /* Parsing context */\n Select *p, /* The parent or outer SELECT statement */\n int iFrom, /* Index in p->pSrc->a[] of the inner subquery */\n int isAgg /* True if outer SELECT uses aggregate functions */\n){\n const char *zSave... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3753,
"char_start": 3719,
"chars": " /* (3a) */\n "
},
{
"char_end": 3806,
"char_start": 3762,
"chars": " /* (3b) */\n "
},
{
"char... | 657 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge)\n{\n bool ok;\n XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL };\n enum xkb_file_type type;\n struct xkb_context *ctx = keymap->ctx;",
" /* Collect section files and check for duplicates. */\n for (file = (XkbFi... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 691,
"char_start": 501,
"chars": "if (file->file_type == FILE_TYPE_GEOMETRY) {\n log_vrb(ctx, 1,\n \"Geometry sections are not supported; ignoring\\n\");\n } else {\n "
... | 658 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge)\n{\n bool ok;\n XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL };\n enum xkb_file_type type;\n struct xkb_context *ctx = keymap->ctx;",
" /* Collect section files and check for duplicates. */\n for (file = (XkbFi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 691,
"char_start": 501,
"chars": "if (file->file_type == FILE_TYPE_GEOMETRY) {\n log_vrb(ctx, 1,\n \"Geometry sections are not supported; ignoring\\n\");\n } else {\n "
... | 658 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf,\n size_t size)\n{\n GetBitContext gb;\n AC3HeaderInfo *hdr;\n int err;",
" if (!*phdr)\n *phdr = av_mallocz(sizeof(AC3HeaderInfo));\n if (!*phdr)\n return AVERROR(ENOMEM);\n hdr = *phd... | [
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 316,
"char_start": 310,
"chars": "err = "
},
{
"char_end": 399,
"char_start": 346,
"chars": ";\n if (err < 0)\n return AVERROR_INVALIDDATA"
}
],
"deleted": []
},
"commit_link"... | 659 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int avpriv_ac3_parse_header(AC3HeaderInfo **phdr, const uint8_t *buf,\n size_t size)\n{\n GetBitContext gb;\n AC3HeaderInfo *hdr;\n int err;",
" if (!*phdr)\n *phdr = av_mallocz(sizeof(AC3HeaderInfo));\n if (!*phdr)\n return AVERROR(ENOMEM);\n hdr = *phd... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 316,
"char_start": 310,
"chars": "err = "
},
{
"char_end": 399,
"char_start": 346,
"chars": ";\n if (err < 0)\n return AVERROR_INVALIDDATA"
}
],
"deleted": []
},
"commit_link"... | 659 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int mailimf_group_parse(const char * message, size_t length,\n\t\t\t size_t * indx,\n\t\t\t struct mailimf_group ** result)\n{\n size_t cur_token;\n char * display_name;\n struct mailimf_mailbox_list * mailbox_list;\n struct mailimf_group * group;\n int r;\n int res;",
"",
"\n cur_tok... | [
1,
0,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 294,
"char_start": 278,
"chars": " clist * list;\n"
},
{
"char_end": 1203,
"char_start": 908,
"chars": ";\n goto free_display_name;\n }\n list = clist_new();\n if (list == NULL) {\n r... | 660 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int mailimf_group_parse(const char * message, size_t length,\n\t\t\t size_t * indx,\n\t\t\t struct mailimf_group ** result)\n{\n size_t cur_token;\n char * display_name;\n struct mailimf_mailbox_list * mailbox_list;\n struct mailimf_group * group;\n int r;\n int res;",
" clist * list;",... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 294,
"char_start": 278,
"chars": " clist * list;\n"
},
{
"char_end": 1203,
"char_start": 908,
"chars": ";\n goto free_display_name;\n }\n list = clist_new();\n if (list == NULL) {\n r... | 660 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void srpt_handle_tsk_mgmt(struct srpt_rdma_ch *ch,\n\t\t\t\t struct srpt_recv_ioctx *recv_ioctx,\n\t\t\t\t struct srpt_send_ioctx *send_ioctx)\n{\n\tstruct srp_tsk_mgmt *srp_tsk;\n\tstruct se_cmd *cmd;\n\tstruct se_session *sess = ch->sess;\n\tuint64_t unpacked_lun;",
"\tuint32_t tag = 0;",
"\tint tcm_t... | [
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 884,
"char_start": 870,
"chars": "srp_tsk->task_"
}
],
"deleted": [
{
"char_end": 275,
"char_start": 256,
"chars": "uint32_t tag = 0;\n\t"
},
{
"char_end": 814,
"char_... | 661 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void srpt_handle_tsk_mgmt(struct srpt_rdma_ch *ch,\n\t\t\t\t struct srpt_recv_ioctx *recv_ioctx,\n\t\t\t\t struct srpt_send_ioctx *send_ioctx)\n{\n\tstruct srp_tsk_mgmt *srp_tsk;\n\tstruct se_cmd *cmd;\n\tstruct se_session *sess = ch->sess;\n\tuint64_t unpacked_lun;",
"",
"\tint tcm_tmr;\n\tint rc;",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 884,
"char_start": 870,
"chars": "srp_tsk->task_"
}
],
"deleted": [
{
"char_end": 275,
"char_start": 256,
"chars": "uint32_t tag = 0;\n\t"
},
{
"char_end": 814,
"char_... | 661 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,\n xkb_mod_mask_t *mods_rtrn, CompatInfo *info)\n{\n if (expr == NULL) {\n *pred_rtrn = MATCH_ANY_OR_NONE;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }",
" *pred_rtrn = MATCH_... | [
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 542,
"char_start": 508,
"chars": " ||\n !expr->action.args"
}
],
"deleted": []
},
"commit_link": "github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d",
"file_name": "src/xkbcomp/... | 662 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,\n xkb_mod_mask_t *mods_rtrn, CompatInfo *info)\n{\n if (expr == NULL) {\n *pred_rtrn = MATCH_ANY_OR_NONE;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }",
" *pred_rtrn = MATCH_... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 542,
"char_start": 508,
"chars": " ||\n !expr->action.args"
}
],
"deleted": []
},
"commit_link": "github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d",
"file_name": "src/xkbcomp/... | 662 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)\n{\n\tint r;",
"\tstatic const char resp[] =\n\t\t\"<u:%sResponse \"\n\t\t\"xmlns:u=\\\"%s\\\">\"\n\t\t\"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>\"\n\t\t\"</u:%sResponse>\";",
"\tchar body[512];\n\tint bodylen;\n\ts... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1029,
"char_start": 904,
"chars": "if (!int_port || !ext_port || !protocol)\n\t{\n\t\tClearNameValueList(&data);\n\t\tSoapError(h, 402, \"Invalid Args\");\n\t\treturn;\n\t}\n\n\t"
}
],
"deleted": []
},
"commit_link": "git... | 663 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)\n{\n\tint r;",
"\tstatic const char resp[] =\n\t\t\"<u:%sResponse \"\n\t\t\"xmlns:u=\\\"%s\\\">\"\n\t\t\"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>\"\n\t\t\"</u:%sResponse>\";",
"\tchar body[512];\n\tint bodylen;\n\ts... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1029,
"char_start": 904,
"chars": "if (!int_port || !ext_port || !protocol)\n\t{\n\t\tClearNameValueList(&data);\n\t\tSoapError(h, 402, \"Invalid Args\");\n\t\treturn;\n\t}\n\n\t"
}
],
"deleted": []
},
"commit_link": "git... | 663 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"AP4_AtomSampleTable::GetSample(AP4_Ordinal index, \n AP4_Sample& sample)\n{\n AP4_Result result;",
" // check that we have an stsc atom\n if (!m_StscAtom) {\n return AP4_ERROR_INVALID_FORMAT;\n }\n \n // check that we have a chunk offset table\n if (m_Stc... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1810,
"char_start": 1784,
"chars": "if (m_SttsAtom) {\n "
},
{
"char_end": 1870,
"char_start": 1866,
"chars": " "
},
{
"char_end": 1914,
"char_start": 1908,
... | 664 | cwe-476 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"AP4_AtomSampleTable::GetSample(AP4_Ordinal index, \n AP4_Sample& sample)\n{\n AP4_Result result;",
" // check that we have an stsc atom\n if (!m_StscAtom) {\n return AP4_ERROR_INVALID_FORMAT;\n }\n \n // check that we have a chunk offset table\n if (m_Stc... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1810,
"char_start": 1784,
"chars": "if (m_SttsAtom) {\n "
},
{
"char_end": 1870,
"char_start": 1866,
"chars": " "
},
{
"char_end": 1914,
"char_start": 1908,
... | 664 | cwe-476 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"acc_ctx_cont(OM_uint32 *minstat,\n\t gss_buffer_t buf,\n\t gss_ctx_id_t *ctx,\n\t gss_buffer_t *responseToken,\n\t gss_buffer_t *mechListMIC,\n\t OM_uint32 *negState,\n\t send_token_flag *return_token)\n{\n\tOM_uint32 ret, tmpmin;\n\tgss_OID supportedMech;\n\tspnego_gss_ctx_id_t sc;\n\tunsi... | [
1,
1,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 662,
"char_start": 647,
"chars": "== 0 || REMAIN "
}
],
"deleted": []
},
"commit_link": "github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b",
"file_name": "src/lib/gssapi/spnego/spnego_mech.c",
"func... | 665 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"acc_ctx_cont(OM_uint32 *minstat,\n\t gss_buffer_t buf,\n\t gss_ctx_id_t *ctx,\n\t gss_buffer_t *responseToken,\n\t gss_buffer_t *mechListMIC,\n\t OM_uint32 *negState,\n\t send_token_flag *return_token)\n{\n\tOM_uint32 ret, tmpmin;\n\tgss_OID supportedMech;\n\tspnego_gss_ctx_id_t sc;\n\tunsi... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 662,
"char_start": 647,
"chars": "== 0 || REMAIN "
}
],
"deleted": []
},
"commit_link": "github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b",
"file_name": "src/lib/gssapi/spnego/spnego_mech.c",
"func... | 665 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,\n\t\t\t struct mschmd_header *chm, int entire)\n{\n unsigned int section, name_len, x, errors, num_chunks;\n unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;\n struct mschmd_file *fi, *link = NULL;\n off_t offset, lengt... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6254,
"char_start": 6116,
"chars": ";\n\n /* ignore blank or one-char (e.g. \"/\") filenames we'd return as blank */\n if (name_len < 2 || !name[0] || !name[1]) continue"
}
],
"deleted": [
{
"char_end"... | 666 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,\n\t\t\t struct mschmd_header *chm, int entire)\n{\n unsigned int section, name_len, x, errors, num_chunks;\n unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;\n struct mschmd_file *fi, *link = NULL;\n off_t offset, lengt... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6254,
"char_start": 6116,
"chars": ";\n\n /* ignore blank or one-char (e.g. \"/\") filenames we'd return as blank */\n if (name_len < 2 || !name[0] || !name[1]) continue"
}
],
"deleted": [
{
"char_end"... | 666 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"filter_session_io(struct io *io, int evt, void *arg)\n{\n\tstruct filter_session *fs = arg;\n\tchar *line = NULL;\n\tssize_t len;",
"\tlog_trace(TRACE_IO, \"filter session: %p: %s %s\", fs, io_strevent(evt),\n\t io_strio(io));",
"\tswitch (evt) {\n\tcase IO_DATAIN:\n\tnextline:\n\t\tline = io_getline(fs->io... | [
1,
1,
1,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [],
"deleted": [
{
"char_end": 478,
"char_start": 409,
"chars": "\n\tcase IO_DISCONNECTED:\n\t\tio_free(fs->io);\n\t\tfs->io = NULL;\n\t\tbreak;\n"
}
]
},
"commit_link": "github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903... | 667 | cwe-476 | sbin/smtpd/lka_filter |
Determine whether the {function_name} code is vulnerable or not. | [
"filter_session_io(struct io *io, int evt, void *arg)\n{\n\tstruct filter_session *fs = arg;\n\tchar *line = NULL;\n\tssize_t len;",
"\tlog_trace(TRACE_IO, \"filter session: %p: %s %s\", fs, io_strevent(evt),\n\t io_strio(io));",
"\tswitch (evt) {\n\tcase IO_DATAIN:\n\tnextline:\n\t\tline = io_getline(fs->io... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [],
"deleted": [
{
"char_end": 478,
"char_start": 409,
"chars": "\n\tcase IO_DISCONNECTED:\n\t\tio_free(fs->io);\n\t\tfs->io = NULL;\n\t\tbreak;\n"
}
]
},
"commit_link": "github.com/openbsd/src/commit/6c3220444ed06b5796dedfd53a0f4becd903... | 667 | cwe-476 | sbin/smtpd/lka_filter |
Determine whether the {function_name} code is vulnerable or not. | [
"int x86_decode_insn(struct x86_emulate_ctxt *ctxt, void *insn, int insn_len)\n{\n\tint rc = X86EMUL_CONTINUE;\n\tint mode = ctxt->mode;\n\tint def_op_bytes, def_ad_bytes, goffset, simd_prefix;\n\tbool op_prefix = false;\n\tbool has_seg_override = false;\n\tstruct opcode opcode;",
"\tctxt->memop.type = OP_NONE;\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6463,
"char_start": 6439,
"chars": " && likely(ctxt->memopp)"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
"file_name": "arch/x86/kvm/emulate.c",
"f... | 668 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int x86_decode_insn(struct x86_emulate_ctxt *ctxt, void *insn, int insn_len)\n{\n\tint rc = X86EMUL_CONTINUE;\n\tint mode = ctxt->mode;\n\tint def_op_bytes, def_ad_bytes, goffset, simd_prefix;\n\tbool op_prefix = false;\n\tbool has_seg_override = false;\n\tstruct opcode opcode;",
"\tctxt->memop.type = OP_NONE;\n... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6463,
"char_start": 6439,
"chars": " && likely(ctxt->memopp)"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/d9092f52d7e61dd1557f2db2400ddb430e85937e",
"file_name": "arch/x86/kvm/emulate.c",
"f... | 668 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int expand_downwards(struct vm_area_struct *vma,\n\t\t\t\t unsigned long address)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\tstruct vm_area_struct *prev;",
"\tint error;",
"\n\taddress &= PAGE_MASK;",
"\terror = security_mmap_addr(address);\n\tif (error)\n\t\treturn error;",
"\n\t/* Enforce stack_guard_... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 161,
"char_start": 157,
"chars": " = 0"
},
{
"char_end": 195,
"char_start": 188,
"chars": "if (add"
},
{
"char_end": 199,
"char_start": 196,
"chars": "ess"
},
... | 669 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int expand_downwards(struct vm_area_struct *vma,\n\t\t\t\t unsigned long address)\n{\n\tstruct mm_struct *mm = vma->vm_mm;\n\tstruct vm_area_struct *prev;",
"\tint error = 0;",
"\n\taddress &= PAGE_MASK;",
"\tif (address < mmap_min_addr)\n\t\treturn -EPERM;",
"\n\t/* Enforce stack_guard_gap */\n\tprev = ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 161,
"char_start": 157,
"chars": " = 0"
},
{
"char_end": 195,
"char_start": 188,
"chars": "if (add"
},
{
"char_end": 199,
"char_start": 196,
"chars": "ess"
},
... | 669 | cwe-476 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"rfbHandleAuthResult(rfbClient* client)\n{",
" uint32_t authResult=0, reasonLen=0;\n char *reason=NULL;",
"\n if (!ReadFromRFBServer(client, (char *)&authResult, 4)) return FALSE;",
" authResult = rfbClientSwap32IfLE(authResult);",
" switch (authResult) {\n case rfbVncAuthOK:\n rfbCli... | [
1,
0,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 68,
"char_start": 68,
"chars": ""
}
],
"deleted": [
{
"char_end": 102,
"char_start": 66,
"chars": ", reasonLen=0;\n char *reason=NULL"
},
{
"char_end": 502,
"char_s... | 670 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"rfbHandleAuthResult(rfbClient* client)\n{",
" uint32_t authResult=0;",
"\n if (!ReadFromRFBServer(client, (char *)&authResult, 4)) return FALSE;",
" authResult = rfbClientSwap32IfLE(authResult);",
" switch (authResult) {\n case rfbVncAuthOK:\n rfbClientLog(\"VNC authentication succeeded... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 68,
"char_start": 68,
"chars": ""
}
],
"deleted": [
{
"char_end": 102,
"char_start": 66,
"chars": ", reasonLen=0;\n char *reason=NULL"
},
{
"char_end": 502,
"char_s... | 670 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"jbig2_image_compose(Jbig2Ctx *ctx, Jbig2Image *dst, Jbig2Image *src, int x, int y, Jbig2ComposeOp op)\n{\n uint32_t w, h;\n uint32_t shift;\n uint32_t leftbyte;\n uint8_t *ss;\n uint8_t *dd;\n uint8_t leftmask, rightmask;\n int early = x >= 0;\n int late;\n uint32_t bytewidth;\n uint3... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 617,
"char_start": 367,
"chars": "if ((UINT32_MAX - src->width < (x > 0 ? x : -x)) ||\n (UINT32_MAX - src->height < (y > 0 ? y : -y)))\n {\n#ifdef JBIG2_DEBUG\n jbig2_error(ctx, JBIG2_SEVERITY_DEBUG, -1, \"overflow in com... | 671 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"jbig2_image_compose(Jbig2Ctx *ctx, Jbig2Image *dst, Jbig2Image *src, int x, int y, Jbig2ComposeOp op)\n{\n uint32_t w, h;\n uint32_t shift;\n uint32_t leftbyte;\n uint8_t *ss;\n uint8_t *dd;\n uint8_t leftmask, rightmask;\n int early = x >= 0;\n int late;\n uint32_t bytewidth;\n uint3... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 617,
"char_start": 367,
"chars": "if ((UINT32_MAX - src->width < (x > 0 ? x : -x)) ||\n (UINT32_MAX - src->height < (y > 0 ? y : -y)))\n {\n#ifdef JBIG2_DEBUG\n jbig2_error(ctx, JBIG2_SEVERITY_DEBUG, -1, \"overflow in com... | 671 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"next_state_class(CClassNode* cc, OnigCodePoint* vs, enum CCVALTYPE* type,\n\t\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;",
" if (*state == CCS_RANGE)\n return ONIGERR_CHAR_CLASS_VALUE_AT_END_OF_RANGE;",
" if (*state == CCS_VALUE && *type != CCV_CLASS) {\n if (*type == CCV_SB)\n BITSET_SET_B... | [
1,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 487,
"char_start": 458,
"chars": "if (*state != CCS_START)\n "
},
{
"char_end": 507,
"char_start": 506,
"chars": "\n"
}
],
"deleted": []
},
"commit_link": "github.com/kkos/oniguruma/... | 672 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"next_state_class(CClassNode* cc, OnigCodePoint* vs, enum CCVALTYPE* type,\n\t\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;",
" if (*state == CCS_RANGE)\n return ONIGERR_CHAR_CLASS_VALUE_AT_END_OF_RANGE;",
" if (*state == CCS_VALUE && *type != CCV_CLASS) {\n if (*type == CCV_SB)\n BITSET_SET_B... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 487,
"char_start": 458,
"chars": "if (*state != CCS_START)\n "
},
{
"char_end": 507,
"char_start": 506,
"chars": "\n"
}
],
"deleted": []
},
"commit_link": "github.com/kkos/oniguruma/... | 672 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int mpol_parse_str(char *str, struct mempolicy **mpol)\n{\n\tstruct mempolicy *new = NULL;\n\tunsigned short mode_flags;\n\tnodemask_t nodes;\n\tchar *nodelist = strchr(str, ':');\n\tchar *flags = strchr(str, '=');\n\tint err = 1, mode;",
"\tif (flags)\n\t\t*flags++ = '\\0';\t/* terminate mode string */",
"\ti... | [
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 798,
"char_start": 679,
"chars": ", although later\n\t\t * we use first_node(nodes) to grab a single node, so here\n\t\t * nodelist (or nodes) cannot be empty."
},
{
"char_end": 940,
"char_start": 899,
"... | 673 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int mpol_parse_str(char *str, struct mempolicy **mpol)\n{\n\tstruct mempolicy *new = NULL;\n\tunsigned short mode_flags;\n\tnodemask_t nodes;\n\tchar *nodelist = strchr(str, ':');\n\tchar *flags = strchr(str, '=');\n\tint err = 1, mode;",
"\tif (flags)\n\t\t*flags++ = '\\0';\t/* terminate mode string */",
"\ti... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 798,
"char_start": 679,
"chars": ", although later\n\t\t * we use first_node(nodes) to grab a single node, so here\n\t\t * nodelist (or nodes) cannot be empty."
},
{
"char_end": 940,
"char_start": 899,
"... | 673 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"keycompare_mb (const struct line *a, const struct line *b)\n{\n struct keyfield *key = keylist;",
" /* For the first iteration only, the key positions have been\n precomputed for us. */\n char *texta = a->keybeg;\n char *textb = b->keybeg;\n char *lima = a->keylim;\n char *limb = b->keylim;",
" size... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6046,
"char_start": 5977,
"chars": "if (SIZE_MAX - lenb - 2 < lena)\n xalloc_die ();\n "
},
{
"char_end": 6072,
"char_start": 6071,
"chars": "n"
},
{
"char_end": 6... | 674 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"keycompare_mb (const struct line *a, const struct line *b)\n{\n struct keyfield *key = keylist;",
" /* For the first iteration only, the key positions have been\n precomputed for us. */\n char *texta = a->keybeg;\n char *textb = b->keybeg;\n char *lima = a->keylim;\n char *limb = b->keylim;",
" size... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6046,
"char_start": 5977,
"chars": "if (SIZE_MAX - lenb - 2 < lena)\n xalloc_die ();\n "
},
{
"char_end": 6072,
"char_start": 6071,
"chars": "n"
},
{
"char_end": 6... | 674 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,\n\t int* vs_israw, int v_israw,\n\t enum CCVALTYPE intype, enum CCVALTYPE* type,\n\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;",
" switch (*state) {\n case CCS_VALUE:\n if (*type == CCV_SB) {",
"",
" BITSET_S... | [
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 356,
"char_start": 282,
"chars": "if (*vs > 0xff)\n return ONIGERR_INVALID_CODE_POINT_VALUE;\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c5433... | 675 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v,\n\t int* vs_israw, int v_israw,\n\t enum CCVALTYPE intype, enum CCVALTYPE* type,\n\t enum CCSTATE* state, ScanEnv* env)\n{\n int r;",
" switch (*state) {\n case CCS_VALUE:\n if (*type == CCV_SB) {",
" if (*vs > 0xff... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 356,
"char_start": 282,
"chars": "if (*vs > 0xff)\n return ONIGERR_INVALID_CODE_POINT_VALUE;\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c5433... | 675 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,\n CodedBitstreamFragment *frag,\n int header)\n{\n AVBufferRef *data_ref;\n uint8_t *data;\n size_t data_size;\n int unit, start, end, marker, next_start, next_marker;\n ... | [
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3493,
"char_start": 3410,
"chars": "if (length > end - start)\n return AVERROR_INVALIDDATA;\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e... | 676 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,\n CodedBitstreamFragment *frag,\n int header)\n{\n AVBufferRef *data_ref;\n uint8_t *data;\n size_t data_size;\n int unit, start, end, marker, next_start, next_marker;\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3493,
"char_start": 3410,
"chars": "if (length > end - start)\n return AVERROR_INVALIDDATA;\n\n "
}
],
"deleted": []
},
"commit_link": "github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e... | 676 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,\n int linesize_align[AV_NUM_DATA_POINTERS])\n{\n int i;\n int w_align = 1;\n int h_align = 1;\n AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);",
" if (desc) {\n w_alig... | [
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3818,
"char_start": 3700,
"chars": "if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) {\n w_align = 8;\n h_align = 8;\n }\n "
},
{
"char_end": 4158,
"char_start": 4100,
... | 677 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,\n int linesize_align[AV_NUM_DATA_POINTERS])\n{\n int i;\n int w_align = 1;\n int h_align = 1;\n AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);",
" if (desc) {\n w_alig... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3818,
"char_start": 3700,
"chars": "if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) {\n w_align = 8;\n h_align = 8;\n }\n "
},
{
"char_end": 4158,
"char_start": 4100,
... | 677 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)\n\t{\n\tconst u_char* data_start = data;",
"\tif ( len <= 0 )\n\t\treturn 0;",
"\tfor ( ; len > 0; --len, ++data )\n\t\t{\n\t\tif ( offset >= buf_len )\n\t\t\tInitBuffer(buf_len * 2);",
"\t\tint c = data[0];",
"#define EMIT_LINE \\\n\t{ \... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1174,
"char_start": 803,
"chars": "// Weird corner-case:\n\t\t\t\t// this can happen if we see a \\r at the end of a packet where crlf is\n\t\t\t\t// set to CR_as_EOL | LF_as_EOL, with the packet causing crlf to be set to\n\t\t\t\t// 0 and... | 678 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)\n\t{\n\tconst u_char* data_start = data;",
"\tif ( len <= 0 )\n\t\treturn 0;",
"\tfor ( ; len > 0; --len, ++data )\n\t\t{\n\t\tif ( offset >= buf_len )\n\t\t\tInitBuffer(buf_len * 2);",
"\t\tint c = data[0];",
"#define EMIT_LINE \\\n\t{ \... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1174,
"char_start": 803,
"chars": "// Weird corner-case:\n\t\t\t\t// this can happen if we see a \\r at the end of a packet where crlf is\n\t\t\t\t// set to CR_as_EOL | LF_as_EOL, with the packet causing crlf to be set to\n\t\t\t\t// 0 and... | 678 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"idn2_to_ascii_4i (const uint32_t * input, size_t inlen, char * output, int flags)\n{\n uint32_t *input_u32;\n uint8_t *input_u8, *output_u8;\n size_t length;\n int rc;",
" if (!input)\n {\n if (output)\n\t*output = 0;\n return IDN2_OK;\n }",
" input_u32 = (uint32_t *) malloc ((inlen + 1) ... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1063,
"char_start": 921,
"chars": "size_t len = strlen ((char *) output_u8);\n\n if (len > 63)\n {\n\t free (output_u8);\n\t return IDN2_TOO_BIG_DOMAIN;\n }\n\n "
},
{
"char_end": 1125,
... | 679 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"idn2_to_ascii_4i (const uint32_t * input, size_t inlen, char * output, int flags)\n{\n uint32_t *input_u32;\n uint8_t *input_u8, *output_u8;\n size_t length;\n int rc;",
" if (!input)\n {\n if (output)\n\t*output = 0;\n return IDN2_OK;\n }",
" input_u32 = (uint32_t *) malloc ((inlen + 1) ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1063,
"char_start": 921,
"chars": "size_t len = strlen ((char *) output_u8);\n\n if (len > 63)\n {\n\t free (output_u8);\n\t return IDN2_TOO_BIG_DOMAIN;\n }\n\n "
},
{
"char_end": 1125,
... | 679 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int blosc_c(struct thread_context* thread_context, int32_t bsize,",
" int32_t leftoverblock, int32_t ntbytes, int32_t maxbytes,",
" const uint8_t* src, const int32_t offset, uint8_t* dest,\n uint8_t* tmp, uint8_t* tmp2) {\n blosc2_context* context =... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 143,
"char_start": 140,
"chars": "des"
},
{
"char_end": 147,
"char_start": 144,
"chars": "siz"
},
{
"char_end": 2607,
"char_start": 2482,
"chars": "if (ntbytes > dests... | 680 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int blosc_c(struct thread_context* thread_context, int32_t bsize,",
" int32_t leftoverblock, int32_t ntbytes, int32_t destsize,",
" const uint8_t* src, const int32_t offset, uint8_t* dest,\n uint8_t* tmp, uint8_t* tmp2) {\n blosc2_context* context =... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 143,
"char_start": 140,
"chars": "des"
},
{
"char_end": 147,
"char_start": 144,
"chars": "siz"
},
{
"char_end": 2607,
"char_start": 2482,
"chars": "if (ntbytes > dests... | 680 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"bool Scanner::fill(size_t need)\n{\n if (eof) return false;",
" pop_finished_files();",
" DASSERT(bot <= tok && tok <= lim);\n size_t free = static_cast<size_t>(tok - bot);\n size_t copy = static_cast<size_t>(lim - tok);",
" if (free >= need) {\n memmove(bot, tok, copy);\n shi... | [
1,
1,
1,
1,
1,
0,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 564,
"char_start": 563,
"chars": "t"
},
{
"char_end": 566,
"char_start": 565,
"chars": "k"
},
{
"char_end": 687,
"char_start": 647,
"chars": "\n DASSERT(lim + free ... | 681 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"bool Scanner::fill(size_t need)\n{\n if (eof) return false;",
" pop_finished_files();",
" DASSERT(bot <= tok && tok <= lim);\n size_t free = static_cast<size_t>(tok - bot);\n size_t copy = static_cast<size_t>(lim - tok);",
" if (free >= need) {\n memmove(bot, tok, copy);\n shi... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 564,
"char_start": 563,
"chars": "t"
},
{
"char_end": 566,
"char_start": 565,
"chars": "k"
},
{
"char_end": 687,
"char_start": 647,
"chars": "\n DASSERT(lim + free ... | 681 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"input_csi_dispatch_sgr_colon(struct input_ctx *ictx, u_int i)\n{\n\tstruct grid_cell\t*gc = &ictx->cell.cell;\n\tchar\t\t\t*s = ictx->param_list[i].str, *copy, *ptr, *out;\n\tint\t\t\t p[8];\n\tu_int\t\t\t n;\n\tconst char\t\t*errstr;",
"\tfor (n = 0; n < nitems(p); n++)\n\t\tp[n] = -1;\n\tn = 0;",
"\tptr = co... | [
1,
1,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 495,
"char_start": 493,
"chars": " {"
},
{
"char_end": 565,
"char_start": 503,
"chars": "\n\t\t\tif (n == nitems(p)) {\n\t\t\t\tfree(copy);\n\t\t\t\treturn;\n\t\t\t}\n\t\t}"
}
],
"deleted":... | 682 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"input_csi_dispatch_sgr_colon(struct input_ctx *ictx, u_int i)\n{\n\tstruct grid_cell\t*gc = &ictx->cell.cell;\n\tchar\t\t\t*s = ictx->param_list[i].str, *copy, *ptr, *out;\n\tint\t\t\t p[8];\n\tu_int\t\t\t n;\n\tconst char\t\t*errstr;",
"\tfor (n = 0; n < nitems(p); n++)\n\t\tp[n] = -1;\n\tn = 0;",
"\tptr = co... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 495,
"char_start": 493,
"chars": " {"
},
{
"char_end": 565,
"char_start": 503,
"chars": "\n\t\t\tif (n == nitems(p)) {\n\t\t\t\tfree(copy);\n\t\t\t\treturn;\n\t\t\t}\n\t\t}"
}
],
"deleted":... | 682 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"char *enl_ipc_get(const char *msg_data)\n{",
"\tstatic char *message = NULL;",
"\tstatic unsigned short len = 0;",
"\tchar buff[13], *ret_msg = NULL;\n\tregister unsigned char i;\n\tunsigned char blen;",
"\tif (msg_data == IPC_TIMEOUT) {\n\t\treturn(IPC_TIMEOUT);\n\t}\n\tfor (i = 0; i < 12; i++) {\n\t\tbuf... | [
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 84,
"char_start": 83,
"chars": "z"
},
{
"char_end": 86,
"char_start": 85,
"chars": "_"
}
],
"deleted": [
{
"char_end": 83,
"char_start": 81,
"chars": "un"
... | 683 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"char *enl_ipc_get(const char *msg_data)\n{",
"\tstatic char *message = NULL;",
"\tstatic size_t len = 0;",
"\tchar buff[13], *ret_msg = NULL;\n\tregister unsigned char i;\n\tunsigned char blen;",
"\tif (msg_data == IPC_TIMEOUT) {\n\t\treturn(IPC_TIMEOUT);\n\t}\n\tfor (i = 0; i < 12; i++) {\n\t\tbuff[i] = m... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 84,
"char_start": 83,
"chars": "z"
},
{
"char_end": 86,
"char_start": 85,
"chars": "_"
}
],
"deleted": [
{
"char_end": 83,
"char_start": 81,
"chars": "un"
... | 683 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)\n{\n\tbool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;\n\tu32 chunk_size = mr->chunk_size, headroom = mr->headroom;\n\tunsigned int chunks, chunks_per_page;\n\tu64 addr = mr->addr, size = mr->len;",
"\tint size_chk, err;",
... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1198,
"char_start": 1194,
"chars": "f (h"
},
{
"char_end": 1205,
"char_start": 1199,
"chars": "adroom"
},
{
"char_end": 1207,
"char_start": 1206,
"chars": ">"
}
... | 684 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)\n{\n\tbool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;\n\tu32 chunk_size = mr->chunk_size, headroom = mr->headroom;\n\tunsigned int chunks, chunks_per_page;\n\tu64 addr = mr->addr, size = mr->len;",
"\tint err;",
"\n\tif ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1198,
"char_start": 1194,
"chars": "f (h"
},
{
"char_end": 1205,
"char_start": 1199,
"chars": "adroom"
},
{
"char_end": 1207,
"char_start": 1206,
"chars": ">"
}
... | 684 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void gps_tracker( void )\n{\n\tssize_t unused;\n int gpsd_sock;\n char line[256], *temp;\n struct sockaddr_in gpsd_addr;\n int ret, is_json, pos;\n fd_set read_fd;\n struct timeval timeout;",
" /* attempt to connect to localhost, port 2947 */",
" pos = 0;\n gpsd_sock = socket( AF_INE... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2444,
"char_start": 2438,
"chars": "pos - "
}
],
"deleted": []
},
"commit_link": "github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/",
"file_name": "src/airodump-ng.c",
"func_name": "g... | 685 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void gps_tracker( void )\n{\n\tssize_t unused;\n int gpsd_sock;\n char line[256], *temp;\n struct sockaddr_in gpsd_addr;\n int ret, is_json, pos;\n fd_set read_fd;\n struct timeval timeout;",
" /* attempt to connect to localhost, port 2947 */",
" pos = 0;\n gpsd_sock = socket( AF_INE... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2444,
"char_start": 2438,
"chars": "pos - "
}
],
"deleted": []
},
"commit_link": "github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/",
"file_name": "src/airodump-ng.c",
"func_name": "g... | 685 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int tcp_test(const char* ip_str, const short port)\n{\n int sock, i;\n struct sockaddr_in s_in;\n int packetsize = 1024;\n unsigned char packet[packetsize];\n struct timeval tv, tv2, tv3;\n int caplen = 0;\n int times[REQUESTS];\n int min, avg, max, len;\n struct net_hdr nh;",
" tv3... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2330,
"char_start": 2265,
"chars": " (len > 1024 || len < 0)\n continue;\n if"
}
],
"deleted": []
},
"commit_link": "github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b55... | 686 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int tcp_test(const char* ip_str, const short port)\n{\n int sock, i;\n struct sockaddr_in s_in;\n int packetsize = 1024;\n unsigned char packet[packetsize];\n struct timeval tv, tv2, tv3;\n int caplen = 0;\n int times[REQUESTS];\n int min, avg, max, len;\n struct net_hdr nh;",
" tv3... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2330,
"char_start": 2265,
"chars": " (len > 1024 || len < 0)\n continue;\n if"
}
],
"deleted": []
},
"commit_link": "github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b55... | 686 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"mapi_attr_read (size_t len, unsigned char *buf)\n{\n size_t idx = 0;\n uint32 i,j;\n assert(len > 4);\n uint32 num_properties = GETINT32(buf+idx);",
"",
" MAPI_Attr** attrs = CHECKED_XMALLOC (MAPI_Attr*, (num_properties + 1));",
" idx += 4;",
" if (!attrs) return NULL;\n for (i = 0;... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 195,
"char_start": 158,
"chars": "assert((num_properties+1) != 0);\n "
},
{
"char_end": 1305,
"char_start": 1257,
"chars": "len);\n\t\t assert((idx+(a->names[i].len*2)) <= "
},
{
... | 687 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"mapi_attr_read (size_t len, unsigned char *buf)\n{\n size_t idx = 0;\n uint32 i,j;\n assert(len > 4);\n uint32 num_properties = GETINT32(buf+idx);",
" assert((num_properties+1) != 0);",
" MAPI_Attr** attrs = CHECKED_XMALLOC (MAPI_Attr*, (num_properties + 1));",
" idx += 4;",
" if (!... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 195,
"char_start": 158,
"chars": "assert((num_properties+1) != 0);\n "
},
{
"char_end": 1305,
"char_start": 1257,
"chars": "len);\n\t\t assert((idx+(a->names[i].len*2)) <= "
},
{
... | 687 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static size_t WritePSDChannel(const PSDInfo *psd_info,\n const ImageInfo *image_info,Image *image,Image *next_image,\n const QuantumType quantum_type, unsigned char *compact_pixels,\n MagickOffsetType size_offset,const MagickBooleanType separate,\n ExceptionInfo *exception)\n{\n int\n y;",
" MagickBoole... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1059,
"char_start": 1054,
"chars": "next_"
}
],
"deleted": []
},
"commit_link": "github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88",
"file_name": "coders/psd.c",
"func_name": "WritePSD... | 688 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static size_t WritePSDChannel(const PSDInfo *psd_info,\n const ImageInfo *image_info,Image *image,Image *next_image,\n const QuantumType quantum_type, unsigned char *compact_pixels,\n MagickOffsetType size_offset,const MagickBooleanType separate,\n ExceptionInfo *exception)\n{\n int\n y;",
" MagickBoole... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1059,
"char_start": 1054,
"chars": "next_"
}
],
"deleted": []
},
"commit_link": "github.com/ImageMagick/ImageMagick/commit/91cc3f36f2ccbd485a0456bab9aebe63b635da88",
"file_name": "coders/psd.c",
"func_name": "WritePSD... | 688 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int flb_gzip_compress(void *in_data, size_t in_len,\n void **out_data, size_t *out_len)\n{\n int flush;\n int status;\n int footer_start;\n uint8_t *pb;\n size_t out_size;\n void *out_buf;\n z_stream strm;\n mz_ulong crc;\n",
" out_size = in_len + 32;",
" out_... | [
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 259,
"char_start": 258,
"chars": "\n"
},
{
"char_end": 324,
"char_start": 263,
"chars": "/*\n * GZIP relies on an algorithm with worst-case expansi"
},
{
"char_end": 418,
... | 689 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int flb_gzip_compress(void *in_data, size_t in_len,\n void **out_data, size_t *out_len)\n{\n int flush;\n int status;\n int footer_start;\n uint8_t *pb;\n size_t out_size;\n void *out_buf;\n z_stream strm;\n mz_ulong crc;\n",
"\n /*\n * GZIP relies on an algori... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 259,
"char_start": 258,
"chars": "\n"
},
{
"char_end": 324,
"char_start": 263,
"chars": "/*\n * GZIP relies on an algorithm with worst-case expansi"
},
{
"char_end": 418,
... | 689 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,\n\t\tunsigned char **out, size_t *out_len,\n\t\tint verify_pin)\n{\n\tstruct sc_context *ctx = p15card->card->ctx;\n\tstruct sc_card *card = p15card->card;\n\tstruct sc_file *file = NULL;\n\tstruct sc_path path;\n\tsize_t sz;\n\tint rv;",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1110,
"char_start": 1109,
"chars": "s"
},
{
"char_end": 1114,
"char_start": 1111,
"chars": "ze_"
},
{
"char_end": 1124,
"char_start": 1123,
"chars": "s"
},
... | 690 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,\n\t\tunsigned char **out, size_t *out_len,\n\t\tint verify_pin)\n{\n\tstruct sc_context *ctx = p15card->card->ctx;\n\tstruct sc_card *card = p15card->card;\n\tstruct sc_file *file = NULL;\n\tstruct sc_path path;\n\tsize_t sz;\n\tint rv;",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1110,
"char_start": 1109,
"chars": "s"
},
{
"char_end": 1114,
"char_start": 1111,
"chars": "ze_"
},
{
"char_end": 1124,
"char_start": 1123,
"chars": "s"
},
... | 690 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"TfLiteStatus ResizeOutputTensor(TfLiteContext* context,\n const TfLiteTensor* data,\n const TfLiteTensor* segment_ids,\n TfLiteTensor* output) {",
" int max_index = -1;",
" const int segment_id_size = segment_ids->di... | [
1,
0,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 274,
"char_start": 237,
"chars": "// Segment ids should be of same card"
},
{
"char_end": 279,
"char_start": 276,
"chars": "ali"
},
{
"char_end": 284,
"char_start": 280,
... | 691 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"TfLiteStatus ResizeOutputTensor(TfLiteContext* context,\n const TfLiteTensor* data,\n const TfLiteTensor* segment_ids,\n TfLiteTensor* output) {",
" // Segment ids should be of same cardinality as first input dimension ... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 274,
"char_start": 237,
"chars": "// Segment ids should be of same card"
},
{
"char_end": 279,
"char_start": 276,
"chars": "ali"
},
{
"char_end": 284,
"char_start": 280,
... | 691 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,\n\t\t\t const struct host_cmd_ds_command *resp)\n{\n\tu8 *curr = (u8 *) &resp->params.get_wmm_status;\n\tuint16_t resp_len = le16_to_cpu(resp->size), tlv_len;\n\tint mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;\n\tbool valid = true;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2114,
"char_start": 2017,
"chars": "if (wmm_param_ie->vend_hdr.len + 2 >\n\t\t\t\tsizeof(struct ieee_types_wmm_parameter))\n\t\t\t\tbreak;\n\n\t\t\t"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/... | 692 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,\n\t\t\t const struct host_cmd_ds_command *resp)\n{\n\tu8 *curr = (u8 *) &resp->params.get_wmm_status;\n\tuint16_t resp_len = le16_to_cpu(resp->size), tlv_len;\n\tint mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;\n\tbool valid = true;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2114,
"char_start": 2017,
"chars": "if (wmm_param_ie->vend_hdr.len + 2 >\n\t\t\t\tsizeof(struct ieee_types_wmm_parameter))\n\t\t\t\tbreak;\n\n\t\t\t"
}
],
"deleted": []
},
"commit_link": "github.com/torvalds/linux/commit/... | 692 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static PyObject* patch(PyObject* self, PyObject* args)\n{\n char *origData, *newData, *diffBlock, *extraBlock, *diffPtr, *extraPtr;\n Py_ssize_t origDataLength, newDataLength, diffBlockLength, extraBlockLength;\n PyObject *controlTuples, *tuple, *results;\n off_t oldpos, newpos, x, y, z;\n int i, j,... | [
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2284,
"char_start": 2035,
"chars": "\n if (newpos + y > newDataLength ||\n extraPtr + y > extraBlock + extraBlockLength) {\n PyMem_Free(newData);\n PyErr_SetString(PyExc_ValueError, \"corrupt pat... | 693 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static PyObject* patch(PyObject* self, PyObject* args)\n{\n char *origData, *newData, *diffBlock, *extraBlock, *diffPtr, *extraPtr;\n Py_ssize_t origDataLength, newDataLength, diffBlockLength, extraBlockLength;\n PyObject *controlTuples, *tuple, *results;\n off_t oldpos, newpos, x, y, z;\n int i, j,... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2284,
"char_start": 2035,
"chars": "\n if (newpos + y > newDataLength ||\n extraPtr + y > extraBlock + extraBlockLength) {\n PyMem_Free(newData);\n PyErr_SetString(PyExc_ValueError, \"corrupt pat... | 693 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"HandleRFBServerMessage(rfbClient* client)\n{\n rfbServerToClientMsg msg;",
" if (client->serverPort==-1)\n client->vncRec->readTimestamp = TRUE;\n if (!ReadFromRFBServer(client, (char *)&msg, 1))\n return FALSE;",
" switch (msg.type) {",
" case rfbSetColourMapEntries:\n {\n /* TODO:\n int i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0... | SVEN | {
"char_changes": {
"added": [],
"deleted": [
{
"char_end": 15608,
"char_start": 15598,
"chars": "(uint64_t)"
}
]
},
"commit_link": "github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae",
"file_name": "libvncclient/rfbproto.c",
"func_na... | 694 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"HandleRFBServerMessage(rfbClient* client)\n{\n rfbServerToClientMsg msg;",
" if (client->serverPort==-1)\n client->vncRec->readTimestamp = TRUE;\n if (!ReadFromRFBServer(client, (char *)&msg, 1))\n return FALSE;",
" switch (msg.type) {",
" case rfbSetColourMapEntries:\n {\n /* TODO:\n int i... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | SVEN | {
"char_changes": {
"added": [],
"deleted": [
{
"char_end": 15608,
"char_start": 15598,
"chars": "(uint64_t)"
}
]
},
"commit_link": "github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae",
"file_name": "libvncclient/rfbproto.c",
"func_na... | 694 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"int32_t *enc_untrusted_create_wait_queue() {\n MessageWriter input;\n MessageReader output;\n input.Push<uint64_t>(sizeof(int32_t));\n const auto status = NonSystemCallDispatcher(\n ::asylo::host_call::kLocalLifetimeAllocHandler, &input, &output);\n CheckStatusAndParamCount(status, output, \"enc_untruste... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 633,
"char_start": 438,
"chars": "f (!TrustedPrimitives::IsOutsideEnclave(queue, sizeof(int32_t))) {\n TrustedPrimitives::BestEffortAbort(\n \"enc_untrusted_create_wait_queue: queue should be in untrusted memory\");\n }\n i"
... | 695 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"int32_t *enc_untrusted_create_wait_queue() {\n MessageWriter input;\n MessageReader output;\n input.Push<uint64_t>(sizeof(int32_t));\n const auto status = NonSystemCallDispatcher(\n ::asylo::host_call::kLocalLifetimeAllocHandler, &input, &output);\n CheckStatusAndParamCount(status, output, \"enc_untruste... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 633,
"char_start": 438,
"chars": "f (!TrustedPrimitives::IsOutsideEnclave(queue, sizeof(int32_t))) {\n TrustedPrimitives::BestEffortAbort(\n \"enc_untrusted_create_wait_queue: queue should be in untrusted memory\");\n }\n i"
... | 695 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"bool FromkLinuxSockAddr(const struct klinux_sockaddr *input,\n socklen_t input_len, struct sockaddr *output,\n socklen_t *output_len,\n void (*abort_handler)(const char *)) {\n if (!input || !output || !output_len || input_len == 0) {\n outpu... | [
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 526,
"char_start": 442,
"chars": "if (input_len < sizeof(struct klinux_sockaddr_un)) {\n return false;\n }\n\n "
},
{
"char_end": 1265,
"char_start": 1182,
"chars": " if (input_len < sizeof... | 696 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"bool FromkLinuxSockAddr(const struct klinux_sockaddr *input,\n socklen_t input_len, struct sockaddr *output,\n socklen_t *output_len,\n void (*abort_handler)(const char *)) {\n if (!input || !output || !output_len || input_len == 0) {\n outpu... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 526,
"char_start": 442,
"chars": "if (input_len < sizeof(struct klinux_sockaddr_un)) {\n return false;\n }\n\n "
},
{
"char_end": 1265,
"char_start": 1182,
"chars": " if (input_len < sizeof... | 696 | cwe-787 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,\n\t\t\t\t\t\t\t\t\t\topj_cp_t *p_cp,\n\t\t\t\t\t\t\t\t\t\tOPJ_UINT32 p_tile_no)\n{\n\t/* loop */\n\tOPJ_UINT32 pino;\n\tOPJ_UINT32 compno, resno;",
"\t/* to store w, h, dx and dy fro all components and resolutions */\n\tOPJ_UINT32 * l_tmp_data;\n\tOPJ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2269,
"char_start": 2140,
"chars": "/* prevent an integer overflow issue */\n\tl_current_pi->include = 00;\n\tif (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U)))\n\t{\n\t\t"
},
{
"char_end": 2374,
"char_start"... | 697 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,\n\t\t\t\t\t\t\t\t\t\topj_cp_t *p_cp,\n\t\t\t\t\t\t\t\t\t\tOPJ_UINT32 p_tile_no)\n{\n\t/* loop */\n\tOPJ_UINT32 pino;\n\tOPJ_UINT32 compno, resno;",
"\t/* to store w, h, dx and dy fro all components and resolutions */\n\tOPJ_UINT32 * l_tmp_data;\n\tOPJ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 2269,
"char_start": 2140,
"chars": "/* prevent an integer overflow issue */\n\tl_current_pi->include = 00;\n\tif (l_step_l <= (SIZE_MAX / (l_tcp->numlayers + 1U)))\n\t{\n\t\t"
},
{
"char_end": 2374,
"char_start"... | 697 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;",
" /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3370,
"char_start": 3197,
"chars": "if (parameters->numresolution == 1) {\n parameters->res_spec = 1;\n parameters->prcw_init[0] = 128;\n parameters->prch_init[0] = 128;\n } else {\n "
},
{
... | 698 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;",
" /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 3370,
"char_start": 3197,
"chars": "if (parameters->numresolution == 1) {\n parameters->res_spec = 1;\n parameters->prcw_init[0] = 128;\n parameters->prch_init[0] = 128;\n } else {\n "
},
{
... | 698 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;",
" int contentlen = 0;",
" int isform = 0;",
" pp.inbuf = 0;\n pp.cp = param;",
" buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetlinebuf... | [
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 151,
"char_start": 148,
"chars": "uns"
},
{
"char_end": 153,
"char_start": 152,
"chars": "g"
},
{
"char_end": 156,
"char_start": 154,
"chars": "ed"
},
{
... | 699 | cwe-787 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;",
" unsigned contentlen = 0;",
" int isform = 0;",
" pp.inbuf = 0;\n pp.cp = param;",
" buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 151,
"char_start": 148,
"chars": "uns"
},
{
"char_end": 153,
"char_start": 152,
"chars": "g"
},
{
"char_end": 156,
"char_start": 154,
"chars": "ed"
},
{
... | 699 | cwe-787 | c |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.