prompt stringclasses 547
values | completions listlengths 1 63.8k | labels listlengths 1 63.8k | source stringclasses 5
values | index int64 0 151k |
|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,\n\t\t\t\t\t\t\t\t\t\topj_cp_t *p_cp,\n\t\t\t\t\t\t\t\t\t\tOPJ_UINT32 p_tile_no)\n{\n\t/* loop */\n\tOPJ_UINT32 pino;\n\tOPJ_UINT32 compno, resno;",
"\t/* to store w, h, dx and dy fro all components and resolutions */\n\tOPJ_UINT32 * l_tmp_data;\n\tOPJ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 697 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;",
" /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 698 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void opj_j2k_set_cinema_parameters(opj_cparameters_t *parameters,\n opj_image_t *image, opj_event_mgr_t *p_manager)\n{\n /* Configure cinema parameters */\n int i;",
" /* No tiling */\n parameters->tile_size_on = OPJ_FALSE;\n parameters->cp_tdx = 1;\n parameters->cp_tdy = 1;",
"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 698 |
Determine whether the {function_name} code is vulnerable or not. | [
"void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;",
" int contentlen = 0;",
" int isform = 0;",
" pp.inbuf = 0;\n pp.cp = param;",
" buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetlinebuf... | [
1,
0,
1,
1,
1,
0,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1
] | SVEN | 699 |
Determine whether the {function_name} code is vulnerable or not. | [
"void * adminchild(struct clientparam* param) {\n int i, res;\n char * buf;\n char username[256];\n char *sb;\n char *req = NULL;\n struct printparam pp;",
" unsigned contentlen = 0;",
" int isform = 0;",
" pp.inbuf = 0;\n pp.cp = param;",
" buf = myalloc(LINESIZE);\n if(!buf) {RETURN(555);}\n i = sockgetli... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 699 |
Determine whether the {function_name} code is vulnerable or not. | [
"int ecall_restore(const char *input, uint64_t input_len, char **output,\n uint64_t *output_len) {\n if (!asylo::primitives::TrustedPrimitives::IsOutsideEnclave(input,\n input_len) ||\n !asylo::primitives::TrustedPrimitives::IsOutsi... | [
1,
0,
1,
1
] | SVEN | 700 |
Determine whether the {function_name} code is vulnerable or not. | [
"int ecall_restore(const char *input, uint64_t input_len, char **output,\n uint64_t *output_len) {\n if (!asylo::primitives::TrustedPrimitives::IsOutsideEnclave(input,\n input_len) ||\n !asylo::primitives::TrustedPrimitives::IsOutsi... | [
1,
1,
1,
1
] | SVEN | 700 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void handle_PORT(ctrl_t *ctrl, char *str)\n{\n\tint a, b, c, d, e, f;\n\tchar addr[INET_ADDRSTRLEN];\n\tstruct sockaddr_in sin;",
"\tif (ctrl->data_sd > 0) {\n\t\tuev_io_stop(&ctrl->data_watcher);\n\t\tclose(ctrl->data_sd);\n\t\tctrl->data_sd = -1;\n\t}",
"\t/* Convert PORT command's argument to IP addr... | [
1,
1,
1,
0,
1,
1,
1
] | SVEN | 701 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void handle_PORT(ctrl_t *ctrl, char *str)\n{\n\tint a, b, c, d, e, f;\n\tchar addr[INET_ADDRSTRLEN];\n\tstruct sockaddr_in sin;",
"\tif (ctrl->data_sd > 0) {\n\t\tuev_io_stop(&ctrl->data_watcher);\n\t\tclose(ctrl->data_sd);\n\t\tctrl->data_sd = -1;\n\t}",
"\t/* Convert PORT command's argument to IP addr... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | 701 |
Determine whether the {function_name} code is vulnerable or not. | [
"int rom_copy(uint8_t *dest, hwaddr addr, size_t size)\n{\n hwaddr end = addr + size;\n uint8_t *s, *d = dest;\n size_t l = 0;\n Rom *rom;",
" QTAILQ_FOREACH(rom, &roms, next) {\n if (rom->fw_file) {\n continue;\n }\n if (rom->mr) {\n continue;\n }\... | [
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 702 |
Determine whether the {function_name} code is vulnerable or not. | [
"int rom_copy(uint8_t *dest, hwaddr addr, size_t size)\n{\n hwaddr end = addr + size;\n uint8_t *s, *d = dest;\n size_t l = 0;\n Rom *rom;",
" QTAILQ_FOREACH(rom, &roms, next) {\n if (rom->fw_file) {\n continue;\n }\n if (rom->mr) {\n continue;\n }\... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 702 |
Determine whether the {function_name} code is vulnerable or not. | [
"NeXTDecode(TIFF* tif, uint8* buf, tmsize_t occ, uint16 s)\n{\n\tstatic const char module[] = \"NeXTDecode\";\n\tunsigned char *bp, *op;\n\ttmsize_t cc;\n\tuint8* row;\n\ttmsize_t scanline, n;",
"\t(void) s;\n\t/*\n\t * Each scanline is assumed to start off as all\n\t * white (we assume a PhotometricInterpretatio... | [
1,
1,
1,
0,
1,
0,
1,
0,
1
] | SVEN | 703 |
Determine whether the {function_name} code is vulnerable or not. | [
"NeXTDecode(TIFF* tif, uint8* buf, tmsize_t occ, uint16 s)\n{\n\tstatic const char module[] = \"NeXTDecode\";\n\tunsigned char *bp, *op;\n\ttmsize_t cc;\n\tuint8* row;\n\ttmsize_t scanline, n;",
"\t(void) s;\n\t/*\n\t * Each scanline is assumed to start off as all\n\t * white (we assume a PhotometricInterpretatio... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 703 |
Determine whether the {function_name} code is vulnerable or not. | [
"TiledInputFile::rawTileData (int &dx, int &dy,\n\t\t\t int &lx, int &ly,\n const char *&pixelData,\n\t\t\t int &pixelDataSize)\n{\n try\n {\n Lock lock (*_data->_streamData);",
" if (!isValidTile (dx, dy, lx, ly))\n throw IEX_NAMESPACE::ArgExc (\... | [
1,
1,
1,
1,
0,
1
] | SVEN | 704 |
Determine whether the {function_name} code is vulnerable or not. | [
"TiledInputFile::rawTileData (int &dx, int &dy,\n\t\t\t int &lx, int &ly,\n const char *&pixelData,\n\t\t\t int &pixelDataSize)\n{\n try\n {\n Lock lock (*_data->_streamData);",
" if (!isValidTile (dx, dy, lx, ly))\n throw IEX_NAMESPACE::ArgExc (\... | [
1,
1,
1,
1,
1,
1
] | SVEN | 704 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int tcos_decipher(sc_card_t *card, const u8 * crgram, size_t crgram_len, u8 * out, size_t outlen)\n{\n\tsc_context_t *ctx;\n\tsc_apdu_t apdu;\n\tu8 rbuf[SC_MAX_APDU_BUFFER_SIZE];\n\tu8 sbuf[SC_MAX_APDU_BUFFER_SIZE];\n\ttcos_data *data;\n\tint tcos3, r;",
"\tassert(card != NULL && crgram != NULL && out != ... | [
1,
1,
1,
1,
1,
0,
1,
1,
1
] | SVEN | 705 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int tcos_decipher(sc_card_t *card, const u8 * crgram, size_t crgram_len, u8 * out, size_t outlen)\n{\n\tsc_context_t *ctx;\n\tsc_apdu_t apdu;\n\tu8 rbuf[SC_MAX_APDU_BUFFER_SIZE];\n\tu8 sbuf[SC_MAX_APDU_BUFFER_SIZE];\n\ttcos_data *data;\n\tint tcos3, r;",
"\tassert(card != NULL && crgram != NULL && out != ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 705 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_zbuf(AVBPrint *bp, const uint8_t *data,\n const uint8_t *data_end)\n{\n z_stream zstream;\n unsigned char *buf;\n unsigned buf_size;\n int ret;",
" zstream.zalloc = ff_png_zalloc;\n zstream.zfree = ff_png_zfree;\n zstream.opaque = NULL;\n if (infla... | [
1,
1,
1,
0,
1,
0,
1,
1
] | SVEN | 706 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_zbuf(AVBPrint *bp, const uint8_t *data,\n const uint8_t *data_end)\n{\n z_stream zstream;\n unsigned char *buf;\n unsigned buf_size;\n int ret;",
" zstream.zalloc = ff_png_zalloc;\n zstream.zfree = ff_png_zfree;\n zstream.opaque = NULL;\n if (infla... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 706 |
Determine whether the {function_name} code is vulnerable or not. | [
"MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts)\n{\n //\n // Reconstruct broken chunk offset tables. Stop once we received any exception.\n //",
" Int64 position = is.tellg();",
" \n //\n // check we unde... | [
1,
1,
1,
0,
1,
1,
1,
1,
1
] | SVEN | 707 |
Determine whether the {function_name} code is vulnerable or not. | [
"MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts)\n{\n //\n // Reconstruct broken chunk offset tables. Stop once we received any exception.\n //",
" Int64 position = is.tellg();",
" \n //\n // check we unde... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 707 |
Determine whether the {function_name} code is vulnerable or not. | [
"make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2)\n{\n const uint16_t buf_len = 511;\n char buf[buf_len + 1];\n struct lys_type_bit **bits = NULL;\n struct lyxp_expr *exp;\n const char *module_name, *cur_expr, *end;\n int i, j, count;\n int64_t num;\n ... | [
1,
1,
1,
1,
0,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 708 |
Determine whether the {function_name} code is vulnerable or not. | [
"make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2)\n{\n const uint16_t buf_len = 511;\n char buf[buf_len + 1];\n struct lys_type_bit **bits = NULL;\n struct lyxp_expr *exp;\n const char *module_name, *cur_expr, *end;\n int i, j, count;\n int64_t num;\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 708 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_frame(AVCodecContext *avctx, void *data,\n int *got_frame, AVPacket *avpkt)\n{\n EXRContext *s = avctx->priv_data;\n ThreadFrame frame = { .f = data };\n AVFrame *picture = data;\n uint8_t *ptr;",
" int i, y, ret, ymax;\n int planes;\n int out_line_si... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_frame(AVCodecContext *avctx, void *data,\n int *got_frame, AVPacket *avpkt)\n{\n EXRContext *s = avctx->priv_data;\n ThreadFrame frame = { .f = data };\n AVFrame *picture = data;\n uint8_t *ptr;",
" int i, y, ret, ymax;\n int planes;\n int out_line_si... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 709 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)\n{\n\tMD5_CTX md5_secret, my_md5;\n\tunsigned char misc[AUTH_VECTOR_LEN];\n\tint i;\n\tint length = strlen(password);\n\tunsigned char hashed[256 + AUTH_PASS_LEN];\t/* can't be longer than this */\n\tunsigned char *... | [
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | 710 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void add_password(AUTH_HDR *request, unsigned char type, CONST char *password, char *secret)\n{\n\tMD5_CTX md5_secret, my_md5;\n\tunsigned char misc[AUTH_VECTOR_LEN];\n\tint i;\n\tint length = strlen(password);\n\tunsigned char hashed[256 + AUTH_PASS_LEN];\t/* can't be longer than this */\n\tunsigned char *... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 710 |
Determine whether the {function_name} code is vulnerable or not. | [
"unicode_unfold_key(OnigCodePoint code)\n{\n static const struct ByUnfoldKey wordlist[] =\n {\n {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},\n {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | SVEN | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"unicode_unfold_key(OnigCodePoint code)\n{\n static const struct ByUnfoldKey wordlist[] =\n {\n {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},\n {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1... | SVEN | 711 |
Determine whether the {function_name} code is vulnerable or not. | [
"PHP_FUNCTION(imagegammacorrect)\n{\n\tzval *IM;\n\tgdImagePtr im;\n\tint i;\n\tdouble input, output;",
"\tif (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, \"rdd\", &IM, &input, &output) == FAILURE) {\n\t\treturn;",
"",
"\t}",
"\tZEND_FETCH_RESOURCE(im, gdImagePtr, &IM, -1, \"Image\", le_gd);",
"\tif ... | [
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"PHP_FUNCTION(imagegammacorrect)\n{\n\tzval *IM;\n\tgdImagePtr im;\n\tint i;\n\tdouble input, output;",
"\tif (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, \"rdd\", &IM, &input, &output) == FAILURE) {\n\t\treturn;",
"\t}",
"\tif ( input <= 0.0 || output <= 0.0 ) {\n\t\tphp_error_docref(NULL TSRMLS_CC, E_W... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 712 |
Determine whether the {function_name} code is vulnerable or not. | [
"char *rfbProcessFileTransferReadBuffer(rfbClientPtr cl, uint32_t length)\n{\n char *buffer=NULL;\n int n=0;",
" FILEXFER_ALLOWED_OR_CLOSE_AND_RETURN(\"\", cl, NULL);",
"",
" /*",
" rfbLog(\"rfbProcessFileTransferReadBuffer(%dlen)\\n\", length);",
" */",
"",
" if (length>0) {",
... | [
1,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | SVEN | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"char *rfbProcessFileTransferReadBuffer(rfbClientPtr cl, uint32_t length)\n{\n char *buffer=NULL;\n int n=0;",
" FILEXFER_ALLOWED_OR_CLOSE_AND_RETURN(\"\", cl, NULL);",
"",
" /*",
" We later alloc length+1, which might wrap around on 32-bit systems if length equals\n 0XFFFFFFFF, i.... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 713 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int track_header(VividasDemuxContext *viv, AVFormatContext *s, uint8_t *buf, int size)\n{\n int i, j, ret;\n int64_t off;\n int val_1;\n int num_video;\n AVIOContext pb0, *pb = &pb0;",
" ffio_init_context(pb, buf, size, 0, NULL, NULL, NULL, NULL);",
" ffio_read_varlen(pb); // track... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1,
0,
1,
1,
1
] | SVEN | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int track_header(VividasDemuxContext *viv, AVFormatContext *s, uint8_t *buf, int size)\n{\n int i, j, ret;\n int64_t off;\n int val_1;\n int num_video;\n AVIOContext pb0, *pb = &pb0;",
" ffio_init_context(pb, buf, size, 0, NULL, NULL, NULL, NULL);",
" ffio_read_varlen(pb); // track... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 714 |
Determine whether the {function_name} code is vulnerable or not. | [
"yaffsfs_istat(TSK_FS_INFO *fs, TSK_FS_ISTAT_FLAG_ENUM flags, FILE * hFile, TSK_INUM_T inum,\n TSK_DADDR_T numblock, int32_t sec_skew)\n{\n TSK_FS_META *fs_meta;\n TSK_FS_FILE *fs_file;\n YAFFSFS_INFO *yfs = (YAFFSFS_INFO *)fs;\n char ls[12];\n YAFFSFS_PRINT_ADDR print;",
" char timeBuf[32];"... | [
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 715 |
Determine whether the {function_name} code is vulnerable or not. | [
"yaffsfs_istat(TSK_FS_INFO *fs, TSK_FS_ISTAT_FLAG_ENUM flags, FILE * hFile, TSK_INUM_T inum,\n TSK_DADDR_T numblock, int32_t sec_skew)\n{\n TSK_FS_META *fs_meta;\n TSK_FS_FILE *fs_file;\n YAFFSFS_INFO *yfs = (YAFFSFS_INFO *)fs;\n char ls[12];\n YAFFSFS_PRINT_ADDR print;",
" char timeBuf[128];... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 715 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void InsertRow(unsigned char *p,ssize_t y,Image *image, int bpp)\n{\n ExceptionInfo\n *exception;",
" int\n bit;",
" ssize_t\n x;",
" register PixelPacket\n *q;",
" IndexPacket\n index;",
" register IndexPacket\n *indexes;",
" exception=(&image->exception);\n switch (bp... | [
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"static void InsertRow(unsigned char *p,ssize_t y,Image *image, int bpp)\n{\n ExceptionInfo\n *exception;",
" int\n bit;",
" ssize_t\n x;",
" register PixelPacket\n *q;",
" IndexPacket\n index;",
" register IndexPacket\n *indexes;",
" exception=(&image->exception);\n switch (bp... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 716 |
Determine whether the {function_name} code is vulnerable or not. | [
"int rds_rdma_extra_size(struct rds_rdma_args *args)\n{\n\tstruct rds_iovec vec;\n\tstruct rds_iovec __user *local_vec;\n\tint tot_pages = 0;\n\tunsigned int nr_pages;\n\tunsigned int i;",
"\tlocal_vec = (struct rds_iovec __user *)(unsigned long) args->local_vec_addr;",
"",
"\n\t/* figure out the number of pa... | [
1,
1,
0,
1,
1,
1,
1,
1
] | SVEN | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"int rds_rdma_extra_size(struct rds_rdma_args *args)\n{\n\tstruct rds_iovec vec;\n\tstruct rds_iovec __user *local_vec;\n\tint tot_pages = 0;\n\tunsigned int nr_pages;\n\tunsigned int i;",
"\tlocal_vec = (struct rds_iovec __user *)(unsigned long) args->local_vec_addr;",
"\n\tif (args->nr_local == 0)\n\t\treturn... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 717 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_frame(AVCodecContext *avctx,\n void *data, int *got_frame,\n AVPacket *avpkt)\n{\n PicContext *s = avctx->priv_data;\n AVFrame *frame = data;\n uint32_t *palette;\n int bits_per_plane, bpp, etype, esize, npal, pos_after_pal;\n int i, x,... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"static int decode_frame(AVCodecContext *avctx,\n void *data, int *got_frame,\n AVPacket *avpkt)\n{\n PicContext *s = avctx->priv_data;\n AVFrame *frame = data;\n uint32_t *palette;\n int bits_per_plane, bpp, etype, esize, npal, pos_after_pal;\n int i, x,... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | 718 |
Determine whether the {function_name} code is vulnerable or not. | [
"concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc)\n{\n int i, j, len;\n UChar *p;",
" for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) {\n len = enclen(enc, p);",
" if (i + len > OPT_EXACT_MAXLEN) break;",
" for (j = 0; j < len && p < end; j++)\n to->s[i++] ... | [
1,
1,
0,
1,
1,
1
] | SVEN | 719 |
Determine whether the {function_name} code is vulnerable or not. | [
"concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc)\n{\n int i, j, len;\n UChar *p;",
" for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) {\n len = enclen(enc, p);",
" if (i + len >= OPT_EXACT_MAXLEN) break;",
" for (j = 0; j < len && p < end; j++)\n to->s[i++]... | [
1,
1,
1,
1,
1,
1
] | SVEN | 719 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.