prompt
stringclasses
1 value
completions
listlengths
2
1.33k
labels
listlengths
2
1.33k
source
stringclasses
1 value
other_info
dict
index
int64
0
719
cwe
stringclasses
9 values
language
stringclasses
6 values
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.", " key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"", " sshdir = os.path.join(fs, 'root', '.ssh')", " utils.execute...
[ 1, 1, 0, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 244, "char_start": 242, "chars": "_j" }, { "char_end": 258, "char_start": 245, "chars": "in_and_check_" }, { "char_end": 267, "char_start": 262, "chars": "_with" ...
50
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.", " key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"", " sshdir = _join_and_check_path_within_fs(fs, 'root', '.ssh')", ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 244, "char_start": 242, "chars": "_j" }, { "char_end": 258, "char_start": 245, "chars": "in_and_check_" }, { "char_end": 267, "char_start": 262, "chars": "_with" ...
50
cwe-022
py
Determine whether the {function_name} code is vulnerable or not.
[ "def start():\n print(\"[*] Starting backdoor process\")\n print(\"[*] Decompressing target to tmp directory...\")\n #subprocess.call(\"jar -x %s\" % target, shell=True)\n with zipfile.ZipFile(target, 'r') as zip:\n zip.extractall(\"tmp\")\n print(\"[*] Target dumped to tmp directory\")", " ...
[ 1, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1467, "char_start": 1466, "chars": "#" }, { "char_end": 1614, "char_start": 1531, "chars": "e) != 0:\n if subprocess.call(['javac','-cp','tmp/','tmp/%s'%backdoor],shell=Fals" } ], "delet...
51
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def start():\n print(\"[*] Starting backdoor process\")\n print(\"[*] Decompressing target to tmp directory...\")\n #subprocess.call(\"jar -x %s\" % target, shell=True)\n with zipfile.ZipFile(target, 'r') as zip:\n zip.extractall(\"tmp\")\n print(\"[*] Target dumped to tmp directory\")", " ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1467, "char_start": 1466, "chars": "#" }, { "char_end": 1614, "char_start": 1531, "chars": "e) != 0:\n if subprocess.call(['javac','-cp','tmp/','tmp/%s'%backdoor],shell=Fals" } ], "delet...
51
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _map_vol_to_host(self, volume_name, host_name):\n \"\"\"Create a mapping between a volume to a host.\"\"\"", " LOG.debug(_('enter: _map_vol_to_host: volume %(volume_name)s to '\n 'host %(host_name)s')\n % {'volume_name': volume_name, 'host_name': host_name})"...
[ 1, 1, 1, 1, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1142, "char_start": 1141, "chars": "[" }, { "char_end": 1152, "char_start": 1150, "chars": "'," }, { "char_end": 1154, "char_start": 1153, "chars": "'" }, ...
52
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _map_vol_to_host(self, volume_name, host_name):\n \"\"\"Create a mapping between a volume to a host.\"\"\"", " LOG.debug(_('enter: _map_vol_to_host: volume %(volume_name)s to '\n 'host %(host_name)s')\n % {'volume_name': volume_name, 'host_name': host_name})"...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1142, "char_start": 1141, "chars": "[" }, { "char_end": 1152, "char_start": 1150, "chars": "'," }, { "char_end": 1154, "char_start": 1153, "chars": "'" }, ...
52
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _delete_vdisk(self, name, force):\n \"\"\"Deletes existing vdisks.", " It is very important to properly take care of mappings before deleting\n the disk:\n 1. If no mappings, then it was a vdisk, and can be deleted\n 2. If it is the source of a flashcopy mapping and copy_ra...
[ 1, 1, 1, 1, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1415, "char_start": 1411, "chars": "ssh_" }, { "char_end": 1418, "char_start": 1416, "chars": "md" }, { "char_end": 1422, "char_start": 1421, "chars": "[" }, ...
53
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _delete_vdisk(self, name, force):\n \"\"\"Deletes existing vdisks.", " It is very important to properly take care of mappings before deleting\n the disk:\n 1. If no mappings, then it was a vdisk, and can be deleted\n 2. If it is the source of a flashcopy mapping and copy_ra...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 1415, "char_start": 1411, "chars": "ssh_" }, { "char_end": 1418, "char_start": 1416, "chars": "md" }, { "char_end": 1422, "char_start": 1421, "chars": "[" }, ...
53
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _cliq_run(self, verb, cliq_args, check_exit_code=True):\n \"\"\"Runs a CLIQ command over SSH, without doing any result parsing\"\"\"", " cliq_arg_strings = []", " for k, v in cliq_args.items():", " cliq_arg_strings.append(\" %s=%s\" % (k, v))\n cmd = verb + ''.join(...
[ 1, 0, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 153, "char_start": 150, "chars": "md_" }, { "char_end": 165, "char_start": 161, "chars": "verb" }, { "char_end": 222, "char_start": 219, "chars": "md_" }, ...
54
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _cliq_run(self, verb, cliq_args, check_exit_code=True):\n \"\"\"Runs a CLIQ command over SSH, without doing any result parsing\"\"\"", " cmd_list = [verb]", " for k, v in cliq_args.items():", " cmd_list.append(\"%s=%s\" % (k, v))", "", " return self._run_ssh(cmd...
[ 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 153, "char_start": 150, "chars": "md_" }, { "char_end": 165, "char_start": 161, "chars": "verb" }, { "char_end": 222, "char_start": 219, "chars": "md_" }, ...
54
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _set_qos_rule(self, qos, vvs_name):\n max_io = self._get_qos_value(qos, 'maxIOPS')\n max_bw = self._get_qos_value(qos, 'maxBWS')\n cli_qos_string = \"\"\n if max_io is not None:\n cli_qos_string += ('-io %s ' % max_io)\n if max_bw is not None:\n cli_qos_...
[ 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 365, "char_start": 364, "chars": "[" }, { "char_end": 374, "char_start": 372, "chars": "'," }, { "char_end": 376, "char_start": 375, "chars": "'" }, { ...
55
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _set_qos_rule(self, qos, vvs_name):\n max_io = self._get_qos_value(qos, 'maxIOPS')\n max_bw = self._get_qos_value(qos, 'maxBWS')\n cli_qos_string = \"\"\n if max_io is not None:\n cli_qos_string += ('-io %s ' % max_io)\n if max_bw is not None:\n cli_qos_...
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 365, "char_start": 364, "chars": "[" }, { "char_end": 374, "char_start": 372, "chars": "'," }, { "char_end": 376, "char_start": 375, "chars": "'" }, { ...
55
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get_lines(command: str) -> List[str]:", " \"\"\"\n Run a command and return lines of output", " :param str command: the command to run\n :returns: list of whitespace-stripped lines output by command\n \"\"\"\n stdout = get_output(command)", " return [line.strip().decode() for line in...
[ 0, 1, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 28, "char_start": 23, "chars": "List[" }, { "char_end": 32, "char_start": 31, "chars": "]" } ], "deleted": [ { "char_end": 277, "char_start": 268, "chars": "()...
56
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def get_lines(command: List[str]) -> List[str]:", " \"\"\"\n Run a command and return lines of output", " :param str command: the command to run\n :returns: list of whitespace-stripped lines output by command\n \"\"\"\n stdout = get_output(command)", " return [line.strip() for line in st...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 28, "char_start": 23, "chars": "List[" }, { "char_end": 32, "char_start": 31, "chars": "]" } ], "deleted": [ { "char_end": 277, "char_start": 268, "chars": "()...
56
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _modify_3par_iscsi_host(self, hostname, iscsi_iqn):\n # when using -add, you can not send the persona or domain options", " self.common._cli_run('createhost -iscsi -add %s %s'\n % (hostname, iscsi_iqn), None)" ]
[ 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 147, "char_start": 146, "chars": "a" }, { "char_end": 153, "char_start": 148, "chars": "d = [" }, { "char_end": 166, "char_start": 164, "chars": "'," }, { ...
57
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _modify_3par_iscsi_host(self, hostname, iscsi_iqn):\n # when using -add, you can not send the persona or domain options", " command = ['createhost', '-iscsi', '-add', hostname, iscsi_iqn]\n self.common._cli_run(command)" ]
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 147, "char_start": 146, "chars": "a" }, { "char_end": 153, "char_start": 148, "chars": "d = [" }, { "char_end": 166, "char_start": 164, "chars": "'," }, { ...
57
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@contextmanager\ndef run_interactive_shell_command(command, **kwargs):\n \"\"\"", " Runs a command in shell and provides stdout, stderr and stdin streams.", "", " This function creates a context manager that sets up the process, returns\n to caller, closes streams and waits for process to exit on...
[ 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 96, "char_start": 89, "chars": "single " }, { "char_end": 154, "char_start": 150, "chars": "\n " }, { "char_end": 266, "char_start": 233, "chars": " (using\n `sub...
58
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@contextmanager\ndef run_interactive_shell_command(command, **kwargs):\n \"\"\"", " Runs a single command in shell and provides stdout, stderr and stdin\n streams.", "", " This function creates a context manager that sets up the process (using\n `subprocess.Popen()`), returns to caller, closes...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 96, "char_start": 89, "chars": "single " }, { "char_end": 154, "char_start": 150, "chars": "\n " }, { "char_end": 266, "char_start": 233, "chars": " (using\n `sub...
58
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@app.route('/delete_video/<filename>')\ndef delete_video(filename):\n\tif 'username' in session:\n\t\t#os.remove(\"static/videos/{}\".format(filename))\n\t\tprint(session['username'], file=sys.stdout)\n\t\tdata=users.query.filter_by(Username=session['username']).first()\n\t\tvideo=Video.query.filter_by(UserID=data...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 353, "char_start": 352, "chars": "#" }, { "char_end": 417, "char_start": 364, "chars": "static/videos/{}\".format(filename))\n\t\t\tos.system(\"rm " } ], "deleted": [] }, "commit_link":...
59
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@app.route('/delete_video/<filename>')\ndef delete_video(filename):\n\tif 'username' in session:\n\t\t#os.remove(\"static/videos/{}\".format(filename))\n\t\tprint(session['username'], file=sys.stdout)\n\t\tdata=users.query.filter_by(Username=session['username']).first()\n\t\tvideo=Video.query.filter_by(UserID=data...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 353, "char_start": 352, "chars": "#" }, { "char_end": 417, "char_start": 364, "chars": "static/videos/{}\".format(filename))\n\t\t\tos.system(\"rm " } ], "deleted": [] }, "commit_link":...
59
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def whitelist(users: str):", " for user in users.split():", " call(WHITELIST_COMMAND_TEMPLATE.format(user))" ]
[ 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 44, "char_start": 14, "chars": "channel: discord.TextChannel, " }, { "char_end": 349, "char_start": 88, "chars": " if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com...
60
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def whitelist(channel: discord.TextChannel, users: str):", " for user in users.split():", " if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com/customer/en/portal/articles/928638-minecraft-usernames?b_id=5408\n await channel.send('\\'{}\\' is not a valid Minec...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 44, "char_start": 14, "chars": "channel: discord.TextChannel, " }, { "char_end": 349, "char_start": 88, "chars": " if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com...
60
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 526, "char_start": 525, "chars": "[" }, { "char_end": 537, "char_start": 535, "chars": "'," }, { "char_end": 539, "char_start": 538, "chars": "'" }, { ...
61
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 526, "char_start": 525, "chars": "[" }, { "char_end": 537, "char_start": 535, "chars": "'," }, { "char_end": 539, "char_start": 538, "chars": "'" }, { ...
61
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def do_setup(self, ctxt):\n \"\"\"Check that we have all configuration details from the storage.\"\"\"", " LOG.debug(_('enter: do_setup'))\n self._context = ctxt", " # Validate that the pool exists", " ssh_cmd = 'svcinfo lsmdiskgrp -delim ! -nohdr'", " out, err = s...
[ 1, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 237, "char_start": 236, "chars": "[" }, { "char_end": 247, "char_start": 245, "chars": "'," }, { "char_end": 249, "char_start": 248, "chars": "'" }, { ...
62
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def do_setup(self, ctxt):\n \"\"\"Check that we have all configuration details from the storage.\"\"\"", " LOG.debug(_('enter: do_setup'))\n self._context = ctxt", " # Validate that the pool exists", " ssh_cmd = ['svcinfo', 'lsmdiskgrp', '-delim', '!', '-nohdr']", " ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 237, "char_start": 236, "chars": "[" }, { "char_end": 247, "char_start": 245, "chars": "'," }, { "char_end": 249, "char_start": 248, "chars": "'" }, { ...
62
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _execute_command_and_parse_attributes(self, ssh_cmd):\n \"\"\"Execute command on the Storwize/SVC and parse attributes.", " Exception is raised if the information from the system\n can not be obtained.", " \"\"\"", " LOG.debug(_('enter: _execute_command_and_parse_attrib...
[ 1, 1, 1, 1, 0, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 349, "char_start": 345, "chars": "tr(s" }, { "char_end": 356, "char_start": 355, "chars": ")" }, { "char_end": 1503, "char_start": 1499, "chars": "tr(s" }, ...
63
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _execute_command_and_parse_attributes(self, ssh_cmd):\n \"\"\"Execute command on the Storwize/SVC and parse attributes.", " Exception is raised if the information from the system\n can not be obtained.", " \"\"\"", " LOG.debug(_('enter: _execute_command_and_parse_attrib...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 349, "char_start": 345, "chars": "tr(s" }, { "char_end": 356, "char_start": 355, "chars": ")" }, { "char_end": 1503, "char_start": 1499, "chars": "tr(s" }, ...
63
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_get_iscsi_ip_active(self):\n self.flags(lock_path=self.tempdir)", " #record set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n", " show_...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 1, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 315, "char_start": 314, "chars": "[" }, { "char_end": 326, "char_start": 325, "chars": "]" }, { "char_end": 426, "char_start": 425, "chars": "[" }, { ...
64
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_get_iscsi_ip_active(self):\n self.flags(lock_path=self.tempdir)", " #record set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n", " show_...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 315, "char_start": 314, "chars": "[" }, { "char_end": 326, "char_start": 325, "chars": "]" }, { "char_end": 426, "char_start": 425, "chars": "[" }, { ...
64
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _find_host_from_wwpn(self, connector):\n for wwpn in connector['wwpns']:", " ssh_cmd = 'svcinfo lsfabric -wwpn %s -delim !' % wwpn", " out, err = self._run_ssh(ssh_cmd)", " if not len(out.strip()):\n # This WWPN is not in use\n continu...
[ 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 110, "char_start": 109, "chars": "[" }, { "char_end": 120, "char_start": 118, "chars": "'," }, { "char_end": 122, "char_start": 121, "chars": "'" }, { ...
65
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _find_host_from_wwpn(self, connector):\n for wwpn in connector['wwpns']:", " ssh_cmd = ['svcinfo', 'lsfabric', '-wwpn', wwpn, '-delim', '!']", " out, err = self._run_ssh(ssh_cmd)", " if not len(out.strip()):\n # This WWPN is not in use\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 110, "char_start": 109, "chars": "[" }, { "char_end": 120, "char_start": 118, "chars": "'," }, { "char_end": 122, "char_start": 121, "chars": "'" }, { ...
65
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def extend_volume(self, volume, new_size):\n LOG.debug(_('enter: extend_volume: volume %s') % volume['id'])\n ret = self._ensure_vdisk_no_fc_mappings(volume['name'],\n allow_snaps=False)\n if not ret:\n exception_message = (_('extend_vo...
[ 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 564, "char_start": 563, "chars": "[" }, { "char_end": 574, "char_start": 572, "chars": "'," }, { "char_end": 576, "char_start": 575, "chars": "'" }, { ...
66
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def extend_volume(self, volume, new_size):\n LOG.debug(_('enter: extend_volume: volume %s') % volume['id'])\n ret = self._ensure_vdisk_no_fc_mappings(volume['name'],\n allow_snaps=False)\n if not ret:\n exception_message = (_('extend_vo...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 564, "char_start": 563, "chars": "[" }, { "char_end": 574, "char_start": 572, "chars": "'," }, { "char_end": 576, "char_start": 575, "chars": "'" }, { ...
66
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_host_from_connector(self, connector):\n \"\"\"List the hosts defined in the storage.", " Return the host name with the given connection info, or None if there\n is no host fitting that information.", " \"\"\"", " prefix = self._connector_to_hostname_prefix(connecto...
[ 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 440, "char_start": 439, "chars": "[" }, { "char_end": 450, "char_start": 448, "chars": "'," }, { "char_end": 452, "char_start": 451, "chars": "'" }, { ...
67
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_host_from_connector(self, connector):\n \"\"\"List the hosts defined in the storage.", " Return the host name with the given connection info, or None if there\n is no host fitting that information.", " \"\"\"", " prefix = self._connector_to_hostname_prefix(connecto...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 440, "char_start": 439, "chars": "[" }, { "char_end": 450, "char_start": 448, "chars": "'," }, { "char_end": 452, "char_start": 451, "chars": "'" }, { ...
67
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_hostvdisk_mappings(self, host_name):\n \"\"\"Return the defined storage mappings for a host.\"\"\"", " return_data = {}", " ssh_cmd = 'svcinfo lshostvdiskmap -delim ! %s' % host_name", " out, err = self._run_ssh(ssh_cmd)", " mappings = out.strip().split('\\n')\n ...
[ 1, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 157, "char_start": 156, "chars": "[" }, { "char_end": 167, "char_start": 165, "chars": "'," }, { "char_end": 169, "char_start": 168, "chars": "'" }, { ...
68
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_hostvdisk_mappings(self, host_name):\n \"\"\"Return the defined storage mappings for a host.\"\"\"", " return_data = {}", " ssh_cmd = ['svcinfo', 'lshostvdiskmap', '-delim', '!', host_name]", " out, err = self._run_ssh(ssh_cmd)", " mappings = out.strip().split('\...
[ 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 157, "char_start": 156, "chars": "[" }, { "char_end": 167, "char_start": 165, "chars": "'," }, { "char_end": 169, "char_start": 168, "chars": "'" }, { ...
68
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def main():\n global word\n print(\"Starting script... press 'ctrl+c' in terminal to turn off\")\n while True:\n if pyperclip.paste() != word and len(pyperclip.paste().split())<5:\n word = pyperclip.paste()\n wordChc=False\n req = requests.get(\"https://api-portal.d...
[ 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 689, "char_start": 680, "chars": "that word" }, { "char_end": 831, "char_start": 822, "chars": "that word" }, { "char_end": 1547, "char_start": 1538, "chars": "that wo...
69
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def main():\n global word\n print(\"Starting script... press 'ctrl+c' in terminal to turn off\")\n while True:\n if pyperclip.paste() != word and len(pyperclip.paste().split())<5:\n word = pyperclip.paste()\n wordChc=False\n req = requests.get(\"https://api-portal.d...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 689, "char_start": 680, "chars": "that word" }, { "char_end": 831, "char_start": 822, "chars": "that word" }, { "char_end": 1547, "char_start": 1538, "chars": "that wo...
69
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_vvset_from_3par(self, volume_name):\n \"\"\"Get Virtual Volume Set from 3PAR.", " The only way to do this currently is to try and delete the volume\n to get the error message.", " NOTE(walter-boring): don't call this unless you know the volume is\n already in a vvset...
[ 1, 1, 1, 0, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 335, "char_start": 333, "chars": "['" }, { "char_end": 345, "char_start": 343, "chars": "'," }, { "char_end": 347, "char_start": 346, "chars": "'" }, { ...
70
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_vvset_from_3par(self, volume_name):\n \"\"\"Get Virtual Volume Set from 3PAR.", " The only way to do this currently is to try and delete the volume\n to get the error message.", " NOTE(walter-boring): don't call this unless you know the volume is\n already in a vvset...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 335, "char_start": 333, "chars": "['" }, { "char_end": 345, "char_start": 343, "chars": "'," }, { "char_end": 347, "char_start": 346, "chars": "'" }, { ...
70
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_flashcopy_mapping_attributes(self, fc_map_id):\n LOG.debug(_('enter: _get_flashcopy_mapping_attributes: mapping %s')\n % fc_map_id)\n", " fc_ls_map_cmd = 'svcinfo lsfcmap -filtervalue id=%s -delim !' % \\\n fc_map_id", " out, err = self._run_ssh(fc_ls_m...
[ 1, 0, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 193, "char_start": 192, "chars": "[" }, { "char_end": 203, "char_start": 201, "chars": "'," }, { "char_end": 205, "char_start": 204, "chars": "'" }, { ...
71
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_flashcopy_mapping_attributes(self, fc_map_id):\n LOG.debug(_('enter: _get_flashcopy_mapping_attributes: mapping %s')\n % fc_map_id)\n", " fc_ls_map_cmd = ['svcinfo', 'lsfcmap', '-filtervalue',\n 'id=%s' % fc_map_id, '-delim', '!']", " out, ...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 193, "char_start": 192, "chars": "[" }, { "char_end": 203, "char_start": 201, "chars": "'," }, { "char_end": 205, "char_start": 204, "chars": "'" }, { ...
71
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _add_volume_to_volume_set(self, volume, volume_name,\n cpg, vvs_name, qos):\n if vvs_name is not None:\n # Admin has set a volume set name to add the volume to", " self._cli_run('createvvset -add %s %s' % (vvs_name,\n ...
[ 1, 0, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 243, "char_start": 242, "chars": "[" }, { "char_end": 257, "char_start": 255, "chars": "'," }, { "char_end": 259, "char_start": 258, "chars": "'" }, { ...
72
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _add_volume_to_volume_set(self, volume, volume_name,\n cpg, vvs_name, qos):\n if vvs_name is not None:\n # Admin has set a volume set name to add the volume to", " self._cli_run(['createvvset', '-add', vvs_name, volume_name])", " else:\n ...
[ 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 243, "char_start": 242, "chars": "[" }, { "char_end": 257, "char_start": 255, "chars": "'," }, { "char_end": 259, "char_start": 258, "chars": "'" }, { ...
72
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_initialize_connection(self):\n self.driver._eql_execute = self.mox.\\\n CreateMock(self.driver._eql_execute)\n volume = {'name': self.volume_name}\n self.stubs.Set(self.driver, \"_get_iscsi_properties\",\n self._fake_get_iscsi_properties)\n self...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 541, "char_start": 539, "chars": "'," }, { "char_end": 543, "char_start": 542, "chars": "'" } ], "deleted": [] }, "commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e...
73
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_initialize_connection(self):\n self.driver._eql_execute = self.mox.\\\n CreateMock(self.driver._eql_execute)\n volume = {'name': self.volume_name}\n self.stubs.Set(self.driver, \"_get_iscsi_properties\",\n self._fake_get_iscsi_properties)\n self...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 541, "char_start": 539, "chars": "'," }, { "char_end": 543, "char_start": 542, "chars": "'" } ], "deleted": [] }, "commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e...
73
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_invalid_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 530, "char_start": 529, "chars": "[" }, { "char_end": 541, "char_start": 539, "chars": "'," }, { "char_end": 543, "char_start": 542, "chars": "'" }, { ...
74
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_invalid_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 530, "char_start": 529, "chars": "[" }, { "char_end": 541, "char_start": 539, "chars": "'," }, { "char_end": 543, "char_start": 542, "chars": "'" }, { ...
74
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@app.route('/api/uploads/<sid>/logs')\ndef get_logs(sid):", " if '/' not in sid:\n path = os.path.join(app.config['UPLOAD_FOLDER'], sid)\n if os.path.isfile(os.path.join(path, app.config['LOG_FILE'])):", " return send_from_directory(directory=path,\n ...
[ 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 65, "char_start": 64, "chars": "u" }, { "char_end": 80, "char_start": 66, "chars": "ils.sid_is_val" }, { "char_end": 83, "char_start": 81, "chars": "d(" }, ...
75
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "@app.route('/api/uploads/<sid>/logs')\ndef get_logs(sid):", " if utils.sid_is_valid(sid):\n path = join(app.config['UPLOAD_FOLDER'], sid)", " if os.path.isfile(join(path, app.config['LOG_FILE'])):", " return send_from_directory(directory=path,\n ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 65, "char_start": 64, "chars": "u" }, { "char_end": 80, "char_start": 66, "chars": "ils.sid_is_val" }, { "char_end": 83, "char_start": 81, "chars": "d(" }, ...
75
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _make_fc_map(self, source, target, full_copy):", " copyflag = '' if full_copy else '-copyrate 0'\n fc_map_cli_cmd = ('svctask mkfcmap -source %(src)s -target %(tgt)s '\n '-autodelete %(copyflag)s' %\n {'src': source,\n ...
[ 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 81, "char_start": 80, "chars": "[" }, { "char_end": 91, "char_start": 89, "chars": "'," }, { "char_end": 93, "char_start": 92, "chars": "'" }, { "c...
76
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _make_fc_map(self, source, target, full_copy):", " fc_map_cli_cmd = ['svctask', 'mkfcmap', '-source', source, '-target',\n target, '-autodelete']\n if not full_copy:\n fc_map_cli_cmd.extend(['-copyrate', '0'])", " out, err = self._run_ssh(fc_map_cli_...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 81, "char_start": 80, "chars": "[" }, { "char_end": 91, "char_start": 89, "chars": "'," }, { "char_end": 93, "char_start": 92, "chars": "'" }, { "c...
76
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_get_iscsi_ip(self):\n self.flags(lock_path=self.tempdir)", " #record driver set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n", " show_...
[ 1, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 315, "char_start": 314, "chars": "[" }, { "char_end": 326, "char_start": 325, "chars": "]" }, { "char_end": 426, "char_start": 425, "chars": "[" }, { ...
77
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_get_iscsi_ip(self):\n self.flags(lock_path=self.tempdir)", " #record driver set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n", " show_...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 315, "char_start": 314, "chars": "[" }, { "char_end": 326, "char_start": 325, "chars": "]" }, { "char_end": 426, "char_start": 425, "chars": "[" }, { ...
77
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def usage(args=None):\n '''\n Return usage information for volumes mounted on this minion", " CLI Example:", " .. code-block:: bash", " salt '*' disk.usage\n '''", "", " if __grains__['kernel'] == 'Linux':\n cmd = 'df -P'\n elif __grains__['kernel'] == 'OpenBSD':\n ...
[ 1, 1, 1, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 377, "char_start": 179, "chars": "flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n if flag in allowed:\n flags += flag\n else:\n break\n ...
78
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def usage(args=None):\n '''\n Return usage information for volumes mounted on this minion", " CLI Example:", " .. code-block:: bash", " salt '*' disk.usage\n '''", " flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 377, "char_start": 179, "chars": "flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n if flag in allowed:\n flags += flag\n else:\n break\n ...
78
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_fc_wwpns(self):\n for key in self._storage_nodes:\n node = self._storage_nodes[key]", " ssh_cmd = 'svcinfo lsnode -delim ! %s' % node['id']", " raw = self._run_ssh(ssh_cmd)\n resp = CLIResponse(raw, delim='!', with_header=False)\n wwpns = s...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 136, "char_start": 135, "chars": "[" }, { "char_end": 146, "char_start": 144, "chars": "'," }, { "char_end": 148, "char_start": 147, "chars": "'" }, { ...
79
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_fc_wwpns(self):\n for key in self._storage_nodes:\n node = self._storage_nodes[key]", " ssh_cmd = ['svcinfo', 'lsnode', '-delim', '!', node['id']]", " raw = self._run_ssh(ssh_cmd)\n resp = CLIResponse(raw, delim='!', with_header=False)\n ww...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 136, "char_start": 135, "chars": "[" }, { "char_end": 146, "char_start": 144, "chars": "'," }, { "char_end": 148, "char_start": 147, "chars": "'" }, { ...
79
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def ls(self, data, path):\n credentials = self._formatCredentials(data, name='current')", "\n command = (\n '{credentials} '\n 'rclone lsjson current:{path}'\n ).format(\n credentials=credentials,\n path=path,\n )", "\n try:", " ...
[ 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 117, "char_start": 116, "chars": "[" }, { "char_end": 132, "char_start": 131, "chars": "r" }, { "char_end": 137, "char_start": 134, "chars": "one" }, { ...
80
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def ls(self, data, path):\n credentials = self._formatCredentials(data, name='current')", " command = [\n 'rclone',\n 'lsjson',\n 'current:{}'.format(path),\n ]", "\n try:", " result = self._execute(command, credentials)", " ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 117, "char_start": 116, "chars": "[" }, { "char_end": 132, "char_start": 131, "chars": "r" }, { "char_end": 137, "char_start": 134, "chars": "one" }, { ...
80
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _run_ssh(self, command, check_exit=True, attempts=1):", " if not self.sshpool:\n self.sshpool = utils.SSHPool(self.config.san_ip,\n self.config.san_ssh_port,\n self.config.ssh_conn_timeout,\n ...
[ 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 31, "char_start": 26, "chars": "_list" }, { "char_end": 145, "char_start": 62, "chars": "\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n" } ], "delete...
81
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _run_ssh(self, cmd_list, check_exit=True, attempts=1):\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n", " if not self.sshpool:\n self.sshpool = utils.SSHPool(self.config.san_ip,\n self.config.san_ssh_port,\n ...
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 31, "char_start": 26, "chars": "_list" }, { "char_end": 145, "char_start": 62, "chars": "\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n" } ], "delete...
81
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def verify(self, data):\n credentials = self._formatCredentials(data, name='current')", " command = '{} rclone lsjson current:'.format(credentials)", "\n try:", " result = self._execute(command)", " return {\n 'result': True,\n 'messa...
[ 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 123, "char_start": 114, "chars": "[\n " }, { "char_end": 129, "char_start": 124, "chars": " '" }, { "char_end": 141, "char_start": 135, "chars": "',\n " ...
82
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def verify(self, data):\n credentials = self._formatCredentials(data, name='current')", " command = [\n 'rclone',\n 'lsjson',\n 'current:',\n ]", "\n try:", " result = self._execute(command, credentials)", " return {\n ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 123, "char_start": 114, "chars": "[\n " }, { "char_end": 129, "char_start": 124, "chars": " '" }, { "char_end": 141, "char_start": 135, "chars": "',\n " ...
82
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def add_extra_args(self, args=None):\n \"\"\"Add more args depending on how known args are set.\"\"\"", " parsed = vars(self.parse_known_args(nohelp=True)[0])", "\n # find which image mode specified if any, and add additional arguments\n image_mode = parsed.get('image_mode', None)\n...
[ 1, 0, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 156, "char_start": 150, "chars": "args, " } ], "deleted": [] }, "commit_link": "github.com/freedombenLiu/ParlAI/commit/601668d569e1276e0b8bf2bf8fb43e391e10d170", "file_name": "parlai/core/params.py", "func_name": "add...
83
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def add_extra_args(self, args=None):\n \"\"\"Add more args depending on how known args are set.\"\"\"", " parsed = vars(self.parse_known_args(args, nohelp=True)[0])", "\n # find which image mode specified if any, and add additional arguments\n image_mode = parsed.get('image_mode', N...
[ 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 156, "char_start": 150, "chars": "args, " } ], "deleted": [] }, "commit_link": "github.com/freedombenLiu/ParlAI/commit/601668d569e1276e0b8bf2bf8fb43e391e10d170", "file_name": "parlai/core/params.py", "func_name": "add...
83
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_vdisk_fc_mappings(self, vdisk_name):\n \"\"\"Return FlashCopy mappings that this vdisk is associated with.\"\"\"\n", " ssh_cmd = 'svcinfo lsvdiskfcmappings -nohdr %s' % vdisk_name", " out, err = self._run_ssh(ssh_cmd)", " mapping_ids = []\n if (len(out.strip())):\n...
[ 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 146, "char_start": 145, "chars": "[" }, { "char_end": 156, "char_start": 154, "chars": "'," }, { "char_end": 158, "char_start": 157, "chars": "'" }, { ...
84
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_vdisk_fc_mappings(self, vdisk_name):\n \"\"\"Return FlashCopy mappings that this vdisk is associated with.\"\"\"\n", " ssh_cmd = ['svcinfo', 'lsvdiskfcmappings', '-nohdr', vdisk_name]", " out, err = self._run_ssh(ssh_cmd)", " mapping_ids = []\n if (len(out.strip())...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 146, "char_start": 145, "chars": "[" }, { "char_end": 156, "char_start": 154, "chars": "'," }, { "char_end": 158, "char_start": 157, "chars": "'" }, { ...
84
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 522, "char_start": 521, "chars": "[" }, { "char_end": 533, "char_start": 531, "chars": "'," }, { "char_end": 535, "char_start": 534, "chars": "'" }, { ...
85
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def test_create_host(self):\n self.flags(lock_path=self.tempdir)", " #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 522, "char_start": 521, "chars": "[" }, { "char_end": 533, "char_start": 531, "chars": "'," }, { "char_end": 535, "char_start": 534, "chars": "'" }, { ...
85
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _copy_volume(self, src_name, dest_name, cpg=None, snap_cpg=None,\n tpvv=True):\n # Virtual volume sets are not supported with the -online option", " cmd = 'createvvcopy -p %s -online ' % src_name", " if snap_cpg:", " cmd += '-snp_cpg %s ' % snap_cpg", ...
[ 1, 0, 1, 0, 1, 0, 1, 0, 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 193, "char_start": 192, "chars": "[" }, { "char_end": 208, "char_start": 206, "chars": "'," }, { "char_end": 210, "char_start": 209, "chars": "'" }, { ...
86
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _copy_volume(self, src_name, dest_name, cpg=None, snap_cpg=None,\n tpvv=True):\n # Virtual volume sets are not supported with the -online option", " cmd = ['createvvcopy', '-p', src_name, '-online']", " if snap_cpg:", " cmd.extend(['-snp_cpg', snap_cpg]...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 193, "char_start": 192, "chars": "[" }, { "char_end": 208, "char_start": 206, "chars": "'," }, { "char_end": 210, "char_start": 209, "chars": "'" }, { ...
86
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_active_nsp(self, hostname):\n \"\"\"Return the active nsp, if one exists, for the given host.\"\"\"", " result = self.common._cli_run('showvlun -a -host %s' % hostname, None)", " if result:\n # first line is header\n result = result[1:]\n for line ...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 152, "char_start": 151, "chars": "[" }, { "char_end": 163, "char_start": 161, "chars": "'," }, { "char_end": 165, "char_start": 164, "chars": "'" }, { ...
87
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _get_active_nsp(self, hostname):\n \"\"\"Return the active nsp, if one exists, for the given host.\"\"\"", " result = self.common._cli_run(['showvlun', '-a', '-host', hostname])", " if result:\n # first line is header\n result = result[1:]\n for line in...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 152, "char_start": 151, "chars": "[" }, { "char_end": 163, "char_start": 161, "chars": "'," }, { "char_end": 165, "char_start": 164, "chars": "'" }, { ...
87
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def initialize_connection(self, volume, connector):\n \"\"\"Restrict access to a volume.\"\"\"\n try:\n cmd = ['volume', 'select', volume['name'], 'access', 'create',\n 'initiator', connector['initiator']]\n if self.configuration.eqlx_use_chap:", " ...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 333, "char_start": 331, "chars": "'," }, { "char_end": 335, "char_start": 334, "chars": "'" } ], "deleted": [] }, "commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e...
88
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def initialize_connection(self, volume, connector):\n \"\"\"Restrict access to a volume.\"\"\"\n try:\n cmd = ['volume', 'select', volume['name'], 'access', 'create',\n 'initiator', connector['initiator']]\n if self.configuration.eqlx_use_chap:", " ...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 333, "char_start": 331, "chars": "'," }, { "char_end": 335, "char_start": 334, "chars": "'" } ], "deleted": [] }, "commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e...
88
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def mkdir(self, data, path):\n credentials = self._formatCredentials(data, name='current')", "\n command = (\n '{credentials} '\n 'rclone touch current:{path}/.keep'\n ).format(\n credentials=credentials,\n path=path,\n )", "\n try:...
[ 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 120, "char_start": 119, "chars": "[" }, { "char_end": 135, "char_start": 134, "chars": "r" }, { "char_end": 139, "char_start": 136, "chars": "lon" }, { ...
89
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def mkdir(self, data, path):\n credentials = self._formatCredentials(data, name='current')", " command = [\n 'rclone',\n 'touch',\n 'current:{}/.keep'.format(path),\n ]", "\n try:", " result = self._execute(command, credentials)", " ...
[ 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 120, "char_start": 119, "chars": "[" }, { "char_end": 135, "char_start": 134, "chars": "r" }, { "char_end": 139, "char_start": 136, "chars": "lon" }, { ...
89
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def populate_custom_grains_and_pillar():\n '''\n Populate local salt-minion grains and pillar fields values as specified in\n config file.", " For example:", " custom_grains_pillar:\n grains:\n - selinux: selinux:enabled\n - release: osrelease\n pillar...
[ 1, 1, 1, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 792, "char_start": 791, "chars": "[" }, { "char_end": 804, "char_start": 802, "chars": "'," }, { "char_end": 806, "char_start": 805, "chars": "'" }, { ...
90
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def populate_custom_grains_and_pillar():\n '''\n Populate local salt-minion grains and pillar fields values as specified in\n config file.", " For example:", " custom_grains_pillar:\n grains:\n - selinux: selinux:enabled\n - release: osrelease\n pillar...
[ 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 792, "char_start": 791, "chars": "[" }, { "char_end": 804, "char_start": 802, "chars": "'," }, { "char_end": 806, "char_start": 805, "chars": "'" }, { ...
90
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def copy(self, src_data, src_path, dst_data, dst_path, job_id=None):", " credentials = ''", "\n if src_data is None: # Local\n src = src_path\n else:", " credentials += self._formatCredentials(src_data, name='src')", " src = 'src:{}'.format(src_path)", ...
[ 1, 0, 1, 0, 1, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 97, "char_start": 95, "chars": "{}" }, { "char_end": 208, "char_start": 200, "chars": ".update(" }, { "char_end": 253, "char_start": 252, "chars": ")" }, {...
91
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def copy(self, src_data, src_path, dst_data, dst_path, job_id=None):", " credentials = {}", "\n if src_data is None: # Local\n src = src_path\n else:", " credentials.update(self._formatCredentials(src_data, name='src'))", " src = 'src:{}'.format(src_pat...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 97, "char_start": 95, "chars": "{}" }, { "char_end": 208, "char_start": 200, "chars": ".update(" }, { "char_end": 253, "char_start": 252, "chars": ")" }, {...
91
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {\n#if defined(OS_WIN)\n const auto converted = base::WideToUTF8(arg);\n const char* a = converted.c_str();\n#else\n const char* a = arg;\n#endif", " static const char* prefixes[] = {\"--\", \"-\", \"/\"};", " int prefix_length = 0;\n for (aut...
[ 1, 1, 1, 1, 0, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 574, "char_start": 527, "chars": " =\n base::ToLowerASCII(base::StringPiece" }, { "char_end": 593, "char_start": 592, "chars": ")" } ], "deleted": [] }, "commit_link": "github.co...
92
cwe-078
cc
Determine whether the {function_name} code is vulnerable or not.
[ "bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {\n#if defined(OS_WIN)\n const auto converted = base::WideToUTF8(arg);\n const char* a = converted.c_str();\n#else\n const char* a = arg;\n#endif", " static const char* prefixes[] = {\"--\", \"-\", \"/\"};", " int prefix_length = 0;\n for (aut...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 574, "char_start": 527, "chars": " =\n base::ToLowerASCII(base::StringPiece" }, { "char_end": 593, "char_start": 592, "chars": ")" } ], "deleted": [] }, "commit_link": "github.co...
92
cwe-078
cc
Determine whether the {function_name} code is vulnerable or not.
[ "def _remove_volume_from_volume_set(self, volume_name, vvs_name):", " self._cli_run('removevvset -f %s %s' % (vvs_name, volume_name), None)" ]
[ 1, 0 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 92, "char_start": 91, "chars": "[" }, { "char_end": 106, "char_start": 104, "chars": "'," }, { "char_end": 108, "char_start": 107, "chars": "'" }, { ...
93
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _remove_volume_from_volume_set(self, volume_name, vvs_name):", " self._cli_run(['removevvset', '-f', vvs_name, volume_name])" ]
[ 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 92, "char_start": 91, "chars": "[" }, { "char_end": 106, "char_start": 104, "chars": "'," }, { "char_end": 108, "char_start": 107, "chars": "'" }, { ...
93
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def handle_message(self, ch, method, properties, body):\n \"\"\"\n this is a pika.basic_consumer callback\n handles client inputs, runs appropriate workflows and views", " Args:\n ch: amqp channel\n method: amqp method\n properties:\n body: ...
[ 1, 1, 0, 1, 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 378, "char_start": 357, "chars": "headers = {}\n " }, { "char_end": 598, "char_start": 597, "chars": " " }, { "char_end": 1003, "char_start": 947, "chars": "'],...
94
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def handle_message(self, ch, method, properties, body):\n \"\"\"\n this is a pika.basic_consumer callback\n handles client inputs, runs appropriate workflows and views", " Args:\n ch: amqp channel\n method: amqp method\n properties:\n body: ...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 378, "char_start": 357, "chars": "headers = {}\n " }, { "char_end": 598, "char_start": 597, "chars": " " }, { "char_end": 1003, "char_start": 947, "chars": "'],...
94
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _add_chapsecret_to_host(self, host_name):\n \"\"\"Generate and store a randomly-generated CHAP secret for the host.\"\"\"", " chap_secret = utils.generate_password()", " ssh_cmd = ('svctask chhost -chapsecret \"%(chap_secret)s\" %(host_name)s'\n % {'chap_secret': chap...
[ 1, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 198, "char_start": 197, "chars": "[" }, { "char_end": 208, "char_start": 206, "chars": "'," }, { "char_end": 210, "char_start": 209, "chars": "'" }, { ...
95
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _add_chapsecret_to_host(self, host_name):\n \"\"\"Generate and store a randomly-generated CHAP secret for the host.\"\"\"", " chap_secret = utils.generate_password()", " ssh_cmd = ['svctask', 'chhost', '-chapsecret', chap_secret, host_name]", " out, err = self._run_ssh(ssh_cmd...
[ 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 198, "char_start": 197, "chars": "[" }, { "char_end": 208, "char_start": 206, "chars": "'," }, { "char_end": 210, "char_start": 209, "chars": "'" }, { ...
95
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _call_prepare_fc_map(self, fc_map_id, source, target):\n try:", " out, err = self._run_ssh('svctask prestartfcmap %s' % fc_map_id)", " except exception.ProcessExecutionError as e:\n with excutils.save_and_reraise_exception():\n LOG.error(_('_prepare_fc_map...
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 114, "char_start": 113, "chars": "[" }, { "char_end": 124, "char_start": 122, "chars": "'," }, { "char_end": 126, "char_start": 125, "chars": "'" }, { ...
96
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def _call_prepare_fc_map(self, fc_map_id, source, target):\n try:", " out, err = self._run_ssh(['svctask', 'prestartfcmap', fc_map_id])", " except exception.ProcessExecutionError as e:\n with excutils.save_and_reraise_exception():\n LOG.error(_('_prepare_fc_ma...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 114, "char_start": 113, "chars": "[" }, { "char_end": 124, "char_start": 122, "chars": "'," }, { "char_end": 126, "char_start": 125, "chars": "'" }, { ...
96
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {\n\tRBinInfo *info = r_bin_get_info (r->bin);\n\tRList *entries = r_bin_get_entries (r->bin);\n\tRBinSymbol *symbol;\n\tRBinAddr *entry;\n\tRListIter *iter;\n\tbool firstexp = true;\n\tbool pr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 0, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6624, "char_start": 6622, "chars": "\\\"" }, { "char_end": 6646, "char_start": 6644, "chars": "\\\"" }, { "char_end": 6750, "char_start": 6748, "chars": "\\\"" }...
97
cwe-078
c
Determine whether the {function_name} code is vulnerable or not.
[ "static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {\n\tRBinInfo *info = r_bin_get_info (r->bin);\n\tRList *entries = r_bin_get_entries (r->bin);\n\tRBinSymbol *symbol;\n\tRBinAddr *entry;\n\tRListIter *iter;\n\tbool firstexp = true;\n\tbool pr...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 6624, "char_start": 6622, "chars": "\\\"" }, { "char_end": 6646, "char_start": 6644, "chars": "\\\"" }, { "char_end": 6750, "char_start": 6748, "chars": "\\\"" }...
97
cwe-078
c
Determine whether the {function_name} code is vulnerable or not.
[ "def on_message( self, profile_id, profile_name, level, message, timeout ):\n if 1 == level:", " cmd = \"notify-send \"", " if timeout > 0:", " cmd = cmd + \" -t %s\" % (1000 * timeout)", "\n title = \"Back In Time (%s) : %s\" % (self.user, profile_name...
[ 1, 0, 1, 0, 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 122, "char_start": 120, "chars": "['" }, { "char_end": 135, "char_start": 133, "chars": "']" }, { "char_end": 189, "char_start": 183, "chars": ".exten" }, ...
98
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "def on_message( self, profile_id, profile_name, level, message, timeout ):\n if 1 == level:", " cmd = ['notify-send']", " if timeout > 0:", " cmd.extend(['-t', str(1000 * timeout)])", "\n title = \"Back In Time (%s) : %s\" % (self.user, profile_name)\n...
[ 1, 1, 1, 1, 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 122, "char_start": 120, "chars": "['" }, { "char_end": 135, "char_start": 133, "chars": "']" }, { "char_end": 189, "char_start": 183, "chars": ".exten" }, ...
98
cwe-078
py
Determine whether the {function_name} code is vulnerable or not.
[ "void pb_controller::play_file(const std::string& file) {\n\tstd::string cmdline;\n\tstd::string player = cfg->get_configvalue(\"player\");\n\tif (player == \"\")\n\t\treturn;\n\tcmdline.append(player);", "\tcmdline.append(\" \\\"\");\n\tcmdline.append(utils::replace_all(file,\"\\\"\", \"\\\\\\\"\"));\n\tcmdline....
[ 1, 0, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 206, "char_start": 205, "chars": "'" }, { "char_end": 252, "char_start": 251, "chars": "'" }, { "char_end": 259, "char_start": 256, "chars": "%27" }, { ...
99
cwe-078
cpp
Determine whether the {function_name} code is vulnerable or not.
[ "void pb_controller::play_file(const std::string& file) {\n\tstd::string cmdline;\n\tstd::string player = cfg->get_configvalue(\"player\");\n\tif (player == \"\")\n\t\treturn;\n\tcmdline.append(player);", "\tcmdline.append(\" '\");\n\tcmdline.append(utils::replace_all(file,\"'\", \"%27\"));\n\tcmdline.append(\"'\...
[ 1, 1, 1 ]
SVEN
{ "char_changes": { "added": [ { "char_end": 206, "char_start": 205, "chars": "'" }, { "char_end": 252, "char_start": 251, "chars": "'" }, { "char_end": 259, "char_start": 256, "chars": "%27" }, { ...
99
cwe-078
cpp