prompt stringclasses 1
value | completions listlengths 2 1.33k | labels listlengths 2 1.33k | source stringclasses 1
value | other_info dict | index int64 0 719 | cwe stringclasses 9
values | language stringclasses 6
values |
|---|---|---|---|---|---|---|---|
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.",
" key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"",
" sshdir = os.path.join(fs, 'root', '.ssh')",
" utils.execute... | [
1,
1,
0,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 244,
"char_start": 242,
"chars": "_j"
},
{
"char_end": 258,
"char_start": 245,
"chars": "in_and_check_"
},
{
"char_end": 267,
"char_start": 262,
"chars": "_with"
... | 50 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.",
" key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"",
" sshdir = _join_and_check_path_within_fs(fs, 'root', '.ssh')",
... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 244,
"char_start": 242,
"chars": "_j"
},
{
"char_end": 258,
"char_start": 245,
"chars": "in_and_check_"
},
{
"char_end": 267,
"char_start": 262,
"chars": "_with"
... | 50 | cwe-022 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def start():\n print(\"[*] Starting backdoor process\")\n print(\"[*] Decompressing target to tmp directory...\")\n #subprocess.call(\"jar -x %s\" % target, shell=True)\n with zipfile.ZipFile(target, 'r') as zip:\n zip.extractall(\"tmp\")\n print(\"[*] Target dumped to tmp directory\")",
" ... | [
1,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1467,
"char_start": 1466,
"chars": "#"
},
{
"char_end": 1614,
"char_start": 1531,
"chars": "e) != 0:\n if subprocess.call(['javac','-cp','tmp/','tmp/%s'%backdoor],shell=Fals"
}
],
"delet... | 51 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def start():\n print(\"[*] Starting backdoor process\")\n print(\"[*] Decompressing target to tmp directory...\")\n #subprocess.call(\"jar -x %s\" % target, shell=True)\n with zipfile.ZipFile(target, 'r') as zip:\n zip.extractall(\"tmp\")\n print(\"[*] Target dumped to tmp directory\")",
" ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1467,
"char_start": 1466,
"chars": "#"
},
{
"char_end": 1614,
"char_start": 1531,
"chars": "e) != 0:\n if subprocess.call(['javac','-cp','tmp/','tmp/%s'%backdoor],shell=Fals"
}
],
"delet... | 51 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _map_vol_to_host(self, volume_name, host_name):\n \"\"\"Create a mapping between a volume to a host.\"\"\"",
" LOG.debug(_('enter: _map_vol_to_host: volume %(volume_name)s to '\n 'host %(host_name)s')\n % {'volume_name': volume_name, 'host_name': host_name})"... | [
1,
1,
1,
1,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1142,
"char_start": 1141,
"chars": "["
},
{
"char_end": 1152,
"char_start": 1150,
"chars": "',"
},
{
"char_end": 1154,
"char_start": 1153,
"chars": "'"
},
... | 52 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _map_vol_to_host(self, volume_name, host_name):\n \"\"\"Create a mapping between a volume to a host.\"\"\"",
" LOG.debug(_('enter: _map_vol_to_host: volume %(volume_name)s to '\n 'host %(host_name)s')\n % {'volume_name': volume_name, 'host_name': host_name})"... | [
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1142,
"char_start": 1141,
"chars": "["
},
{
"char_end": 1152,
"char_start": 1150,
"chars": "',"
},
{
"char_end": 1154,
"char_start": 1153,
"chars": "'"
},
... | 52 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _delete_vdisk(self, name, force):\n \"\"\"Deletes existing vdisks.",
" It is very important to properly take care of mappings before deleting\n the disk:\n 1. If no mappings, then it was a vdisk, and can be deleted\n 2. If it is the source of a flashcopy mapping and copy_ra... | [
1,
1,
1,
1,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1415,
"char_start": 1411,
"chars": "ssh_"
},
{
"char_end": 1418,
"char_start": 1416,
"chars": "md"
},
{
"char_end": 1422,
"char_start": 1421,
"chars": "["
},
... | 53 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _delete_vdisk(self, name, force):\n \"\"\"Deletes existing vdisks.",
" It is very important to properly take care of mappings before deleting\n the disk:\n 1. If no mappings, then it was a vdisk, and can be deleted\n 2. If it is the source of a flashcopy mapping and copy_ra... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 1415,
"char_start": 1411,
"chars": "ssh_"
},
{
"char_end": 1418,
"char_start": 1416,
"chars": "md"
},
{
"char_end": 1422,
"char_start": 1421,
"chars": "["
},
... | 53 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _cliq_run(self, verb, cliq_args, check_exit_code=True):\n \"\"\"Runs a CLIQ command over SSH, without doing any result parsing\"\"\"",
" cliq_arg_strings = []",
" for k, v in cliq_args.items():",
" cliq_arg_strings.append(\" %s=%s\" % (k, v))\n cmd = verb + ''.join(... | [
1,
0,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 153,
"char_start": 150,
"chars": "md_"
},
{
"char_end": 165,
"char_start": 161,
"chars": "verb"
},
{
"char_end": 222,
"char_start": 219,
"chars": "md_"
},
... | 54 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _cliq_run(self, verb, cliq_args, check_exit_code=True):\n \"\"\"Runs a CLIQ command over SSH, without doing any result parsing\"\"\"",
" cmd_list = [verb]",
" for k, v in cliq_args.items():",
" cmd_list.append(\"%s=%s\" % (k, v))",
"",
" return self._run_ssh(cmd... | [
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 153,
"char_start": 150,
"chars": "md_"
},
{
"char_end": 165,
"char_start": 161,
"chars": "verb"
},
{
"char_end": 222,
"char_start": 219,
"chars": "md_"
},
... | 54 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _set_qos_rule(self, qos, vvs_name):\n max_io = self._get_qos_value(qos, 'maxIOPS')\n max_bw = self._get_qos_value(qos, 'maxBWS')\n cli_qos_string = \"\"\n if max_io is not None:\n cli_qos_string += ('-io %s ' % max_io)\n if max_bw is not None:\n cli_qos_... | [
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 365,
"char_start": 364,
"chars": "["
},
{
"char_end": 374,
"char_start": 372,
"chars": "',"
},
{
"char_end": 376,
"char_start": 375,
"chars": "'"
},
{
... | 55 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _set_qos_rule(self, qos, vvs_name):\n max_io = self._get_qos_value(qos, 'maxIOPS')\n max_bw = self._get_qos_value(qos, 'maxBWS')\n cli_qos_string = \"\"\n if max_io is not None:\n cli_qos_string += ('-io %s ' % max_io)\n if max_bw is not None:\n cli_qos_... | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 365,
"char_start": 364,
"chars": "["
},
{
"char_end": 374,
"char_start": 372,
"chars": "',"
},
{
"char_end": 376,
"char_start": 375,
"chars": "'"
},
{
... | 55 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get_lines(command: str) -> List[str]:",
" \"\"\"\n Run a command and return lines of output",
" :param str command: the command to run\n :returns: list of whitespace-stripped lines output by command\n \"\"\"\n stdout = get_output(command)",
" return [line.strip().decode() for line in... | [
0,
1,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 28,
"char_start": 23,
"chars": "List["
},
{
"char_end": 32,
"char_start": 31,
"chars": "]"
}
],
"deleted": [
{
"char_end": 277,
"char_start": 268,
"chars": "()... | 56 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def get_lines(command: List[str]) -> List[str]:",
" \"\"\"\n Run a command and return lines of output",
" :param str command: the command to run\n :returns: list of whitespace-stripped lines output by command\n \"\"\"\n stdout = get_output(command)",
" return [line.strip() for line in st... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 28,
"char_start": 23,
"chars": "List["
},
{
"char_end": 32,
"char_start": 31,
"chars": "]"
}
],
"deleted": [
{
"char_end": 277,
"char_start": 268,
"chars": "()... | 56 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _modify_3par_iscsi_host(self, hostname, iscsi_iqn):\n # when using -add, you can not send the persona or domain options",
" self.common._cli_run('createhost -iscsi -add %s %s'\n % (hostname, iscsi_iqn), None)"
] | [
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 147,
"char_start": 146,
"chars": "a"
},
{
"char_end": 153,
"char_start": 148,
"chars": "d = ["
},
{
"char_end": 166,
"char_start": 164,
"chars": "',"
},
{
... | 57 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _modify_3par_iscsi_host(self, hostname, iscsi_iqn):\n # when using -add, you can not send the persona or domain options",
" command = ['createhost', '-iscsi', '-add', hostname, iscsi_iqn]\n self.common._cli_run(command)"
] | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 147,
"char_start": 146,
"chars": "a"
},
{
"char_end": 153,
"char_start": 148,
"chars": "d = ["
},
{
"char_end": 166,
"char_start": 164,
"chars": "',"
},
{
... | 57 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@contextmanager\ndef run_interactive_shell_command(command, **kwargs):\n \"\"\"",
" Runs a command in shell and provides stdout, stderr and stdin streams.",
"",
" This function creates a context manager that sets up the process, returns\n to caller, closes streams and waits for process to exit on... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 96,
"char_start": 89,
"chars": "single "
},
{
"char_end": 154,
"char_start": 150,
"chars": "\n "
},
{
"char_end": 266,
"char_start": 233,
"chars": " (using\n `sub... | 58 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@contextmanager\ndef run_interactive_shell_command(command, **kwargs):\n \"\"\"",
" Runs a single command in shell and provides stdout, stderr and stdin\n streams.",
"",
" This function creates a context manager that sets up the process (using\n `subprocess.Popen()`), returns to caller, closes... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 96,
"char_start": 89,
"chars": "single "
},
{
"char_end": 154,
"char_start": 150,
"chars": "\n "
},
{
"char_end": 266,
"char_start": 233,
"chars": " (using\n `sub... | 58 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@app.route('/delete_video/<filename>')\ndef delete_video(filename):\n\tif 'username' in session:\n\t\t#os.remove(\"static/videos/{}\".format(filename))\n\t\tprint(session['username'], file=sys.stdout)\n\t\tdata=users.query.filter_by(Username=session['username']).first()\n\t\tvideo=Video.query.filter_by(UserID=data... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 353,
"char_start": 352,
"chars": "#"
},
{
"char_end": 417,
"char_start": 364,
"chars": "static/videos/{}\".format(filename))\n\t\t\tos.system(\"rm "
}
],
"deleted": []
},
"commit_link":... | 59 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@app.route('/delete_video/<filename>')\ndef delete_video(filename):\n\tif 'username' in session:\n\t\t#os.remove(\"static/videos/{}\".format(filename))\n\t\tprint(session['username'], file=sys.stdout)\n\t\tdata=users.query.filter_by(Username=session['username']).first()\n\t\tvideo=Video.query.filter_by(UserID=data... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 353,
"char_start": 352,
"chars": "#"
},
{
"char_end": 417,
"char_start": 364,
"chars": "static/videos/{}\".format(filename))\n\t\t\tos.system(\"rm "
}
],
"deleted": []
},
"commit_link":... | 59 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def whitelist(users: str):",
" for user in users.split():",
" call(WHITELIST_COMMAND_TEMPLATE.format(user))"
] | [
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 44,
"char_start": 14,
"chars": "channel: discord.TextChannel, "
},
{
"char_end": 349,
"char_start": 88,
"chars": " if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com... | 60 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def whitelist(channel: discord.TextChannel, users: str):",
" for user in users.split():",
" if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com/customer/en/portal/articles/928638-minecraft-usernames?b_id=5408\n await channel.send('\\'{}\\' is not a valid Minec... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 44,
"char_start": 14,
"chars": "channel: discord.TextChannel, "
},
{
"char_end": 349,
"char_start": 88,
"chars": " if not re.match(r'^[A-Za-z0-9_]{3,16}$', user): # as per https://help.mojang.com... | 60 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 526,
"char_start": 525,
"chars": "["
},
{
"char_end": 537,
"char_start": 535,
"chars": "',"
},
{
"char_end": 539,
"char_start": 538,
"chars": "'"
},
{
... | 61 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpfcdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 526,
"char_start": 525,
"chars": "["
},
{
"char_end": 537,
"char_start": 535,
"chars": "',"
},
{
"char_end": 539,
"char_start": 538,
"chars": "'"
},
{
... | 61 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def do_setup(self, ctxt):\n \"\"\"Check that we have all configuration details from the storage.\"\"\"",
" LOG.debug(_('enter: do_setup'))\n self._context = ctxt",
" # Validate that the pool exists",
" ssh_cmd = 'svcinfo lsmdiskgrp -delim ! -nohdr'",
" out, err = s... | [
1,
1,
1,
0,
1,
1,
0,
1,
1,
0,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 237,
"char_start": 236,
"chars": "["
},
{
"char_end": 247,
"char_start": 245,
"chars": "',"
},
{
"char_end": 249,
"char_start": 248,
"chars": "'"
},
{
... | 62 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def do_setup(self, ctxt):\n \"\"\"Check that we have all configuration details from the storage.\"\"\"",
" LOG.debug(_('enter: do_setup'))\n self._context = ctxt",
" # Validate that the pool exists",
" ssh_cmd = ['svcinfo', 'lsmdiskgrp', '-delim', '!', '-nohdr']",
" ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 237,
"char_start": 236,
"chars": "["
},
{
"char_end": 247,
"char_start": 245,
"chars": "',"
},
{
"char_end": 249,
"char_start": 248,
"chars": "'"
},
{
... | 62 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _execute_command_and_parse_attributes(self, ssh_cmd):\n \"\"\"Execute command on the Storwize/SVC and parse attributes.",
" Exception is raised if the information from the system\n can not be obtained.",
" \"\"\"",
" LOG.debug(_('enter: _execute_command_and_parse_attrib... | [
1,
1,
1,
1,
0,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 349,
"char_start": 345,
"chars": "tr(s"
},
{
"char_end": 356,
"char_start": 355,
"chars": ")"
},
{
"char_end": 1503,
"char_start": 1499,
"chars": "tr(s"
},
... | 63 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _execute_command_and_parse_attributes(self, ssh_cmd):\n \"\"\"Execute command on the Storwize/SVC and parse attributes.",
" Exception is raised if the information from the system\n can not be obtained.",
" \"\"\"",
" LOG.debug(_('enter: _execute_command_and_parse_attrib... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 349,
"char_start": 345,
"chars": "tr(s"
},
{
"char_end": 356,
"char_start": 355,
"chars": ")"
},
{
"char_end": 1503,
"char_start": 1499,
"chars": "tr(s"
},
... | 63 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_get_iscsi_ip_active(self):\n self.flags(lock_path=self.tempdir)",
" #record set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n",
" show_... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
1,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 315,
"char_start": 314,
"chars": "["
},
{
"char_end": 326,
"char_start": 325,
"chars": "]"
},
{
"char_end": 426,
"char_start": 425,
"chars": "["
},
{
... | 64 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_get_iscsi_ip_active(self):\n self.flags(lock_path=self.tempdir)",
" #record set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n",
" show_... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 315,
"char_start": 314,
"chars": "["
},
{
"char_end": 326,
"char_start": 325,
"chars": "]"
},
{
"char_end": 426,
"char_start": 425,
"chars": "["
},
{
... | 64 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _find_host_from_wwpn(self, connector):\n for wwpn in connector['wwpns']:",
" ssh_cmd = 'svcinfo lsfabric -wwpn %s -delim !' % wwpn",
" out, err = self._run_ssh(ssh_cmd)",
" if not len(out.strip()):\n # This WWPN is not in use\n continu... | [
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 110,
"char_start": 109,
"chars": "["
},
{
"char_end": 120,
"char_start": 118,
"chars": "',"
},
{
"char_end": 122,
"char_start": 121,
"chars": "'"
},
{
... | 65 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _find_host_from_wwpn(self, connector):\n for wwpn in connector['wwpns']:",
" ssh_cmd = ['svcinfo', 'lsfabric', '-wwpn', wwpn, '-delim', '!']",
" out, err = self._run_ssh(ssh_cmd)",
" if not len(out.strip()):\n # This WWPN is not in use\n ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 110,
"char_start": 109,
"chars": "["
},
{
"char_end": 120,
"char_start": 118,
"chars": "',"
},
{
"char_end": 122,
"char_start": 121,
"chars": "'"
},
{
... | 65 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def extend_volume(self, volume, new_size):\n LOG.debug(_('enter: extend_volume: volume %s') % volume['id'])\n ret = self._ensure_vdisk_no_fc_mappings(volume['name'],\n allow_snaps=False)\n if not ret:\n exception_message = (_('extend_vo... | [
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 564,
"char_start": 563,
"chars": "["
},
{
"char_end": 574,
"char_start": 572,
"chars": "',"
},
{
"char_end": 576,
"char_start": 575,
"chars": "'"
},
{
... | 66 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def extend_volume(self, volume, new_size):\n LOG.debug(_('enter: extend_volume: volume %s') % volume['id'])\n ret = self._ensure_vdisk_no_fc_mappings(volume['name'],\n allow_snaps=False)\n if not ret:\n exception_message = (_('extend_vo... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 564,
"char_start": 563,
"chars": "["
},
{
"char_end": 574,
"char_start": 572,
"chars": "',"
},
{
"char_end": 576,
"char_start": 575,
"chars": "'"
},
{
... | 66 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_host_from_connector(self, connector):\n \"\"\"List the hosts defined in the storage.",
" Return the host name with the given connection info, or None if there\n is no host fitting that information.",
" \"\"\"",
" prefix = self._connector_to_hostname_prefix(connecto... | [
1,
1,
1,
1,
1,
0,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 440,
"char_start": 439,
"chars": "["
},
{
"char_end": 450,
"char_start": 448,
"chars": "',"
},
{
"char_end": 452,
"char_start": 451,
"chars": "'"
},
{
... | 67 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_host_from_connector(self, connector):\n \"\"\"List the hosts defined in the storage.",
" Return the host name with the given connection info, or None if there\n is no host fitting that information.",
" \"\"\"",
" prefix = self._connector_to_hostname_prefix(connecto... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 440,
"char_start": 439,
"chars": "["
},
{
"char_end": 450,
"char_start": 448,
"chars": "',"
},
{
"char_end": 452,
"char_start": 451,
"chars": "'"
},
{
... | 67 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_hostvdisk_mappings(self, host_name):\n \"\"\"Return the defined storage mappings for a host.\"\"\"",
" return_data = {}",
" ssh_cmd = 'svcinfo lshostvdiskmap -delim ! %s' % host_name",
" out, err = self._run_ssh(ssh_cmd)",
" mappings = out.strip().split('\\n')\n ... | [
1,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 157,
"char_start": 156,
"chars": "["
},
{
"char_end": 167,
"char_start": 165,
"chars": "',"
},
{
"char_end": 169,
"char_start": 168,
"chars": "'"
},
{
... | 68 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_hostvdisk_mappings(self, host_name):\n \"\"\"Return the defined storage mappings for a host.\"\"\"",
" return_data = {}",
" ssh_cmd = ['svcinfo', 'lshostvdiskmap', '-delim', '!', host_name]",
" out, err = self._run_ssh(ssh_cmd)",
" mappings = out.strip().split('\... | [
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 157,
"char_start": 156,
"chars": "["
},
{
"char_end": 167,
"char_start": 165,
"chars": "',"
},
{
"char_end": 169,
"char_start": 168,
"chars": "'"
},
{
... | 68 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def main():\n global word\n print(\"Starting script... press 'ctrl+c' in terminal to turn off\")\n while True:\n if pyperclip.paste() != word and len(pyperclip.paste().split())<5:\n word = pyperclip.paste()\n wordChc=False\n req = requests.get(\"https://api-portal.d... | [
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 689,
"char_start": 680,
"chars": "that word"
},
{
"char_end": 831,
"char_start": 822,
"chars": "that word"
},
{
"char_end": 1547,
"char_start": 1538,
"chars": "that wo... | 69 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def main():\n global word\n print(\"Starting script... press 'ctrl+c' in terminal to turn off\")\n while True:\n if pyperclip.paste() != word and len(pyperclip.paste().split())<5:\n word = pyperclip.paste()\n wordChc=False\n req = requests.get(\"https://api-portal.d... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 689,
"char_start": 680,
"chars": "that word"
},
{
"char_end": 831,
"char_start": 822,
"chars": "that word"
},
{
"char_end": 1547,
"char_start": 1538,
"chars": "that wo... | 69 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_vvset_from_3par(self, volume_name):\n \"\"\"Get Virtual Volume Set from 3PAR.",
" The only way to do this currently is to try and delete the volume\n to get the error message.",
" NOTE(walter-boring): don't call this unless you know the volume is\n already in a vvset... | [
1,
1,
1,
0,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 335,
"char_start": 333,
"chars": "['"
},
{
"char_end": 345,
"char_start": 343,
"chars": "',"
},
{
"char_end": 347,
"char_start": 346,
"chars": "'"
},
{
... | 70 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_vvset_from_3par(self, volume_name):\n \"\"\"Get Virtual Volume Set from 3PAR.",
" The only way to do this currently is to try and delete the volume\n to get the error message.",
" NOTE(walter-boring): don't call this unless you know the volume is\n already in a vvset... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 335,
"char_start": 333,
"chars": "['"
},
{
"char_end": 345,
"char_start": 343,
"chars": "',"
},
{
"char_end": 347,
"char_start": 346,
"chars": "'"
},
{
... | 70 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_flashcopy_mapping_attributes(self, fc_map_id):\n LOG.debug(_('enter: _get_flashcopy_mapping_attributes: mapping %s')\n % fc_map_id)\n",
" fc_ls_map_cmd = 'svcinfo lsfcmap -filtervalue id=%s -delim !' % \\\n fc_map_id",
" out, err = self._run_ssh(fc_ls_m... | [
1,
0,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 193,
"char_start": 192,
"chars": "["
},
{
"char_end": 203,
"char_start": 201,
"chars": "',"
},
{
"char_end": 205,
"char_start": 204,
"chars": "'"
},
{
... | 71 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_flashcopy_mapping_attributes(self, fc_map_id):\n LOG.debug(_('enter: _get_flashcopy_mapping_attributes: mapping %s')\n % fc_map_id)\n",
" fc_ls_map_cmd = ['svcinfo', 'lsfcmap', '-filtervalue',\n 'id=%s' % fc_map_id, '-delim', '!']",
" out, ... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 193,
"char_start": 192,
"chars": "["
},
{
"char_end": 203,
"char_start": 201,
"chars": "',"
},
{
"char_end": 205,
"char_start": 204,
"chars": "'"
},
{
... | 71 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _add_volume_to_volume_set(self, volume, volume_name,\n cpg, vvs_name, qos):\n if vvs_name is not None:\n # Admin has set a volume set name to add the volume to",
" self._cli_run('createvvset -add %s %s' % (vvs_name,\n ... | [
1,
0,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 243,
"char_start": 242,
"chars": "["
},
{
"char_end": 257,
"char_start": 255,
"chars": "',"
},
{
"char_end": 259,
"char_start": 258,
"chars": "'"
},
{
... | 72 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _add_volume_to_volume_set(self, volume, volume_name,\n cpg, vvs_name, qos):\n if vvs_name is not None:\n # Admin has set a volume set name to add the volume to",
" self._cli_run(['createvvset', '-add', vvs_name, volume_name])",
" else:\n ... | [
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 243,
"char_start": 242,
"chars": "["
},
{
"char_end": 257,
"char_start": 255,
"chars": "',"
},
{
"char_end": 259,
"char_start": 258,
"chars": "'"
},
{
... | 72 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_initialize_connection(self):\n self.driver._eql_execute = self.mox.\\\n CreateMock(self.driver._eql_execute)\n volume = {'name': self.volume_name}\n self.stubs.Set(self.driver, \"_get_iscsi_properties\",\n self._fake_get_iscsi_properties)\n self... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 541,
"char_start": 539,
"chars": "',"
},
{
"char_end": 543,
"char_start": 542,
"chars": "'"
}
],
"deleted": []
},
"commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e... | 73 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_initialize_connection(self):\n self.driver._eql_execute = self.mox.\\\n CreateMock(self.driver._eql_execute)\n volume = {'name': self.volume_name}\n self.stubs.Set(self.driver, \"_get_iscsi_properties\",\n self._fake_get_iscsi_properties)\n self... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 541,
"char_start": 539,
"chars": "',"
},
{
"char_end": 543,
"char_start": 542,
"chars": "'"
}
],
"deleted": []
},
"commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e... | 73 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_invalid_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 530,
"char_start": 529,
"chars": "["
},
{
"char_end": 541,
"char_start": 539,
"chars": "',"
},
{
"char_end": 543,
"char_start": 542,
"chars": "'"
},
{
... | 74 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_invalid_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 530,
"char_start": 529,
"chars": "["
},
{
"char_end": 541,
"char_start": 539,
"chars": "',"
},
{
"char_end": 543,
"char_start": 542,
"chars": "'"
},
{
... | 74 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@app.route('/api/uploads/<sid>/logs')\ndef get_logs(sid):",
" if '/' not in sid:\n path = os.path.join(app.config['UPLOAD_FOLDER'], sid)\n if os.path.isfile(os.path.join(path, app.config['LOG_FILE'])):",
" return send_from_directory(directory=path,\n ... | [
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 65,
"char_start": 64,
"chars": "u"
},
{
"char_end": 80,
"char_start": 66,
"chars": "ils.sid_is_val"
},
{
"char_end": 83,
"char_start": 81,
"chars": "d("
},
... | 75 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"@app.route('/api/uploads/<sid>/logs')\ndef get_logs(sid):",
" if utils.sid_is_valid(sid):\n path = join(app.config['UPLOAD_FOLDER'], sid)",
" if os.path.isfile(join(path, app.config['LOG_FILE'])):",
" return send_from_directory(directory=path,\n ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 65,
"char_start": 64,
"chars": "u"
},
{
"char_end": 80,
"char_start": 66,
"chars": "ils.sid_is_val"
},
{
"char_end": 83,
"char_start": 81,
"chars": "d("
},
... | 75 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _make_fc_map(self, source, target, full_copy):",
" copyflag = '' if full_copy else '-copyrate 0'\n fc_map_cli_cmd = ('svctask mkfcmap -source %(src)s -target %(tgt)s '\n '-autodelete %(copyflag)s' %\n {'src': source,\n ... | [
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 81,
"char_start": 80,
"chars": "["
},
{
"char_end": 91,
"char_start": 89,
"chars": "',"
},
{
"char_end": 93,
"char_start": 92,
"chars": "'"
},
{
"c... | 76 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _make_fc_map(self, source, target, full_copy):",
" fc_map_cli_cmd = ['svctask', 'mkfcmap', '-source', source, '-target',\n target, '-autodelete']\n if not full_copy:\n fc_map_cli_cmd.extend(['-copyrate', '0'])",
" out, err = self._run_ssh(fc_map_cli_... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 81,
"char_start": 80,
"chars": "["
},
{
"char_end": 91,
"char_start": 89,
"chars": "',"
},
{
"char_end": 93,
"char_start": 92,
"chars": "'"
},
{
"c... | 76 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_get_iscsi_ip(self):\n self.flags(lock_path=self.tempdir)",
" #record driver set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n",
" show_... | [
1,
1,
0,
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 315,
"char_start": 314,
"chars": "["
},
{
"char_end": 326,
"char_start": 325,
"chars": "]"
},
{
"char_end": 426,
"char_start": 425,
"chars": "["
},
{
... | 77 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_get_iscsi_ip(self):\n self.flags(lock_path=self.tempdir)",
" #record driver set up\n self.clear_mox()\n _run_ssh = self.mox.CreateMock(hpdriver.hpcommon.HP3PARCommon._run_ssh)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"_run_ssh\", _run_ssh)\n",
" show_... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 315,
"char_start": 314,
"chars": "["
},
{
"char_end": 326,
"char_start": 325,
"chars": "]"
},
{
"char_end": 426,
"char_start": 425,
"chars": "["
},
{
... | 77 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def usage(args=None):\n '''\n Return usage information for volumes mounted on this minion",
" CLI Example:",
" .. code-block:: bash",
" salt '*' disk.usage\n '''",
"",
" if __grains__['kernel'] == 'Linux':\n cmd = 'df -P'\n elif __grains__['kernel'] == 'OpenBSD':\n ... | [
1,
1,
1,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 377,
"char_start": 179,
"chars": "flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n if flag in allowed:\n flags += flag\n else:\n break\n ... | 78 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def usage(args=None):\n '''\n Return usage information for volumes mounted on this minion",
" CLI Example:",
" .. code-block:: bash",
" salt '*' disk.usage\n '''",
" flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 377,
"char_start": 179,
"chars": "flags = ''\n allowed = ('a', 'B', 'h', 'H', 'i', 'k', 'l', 'P', 't', 'T', 'x', 'v')\n for flag in args:\n if flag in allowed:\n flags += flag\n else:\n break\n ... | 78 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_fc_wwpns(self):\n for key in self._storage_nodes:\n node = self._storage_nodes[key]",
" ssh_cmd = 'svcinfo lsnode -delim ! %s' % node['id']",
" raw = self._run_ssh(ssh_cmd)\n resp = CLIResponse(raw, delim='!', with_header=False)\n wwpns = s... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 136,
"char_start": 135,
"chars": "["
},
{
"char_end": 146,
"char_start": 144,
"chars": "',"
},
{
"char_end": 148,
"char_start": 147,
"chars": "'"
},
{
... | 79 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_fc_wwpns(self):\n for key in self._storage_nodes:\n node = self._storage_nodes[key]",
" ssh_cmd = ['svcinfo', 'lsnode', '-delim', '!', node['id']]",
" raw = self._run_ssh(ssh_cmd)\n resp = CLIResponse(raw, delim='!', with_header=False)\n ww... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 136,
"char_start": 135,
"chars": "["
},
{
"char_end": 146,
"char_start": 144,
"chars": "',"
},
{
"char_end": 148,
"char_start": 147,
"chars": "'"
},
{
... | 79 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def ls(self, data, path):\n credentials = self._formatCredentials(data, name='current')",
"\n command = (\n '{credentials} '\n 'rclone lsjson current:{path}'\n ).format(\n credentials=credentials,\n path=path,\n )",
"\n try:",
" ... | [
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 117,
"char_start": 116,
"chars": "["
},
{
"char_end": 132,
"char_start": 131,
"chars": "r"
},
{
"char_end": 137,
"char_start": 134,
"chars": "one"
},
{
... | 80 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def ls(self, data, path):\n credentials = self._formatCredentials(data, name='current')",
" command = [\n 'rclone',\n 'lsjson',\n 'current:{}'.format(path),\n ]",
"\n try:",
" result = self._execute(command, credentials)",
" ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 117,
"char_start": 116,
"chars": "["
},
{
"char_end": 132,
"char_start": 131,
"chars": "r"
},
{
"char_end": 137,
"char_start": 134,
"chars": "one"
},
{
... | 80 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _run_ssh(self, command, check_exit=True, attempts=1):",
" if not self.sshpool:\n self.sshpool = utils.SSHPool(self.config.san_ip,\n self.config.san_ssh_port,\n self.config.ssh_conn_timeout,\n ... | [
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 31,
"char_start": 26,
"chars": "_list"
},
{
"char_end": 145,
"char_start": 62,
"chars": "\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n"
}
],
"delete... | 81 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _run_ssh(self, cmd_list, check_exit=True, attempts=1):\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n",
" if not self.sshpool:\n self.sshpool = utils.SSHPool(self.config.san_ip,\n self.config.san_ssh_port,\n ... | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 31,
"char_start": 26,
"chars": "_list"
},
{
"char_end": 145,
"char_start": 62,
"chars": "\n utils.check_ssh_injection(cmd_list)\n command = ' '. join(cmd_list)\n"
}
],
"delete... | 81 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def verify(self, data):\n credentials = self._formatCredentials(data, name='current')",
" command = '{} rclone lsjson current:'.format(credentials)",
"\n try:",
" result = self._execute(command)",
" return {\n 'result': True,\n 'messa... | [
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 123,
"char_start": 114,
"chars": "[\n "
},
{
"char_end": 129,
"char_start": 124,
"chars": " '"
},
{
"char_end": 141,
"char_start": 135,
"chars": "',\n "
... | 82 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def verify(self, data):\n credentials = self._formatCredentials(data, name='current')",
" command = [\n 'rclone',\n 'lsjson',\n 'current:',\n ]",
"\n try:",
" result = self._execute(command, credentials)",
" return {\n ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 123,
"char_start": 114,
"chars": "[\n "
},
{
"char_end": 129,
"char_start": 124,
"chars": " '"
},
{
"char_end": 141,
"char_start": 135,
"chars": "',\n "
... | 82 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def add_extra_args(self, args=None):\n \"\"\"Add more args depending on how known args are set.\"\"\"",
" parsed = vars(self.parse_known_args(nohelp=True)[0])",
"\n # find which image mode specified if any, and add additional arguments\n image_mode = parsed.get('image_mode', None)\n... | [
1,
0,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 156,
"char_start": 150,
"chars": "args, "
}
],
"deleted": []
},
"commit_link": "github.com/freedombenLiu/ParlAI/commit/601668d569e1276e0b8bf2bf8fb43e391e10d170",
"file_name": "parlai/core/params.py",
"func_name": "add... | 83 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def add_extra_args(self, args=None):\n \"\"\"Add more args depending on how known args are set.\"\"\"",
" parsed = vars(self.parse_known_args(args, nohelp=True)[0])",
"\n # find which image mode specified if any, and add additional arguments\n image_mode = parsed.get('image_mode', N... | [
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 156,
"char_start": 150,
"chars": "args, "
}
],
"deleted": []
},
"commit_link": "github.com/freedombenLiu/ParlAI/commit/601668d569e1276e0b8bf2bf8fb43e391e10d170",
"file_name": "parlai/core/params.py",
"func_name": "add... | 83 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_vdisk_fc_mappings(self, vdisk_name):\n \"\"\"Return FlashCopy mappings that this vdisk is associated with.\"\"\"\n",
" ssh_cmd = 'svcinfo lsvdiskfcmappings -nohdr %s' % vdisk_name",
" out, err = self._run_ssh(ssh_cmd)",
" mapping_ids = []\n if (len(out.strip())):\n... | [
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 146,
"char_start": 145,
"chars": "["
},
{
"char_end": 156,
"char_start": 154,
"chars": "',"
},
{
"char_end": 158,
"char_start": 157,
"chars": "'"
},
{
... | 84 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_vdisk_fc_mappings(self, vdisk_name):\n \"\"\"Return FlashCopy mappings that this vdisk is associated with.\"\"\"\n",
" ssh_cmd = ['svcinfo', 'lsvdiskfcmappings', '-nohdr', vdisk_name]",
" out, err = self._run_ssh(ssh_cmd)",
" mapping_ids = []\n if (len(out.strip())... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 146,
"char_start": 145,
"chars": "["
},
{
"char_end": 156,
"char_start": 154,
"chars": "',"
},
{
"char_end": 158,
"char_start": 157,
"chars": "'"
},
{
... | 84 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 522,
"char_start": 521,
"chars": "["
},
{
"char_end": 533,
"char_start": 531,
"chars": "',"
},
{
"char_end": 535,
"char_start": 534,
"chars": "'"
},
{
... | 85 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def test_create_host(self):\n self.flags(lock_path=self.tempdir)",
" #record\n self.clear_mox()\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_cpg\",\n self.fake_get_cpg)\n self.stubs.Set(hpdriver.hpcommon.HP3PARCommon, \"get_domain\",\n ... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 522,
"char_start": 521,
"chars": "["
},
{
"char_end": 533,
"char_start": 531,
"chars": "',"
},
{
"char_end": 535,
"char_start": 534,
"chars": "'"
},
{
... | 85 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _copy_volume(self, src_name, dest_name, cpg=None, snap_cpg=None,\n tpvv=True):\n # Virtual volume sets are not supported with the -online option",
" cmd = 'createvvcopy -p %s -online ' % src_name",
" if snap_cpg:",
" cmd += '-snp_cpg %s ' % snap_cpg",
... | [
1,
0,
1,
0,
1,
0,
1,
0,
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 193,
"char_start": 192,
"chars": "["
},
{
"char_end": 208,
"char_start": 206,
"chars": "',"
},
{
"char_end": 210,
"char_start": 209,
"chars": "'"
},
{
... | 86 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _copy_volume(self, src_name, dest_name, cpg=None, snap_cpg=None,\n tpvv=True):\n # Virtual volume sets are not supported with the -online option",
" cmd = ['createvvcopy', '-p', src_name, '-online']",
" if snap_cpg:",
" cmd.extend(['-snp_cpg', snap_cpg]... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 193,
"char_start": 192,
"chars": "["
},
{
"char_end": 208,
"char_start": 206,
"chars": "',"
},
{
"char_end": 210,
"char_start": 209,
"chars": "'"
},
{
... | 86 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_active_nsp(self, hostname):\n \"\"\"Return the active nsp, if one exists, for the given host.\"\"\"",
" result = self.common._cli_run('showvlun -a -host %s' % hostname, None)",
" if result:\n # first line is header\n result = result[1:]\n for line ... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 152,
"char_start": 151,
"chars": "["
},
{
"char_end": 163,
"char_start": 161,
"chars": "',"
},
{
"char_end": 165,
"char_start": 164,
"chars": "'"
},
{
... | 87 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _get_active_nsp(self, hostname):\n \"\"\"Return the active nsp, if one exists, for the given host.\"\"\"",
" result = self.common._cli_run(['showvlun', '-a', '-host', hostname])",
" if result:\n # first line is header\n result = result[1:]\n for line in... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 152,
"char_start": 151,
"chars": "["
},
{
"char_end": 163,
"char_start": 161,
"chars": "',"
},
{
"char_end": 165,
"char_start": 164,
"chars": "'"
},
{
... | 87 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def initialize_connection(self, volume, connector):\n \"\"\"Restrict access to a volume.\"\"\"\n try:\n cmd = ['volume', 'select', volume['name'], 'access', 'create',\n 'initiator', connector['initiator']]\n if self.configuration.eqlx_use_chap:",
" ... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 333,
"char_start": 331,
"chars": "',"
},
{
"char_end": 335,
"char_start": 334,
"chars": "'"
}
],
"deleted": []
},
"commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e... | 88 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def initialize_connection(self, volume, connector):\n \"\"\"Restrict access to a volume.\"\"\"\n try:\n cmd = ['volume', 'select', volume['name'], 'access', 'create',\n 'initiator', connector['initiator']]\n if self.configuration.eqlx_use_chap:",
" ... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 333,
"char_start": 331,
"chars": "',"
},
{
"char_end": 335,
"char_start": 334,
"chars": "'"
}
],
"deleted": []
},
"commit_link": "github.com/thatsdone/cinder/commit/9e858bebb89de05b1c9e... | 88 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def mkdir(self, data, path):\n credentials = self._formatCredentials(data, name='current')",
"\n command = (\n '{credentials} '\n 'rclone touch current:{path}/.keep'\n ).format(\n credentials=credentials,\n path=path,\n )",
"\n try:... | [
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 120,
"char_start": 119,
"chars": "["
},
{
"char_end": 135,
"char_start": 134,
"chars": "r"
},
{
"char_end": 139,
"char_start": 136,
"chars": "lon"
},
{
... | 89 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def mkdir(self, data, path):\n credentials = self._formatCredentials(data, name='current')",
" command = [\n 'rclone',\n 'touch',\n 'current:{}/.keep'.format(path),\n ]",
"\n try:",
" result = self._execute(command, credentials)",
" ... | [
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 120,
"char_start": 119,
"chars": "["
},
{
"char_end": 135,
"char_start": 134,
"chars": "r"
},
{
"char_end": 139,
"char_start": 136,
"chars": "lon"
},
{
... | 89 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def populate_custom_grains_and_pillar():\n '''\n Populate local salt-minion grains and pillar fields values as specified in\n config file.",
" For example:",
" custom_grains_pillar:\n grains:\n - selinux: selinux:enabled\n - release: osrelease\n pillar... | [
1,
1,
1,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 792,
"char_start": 791,
"chars": "["
},
{
"char_end": 804,
"char_start": 802,
"chars": "',"
},
{
"char_end": 806,
"char_start": 805,
"chars": "'"
},
{
... | 90 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def populate_custom_grains_and_pillar():\n '''\n Populate local salt-minion grains and pillar fields values as specified in\n config file.",
" For example:",
" custom_grains_pillar:\n grains:\n - selinux: selinux:enabled\n - release: osrelease\n pillar... | [
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 792,
"char_start": 791,
"chars": "["
},
{
"char_end": 804,
"char_start": 802,
"chars": "',"
},
{
"char_end": 806,
"char_start": 805,
"chars": "'"
},
{
... | 90 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def copy(self, src_data, src_path, dst_data, dst_path, job_id=None):",
" credentials = ''",
"\n if src_data is None: # Local\n src = src_path\n else:",
" credentials += self._formatCredentials(src_data, name='src')",
" src = 'src:{}'.format(src_path)",
... | [
1,
0,
1,
0,
1,
1,
0,
1,
0,
1,
0,
1,
0,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 97,
"char_start": 95,
"chars": "{}"
},
{
"char_end": 208,
"char_start": 200,
"chars": ".update("
},
{
"char_end": 253,
"char_start": 252,
"chars": ")"
},
{... | 91 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def copy(self, src_data, src_path, dst_data, dst_path, job_id=None):",
" credentials = {}",
"\n if src_data is None: # Local\n src = src_path\n else:",
" credentials.update(self._formatCredentials(src_data, name='src'))",
" src = 'src:{}'.format(src_pat... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 97,
"char_start": 95,
"chars": "{}"
},
{
"char_end": 208,
"char_start": 200,
"chars": ".update("
},
{
"char_end": 253,
"char_start": 252,
"chars": ")"
},
{... | 91 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {\n#if defined(OS_WIN)\n const auto converted = base::WideToUTF8(arg);\n const char* a = converted.c_str();\n#else\n const char* a = arg;\n#endif",
" static const char* prefixes[] = {\"--\", \"-\", \"/\"};",
" int prefix_length = 0;\n for (aut... | [
1,
1,
1,
1,
0,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 574,
"char_start": 527,
"chars": " =\n base::ToLowerASCII(base::StringPiece"
},
{
"char_end": 593,
"char_start": 592,
"chars": ")"
}
],
"deleted": []
},
"commit_link": "github.co... | 92 | cwe-078 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"bool IsBlacklistedArg(const base::CommandLine::CharType* arg) {\n#if defined(OS_WIN)\n const auto converted = base::WideToUTF8(arg);\n const char* a = converted.c_str();\n#else\n const char* a = arg;\n#endif",
" static const char* prefixes[] = {\"--\", \"-\", \"/\"};",
" int prefix_length = 0;\n for (aut... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 574,
"char_start": 527,
"chars": " =\n base::ToLowerASCII(base::StringPiece"
},
{
"char_end": 593,
"char_start": 592,
"chars": ")"
}
],
"deleted": []
},
"commit_link": "github.co... | 92 | cwe-078 | cc |
Determine whether the {function_name} code is vulnerable or not. | [
"def _remove_volume_from_volume_set(self, volume_name, vvs_name):",
" self._cli_run('removevvset -f %s %s' % (vvs_name, volume_name), None)"
] | [
1,
0
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 92,
"char_start": 91,
"chars": "["
},
{
"char_end": 106,
"char_start": 104,
"chars": "',"
},
{
"char_end": 108,
"char_start": 107,
"chars": "'"
},
{
... | 93 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _remove_volume_from_volume_set(self, volume_name, vvs_name):",
" self._cli_run(['removevvset', '-f', vvs_name, volume_name])"
] | [
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 92,
"char_start": 91,
"chars": "["
},
{
"char_end": 106,
"char_start": 104,
"chars": "',"
},
{
"char_end": 108,
"char_start": 107,
"chars": "'"
},
{
... | 93 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def handle_message(self, ch, method, properties, body):\n \"\"\"\n this is a pika.basic_consumer callback\n handles client inputs, runs appropriate workflows and views",
" Args:\n ch: amqp channel\n method: amqp method\n properties:\n body: ... | [
1,
1,
0,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 378,
"char_start": 357,
"chars": "headers = {}\n "
},
{
"char_end": 598,
"char_start": 597,
"chars": " "
},
{
"char_end": 1003,
"char_start": 947,
"chars": "'],... | 94 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def handle_message(self, ch, method, properties, body):\n \"\"\"\n this is a pika.basic_consumer callback\n handles client inputs, runs appropriate workflows and views",
" Args:\n ch: amqp channel\n method: amqp method\n properties:\n body: ... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 378,
"char_start": 357,
"chars": "headers = {}\n "
},
{
"char_end": 598,
"char_start": 597,
"chars": " "
},
{
"char_end": 1003,
"char_start": 947,
"chars": "'],... | 94 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _add_chapsecret_to_host(self, host_name):\n \"\"\"Generate and store a randomly-generated CHAP secret for the host.\"\"\"",
" chap_secret = utils.generate_password()",
" ssh_cmd = ('svctask chhost -chapsecret \"%(chap_secret)s\" %(host_name)s'\n % {'chap_secret': chap... | [
1,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 198,
"char_start": 197,
"chars": "["
},
{
"char_end": 208,
"char_start": 206,
"chars": "',"
},
{
"char_end": 210,
"char_start": 209,
"chars": "'"
},
{
... | 95 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _add_chapsecret_to_host(self, host_name):\n \"\"\"Generate and store a randomly-generated CHAP secret for the host.\"\"\"",
" chap_secret = utils.generate_password()",
" ssh_cmd = ['svctask', 'chhost', '-chapsecret', chap_secret, host_name]",
" out, err = self._run_ssh(ssh_cmd... | [
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 198,
"char_start": 197,
"chars": "["
},
{
"char_end": 208,
"char_start": 206,
"chars": "',"
},
{
"char_end": 210,
"char_start": 209,
"chars": "'"
},
{
... | 95 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _call_prepare_fc_map(self, fc_map_id, source, target):\n try:",
" out, err = self._run_ssh('svctask prestartfcmap %s' % fc_map_id)",
" except exception.ProcessExecutionError as e:\n with excutils.save_and_reraise_exception():\n LOG.error(_('_prepare_fc_map... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 114,
"char_start": 113,
"chars": "["
},
{
"char_end": 124,
"char_start": 122,
"chars": "',"
},
{
"char_end": 126,
"char_start": 125,
"chars": "'"
},
{
... | 96 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def _call_prepare_fc_map(self, fc_map_id, source, target):\n try:",
" out, err = self._run_ssh(['svctask', 'prestartfcmap', fc_map_id])",
" except exception.ProcessExecutionError as e:\n with excutils.save_and_reraise_exception():\n LOG.error(_('_prepare_fc_ma... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 114,
"char_start": 113,
"chars": "["
},
{
"char_end": 124,
"char_start": 122,
"chars": "',"
},
{
"char_end": 126,
"char_start": 125,
"chars": "'"
},
{
... | 96 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {\n\tRBinInfo *info = r_bin_get_info (r->bin);\n\tRList *entries = r_bin_get_entries (r->bin);\n\tRBinSymbol *symbol;\n\tRBinAddr *entry;\n\tRListIter *iter;\n\tbool firstexp = true;\n\tbool pr... | [
1,
1,
1,
1,
1,
1,
1,
1,
0,
1,
0,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6624,
"char_start": 6622,
"chars": "\\\""
},
{
"char_end": 6646,
"char_start": 6644,
"chars": "\\\""
},
{
"char_end": 6750,
"char_start": 6748,
"chars": "\\\""
}... | 97 | cwe-078 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {\n\tRBinInfo *info = r_bin_get_info (r->bin);\n\tRList *entries = r_bin_get_entries (r->bin);\n\tRBinSymbol *symbol;\n\tRBinAddr *entry;\n\tRListIter *iter;\n\tbool firstexp = true;\n\tbool pr... | [
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 6624,
"char_start": 6622,
"chars": "\\\""
},
{
"char_end": 6646,
"char_start": 6644,
"chars": "\\\""
},
{
"char_end": 6750,
"char_start": 6748,
"chars": "\\\""
}... | 97 | cwe-078 | c |
Determine whether the {function_name} code is vulnerable or not. | [
"def on_message( self, profile_id, profile_name, level, message, timeout ):\n if 1 == level:",
" cmd = \"notify-send \"",
" if timeout > 0:",
" cmd = cmd + \" -t %s\" % (1000 * timeout)",
"\n title = \"Back In Time (%s) : %s\" % (self.user, profile_name... | [
1,
0,
1,
0,
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 122,
"char_start": 120,
"chars": "['"
},
{
"char_end": 135,
"char_start": 133,
"chars": "']"
},
{
"char_end": 189,
"char_start": 183,
"chars": ".exten"
},
... | 98 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"def on_message( self, profile_id, profile_name, level, message, timeout ):\n if 1 == level:",
" cmd = ['notify-send']",
" if timeout > 0:",
" cmd.extend(['-t', str(1000 * timeout)])",
"\n title = \"Back In Time (%s) : %s\" % (self.user, profile_name)\n... | [
1,
1,
1,
1,
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 122,
"char_start": 120,
"chars": "['"
},
{
"char_end": 135,
"char_start": 133,
"chars": "']"
},
{
"char_end": 189,
"char_start": 183,
"chars": ".exten"
},
... | 98 | cwe-078 | py |
Determine whether the {function_name} code is vulnerable or not. | [
"void pb_controller::play_file(const std::string& file) {\n\tstd::string cmdline;\n\tstd::string player = cfg->get_configvalue(\"player\");\n\tif (player == \"\")\n\t\treturn;\n\tcmdline.append(player);",
"\tcmdline.append(\" \\\"\");\n\tcmdline.append(utils::replace_all(file,\"\\\"\", \"\\\\\\\"\"));\n\tcmdline.... | [
1,
0,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 206,
"char_start": 205,
"chars": "'"
},
{
"char_end": 252,
"char_start": 251,
"chars": "'"
},
{
"char_end": 259,
"char_start": 256,
"chars": "%27"
},
{
... | 99 | cwe-078 | cpp |
Determine whether the {function_name} code is vulnerable or not. | [
"void pb_controller::play_file(const std::string& file) {\n\tstd::string cmdline;\n\tstd::string player = cfg->get_configvalue(\"player\");\n\tif (player == \"\")\n\t\treturn;\n\tcmdline.append(player);",
"\tcmdline.append(\" '\");\n\tcmdline.append(utils::replace_all(file,\"'\", \"%27\"));\n\tcmdline.append(\"'\... | [
1,
1,
1
] | SVEN | {
"char_changes": {
"added": [
{
"char_end": 206,
"char_start": 205,
"chars": "'"
},
{
"char_end": 252,
"char_start": 251,
"chars": "'"
},
{
"char_end": 259,
"char_start": 256,
"chars": "%27"
},
{
... | 99 | cwe-078 | cpp |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.