Andrefty commited on
Commit
ff944ca
·
1 Parent(s): a8ea5ed

Add a small sample from the train split of paired_data

Browse files
Files changed (2) hide show
  1. README.md +2 -1
  2. paired_train_sample.jsonl +38 -0
README.md CHANGED
@@ -19,4 +19,5 @@ configs:
19
  default: true
20
  ---
21
 
22
- [Sample here](paired_test_sample.jsonl)
 
 
19
  default: true
20
  ---
21
 
22
+ [Test sample here](paired_test_sample.jsonl)
23
+ [Train sample here](paired_train_sample.jsonl)
paired_train_sample.jsonl ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "idx": 0,
3
+ "project": "openssl",
4
+ "commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75",
5
+ "project_url": "https://github.com/openssl/openssl",
6
+ "commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75",
7
+ "commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)",
8
+ "target": 1,
9
+ "func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (TLS1_get_version(s) >= TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n",
10
+ "func_hash": 2.5508774765922695e+38,
11
+ "file_name": "None",
12
+ "file_hash": null,
13
+ "cwe": [
14
+ "CWE-310"
15
+ ],
16
+ "cve": "CVE-2013-6449",
17
+ "cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.",
18
+ "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449"
19
+ }
20
+ {
21
+ "idx": 157856,
22
+ "project": "openssl",
23
+ "commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75",
24
+ "project_url": "https://github.com/openssl/openssl",
25
+ "commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75",
26
+ "commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)",
27
+ "target": 0,
28
+ "func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (s->method->version == TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n",
29
+ "func_hash": 1.8544816833638957e+38,
30
+ "file_name": "None",
31
+ "file_hash": null,
32
+ "cwe": [
33
+ "CWE-310"
34
+ ],
35
+ "cve": "CVE-2013-6449",
36
+ "cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.",
37
+ "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449"
38
+ }