leafs = new ArrayList<>();\n\t\tfor (String file : filenames) {\n\t\t\tVFSItem item = currentContainer.resolve(file);\n\t\t\tif (item instanceof VFSContainer) {\n\t\t\t\tselectionWithContainer = true;\n\t\t\t} else if (item instanceof VFSLeaf) {\n\t\t\t\tleafs.add((VFSLeaf) item);\n\t\t\t}\n\t\t}\n\t\tif (selectionWithContainer) {\n\t\t\tif (leafs.isEmpty()) {\n\t\t\t\twControl.setError(getTranslator().translate(\"send.mail.noFileSelected\"));\n\t\t\t\treturn null;\n\t\t\t} else {\n\t\t\t\tsetFormWarning(getTranslator().translate(\"send.mail.selectionContainsFolder\"));\n\t\t\t}\n\t\t}\n\t\tsetFiles(rootContainer, leafs);\n\t\treturn this;\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "static inline int crypto_rng_seedsize(struct crypto_rng *tfm)\n{\n\treturn tfm->seedsize;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "this.init=function(){function G(H){if(null!=H){var S=H.getAttribute(\"background\");if(null==S||\"\"==S||S==mxConstants.NONE)S=Editor.isDarkMode()?\"transparent\":\"#ffffff\";z.style.backgroundColor=S;(new mxCodec(H.ownerDocument)).decode(H,L.getModel());L.maxFitScale=1;L.fit(8);L.center()}return H}function N(H){null!=H&&(H=G(Editor.parseDiagramNode(H)));return H}mxEvent.addListener(F,\"change\",function(H){x=parseInt(F.value);N(K[x]);mxEvent.consume(H)});if(\"mxfile\"==n.nodeName){var J=n.getElementsByTagName(\"diagram\");", "label": 1, "label_name": "safe"}
-{"code": "PyMem_SetAllocator(PyMemAllocatorDomain domain, PyMemAllocatorEx *allocator)\n{\n switch(domain)\n {\n case PYMEM_DOMAIN_RAW: _PyMem_Raw = *allocator; break;\n case PYMEM_DOMAIN_MEM: _PyMem = *allocator; break;\n case PYMEM_DOMAIN_OBJ: _PyObject = *allocator; break;\n /* ignore unknown domain */\n }\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " it \"returns a hex string representation of the id\" do\n Moped::BSON::ObjectId.new(bytes).to_s.should eq \"4e4d66343b39b68407000001\"\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " it 'should return correct password' do\n should run.with_params('https://my_user:my_pass@www.example.com:8080/path/to/file.php?id=1&ret=0','password').and_return('my_pass') \n end", "label": 0, "label_name": "vulnerable"}
-{"code": " public function load() {\n if ($this->_loaded) return;\n $factory = HTMLPurifier_LanguageFactory::instance();\n $factory->loadLanguage($this->code);\n foreach ($factory->keys as $key) {\n $this->$key = $factory->cache[$this->code][$key];\n }\n $this->_loaded = true;\n }", "label": 1, "label_name": "safe"}
-{"code": " protected function getCustomFilter(array $project)\n {\n $filter = $this->customFilterModel->getById($this->request->getIntegerParam('filter_id'));\n\n if (empty($filter)) {\n throw new PageNotFoundException();\n }\n\n if ($filter['project_id'] != $project['id']) {\n throw new AccessForbiddenException();\n }\n\n return $filter;\n }", "label": 1, "label_name": "safe"}
-{"code": "mxEvent.getClientX(za);I.popupMenuHandler.hideMenu();mxEvent.consume(za)});mxEvent.addGestureListeners(document.body,null,function(za){var wa=!1;null!=Ma&&(U.diagramContainer.style.width=Math.max(20,Pa+mxEvent.getClientX(za)-Ma)+\"px\",wa=!0);null!=Oa&&(U.diagramContainer.style.height=Math.max(20,Sa+mxEvent.getClientY(za)-Oa)+\"px\",wa=!0);wa&&((window.opener||window.parent).postMessage(JSON.stringify({event:\"resize\",fullscreen:Editor.inlineFullscreen,rect:U.diagramContainer.getBoundingClientRect()}),\n\"*\"),Z(),U.refresh())},function(za){null==Ma&&null==Oa||mxEvent.consume(za);Oa=Ma=null});this.diagramContainer.style.borderRadius=\"4px\";document.body.style.backgroundColor=\"transparent\";U.bottomResizer.style.visibility=\"hidden\";U.rightResizer.style.visibility=\"hidden\";P.style.visibility=\"hidden\";W.style.visibility=\"hidden\";S.style.display=\"none\"}\"1\"==urlParams.prefetchFonts&&U.editor.loadFonts()}}};", "label": 1, "label_name": "safe"}
-{"code": " def sync(refreshing = false)\n # We're overriding 'sync' here in order to do some magic\n # in support of providing a 'refreshonly' parameter. This\n # is kind of hacky because the logic for 'refreshonly' is\n # spread between the type and the provider, but this is\n # the least horrible way that I could determine to accomplish\n # it.\n #\n # Note that our overridden version of 'sync' takes a parameter,\n # 'refreshing', which the parent version doesn't take. This\n # allows us to call the sync method directly from the 'refresh'\n # method, and then inside of the body of 'sync' we can tell\n # whether or not we're refreshing.\n\n if (!@resource.refreshonly? || refreshing)\n # If we're not in 'refreshonly' mode, or we're not currently\n # refreshing, then we just call the parent method.\n super()\n else\n # If we get here, it means we're in 'refreshonly' mode and\n # we're not being called by the 'refresh' method, so we\n # just no-op. We'll be called again by the 'refresh'\n # method momentarily.\n nil\n end\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " visitMixinBlock: function(block) {\n if (this.pp)\n this.buf.push(\n \"pug_indent.push('\" + Array(this.indents + 1).join(this.pp) + \"');\"\n );\n this.buf.push('block && block();');\n if (this.pp) this.buf.push('pug_indent.pop();');\n },", "label": 0, "label_name": "vulnerable"}
-{"code": "tok_new(void)\n{\n struct tok_state *tok = (struct tok_state *)PyMem_MALLOC(\n sizeof(struct tok_state));\n if (tok == NULL)\n return NULL;\n tok->buf = tok->cur = tok->end = tok->inp = tok->start = NULL;\n tok->done = E_OK;\n tok->fp = NULL;\n tok->input = NULL;\n tok->tabsize = TABSIZE;\n tok->indent = 0;\n tok->indstack[0] = 0;\n\n tok->atbol = 1;\n tok->pendin = 0;\n tok->prompt = tok->nextprompt = NULL;\n tok->lineno = 0;\n tok->level = 0;\n tok->altwarning = 1;\n tok->alterror = 1;\n tok->alttabsize = 1;\n tok->altindstack[0] = 0;\n tok->decoding_state = STATE_INIT;\n tok->decoding_erred = 0;\n tok->read_coding_spec = 0;\n tok->enc = NULL;\n tok->encoding = NULL;\n tok->cont_line = 0;\n#ifndef PGEN\n tok->filename = NULL;\n tok->decoding_readline = NULL;\n tok->decoding_buffer = NULL;\n#endif\n\n tok->async_def = 0;\n tok->async_def_indent = 0;\n tok->async_def_nl = 0;\n\n return tok;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "iakerb_gss_pseudo_random(OM_uint32 *minor_status, gss_ctx_id_t context_handle,\n int prf_key, const gss_buffer_t prf_in,\n ssize_t desired_output_len, gss_buffer_t prf_out)\n{\n iakerb_ctx_id_t ctx = (iakerb_ctx_id_t)context_handle;\n\n if (ctx->gssc == GSS_C_NO_CONTEXT)\n return GSS_S_NO_CONTEXT;\n\n return krb5_gss_pseudo_random(minor_status, ctx->gssc, prf_key, prf_in,\n desired_output_len, prf_out);\n}", "label": 1, "label_name": "safe"}
-{"code": "\tModResult BuildChannelExempts(User* source, Channel* channel, SilenceEntry::SilenceFlags flag, CUList& exemptions)\n\t{\n\t\tconst Channel::MemberMap& members = channel->GetUsers();\n\t\tfor (Channel::MemberMap::const_iterator member = members.begin(); member != members.end(); ++member)\n\t\t{\n\t\t\tif (!CanReceiveMessage(source, member->first, flag))\n\t\t\t\texemptions.insert(member->first);\n\t\t}\n\t\treturn MOD_RES_PASSTHRU;\n\t}", "label": 1, "label_name": "safe"}
-{"code": "\tprivate function setHeader( $header ) {\n\t\tif ( DynamicPageListHooks::getDebugLevel() == 5 ) {\n\t\t\t$header = '' . $header;\n\t\t}\n\n\t\t$this->header = $this->replaceVariables( $header );\n\t}", "label": 1, "label_name": "safe"}
-{"code": " public function getForwardedData()\n {\n return array(\n array(null, 'for=\"10.0.0.1\";host=\"localhost\";proto=http'),\n array('for=10.0.0.2', 'for=\"10.0.0.2\";host=\"localhost\";proto=http, for=\"10.0.0.1\"'),\n array('for=10.0.0.2, for=10.0.0.3', 'for=\"10.0.0.2\";host=\"localhost\";proto=http, for=\"10.0.0.3\", for=\"10.0.0.1\"'),\n );\n }", "label": 1, "label_name": "safe"}
-{"code": " def test_methodWithUnprintableASCIIRejected(self):\n \"\"\"\n Issuing a request with a method that contains unprintable\n ASCII characters fails with a L{ValueError}.\n \"\"\"\n for c in UNPRINTABLE_ASCII:\n method = b\"GET%s\" % (bytearray([c]),)\n with self.assertRaises(ValueError) as cm:\n self.attemptRequestWithMaliciousMethod(method)\n self.assertRegex(str(cm.exception), \"^Invalid method\")", "label": 1, "label_name": "safe"}
-{"code": " foreach ($val as $vkey => $value) {\n if($vkey!='LAST_UPDATED')\n {\n if($vkey!='UPDATED_BY')\n {\n if($vkey=='ID')\n echo ''.htmlentities($value).'';\n else if($vkey=='SYEAR')\n echo ''.htmlentities($value).'';\n else if($vkey=='TITLE')\n echo ''.htmlentities($value).'';\n else if($vkey=='WWW_ADDRESS')\n echo ''.htmlentities($value).'';\n else\n echo '<'.$vkey.'>'.htmlentities($value).''.$vkey.'>';\n }\n }\n }", "label": 1, "label_name": "safe"}
-{"code": " def testPathTraverse(self):\n # need to perform this test with a \"real\" folder\n from OFS.Folder import Folder\n f = self.folder\n self.folder = Folder()\n self.folder.t, self.folder.laf = f.t, f.laf\n self.folder.laf.write('ok')\n self.assert_expected(self.folder.t, 'CheckPathTraverse.html')", "label": 1, "label_name": "safe"}
-{"code": " async def check_credentials(username: str, password: str) -> bool:\n try:\n expected_password = credentials_dict[username]\n except KeyError:\n return False\n return hmac.compare_digest(expected_password, password)", "label": 1, "label_name": "safe"}
-{"code": "func (mr *MockResourceOwnerPasswordCredentialsGrantStorageMockRecorder) DeleteRefreshTokenSession(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteRefreshTokenSession\", reflect.TypeOf((*MockResourceOwnerPasswordCredentialsGrantStorage)(nil).DeleteRefreshTokenSession), arg0, arg1)\n}", "label": 1, "label_name": "safe"}
-{"code": " def initialize\n @mutex = Mutex.new\n @id = 0\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "For(expr_ty target, expr_ty iter, asdl_seq * body, asdl_seq * orelse, int\n lineno, int col_offset, int end_lineno, int end_col_offset, PyArena *arena)\n{\n stmt_ty p;\n if (!target) {\n PyErr_SetString(PyExc_ValueError,\n \"field target is required for For\");\n return NULL;\n }\n if (!iter) {\n PyErr_SetString(PyExc_ValueError,\n \"field iter is required for For\");\n return NULL;\n }\n p = (stmt_ty)PyArena_Malloc(arena, sizeof(*p));\n if (!p)\n return NULL;\n p->kind = For_kind;\n p->v.For.target = target;\n p->v.For.iter = iter;\n p->v.For.body = body;\n p->v.For.orelse = orelse;\n p->lineno = lineno;\n p->col_offset = col_offset;\n p->end_lineno = end_lineno;\n p->end_col_offset = end_col_offset;\n return p;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "static int override_release(char __user *release, size_t len)\n{\n\tint ret = 0;\n\n\tif (current->personality & UNAME26) {\n\t\tconst char *rest = UTS_RELEASE;\n\t\tchar buf[65] = { 0 };\n\t\tint ndots = 0;\n\t\tunsigned v;\n\t\tsize_t copy;\n\n\t\twhile (*rest) {\n\t\t\tif (*rest == '.' && ++ndots >= 3)\n\t\t\t\tbreak;\n\t\t\tif (!isdigit(*rest) && *rest != '.')\n\t\t\t\tbreak;\n\t\t\trest++;\n\t\t}\n\t\tv = ((LINUX_VERSION_CODE >> 8) & 0xff) + 40;\n\t\tcopy = min(sizeof(buf), max_t(size_t, 1, len));\n\t\tcopy = scnprintf(buf, copy, \"2.6.%u%s\", v, rest);\n\t\tret = copy_to_user(release, buf, copy + 1);\n\t}\n\treturn ret;\n}", "label": 1, "label_name": "safe"}
-{"code": "#ifndef GPAC_DISABLE_ISOM_HINTING\n\nvoid dump_isom_sdp(GF_ISOFile *file, char *inName, Bool is_final_name)\n{\n\tconst char *sdp;\n\tu32 size, i;\n\tFILE *dump;\n\n\tif (inName) {\n\t\tchar szBuf[1024];\n\t\tstrcpy(szBuf, inName);\n\t\tif (!is_final_name) {\n\t\t\tchar *ext = strchr(szBuf, '.');\n\t\t\tif (ext) ext[0] = 0;\n\t\t\tstrcat(szBuf, \"_sdp.txt\");\n\t\t}\n\t\tdump = gf_fopen(szBuf, \"wt\");\n\t\tif (!dump) {\n\t\t\tfprintf(stderr, \"Failed to open %s for dumping\\n\", szBuf);\n\t\t\treturn;\n\t\t}\n\t} else {\n\t\tdump = stdout;\n\t\tfprintf(dump, \"* File SDP content *\\n\\n\");\n\t}\n\t//get the movie SDP\n\tgf_isom_sdp_get(file, &sdp, &size);\n\tif (sdp && size)\n\t\tfprintf(dump, \"%s\", sdp);\n\tfprintf(dump, \"\\r\\n\");\n\n\t//then tracks\n\tfor (i=0; imodelClass);\n if (isset ($model)) {\n $tableName = $model->tableName ();\n $sql = \n 'SELECT id, subject as value\n FROM '.$tableName.' WHERE subject LIKE :qterm ORDER BY subject ASC';\n $command = Yii::app()->db->createCommand($sql);\n $qterm = $_GET['term'].'%';\n $command->bindParam(\":qterm\", $qterm, PDO::PARAM_STR);\n $result = $command->queryAll();\n echo CJSON::encode($result);\n }\n Yii::app()->end();\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " protected function setUpNoValidSchemes()\n {\n $registry = $this->setUpSchemeRegistryMock();\n $registry->returns('getScheme', false, array('*', '*', '*'));\n }", "label": 1, "label_name": "safe"}
-{"code": " it \"stores whether the connection is direct\" do\n cluster.direct.should be_true\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " def gembinary\n [command(:rvmcmd), ruby_version, \"do\", \"gem\"]\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "function htmlContextCleaner($input) {\n $bad_chars = array(\"<\", \">\");\n $safe_chars = array(\"<\", \">\");\n $output = str_replace($bad_chars, $safe_chars, $input);\n\n return stripslashes($output);\n}", "label": 1, "label_name": "safe"}
-{"code": "def test_query_customer_user_with_orders(\n staff_api_client,\n customer_user,\n order_list,\n permission_manage_users,\n permission_manage_orders,", "label": 1, "label_name": "safe"}
-{"code": "elFinder.prototype.commands.cut = function() {\n\t\n\tthis.shortcuts = [{\n\t\tpattern : 'ctrl+x shift+insert'\n\t}];\n\t\n\tthis.getstate = function(sel) {\n\t\tvar sel = this.files(sel),\n\t\t\tcnt = sel.length;\n\t\t\n\t\treturn cnt && $.map(sel, function(f) { return f.phash && f.read && !f.locked ? f : null }).length == cnt ? 0 : -1;\n\t}\n\t\n\tthis.exec = function(hashes) {\n\t\tvar fm = this.fm,\n\t\t\tdfrd = $.Deferred()\n\t\t\t\t.fail(function(error) {\n\t\t\t\t\tfm.error(error);\n\t\t\t\t});\n\n\t\t$.each(this.files(hashes), function(i, file) {\n\t\t\tif (!(file.read && file.phash) ) {\n\t\t\t\treturn !dfrd.reject(['errCopy', file.name, 'errPerm']);\n\t\t\t}\n\t\t\tif (file.locked) {\n\t\t\t\treturn !dfrd.reject(['errLocked', file.name]);\n\t\t\t}\n\t\t});\n\t\t\n\t\treturn dfrd.state() == 'rejected' ? dfrd : dfrd.resolve(fm.clipboard(this.hashes(hashes), true));\n\t}\n\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "O.push(B);z.appendChild(B);var D=function(ea){ya.style.display=\"none\";ka.style.display=\"none\";Z.style.left=\"30px\";n(ea?-1:1);null==V&&(V=Pa);Z.scrollTop=0;Z.innerHTML=\"\";R.spin(Z);var ta=function(xa,wa,ua){J=0;R.stop();Pa=xa;ua=ua||{};var va=0,ha;for(ha in ua)va+=ua[ha].length;if(wa)Z.innerHTML=wa;else if(0==xa.length&&0==va)Z.innerHTML=mxUtils.htmlEntities(mxResources.get(\"noDiagrams\",null,\"No Diagrams Found\"));else if(Z.innerHTML=\"\",0 'bar'));\n $this->assertTrue($bag->has('foo'), '->has() returns true if a parameter is defined');\n $this->assertTrue($bag->has('Foo'), '->has() converts the key to lowercase');\n $this->assertFalse($bag->has('bar'), '->has() returns false if a parameter is not defined');\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " def tmpdir(name) PuppetSpec::Files.tmpdir(name) end", "label": 0, "label_name": "vulnerable"}
-{"code": " def get_session(env, sid)\n with_lock(env) do\n now = Time.now()\n # delete the session if expired\n if @default_options[:expire_after] and sid and @pool_timestamp[sid] and\n @pool_timestamp[sid] < (now - @default_options[:expire_after])\n then\n delete_session(sid)\n end\n # create new session if nonexistent\n unless sid and session = @pool[sid]\n sid, session = generate_sid, {}\n @pool.store sid, session\n end\n # bump session's access time\n @pool_timestamp[sid] = now\n [sid, session]\n end\n end", "label": 1, "label_name": "safe"}
-{"code": "parsegid(const char *s, gid_t *gid)\n{\n\tstruct group *gr;\n\t#if !defined(__linux__) && !defined(__NetBSD__)\n\tconst char *errstr = NULL;\n #else\n int status;\n #endif\n\n\tif ((gr = getgrnam(s)) != NULL) {\n\t\t*gid = gr->gr_gid;\n\t\treturn 0;\n\t}\n\t#if !defined(__linux__) && !defined(__NetBSD__)\n\t*gid = strtonum(s, 0, GID_MAX, &errstr);\n\tif (errstr)\n\t\treturn -1;\n\t#else\n\tstatus = sscanf(s, \"%d\", gid);\n if (status != 1)\n return -1;\n\t#endif\n\treturn 0;\n}", "label": 1, "label_name": "safe"}
-{"code": "\tprotected function _dimensions($path, $mime) {\n\t\tif (strpos($mime, 'image') !== 0) return '';\n\t\t$cache = $this->getDBdat($path);\n\t\tif (isset($cache['width']) && isset($cache['height'])) {\n\t\t\treturn $cache['width'].'x'.$cache['height'];\n\t\t}\n\t\t$ret = '';\n\t\tif ($work = $this->getWorkFile($path)) {\n\t\t\tif ($size = @getimagesize($work)) {\n\t\t\t\t$cache['width'] = $size[0];\n\t\t\t\t$cache['height'] = $size[1];\n\t\t\t\t$this->updateDBdat($path, $cache);\n\t\t\t\t$ret = $size[0].'x'.$size[1];\n\t\t\t}\n\t\t}\n\t\tis_file($work) && @unlink($work);\n\t\treturn $ret;\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "\tprotected function _unlink($path) {\n\t\treturn $this->query(sprintf('DELETE FROM %s WHERE id=%d AND mime!=\\'directory\\' LIMIT 1', $this->tbf, $path)) && $this->db->affected_rows;\n\t}", "label": 1, "label_name": "safe"}
-{"code": "function cmdSet(key, val) {\r\n var objVal = val;\r\n\r\n try {\r\n var strTest = /^[\\'\\\"](.*?)[\\'\\\"]$/.exec(val);\r\n if (!strTest || strTest.length !== 2) { // do not parse if explicitly a string\r\n objVal = JSON5.parse(val); // attempt to parse\r\n } else {\r\n objVal = strTest[1];\r\n }\r\n } catch(ex) {\r\n // use as existing string\r\n }\r\n\r\n instance.setProp(key, objVal);\r\n rl.write(': stored as type ' + typeof objVal);\r\n\r\n enterCommand();\r\n}\r", "label": 1, "label_name": "safe"}
-{"code": "\tpublic function actionGetItems(){\n\t\t$sql = 'SELECT id, name as value FROM x2_docs WHERE name LIKE :qterm ORDER BY name ASC';\n\t\t$command = Yii::app()->db->createCommand($sql);\n\t\t$qterm = '%'.$_GET['term'].'%';\n\t\t$command->bindParam(\":qterm\", $qterm, PDO::PARAM_STR);\n\t\t$result = $command->queryAll();\n\t\techo CJSON::encode($result); exit;\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": " size_t pos() { return ptr - start; }", "label": 1, "label_name": "safe"}
-{"code": " public function __construct(\n $status = 200,\n array $headers = [],\n $body = null,\n $version = '1.1',\n $reason = null\n ) {\n $this->statusCode = (int) $status;\n\n if ($body !== null) {\n $this->stream = stream_for($body);\n }\n\n $this->setHeaders($headers);\n if (!$reason && isset(self::$phrases[$this->statusCode])) {\n $this->reasonPhrase = self::$phrases[$status];\n } else {\n $this->reasonPhrase = (string) $reason;\n }\n\n $this->protocol = $version;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public function validate($string, $config, $context)\n {\n $string = trim($string);\n\n // early abort: '' and '0' (strings that convert to false) are invalid\n if (!$string) {\n return false;\n }\n\n $pattern = '/^(-?[A-Za-z_][A-Za-z_\\-0-9]*)$/';\n if (!preg_match($pattern, $string)) {\n return false;\n }\n return $string;\n }", "label": 1, "label_name": "safe"}
-{"code": " def test_check_unsafe_path(self):\n self.assertRaises(exception.Invalid,\n disk_api._join_and_check_path_within_fs,\n '/foo', 'etc/../../../something.conf')", "label": 1, "label_name": "safe"}
-{"code": " public function remove()\n {\n $this->checkCSRFParam();\n $project = $this->getProject();\n $category = $this->getCategory();\n\n if ($this->categoryModel->remove($category['id'])) {\n $this->flash->success(t('Category removed successfully.'));\n } else {\n $this->flash->failure(t('Unable to remove this category.'));\n }\n\n $this->response->redirect($this->helper->url->to('CategoryController', 'index', array('project_id' => $project['id'])));\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "def _create_dirs(path):\n \"\"\" create provided path, ignore errors \"\"\"\n try:\n os.makedirs(path, mode=0o700)\n except OSError:\n pass", "label": 1, "label_name": "safe"}
-{"code": " func testThatLegalHoldStatusIsEnabled_AfterAcceptingRequest() {\n // GIVEN\n let selfUser = ZMUser.selfUser(in: uiMOC)\n createSelfClient(onMOC: uiMOC)\n\n let conversation = createConversation(in: uiMOC)\n conversation.addParticipantAndUpdateConversationState(user: selfUser, role: nil)\n\n // WHEN\n let request = LegalHoldRequest.mockRequest(for: selfUser)\n selfUser.userDidReceiveLegalHoldRequest(request)\n\n performPretendingUiMocIsSyncMoc {\n _ = selfUser.addLegalHoldClient(from: request)\n selfUser.userDidAcceptLegalHoldRequest(request)\n }\n\n // THEN\n XCTAssertEqual(selfUser.legalHoldStatus, .enabled)\n XCTAssertTrue(selfUser.needsToAcknowledgeLegalHoldStatus)\n\n let lastMessage = conversation.lastMessage as? ZMSystemMessage\n XCTAssertEqual(lastMessage?.systemMessageType, .legalHoldEnabled)\n XCTAssertTrue(conversation.isUnderLegalHold)\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "TfLiteStatus PrepareMeanOrSum(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_OK(context, PrepareSimple(context, node));\n OpData* data = reinterpret_cast(node->user_data);\n\n // reduce_mean requires a buffer to store intermediate sum result.\n OpContext op_context(context, node);\n if (op_context.input->type == kTfLiteInt8 ||\n op_context.input->type == kTfLiteUInt8 ||\n op_context.input->type == kTfLiteInt16) {\n const double real_multiplier =\n static_cast(op_context.input->params.scale) /\n static_cast(op_context.output->params.scale);\n int exponent;\n QuantizeMultiplier(real_multiplier, &data->multiplier, &exponent);\n data->shift = exponent;\n }\n TfLiteTensor* temp_sum = GetTemporary(context, node, /*index=*/2);\n if (!IsConstantTensor(op_context.axis)) {\n SetTensorToDynamic(temp_sum);\n return kTfLiteOk;\n }\n temp_sum->allocation_type = kTfLiteArenaRw;\n return ResizeTempSum(context, &op_context, temp_sum);\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "\t\timage: function(elem){\n\t\t\treturn \"image\" === elem.type;\n\t\t},", "label": 0, "label_name": "vulnerable"}
-{"code": "exports.trim = function(str) {\n return str.replace(/^\\s+|\\s+$/g, '');\n};", "label": 1, "label_name": "safe"}
-{"code": " $this->assertFalse ($contact->hasTag ($tag, null, true));\n }", "label": 1, "label_name": "safe"}
-{"code": " value: (add_as_favorite? 1 : 0)\r\n },\r\n function(data)\r\n {\r\n $(el).find(\"img\").removeClass(\"silk-heart_add\");\r\n $(el).find(\"img\").removeClass(\"silk-heart_delete\");\r\n\r\n if(data==\"true\")\r\n {\r\n if(add_as_favorite)\r\n {\r\n $(el).parent().attr(\"favorite\", 1);\r\n $(el).find(\"img\").addClass(\"silk-heart_delete\");\r\n }\r\n else\r\n {\r\n $(el).parent().attr(\"favorite\", 0);\r\n $(el).find(\"img\").addClass(\"silk-heart_add\");\r\n }\r\n }\r\n else\r\n {\r\n // show error\r\n navigate_notification(navigate_lang_dictionary[56]);\r\n }\r\n\r\n navigate_extensions_refresh();\r\n });\r\n });\r", "label": 1, "label_name": "safe"}
-{"code": " it \"should return a false for a non-empty string\" do\n result = scope.function_empty(['asdf'])\n expect(result).to(eq(false))\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " def maySeePostUseCache(pageId: PageId, postNr: PostNr, user: Option[Participant])\n : (MaySeeOrWhyNot, String) = {\n maySeePostImpl(pageId, postNr, user, anyPost = None, anyTx = None)\n }\n\n\n def maySeePostUseCache(post: Post, pageMeta: PageMeta, ppt: Option[Participant],", "label": 0, "label_name": "vulnerable"}
-{"code": " public static function autoload($class)\n {\n $file = HTMLPurifier_Bootstrap::getPath($class);\n if (!$file) {\n return false;\n }\n // Technically speaking, it should be ok and more efficient to\n // just do 'require', but Antonio Parraga reports that with\n // Zend extensions such as Zend debugger and APC, this invariant\n // may be broken. Since we have efficient alternatives, pay\n // the cost here and avoid the bug.\n require_once HTMLPURIFIER_PREFIX . '/' . $file;\n return true;\n }", "label": 1, "label_name": "safe"}
-{"code": "Mocha.prototype.ignoreLeaks = function(ignore) {\n this.options.ignoreLeaks = !!ignore;\n return this;\n};", "label": 1, "label_name": "safe"}
-{"code": " function _log($local_path, $remote_path, $error) {\n $data = sprintf(\"[%s] [%s => %s] %s\\n\", date('r'), $local_path, $remote_path, $error);\n $data = strtr($data, '<>', '..');\n\n $filename = w3_debug_log('cdn');\n\n return @file_put_contents($filename, $data, FILE_APPEND);\n }", "label": 1, "label_name": "safe"}
-{"code": "\"startWidth\",this.defaultArrowWidth)};Ca.prototype.getEndArrowWidth=function(){return this.getEdgeWidth()+mxUtils.getNumber(this.style,\"endWidth\",this.defaultArrowWidth)};Ca.prototype.getEdgeWidth=function(){return mxUtils.getNumber(this.style,\"width\",this.defaultWidth)+Math.max(0,this.strokewidth-1)};mxCellRenderer.registerShape(\"flexArrow\",Ca);mxUtils.extend(Qa,mxActor);Qa.prototype.size=30;Qa.prototype.isRoundable=function(){return!0};Qa.prototype.redrawPath=function(c,l,x,p,v){l=Math.min(v,parseFloat(mxUtils.getValue(this.style,", "label": 1, "label_name": "safe"}
-{"code": " public function test_make()\n {\n $factory = new HTMLPurifier_AttrDef_Enum();\n\n $def = $factory->make('foo,bar');\n $def2 = new HTMLPurifier_AttrDef_Enum(array('foo', 'bar'));\n $this->assertIdentical($def, $def2);\n\n $def = $factory->make('s:foo,BAR');\n $def2 = new HTMLPurifier_AttrDef_Enum(array('foo', 'BAR'), true);\n $this->assertIdentical($def, $def2);\n }", "label": 1, "label_name": "safe"}
-{"code": "ta.style.width=\"40px\";ta.style.height=\"12px\";ta.style.marginBottom=\"-2px\";ta.style.backgroundImage=\"url(\"+mxWindow.prototype.normalizeImage+\")\";ta.style.backgroundPosition=\"top center\";ta.style.backgroundRepeat=\"no-repeat\";ta.setAttribute(\"title\",\"Minimize\");var Na=!1,Ca=mxUtils.bind(this,function(){S.innerHTML=\"\";if(!Na){var za=function(Da,La,Za){Da=X(\"\",Da.funct,null,La,Da,Za);Da.style.width=\"40px\";Da.style.opacity=\"0.7\";return wa(Da,null,\"pointer\")},wa=function(Da,La,Za){null!=La&&Da.setAttribute(\"title\",\nLa);Da.style.cursor=null!=Za?Za:\"default\";Da.style.margin=\"2px 0px\";S.appendChild(Da);mxUtils.br(S);return Da};wa(U.sidebar.createVertexTemplate(\"text;strokeColor=none;fillColor=none;html=1;align=center;verticalAlign=middle;whiteSpace=wrap;rounded=0;\",60,30,\"Text\",mxResources.get(\"text\"),!0,!1,null,!0,!0),mxResources.get(\"text\")+\" (\"+Editor.ctrlKey+\"+Shift+X)\");wa(U.sidebar.createVertexTemplate(\"shape=note;whiteSpace=wrap;html=1;backgroundOutline=1;fontColor=#000000;darkOpacity=0.05;fillColor=#FFF9B2;strokeColor=none;fillStyle=solid;direction=west;gradientDirection=north;gradientColor=#FFF2A1;shadow=1;size=20;pointerEvents=1;\",", "label": 1, "label_name": "safe"}
-{"code": " public static function generatePass()\n {\n $vars = microtime().Site::$name.rand();\n $hash = sha1($vars.SECURITY_KEY);\n $pass = substr($hash, 5, 8);\n\n return $pass;\n }", "label": 1, "label_name": "safe"}
-{"code": " public function rules()\n {\n $companyCurrency = CompanySetting::getSetting('currency', $this->header('company'));\n\n $rules = [\n 'expense_date' => [\n 'required',\n ],\n 'expense_category_id' => [\n 'required',\n ],\n 'exchange_rate' => [\n 'nullable'\n ],\n 'payment_method_id' => [\n 'nullable',\n ],\n 'amount' => [\n 'required',\n ],\n 'customer_id' => [\n 'nullable',\n ],\n 'notes' => [\n 'nullable',\n ],\n 'currency_id' => [\n 'required'\n ],\n 'attachment_receipt' => [\n 'nullable',\n 'file',\n 'mimes:jpg,png,pdf,doc,docx,xls,xlsx,ppt,pptx',\n 'max:20000'\n ]\n ];\n\n if ($companyCurrency && $this->currency_id) {\n if ($companyCurrency !== $this->currency_id) {\n $rules['exchange_rate'] = [\n 'required',\n ];\n };\n }\n\n return $rules;\n }", "label": 1, "label_name": "safe"}
-{"code": "this.resolvedFontCss&&this.addFontCss(za,this.resolvedFontCss),Ga.src=Editor.createSvgDataUri(mxUtils.getXml(za))}catch(Fa){null!=N&&N(Fa)}});this.embedExtFonts(mxUtils.bind(this,function(Fa){try{null!=Fa&&this.addFontCss(za,Fa),this.loadFonts(Na)}catch(Ea){null!=N&&N(Ea)}}))}catch(Fa){null!=N&&N(Fa)}}),J,Z)}catch(za){null!=N&&N(za)}};Editor.crcTable=[];for(var m=0;256>m;m++)for(var n=m,v=0;8>v;v++)n=1==(n&1)?3988292384^n>>>1:n>>>1,Editor.crcTable[m]=n;Editor.updateCRC=function(u,E,J,T){for(var N=\n0;N>>8;return u};Editor.crc32=function(u){for(var E=-1,J=0;J>>8^Editor.crcTable[(E^u.charCodeAt(J))&255];return(E^-1)>>>0};Editor.writeGraphModelToPng=function(u,E,J,T,N){function Q(Z,fa){var aa=ba;ba+=fa;return Z.substring(aa,ba)}function R(Z){Z=Q(Z,4);return Z.charCodeAt(3)+(Z.charCodeAt(2)<<8)+(Z.charCodeAt(1)<<16)+(Z.charCodeAt(0)<<24)}function Y(Z){return String.fromCharCode(Z>>24&255,Z>>16&255,Z>>8&255,Z&255)}u=u.substring(u.indexOf(\",\")+", "label": 0, "label_name": "vulnerable"}
-{"code": " public static Document toXml(final List list) {\n final Element root = new Element(\"payload-list\");\n for (final IBaseDataObject d : list) {\n final Document doc = toXml(d);\n root.addContent(doc.detachRootElement());\n logger.debug(\"Adding xml content for \" + d.shortName() + \" to document\");\n }\n final Document doc = new Document(root);\n return doc;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "cJSON *cJSON_CreateDoubleArray(const double *numbers,int count)\t{int i;cJSON *n=0,*p=0,*a=cJSON_CreateArray();for(i=0;a && ichild=n;else suffix_object(p,n);p=n;}return a;}", "label": 1, "label_name": "safe"}
-{"code": " public function registerSource($name, $class) {\n $this->registerType(\n 'sources',\n __NAMESPACE__ . '\\\\Source',\n $name,\n $class\n );\n return $this;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " value: value.slice(start + 2, idx),\n start: start,\n end: idx + 1,\n replaceInValue: function (value, context) {\n return interpreter.replace(value, context, parseContext);\n },\n };\n\n return parseContext;\n }\n }\n\n return null;\n },", "label": 1, "label_name": "safe"}
-{"code": " static function isSearchable() {\n return true;\n }", "label": 1, "label_name": "safe"}
-{"code": "function merge(target, obj) {\n for (var key in obj) {\n if (key === '__proto__' || !hasOwn(obj, key)) {\n continue;\n }\n\n var oldVal = obj[key];\n var newVal = target[key];\n\n if (isObject(newVal) && isObject(oldVal)) {\n target[key] = merge(newVal, oldVal);\n } else if (Array.isArray(newVal)) {\n target[key] = union([], newVal, oldVal);\n } else {\n target[key] = clone(oldVal);\n }\n }\n return target;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " it 'should configure a nginx vhost' do\n\n pp = \"\n class { 'nginx': }\n nginx::resource::vhost { 'www.puppetlabs.com':\n ensure => present,\n www_root => '/var/www/www.puppetlabs.com',\n }\n host { 'www.puppetlabs.com': ip => '127.0.0.1', }\n file { ['/var/www','/var/www/www.puppetlabs.com']: ensure => directory }\n file { '/var/www/www.puppetlabs.com/index.html': ensure => file, content => 'Hello from www\\n', }\n \"\n\n puppet_apply(pp) do |r|\n [0,2].should include r.exit_code\n r.refresh\n r.stderr.should be_empty\n r.exit_code.should be_zero\n end\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "\tpublic void prefixesNonAliasedFunctionCallRelatedSortPropertyWhenSelectClauseContainesAliasedFunctionForDifferentProperty() {\n\n\t\tString query = \"SELECT m.name, AVG(m.price) AS avgPrice FROM Magazine m\";\n\t\tSort sort = new Sort(\"name\", \"avgPrice\");\n\n\t\tassertThat(applySorting(query, sort, \"m\"), endsWith(\"order by m.name asc, avgPrice asc\"));\n\t}", "label": 1, "label_name": "safe"}
-{"code": "\tunsafeNonComputedMember: function (left, right) {\n\t\treturn this.nonComputedMember(left, right);\n\t},", "label": 1, "label_name": "safe"}
-{"code": "export async function getApi(newToken?: string) {\n const token = newToken || (await getToken());\n return new GitHub({ token });\n}", "label": 1, "label_name": "safe"}
-{"code": "ast2obj_slice(void* _o)\n{\n slice_ty o = (slice_ty)_o;\n PyObject *result = NULL, *value = NULL;\n if (!o) {\n Py_INCREF(Py_None);\n return Py_None;\n }\n\n switch (o->kind) {\n case Slice_kind:\n result = PyType_GenericNew(Slice_type, NULL, NULL);\n if (!result) goto failed;\n value = ast2obj_expr(o->v.Slice.lower);\n if (!value) goto failed;\n if (_PyObject_SetAttrId(result, &PyId_lower, value) == -1)\n goto failed;\n Py_DECREF(value);\n value = ast2obj_expr(o->v.Slice.upper);\n if (!value) goto failed;\n if (_PyObject_SetAttrId(result, &PyId_upper, value) == -1)\n goto failed;\n Py_DECREF(value);\n value = ast2obj_expr(o->v.Slice.step);\n if (!value) goto failed;\n if (_PyObject_SetAttrId(result, &PyId_step, value) == -1)\n goto failed;\n Py_DECREF(value);\n break;\n case ExtSlice_kind:\n result = PyType_GenericNew(ExtSlice_type, NULL, NULL);\n if (!result) goto failed;\n value = ast2obj_list(o->v.ExtSlice.dims, ast2obj_slice);\n if (!value) goto failed;\n if (_PyObject_SetAttrId(result, &PyId_dims, value) == -1)\n goto failed;\n Py_DECREF(value);\n break;\n case Index_kind:\n result = PyType_GenericNew(Index_type, NULL, NULL);\n if (!result) goto failed;\n value = ast2obj_expr(o->v.Index.value);\n if (!value) goto failed;\n if (_PyObject_SetAttrId(result, &PyId_value, value) == -1)\n goto failed;\n Py_DECREF(value);\n break;\n }\n return result;\nfailed:\n Py_XDECREF(value);\n Py_XDECREF(result);\n return NULL;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "\tpublic function save()\r\n\t{\r\n\t\tif(!empty($this->id))\r\n {\r\n return $this->update();\r\n }\r\n\t\telse\r\n {\r\n return $this->insert();\r\n }\r\n\t}\r", "label": 1, "label_name": "safe"}
-{"code": " private static void testInvalidHeaders0(ByteBuf requestBuffer) {\n EmbeddedChannel channel = new EmbeddedChannel(new HttpRequestDecoder());\n assertTrue(channel.writeInbound(requestBuffer));\n HttpRequest request = channel.readInbound();\n assertThat(request.decoderResult().cause(), instanceOf(IllegalArgumentException.class));\n assertTrue(request.decoderResult().isFailure());\n assertFalse(channel.finish());\n }", "label": 1, "label_name": "safe"}
-{"code": " def uninstall\n execute(gembinary + [\"uninstall\", \"-x\", \"-a\", resource[:name]])\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "static int walk_hugetlb_range(unsigned long addr, unsigned long end,\n\t\t\t struct mm_walk *walk)\n{\n\tstruct vm_area_struct *vma = walk->vma;\n\tstruct hstate *h = hstate_vma(vma);\n\tunsigned long next;\n\tunsigned long hmask = huge_page_mask(h);\n\tunsigned long sz = huge_page_size(h);\n\tpte_t *pte;\n\tint err = 0;\n\n\tdo {\n\t\tnext = hugetlb_entry_end(h, addr, end);\n\t\tpte = huge_pte_offset(walk->mm, addr & hmask, sz);\n\t\tif (pte && walk->hugetlb_entry)\n\t\t\terr = walk->hugetlb_entry(pte, hmask, addr, next, walk);\n\t\tif (err)\n\t\t\tbreak;\n\t} while (addr = next, addr != end);\n\n\treturn err;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " def __init__(self, sourceName: str, *, chroot: bool, chrootPath: Optional[str] = None):\n self.sourceName = sourceName\n self.chrootPath = chrootPath\n self.type = \"file\"\n self.content = None\n\n if chroot and self.chrootPath is None:\n self.chrootPath = self.directory()\n if self.chrootPath is not None:\n self.sourceName = config.chrootPath(self.chrootPath, self.sourceName)", "label": 1, "label_name": "safe"}
-{"code": "\tfunction manage() {\n\t global $db;\n\t \n\t expHistory::set('manageable', $this->params);\n//\t $classes = array();\n $dir = BASE.\"framework/modules/ecommerce/billingcalculators\";\n if (is_readable($dir)) {\n $dh = opendir($dir);\n while (($file = readdir($dh)) !== false) {\n if (is_file(\"$dir/$file\") && substr(\"$dir/$file\", -4) == \".php\") {\n include_once(\"$dir/$file\");\n $classname = substr($file, 0, -4);\n $id = $db->selectValue('billingcalculator', 'id', 'calculator_name=\"'.$classname.'\"');\n if (empty($id)) {\n// $calobj = null;\n $calcobj = new $classname();\n if ($calcobj->isSelectable() == true) {\n $obj = new billingcalculator(array(\n 'title'=>$calcobj->name(),\n// 'user_title'=>$calcobj->title,\n 'body'=>$calcobj->description(), \n 'calculator_name'=>$classname,\n 'enabled'=>false));\n $obj->save();\n }\n }\n }\n }\n }\n \n $bcalc = new billingcalculator();\n $calculators = $bcalc->find('all');\n assign_to_template(array(\n 'calculators'=>$calculators\n ));\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "\tfunction manage () {\n\t expHistory::set('viewable', $this->params);\n\t\t\n\t\t$vendor = new vendor();\n\t\t$vendors = $vendor->find('all');\n\t\tif(!empty($this->params['vendor'])) {\n\t\t\t$purchase_orders = $this->purchase_order->find('all', 'vendor_id=' . $this->params['vendor']);\n\t\t} else {\n\t\t\t$purchase_orders = $this->purchase_order->find('all');\n\t\t}\n\t\t\n\t\tassign_to_template(array(\n 'purchase_orders'=>$purchase_orders,\n 'vendors' => $vendors,\n 'vendor_id' => @$this->params['vendor']\n ));\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": " public function unserialize($data)\n {\n parent::unserialize($data);\n $this->dataCount = count($this->data);\n self::__construct($this->stopwatch);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " def html_escape_translation_options!(options)\n options.each do |name, value|\n unless i18n_option?(name) || (name == :count && value.is_a?(Numeric))\n options[name] = ERB::Util.html_escape(value.to_s)\n end\n end\n end", "label": 1, "label_name": "safe"}
-{"code": " public function validate($input)\n {\n $valid = filter_var($input, FILTER_VALIDATE_URL);\n return !!$valid;\n }", "label": 1, "label_name": "safe"}
-{"code": "def read_uint8(f):\n tmp = f.read(1)\n if tmp == \"\": return -1;\n out = int(tmp.encode('hex'),16)\n return out", "label": 1, "label_name": "safe"}
-{"code": " private function insertElement($token, $append = true, $check = false)\n {\n // Proprietary workaround for libxml2's limitations with tag names\n if ($check) {\n // Slightly modified HTML5 tag-name modification,\n // removing anything that's not an ASCII letter, digit, or hyphen\n $token['name'] = preg_replace('/[^a-z0-9-]/i', '', $token['name']);\n // Remove leading hyphens and numbers\n $token['name'] = ltrim($token['name'], '-0..9');\n // In theory, this should ever be needed, but just in case\n if ($token['name'] === '') {\n $token['name'] = 'span';\n } // arbitrary generic choice\n }\n\n $el = $this->dom->createElement($token['name']);\n\n foreach ($token['attr'] as $attr) {\n if (!$el->hasAttribute($attr['name'])) {\n $el->setAttribute($attr['name'], $attr['value']);\n }\n }\n\n $this->appendToRealParent($el);\n $this->stack[] = $el;\n\n return $el;\n }", "label": 1, "label_name": "safe"}
-{"code": " $definition->addMethodCall('addAllowedUrls', [$additionalUrlsKey, $additionalUrlsArr]);\n }\n }\n }", "label": 1, "label_name": "safe"}
-{"code": "ma);H.moveCells(ma,N,W)},!0,u);u=null}else if(\"organic\"==P||\"auto\"==P&&ma.length>y.length){H.view.validate();var wa=new mxFastOrganicLayout(H);wa.forceConstant=3*fa;wa.disableEdgeStyle=!1;wa.resetEdges=!1;var Ea=wa.isVertexIgnored;wa.isVertexIgnored=function(Da){return Ea.apply(this,arguments)||0>mxUtils.indexOf(y,Da)};this.executeLayout(function(){wa.execute(H.getDefaultParent());Fa()},!0,u);u=null}}this.hideDialog()}finally{H.model.endUpdate()}null!=u&&u()}}catch(Da){this.handleError(Da)}};EditorUi.prototype.getSearch=", "label": 0, "label_name": "vulnerable"}
-{"code": "int mg_http_upload(struct mg_connection *c, struct mg_http_message *hm,\n const char *dir) {\n char offset[40] = \"\", name[200] = \"\", path[256];\n mg_http_get_var(&hm->query, \"offset\", offset, sizeof(offset));\n mg_http_get_var(&hm->query, \"name\", name, sizeof(name));\n if (name[0] == '\\0') {\n mg_http_reply(c, 400, \"\", \"%s\", \"name required\");\n return -1;\n } else {\n FILE *fp;\n size_t oft = strtoul(offset, NULL, 0);\n snprintf(path, sizeof(path), \"%s%c%s\", dir, MG_DIRSEP, name);\n LOG(LL_DEBUG,\n (\"%p %d bytes @ %d [%s]\", c->fd, (int) hm->body.len, (int) oft, name));\n if ((fp = fopen(path, oft == 0 ? \"wb\" : \"ab\")) == NULL) {\n mg_http_reply(c, 400, \"\", \"fopen(%s): %d\", name, errno);\n return -2;\n } else {\n fwrite(hm->body.ptr, 1, hm->body.len, fp);\n fclose(fp);\n mg_http_reply(c, 200, \"\", \"\");\n return (int) hm->body.len;\n }\n }\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " This function encrypts the plaintext */\nPHP_FUNCTION(mcrypt_generic)\n{\n\tzval *mcryptind;\n\tchar *data;\n\tint data_len;\n\tphp_mcrypt *pm;\n\tunsigned char* data_s;\n\tint block_size, data_size;\n\n\tif (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, \"rs\", &mcryptind, &data, &data_len) == FAILURE) {\n\t\treturn;\n\t}\n\t\n\tZEND_FETCH_RESOURCE(pm, php_mcrypt *, &mcryptind, -1, \"MCrypt\", le_mcrypt);\n\tPHP_MCRYPT_INIT_CHECK\n\n\tif (data_len == 0) {\n\t\tphp_error_docref(NULL TSRMLS_CC, E_WARNING, \"An empty string was passed\");\n\t\tRETURN_FALSE\n\t}\n\n\t/* Check blocksize */\n\tif (mcrypt_enc_is_block_mode(pm->td) == 1) { /* It's a block algorithm */\n\t\tblock_size = mcrypt_enc_get_block_size(pm->td);\n\t\tdata_size = (((data_len - 1) / block_size) + 1) * block_size;\n\t\tdata_s = emalloc(data_size + 1);\n\t\tmemset(data_s, 0, data_size);\n\t\tmemcpy(data_s, data, data_len);\n\t} else { /* It's not a block algorithm */\n\t\tdata_size = data_len;\n\t\tdata_s = emalloc(data_size + 1);\n\t\tmemset(data_s, 0, data_size);\n\t\tmemcpy(data_s, data, data_len);\n\t}\n\t\n\tmcrypt_generic(pm->td, data_s, data_size);\n\tdata_s[data_size] = '\\0';\n\n\tRETVAL_STRINGL(data_s, data_size, 1);\n\tefree(data_s);", "label": 0, "label_name": "vulnerable"}
-{"code": " public function getName()\n {\n return 'Stripe';\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " 'ternary?:': function(test, alternate, consequent, context) {\n return function(scope, locals, assign, inputs) {\n var arg = test(scope, locals, assign, inputs) ? alternate(scope, locals, assign, inputs) : consequent(scope, locals, assign, inputs);\n return context ? {value: arg} : arg;\n };\n },", "label": 0, "label_name": "vulnerable"}
-{"code": " private function getTaskLink()\n {\n $link = $this->taskLinkModel->getById($this->request->getIntegerParam('link_id'));\n\n if (empty($link)) {\n throw new PageNotFoundException();\n }\n\n return $link;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public void correctExample() throws Exception {\n assertThat(ConstraintViolations.format(validator.validate(new CorrectExample())))\n .isEmpty();\n assertThat(TestLoggerFactory.getAllLoggingEvents())\n .isEmpty();\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "function(J){k=J};this.setAutoScroll=function(J){m=J};this.setOpenFill=function(J){q=J};this.setStopClickEnabled=function(J){A=J};this.setSelectInserted=function(J){z=J};this.setSmoothing=function(J){l=J};this.setPerfectFreehandMode=function(J){M=J};this.setBrushSize=function(J){L.size=J};this.getBrushSize=function(){return L.size};var n=function(J){y=J;b.getRubberband().setEnabled(!J);b.graphHandler.setSelectEnabled(!J);b.graphHandler.setMoveEnabled(!J);b.container.style.cursor=J?\"crosshair\":\"\";b.fireEvent(new mxEventObject(\"freehandStateChanged\"))};", "label": 1, "label_name": "safe"}
-{"code": " public void testRenameTo() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = PlatformDependent.createTempFile(UUID.randomUUID().toString(), \".tmp\", null);\n tmpFile.deleteOnExit();\n final int totalByteCount = 4096;\n byte[] bytes = new byte[totalByteCount];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n ByteBuf content = Unpooled.wrappedBuffer(bytes);\n test.setContent(content);\n boolean succ = test.renameTo(tmpFile);\n assertTrue(succ);\n FileInputStream fis = new FileInputStream(tmpFile);\n try {\n byte[] buf = new byte[totalByteCount];\n int count = 0;\n int offset = 0;\n int size = totalByteCount;\n while ((count = fis.read(buf, offset, size)) > 0) {\n offset += count;\n size -= count;\n if (offset >= totalByteCount || size <= 0) {\n break;\n }\n }\n assertArrayEquals(bytes, buf);\n assertEquals(0, fis.available());\n } finally {\n fis.close();\n }\n } finally {\n //release the ByteBuf in AbstractMemoryHttpData\n test.delete();\n }\n }", "label": 1, "label_name": "safe"}
-{"code": " public function testAliasCircularReference()\n {\n $container = new ContainerBuilder();\n $container->setAlias('bar', 'foo');\n $container->setAlias('foo', 'bar');\n $this->process($container);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public function getBalanceTransactionReference()\n {\n return $this->getParameter('balanceTransactionReference');\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "\t\t assignMethods = function assignMethods(methodName) {\n\t\t\tsc[methodName] = function () {\n\t\t\t\tif (scPlayer !== null) {\n\t\t\t\t\tswitch (methodName) {\n\t\t\t\t\t\tcase 'play':\n\t\t\t\t\t\t\treturn scPlayer.play();\n\t\t\t\t\t\tcase 'pause':\n\t\t\t\t\t\t\treturn scPlayer.pause();\n\t\t\t\t\t\tcase 'load':\n\t\t\t\t\t\t\treturn null;\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tapiStack.push({ type: 'call', methodName: methodName });\n\t\t\t\t}\n\t\t\t};\n\t\t};", "label": 0, "label_name": "vulnerable"}
-{"code": "\tpublic String render(String templateContent, Map context) {\n\t\tVelocityContext velocityContext = new VelocityContext(context);\n\t\ttry (StringWriter sw = new StringWriter()) {\n\t\t\tVelocity.evaluate(velocityContext, sw, \"velocityTemplateEngine\", templateContent);\n\t\t\treturn sw.toString();\n\t\t}\n\t\tcatch (Exception ex) {\n\t\t\tthrow new TemplateRenderException(ex);\n\t\t}\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "static inline void handle_socket_receive_unknown(\n\tfastd_socket_t *sock, const fastd_peer_address_t *local_addr, const fastd_peer_address_t *remote_addr,\n\tfastd_buffer_t *buffer) {\n\tconst uint8_t *packet_type = buffer->data;\n\n\tswitch (*packet_type) {\n\tcase PACKET_DATA:\n\t\tfastd_buffer_free(buffer);\n\n\t\tif (!backoff_unknown(remote_addr)) {\n\t\t\tpr_debug(\"unexpectedly received payload data from unknown address %I\", remote_addr);\n\t\t\tconf.protocol->handshake_init(sock, local_addr, remote_addr, NULL);\n\t\t}\n\t\tbreak;\n\n\tcase PACKET_HANDSHAKE:\n\t\tfastd_handshake_handle(sock, local_addr, remote_addr, NULL, buffer);\n\t\tbreak;\n\n\tdefault:\n\t\tfastd_buffer_free(buffer);\n\t\tpr_debug(\"received packet with invalid type from unknown address %I\", remote_addr);\n\t}\n}", "label": 1, "label_name": "safe"}
-{"code": "\tpublic function execute()\n\t{\n\t\tparent::execute();\n\n\t\t// get parameters\n\t\t$searchTerm = SpoonFilter::getPostValue('term', null, '');\n\t\t$term = (SPOON_CHARSET == 'utf-8') ? SpoonFilter::htmlspecialchars($searchTerm) : SpoonFilter::htmlentities($searchTerm);\n\n\t\t// validate\n\t\tif($term == '') $this->output(self::BAD_REQUEST, null, 'term-parameter is missing.');\n\n\t\t// previous search result\n\t\t$previousTerm = SpoonSession::exists('searchTerm') ? SpoonSession::get('searchTerm') : '';\n\t\tSpoonSession::set('searchTerm', '');\n\n\t\t// save this term?\n\t\tif($previousTerm != $term)\n\t\t{\n\t\t\t// format data\n\t\t\t$this->statistics = array();\n\t\t\t$this->statistics['term'] = $term;\n\t\t\t$this->statistics['language'] = FRONTEND_LANGUAGE;\n\t\t\t$this->statistics['time'] = FrontendModel::getUTCDate();\n\t\t\t$this->statistics['data'] = serialize(array('server' => $_SERVER));\n\t\t\t$this->statistics['num_results'] = FrontendSearchModel::getTotal($term);\n\n\t\t\t// save data\n\t\t\tFrontendSearchModel::save($this->statistics);\n\t\t}\n\n\t\t// save current search term in cookie\n\t\tSpoonSession::set('searchTerm', $term);\n\n\t\t// output\n\t\t$this->output(self::OK);\n\t}", "label": 1, "label_name": "safe"}
-{"code": "\t\towner : function(file1, file2) { \n\t\t\tvar v1 = file1.owner || '',\n\t\t\t\tv2 = file2.owner || '';\n\t\t\treturn elFinder.prototype.naturalCompare(v1, v2);\n\t\t},", "label": 1, "label_name": "safe"}
-{"code": " public function save()\n {\n $project = $this->getProject();\n\n $values = $this->request->getValues();\n $values['project_id'] = $project['id'];\n $values['user_id'] = $this->userSession->getId();\n\n list($valid, $errors) = $this->customFilterValidator->validateCreation($values);\n\n if ($valid) {\n if ($this->customFilterModel->create($values) !== false) {\n $this->flash->success(t('Your custom filter have been created successfully.'));\n $this->response->redirect($this->helper->url->to('CustomFilterController', 'index', array('project_id' => $project['id'])), true);\n return;\n } else {\n $this->flash->failure(t('Unable to create your custom filter.'));\n }\n }\n\n $this->create($values, $errors);\n }", "label": 1, "label_name": "safe"}
-{"code": " private AuthnRequestParseResult parseRequest(byte[] xmlBytes) throws SAMLException {\n String xml = new String(xmlBytes, StandardCharsets.UTF_8);\n if (logger.isDebugEnabled()) {\n logger.debug(\"SAMLRequest XML is\\n{}\", xml);\n }\n\n AuthnRequestParseResult result = new AuthnRequestParseResult();\n result.document = newDocumentFromBytes(xmlBytes);\n result.authnRequest = unmarshallFromDocument(result.document, AuthnRequestType.class);\n result.request = new AuthenticationRequest();\n result.request.xml = xml;\n result.request.id = result.authnRequest.getID();\n result.request.issuer = result.authnRequest.getIssuer().getValue();\n result.request.issueInstant = result.authnRequest.getIssueInstant().toGregorianCalendar().toZonedDateTime();\n NameIDPolicyType nameIdPolicyType = result.authnRequest.getNameIDPolicy();\n if (nameIdPolicyType == null) {\n result.request.nameIdFormat = NameIDFormat.EmailAddress;\n } else {\n result.request.nameIdFormat = NameIDFormat.fromSAMLFormat(nameIdPolicyType.getFormat());\n }\n result.request.version = result.authnRequest.getVersion();\n return result;\n }", "label": 1, "label_name": "safe"}
-{"code": "\tpublic function approvedFileExtension($filename, $type = 'image')\n\t{\n\t\t$ext = strtolower(pathinfo($filename, PATHINFO_EXTENSION));\n\t\tif ($type == 'image') {\n\t\t\tswitch ($ext) {\n\t\t\t\tcase 'gif':\n\t\t\t\tcase 'png':\n\t\t\t\tcase 'jpeg':\n\t\t\t\tcase 'jpg':\n\t\t\t\tcase 'svg':\n\t\t\t\t\treturn true;\n\t\t\t\tdefault:\n\t\t\t\t\treturn false;\n\t\t\t}\n\t\t} elseif ($type == 'cert') {\n\t\t\tswitch ($ext) {\n\t\t\t\tcase 'pem':\n\t\t\t\t\treturn true;\n\t\t\t\tdefault:\n\t\t\t\t\treturn false;\n\t\t\t}\n\t\t}\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "Graph.sanitizeHtml=function(a,c){return DOMPurify.sanitize(a,{ADD_ATTR:[\"target\"],FORBID_TAGS:[\"form\"],ALLOWED_URI_REGEXP:/^(?:(?:(?:f|ht)tps?|mailto|tel|callto|cid|xmpp|data):|[^a-z]|[a-z+.\\-]+(?:[^a-z+.\\-:]|$))/i})};Graph.sanitizeSvg=function(a){return DOMPurify.sanitize(a,{IN_PLACE:!0})};", "label": 0, "label_name": "vulnerable"}
-{"code": "func (d *partialArray) add(key string, val *lazyNode) error {\n\tif key == \"-\" {\n\t\t*d = append(*d, val)\n\t\treturn nil\n\t}\n\n\tidx, err := strconv.Atoi(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tary := make([]*lazyNode, len(*d)+1)\n\n\tcur := *d\n\n\tif idx < 0 {\n\t\tidx *= -1\n\n\t\tif idx > len(ary) {\n\t\t\treturn fmt.Errorf(\"Unable to access invalid index: %d\", idx)\n\t\t}\n\t\tidx = len(ary) - idx\n\t}\n\tif idx < 0 || idx >= len(ary) || idx > len(cur) {\n\t\treturn fmt.Errorf(\"Unable to access invalid index: %d\", idx)\n\t}\n\tcopy(ary[0:idx], cur[0:idx])\n\tary[idx] = val\n\tcopy(ary[idx+1:], cur[idx:])\n\n\t*d = ary\n\treturn nil\n}", "label": 1, "label_name": "safe"}
-{"code": " hide: function(){\n isatty && process.stdout.write('\\u001b[?25l');\n },", "label": 0, "label_name": "vulnerable"}
-{"code": "static CURLcode pop3_parse_url_path(struct connectdata *conn)\n{\n /* the pop3 struct is already inited in pop3_connect() */\n struct pop3_conn *pop3c = &conn->proto.pop3c;\n struct SessionHandle *data = conn->data;\n const char *path = data->state.path;\n\n /* url decode the path and use this mailbox */\n return Curl_urldecode(data, path, 0, &pop3c->mailbox, NULL, TRUE);\n}", "label": 1, "label_name": "safe"}
-{"code": "def get_avail_fence_agents(params, request, session)\n if not allowed_for_local_cluster(session, Permissions::READ)\n return 403, 'Permission denied'\n end\n agents = getFenceAgents(session)\n return JSON.generate(agents)\nend", "label": 0, "label_name": "vulnerable"}
-{"code": " private function character($s, $l = 0)\n {\n if($s + $l < $this->EOF) {\n if($l === 0) {\n return $this->data[$s];\n } else {\n return substr($this->data, $s, $l);\n }\n }\n }", "label": 1, "label_name": "safe"}
-{"code": "static inline void init_fs_pin(struct fs_pin *p, void (*kill)(struct fs_pin *))\n{\n\tinit_waitqueue_head(&p->wait);\n\tINIT_HLIST_NODE(&p->s_list);\n\tINIT_HLIST_NODE(&p->m_list);\n\tp->kill = kill;\n}", "label": 1, "label_name": "safe"}
-{"code": "def side_effect(old_cmd, command):\n with tarfile.TarFile(_tar_file(old_cmd.script_parts)[0]) as archive:\n for file in archive.getnames():\n if not os.path.abspath(file).startswith(os.getcwd()):\n # it's unsafe to overwrite files outside of the current directory\n continue\n\n try:\n os.remove(file)\n except OSError:\n # does not try to remove directories as we cannot know if they\n # already existed before\n pass", "label": 1, "label_name": "safe"}
-{"code": " public function updateStream($path, $resource, Config $config)\n {\n return $this->writeStream($path, $resource, $config);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " def team_organize\n Log.add_info(request, params.inspect)\n\n team_id = params[:team_id]\n unless team_id.blank?\n begin\n @team = Team.find(team_id)\n rescue\n @team = nil\n ensure\n if @team.nil?\n flash[:notice] = t('msg.already_deleted', :name => Team.model_name.human)\n return\n end\n end\n\n users = @team.get_users_a\n end \n\n team_members = params[:team_members]\n\n created = false\n modified = false\n\n if team_members.nil? or team_members.empty?\n\n unless team_id.blank?\n # @team must not be nil.\n @team.save if modified = @team.clear_users\n end\n\n else\n\n if team_members != users\n\n if team_id.blank?\n\n item = Item.find(params[:id])\n\n created = true\n @team = Team.new\n @team.name = item.title\n @team.item_id = params[:id]\n @team.status = Team::STATUS_STANDBY\n\n else\n\n @team.clear_users\n end\n\n @team.add_users team_members\n @team.save\n @team.remove_application team_members\n\n modified = true \n end\n end\n\n if created\n @team.create_team_folder\n end\n\n @item = @team.item\n\n if modified\n flash[:notice] = t('msg.register_success')\n end\n render(:partial => 'ajax_team_info', :layout => false)\n\n rescue => evar\n Log.add_error(request, evar)\n render(:partial => 'ajax_team_info', :layout => false)\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " public function __construct(UserInviteService $inviteService, LoginService $loginService, UserRepo $userRepo)\n {\n $this->middleware('guest');\n $this->middleware('guard:standard');\n\n $this->inviteService = $inviteService;\n $this->loginService = $loginService;\n $this->userRepo = $userRepo;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " protected function createActualDirectory($directory, $connection)\n {\n // List the current directory\n $listing = ftp_nlist($connection, '.') ?: [];\n \n foreach ($listing as $key => $item) {\n if (preg_match('~^\\./.*~', $item)) {\n $listing[$key] = substr($item, 2);\n }\n }\n\n if (in_array($directory, $listing)) {\n return true;\n }\n\n return (boolean) ftp_mkdir($connection, $directory);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "\tpublic function approve_toggle() {\n\t if (empty($this->params['id'])) return;\n \n /* The global constants can be overriden by passing appropriate params */ \n //sure wish I could do this once in the constructor. sadly $this->params[] isn't set yet\n// $require_login = empty($this->params['require_login']) ? COMMENTS_REQUIRE_LOGIN : $this->params['require_login'];\n// $require_approval = empty($this->params['require_approval']) ? COMMENTS_REQUIRE_APPROVAL : $this->params['require_approval'];\n// $require_notification = empty($this->params['require_notification']) ? COMMENTS_REQUIRE_NOTIFICATION : $this->params['require_notification'];\n// $notification_email = empty($this->params['notification_email']) ? COMMENTS_NOTIFICATION_EMAIL : $this->params['notification_email'];\n\n\t $comment = new expComment($this->params['id']);\n\t $comment->approved = $comment->approved == 1 ? 0 : 1;\n\t if ($comment->approved) {\n\t\t $this->sendApprovalNotification($comment,$this->params);\n\t }\n\t $comment->save();\n\t expHistory::back();\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": " it \"includes application UID if it's public\" do\n app = FactoryBot.create :application, secret: \"123123123\", confidential: false\n\n expect(app.as_json).to match(\n \"id\" => app.id,\n \"name\" => app.name,\n \"created_at\" => an_instance_of(String),\n \"uid\" => app.uid,\n )\n end", "label": 1, "label_name": "safe"}
-{"code": "void test_mkdir(const char *path)\n{\n\tsize_t len = strlen(path) + 30;\n\tchar *tmpname = alloca(len);\n\tsnprintf(tmpname, len, \"%s/%d\", path, (int)getpid());\n\n\tif (mkdir(path, 0755) == 0) {\n\t\tfprintf(stderr, \"leak at mkdir of %s\\n\", path);\n\t\texit(1);\n\t}\n\tif (errno != ENOENT) {\n\t\tfprintf(stderr, \"leak at mkdir of %s, errno was %s\\n\", path, strerror(errno));\n\t\texit(1);\n\t}\n\tif (mkdir(tmpname, 0755) == 0) {\n\t\tfprintf(stderr, \"leak at mkdir of %s\\n\", tmpname);\n\t\texit(1);\n\t}\n\tif (errno != ENOENT) {\n\t\tfprintf(stderr, \"leak at mkdir of %s, errno was %s\\n\", path, strerror(errno));\n\t\texit(1);\n\t}\n}", "label": 1, "label_name": "safe"}
-{"code": " it \"should downcase a string\" do\n result = scope.function_downcase([\"ASFD\"])\n expect(result).to(eq(\"asfd\"))\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "CSecurityTLS::CSecurityTLS(bool _anon) : session(0), anon_cred(0),\n\t\t\t\t\t\t anon(_anon), fis(0), fos(0)\n{\n cafile = X509CA.getData();\n crlfile = X509CRL.getData();\n\n if (gnutls_global_init() != GNUTLS_E_SUCCESS)\n throw AuthFailureException(\"gnutls_global_init failed\");\n}", "label": 1, "label_name": "safe"}
-{"code": " public function remove()\n {\n $this->checkCSRFParam();\n $project = $this->getProject();\n $tag_id = $this->request->getIntegerParam('tag_id');\n $tag = $this->tagModel->getById($tag_id);\n\n if ($tag['project_id'] != $project['id']) {\n throw new AccessForbiddenException();\n }\n\n if ($this->tagModel->remove($tag_id)) {\n $this->flash->success(t('Tag removed successfully.'));\n } else {\n $this->flash->failure(t('Unable to remove this tag.'));\n }\n\n $this->response->redirect($this->helper->url->to('ProjectTagController', 'index', array('project_id' => $project['id'])));\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " private function load($id)\n {\n global $zdb;\n try {\n $select = $zdb->select(self::TABLE);\n $select->limit(1)->where(self::PK . ' = ' . $id);\n\n $results = $zdb->execute($select);\n $res = $results->current();\n\n $this->id = $id;\n $this->short = $res->short_label;\n $this->long = $res->long_label;\n } catch (Throwable $e) {\n Analog::log(\n 'An error occurred loading title #' . $id . \"Message:\\n\" .\n $e->getMessage(),\n Analog::ERROR\n );\n throw $e;\n }\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public void translate(ServerStatisticsPacket packet, GeyserSession session) {\n session.updateStatistics(packet.getStatistics());\n\n if (session.isWaitingForStatistics()) {\n session.setWaitingForStatistics(false);\n StatisticsUtils.buildAndSendStatisticsMenu(session);\n }\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,\n xkb_mod_mask_t *mods_rtrn, CompatInfo *info)\n{\n if (expr == NULL) {\n *pred_rtrn = MATCH_ANY_OR_NONE;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }\n\n *pred_rtrn = MATCH_EXACTLY;\n if (expr->expr.op == EXPR_ACTION_DECL) {\n const char *pred_txt = xkb_atom_text(info->ctx, expr->action.name);\n if (!LookupString(symInterpretMatchMaskNames, pred_txt, pred_rtrn) ||\n !expr->action.args) {\n log_err(info->ctx,\n \"Illegal modifier predicate \\\"%s\\\"; Ignored\\n\", pred_txt);\n return false;\n }\n expr = expr->action.args;\n }\n else if (expr->expr.op == EXPR_IDENT) {\n const char *pred_txt = xkb_atom_text(info->ctx, expr->ident.ident);\n if (pred_txt && istreq(pred_txt, \"any\")) {\n *pred_rtrn = MATCH_ANY;\n *mods_rtrn = MOD_REAL_MASK_ALL;\n return true;\n }\n }\n\n return ExprResolveModMask(info->ctx, expr, MOD_REAL, &info->mods,\n mods_rtrn);\n}", "label": 1, "label_name": "safe"}
-{"code": "static LUA_FUNCTION(openssl_x509_check_host)\n{\n X509 * cert = CHECK_OBJECT(1, X509, \"openssl.x509\");\n size_t sz;\n const char* hostname = luaL_checklstring(L, 2, &sz);\n int flags = luaL_optint(L, 3, 0);\n char *peer = NULL;\n\n int ret = X509_check_host(cert, hostname, sz, flags, &peer);\n ret = openssl_push_check_result(L, ret, peer);\n OPENSSL_free(peer);\n return ret;\n}", "label": 1, "label_name": "safe"}
-{"code": " def delete_statistics_group\n Log.add_info(request, params.inspect)\n\n group_id = params[:group_id]\n\n if group_id.nil? or group_id.empty?\n @group_ids = Research.get_statistics_groups \n render(:partial => 'ajax_statistics_groups', :layout => false)\n return\n end\n\n @group_ids = Research.delete_statistics_group group_id\n\n render(:partial => 'ajax_statistics_groups', :layout => false)\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " foreach ($value as $val) {\n $this->allowedUrls[$key][] = $val;\n }", "label": 1, "label_name": "safe"}
-{"code": " verify: function(digest, d) {\n // remove padding\n d = _decodePkcs1_v1_5(d, key, true);\n // d is ASN.1 BER-encoded DigestInfo\n var obj = asn1.fromDer(d);\n // compare the given digest to the decrypted one\n return digest === obj.value[1].value;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public function load($array_of_ids)\n {\n foreach ($array_of_ids as $id) {\n $this->ids[$id] = true;\n }\n }", "label": 1, "label_name": "safe"}
-{"code": " protected function process(ContainerBuilder $container)\n {\n $repeatedPass = new DecoratorServicePass();\n $repeatedPass->process($container);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " def get_imports(self, *, prefix: str) -> Set[str]:\n \"\"\"\n Get a set of import strings that should be included when this property is used somewhere\n\n Args:\n prefix: A prefix to put before any relative (local) module names.\n \"\"\"\n imports = super().get_imports(prefix=prefix)\n imports.update({\"from datetime import datetime\", \"from typing import cast\"})\n return imports", "label": 0, "label_name": "vulnerable"}
-{"code": " public static function getPath($class)\n {\n if (\n strncmp('FSTools', $class, 7) !== 0 &&\n strncmp('ConfigDoc', $class, 9) !== 0\n ) return false;\n // Custom implementations can go here\n // Standard implementation:\n return str_replace('_', '/', $class) . '.php';\n }", "label": 1, "label_name": "safe"}
-{"code": " public function testComponentRecompositionAndNormalization($uri)\n {\n $url = new Net_URL2($uri);\n $this->assertSame($uri, $url->getURL());\n $url->normalize();\n $this->assertSame($uri, $url->getURL());\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "p[C]}catch(I){null!=window.console&&console.log(\"Error in vars URL parameter: \"+I)}};Graph.prototype.getExportVariables=function(){return null!=this.globalVars?mxUtils.clone(this.globalVars):{}};var x=Graph.prototype.getGlobalVariable;Graph.prototype.getGlobalVariable=function(p){var C=x.apply(this,arguments);null==C&&null!=this.globalVars&&(C=this.globalVars[p]);return C};Graph.prototype.getDefaultStylesheet=function(){if(null==this.defaultStylesheet){var p=this.themes[\"default-style2\"];this.defaultStylesheet=\n(new mxCodec(p.ownerDocument)).decode(p)}return this.defaultStylesheet};Graph.prototype.isViewer=function(){return urlParams.viewer};var K=Graph.prototype.getSvg;Graph.prototype.getSvg=function(p,C,I,T,P,O,R,Y,da,ha,Z,ea,aa,va){var la=null,Aa=null,Ba=null;ea||null==this.themes||\"darkTheme\"!=this.defaultThemeName||(la=this.stylesheet,Aa=this.shapeForegroundColor,Ba=this.shapeBackgroundColor,this.shapeForegroundColor=\"darkTheme\"==this.defaultThemeName?\"#000000\":Editor.lightColor,this.shapeBackgroundColor=", "label": 1, "label_name": "safe"}
-{"code": "function sliceArgs(args, startIndex) {\n return slice.call(args, startIndex || 0);\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id)\n{\n\tstruct snd_msnd *chip = dev_id;\n\tvoid *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF;\n\tu16 head, tail, size;\n\n\t/* Send ack to DSP */\n\t/* inb(chip->io + HP_RXL); */\n\n\t/* Evaluate queued DSP messages */\n\thead = readw(chip->DSPQ + JQS_wHead);\n\ttail = readw(chip->DSPQ + JQS_wTail);\n\tsize = readw(chip->DSPQ + JQS_wSize);\n\tif (head > size || tail > size)\n\t\tgoto out;\n\twhile (head != tail) {\n\t\tsnd_msnd_eval_dsp_msg(chip, readw(pwDSPQData + 2 * head));\n\t\tif (++head > size)\n\t\t\thead = 0;\n\t\twritew(head, chip->DSPQ + JQS_wHead);\n\t}\n out:\n\t/* Send ack to DSP */\n\tinb(chip->io + HP_RXL);\n\treturn IRQ_HANDLED;\n}", "label": 1, "label_name": "safe"}
-{"code": "var M=mxText.prototype.redraw;mxText.prototype.redraw=function(){M.apply(this,arguments);null!=this.node&&\"DIV\"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(p,C,I){function T(){for(var la=R.getSelectionCells(),Aa=[],Fa=0;FaassertResult(\n 'a b c d e
',\n 'a b c d e
'\n );\n }", "label": 1, "label_name": "safe"}
-{"code": " public function searchNew() {\n global $db, $user;\n //$this->params['query'] = str_ireplace('-','\\-',$this->params['query']);\n $sql = \"select DISTINCT(p.id) as id, p.title, model, sef_url, f.id as fileid, \";\n $sql .= \"match (p.title,p.model,p.body) against ('\" . $this->params['query'] . \"*' IN BOOLEAN MODE) as relevance, \";\n $sql .= \"CASE when p.model like '\" . $this->params['query'] . \"%' then 1 else 0 END as modelmatch, \";\n $sql .= \"CASE when p.title like '%\" . $this->params['query'] . \"%' then 1 else 0 END as titlematch \";\n $sql .= \"from \" . $db->prefix . \"product as p INNER JOIN \" .\n $db->prefix . \"content_expFiles as cef ON p.id=cef.content_id AND cef.content_type IN ('product','eventregistration','donation','giftcard') AND cef.subtype='mainimage' INNER JOIN \" . $db->prefix .\n \"expFiles as f ON cef.expFiles_id = f.id WHERE \";\n if (!$user->isAdmin()) $sql .= '(p.active_type=0 OR p.active_type=1) AND ';\n $sql .= \" match (p.title,p.model,p.body) against ('\" . $this->params['query'] . \"*' IN BOOLEAN MODE) AND p.parent_id=0 \";\n $sql .= \" HAVING relevance > 0 \";\n //$sql .= \"GROUP BY p.id \"; \n $sql .= \"order by modelmatch,titlematch,relevance desc LIMIT 10\";\n\n eDebug($sql);\n $res = $db->selectObjectsBySql($sql);\n eDebug($res, true);\n $ar = new expAjaxReply(200, gt('Here\\'s the items you wanted'), $res);\n $ar->send();\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "function db_seq_nextval($seqname)\n{\n\tglobal $DatabaseType;\n\n\tif ($DatabaseType == 'mysqli')\n\t\t$seq = \"fn_\" . strtolower($seqname) . \"()\";\n\n\treturn $seq;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "\t\t\t\t$ip = getenv('HTTP_FORWARDED');\n\t\t\t}\n\t\t\telse {\n\t\t\t\t$ip = $_SERVER['REMOTE_ADDR'];\n\t\t\t}\n\t\t\treturn $ip;\n\t\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "static inline int check_entry_size_and_hooks(struct arpt_entry *e,\n\t\t\t\t\t struct xt_table_info *newinfo,\n\t\t\t\t\t const unsigned char *base,\n\t\t\t\t\t const unsigned char *limit,\n\t\t\t\t\t const unsigned int *hook_entries,\n\t\t\t\t\t const unsigned int *underflows,\n\t\t\t\t\t unsigned int valid_hooks)\n{\n\tunsigned int h;\n\tint err;\n\n\tif ((unsigned long)e % __alignof__(struct arpt_entry) != 0 ||\n\t (unsigned char *)e + sizeof(struct arpt_entry) >= limit ||\n\t (unsigned char *)e + e->next_offset > limit) {\n\t\tduprintf(\"Bad offset %p\\n\", e);\n\t\treturn -EINVAL;\n\t}\n\n\tif (e->next_offset\n\t < sizeof(struct arpt_entry) + sizeof(struct xt_entry_target)) {\n\t\tduprintf(\"checking: element %p size %u\\n\",\n\t\t\t e, e->next_offset);\n\t\treturn -EINVAL;\n\t}\n\n\tif (!arp_checkentry(&e->arp))\n\t\treturn -EINVAL;\n\n\terr = xt_check_entry_offsets(e, e->target_offset, e->next_offset);\n\tif (err)\n\t\treturn err;\n\n\t/* Check hooks & underflows */\n\tfor (h = 0; h < NF_ARP_NUMHOOKS; h++) {\n\t\tif (!(valid_hooks & (1 << h)))\n\t\t\tcontinue;\n\t\tif ((unsigned char *)e - base == hook_entries[h])\n\t\t\tnewinfo->hook_entry[h] = hook_entries[h];\n\t\tif ((unsigned char *)e - base == underflows[h]) {\n\t\t\tif (!check_underflow(e)) {\n\t\t\t\tpr_debug(\"Underflows must be unconditional and \"\n\t\t\t\t\t \"use the STANDARD target with \"\n\t\t\t\t\t \"ACCEPT/DROP\\n\");\n\t\t\t\treturn -EINVAL;\n\t\t\t}\n\t\t\tnewinfo->underflow[h] = underflows[h];\n\t\t}\n\t}\n\n\t/* Clear counters and comefrom */\n\te->counters = ((struct xt_counters) { 0, 0 });\n\te->comefrom = 0;\n\treturn 0;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "\t\t\t\tstyle : function(dir) { return dir.icon ? 'style=\"background-image:url(\\''+fm.escape(dir.icon)+'\\')\"' : ''; }", "label": 0, "label_name": "vulnerable"}
-{"code": "d.sSortableDesc,b.sSortingClassJUI=d.sSortJUIDescAllowed):(b.sSortingClass=d.sSortable,b.sSortingClassJUI=d.sSortJUI)}function U(a){if(!1!==a.oFeatures.bAutoWidth){var b=a.aoColumns;Ha(a);for(var c=0,d=b.length;cspace_before) {\n ruby_xfree(state->space_before);\n state->space_before = NULL;\n state->space_before_len = 0;\n }\n } else {\n if (state->space_before) ruby_xfree(state->space_before);\n state->space_before = fstrndup(RSTRING_PTR(space_before), len);\n state->space_before_len = len;\n }\n return Qnil;\n}", "label": 1, "label_name": "safe"}
-{"code": "static struct dst_entry *inet6_csk_route_socket(struct sock *sk,\n\t\t\t\t\t\tstruct flowi6 *fl6)\n{\n\tstruct inet_sock *inet = inet_sk(sk);\n\tstruct ipv6_pinfo *np = inet6_sk(sk);\n\tstruct in6_addr *final_p, final;\n\tstruct dst_entry *dst;\n\n\tmemset(fl6, 0, sizeof(*fl6));\n\tfl6->flowi6_proto = sk->sk_protocol;\n\tfl6->daddr = sk->sk_v6_daddr;\n\tfl6->saddr = np->saddr;\n\tfl6->flowlabel = np->flow_label;\n\tIP6_ECN_flow_xmit(sk, fl6->flowlabel);\n\tfl6->flowi6_oif = sk->sk_bound_dev_if;\n\tfl6->flowi6_mark = sk->sk_mark;\n\tfl6->fl6_sport = inet->inet_sport;\n\tfl6->fl6_dport = inet->inet_dport;\n\tsecurity_sk_classify_flow(sk, flowi6_to_flowi(fl6));\n\n\tfinal_p = fl6_update_dst(fl6, np->opt, &final);\n\n\tdst = __inet6_csk_dst_check(sk, np->dst_cookie);\n\tif (!dst) {\n\t\tdst = ip6_dst_lookup_flow(sk, fl6, final_p);\n\n\t\tif (!IS_ERR(dst))\n\t\t\t__inet6_csk_dst_store(sk, dst, NULL, NULL);\n\t}\n\treturn dst;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " it 'should work without errors' do\n pp = <<-EOS\n mysql_database { 'spec_db':\n ensure => present,\n }\n EOS\n\n apply_manifest(pp, :catch_failures => true)\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " setup: function () {\n var data = this.model.get('data') || {};\n\n this.entityType = this.model.get('relatedType') || data.entityType || null;\n this.entityId = this.model.get('relatedId') || data.entityId || null;\n this.entityName = this.model.get('relatedName') || data.entityName || null;\n\n this.messageData['relatedEntityType'] = this.translateEntityType(this.entityType);\n this.messageData['relatedEntity'] = '' + this.getHelper().escapeString(this.entityName) +'';\n\n this.createMessage();\n },", "label": 1, "label_name": "safe"}
-{"code": "this.graph.getTooltip(c,d,e,f);this.show(k,e,f);this.state=c;this.node=d;this.stateSource=g}}),this.delay)}};mxTooltipHandler.prototype.hide=function(){this.resetTimer();this.hideTooltip()};mxTooltipHandler.prototype.hideTooltip=function(){null!=this.div&&(this.div.style.visibility=\"hidden\",this.div.innerText=\"\")};", "label": 1, "label_name": "safe"}
-{"code": " public function handleElement(&$token)\n {\n if (!$token instanceof HTMLPurifier_Token_Start) {\n return;\n }\n $next = false;\n $deleted = 1; // the current tag\n for ($i = count($this->inputZipper->back) - 1; $i >= 0; $i--, $deleted++) {\n $next = $this->inputZipper->back[$i];\n if ($next instanceof HTMLPurifier_Token_Text) {\n if ($next->is_whitespace) {\n continue;\n }\n if ($this->removeNbsp && !isset($this->removeNbspExceptions[$token->name])) {\n $plain = str_replace(\"\\xC2\\xA0\", \"\", $next->data);\n $isWsOrNbsp = $plain === '' || ctype_space($plain);\n if ($isWsOrNbsp) {\n continue;\n }\n }\n }\n break;\n }\n if (!$next || ($next instanceof HTMLPurifier_Token_End && $next->name == $token->name)) {\n $this->attrValidator->validateToken($token, $this->config, $this->context);\n $token->armor['ValidateAttributes'] = true;\n if (isset($this->exclude[$token->name])) {\n $r = true;\n foreach ($this->exclude[$token->name] as $elem) {\n if (!isset($token->attr[$elem])) $r = false;\n }\n if ($r) return;\n }\n if (isset($token->attr['id']) || isset($token->attr['name'])) {\n return;\n }\n $token = $deleted + 1;\n for ($b = 0, $c = count($this->inputZipper->front); $b < $c; $b++) {\n $prev = $this->inputZipper->front[$b];\n if ($prev instanceof HTMLPurifier_Token_Text && $prev->is_whitespace) {\n continue;\n }\n break;\n }\n // This is safe because we removed the token that triggered this.\n $this->rewindOffset($b+$deleted);\n return;\n }\n }", "label": 1, "label_name": "safe"}
-{"code": "RequestHandler::RequestHandler(\n std::shared_ptr check_workflow,\n std::shared_ptr service_context,\n std::unique_ptr request_data)\n : context_(new context::RequestContext(service_context,\n std::move(request_data))),\n check_workflow_(check_workflow) {\n // Remove x-endponts-api-userinfo from downstream client.\n // It should be set by the last Endpoint proxy to prevent users spoofing.\n std::string buffer;\n if (context_->request()->FindHeader(\n google::api_manager::auth::kEndpointApiUserInfo, &buffer)) {\n context_->request()->AddHeaderToBackend(\n google::api_manager::auth::kEndpointApiUserInfo, \"\", true);\n }\n}", "label": 1, "label_name": "safe"}
-{"code": "static int setup_dev_console(const struct lxc_rootfs *rootfs,\n\t\t\t const struct lxc_console *console)\n{\n\tchar path[MAXPATHLEN];\n\tstruct stat s;\n\tint ret;\n\n\tret = snprintf(path, sizeof(path), \"%s/dev/console\", rootfs->mount);\n\tif (ret >= sizeof(path)) {\n\t\tERROR(\"console path too long\");\n\t\treturn -1;\n\t}\n\n\tif (access(path, F_OK)) {\n\t\tWARN(\"rootfs specified but no console found at '%s'\", path);\n\t\treturn 0;\n\t}\n\n\tif (console->master < 0) {\n\t\tINFO(\"no console\");\n\t\treturn 0;\n\t}\n\n\tif (stat(path, &s)) {\n\t\tSYSERROR(\"failed to stat '%s'\", path);\n\t\treturn -1;\n\t}\n\n\tif (chmod(console->name, s.st_mode)) {\n\t\tSYSERROR(\"failed to set mode '0%o' to '%s'\",\n\t\t\t s.st_mode, console->name);\n\t\treturn -1;\n\t}\n\n\tif (mount(console->name, path, \"none\", MS_BIND, 0)) {\n\t\tERROR(\"failed to mount '%s' on '%s'\", console->name, path);\n\t\treturn -1;\n\t}\n\n\tINFO(\"console has been setup\");\n\treturn 0;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "arguments)};this.isOffline()||\"undefined\"===typeof window.EditDataDialog||(EditDataDialog.placeholderHelpLink=\"https://www.diagrams.net/doc/faq/predefined-placeholders\");if(/viewer\\.diagrams\\.net$/.test(window.location.hostname)||/embed\\.diagrams\\.net$/.test(window.location.hostname))this.editor.editBlankUrl=\"https://app.diagrams.net/\";var x=c.editor.getEditBlankUrl;this.editor.getEditBlankUrl=function(F){F=null!=F?F:\"\";\"1\"==urlParams.dev&&(F+=(0\n requestersJsonImpl(request.sid, requester, anyPageId = None, watchbarWithTitles,\n RestrTopicsCatsLinks(JsArray(), Nil, Nil, Nil, Set.empty),\n permissions, permsOnSiteTooMany,\n unapprovedPostAuthorIds = Set.empty, myGroupsEveryoneLast, site, tx)\n }\n }\n\n\n private def requestersJsonImpl(", "label": 1, "label_name": "safe"}
-{"code": " Area.prototype.drawSeries = function() {\n var i, range, _i, _j, _k, _len, _ref, _ref1, _results, _results1, _results2;\n this.seriesPoints = [];\n if (this.options.behaveLikeLine) {\n range = (function() {\n _results = [];\n for (var _i = 0, _ref = this.options.ykeys.length - 1; 0 <= _ref ? _i <= _ref : _i >= _ref; 0 <= _ref ? _i++ : _i--){ _results.push(_i); }\n return _results;\n }).apply(this);\n } else {\n range = (function() {\n _results1 = [];\n for (var _j = _ref1 = this.options.ykeys.length - 1; _ref1 <= 0 ? _j <= 0 : _j >= 0; _ref1 <= 0 ? _j++ : _j--){ _results1.push(_j); }\n return _results1;\n }).apply(this);\n }\n _results2 = [];\n for (_k = 0, _len = range.length; _k < _len; _k++) {\n i = range[_k];\n this._drawFillFor(i);\n this._drawLineFor(i);\n _results2.push(this._drawPointFor(i));\n }\n return _results2;\n };", "label": 0, "label_name": "vulnerable"}
-{"code": "mxEvent.getClientX(za);I.popupMenuHandler.hideMenu();mxEvent.consume(za)});mxEvent.addGestureListeners(document.body,null,function(za){var wa=!1;null!=Ma&&(U.diagramContainer.style.width=Math.max(20,Qa+mxEvent.getClientX(za)-Ma)+\"px\",wa=!0);null!=Oa&&(U.diagramContainer.style.height=Math.max(20,Ta+mxEvent.getClientY(za)-Oa)+\"px\",wa=!0);wa&&((window.opener||window.parent).postMessage(JSON.stringify({event:\"resize\",fullscreen:Editor.inlineFullscreen,rect:U.diagramContainer.getBoundingClientRect()}),\n\"*\"),Z(),U.refresh())},function(za){null==Ma&&null==Oa||mxEvent.consume(za);Oa=Ma=null});this.diagramContainer.style.borderRadius=\"4px\";document.body.style.backgroundColor=\"transparent\";U.bottomResizer.style.visibility=\"hidden\";U.rightResizer.style.visibility=\"hidden\";P.style.visibility=\"hidden\";W.style.visibility=\"hidden\";S.style.display=\"none\"}\"1\"==urlParams.prefetchFonts&&U.editor.loadFonts()}}};", "label": 0, "label_name": "vulnerable"}
-{"code": "Q.push(F);A.appendChild(F);var C=function(pa){Aa.style.display=\"none\";ea.style.display=\"none\";Z.style.left=\"30px\";p(pa?-1:1);null==W&&(W=Ma);Z.scrollTop=0;Z.innerHTML=\"\";S.spin(Z);var sa=function(ya,va,ra){H=0;S.stop();Ma=ya;ra=ra||{};var wa=0,fa;for(fa in ra)wa+=ra[fa].length;if(va)Z.innerHTML=va;else if(0==ya.length&&0==wa)Z.innerHTML=mxUtils.htmlEntities(mxResources.get(\"noDiagrams\",null,\"No Diagrams Found\"));else if(Z.innerHTML=\"\",0 0:\n return n * recursive_fn(n - 1, x)\n else:\n return x", "label": 1, "label_name": "safe"}
-{"code": " it 'succeeds in puppeting mime' do\n pp= <<-EOS\n class { 'apache': }\n include apache::mod::mime\n EOS\n apply_manifest(pp, :catch_failures => true)\n end\n\n describe service(service_name) do\n it { is_expected.to be_enabled }\n it { is_expected.to be_running }\n end\n\n describe file(\"#{mod_dir}/mime.conf\") do\n it { is_expected.to contain \"AddType application/x-compress .Z\" }\n end\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " public function theme_switch() {\n if (!expUtil::isReallyWritable(BASE.'framework/conf/config.php')) { // we can't write to the config.php file\n flash('error',gt('The file /framework/conf/config.php is NOT Writeable. You will be unable to change the theme.'));\n }\n \texpSettings::change('DISPLAY_THEME_REAL', $this->params['theme']);\n\t expSession::set('display_theme',$this->params['theme']);\n\t $sv = isset($this->params['sv'])?$this->params['sv']:'';\n\t if (strtolower($sv)=='default') {\n\t $sv = '';\n\t }\n\t expSettings::change('THEME_STYLE_REAL',$sv);\n\t expSession::set('theme_style',$sv);\n\t expDatabase::install_dbtables(); // update tables to include any custom definitions in the new theme\n\n // $message = (MINIFY != 1) ? \"Exponent is now minifying Javascript and CSS\" : \"Exponent is no longer minifying Javascript and CSS\" ;\n // flash('message',$message);\n\t $message = gt(\"You have selected the\").\" '\".$this->params['theme'].\"' \".gt(\"theme\");\n\t if ($sv != '') {\n\t\t $message .= ' '.gt('with').' '.$this->params['sv'].' '.gt('style variation');\n\t }\n\t flash('message',$message);\n// expSession::un_set('framework');\n expSession::set('force_less_compile', 1);\n// expTheme::removeSmartyCache();\n expSession::clearAllUsersSessionCache();\n \texpHistory::returnTo('manageable');\n }", "label": 1, "label_name": "safe"}
-{"code": " void onComplete(const Status& status, ContextImpl& context) const override {\n auto& completion_state = context.getCompletionState(this);\n if (completion_state.is_completed_) {\n return;\n }\n\n // If any of children is OK, return OK\n if (Status::Ok == status) {\n completion_state.is_completed_ = true;\n completeWithStatus(status, context);\n return;\n }\n\n // Then wait for all children to be done.\n if (++completion_state.number_completed_children_ == verifiers_.size()) {\n // Aggregate all children status into a final status.\n // JwtMissing should be treated differently than other failure status\n // since it simply means there is not Jwt token for the required provider.\n // If there is a failure status other than JwtMissing in the children,\n // it should be used as the final status.\n Status final_status = Status::JwtMissed;\n for (const auto& it : verifiers_) {\n // If a Jwt is extracted from a location not specified by the required provider,\n // the authenticator returns JwtUnknownIssuer. It should be treated the same as\n // JwtMissed.\n Status child_status = context.getCompletionState(it.get()).status_;\n if (child_status != Status::JwtMissed && child_status != Status::JwtUnknownIssuer) {\n final_status = child_status;\n }\n }\n\n if (is_allow_missing_or_failed_) {\n final_status = Status::Ok;\n } else if (is_allow_missing_ && final_status == Status::JwtMissed) {\n final_status = Status::Ok;\n }\n completion_state.is_completed_ = true;\n completeWithStatus(final_status, context);\n }\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "\tpublic static final void toStream(Binder binder, ZipOutputStream zout)\n\tthrows IOException {\n\t\ttry(OutputStream out=new ShieldOutputStream(zout)) {\n\t\t\tmyStream.toXML(binder, out);\n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"Cannot export this map: {}\", binder, e);\n\t\t}\n\t}", "label": 1, "label_name": "safe"}
-{"code": " public static function loader(){\r\n $theme = Options::v('themes');\r\n define('THEME', $theme);\r\n self::incFunc($theme);\r\n }\r", "label": 0, "label_name": "vulnerable"}
-{"code": "e(L)}),null,null,k,null,q.shadowVisible,null,q,m,null,null,null,\"diagram\",null)}catch(L){null!=e&&e(L)}};EditorUi.prototype.getEmbeddedSvg=function(c,e,g,k,m,q,v,x,A,z,L,M,n){x=null!=x?x:!0;L=null!=L?L:0;v=null!=A?A:e.background;v==mxConstants.NONE&&(v=null);q=e.getSvg(v,z,L,null,null,q,null,null,null,e.shadowVisible||M,null,n,\"diagram\");(e.shadowVisible||M)&&e.addSvgShadow(q,null,null,0==L);null!=c&&q.setAttribute(\"content\",c);null!=g&&q.setAttribute(\"resource\",g);var y=mxUtils.bind(this,function(K){K=\n(k?\"\":Graph.xmlDeclaration+\"\\n\"+Graph.svgFileComment+\"\\n\"+Graph.svgDoctype+\"\\n\")+mxUtils.getXml(K);null!=m&&m(K);return K});e.mathEnabled&&this.editor.addMathCss(q);if(null!=m)this.embedFonts(q,mxUtils.bind(this,function(K){x?this.editor.convertImages(K,mxUtils.bind(this,function(B){y(B)})):y(K)}));else return y(q)};EditorUi.prototype.embedFonts=function(c,e){this.editor.loadFonts(mxUtils.bind(this,function(){try{null!=this.editor.resolvedFontCss&&this.editor.addFontCss(c,this.editor.resolvedFontCss),", "label": 0, "label_name": "vulnerable"}
-{"code": " it \"should return false if a member is not in an array\" do\n result = scope.function_member([[\"a\",\"b\",\"c\"], \"d\"])\n expect(result).to(eq(false))\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "function(p,C,I,T,P,O,R,Y,da,ha){if(null!=I&&null==mxMarker.markers[I]){var Z=this.getPackageForType(I);null!=Z&&mxStencilRegistry.getStencil(Z)}return U.apply(this,arguments)};var Q=mxStencil.prototype.drawShape;mxStencil.prototype.drawShape=function(p,C,I,T,P,O){\"1\"==mxUtils.getValue(C.style,\"lineShape\",null)&&p.setFillColor(mxUtils.getValue(C.style,mxConstants.STYLE_STROKECOLOR,this.stroke));return Q.apply(this,arguments)};PrintDialog.prototype.create=function(p,C){function I(){aa.value=Math.max(1,\nMath.min(Y,Math.max(parseInt(aa.value),parseInt(ea.value))));ea.value=Math.max(1,Math.min(Y,Math.min(parseInt(aa.value),parseInt(ea.value))))}function T(ya){function va(Ha,Na,Pa){var Qa=Ha.useCssTransforms,Ya=Ha.currentTranslate,La=Ha.currentScale,Ta=Ha.view.translate,Ua=Ha.view.scale;Ha.useCssTransforms&&(Ha.useCssTransforms=!1,Ha.currentTranslate=new mxPoint(0,0),Ha.currentScale=1,Ha.view.translate=new mxPoint(0,0),Ha.view.scale=1);var Za=Ha.getGraphBounds(),Wa=0,bb=0,Va=pa.get(),ab=1/Ha.pageScale,", "label": 0, "label_name": "vulnerable"}
-{"code": "void LongSeek(mp4object *mp4, int64_t offset)\n{\n\tif (mp4 && offset)\n\t{\n\t\tif (mp4->filepos + offset < mp4->filesize)\n\t\t{\n\t\t\tLONGSEEK(mp4->mediafp, offset, SEEK_CUR);\n\t\t\tmp4->filepos += offset;\n\t\t}\n\t\telse\n\t\t{\n\t\t\tmp4->filepos = mp4->filesize;\n\t\t}\n\t}\n}", "label": 1, "label_name": "safe"}
-{"code": "function nvweb_dictionary_load()\r\n{\r\n\tglobal $DB;\r\n\tglobal $session;\r\n\tglobal $website;\r\n\tglobal $theme;\r\n\t\r\n\t$dictionary = array();\t\r\n\t// the dictionary is an array merged from the following sources (- to + preference)\r\n\t// theme dictionary (json)\r\n\t// theme dictionary on database\r\n\t// webdictionary custom entries\r\n\t\r\n\t// theme dictionary\r\n\tif(!empty($theme))\r\n\t{\r\n\t\t$theme->dictionary = array(); // clear previous loaded dictionary\r\n\t\t$theme->t(); // force theme dictionary load\r\n\t}\r\n\t\r\n\tif(!empty($theme->dictionary))\r\n\t\t$dictionary = $theme->dictionary;\r\n\r\n\t// webdictionary custom entries\r\n\t$DB->query('SELECT node_id, text\r\n\t\t\t\t FROM nv_webdictionary \r\n\t\t\t\t WHERE node_type = \"global\"\r\n\t\t\t\t AND lang = '.protect($session['lang']).'\r\n\t\t\t\t AND website = '.$website->id.'\r\n\t\t\t\t UNION\r\n\t\t\t\t SELECT subtype AS node_id, text\r\n\t\t\t\t FROM nv_webdictionary\r\n\t\t\t\t WHERE node_type = \"theme\"\r\n\t\t\t\t AND theme = '.protect($website->theme).' \r\n\t\t\t\t AND lang = '.protect($session['lang']).'\r\n\t\t\t\t AND website = '.$website->id\r\n\t\t\t );\t\t\r\n\t\t\t\t\t\t\r\n\t$data = $DB->result();\r\n\t\r\n\tif(!is_array($data)) $data = array();\r\n\t\r\n\tforeach($data as $item)\r\n\t{\r\n\t\t$dictionary[$item->node_id] = $item->text;\r\n\t}\r\n\t\r\n\treturn $dictionary;\r\n}\r", "label": 0, "label_name": "vulnerable"}
-{"code": " public TList readListBegin() throws TException {\n byte size_and_type = readByte();\n int size = (size_and_type >> 4) & 0x0f;\n if (size == 15) {\n size = readVarint32();\n }\n byte type = getTType(size_and_type);\n ensureContainerHasEnough(size, type);\n return new TList(type, size);\n }", "label": 1, "label_name": "safe"}
-{"code": "\"#ffffff\")),Da=mxUtils.setStyle(Da,mxConstants.STYLE_STROKECOLOR,mxUtils.getValue(Aa,mxConstants.STYLE_STROKECOLOR,\"#000000\")),Da=mxUtils.setStyle(Da,mxConstants.STYLE_GRADIENTCOLOR,mxUtils.getValue(Aa,mxConstants.STYLE_GRADIENTCOLOR,null)),T.getModel().isVertex(Fa[Ea])&&(Da=mxUtils.setStyle(Da,mxConstants.STYLE_FONTCOLOR,mxUtils.getValue(Aa,mxConstants.STYLE_FONTCOLOR,null))));T.getModel().setStyle(Fa[Ea],Da)}}finally{T.getModel().endUpdate()}}));Ca.className=\"geStyleButton\";Ca.style.width=\"36px\";", "label": 0, "label_name": "vulnerable"}
-{"code": "\t\tfunction checkOldRoutes($path) {\n\t\t\t$found = false;\n\t\t\t$x = count($path);\n\t\t\twhile ($x) {\n\t\t\t\t$f = sqlfetch(sqlquery(\"SELECT * FROM bigtree_route_history WHERE old_route = '\".sqlescape(implode(\"/\",array_slice($path,0,$x))).\"'\"));\n\t\t\t\tif ($f) {\n\t\t\t\t\t$old = $f[\"old_route\"];\n\t\t\t\t\t$new = $f[\"new_route\"];\n\t\t\t\t\t$found = true;\n\t\t\t\t\tbreak;\n\t\t\t\t}\n\t\t\t\t$x--;\n\t\t\t}\n\t\t\t// If it's in the old routing table, send them to the new page.\n\t\t\tif ($found) {\n\t\t\t\t$new_url = $new.substr($_GET[\"bigtree_htaccess_url\"],strlen($old));\n\t\t\t\tBigTree::redirect(WWW_ROOT.$new_url,\"301\");\n\t\t\t}\n\t\t}", "label": 1, "label_name": "safe"}
-{"code": "\t\tthis.stream = function(stream)\n\t\t{\n\t\t\tthis._input = stream;\n\n\t\t\tthis._input.on('data', this._streamData);\n\t\t\tthis._input.on('end', this._streamEnd);\n\t\t\tthis._input.on('error', this._streamError);\n\t\t};", "label": 1, "label_name": "safe"}
-{"code": " async convert(input, options) {\n this[_validate]();\n\n options = this[_parseOptions](options);\n\n return await this[_convert](input, options);\n }", "label": 1, "label_name": "safe"}
-{"code": " \tfunction injectProof($string) {\n \t $quotes = substr_count(\"'\", $string);\n if ($quotes % 2 != 0)\n $string = $this->escapeString($string);\n $dquotes = substr_count('\"', $string);\n if ($dquotes % 2 != 0)\n $string = $this->escapeString($string);\n return $string;\n }", "label": 1, "label_name": "safe"}
-{"code": "static void __iov_iter_advance_iov(struct iov_iter *i, size_t bytes)\n{\n\tif (likely(i->nr_segs == 1)) {\n\t\ti->iov_offset += bytes;\n\t} else {\n\t\tconst struct iovec *iov = i->iov;\n\t\tsize_t base = i->iov_offset;\n\n\t\twhile (bytes) {\n\t\t\tint copy = min(bytes, iov->iov_len - base);\n\n\t\t\tbytes -= copy;\n\t\t\tbase += copy;\n\t\t\tif (iov->iov_len == base) {\n\t\t\t\tiov++;\n\t\t\t\tbase = 0;\n\t\t\t}\n\t\t}\n\t\ti->iov = iov;\n\t\ti->iov_offset = base;\n\t}\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "MqttClient.prototype._setupStream = function () {\n var connectPacket\n var that = this\n var writable = new Writable()\n var parser = mqttPacket.parser(this.options)\n var completeParse = null\n var packets = []\n\n this._clearReconnect()\n\n this.stream = this.streamBuilder(this)\n\n parser.on('packet', function (packet) {\n packets.push(packet)\n })\n\n function nextTickWork () {\n process.nextTick(work)\n }\n\n function work () {\n var packet = packets.shift()\n var done = completeParse\n\n if (packet) {\n that._handlePacket(packet, nextTickWork)\n } else {\n completeParse = null\n done()\n }\n }\n\n writable._write = function (buf, enc, done) {\n completeParse = done\n parser.parse(buf)\n work()\n }\n\n this.stream.pipe(writable)\n\n // Suppress connection errors\n this.stream.on('error', nop)\n\n // Echo stream close\n eos(this.stream, this.emit.bind(this, 'close'))\n\n // Send a connect packet\n connectPacket = Object.create(this.options)\n connectPacket.cmd = 'connect'\n // avoid message queue\n sendPacket(this, connectPacket)\n\n // Echo connection errors\n parser.on('error', this.emit.bind(this, 'error'))\n\n // many drain listeners are needed for qos 1 callbacks if the connection is intermittent\n this.stream.setMaxListeners(1000)\n\n clearTimeout(this.connackTimer)\n this.connackTimer = setTimeout(function () {\n that._cleanUp(true)\n }, this.options.connectTimeout)\n}", "label": 1, "label_name": "safe"}
-{"code": " private ModelAndView addGroup(HttpServletRequest request, HttpServletResponse response) throws Exception { \n \n String groupName = request.getParameter(\"groupName\");\n String groupComment = request.getParameter(\"groupComment\");\n if (groupComment == null) {\n groupComment = \"\";\n }\n\n if (groupName != null && groupName.matches(\".*[&<>\\\"`']+.*\")) {\n throw new ServletException(\"Group ID must not contain any HTML markup.\");\n }\n\n if (groupComment != null && groupComment.matches(\".*[&<>\\\"`']+.*\")) {\n throw new ServletException(\"Group comment must not contain any HTML markup.\");\n }\n\n boolean hasGroup = false;\n try {\n hasGroup = m_groupRepository.groupExists(groupName);\n } catch (Throwable e) {\n throw new ServletException(\"Can't determine if group \" + groupName + \" already exists in groups.xml.\", e);\n }\n \n if (hasGroup) {\n return new ModelAndView(\"admin/userGroupView/groups/newGroup\", \"action\", \"redo\"); \n } else {\n WebGroup newGroup = new WebGroup();\n newGroup.setName(groupName);\n newGroup.setComments(groupComment);\n \n return editGroup(request, newGroup);\n }\n }", "label": 1, "label_name": "safe"}
-{"code": " x11(chan, initWindow, maxPacket, cfg) {\n if (!this._server)\n throw new Error('Server-only method called in client mode');\n\n const addrLen = Buffer.byteLength(cfg.originAddr);\n let p = this._packetRW.write.allocStart;\n const packet = this._packetRW.write.alloc(\n 1 + 4 + 3 + 4 + 4 + 4 + 4 + addrLen + 4\n );\n\n packet[p] = MESSAGE.CHANNEL_OPEN;\n\n writeUInt32BE(packet, 3, ++p);\n packet.utf8Write('x11', p += 4, 3);\n\n writeUInt32BE(packet, chan, p += 3);\n\n writeUInt32BE(packet, initWindow, p += 4);\n\n writeUInt32BE(packet, maxPacket, p += 4);\n\n writeUInt32BE(packet, addrLen, p += 4);\n packet.utf8Write(cfg.originAddr, p += 4, addrLen);\n\n writeUInt32BE(packet, cfg.originPort, p += addrLen);\n\n this._debug && this._debug(\n `Outbound: Sending CHANNEL_OPEN (r:${chan}, x11)`\n );\n sendPacket(this, this._packetRW.write.finalize(packet));\n }", "label": 1, "label_name": "safe"}
-{"code": " render: function(relations) {\n if ((! relations) || (relations.length == 0)) {\n return '';\n }\n \n if (! this.recordClass) {\n if (! Tine[this.foreignApp]) {\n Tine.log.warn('Tine.widgets.relation.GridRenderer::render - ForeignApp not found: ' + this.foreignApp);\n return '';\n }\n \n this.recordClass = Tine[this.foreignApp].Model[this.foreignModel];\n }\n \n for (var index = 0; index < relations.length; index++) {\n var el = relations[index];\n if (el.type == this.type && el.related_model == this.relModel) {\n var record = new this.recordClass(el.related_record);\n return record.getTitle();\n }\n }\n }", "label": 0, "label_name": "vulnerable"}
-{"code": "TfLiteStatus ReverseSequenceHelper(TfLiteContext* context, TfLiteNode* node) {\n const TfLiteTensor* seq_lengths_tensor;\n TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kSeqLengthsTensor,\n &seq_lengths_tensor));\n switch (seq_lengths_tensor->type) {\n case kTfLiteInt32: {\n return ReverseSequenceImpl(context, node);\n }\n case kTfLiteInt64: {\n return ReverseSequenceImpl(context, node);\n }\n default: {\n context->ReportError(\n context,\n \"Seq_lengths type '%s' is not supported by reverse_sequence.\",\n TfLiteTypeGetName(seq_lengths_tensor->type));\n return kTfLiteError;\n }\n }\n return kTfLiteOk;\n}", "label": 1, "label_name": "safe"}
-{"code": " def markPageAsSeen(pageId: PageId): Action[JsValue] = PostJsonAction(NoRateLimits,\n MinAuthnStrength.EmbeddingStorageSid12, maxBytes = 2) { request =>", "label": 1, "label_name": "safe"}
-{"code": " $f = function (\\Symfony\\Component\\DependencyInjection\\Tests\\Fixtures\\TestServiceSubscriber $v) { return $v; }; return $f(${($_ = isset($this->services['Symfony\\\\Component\\\\DependencyInjection\\\\Tests\\\\Fixtures\\\\TestServiceSubscriber']) ? $this->services['Symfony\\\\Component\\\\DependencyInjection\\\\Tests\\\\Fixtures\\\\TestServiceSubscriber'] : ($this->services['Symfony\\\\Component\\\\DependencyInjection\\\\Tests\\\\Fixtures\\\\TestServiceSubscriber'] = new \\Symfony\\Component\\DependencyInjection\\Tests\\Fixtures\\TestServiceSubscriber())) && false ?: '_'});", "label": 1, "label_name": "safe"}
-{"code": " StringSanMatcher(int general_name_type, envoy::type::matcher::v3::StringMatcher matcher)\n : general_name_type_(general_name_type), matcher_(matcher) {}", "label": 1, "label_name": "safe"}
-{"code": "mxTooltipHandler.prototype.reset=function(a,b,c){if(!this.ignoreTouchEvents||mxEvent.isMouseEvent(a.getEvent()))if(this.resetTimer(),c=null!=c?c:this.getStateForEvent(a),b&&this.isEnabled()&&null!=c&&(null==this.div||\"hidden\"==this.div.style.visibility)){var d=a.getSource(),e=a.getX(),f=a.getY(),g=a.isSource(c.shape)||a.isSource(c.text);this.thread=window.setTimeout(mxUtils.bind(this,function(){if(!this.graph.isEditing()&&!this.graph.popupMenuHandler.isMenuShowing()&&!this.graph.isMouseDown){var k=\nthis.graph.getTooltip(c,d,e,f);this.show(k,e,f);this.state=c;this.node=d;this.stateSource=g}}),this.delay)}};mxTooltipHandler.prototype.hide=function(){this.resetTimer();this.hideTooltip()};mxTooltipHandler.prototype.hideTooltip=function(){null!=this.div&&(this.div.style.visibility=\"hidden\",this.div.innerText=\"\")};", "label": 1, "label_name": "safe"}
-{"code": "\t\t\t\t$doRegist = (strpos($cmd, '*') !== false);\n\t\t\t\tif (! $doRegist) {\n\t\t\t\t\t$_getcmd = create_function('$cmd', 'list($ret) = explode(\\'.\\', $cmd);return trim($ret);');\n\t\t\t\t\t$doRegist = ($_reqCmd && in_array($_reqCmd, array_map($_getcmd, explode(' ', $cmd))));\n\t\t\t\t}\n\t\t\t\tif ($doRegist) {\n\t\t\t\t\tif (! is_array($handlers) || is_object($handlers[0])) {\n\t\t\t\t\t\t$handlers = array($handlers);\n\t\t\t\t\t}\n\t\t\t\t\tforeach($handlers as $handler) {\n\t\t\t\t\t\tif ($handler) {\n\t\t\t\t\t\t\tif (is_string($handler) && strpos($handler, '.')) {\n\t\t\t\t\t\t\t\tlist($_domain, $_name, $_method) = array_pad(explode('.', $handler), 3, '');\n\t\t\t\t\t\t\t\tif (strcasecmp($_domain, 'plugin') === 0) {\n\t\t\t\t\t\t\t\t\tif ($plugin = $this->getPluginInstance($_name, isset($opts['plugin'][$_name])? $opts['plugin'][$_name] : array())\n\t\t\t\t\t\t\t\t\t\t\tand method_exists($plugin, $_method)) {\n\t\t\t\t\t\t\t\t\t\t$this->bind($cmd, array($plugin, $_method));\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t$this->bind($cmd, $handler);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "\tprivate static function dumpParsedRefs( $parser, $label ) {\n\t\t// if (!preg_match(\"/Query Q/\",$parser->mTitle->getText())) return '';\n\t\techo 'parser mLinks: ';\n\t\tob_start();\n\t\tvar_dump( $parser->getOutput()->mLinks );\n\t\t$a = ob_get_contents();\n\t\tob_end_clean();\n\t\techo htmlspecialchars( $a, ENT_QUOTES );\n\t\techo '
';\n\t\techo 'parser mTemplates: ';\n\t\tob_start();\n\t\tvar_dump( $parser->getOutput()->mTemplates );\n\t\t$a = ob_get_contents();\n\t\tob_end_clean();\n\t\techo htmlspecialchars( $a, ENT_QUOTES );\n\t\techo '
';\n\t}", "label": 0, "label_name": "vulnerable"}
-{"code": "struct mb2_cache_entry *mb2_cache_entry_find_next(struct mb2_cache *cache,\n\t\t\t\t\t\t struct mb2_cache_entry *entry)\n{\n\treturn __entry_find(cache, entry, entry->e_key);\n}", "label": 1, "label_name": "safe"}
-{"code": "service_info *FindServiceEventURLPath(\n\tservice_table *table, const char *eventURLPath)\n{\n\tservice_info *finger = NULL;\n\turi_type parsed_url;\n\turi_type parsed_url_in;\n\n\tif (table &&\n\t\tparse_uri(eventURLPath, strlen(eventURLPath), &parsed_url_in) ==\n\t\t\tHTTP_SUCCESS) {\n\t\tfinger = table->serviceList;\n\t\twhile (finger) {\n\t\t\tif (finger->eventURL) {\n\t\t\t\tif (parse_uri(finger->eventURL,\n\t\t\t\t\t strlen(finger->eventURL),\n\t\t\t\t\t &parsed_url) == HTTP_SUCCESS) {\n\t\t\t\t\tif (!token_cmp(&parsed_url.pathquery,\n\t\t\t\t\t\t &parsed_url_in.pathquery)) {\n\t\t\t\t\t\treturn finger;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tfinger = finger->next;\n\t\t}\n\t}\n\n\treturn NULL;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " def self.get_tmpl_subfolder(name)\n\n SqlHelper.validate_token([name])\n\n tmpl_folder = Folder.where(\"folders.name='#{TMPL_ROOT}'\").first\n\n unless tmpl_folder.nil?\n con = \"(parent_id=#{tmpl_folder.id}) and (name='#{name}')\"\n begin\n child = Folder.where(con).first\n rescue => evar\n Log.add_error(nil, evar)\n end\n end\n\n return [tmpl_folder, child]\n end", "label": 1, "label_name": "safe"}
-{"code": "null!=this.formatWindow&&this.formatWindow.window.setVisible(!1)};EditorUi.prototype.chromelessWindowResize=function(){};var O=DiagramFormatPanel.prototype.addView;DiagramFormatPanel.prototype.addView=function(C){C=O.apply(this,arguments);var E=this.editorUi,G=E.editor.graph;if(G.isEnabled()&&\"1\"==urlParams.sketch){var P=this.createOption(mxResources.get(\"sketch\"),function(){return Editor.sketchMode},function(J,F){E.setSketchMode(!Editor.sketchMode);null!=F&&mxEvent.isShiftDown(F)||G.updateCellStyles({sketch:J?", "label": 1, "label_name": "safe"}
-{"code": " $this->expandIdentifiers($this->info[$name], $attr_types);\n }\n }", "label": 1, "label_name": "safe"}
-{"code": "static ssize_t rpmsg_eptdev_write_iter(struct kiocb *iocb,\n\t\t\t\t struct iov_iter *from)\n{\n\tstruct file *filp = iocb->ki_filp;\n\tstruct rpmsg_eptdev *eptdev = filp->private_data;\n\tsize_t len = iov_iter_count(from);\n\tvoid *kbuf;\n\tint ret;\n\n\tkbuf = kzalloc(len, GFP_KERNEL);\n\tif (!kbuf)\n\t\treturn -ENOMEM;\n\n\tif (!copy_from_iter_full(kbuf, len, from))\n\t\treturn -EFAULT;\n\n\tif (mutex_lock_interruptible(&eptdev->ept_lock)) {\n\t\tret = -ERESTARTSYS;\n\t\tgoto free_kbuf;\n\t}\n\n\tif (!eptdev->ept) {\n\t\tret = -EPIPE;\n\t\tgoto unlock_eptdev;\n\t}\n\n\tif (filp->f_flags & O_NONBLOCK)\n\t\tret = rpmsg_trysend(eptdev->ept, kbuf, len);\n\telse\n\t\tret = rpmsg_send(eptdev->ept, kbuf, len);\n\nunlock_eptdev:\n\tmutex_unlock(&eptdev->ept_lock);\n\nfree_kbuf:\n\tkfree(kbuf);\n\treturn ret < 0 ? ret : len;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "Sidebar.prototype.defaultImageWidth=80;Sidebar.prototype.defaultImageHeight=80;Sidebar.prototype.tooltipMouseDown=null;Sidebar.prototype.refresh=function(){this.graph.stylesheet.styles=mxUtils.clone(this.editorUi.editor.graph.stylesheet.styles);this.container.innerHTML=\"\";this.palettes={};this.init()};", "label": 0, "label_name": "vulnerable"}
-{"code": "Va)}La=0};za.positionChanged=function(){};za.reset=function(){La=0};z.push(za)})(ca)}}return null!=z?z.reverse():null};var R=mxVertexHandler.prototype.setHandlesVisible;mxVertexHandler.prototype.setHandlesVisible=function(z){R.apply(this,arguments);if(null!=this.moveHandles)for(var L=0;Lchatty) {\n $trace = debug_backtrace();\n // zip(tail(trace), trace) -- but PHP is not Haskell har har\n for ($i = 0, $c = count($trace); $i < $c - 1; $i++) {\n // XXX this is not correct on some versions of HTML Purifier\n if ($trace[$i + 1]['class'] === 'HTMLPurifier_Config') {\n continue;\n }\n $frame = $trace[$i];\n $extra = \" invoked on line {$frame['line']} in file {$frame['file']}\";\n break;\n }\n }\n trigger_error($msg . $extra, $no);\n }", "label": 1, "label_name": "safe"}
-{"code": " public function testPreserveTarget()\n {\n $this->config->set('Attr.AllowedFrameTargets', '_top');\n $this->config->set('HTML.Doctype', 'XHTML 1.0 Transitional');\n $this->assertResult('');\n }", "label": 1, "label_name": "safe"}
-{"code": "ia){ja=fa.getAttribute(\"section\");ba=fa.getAttribute(\"subsection\");if(null==ja&&(ma=ia.indexOf(\"/\"),ja=ia.substring(0,ma),null==ba)){var qa=ia.indexOf(\"/\",ma+1);-1keyschenc, bx, ax, ctx->rounds,\n\t\t\t\t enc_tables.T);\n#elif defined(USE_ARM_ASM)\n return _gcry_aes_arm_encrypt_block(ctx->keyschenc, bx, ax, ctx->rounds,\n\t\t\t\t enc_tables.T);\n#else\n return do_encrypt_fn (ctx, bx, ax);\n#endif /* !USE_ARM_ASM && !USE_AMD64_ASM*/\n}", "label": 1, "label_name": "safe"}
-{"code": " it 'should not accept a match regex that does not match the specified line' do\n expect {\n Puppet::Type.type(:file_line).new(\n :name => 'foo',\n :path => '/my/path',\n :line => 'foo=bar',\n :match => '^bar=blah$'\n )}.to raise_error(Puppet::Error, /the value must be a regex that matches/)\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "var O=mxText.prototype.redraw;mxText.prototype.redraw=function(){O.apply(this,arguments);null!=this.node&&\"DIV\"==this.node.nodeName&&Graph.processFontAttributes(this.node)};Graph.prototype.createTagsDialog=function(t,E,K){function T(){for(var ma=S.getSelectionCells(),Aa=[],Da=0;Da 1)\r\n {\r\n sort( $agents );\r\n $agents = array_unique($agents, SORT_STRING);\r\n }\r\n\r\n $banned_user_agent_data = implode(PHP_EOL, $agents);\r\n $aio_wp_security->configs->set_value('aiowps_banned_user_agents',$banned_user_agent_data);\r\n $_POST['aiowps_banned_user_agents'] = ''; //Clear the post variable for the banned address list\r\n return 1;\r\n }\r", "label": 1, "label_name": "safe"}
-{"code": "TfLiteStatus AverageEval(TfLiteContext* context, TfLiteNode* node) {\n auto* params = reinterpret_cast(node->builtin_data);\n OpData* data = reinterpret_cast(node->user_data);\n\n TfLiteTensor* output = GetOutput(context, node, 0);\n const TfLiteTensor* input = GetInput(context, node, 0);\n switch (input->type) { // Already know in/out types are same.\n case kTfLiteFloat32:\n AverageEvalFloat(context, node, params, data, input, output);\n break;\n case kTfLiteUInt8:\n AverageEvalQuantizedUint8(context, node, params, data, input,\n output);\n break;\n case kTfLiteInt8:\n AverageEvalQuantizedInt8(context, node, params, data, input,\n output);\n break;\n case kTfLiteInt16:\n AverageEvalQuantizedInt16(context, node, params, data, input,\n output);\n break;\n default:\n TF_LITE_KERNEL_LOG(context, \"Type %s not currently supported.\",\n TfLiteTypeGetName(input->type));\n return kTfLiteError;\n }\n return kTfLiteOk;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " $scope.save = function() {\n var form = this.fsForm;\n RequisitionsService.startTiming();\n RequisitionsService.saveForeignSourceDefinition($scope.foreignSourceDef).then(\n function() { // success\n growl.success('The definition for the requisition ' + $scope.foreignSource + ' has been saved.');\n form.$dirty = false;\n },\n $scope.errorHandler\n );\n };", "label": 0, "label_name": "vulnerable"}
-{"code": "function getInputs(body) {\n if (body.length !== 1) return;\n var lastExpression = body[0].expression;\n var candidate = lastExpression.toWatch;\n if (candidate.length !== 1) return candidate;\n return candidate[0] !== lastExpression ? candidate : undefined;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "cifs_find_smb_ses(struct TCP_Server_Info *server, char *username)\n{\n\tstruct list_head *tmp;\n\tstruct cifsSesInfo *ses;\n\n\twrite_lock(&cifs_tcp_ses_lock);\n\tlist_for_each(tmp, &server->smb_ses_list) {\n\t\tses = list_entry(tmp, struct cifsSesInfo, smb_ses_list);\n\t\tif (strncmp(ses->userName, username, MAX_USERNAME_SIZE))\n\t\t\tcontinue;\n\n\t\t++ses->ses_count;\n\t\twrite_unlock(&cifs_tcp_ses_lock);\n\t\treturn ses;\n\t}\n\twrite_unlock(&cifs_tcp_ses_lock);\n\treturn NULL;\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " def from_string(string)\n raise Errors::InvalidObjectId.new(string) unless legal?(string)\n data = []\n 12.times { |i| data << string[i*2, 2].to_i(16) }\n new data\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " public function getTimestamp()\n {\n return $this->filesystem->getTimestamp($this->path);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public void testIncludesMidUri() {\n final Collection patterns = new ArrayList() {{\n add( \"file://**\" );\n add( \"**/repo/**\" );\n }};\n\n Assert.assertTrue( includes( patterns, URI.create( \"file:///Users/home\" ) ) );\n\n Assert.assertFalse( includes( patterns, URI.create( \"git://antpathmatcher\" ) ) );\n\n Assert.assertTrue( includes( patterns, URI.create( \"git://master@antpathmatcher/repo/sss\" ) ) );\n }", "label": 1, "label_name": "safe"}
-{"code": "void ResourceHandle::FromProto(const ResourceHandleProto& proto) {\n set_device(proto.device());\n set_container(proto.container());\n set_name(proto.name());\n set_hash_code(proto.hash_code());\n set_maybe_type_name(proto.maybe_type_name());\n std::vector dtypes_and_shapes;\n for (const auto& dtype_and_shape : proto.dtypes_and_shapes()) {\n DataType dtype = dtype_and_shape.dtype();\n PartialTensorShape shape(dtype_and_shape.shape());\n dtypes_and_shapes.push_back(DtypeAndPartialTensorShape{dtype, shape});\n }\n dtypes_and_shapes_ = std::move(dtypes_and_shapes);\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "def vote(request, pk):\n # TODO: check if user has access to this topic/poll\n poll = get_object_or_404(\n CommentPoll.objects.unremoved(),\n pk=pk\n )\n\n if not request.user.is_authenticated:\n return redirect_to_login(next=poll.get_absolute_url())\n\n form = PollVoteManyForm(user=request.user, poll=poll, data=request.POST)\n\n if form.is_valid():\n CommentPollChoice.decrease_vote_count(poll=poll, voter=request.user)\n form.save_m2m()\n CommentPollChoice.increase_vote_count(poll=poll, voter=request.user)\n return safe_redirect(request, 'next', poll.get_absolute_url(), method='POST')\n\n messages.error(request, utils.render_form_errors(form))\n return safe_redirect(request, 'next', poll.get_absolute_url(), method='POST')", "label": 1, "label_name": "safe"}
-{"code": " it 'validates an multiple arguments' do\n pp = <<-EOS\n $one = '1.2.3.4'\n $two = '5.6.7.8'\n validate_ipv4_address($one,$two)\n EOS\n\n apply_manifest(pp, :catch_failures => true)\n end", "label": 0, "label_name": "vulnerable"}
-{"code": " def make_homeserver(self, reactor, clock):\n self.http_client = Mock()\n return self.setup_test_homeserver(http_client=self.http_client)", "label": 0, "label_name": "vulnerable"}
-{"code": " _write(data, encoding, cb) {\n const channel = this._channel;\n const protocol = channel._client._protocol;\n const outgoing = channel.outgoing;\n const packetSize = outgoing.packetSize;\n const id = outgoing.id;\n let window = outgoing.window;\n const len = data.length;\n let p = 0;\n\n if (outgoing.state !== 'open')\n return;\n\n while (len - p > 0 && window > 0) {\n let sliceLen = len - p;\n if (sliceLen > window)\n sliceLen = window;\n if (sliceLen > packetSize)\n sliceLen = packetSize;\n\n if (p === 0 && sliceLen === len)\n protocol.channelExtData(id, data, STDERR);\n else\n protocol.channelExtData(id, bufferSlice(data, p, p + sliceLen), STDERR);\n\n p += sliceLen;\n window -= sliceLen;\n }\n\n outgoing.window = window;\n\n if (len - p > 0) {\n if (window === 0)\n channel._waitWindow = true;\n if (p > 0)\n channel._chunkErr = bufferSlice(data, p, len);\n else\n channel._chunkErr = data;\n channel._chunkcbErr = cb;\n return;\n }\n\n cb();\n }", "label": 1, "label_name": "safe"}
-{"code": " public function testRemoveTrailingHyphensInComment()\n {\n $this->config->set('HTML.Trusted', true);\n $this->assertResult('', '');\n }", "label": 1, "label_name": "safe"}
-{"code": " def recursive_py_fn(n, x):\n if n > 0:\n return n * recursive_py_fn(n - 1, x)\n return x", "label": 1, "label_name": "safe"}
-{"code": " def destroy_session(env, session_id, options)\n with_lock(env) do\n delete_session(session_id)\n generate_sid unless options[:drop]\n end\n end", "label": 1, "label_name": "safe"}
-{"code": "_PyUnicode_DecodeUnicodeEscape(const char *s,\n Py_ssize_t size,\n const char *errors,\n const char **first_invalid_escape)\n{\n *first_invalid_escape = NULL;\n return PyUnicode_DecodeUnicodeEscape(s, size, errors);\n}", "label": 1, "label_name": "safe"}
-{"code": " protected function getUniqueString() {\n $string = parent::getUniqueString();\n $string .= \"with a ' inside!\";\n return $string;\n }", "label": 1, "label_name": "safe"}
-{"code": " 'X-Parse-Session-Token': user5.getSessionToken(),\n })\n ).data.find.edges.map(object => object.node.someField)\n ).toEqual(['someValue3']);\n });", "label": 1, "label_name": "safe"}
-{"code": " public void validateFail(ViolationCollector col) {\n col.addViolation(\"${'value'}\");\n col.addViolation(\"$\\\\A{1+1}\");\n col.addViolation(\"{value}\", Collections.singletonMap(\"value\", \"TEST\"));\n col.addViolation(\"${'property'}\", \"${'value'}\");\n col.addViolation(\"${'property'}\", 1, \"${'value'}\");\n col.addViolation(\"${'property'}\", \"${'key'}\", \"${'value'}\");\n }", "label": 1, "label_name": "safe"}
-{"code": " def self.get_for(group_id, include_parents=false, enabled=nil)\n\n SqlHelper.validate_token([group_id])\n\n con = []\n #con << \"(disabled=#{!enabled})\" unless enabled.nil?\n\n if include_parents\n group_con = '(group_id is null)'\n\n unless group_id.nil? or group_id.to_s == '0'\n group_obj_cache = {}\n group = Group.find_with_cache(group_id, group_obj_cache)\n group_ids = group.get_parents(false, group_obj_cache)\n group_ids << group_id\n group_con << \" or (group_id in (#{group_ids.join(',')}))\"\n end\n\n con << '(' + group_con + ')'\n else\n con << \"(group_id=#{group_id.to_i})\"\n end\n\n order_by = 'order by xorder ASC, id ASC'\n #order_by = 'order by disabled ASC, xorder ASC, id ASC'\n\n sql = 'select * from official_titles where ' + con.join(' and ') + ' ' + order_by\n\n return OfficialTitle.find_by_sql(sql)\n end", "label": 1, "label_name": "safe"}
-{"code": "function _onVersionValidationChanged() {\n // we want to reload all extensions, but only enable\n // extensions when allowed by the sessionMode, so\n // temporarily disable them all\n enabledExtensions = [];\n for (let uuid in ExtensionUtils.extensions)\n try {\n reloadExtension(ExtensionUtils.extensions[uuid]);\n } catch(e) {\n logExtensionError(uuid, e);\n }\n enabledExtensions = getEnabledExtensions();\n\n if (Main.sessionMode.allowExtensions) {\n enabledExtensions.forEach(function(uuid) {\n try {\n enableExtension(uuid);\n } catch(e) {\n logExtensionError(uuid, e);\n }\n });\n }\n}", "label": 1, "label_name": "safe"}
-{"code": " $sloc = expCore::makeLocation('navigation', null, $section->id);\n // remove any manage permissions for this page and it's children\n // $db->delete('userpermission', \"module='navigationController' AND internal=\".$section->id);\n // $db->delete('grouppermission', \"module='navigationController' AND internal=\".$section->id);\n foreach ($allusers as $uid) {\n $u = user::getUserById($uid);\n expPermissions::grant($u, 'manage', $sloc);\n }\n foreach ($allgroups as $gid) {\n $g = group::getGroupById($gid);\n expPermissions::grantGroup($g, 'manage', $sloc);\n }\n }\n }", "label": 1, "label_name": "safe"}
-{"code": "function(){g({message:JSON.parse(n.result).Message})},n.readAsText(L.response))}catch(y){g({})}});L.send(v)}else try{this.doImportVisio(c,e,g,k)}catch(M){g(M)}}else this.spinner.stop(),this.handleError({message:mxResources.get(\"serviceUnavailableOrBlocked\")})});this.doImportVisio||this.loadingExtensions||this.isOffline(!0)?q():(this.loadingExtensions=!0,mxscript(\"js/extensions.min.js\",q))};EditorUi.prototype.importGraphML=function(c,e,g){g=null!=g?g:mxUtils.bind(this,function(m){this.handleError(m)});", "label": 0, "label_name": "vulnerable"}
-{"code": "function node_link_action(link_selector, url, label) {\n var node = $.trim($(\"#node_info_header_title_name\").text());\n fade_in_out(link_selector);\n $.ajax({\n type: 'POST',\n url: url,\n data: {\"name\": node},\n success: function() {\n },\n error: function (xhr, status, error) {\n alert(\n \"Unable to \" + label + \" node '\" + node + \"' \"\n + ajax_simple_error(xhr, status, error)\n );\n }\n });\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " def params\n super\n rescue Rack::Utils::ParameterTypeError, Rack::Utils::InvalidParameterError => e\n raise BadRequest, \"Invalid query parameters: #{e.message}\"\n end", "label": 0, "label_name": "vulnerable"}
-{"code": "return a},remove:function(a,b){var c=null;if(\"object\"==typeof b)for(var d=mxUtils.indexOf(b,a);0<=d;)b.splice(d,1),c=a,d=mxUtils.indexOf(b,a);for(var e in b)b[e]==a&&(delete b[e],c=a);return c},isNode:function(a,b,c,d){return null==a||a.constructor!==Element||null!=b&&a.nodeName.toLowerCase()!=b.toLowerCase()?!1:null==c||a.getAttribute(c)==d},isAncestorNode:function(a,b){for(;null!=b;){if(b==a)return!0;b=b.parentNode}return!1},getChildNodes:function(a,b){b=b||mxConstants.NODETYPE_ELEMENT;var c=[];", "label": 1, "label_name": "safe"}
-{"code": "GraphViewer.prototype.updateTitle=function(b){b=b||\"\";this.showTitleAsTooltip&&null!=this.graph&&null!=this.graph.container&&this.graph.container.setAttribute(\"title\",b);null!=this.filename&&(this.filename.innerText=\"\",mxUtils.write(this.filename,b),this.filename.setAttribute(\"title\",b))};", "label": 1, "label_name": "safe"}
-{"code": " $escapedArgument .= '^%\"'.substr($part, 1, -1).'\"^%';\n } else {\n // escape trailing backslash\n if ('\\\\' === substr($part, -1)) {\n $part .= '\\\\';\n }\n $quote = true;\n $escapedArgument .= $part;\n }\n }\n if ($quote) {\n $escapedArgument = '\"'.$escapedArgument.'\"';\n }\n\n return $escapedArgument;\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public float GetGpuTemp(string gpuName)\n {\n return SystemData.GetGpuTemp(gpuName);\n }", "label": 0, "label_name": "vulnerable"}
-{"code": " public byte[] engineGetIV()\n {\n if (engineSpec != null)\n {\n return engineSpec.getNonce();\n }\n return null;\n }", "label": 1, "label_name": "safe"}
-{"code": "process_demand_active(STREAM s)\n{\n\tuint8 type;\n\tuint16 len_src_descriptor, len_combined_caps;\n\tstruct stream packet = *s;\n\n\t/* at this point we need to ensure that we have ui created */\n\trd_create_ui();\n\n\tin_uint32_le(s, g_rdp_shareid);\n\tin_uint16_le(s, len_src_descriptor);\n\tin_uint16_le(s, len_combined_caps);\n\n\tif (!s_check_rem(s, len_src_descriptor))\n\t{\n\t\trdp_protocol_error(\"rdp_demand_active(), consume of source descriptor from stream would overrun\", &packet);\n\t}\n\tin_uint8s(s, len_src_descriptor);\n\n\tlogger(Protocol, Debug, \"process_demand_active(), shareid=0x%x\", g_rdp_shareid);\n\n\trdp_process_server_caps(s, len_combined_caps);\n\n\trdp_send_confirm_active();\n\trdp_send_synchronise();\n\trdp_send_control(RDP_CTL_COOPERATE);\n\trdp_send_control(RDP_CTL_REQUEST_CONTROL);\n\trdp_recv(&type);\t/* RDP_PDU_SYNCHRONIZE */\n\trdp_recv(&type);\t/* RDP_CTL_COOPERATE */\n\trdp_recv(&type);\t/* RDP_CTL_GRANT_CONTROL */\n\trdp_send_input(0, RDP_INPUT_SYNCHRONIZE, 0,\n\t\t g_numlock_sync ? ui_get_numlock_state(read_keyboard_state()) : 0, 0);\n\n\tif (g_rdp_version >= RDP_V5)\n\t{\n\t\trdp_enum_bmpcache2();\n\t\trdp_send_fonts(3);\n\t}\n\telse\n\t{\n\t\trdp_send_fonts(1);\n\t\trdp_send_fonts(2);\n\t}\n\n\trdp_recv(&type);\t/* RDP_PDU_UNKNOWN 0x28 (Fonts?) */\n\treset_order_state();\n}", "label": 1, "label_name": "safe"}
-{"code": "func SanitizePath(path string) string {\n\treturn strings.TrimLeft(path, \"./\")\n}", "label": 0, "label_name": "vulnerable"}
-{"code": "\tprivate function setFooter( $footer ) {\n\t\tif ( DynamicPageListHooks::getDebugLevel() == 5 ) {\n\t\t\t$footer .= '
';\n\t\t}\n\n\t\t$this->footer = $this->replaceVariables( $footer );\n\t}", "label": 1, "label_name": "safe"}
-{"code": "\tpublic void testSelectByTwoTypes() {\n\n\t\tJWKSelector selector = new JWKSelector(new JWKMatcher.Builder().keyTypes(KeyType.RSA, KeyType.EC).build());\n\n\t\tList keyList = new ArrayList<>();\n\t\tkeyList.add(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build());\n\t\tkeyList.add(new ECKey.Builder(ECKey.Curve.P_256, EC_P256_X, EC_P256_Y).keyID(\"2\").build());\n\n\t\tJWKSet jwkSet = new JWKSet(keyList);\n\n\t\tList matches = selector.select(jwkSet);\n\n\t\tRSAKey key1 = (RSAKey)matches.get(0);\n\t\tassertEquals(KeyType.RSA, key1.getKeyType());\n\t\tassertEquals(\"1\", key1.getKeyID());\n\n\t\tECKey key2 = (ECKey)matches.get(1);\n\t\tassertEquals(KeyType.EC, key2.getKeyType());\n\t\tassertEquals(\"2\", key2.getKeyID());\n\n\t\tassertEquals(2, matches.size());\n\t}", "label": 1, "label_name": "safe"}
-{"code": " def down?\n @down_at\n end", "label": 1, "label_name": "safe"}
-{"code": "decoding_feof(struct tok_state *tok)\n{\n if (tok->decoding_state != STATE_NORMAL) {\n return feof(tok->fp);\n } else {\n PyObject* buf = tok->decoding_buffer;\n if (buf == NULL) {\n buf = PyObject_CallObject(tok->decoding_readline, NULL);\n if (buf == NULL) {\n error_ret(tok);\n return 1;\n } else {\n tok->decoding_buffer = buf;\n }\n }\n return PyObject_Length(buf) == 0;\n }\n}", "label": 0, "label_name": "vulnerable"}
-{"code": " def read\n reply = Protocol::Reply.allocate\n\n reply.length,\n reply.request_id,\n reply.response_to,\n reply.op_code,\n reply.flags,\n reply.cursor_id,\n reply.offset,\n reply.count = @sock.read(36).unpack('l5