\\n')\n f.write('\\n')\n f.write('#include \"Python.h\"\\n')\n f.write('#include \"%s-ast.h\"\\n' % mod.name)\n f.write('\\n')\n f.write(\"static PyTypeObject AST_type;\\n\")\n v = ChainOfVisitors(\n PyTypesDeclareVisitor(f),\n PyTypesVisitor(f),\n Obj2ModPrototypeVisitor(f),\n FunctionVisitor(f),\n ObjVisitor(f),\n Obj2ModVisitor(f),\n ASTModuleVisitor(f),\n PartingShots(f),\n )\n v.visit(mod)\n f.close()", "label_name": "CWE-125", "label": 125}
{"code": "def _get_index_absolute_path(index):\n return os.path.join(INDEXDIR, index)", "label_name": "CWE-22", "label": 22}
{"code": " def __init__(self, expression, ordering=(), **extra):\n if not isinstance(ordering, (list, tuple)):\n ordering = [ordering]\n ordering = ordering or []\n # Transform minus sign prefixed strings into an OrderBy() expression.\n ordering = (\n (OrderBy(F(o[1:]), descending=True) if isinstance(o, str) and o[0] == '-' else o)\n for o in ordering\n )\n super().__init__(expression, **extra)\n self.ordering = self._parse_expressions(*ordering)", "label_name": "CWE-89", "label": 89}
{"code": "def open_soap_envelope(text):\n \"\"\"\n\n :param text: SOAP message\n :return: dictionary with two keys \"body\"/\"header\"\n \"\"\"\n try:\n envelope = ElementTree.fromstring(text)\n except Exception as exc:\n raise XmlParseError(\"%s\" % exc)\n\n assert envelope.tag == '{%s}Envelope' % soapenv.NAMESPACE\n assert len(envelope) >= 1\n content = {\"header\": [], \"body\": None}\n\n for part in envelope:\n if part.tag == '{%s}Body' % soapenv.NAMESPACE:\n assert len(part) == 1\n content[\"body\"] = ElementTree.tostring(part[0], encoding=\"UTF-8\")\n elif part.tag == \"{%s}Header\" % soapenv.NAMESPACE:\n for item in part:\n _str = ElementTree.tostring(item, encoding=\"UTF-8\")\n content[\"header\"].append(_str)\n\n return content", "label_name": "CWE-611", "label": 611}
{"code": "def is_safe_url(url, host=None):\n \"\"\"\n Return ``True`` if the url is a safe redirection (i.e. it doesn't point to\n a different host).\n\n Always returns ``False`` on an empty url.\n \"\"\"\n if not url:\n return False\n netloc = urllib_parse.urlparse(url)[1]\n return not netloc or netloc == host", "label_name": "CWE-79", "label": 79}
{"code": " def testUnravelIndexZeroDim(self):\n with self.cached_session():\n for dtype in [dtypes.int32, dtypes.int64]:\n with self.assertRaisesRegex(errors.InvalidArgumentError,\n \"index is out of bound as with dims\"):\n indices = constant_op.constant([2, 5, 7], dtype=dtype)\n dims = constant_op.constant([3, 0], dtype=dtype)\n self.evaluate(array_ops.unravel_index(indices=indices, dims=dims))", "label_name": "CWE-369", "label": 369}
{"code": " def sentences_stats(self, type, vId = None):\n return self.sql_execute(self.prop_sentences_stats(type, vId))", "label_name": "CWE-79", "label": 79}
{"code": "def render_edit_book(book_id):\n cc = calibre_db.session.query(db.Custom_Columns).filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions)).all()\n book = calibre_db.get_filtered_book(book_id, allow_show_archived=True)\n if not book:\n flash(_(u\"Oops! Selected book title is unavailable. File does not exist or is not accessible\"), category=\"error\")\n return redirect(url_for(\"web.index\"))\n\n for lang in book.languages:\n lang.language_name = isoLanguages.get_language_name(get_locale(), lang.lang_code)\n\n book.authors = calibre_db.order_authors([book])\n\n author_names = []\n for authr in book.authors:\n author_names.append(authr.name.replace('|', ','))\n\n # Option for showing convertbook button\n valid_source_formats=list()\n allowed_conversion_formats = list()\n kepub_possible=None\n if config.config_converterpath:\n for file in book.data:\n if file.format.lower() in constants.EXTENSIONS_CONVERT_FROM:\n valid_source_formats.append(file.format.lower())\n if config.config_kepubifypath and 'epub' in [file.format.lower() for file in book.data]:\n kepub_possible = True\n if not config.config_converterpath:\n valid_source_formats.append('epub')\n\n # Determine what formats don't already exist\n if config.config_converterpath:\n allowed_conversion_formats = constants.EXTENSIONS_CONVERT_TO[:]\n for file in book.data:\n if file.format.lower() in allowed_conversion_formats:\n allowed_conversion_formats.remove(file.format.lower())\n if kepub_possible:\n allowed_conversion_formats.append('kepub')\n return render_title_template('book_edit.html', book=book, authors=author_names, cc=cc,\n title=_(u\"edit metadata\"), page=\"editbook\",\n conversion_formats=allowed_conversion_formats,\n config=config,\n source_formats=valid_source_formats)", "label_name": "CWE-918", "label": 918}
{"code": "def main():\n app = create_app()\n\n init_errorhandler()\n\n app.register_blueprint(web)\n app.register_blueprint(opds)\n app.register_blueprint(jinjia)\n app.register_blueprint(about)\n app.register_blueprint(shelf)\n app.register_blueprint(admi)\n app.register_blueprint(remotelogin)\n app.register_blueprint(meta)\n app.register_blueprint(gdrive)\n app.register_blueprint(editbook)\n if kobo_available:\n app.register_blueprint(kobo)\n app.register_blueprint(kobo_auth)\n if oauth_available:\n app.register_blueprint(oauth)\n success = web_server.start()\n sys.exit(0 if success else 1)", "label_name": "CWE-918", "label": 918}
{"code": " def __init__(self, sydent):\n self.sydent = sydent\n # The default endpoint factory in Twisted 14.0.0 (which we require) uses the\n # BrowserLikePolicyForHTTPS context factory which will do regular cert validation\n # 'like a browser'\n self.agent = Agent(\n self.sydent.reactor,\n connectTimeout=15,\n )", "label_name": "CWE-918", "label": 918}
{"code": " def make_homeserver(self, reactor, clock):\n\n hs = self.setup_test_homeserver(\n \"red\", http_client=None, federation_client=Mock(),\n )\n\n self.event_source = hs.get_event_sources().sources[\"typing\"]\n\n hs.get_federation_handler = Mock()\n\n async def get_user_by_access_token(token=None, allow_guest=False):\n return {\n \"user\": UserID.from_string(self.auth_user_id),\n \"token_id\": 1,\n \"is_guest\": False,\n }\n\n hs.get_auth().get_user_by_access_token = get_user_by_access_token\n\n async def _insert_client_ip(*args, **kwargs):\n return None\n\n hs.get_datastore().insert_client_ip = _insert_client_ip\n\n def get_room_members(room_id):\n if room_id == self.room_id:\n return defer.succeed([self.user])\n else:\n return defer.succeed([])\n\n @defer.inlineCallbacks\n def fetch_room_distributions_into(\n room_id, localusers=None, remotedomains=None, ignore_user=None\n ):\n members = yield get_room_members(room_id)\n for member in members:\n if ignore_user is not None and member == ignore_user:\n continue\n\n if hs.is_mine(member):\n if localusers is not None:\n localusers.add(member)\n else:\n if remotedomains is not None:\n remotedomains.add(member.domain)\n\n hs.get_room_member_handler().fetch_room_distributions_into = (\n fetch_room_distributions_into\n )\n\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def glob_to_regex(glob):\n \"\"\"Converts a glob to a compiled regex object.\n\n The regex is anchored at the beginning and end of the string.\n\n Args:\n glob (str)\n\n Returns:\n re.RegexObject\n \"\"\"\n res = \"\"\n for c in glob:\n if c == \"*\":\n res = res + \".*\"\n elif c == \"?\":\n res = res + \".\"\n else:\n res = res + re.escape(c)\n\n # \\A anchors at start of string, \\Z at end of string\n return re.compile(r\"\\A\" + res + r\"\\Z\", re.IGNORECASE)", "label_name": "CWE-331", "label": 331}
{"code": "def update(request, pk):\n topic = Topic.objects.for_update_or_404(pk, request.user)\n category_id = topic.category_id\n form = TopicForm(\n user=request.user,\n data=post_data(request),\n instance=topic)\n if is_post(request) and form.is_valid():\n topic = form.save()\n if topic.category_id != category_id:\n Comment.create_moderation_action(\n user=request.user, topic=topic, action=Comment.MOVED)\n return redirect(request.POST.get('next', topic.get_absolute_url()))\n return render(\n request=request,\n template_name='spirit/topic/update.html',\n context={'form': form})", "label_name": "CWE-601", "label": 601}
{"code": " def _factorial(x):\n if x<=10000:\n return float(math.factorial(x))\n else:\n raise Exception('factorial argument too large')", "label_name": "CWE-94", "label": 94}
{"code": " def get_file(recipe):\n if not recipe.link:\n recipe.link = Dropbox.get_share_link(recipe)\n recipe.save()\n\n response = requests.get(recipe.link.replace('www.dropbox.', 'dl.dropboxusercontent.'))\n\n return io.BytesIO(response.content)", "label_name": "CWE-918", "label": 918}
{"code": " def test_mixed(self):\n self.assertEqual(self._callFUT(b\"\\n\\n00\\r\\n\\r\\n\"), 2)", "label_name": "CWE-444", "label": 444}
{"code": " async def tenorkey(self, ctx):\r\n \"\"\"\r\n Sets a Tenor GIF API key to enable reaction gifs with act commands.\r\n\r\n You can obtain a key from here: https://tenor.com/developer/dashboard\r\n \"\"\"\r\n instructions = [\r\n \"Go to the Tenor developer dashboard: https://tenor.com/developer/dashboard\",\r\n \"Log in or sign up if you haven't already.\",\r\n \"Click `+ Create new app` and fill out the form.\",\r\n \"Copy the key from the app you just created.\",\r\n \"Give the key to Red with this command:\\n\"\r\n f\"`{ctx.prefix}set api tenor api_key your_api_key`\\n\"\r\n \"Replace `your_api_key` with the key you just got.\\n\"\r\n \"Everything else should be the same.\",\r\n ]\r\n instructions = [f\"**{i}.** {v}\" for i, v in enumerate(instructions, 1)]\r\n await ctx.maybe_send_embed(\"\\n\".join(instructions))\r", "label_name": "CWE-502", "label": 502}
{"code": "def encode_non_url_reserved_characters(url):\n # safe url reserved characters: https://datatracker.ietf.org/doc/html/rfc3986#section-2.2\n return urlquote(url, safe=\":/?#[]@!$&'()*+,;=\")", "label_name": "CWE-601", "label": 601}
{"code": "def rename_all_authors(first_author, renamed_author, calibre_path=\"\", localbook=None, gdrive=False):\n # Create new_author_dir from parameter or from database\n # Create new title_dir from database and add id\n if first_author:\n new_authordir = get_valid_filename(first_author, chars=96)\n for r in renamed_author:\n new_author = calibre_db.session.query(db.Authors).filter(db.Authors.name == r).first()\n old_author_dir = get_valid_filename(r, chars=96)\n new_author_rename_dir = get_valid_filename(new_author.name, chars=96)\n if gdrive:\n gFile = gd.getFileFromEbooksFolder(None, old_author_dir)\n if gFile:\n gd.moveGdriveFolderRemote(gFile, new_author_rename_dir)\n else:\n if os.path.isdir(os.path.join(calibre_path, old_author_dir)):\n try:\n old_author_path = os.path.join(calibre_path, old_author_dir)\n new_author_path = os.path.join(calibre_path, new_author_rename_dir)\n shutil.move(os.path.normcase(old_author_path), os.path.normcase(new_author_path))\n except (OSError) as ex:\n log.error(\"Rename author from: %s to %s: %s\", old_author_path, new_author_path, ex)\n log.debug(ex, exc_info=True)\n return _(\"Rename author from: '%(src)s' to '%(dest)s' failed with error: %(error)s\",\n src=old_author_path, dest=new_author_path, error=str(ex))\n else:\n new_authordir = get_valid_filename(localbook.authors[0].name, chars=96)\n return new_authordir", "label_name": "CWE-918", "label": 918}
{"code": "def send_mail(book_id, book_format, convert, kindle_mail, calibrepath, user_id):\n \"\"\"Send email with attachments\"\"\"\n book = calibre_db.get_book(book_id)\n\n if convert == 1:\n # returns None if success, otherwise errormessage\n return convert_book_format(book_id, calibrepath, u'epub', book_format.lower(), user_id, kindle_mail)\n if convert == 2:\n # returns None if success, otherwise errormessage\n return convert_book_format(book_id, calibrepath, u'azw3', book_format.lower(), user_id, kindle_mail)\n\n for entry in iter(book.data):\n if entry.format.upper() == book_format.upper():\n converted_file_name = entry.name + '.' + book_format.lower()\n link = '{} '.format(url_for('web.show_book', book_id=book_id), escape(book.title))\n EmailText = _(u\"%(book)s send to Kindle\", book=link)\n WorkerThread.add(user_id, TaskEmail(_(u\"Send to Kindle\"), book.path, converted_file_name,\n config.get_mail_settings(), kindle_mail,\n EmailText, _(u'This e-mail has been sent via Calibre-Web.')))\n return\n return _(u\"The requested file could not be read. Maybe wrong permissions?\")", "label_name": "CWE-918", "label": 918}
{"code": " def test_http11_listlentwo(self):\n body = string.ascii_letters\n to_send = \"GET /list_lentwo HTTP/1.1\\n\" \"Content-Length: %s\\n\\n\" % len(body)\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\")\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n expected = b\"\"\n for chunk in (body[0], body[1:]):\n expected += tobytes(\n \"%s\\r\\n%s\\r\\n\" % (str(hex(len(chunk))[2:].upper()), chunk)\n )\n expected += b\"0\\r\\n\\r\\n\"\n self.assertEqual(response_body, expected)\n # connection is always closed at the end of a chunked response\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def opds_download_link(book_id, book_format):\n # I gave up with this: With enabled ldap login, the user doesn't get logged in, therefore it's always guest\n # workaround, loading the user from the request and checking it's download rights here\n # in case of anonymous browsing user is None\n user = load_user_from_request(request) or current_user\n if not user.role_download():\n return abort(403)\n if \"Kobo\" in request.headers.get('User-Agent'):\n client = \"kobo\"\n else:\n client = \"\"\n return get_download_link(book_id, book_format.lower(), client)", "label_name": "CWE-918", "label": 918}
{"code": "def save_cover_from_url(url, book_path):\n try:\n if not cli.allow_localhost:\n # 127.0.x.x, localhost, [::1], [::ffff:7f00:1]\n ip = socket.getaddrinfo(urlparse(url).hostname, 0)[0][4][0]\n if ip.startswith(\"127.\") or ip.startswith('::ffff:7f') or ip == \"::1\" or ip == \"0.0.0.0\" or ip == \"::\":\n log.error(\"Localhost was accessed for cover upload\")\n return False, _(\"You are not allowed to access localhost for cover uploads\")\n img = requests.get(url, timeout=(10, 200), allow_redirects=False) # ToDo: Error Handling\n img.raise_for_status()\n return save_cover(img, book_path)\n except (socket.gaierror,\n requests.exceptions.HTTPError,\n requests.exceptions.ConnectionError,\n requests.exceptions.Timeout) as ex:\n log.info(u'Cover Download Error %s', ex)\n return False, _(\"Error Downloading Cover\")\n except MissingDelegateError as ex:\n log.info(u'File Format Error %s', ex)\n return False, _(\"Cover Format Error\")", "label_name": "CWE-918", "label": 918}
{"code": " def testCapacity(self):\n capacity = 3\n\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.int32, name='x')\n pi = array_ops.placeholder(dtypes.int64, name='pi')\n gi = array_ops.placeholder(dtypes.int64, name='gi')\n with ops.device(test.gpu_device_name()):\n stager = data_flow_ops.MapStagingArea(\n [\n dtypes.int32,\n ], capacity=capacity, shapes=[[]])\n\n stage = stager.put(pi, [x], [0])\n get = stager.get()\n size = stager.size()\n\n G.finalize()\n\n from six.moves import queue as Queue\n import threading\n\n queue = Queue.Queue()\n n = 8\n\n with self.session(graph=G) as sess:\n # Stage data in a separate thread which will block\n # when it hits the staging area's capacity and thus\n # not fill the queue with n tokens\n def thread_run():\n for i in range(n):\n sess.run(stage, feed_dict={x: i, pi: i})\n queue.put(0)\n\n t = threading.Thread(target=thread_run)\n t.daemon = True\n t.start()\n\n # Get tokens from the queue until a timeout occurs\n try:\n for i in range(n):\n queue.get(timeout=TIMEOUT)\n except Queue.Empty:\n pass\n\n # Should've timed out on the iteration 'capacity'\n if not i == capacity:\n self.fail(\"Expected to timeout on iteration '{}' \"\n \"but instead timed out on iteration '{}' \"\n \"Staging Area size is '{}' and configured \"\n \"capacity is '{}'.\".format(capacity, i, sess.run(size),\n capacity))\n\n # Should have capacity elements in the staging area\n self.assertTrue(sess.run(size) == capacity)\n\n # Clear the staging area completely\n for i in range(n):\n sess.run(get)\n\n self.assertTrue(sess.run(size) == 0)", "label_name": "CWE-843", "label": 843}
{"code": " def make_homeserver(self, reactor, clock):\n config = self.default_config()\n config[\"redaction_retention_period\"] = \"30d\"\n return self.setup_test_homeserver(\n resource_for_federation=Mock(), http_client=None, config=config\n )", "label_name": "CWE-601", "label": 601}
{"code": " def test_process_request__no_file(self, rf, caplog):\n request = rf.post(\"/\", data={\"file\": \"does_not_exist.txt\", \"s3file\": \"file\"})\n S3FileMiddleware(lambda x: None)(request)\n assert not request.FILES.getlist(\"file\")\n assert \"File not found: does_not_exist.txt\" in caplog.text", "label_name": "CWE-22", "label": 22}
{"code": " def _contains_display_name(self, display_name: str) -> bool:\n if not display_name:\n return False\n\n body = self._event.content.get(\"body\", None)\n if not body or not isinstance(body, str):\n return False\n\n # Similar to _glob_matches, but do not treat display_name as a glob.\n r = regex_cache.get((display_name, False, True), None)\n if not r:\n r1 = re.escape(display_name)\n r1 = _re_word_boundary(r1)\n r = re.compile(r1, flags=re.IGNORECASE)\n regex_cache[(display_name, False, True)] = r\n\n return bool(r.search(body))", "label_name": "CWE-331", "label": 331}
{"code": " def get_response(self):\n token_serializer = self.token_serializer_class(\n instance=self.token,\n context=self.get_serializer_context(),\n )\n data = token_serializer.data\n data['next'] = self.serializer.validated_data['code'].next\n return Response(data, status=status.HTTP_200_OK)", "label_name": "CWE-312", "label": 312}
{"code": " def test_file_insert(self, request, driver, live_server, upload_file, freeze):\n driver.get(live_server + self.url)\n file_input = driver.find_element(By.XPATH, \"//input[@name='file']\")\n file_input.send_keys(upload_file)\n assert file_input.get_attribute(\"name\") == \"file\"\n with wait_for_page_load(driver, timeout=10):\n file_input.submit()\n assert storage.exists(\"tmp/%s.txt\" % request.node.name)\n\n with pytest.raises(NoSuchElementException):\n error = driver.find_element(By.XPATH, \"//body[@JSError]\")\n pytest.fail(error.get_attribute(\"JSError\"))", "label_name": "CWE-22", "label": 22}
{"code": "def valid_id(opts, id_):\n '''\n Returns if the passed id is valid\n '''\n try:\n return bool(clean_path(opts['pki_dir'], id_)) and clean_id(id_)\n except (AttributeError, KeyError, TypeError) as e:\n return False", "label_name": "CWE-22", "label": 22}
{"code": "def render_prepare_search_form(cc):\n # prepare data for search-form\n tags = calibre_db.session.query(db.Tags)\\\n .join(db.books_tags_link)\\\n .join(db.Books)\\\n .filter(calibre_db.common_filters()) \\\n .group_by(text('books_tags_link.tag'))\\\n .order_by(db.Tags.name).all()\n series = calibre_db.session.query(db.Series)\\\n .join(db.books_series_link)\\\n .join(db.Books)\\\n .filter(calibre_db.common_filters()) \\\n .group_by(text('books_series_link.series'))\\\n .order_by(db.Series.name)\\\n .filter(calibre_db.common_filters()).all()\n shelves = ub.session.query(ub.Shelf)\\\n .filter(or_(ub.Shelf.is_public == 1, ub.Shelf.user_id == int(current_user.id)))\\\n .order_by(ub.Shelf.name).all()\n extensions = calibre_db.session.query(db.Data)\\\n .join(db.Books)\\\n .filter(calibre_db.common_filters()) \\\n .group_by(db.Data.format)\\\n .order_by(db.Data.format).all()\n if current_user.filter_language() == u\"all\":\n languages = calibre_db.speaking_language()\n else:\n languages = None\n return render_title_template('search_form.html', tags=tags, languages=languages, extensions=extensions,\n series=series,shelves=shelves, title=_(u\"Advanced Search\"), cc=cc, page=\"advsearch\")", "label_name": "CWE-918", "label": 918}
{"code": "def logout():\n if current_user is not None and current_user.is_authenticated:\n ub.delete_user_session(current_user.id, flask_session.get('_id',\"\"))\n logout_user()\n if feature_support['oauth'] and (config.config_login_type == 2 or config.config_login_type == 3):\n logout_oauth_user()\n log.debug(u\"User logged out\")\n return redirect(url_for('web.login'))", "label_name": "CWE-918", "label": 918}
{"code": " def test_request_login_code(self):\n response = self.client.post('/accounts-rest/login/', {\n 'username': self.user.username,\n 'next': '/private/',\n })\n\n self.assertEqual(response.status_code, 200)\n\n login_code = LoginCode.objects.filter(user=self.user).first()\n\n self.assertIsNotNone(login_code)\n self.assertEqual(login_code.next, '/private/')\n self.assertEqual(len(mail.outbox), 1)\n self.assertIn(\n 'http://testserver/accounts/login/code/?code={}'.format(login_code.code),\n mail.outbox[0].body,\n )", "label_name": "CWE-312", "label": 312}
{"code": " def _decompress(compressed_path: Text, target_path: Text) -> None:\n\n with tarfile.open(compressed_path, \"r:gz\") as tar:\n tar.extractall(target_path) # target dir will be created if it not exists", "label_name": "CWE-23", "label": 23}
{"code": " def test_credits_one(self, expected_count=1):\n self.add_change()\n data = generate_credits(\n None,\n timezone.now() - timedelta(days=1),\n timezone.now() + timedelta(days=1),\n translation__component=self.component,\n )\n self.assertEqual(\n data, [{\"Czech\": [(\"weblate@example.org\", \"Weblate Test\", expected_count)]}]\n )", "label_name": "CWE-79", "label": 79}
{"code": " def test_build_attr(self):\n assert set(ClearableFileInput().build_attrs({}).keys()) == {\n \"class\",\n \"data-url\",\n \"data-fields-x-amz-algorithm\",\n \"data-fields-x-amz-date\",\n \"data-fields-x-amz-signature\",\n \"data-fields-x-amz-credential\",\n \"data-fields-policy\",\n \"data-fields-key\",\n }\n assert ClearableFileInput().build_attrs({})[\"class\"] == \"s3file\"\n assert (\n ClearableFileInput().build_attrs({\"class\": \"my-class\"})[\"class\"]\n == \"my-class s3file\"\n )", "label_name": "CWE-22", "label": 22}
{"code": " def test_filelike_nocl_http10(self):\n to_send = \"GET /filelike_nocl HTTP/1.0\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def __init__(self, text, book):\n self.text = text\n self.book = book", "label_name": "CWE-918", "label": 918}
{"code": "def modify_identifiers(input_identifiers, db_identifiers, db_session):\n \"\"\"Modify Identifiers to match input information.\n input_identifiers is a list of read-to-persist Identifiers objects.\n db_identifiers is a list of already persisted list of Identifiers objects.\"\"\"\n changed = False\n error = False\n input_dict = dict([(identifier.type.lower(), identifier) for identifier in input_identifiers])\n if len(input_identifiers) != len(input_dict):\n error = True\n db_dict = dict([(identifier.type.lower(), identifier) for identifier in db_identifiers ])\n # delete db identifiers not present in input or modify them with input val\n for identifier_type, identifier in db_dict.items():\n if identifier_type not in input_dict.keys():\n db_session.delete(identifier)\n changed = True\n else:\n input_identifier = input_dict[identifier_type]\n identifier.type = input_identifier.type\n identifier.val = input_identifier.val\n # add input identifiers not present in db\n for identifier_type, identifier in input_dict.items():\n if identifier_type not in db_dict.keys():\n db_session.add(identifier)\n changed = True\n return changed, error", "label_name": "CWE-918", "label": 918}
{"code": " def test_underscore_traversal(self):\n # Prevent traversal to names starting with an underscore (_)\n ec = self._makeContext()\n\n with self.assertRaises(NotFound):\n ec.evaluate(\"context/__class__\")\n\n with self.assertRaises(NotFound):\n ec.evaluate(\"nocall: random/_itertools/repeat\")\n\n with self.assertRaises(NotFound):\n ec.evaluate(\"random/_itertools/repeat/foobar\")", "label_name": "CWE-22", "label": 22}
{"code": "def jstree_data(node, selected_node):\n result = []\n result.append('{')\n result.append('\"text\": \"{}\",'.format(node.label))\n result.append(\n '\"state\": {{ \"opened\": true, \"selected\": {} }},'.format(\n 'true' if node == selected_node else 'false'\n )\n )\n result.append(\n '\"data\": {{ \"href\": \"{}\" }},'.format(node.get_absolute_url())\n )\n\n children = node.get_children().order_by('label',)\n\n if children:\n result.append('\"children\" : [')\n for child in children:\n result.extend(jstree_data(node=child, selected_node=selected_node))\n\n result.append(']')\n\n result.append('},')\n\n return result", "label_name": "CWE-79", "label": 79}
{"code": "def get_info_for_package(pkg, channel_id, org_id):\n log_debug(3, pkg)\n pkg = map(str, pkg)\n params = {'name': pkg[0],\n 'ver': pkg[1],\n 'rel': pkg[2],\n 'epoch': pkg[3],\n 'arch': pkg[4],\n 'channel_id': channel_id,\n 'org_id': org_id}\n # yum repo has epoch=\"0\" not only when epoch is \"0\" but also if it's NULL\n if pkg[3] == '0' or pkg[3] == '':\n epochStatement = \"(epoch is null or epoch = :epoch)\"\n else:\n epochStatement = \"epoch = :epoch\"\n if params['org_id']:\n orgStatement = \"org_id = :org_id\"\n else:\n orgStatement = \"org_id is null\"\n\n statement = \"\"\"\n select p.path, cp.channel_id,\n cv.checksum_type, cv.checksum\n from rhnPackage p\n join rhnPackageName pn\n on p.name_id = pn.id\n join rhnPackageEVR pe\n on p.evr_id = pe.id\n join rhnPackageArch pa\n on p.package_arch_id = pa.id\n left join rhnChannelPackage cp\n on p.id = cp.package_id\n and cp.channel_id = :channel_id\n join rhnChecksumView cv\n on p.checksum_id = cv.id\n where pn.name = :name\n and pe.version = :ver\n and pe.release = :rel\n and %s\n and pa.label = :arch\n and %s\n order by cp.channel_id nulls last\n \"\"\" % (epochStatement, orgStatement)\n\n h = rhnSQL.prepare(statement)\n h.execute(**params)\n\n ret = h.fetchone_dict()\n if not ret:\n return {'path': None,\n 'channel_id': None,\n 'checksum_type': None,\n 'checksum': None,\n }\n return ret", "label_name": "CWE-79", "label": 79}
{"code": " def test_process_request__multiple_files(self, rf):\n storage.save(\"tmp/s3file/s3_file.txt\", ContentFile(b\"s3file\"))\n storage.save(\"tmp/s3file/s3_other_file.txt\", ContentFile(b\"other s3file\"))\n request = rf.post(\n \"/\",\n data={\n \"file\": [\n \"custom/location/tmp/s3file/s3_file.txt\",\n \"custom/location/tmp/s3file/s3_other_file.txt\",\n ],\n \"s3file\": [\"file\", \"other_file\"],\n },\n )\n S3FileMiddleware(lambda x: None)(request)\n files = request.FILES.getlist(\"file\")\n assert files[0].read() == b\"s3file\"\n assert files[1].read() == b\"other s3file\"", "label_name": "CWE-22", "label": 22}
{"code": " def __init__(self, expression, delimiter, **extra):\n super().__init__(expression, delimiter=delimiter, **extra)", "label_name": "CWE-89", "label": 89}
{"code": " def authenticate(self, request, username=None, code=None, **kwargs):\n if username is None:\n username = kwargs.get(get_user_model().USERNAME_FIELD)\n\n if not username or not code:\n return\n\n try:\n user = get_user_model()._default_manager.get_by_natural_key(username)\n\n if not self.user_can_authenticate(user):\n return\n\n timeout = getattr(settings, 'NOPASSWORD_LOGIN_CODE_TIMEOUT', 900)\n timestamp = timezone.now() - timedelta(seconds=timeout)\n\n # We don't delete the login code when authenticating,\n # as that is done during validation of the login form\n # and validation should not have any side effects.\n # It is the responsibility of the view/form to delete the token\n # as soon as the login was successfull.\n user.login_code = LoginCode.objects.get(user=user, code=code, timestamp__gt=timestamp)\n\n return user\n\n except (get_user_model().DoesNotExist, LoginCode.DoesNotExist):\n return", "label_name": "CWE-312", "label": 312}
{"code": "\tdef is_whitelisted(self, method):\n\t\tfn = getattr(self, method, None)\n\t\tif not fn:\n\t\t\traise NotFound(\"Method {0} not found\".format(method))\n\t\telif not getattr(fn, \"whitelisted\", False):\n\t\t\traise Forbidden(\"Method {0} not whitelisted\".format(method))", "label_name": "CWE-79", "label": 79}
{"code": " def make_homeserver(self, reactor, clock):\n self.http_client = Mock()\n return self.setup_test_homeserver(http_client=self.http_client)", "label_name": "CWE-601", "label": 601}
{"code": " async def ignore_global(self, ctx, command: str.lower):\r\n \"\"\"\r\n Globally ignore or unignore the specified action.\r\n\r\n The bot will no longer respond to these actions.\r\n \"\"\"\r\n try:\r\n await self.config.get_raw(\"custom\", command)\r\n except KeyError:\r\n await self.config.set_raw(\"custom\", command, value=None)\r\n else:\r\n await self.config.clear_raw(\"custom\", command)\r\n await ctx.tick()\r", "label_name": "CWE-502", "label": 502}
{"code": "def close_or_open(request, pk, close=True):\n # todo: moderators should be able to close it\n poll = get_object_or_404(\n CommentPoll,\n pk=pk,\n comment__user=request.user\n )\n\n if close:\n close_at = timezone.now()\n else:\n close_at = None\n\n (CommentPoll.objects\n .filter(pk=poll.pk)\n .update(close_at=close_at))\n\n return redirect(request.GET.get('next', poll.get_absolute_url()))", "label_name": "CWE-601", "label": 601}
{"code": "def show_book(book_id):\n entries = calibre_db.get_book_read_archived(book_id, config.config_read_column, allow_show_archived=True)\n if entries:\n read_book = entries[1]\n archived_book = entries[2]\n entry = entries[0]\n entry.read_status = read_book == ub.ReadBook.STATUS_FINISHED\n entry.is_archived = archived_book\n for index in range(0, len(entry.languages)):\n entry.languages[index].language_name = isoLanguages.get_language_name(get_locale(), entry.languages[\n index].lang_code)\n cc = get_cc_columns(filter_config_custom_read=True)\n book_in_shelfs = []\n shelfs = ub.session.query(ub.BookShelf).filter(ub.BookShelf.book_id == book_id).all()\n for sh in shelfs:\n book_in_shelfs.append(sh.shelf)\n\n entry.tags = sort(entry.tags, key=lambda tag: tag.name)\n\n entry.ordered_authors = calibre_db.order_authors([entry])\n\n entry.kindle_list = check_send_to_kindle(entry)\n entry.reader_list = check_read_formats(entry)\n\n entry.audioentries = []\n for media_format in entry.data:\n if media_format.format.lower() in constants.EXTENSIONS_AUDIO:\n entry.audioentries.append(media_format.format.lower())\n\n return render_title_template('detail.html',\n entry=entry,\n cc=cc,\n is_xhr=request.headers.get('X-Requested-With')=='XMLHttpRequest',\n title=entry.title,\n books_shelfs=book_in_shelfs,\n page=\"book\")\n else:\n log.debug(u\"Oops! Selected book title is unavailable. File does not exist or is not accessible\")\n flash(_(u\"Oops! Selected book title is unavailable. File does not exist or is not accessible\"),\n category=\"error\")\n return redirect(url_for(\"web.index\"))", "label_name": "CWE-918", "label": 918}
{"code": " def test_received_headers_finished_expect_continue_true_sent_true(self):\n inst, sock, map = self._makeOneWithMap()\n inst.server = DummyServer()\n preq = DummyParser()\n inst.request = preq\n preq.expect_continue = True\n preq.headers_finished = True\n preq.completed = False\n preq.empty = False\n inst.sent_continue = True\n inst.received(b\"GET / HTTP/1.1\\n\\n\")\n self.assertEqual(inst.request, preq)\n self.assertEqual(inst.server.tasks, [])\n self.assertEqual(sock.sent, b\"\")\n self.assertEqual(inst.sent_continue, True)\n self.assertEqual(preq.completed, False)", "label_name": "CWE-444", "label": 444}
{"code": "def test_remote_cors(app):\n \"\"\"Test endpoint that serves as a proxy to the actual remote track on the cloud\"\"\"\n cloud_track_url = \"http://google.com\"\n\n # GIVEN an initialized app\n # GIVEN a valid user and institute\n with app.test_client() as client:\n # GIVEN that the user could be logged in\n resp = client.get(url_for(\"auto_login\"))\n assert resp.status_code == 200\n\n # WHEN the remote cors endpoint is invoked with an url\n resp = client.get(url_for(\"alignviewers.remote_cors\", remote_url=cloud_track_url))\n # THEN it should return success response\n assert resp.status_code == 200", "label_name": "CWE-918", "label": 918}
{"code": " def test_credits_view_html(self):\n response = self.get_credits(\"html\")\n self.assertEqual(response.status_code, 200)\n self.assertHTMLEqual(\n response.content.decode(),\n \"\\n\"\n \"\\nCzech \\n\"\n ' \\n \\n\"\n \"
\",\n )", "label_name": "CWE-79", "label": 79}
{"code": " def read_fixed_bytes(self, num_bytes: int) -> bytes:\n \"\"\"Reads a fixed number of bytes from the underlying bytestream.\n\n Args:\n num_bytes\n The number of bytes to read.\n\n Returns:\n The read bytes.\n\n Raises:\n EOFError: Fewer than ``num_bytes`` bytes remained in the\n underlying bytestream.\n \"\"\"\n read_bytes = self.read(num_bytes)\n if len(read_bytes) < num_bytes:\n raise EOFError(read_bytes)\n return read_bytes", "label_name": "CWE-209", "label": 209}
{"code": " def __new__(cls, sourceName: str):\n \"\"\"Dispatches to the right subclass.\"\"\"\n if cls != InputSource:\n # Only take control of calls to InputSource(...) itself.\n return super().__new__(cls)\n\n if sourceName == \"-\":\n return StdinInputSource(sourceName)\n if sourceName.startswith(\"https:\"):\n return UrlInputSource(sourceName)\n return FileInputSource(sourceName)", "label_name": "CWE-22", "label": 22}
{"code": "def category_list():\n if current_user.check_visibility(constants.SIDEBAR_CATEGORY):\n if current_user.get_view_property('category', 'dir') == 'desc':\n order = db.Tags.name.desc()\n order_no = 0\n else:\n order = db.Tags.name.asc()\n order_no = 1\n entries = calibre_db.session.query(db.Tags, func.count('books_tags_link.book').label('count')) \\\n .join(db.books_tags_link).join(db.Books).order_by(order).filter(calibre_db.common_filters()) \\\n .group_by(text('books_tags_link.tag')).all()\n charlist = calibre_db.session.query(func.upper(func.substr(db.Tags.name, 1, 1)).label('char')) \\\n .join(db.books_tags_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(func.upper(func.substr(db.Tags.name, 1, 1))).all()\n return render_title_template('list.html', entries=entries, folder='web.books_list', charlist=charlist,\n title=_(u\"Categories\"), page=\"catlist\", data=\"category\", order=order_no)\n else:\n abort(404)", "label_name": "CWE-918", "label": 918}
{"code": " def setUp(self):\n self.mock_resource = MockHttpResource(prefix=PATH_PREFIX)\n self.mock_handler = Mock(\n spec=[\n \"get_displayname\",\n \"set_displayname\",\n \"get_avatar_url\",\n \"set_avatar_url\",\n \"check_profile_query_allowed\",\n ]\n )\n\n self.mock_handler.get_displayname.return_value = defer.succeed(Mock())\n self.mock_handler.set_displayname.return_value = defer.succeed(Mock())\n self.mock_handler.get_avatar_url.return_value = defer.succeed(Mock())\n self.mock_handler.set_avatar_url.return_value = defer.succeed(Mock())\n self.mock_handler.check_profile_query_allowed.return_value = defer.succeed(\n Mock()\n )\n\n hs = yield setup_test_homeserver(\n self.addCleanup,\n \"test\",\n http_client=None,\n resource_for_client=self.mock_resource,\n federation=Mock(),\n federation_client=Mock(),\n profile_handler=self.mock_handler,\n )\n\n async def _get_user_by_req(request=None, allow_guest=False):\n return synapse.types.create_requester(myid)\n\n hs.get_auth().get_user_by_req = _get_user_by_req\n\n profile.register_servlets(hs, self.mock_resource)", "label_name": "CWE-601", "label": 601}
{"code": " def testComplexGET(self):\n data = b\"\"\"\\\nGET /foo/a+%2B%2F%C3%A4%3D%26a%3Aint?d=b+%2B%2F%3D%26b%3Aint&c+%2B%2F%3D%26c%3Aint=6 HTTP/8.4\nFirstName: mickey\nlastname: Mouse\ncontent-length: 10\n\nHello mickey.\n\"\"\"\n parser = self.parser\n self.feed(data)\n self.assertEqual(parser.command, \"GET\")\n self.assertEqual(parser.version, \"8.4\")\n self.assertFalse(parser.empty)\n self.assertEqual(\n parser.headers,\n {\"FIRSTNAME\": \"mickey\", \"LASTNAME\": \"Mouse\", \"CONTENT_LENGTH\": \"10\",},\n )\n # path should be utf-8 encoded\n self.assertEqual(\n tobytes(parser.path).decode(\"utf-8\"),\n text_(b\"/foo/a++/\\xc3\\xa4=&a:int\", \"utf-8\"),\n )\n self.assertEqual(\n parser.query, \"d=b+%2B%2F%3D%26b%3Aint&c+%2B%2F%3D%26c%3Aint=6\"\n )\n self.assertEqual(parser.get_body_stream().getvalue(), b\"Hello mick\")", "label_name": "CWE-444", "label": 444}
{"code": "def is_valid_client_secret(client_secret):\n \"\"\"Validate that a given string matches the client_secret regex defined by the spec\n\n :param client_secret: The client_secret to validate\n :type client_secret: unicode\n\n :return: Whether the client_secret is valid\n :rtype: bool\n \"\"\"\n return client_secret_regex.match(client_secret) is not None", "label_name": "CWE-918", "label": 918}
{"code": "def add_security_headers(resp):\n resp.headers['Content-Security-Policy'] = \"default-src 'self'\" + ''.join([' '+host for host in config.config_trustedhosts.strip().split(',')]) + \" 'unsafe-inline' 'unsafe-eval'; font-src 'self' data:; img-src 'self' data:\"\n if request.endpoint == \"editbook.edit_book\" or config.config_use_google_drive:\n resp.headers['Content-Security-Policy'] += \" *\"\n elif request.endpoint == \"web.read_book\":\n resp.headers['Content-Security-Policy'] += \" blob:;style-src-elem 'self' blob: 'unsafe-inline';\"\n resp.headers['X-Content-Type-Options'] = 'nosniff'\n resp.headers['X-Frame-Options'] = 'SAMEORIGIN'\n resp.headers['X-XSS-Protection'] = '1; mode=block'\n resp.headers['Strict-Transport-Security'] = 'max-age=31536000;'\n return resp", "label_name": "CWE-918", "label": 918}
{"code": " def setUp(self):\n self.mock_federation = Mock()\n self.mock_registry = Mock()\n\n self.query_handlers = {}\n\n def register_query_handler(query_type, handler):\n self.query_handlers[query_type] = handler\n\n self.mock_registry.register_query_handler = register_query_handler\n\n hs = yield setup_test_homeserver(\n self.addCleanup,\n http_client=None,\n resource_for_federation=Mock(),\n federation_client=self.mock_federation,\n federation_server=Mock(),\n federation_registry=self.mock_registry,\n )\n\n self.store = hs.get_datastore()\n\n self.frank = UserID.from_string(\"@1234ABCD:test\")\n self.bob = UserID.from_string(\"@4567:test\")\n self.alice = UserID.from_string(\"@alice:remote\")\n\n yield defer.ensureDeferred(self.store.create_profile(self.frank.localpart))\n\n self.handler = hs.get_profile_handler()\n self.hs = hs", "label_name": "CWE-601", "label": 601}
{"code": "def check_valid_read_column(column):\n if column != \"0\":\n if not calibre_db.session.query(db.Custom_Columns).filter(db.Custom_Columns.id == column) \\\n .filter(and_(db.Custom_Columns.datatype == 'bool', db.Custom_Columns.mark_for_delete == 0)).all():\n return False\n return True", "label_name": "CWE-918", "label": 918}
{"code": "def feed_unread_books():\n off = request.args.get(\"offset\") or 0\n result, pagination = render_read_books(int(off) / (int(config.config_books_per_page)) + 1, False, True)\n return render_xml_template('feed.xml', entries=result, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": "def screenshotcommentcounts(context, screenshot):\n \"\"\"\n Returns a JSON array of current comments for a screenshot.\n\n Each entry in the array has a dictionary containing the following keys:\n\n =========== ==================================================\n Key Description\n =========== ==================================================\n text The text of the comment\n localdraft True if this is the current user's draft comment\n x The X location of the comment's region\n y The Y location of the comment's region\n w The width of the comment's region\n h The height of the comment's region\n =========== ==================================================\n \"\"\"\n comments = {}\n user = context.get('user', None)\n\n for comment in screenshot.comments.all():\n review = get_object_or_none(comment.review)\n\n if review and (review.public or review.user == user):\n position = '%dx%d+%d+%d' % (comment.w, comment.h, \\\n comment.x, comment.y)\n\n comments.setdefault(position, []).append({\n 'id': comment.id,\n 'text': comment.text,\n 'user': {\n 'username': review.user.username,\n 'name': review.user.get_full_name() or review.user.username,\n },\n 'url': comment.get_review_url(),\n 'localdraft' : review.user == user and \\\n not review.public,\n 'x' : comment.x,\n 'y' : comment.y,\n 'w' : comment.w,\n 'h' : comment.h,\n })\n\n return simplejson.dumps(comments)", "label_name": "CWE-79", "label": 79}
{"code": "def parse_soap_enveloped_saml(text, body_class, header_class=None):\n \"\"\"Parses a SOAP enveloped SAML thing and returns header parts and body\n\n :param text: The SOAP object as XML\n :return: header parts and body as saml.samlbase instances\n \"\"\"\n envelope = ElementTree.fromstring(text)\n assert envelope.tag == '{%s}Envelope' % NAMESPACE\n\n # print(len(envelope))\n body = None\n header = {}\n for part in envelope:\n # print(\">\",part.tag)\n if part.tag == '{%s}Body' % NAMESPACE:\n for sub in part:\n try:\n body = saml2.create_class_from_element_tree(body_class, sub)\n except Exception:\n raise Exception(\n \"Wrong body type (%s) in SOAP envelope\" % sub.tag)\n elif part.tag == '{%s}Header' % NAMESPACE:\n if not header_class:\n raise Exception(\"Header where I didn't expect one\")\n # print(\"--- HEADER ---\")\n for sub in part:\n # print(\">>\",sub.tag)\n for klass in header_class:\n # print(\"?{%s}%s\" % (klass.c_namespace,klass.c_tag))\n if sub.tag == \"{%s}%s\" % (klass.c_namespace, klass.c_tag):\n header[sub.tag] = \\\n saml2.create_class_from_element_tree(klass, sub)\n break\n\n return body, header", "label_name": "CWE-611", "label": 611}
{"code": " def connect(self, port=None):\n ''' connect to the chroot; nothing to do here '''\n\n vvv(\"THIS IS A LOCAL CHROOT DIR\", host=self.jail)\n\n return self", "label_name": "CWE-59", "label": 59}
{"code": " def test_filelike_http10(self):\n to_send = \"GET /filelike HTTP/1.0\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def test_value_from_datadict(self, client, upload_file):\n print(storage.location)\n with open(upload_file) as f:\n uploaded_file = storage.save(\"test.jpg\", f)\n response = client.post(\n reverse(\"upload\"),\n {\n \"file\": json.dumps([uploaded_file]),\n \"s3file\": '[\"file\"]',\n },\n )\n\n assert response.status_code == 201", "label_name": "CWE-22", "label": 22}
{"code": " def recovery_parser(xml):\n parser = XMLParser(recover=True)\n return parse(BytesIO(xml), parser)", "label_name": "CWE-611", "label": 611}
{"code": " def emit(self, s, depth, reflow=True):\n # XXX reflow long lines?\n if reflow:\n lines = reflow_lines(s, depth)\n else:\n lines = [s]\n for line in lines:\n line = (\" \" * TABSIZE * depth) + line + \"\\n\"\n self.file.write(line)", "label_name": "CWE-125", "label": 125}
{"code": " def MD5(self,data:str):\n sha = hashlib.md5(bytes(data.encode()))\n hash = str(sha.digest())\n return self.__Salt(hash,salt=self.salt)", "label_name": "CWE-328", "label": 328}
{"code": "def mysql_insensitive_contains(field: Field, value: str) -> Criterion:\n return functions.Upper(functions.Cast(field, SqlTypes.CHAR)).like(functions.Upper(f\"%{value}%\"))", "label_name": "CWE-89", "label": 89}
{"code": " def formatType(self):\n format_type = self.type.lower()\n if format_type == 'amazon':\n return u\"Amazon\"\n elif format_type.startswith(\"amazon_\"):\n return u\"Amazon.{0}\".format(format_type[7:])\n elif format_type == \"isbn\":\n return u\"ISBN\"\n elif format_type == \"doi\":\n return u\"DOI\"\n elif format_type == \"douban\":\n return u\"Douban\"\n elif format_type == \"goodreads\":\n return u\"Goodreads\"\n elif format_type == \"babelio\":\n return u\"Babelio\"\n elif format_type == \"google\":\n return u\"Google Books\"\n elif format_type == \"kobo\":\n return u\"Kobo\"\n elif format_type == \"litres\":\n return u\"\u041b\u0438\u0442\u0420\u0435\u0441\"\n elif format_type == \"issn\":\n return u\"ISSN\"\n elif format_type == \"isfdb\":\n return u\"ISFDB\"\n if format_type == \"lubimyczytac\":\n return u\"Lubimyczytac\"\n else:\n return self.type", "label_name": "CWE-918", "label": 918}
{"code": " async def customize_global(self, ctx, command: str.lower, *, response: str = None):\r\n \"\"\"\r\n Globally customize the response to an action.\r\n\r\n You can use {0} or {user} to dynamically replace with the specified target of the action.\r\n Formats like {0.name} or {0.mention} can also be used.\r\n \"\"\"\r\n if not response:\r\n await self.config.clear_raw(\"custom\", command)\r\n else:\r\n await self.config.set_raw(\"custom\", command, value=response)\r\n await ctx.tick()\r", "label_name": "CWE-502", "label": 502}
{"code": " def get_current_phase(self, requested_phase_identifier):\n found = False\n for phase in self.phases:\n if phase.is_valid():\n phase.process()\n if found or not requested_phase_identifier or requested_phase_identifier == phase.identifier:\n found = True # We're at or past the requested phase\n if not phase.should_skip():\n return phase\n if not phase.should_skip() and not phase.is_valid(): # A past phase is not valid, that's the current one\n return phase\n raise Http404(\"Error! Phase with identifier `%s` not found.\" % requested_phase_identifier) # pragma: no cover", "label_name": "CWE-79", "label": 79}
{"code": "def make_sydent(test_config={}):\n \"\"\"Create a new sydent\n\n Args:\n test_config (dict): any configuration variables for overriding the default sydent\n config\n \"\"\"\n # Use an in-memory SQLite database. Note that the database isn't cleaned up between\n # tests, so by default the same database will be used for each test if changed to be\n # a file on disk.\n if 'db' not in test_config:\n test_config['db'] = {'db.file': ':memory:'}\n else:\n test_config['db'].setdefault('db.file', ':memory:')\n\n reactor = MemoryReactorClock()\n return Sydent(reactor=reactor, cfg=parse_config_dict(test_config))", "label_name": "CWE-918", "label": 918}
{"code": "def whitelist(allow_guest=False, xss_safe=False, methods=None):\n\t\"\"\"\n\tDecorator for whitelisting a function and making it accessible via HTTP.\n\tStandard request will be `/api/method/[path.to.method]`\n\n\t:param allow_guest: Allow non logged-in user to access this method.\n\t:param methods: Allowed http method to access the method.\n\n\tUse as:\n\n\t\t@frappe.whitelist()\n\t\tdef myfunc(param1, param2):\n\t\t\tpass\n\t\"\"\"\n\n\tif not methods:\n\t\tmethods = ['GET', 'POST', 'PUT', 'DELETE']\n\n\tdef innerfn(fn):\n\t\tglobal whitelisted, guest_methods, xss_safe_methods, allowed_http_methods_for_whitelisted_func\n\t\twhitelisted.append(fn)\n\n\t\tallowed_http_methods_for_whitelisted_func[fn] = methods\n\n\t\tif allow_guest:\n\t\t\tguest_methods.append(fn)\n\n\t\t\tif xss_safe:\n\t\t\t\txss_safe_methods.append(fn)\n\n\t\treturn fn\n\n\treturn innerfn", "label_name": "CWE-79", "label": 79}
{"code": " def test_without_crlf(self):\n data = \"Echo\\nthis\\r\\nplease\"\n s = tobytes(\n \"GET / HTTP/1.0\\n\"\n \"Connection: close\\n\"\n \"Content-Length: %d\\n\"\n \"\\n\"\n \"%s\" % (len(data), data)\n )\n self.connect()\n self.sock.send(s)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(int(echo.content_length), len(data))\n self.assertEqual(len(echo.body), len(data))\n self.assertEqual(echo.body, tobytes(data))", "label_name": "CWE-444", "label": 444}
{"code": "def edit(request, user_id):\n user = get_object_or_404(User, pk=user_id)\n uform = UserForm(data=post_data(request), instance=user)\n form = UserProfileForm(data=post_data(request), instance=user.st)\n if is_post(request) and all([uform.is_valid(), form.is_valid()]):\n uform.save()\n form.save()\n messages.info(request, _(\"This profile has been updated!\"))\n return redirect(request.GET.get(\"next\", request.get_full_path()))\n return render(\n request=request,\n template_name='spirit/user/admin/edit.html',\n context={'form': form, 'uform': uform})", "label_name": "CWE-601", "label": 601}
{"code": " def test_received_control_line_finished_all_chunks_not_received(self):\n buf = DummyBuffer()\n inst = self._makeOne(buf)\n result = inst.received(b\"a;discard\\n\")\n self.assertEqual(inst.control_line, b\"\")\n self.assertEqual(inst.chunk_remainder, 10)\n self.assertEqual(inst.all_chunks_received, False)\n self.assertEqual(result, 10)\n self.assertEqual(inst.completed, False)", "label_name": "CWE-444", "label": 444}
{"code": "def check_read_formats(entry):\n EXTENSIONS_READER = {'TXT', 'PDF', 'EPUB', 'CBZ', 'CBT', 'CBR', 'DJVU'}\n bookformats = list()\n if len(entry.data):\n for ele in iter(entry.data):\n if ele.format.upper() in EXTENSIONS_READER:\n bookformats.append(ele.format.lower())\n return bookformats", "label_name": "CWE-918", "label": 918}
{"code": " def run_query(self, query, user):\n query = parse_query(query)\n\n if not isinstance(query, dict):\n raise QueryParseError(\n \"Query should be a YAML object describing the URL to query.\"\n )\n\n if \"url\" not in query:\n raise QueryParseError(\"Query must include 'url' option.\")\n\n if is_private_address(query[\"url\"]) and settings.ENFORCE_PRIVATE_ADDRESS_BLOCK:\n raise Exception(\"Can't query private addresses.\")\n\n method = query.get(\"method\", \"get\")\n request_options = project(query, (\"params\", \"headers\", \"data\", \"auth\", \"json\"))\n\n fields = query.get(\"fields\")\n path = query.get(\"path\")\n\n if isinstance(request_options.get(\"auth\", None), list):\n request_options[\"auth\"] = tuple(request_options[\"auth\"])\n elif self.configuration.get(\"username\") or self.configuration.get(\"password\"):\n request_options[\"auth\"] = (\n self.configuration.get(\"username\"),\n self.configuration.get(\"password\"),\n )\n\n if method not in (\"get\", \"post\"):\n raise QueryParseError(\"Only GET or POST methods are allowed.\")\n\n if fields and not isinstance(fields, list):\n raise QueryParseError(\"'fields' needs to be a list.\")\n\n response, error = self.get_response(\n query[\"url\"], http_method=method, **request_options\n )\n\n if error is not None:\n return None, error\n\n data = json_dumps(parse_json(response.json(), path, fields))\n\n if data:\n return data, None\n else:\n return None, \"Got empty response from '{}'.\".format(query[\"url\"])", "label_name": "CWE-918", "label": 918}
{"code": "def mark_all_as_read(request):\n (TopicNotification.objects\n .for_access(request.user)\n .filter(is_read=False)\n .update(is_read=True))\n return redirect(request.POST.get(\n 'next', reverse('spirit:topic:notification:index')))", "label_name": "CWE-601", "label": 601}
{"code": " def generate_config_section(self, config_dir_path, server_name, **kwargs):\n return \"\"\"\\\n ## Federation ##\n\n # Restrict federation to the following whitelist of domains.\n # N.B. we recommend also firewalling your federation listener to limit\n # inbound federation traffic as early as possible, rather than relying\n # purely on this application-layer restriction. If not specified, the\n # default is to whitelist everything.\n #\n #federation_domain_whitelist:\n # - lon.example.com\n # - nyc.example.com\n # - syd.example.com\n\n # Prevent federation requests from being sent to the following\n # blacklist IP address CIDR ranges. If this option is not specified, or\n # specified with an empty list, no ip range blacklist will be enforced.\n #\n # As of Synapse v1.4.0 this option also affects any outbound requests to identity\n # servers provided by user input.\n #\n # (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly\n # listed here, since they correspond to unroutable addresses.)\n #\n federation_ip_range_blacklist:\n - '127.0.0.0/8'\n - '10.0.0.0/8'\n - '172.16.0.0/12'\n - '192.168.0.0/16'\n - '100.64.0.0/10'\n - '169.254.0.0/16'\n - '::1/128'\n - 'fe80::/64'\n - 'fc00::/7'\n\n # Report prometheus metrics on the age of PDUs being sent to and received from\n # the following domains. This can be used to give an idea of \"delay\" on inbound\n # and outbound federation, though be aware that any delay can be due to problems\n # at either end or with the intermediate network.\n #\n # By default, no domains are monitored in this way.\n #\n #federation_metrics_domains:\n # - matrix.org\n # - example.com\n \"\"\"", "label_name": "CWE-601", "label": 601}
{"code": " def count(cls, **kwargs):\n \"\"\"Return a count of server side resources given\n filtering arguments in kwargs.\n \"\"\"\n url = urljoin(recurly.base_uri(), cls.collection_path)\n if kwargs:\n url = '%s?%s' % (url, urlencode(kwargs))\n return Page.count_for_url(url)", "label_name": "CWE-918", "label": 918}
{"code": "def check_prereg_key_and_redirect(\n request: HttpRequest, confirmation_key: str, full_name: Optional[str] = REQ(default=None)", "label_name": "CWE-613", "label": 613}
{"code": " def test_filename(self):\n tmpname = mktemp('', 'mmap')\n fp = memmap(tmpname, dtype=self.dtype, mode='w+',\n shape=self.shape)\n abspath = os.path.abspath(tmpname)\n fp[:] = self.data[:]\n self.assertEqual(abspath, fp.filename)\n b = fp[:1]\n self.assertEqual(abspath, b.filename)\n del b\n del fp\n os.unlink(tmpname)", "label_name": "CWE-59", "label": 59}
{"code": " async def customize(self, ctx, command: str.lower, *, response: str = None):\r\n \"\"\"\r\n Customize the response to an action.\r\n\r\n You can use {0} or {user} to dynamically replace with the specified target of the action.\r\n Formats like {0.name} or {0.mention} can also be used.\r\n \"\"\"\r\n if not response:\r\n await self.config.guild(ctx.guild).clear_raw(\"custom\", command)\r\n else:\r\n await self.config.guild(ctx.guild).set_raw(\"custom\", command, value=response)\r\n await ctx.tick()\r", "label_name": "CWE-502", "label": 502}
{"code": " def test_notfilelike_nocl_http10(self):\n to_send = \"GET /notfilelike_nocl HTTP/1.0\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)\n # connection has been closed (no content-length)\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def test_get_files_from_storage(self):\n content = b\"test_get_files_from_storage\"\n name = storage.save(\n \"tmp/s3file/test_get_files_from_storage\", ContentFile(content)\n )\n files = S3FileMiddleware.get_files_from_storage(\n [os.path.join(storage.aws_location, name)]\n )\n file = next(files)\n assert file.read() == content", "label_name": "CWE-22", "label": 22}
{"code": "def test_unicorn_render_context_variable():\n token = Token(\n TokenType.TEXT,\n \"unicorn 'tests.templatetags.test_unicorn_render.FakeComponentKwargs' test_kwarg=test_var.nested\",\n )\n unicorn_node = unicorn(None, token)\n context = {\"test_var\": {\"nested\": \"variable!\"}}\n actual = unicorn_node.render(context)\n\n assert \"->variable!<-\" in actual", "label_name": "CWE-79", "label": 79}
{"code": " def _parse_a_camel_date_time(data: Dict[str, Any]) -> Union[datetime, date]:\n a_camel_date_time: Union[datetime, date]\n try:\n a_camel_date_time = datetime.fromisoformat(d[\"aCamelDateTime\"])\n\n return a_camel_date_time\n except:\n pass\n a_camel_date_time = date.fromisoformat(d[\"aCamelDateTime\"])\n\n return a_camel_date_time", "label_name": "CWE-94", "label": 94}
{"code": " def __init__(self, expire_on_commit=True):\n \"\"\" Initialize a new CalibreDB session\n \"\"\"\n self.session = None\n if self._init:\n self.initSession(expire_on_commit)\n\n self.instances.add(self)", "label_name": "CWE-918", "label": 918}
{"code": "def save_cover_from_url(url, book_path):\n try:\n if not cli.allow_localhost:\n # 127.0.x.x, localhost, [::1], [::ffff:7f00:1]\n ip = socket.getaddrinfo(urlparse(url).hostname, 0)[0][4][0]\n if ip.startswith(\"127.\") or ip.startswith('::ffff:7f') or ip == \"::1\" or ip == \"0.0.0.0\" or ip == \"::\":\n log.error(\"Localhost was accessed for cover upload\")\n return False, _(\"You are not allowed to access localhost for cover uploads\")\n img = requests.get(url, timeout=(10, 200), allow_redirects=False) # ToDo: Error Handling\n img.raise_for_status()\n return save_cover(img, book_path)\n except (socket.gaierror,\n requests.exceptions.HTTPError,\n requests.exceptions.ConnectionError,\n requests.exceptions.Timeout) as ex:\n log.info(u'Cover Download Error %s', ex)\n return False, _(\"Error Downloading Cover\")\n except MissingDelegateError as ex:\n log.info(u'File Format Error %s', ex)\n return False, _(\"Cover Format Error\")", "label_name": "CWE-918", "label": 918}
{"code": " def test_big_arrays(self):\n L = (1 << 31) + 100000\n tmp = mktemp(suffix='.npz')\n a = np.empty(L, dtype=np.uint8)\n np.savez(tmp, a=a)\n del a\n npfile = np.load(tmp)\n a = npfile['a']\n npfile.close()\n os.remove(tmp)", "label_name": "CWE-59", "label": 59}
{"code": "def org_login(org_slug):\n session[\"org_slug\"] = current_org.slug\n return redirect(url_for(\".authorize\", next=request.args.get(\"next\", None)))", "label_name": "CWE-601", "label": 601}
{"code": " def test_received_chunked_completed_sets_content_length(self):\n data = b\"\"\"\\\nGET /foobar HTTP/1.1\nTransfer-Encoding: chunked\nX-Foo: 1\n\n20;\\r\\n\nThis string has 32 characters\\r\\n\n0\\r\\n\\r\\n\"\"\"\n result = self.parser.received(data)\n self.assertEqual(result, 58)\n data = data[result:]\n result = self.parser.received(data)\n self.assertTrue(self.parser.completed)\n self.assertTrue(self.parser.error is None)\n self.assertEqual(self.parser.headers[\"CONTENT_LENGTH\"], \"32\")", "label_name": "CWE-444", "label": 444}
{"code": "def list_users():\n off = int(request.args.get(\"offset\") or 0)\n limit = int(request.args.get(\"limit\") or 10)\n search = request.args.get(\"search\")\n sort = request.args.get(\"sort\", \"id\")\n state = None\n if sort == \"state\":\n state = json.loads(request.args.get(\"state\", \"[]\"))\n else:\n if sort not in ub.User.__table__.columns.keys():\n sort = \"id\"\n order = request.args.get(\"order\", \"\").lower()\n\n if sort != \"state\" and order:\n order = text(sort + \" \" + order)\n elif not state:\n order = ub.User.id.asc()\n\n all_user = ub.session.query(ub.User)\n if not config.config_anonbrowse:\n all_user = all_user.filter(ub.User.role.op('&')(constants.ROLE_ANONYMOUS) != constants.ROLE_ANONYMOUS)\n\n total_count = filtered_count = all_user.count()\n\n if search:\n all_user = all_user.filter(or_(func.lower(ub.User.name).ilike(\"%\" + search + \"%\"),\n func.lower(ub.User.kindle_mail).ilike(\"%\" + search + \"%\"),\n func.lower(ub.User.email).ilike(\"%\" + search + \"%\")))\n if state:\n users = calibre_db.get_checkbox_sorted(all_user.all(), state, off, limit, request.args.get(\"order\", \"\").lower())\n else:\n users = all_user.order_by(order).offset(off).limit(limit).all()\n if search:\n filtered_count = len(users)\n\n for user in users:\n if user.default_language == \"all\":\n user.default = _(\"All\")\n else:\n user.default = LC.parse(user.default_language).get_language_name(get_locale())\n\n table_entries = {'totalNotFiltered': total_count, 'total': filtered_count, \"rows\": users}\n js_list = json.dumps(table_entries, cls=db.AlchemyEncoder)\n response = make_response(js_list)\n response.headers[\"Content-Type\"] = \"application/json; charset=utf-8\"\n return response", "label_name": "CWE-918", "label": 918}
{"code": "def insensitive_contains(field: Term, value: str) -> Criterion:\n return Upper(field).like(Upper(f\"%{value}%\"))", "label_name": "CWE-89", "label": 89}
{"code": "def get_paths(base_path: pathlib.Path):\n data_file = pathlib.Path(str(base_path) + \".data\")\n metadata_file = pathlib.Path(str(base_path) + \".meta\")\n\n return data_file, metadata_file", "label_name": "CWE-22", "label": 22}
{"code": "def set_bookmark(book_id, book_format):\n bookmark_key = request.form[\"bookmark\"]\n ub.session.query(ub.Bookmark).filter(and_(ub.Bookmark.user_id == int(current_user.id),\n ub.Bookmark.book_id == book_id,\n ub.Bookmark.format == book_format)).delete()\n if not bookmark_key:\n ub.session_commit()\n return \"\", 204\n\n lbookmark = ub.Bookmark(user_id=current_user.id,\n book_id=book_id,\n format=book_format,\n bookmark_key=bookmark_key)\n ub.session.merge(lbookmark)\n ub.session_commit(\"Bookmark for user {} in book {} created\".format(current_user.id, book_id))\n return \"\", 201", "label_name": "CWE-918", "label": 918}
{"code": "def save_cover_from_url(url, book_path):\n try:\n if not cli.allow_localhost:\n # 127.0.x.x, localhost, [::1], [::ffff:7f00:1]\n ip = socket.getaddrinfo(urlparse(url).hostname, 0)[0][4][0]\n if ip.startswith(\"127.\") or ip.startswith('::ffff:7f') or ip == \"::1\":\n log.error(\"Localhost was accessed for cover upload\")\n return False, _(\"You are not allowed to access localhost for cover uploads\")\n img = requests.get(url, timeout=(10, 200)) # ToDo: Error Handling\n img.raise_for_status()\n return save_cover(img, book_path)\n except (socket.gaierror,\n requests.exceptions.HTTPError,\n requests.exceptions.ConnectionError,\n requests.exceptions.Timeout) as ex:\n log.info(u'Cover Download Error %s', ex)\n return False, _(\"Error Downloading Cover\")\n except MissingDelegateError as ex:\n log.info(u'File Format Error %s', ex)\n return False, _(\"Cover Format Error\")", "label_name": "CWE-918", "label": 918}
{"code": " def test_received_nonsense_with_double_cr(self):\n data = b\"\"\"\\\nHTTP/1.0 GET /foobar\n\n\n\"\"\"\n result = self.parser.received(data)\n self.assertEqual(result, 22)\n self.assertTrue(self.parser.completed)\n self.assertEqual(self.parser.headers, {})", "label_name": "CWE-444", "label": 444}
{"code": " def test_scatter_ops_even_partition(self, op):\n v = variables_lib.Variable(array_ops.zeros((30, 1)))\n sparse_delta = ops.IndexedSlices(\n values=constant_op.constant([[0.], [1.], [2.], [3.], [4.]]),\n indices=constant_op.constant([0, 10, 12, 21, 22]))\n\n v0 = variables_lib.Variable(array_ops.zeros((10, 1)))\n v1 = variables_lib.Variable(array_ops.zeros((10, 1)))\n v2 = variables_lib.Variable(array_ops.zeros((10, 1)))\n sv = sharded_variable.ShardedVariable([v0, v1, v2])\n\n getattr(v, op)(sparse_delta, name='scatter_v')\n getattr(sv, op)(sparse_delta, name='scatter_sv')\n self.assertAllEqual(v, ops.convert_to_tensor(sv))\n\n @def_function.function\n def func():\n getattr(v, op)(sparse_delta, name='scatter_v')\n getattr(sv, op)(sparse_delta, name='scatter_sv')\n\n func()\n self.assertAllEqual(v, ops.convert_to_tensor(sv))", "label_name": "CWE-369", "label": 369}
{"code": " def test_underscore_traversal(self):\n t = self.folder.t\n\n t.write('
')\n with self.assertRaises(NotFound):\n t()\n\n t.write('
')\n with self.assertRaises(NotFound):\n t()\n\n t.write('')\n with self.assertRaises(NotFound):\n t()", "label_name": "CWE-22", "label": 22}
{"code": "def _inject_net_into_fs(net, fs, execute=None):\n \"\"\"Inject /etc/network/interfaces into the filesystem rooted at fs.\n\n net is the contents of /etc/network/interfaces.\n \"\"\"\n netdir = os.path.join(os.path.join(fs, 'etc'), 'network')\n utils.execute('mkdir', '-p', netdir, run_as_root=True)\n utils.execute('chown', 'root:root', netdir, run_as_root=True)\n utils.execute('chmod', 755, netdir, run_as_root=True)\n netfile = os.path.join(netdir, 'interfaces')\n utils.execute('tee', netfile, process_input=net, run_as_root=True)", "label_name": "CWE-22", "label": 22}
{"code": " def test_process_request__no_location(self, rf, settings):\n settings.AWS_LOCATION = \"\"\n uploaded_file = SimpleUploadedFile(\"uploaded_file.txt\", b\"uploaded\")\n request = rf.post(\"/\", data={\"file\": uploaded_file})\n S3FileMiddleware(lambda x: None)(request)\n assert request.FILES.getlist(\"file\")\n assert request.FILES.get(\"file\").read() == b\"uploaded\"\n\n storage.save(\"tmp/s3file/s3_file.txt\", ContentFile(b\"s3file\"))\n request = rf.post(\n \"/\", data={\"file\": \"tmp/s3file/s3_file.txt\", \"s3file\": \"file\"}\n )\n S3FileMiddleware(lambda x: None)(request)\n assert request.FILES.getlist(\"file\")\n assert request.FILES.get(\"file\").read() == b\"s3file\"", "label_name": "CWE-22", "label": 22}
{"code": "def publisher_list():\n if current_user.get_view_property('publisher', 'dir') == 'desc':\n order = db.Publishers.name.desc()\n order_no = 0\n else:\n order = db.Publishers.name.asc()\n order_no = 1\n if current_user.check_visibility(constants.SIDEBAR_PUBLISHER):\n entries = calibre_db.session.query(db.Publishers, func.count('books_publishers_link.book').label('count')) \\\n .join(db.books_publishers_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(text('books_publishers_link.publisher')).order_by(order).all()\n charlist = calibre_db.session.query(func.upper(func.substr(db.Publishers.name, 1, 1)).label('char')) \\\n .join(db.books_publishers_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(func.upper(func.substr(db.Publishers.name, 1, 1))).all()\n return render_title_template('list.html', entries=entries, folder='web.books_list', charlist=charlist,\n title=_(u\"Publishers\"), page=\"publisherlist\", data=\"publisher\", order=order_no)\n else:\n abort(404)", "label_name": "CWE-918", "label": 918}
{"code": " def test_can_read_token_from_headers(self):\n \"\"\"Tests that Sydent correct extracts an auth token from request headers\"\"\"\n self.sydent.run()\n\n request, _ = make_request(\n self.sydent.reactor, \"GET\", \"/_matrix/identity/v2/hash_details\"\n )\n request.requestHeaders.addRawHeader(\n b\"Authorization\", b\"Bearer \" + self.test_token.encode(\"ascii\")\n )\n\n token = tokenFromRequest(request)\n\n self.assertEqual(token, self.test_token)", "label_name": "CWE-918", "label": 918}
{"code": "def config_basic(request):\n form = BasicConfigForm(data=post_data(request))\n if is_post(request) and form.is_valid():\n form.save()\n messages.info(request, _(\"Settings updated!\"))\n return redirect(request.GET.get(\"next\", request.get_full_path()))\n return render(\n request=request,\n template_name='spirit/admin/config_basic.html',\n context={'form': form})", "label_name": "CWE-601", "label": 601}
{"code": "def add_security_headers(resp):\n resp.headers['Content-Security-Policy'] = \"default-src 'self'\" + ''.join([' '+host for host in config.config_trustedhosts.strip().split(',')]) + \" 'unsafe-inline' 'unsafe-eval'; font-src 'self' data:; img-src 'self' data:\"\n if request.endpoint == \"editbook.edit_book\" or config.config_use_google_drive:\n resp.headers['Content-Security-Policy'] += \" *\"\n elif request.endpoint == \"web.read_book\":\n resp.headers['Content-Security-Policy'] += \" blob:;style-src-elem 'self' blob: 'unsafe-inline';\"\n resp.headers['X-Content-Type-Options'] = 'nosniff'\n resp.headers['X-Frame-Options'] = 'SAMEORIGIN'\n resp.headers['X-XSS-Protection'] = '1; mode=block'\n resp.headers['Strict-Transport-Security'] = 'max-age=31536000;'\n return resp", "label_name": "CWE-918", "label": 918}
{"code": "def parse(source, filename='', mode='exec'):\n \"\"\"\n Parse the source into an AST node.\n Equivalent to compile(source, filename, mode, PyCF_ONLY_AST).\n \"\"\"\n return compile(source, filename, mode, PyCF_ONLY_AST)", "label_name": "CWE-125", "label": 125}
{"code": "def contains(field: Term, value: str) -> Criterion:\n return field.like(f\"%{value}%\")", "label_name": "CWE-89", "label": 89}
{"code": " def make_homeserver(self, reactor, clock):\n self.push_attempts = []\n\n m = Mock()\n\n def post_json_get_json(url, body):\n d = Deferred()\n self.push_attempts.append((d, url, body))\n return make_deferred_yieldable(d)\n\n m.post_json_get_json = post_json_get_json\n\n config = self.default_config()\n config[\"start_pushers\"] = True\n\n hs = self.setup_test_homeserver(config=config, proxied_http_client=m)\n\n return hs", "label_name": "CWE-601", "label": 601}
{"code": " def update(self, **kwargs):\n consumer_id = load_consumer_id(self.context)\n if not consumer_id:\n self.prompt.render_failure_message(\"This consumer is not registered to the Pulp server.\")\n return\n\n delta = dict([(k, v) for k, v in kwargs.items() if v is not None])\n if 'note' in delta.keys():\n if delta['note']:\n delta['notes'] = args_to_notes_dict(kwargs['note'], include_none=False)\n delta.pop('note')\n # convert display-name to display_name\n key = 'display-name'\n if key in delta:\n v = delta.pop(key)\n key = key.replace('-', '_')\n delta[key] = v\n\n if kwargs.get(OPTION_EXCHANGE_KEYS.keyword):\n path = self.context.config['authentication']['rsa_pub']\n fp = open(path)\n try:\n delta['rsa_pub'] = fp.read()\n finally:\n fp.close()\n\n try:\n self.context.server.consumer.update(consumer_id, delta)\n self.prompt.render_success_message('Consumer [%s] successfully updated' % consumer_id)\n if not kwargs.get(OPTION_EXCHANGE_KEYS.keyword):\n return\n try:\n update_server_key(self.context.config)\n except Exception, e:\n msg = _('Download server RSA key failed [%(e)s]' % {'e': e})\n self.prompt.render_failure_message(msg)\n except NotFoundException:\n self.prompt.write('Consumer [%s] does not exist on the server' % consumer_id, tag='not-found')", "label_name": "CWE-295", "label": 295}
{"code": " async def check_credentials(username, password):\n return password == \"iloveyou\"", "label_name": "CWE-203", "label": 203}
{"code": "def edit_book_languages(languages, book, upload=False, invalid=None):\n input_languages = languages.split(',')\n unknown_languages = []\n if not upload:\n input_l = isoLanguages.get_language_codes(get_locale(), input_languages, unknown_languages)\n else:\n input_l = isoLanguages.get_valid_language_codes(get_locale(), input_languages, unknown_languages)\n for l in unknown_languages:\n log.error(\"'%s' is not a valid language\", l)\n if isinstance(invalid, list):\n invalid.append(l)\n else:\n raise ValueError(_(u\"'%(langname)s' is not a valid language\", langname=l))\n # ToDo: Not working correct\n if upload and len(input_l) == 1:\n # If the language of the file is excluded from the users view, it's not imported, to allow the user to view\n # the book it's language is set to the filter language\n if input_l[0] != current_user.filter_language() and current_user.filter_language() != \"all\":\n input_l[0] = calibre_db.session.query(db.Languages). \\\n filter(db.Languages.lang_code == current_user.filter_language()).first().lang_code\n # Remove duplicates\n input_l = helper.uniq(input_l)\n return modify_database_object(input_l, book.languages, db.Languages, calibre_db.session, 'languages')", "label_name": "CWE-918", "label": 918}
{"code": "def check_valid_restricted_column(column):\n if column != \"0\":\n if not calibre_db.session.query(db.Custom_Columns).filter(db.Custom_Columns.id == column) \\\n .filter(and_(db.Custom_Columns.datatype == 'text', db.Custom_Columns.mark_for_delete == 0)).all():\n return False\n return True", "label_name": "CWE-918", "label": 918}
{"code": " def get(cls, uuid):\n \"\"\"Return a `Resource` instance of this class identified by\n the given code or UUID.\n\n Only `Resource` classes with specified `member_path` attributes\n can be directly requested with this method.\n\n \"\"\"\n url = urljoin(recurly.base_uri(), cls.member_path % (uuid,))\n resp, elem = cls.element_for_url(url)\n return cls.from_element(elem)", "label_name": "CWE-918", "label": 918}
{"code": "def parse_soap_enveloped_saml_thingy(text, expected_tags):\n \"\"\"Parses a SOAP enveloped SAML thing and returns the thing as\n a string.\n\n :param text: The SOAP object as XML string\n :param expected_tags: What the tag of the SAML thingy is expected to be.\n :return: SAML thingy as a string\n \"\"\"\n envelope = ElementTree.fromstring(text)\n\n # Make sure it's a SOAP message\n assert envelope.tag == '{%s}Envelope' % soapenv.NAMESPACE\n\n assert len(envelope) >= 1\n body = None\n for part in envelope:\n if part.tag == '{%s}Body' % soapenv.NAMESPACE:\n assert len(part) == 1\n body = part\n break\n\n if body is None:\n return \"\"\n\n saml_part = body[0]\n if saml_part.tag in expected_tags:\n return ElementTree.tostring(saml_part, encoding=\"UTF-8\")\n else:\n raise WrongMessageType(\"Was '%s' expected one of %s\" % (saml_part.tag,\n expected_tags))", "label_name": "CWE-611", "label": 611}
{"code": " def get_json(self, uri):\n \"\"\"Make a GET request to an endpoint returning JSON and parse result\n\n :param uri: The URI to make a GET request to.\n :type uri: unicode\n\n :return: A deferred containing JSON parsed into a Python object.\n :rtype: twisted.internet.defer.Deferred[dict[any, any]]\n \"\"\"\n logger.debug(\"HTTP GET %s\", uri)\n\n response = yield self.agent.request(\n b\"GET\",\n uri.encode(\"utf8\"),\n )\n body = yield readBody(response)\n try:\n # json.loads doesn't allow bytes in Python 3.5\n json_body = json.loads(body.decode(\"UTF-8\"))\n except Exception as e:\n logger.exception(\"Error parsing JSON from %s\", uri)\n raise\n defer.returnValue(json_body)", "label_name": "CWE-770", "label": 770}
{"code": " def test_received_preq_not_completed(self):\n inst, sock, map = self._makeOneWithMap()\n inst.server = DummyServer()\n preq = DummyParser()\n inst.request = preq\n preq.completed = False\n preq.empty = True\n inst.received(b\"GET / HTTP/1.1\\n\\n\")\n self.assertEqual(inst.requests, ())\n self.assertEqual(inst.server.tasks, [])", "label_name": "CWE-444", "label": 444}
{"code": "def _inject_key_into_fs(key, fs, execute=None):\n \"\"\"Add the given public ssh key to root's authorized_keys.\n\n key is an ssh key string.\n fs is the path to the base of the filesystem into which to inject the key.\n \"\"\"\n sshdir = os.path.join(fs, 'root', '.ssh')\n utils.execute('mkdir', '-p', sshdir, run_as_root=True)\n utils.execute('chown', 'root', sshdir, run_as_root=True)\n utils.execute('chmod', '700', sshdir, run_as_root=True)\n keyfile = os.path.join(sshdir, 'authorized_keys')\n key_data = [\n '\\n',\n '# The following ssh key was injected by Nova',\n '\\n',\n key.strip(),\n '\\n',\n ]\n utils.execute('tee', '-a', keyfile,\n process_input=''.join(key_data), run_as_root=True)", "label_name": "CWE-22", "label": 22}
{"code": " def test_proxy_headers(self):\n to_send = (\n \"GET / HTTP/1.0\\n\"\n \"Content-Length: 0\\n\"\n \"Host: www.google.com:8080\\n\"\n \"X-Forwarded-For: 192.168.1.1\\n\"\n \"X-Forwarded-Proto: https\\n\"\n \"X-Forwarded-Port: 5000\\n\\n\"\n )\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(headers.get(\"server\"), \"waitress\")\n self.assertTrue(headers.get(\"date\"))\n self.assertIsNone(echo.headers.get(\"X_FORWARDED_PORT\"))\n self.assertEqual(echo.headers[\"HOST\"], \"www.google.com:8080\")\n self.assertEqual(echo.scheme, \"https\")\n self.assertEqual(echo.remote_addr, \"192.168.1.1\")\n self.assertEqual(echo.remote_host, \"192.168.1.1\")", "label_name": "CWE-444", "label": 444}
{"code": "def create_class_from_xml_string(target_class, xml_string):\n \"\"\"Creates an instance of the target class from a string.\n\n :param target_class: The class which will be instantiated and populated\n with the contents of the XML. This class must have a c_tag and a\n c_namespace class variable.\n :param xml_string: A string which contains valid XML. The root element\n of the XML string should match the tag and namespace of the desired\n class.\n\n :return: An instance of the target class with members assigned according to\n the contents of the XML - or None if the root XML tag and namespace did\n not match those of the target class.\n \"\"\"\n if not isinstance(xml_string, six.binary_type):\n xml_string = xml_string.encode('utf-8')\n tree = ElementTree.fromstring(xml_string)\n return create_class_from_element_tree(target_class, tree)", "label_name": "CWE-611", "label": 611}
{"code": "def is_valid_hostname(string: str) -> bool:\n \"\"\"Validate that a given string is a valid hostname or domain name, with an\n optional port number.\n\n For domain names, this only validates that the form is right (for\n instance, it doesn't check that the TLD is valid). If a port is\n specified, it has to be a valid port number.\n\n :param string: The string to validate\n :type string: str\n\n :return: Whether the input is a valid hostname\n :rtype: bool\n \"\"\"\n\n host_parts = string.split(\":\", 1)\n\n if len(host_parts) == 1:\n return hostname_regex.match(string) is not None\n else:\n host, port = host_parts\n valid_hostname = hostname_regex.match(host) is not None\n\n try:\n port_num = int(port)\n valid_port = (\n port == str(port_num) # exclude things like '08090' or ' 8090'\n and 1 <= port_num < 65536)\n except ValueError:\n valid_port = False\n\n return valid_hostname and valid_port", "label_name": "CWE-918", "label": 918}
{"code": " def __init__(self, hs):\n self.hs = hs\n self.auth = hs.get_auth()\n self.client = hs.get_http_client()\n self.clock = hs.get_clock()\n self.server_name = hs.hostname\n self.store = hs.get_datastore()\n self.max_upload_size = hs.config.max_upload_size\n self.max_image_pixels = hs.config.max_image_pixels\n\n self.primary_base_path = hs.config.media_store_path\n self.filepaths = MediaFilePaths(self.primary_base_path)\n\n self.dynamic_thumbnails = hs.config.dynamic_thumbnails\n self.thumbnail_requirements = hs.config.thumbnail_requirements\n\n self.remote_media_linearizer = Linearizer(name=\"media_remote\")\n\n self.recently_accessed_remotes = set()\n self.recently_accessed_locals = set()\n\n self.federation_domain_whitelist = hs.config.federation_domain_whitelist\n\n # List of StorageProviders where we should search for media and\n # potentially upload to.\n storage_providers = []\n\n for clz, provider_config, wrapper_config in hs.config.media_storage_providers:\n backend = clz(hs, provider_config)\n provider = StorageProviderWrapper(\n backend,\n store_local=wrapper_config.store_local,\n store_remote=wrapper_config.store_remote,\n store_synchronous=wrapper_config.store_synchronous,\n )\n storage_providers.append(provider)\n\n self.media_storage = MediaStorage(\n self.hs, self.primary_base_path, self.filepaths, storage_providers\n )\n\n self.clock.looping_call(\n self._start_update_recently_accessed, UPDATE_RECENTLY_ACCESSED_TS\n )", "label_name": "CWE-601", "label": 601}
{"code": "def feed_ratingindex():\n off = request.args.get(\"offset\") or 0\n entries = calibre_db.session.query(db.Ratings, func.count('books_ratings_link.book').label('count'),\n (db.Ratings.rating / 2).label('name')) \\\n .join(db.books_ratings_link)\\\n .join(db.Books)\\\n .filter(calibre_db.common_filters()) \\\n .group_by(text('books_ratings_link.rating'))\\\n .order_by(db.Ratings.rating).all()\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries))\n element = list()\n for entry in entries:\n element.append(FeedObject(entry[0].id, _(\"{} Stars\").format(entry.name)))\n return render_xml_template('feed.xml', listelements=element, folder='opds.feed_ratings', pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def test_notfilelike_longcl_http11(self):\n to_send = \"GET /notfilelike_longcl HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body) + 10)\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def gravatar(context, user, size=None):\n \"\"\"\n Outputs the HTML for displaying a user's gravatar.\n\n This can take an optional size of the image (defaults to 80 if not\n specified).\n\n This is also influenced by the following settings:\n\n GRAVATAR_SIZE - Default size for gravatars\n GRAVATAR_RATING - Maximum allowed rating (g, pg, r, x)\n GRAVATAR_DEFAULT - Default image set to show if the user hasn't\n specified a gravatar (identicon, monsterid, wavatar)\n\n See http://www.gravatar.com/ for more information.\n \"\"\"\n url = get_gravatar_url(context['request'], user, size)\n\n if url:\n return (' ' %\n (url, size, size, user.get_full_name() or user.username))\n else:\n return ''", "label_name": "CWE-79", "label": 79}
{"code": " def get(self, path: str) -> None:\n parts = path.split(\"/\")\n component_name = parts[0]\n component_root = self._registry.get_component_path(component_name)\n if component_root is None:\n self.write(\"not found\")\n self.set_status(404)\n return\n\n filename = \"/\".join(parts[1:])\n abspath = os.path.join(component_root, filename)\n\n LOGGER.debug(\"ComponentRequestHandler: GET: %s -> %s\", path, abspath)\n\n try:\n with open(abspath, \"rb\") as file:\n contents = file.read()\n except (OSError) as e:\n LOGGER.error(f\"ComponentRequestHandler: GET {path} read error\", exc_info=e)\n self.write(\"read error\")\n self.set_status(404)\n return\n\n self.write(contents)\n self.set_header(\"Content-Type\", self.get_content_type(abspath))\n\n self.set_extra_headers(path)", "label_name": "CWE-22", "label": 22}
{"code": "def json_dumps(value, indent=None):\n if isinstance(value, QuerySet):\n result = serialize('json', value, indent=indent)\n else:\n result = json.dumps(value, indent=indent, cls=DjbletsJSONEncoder)\n\n return mark_safe(result)", "label_name": "CWE-79", "label": 79}
{"code": "def del_version(request, client_id, project, version):\n if request.method == 'GET':\n client = Client.objects.get(id=client_id)\n try:\n scrapyd = get_scrapyd(client)\n result = scrapyd.delete_version(project=project, version=version)\n return JsonResponse(result)\n except ConnectionError:\n return JsonResponse({'message': 'Connect Error'})", "label_name": "CWE-78", "label": 78}
{"code": " def get_response(self, url, auth=None, http_method=\"get\", **kwargs):\n if is_private_address(url) and settings.ENFORCE_PRIVATE_ADDRESS_BLOCK:\n raise Exception(\"Can't query private addresses.\")\n\n # Get authentication values if not given\n if auth is None:\n auth = self.get_auth()\n\n # Then call requests to get the response from the given endpoint\n # URL optionally, with the additional requests parameters.\n error = None\n response = None\n try:\n response = requests_session.request(http_method, url, auth=auth, **kwargs)\n # Raise a requests HTTP exception with the appropriate reason\n # for 4xx and 5xx response status codes which is later caught\n # and passed back.\n response.raise_for_status()\n\n # Any other responses (e.g. 2xx and 3xx):\n if response.status_code != 200:\n error = \"{} ({}).\".format(self.response_error, response.status_code)\n\n except requests.HTTPError as exc:\n logger.exception(exc)\n error = \"Failed to execute query. \" \"Return Code: {} Reason: {}\".format(\n response.status_code, response.text\n )\n except requests.RequestException as exc:\n # Catch all other requests exceptions and return the error.\n logger.exception(exc)\n error = str(exc)\n\n # Return response and error.\n return response, error", "label_name": "CWE-918", "label": 918}
{"code": "def edit_single_cc_data(book_id, book, column_id, to_save):\n cc = (calibre_db.session.query(db.Custom_Columns)\n .filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions))\n .filter(db.Custom_Columns.id == column_id)\n .all())\n return edit_cc_data(book_id, book, to_save, cc)", "label_name": "CWE-918", "label": 918}
{"code": " def testStringNGramsBadDataSplits(self, splits):\n data = [\"aa\", \"bb\", \"cc\", \"dd\", \"ee\", \"ff\"]\n with self.assertRaisesRegex(errors.InvalidArgumentError,\n \"Invalid split value\"):\n self.evaluate(\n gen_string_ops.string_n_grams(\n data=data,\n data_splits=splits,\n separator=\"\",\n ngram_widths=[2],\n left_pad=\"\",\n right_pad=\"\",\n pad_width=0,\n preserve_short_sequences=False))", "label_name": "CWE-190", "label": 190}
{"code": "def feed_categoryindex():\n shift = 0\n off = int(request.args.get(\"offset\") or 0)\n entries = calibre_db.session.query(func.upper(func.substr(db.Tags.name, 1, 1)).label('id'))\\\n .join(db.books_tags_link).join(db.Books).filter(calibre_db.common_filters())\\\n .group_by(func.upper(func.substr(db.Tags.name, 1, 1))).all()\n elements = []\n if off == 0:\n elements.append({'id': \"00\", 'name':_(\"All\")})\n shift = 1\n for entry in entries[\n off + shift - 1:\n int(off + int(config.config_books_per_page) - shift)]:\n elements.append({'id': entry.id, 'name': entry.id})\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries) + 1)\n return render_xml_template('feed.xml',\n letterelements=elements,\n folder='opds.feed_letter_category',\n pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def should_run(self):\n if self.force:\n return True\n if not os.path.exists(self.bower_dir):\n return True\n \n return mtime(self.bower_dir) < mtime(pjoin(repo_root, 'bower.json'))", "label_name": "CWE-79", "label": 79}
{"code": " def __init__(self, **kwargs):\n self.basic_auth = get_anymail_setting('webhook_authorization', default=[],\n kwargs=kwargs) # no esp_name -- auth is shared between ESPs\n # Allow a single string:\n if isinstance(self.basic_auth, six.string_types):\n self.basic_auth = [self.basic_auth]\n if self.warn_if_no_basic_auth and len(self.basic_auth) < 1:\n warnings.warn(\n \"Your Anymail webhooks are insecure and open to anyone on the web. \"\n \"You should set WEBHOOK_AUTHORIZATION in your ANYMAIL settings. \"\n \"See 'Securing webhooks' in the Anymail docs.\",\n AnymailInsecureWebhookWarning)\n # noinspection PyArgumentList\n super(AnymailBasicAuthMixin, self).__init__(**kwargs)", "label_name": "CWE-532", "label": 532}
{"code": "\tdef innerfn(fn):\n\t\tglobal whitelisted, guest_methods, xss_safe_methods, allowed_http_methods_for_whitelisted_func\n\t\twhitelisted.append(fn)\n\n\t\tallowed_http_methods_for_whitelisted_func[fn] = methods\n\n\t\tif allow_guest:\n\t\t\tguest_methods.append(fn)\n\n\t\t\tif xss_safe:\n\t\t\t\txss_safe_methods.append(fn)\n\n\t\treturn fn", "label_name": "CWE-79", "label": 79}
{"code": " def test_open_with_filename(self):\n tmpname = mktemp('', 'mmap')\n fp = memmap(tmpname, dtype=self.dtype, mode='w+',\n shape=self.shape)\n fp[:] = self.data[:]\n del fp\n os.unlink(tmpname)", "label_name": "CWE-59", "label": 59}
{"code": " def from_dict(d: Dict[str, Any]) -> AModel:\n an_enum_value = AnEnum(d[\"an_enum_value\"])\n\n def _parse_a_camel_date_time(data: Dict[str, Any]) -> Union[datetime, date]:\n a_camel_date_time: Union[datetime, date]\n try:\n a_camel_date_time = datetime.fromisoformat(d[\"aCamelDateTime\"])\n\n return a_camel_date_time\n except:\n pass\n a_camel_date_time = date.fromisoformat(d[\"aCamelDateTime\"])\n\n return a_camel_date_time\n\n a_camel_date_time = _parse_a_camel_date_time(d[\"aCamelDateTime\"])\n\n a_date = date.fromisoformat(d[\"a_date\"])\n\n nested_list_of_enums = []\n for nested_list_of_enums_item_data in d.get(\"nested_list_of_enums\") or []:\n nested_list_of_enums_item = []\n for nested_list_of_enums_item_item_data in nested_list_of_enums_item_data:\n nested_list_of_enums_item_item = DifferentEnum(nested_list_of_enums_item_item_data)\n\n nested_list_of_enums_item.append(nested_list_of_enums_item_item)\n\n nested_list_of_enums.append(nested_list_of_enums_item)\n\n some_dict = d.get(\"some_dict\")\n\n return AModel(\n an_enum_value=an_enum_value,\n a_camel_date_time=a_camel_date_time,\n a_date=a_date,\n nested_list_of_enums=nested_list_of_enums,\n some_dict=some_dict,\n )", "label_name": "CWE-94", "label": 94}
{"code": "def send_note_attachment(filename):\n \"\"\"Return a file from the note attachment directory\"\"\"\n file_path = os.path.join(PATH_NOTE_ATTACHMENTS, filename)\n if file_path is not None:\n try:\n return send_file(file_path, as_attachment=True)\n except Exception:\n logger.exception(\"Send note attachment\")", "label_name": "CWE-22", "label": 22}
{"code": " def testInputParserPythonExpression(self):\n x1 = np.ones([2, 10])\n x2 = np.array([[1], [2], [3]])\n x3 = np.mgrid[0:5, 0:5]\n x4 = [[3], [4]]\n input_expr_str = ('x1=np.ones([2,10]);x2=np.array([[1],[2],[3]]);'\n 'x3=np.mgrid[0:5,0:5];x4=[[3],[4]]')\n feed_dict = saved_model_cli.load_inputs_from_input_arg_string(\n '', input_expr_str, '')\n self.assertTrue(np.all(feed_dict['x1'] == x1))\n self.assertTrue(np.all(feed_dict['x2'] == x2))\n self.assertTrue(np.all(feed_dict['x3'] == x3))\n self.assertTrue(np.all(feed_dict['x4'] == x4))", "label_name": "CWE-94", "label": 94}
{"code": "inline void AveragePool(const float* input_data, const Dims<4>& input_dims,\n int stride_width, int stride_height, int pad_width,\n int pad_height, int kwidth, int kheight,\n float output_activation_min,\n float output_activation_max, float* output_data,\n const Dims<4>& output_dims) {\n tflite::PoolParams params;\n params.stride_height = stride_height;\n params.stride_width = stride_width;\n params.filter_height = kheight;\n params.filter_width = kwidth;\n params.padding_values.height = pad_height;\n params.padding_values.width = pad_width;\n params.float_activation_min = output_activation_min;\n params.float_activation_max = output_activation_max;\n AveragePool(params, DimsToShape(input_dims), input_data,\n DimsToShape(output_dims), output_data);\n}", "label_name": "CWE-835", "label": 835}
{"code": " def test_received_body_too_large(self):\n from waitress.utilities import RequestEntityTooLarge\n\n self.parser.adj.max_request_body_size = 2\n data = b\"\"\"\\\nGET /foobar HTTP/1.1\nTransfer-Encoding: chunked\nX-Foo: 1\n\n20;\\r\\n\nThis string has 32 characters\\r\\n\n0\\r\\n\\r\\n\"\"\"\n result = self.parser.received(data)\n self.assertEqual(result, 58)\n self.parser.received(data[result:])\n self.assertTrue(self.parser.completed)\n self.assertTrue(isinstance(self.parser.error, RequestEntityTooLarge))", "label_name": "CWE-444", "label": 444}
{"code": "def extract_messages(obj_list):\n \"\"\"\n Extract \"messages\" from a list of exceptions or other objects.\n\n For ValidationErrors, `messages` are flattened into the output.\n For Exceptions, `args[0]` is added into the output.\n For other objects, `force_text` is called.\n\n :param obj_list: List of exceptions etc.\n :type obj_list: Iterable[object]\n :rtype: Iterable[str]\n \"\"\"\n for obj in obj_list:\n if isinstance(obj, ValidationError):\n for msg in obj.messages:\n yield force_text(msg)\n continue\n if isinstance(obj, Exception):\n if len(obj.args):\n yield force_text(obj.args[0])\n continue\n yield force_text(obj)", "label_name": "CWE-79", "label": 79}
{"code": "def setup_logging():\n \"\"\"Configure the python logging appropriately for the tests.\n\n (Logs will end up in _trial_temp.)\n \"\"\"\n root_logger = logging.getLogger()\n\n log_format = (\n \"%(asctime)s - %(name)s - %(lineno)d - %(levelname)s\"\n \" - %(message)s\"\n )\n\n handler = ToTwistedHandler()\n formatter = logging.Formatter(log_format)\n handler.setFormatter(formatter)\n root_logger.addHandler(handler)\n\n log_level = os.environ.get(\"SYDENT_TEST_LOG_LEVEL\", \"ERROR\")\n root_logger.setLevel(log_level)", "label_name": "CWE-918", "label": 918}
{"code": " def generate_code(cls):\n hash_algorithm = getattr(settings, 'NOPASSWORD_HASH_ALGORITHM', 'sha256')\n m = getattr(hashlib, hash_algorithm)()\n m.update(getattr(settings, 'SECRET_KEY', None).encode('utf-8'))\n m.update(os.urandom(16))\n if getattr(settings, 'NOPASSWORD_NUMERIC_CODES', False):\n hashed = str(int(m.hexdigest(), 16))\n else:\n hashed = m.hexdigest()\n return hashed", "label_name": "CWE-312", "label": 312}
{"code": "def table_xchange_author_title():\n vals = request.get_json().get('xchange')\n if vals:\n for val in vals:\n modif_date = False\n book = calibre_db.get_book(val)\n authors = book.title\n book.authors = calibre_db.order_authors([book])\n author_names = []\n for authr in book.authors:\n author_names.append(authr.name.replace('|', ','))\n\n title_change = handle_title_on_edit(book, \" \".join(author_names))\n input_authors, authorchange, renamed = handle_author_on_edit(book, authors)\n if authorchange or title_change:\n edited_books_id = book.id\n modif_date = True\n\n if config.config_use_google_drive:\n gdriveutils.updateGdriveCalibreFromLocal()\n\n if edited_books_id:\n helper.update_dir_structure(edited_books_id, config.config_calibre_dir, input_authors[0],\n renamed_author=renamed)\n if modif_date:\n book.last_modified = datetime.utcnow()\n try:\n calibre_db.session.commit()\n except (OperationalError, IntegrityError) as e:\n calibre_db.session.rollback()\n log.error_or_exception(\"Database error: %s\", e)\n return json.dumps({'success': False})\n\n if config.config_use_google_drive:\n gdriveutils.updateGdriveCalibreFromLocal()\n return json.dumps({'success': True})\n return \"\"", "label_name": "CWE-918", "label": 918}
{"code": " def test_notfilelike_iobase_http11(self):\n to_send = \"GET /notfilelike_iobase HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n for t in range(0, 2):\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)", "label_name": "CWE-444", "label": 444}
{"code": "def _get_index_absolute_path(index):\n return os.path.join(INDEXDIR, index)", "label_name": "CWE-22", "label": 22}
{"code": " def post_json_get_nothing(self, uri, post_json, opts):\n \"\"\"Make a POST request to an endpoint returning JSON and parse result\n\n :param uri: The URI to make a POST request to.\n :type uri: unicode\n\n :param post_json: A Python object that will be converted to a JSON\n string and POSTed to the given URI.\n :type post_json: dict[any, any]\n\n :param opts: A dictionary of request options. Currently only opts.headers\n is supported.\n :type opts: dict[str,any]\n\n :return: a response from the remote server.\n :rtype: twisted.internet.defer.Deferred[twisted.web.iweb.IResponse]\n \"\"\"\n json_bytes = json.dumps(post_json).encode(\"utf8\")\n\n headers = opts.get('headers', Headers({\n b\"Content-Type\": [b\"application/json\"],\n }))\n\n logger.debug(\"HTTP POST %s -> %s\", json_bytes, uri)\n\n response = yield self.agent.request(\n b\"POST\",\n uri.encode(\"utf8\"),\n headers,\n bodyProducer=FileBodyProducer(BytesIO(json_bytes))\n )\n\n # Ensure the body object is read otherwise we'll leak HTTP connections\n # as per\n # https://twistedmatrix.com/documents/current/web/howto/client.html\n yield readBody(response)\n\n defer.returnValue(response)", "label_name": "CWE-770", "label": 770}
{"code": "def admin():\n version = updater_thread.get_current_version_info()\n if version is False:\n commit = _(u'Unknown')\n else:\n if 'datetime' in version:\n commit = version['datetime']\n\n tz = timedelta(seconds=time.timezone if (time.localtime().tm_isdst == 0) else time.altzone)\n form_date = datetime.strptime(commit[:19], \"%Y-%m-%dT%H:%M:%S\")\n if len(commit) > 19: # check if string has timezone\n if commit[19] == '+':\n form_date -= timedelta(hours=int(commit[20:22]), minutes=int(commit[23:]))\n elif commit[19] == '-':\n form_date += timedelta(hours=int(commit[20:22]), minutes=int(commit[23:]))\n commit = format_datetime(form_date - tz, format='short', locale=get_locale())\n else:\n commit = version['version']\n\n allUser = ub.session.query(ub.User).all()\n email_settings = config.get_mail_settings()\n kobo_support = feature_support['kobo'] and config.config_kobo_sync\n return render_title_template(\"admin.html\", allUser=allUser, email=email_settings, config=config, commit=commit,\n feature_support=feature_support, kobo_support=kobo_support,\n title=_(u\"Admin page\"), page=\"admin\")", "label_name": "CWE-918", "label": 918}
{"code": " def test_chunking_request_with_content(self):\n control_line = b\"20;\\r\\n\" # 20 hex = 32 dec\n s = b\"This string has 32 characters.\\r\\n\"\n expected = s * 12\n header = tobytes(\"GET / HTTP/1.1\\n\" \"Transfer-Encoding: chunked\\n\\n\")\n self.connect()\n self.sock.send(header)\n fp = self.sock.makefile(\"rb\", 0)\n for n in range(12):\n self.sock.send(control_line)\n self.sock.send(s)\n self.sock.send(b\"0\\r\\n\\r\\n\")\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n self.assertEqual(echo.body, expected)\n self.assertEqual(echo.content_length, str(len(expected)))\n self.assertFalse(\"transfer-encoding\" in headers)", "label_name": "CWE-444", "label": 444}
{"code": "def feed_read_books():\n off = request.args.get(\"offset\") or 0\n result, pagination = render_read_books(int(off) / (int(config.config_books_per_page)) + 1, True, True)\n return render_xml_template('feed.xml', entries=result, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(\"server\", http_client=None)\n self.store = hs.get_datastore()\n return hs", "label_name": "CWE-601", "label": 601}
{"code": " def test_after_write_cb(self):\n to_send = \"GET /after_write_cb HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n self.assertEqual(response_body, b\"\")\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def render_search_results(term, offset=None, order=None, limit=None):\n join = db.books_series_link, db.Books.id == db.books_series_link.c.book, db.Series\n entries, result_count, pagination = calibre_db.get_search_results(term,\n offset,\n order,\n limit,\n False,\n config.config_read_column,\n *join)\n return render_title_template('search.html',\n searchterm=term,\n pagination=pagination,\n query=term,\n adv_searchterm=term,\n entries=entries,\n result_count=result_count,\n title=_(u\"Search\"),\n page=\"search\",\n order=order[1])", "label_name": "CWE-918", "label": 918}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(\"server\", http_client=None)\n self.handler = hs.get_device_handler()\n self.store = hs.get_datastore()\n return hs", "label_name": "CWE-601", "label": 601}
{"code": " def visit_Call(self, node):\n \"\"\" A couple function calls are supported: bson's ObjectId() and\n datetime().\n \"\"\"\n if isinstance(node.func, ast.Name):\n expr = None\n if node.func.id == 'ObjectId':\n expr = \"('\" + node.args[0].s + \"')\"\n elif node.func.id == 'datetime':\n values = []\n for arg in node.args:\n values.append(str(arg.n))\n expr = \"(\" + \", \".join(values) + \")\"\n if expr:\n self.current_value = eval(node.func.id + expr)", "label_name": "CWE-94", "label": 94}
{"code": " def test_request_body_too_large_with_no_cl_http10(self):\n body = \"a\" * self.toobig\n to_send = \"GET / HTTP/1.0\\n\\n\"\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # extra bytes are thrown away (no pipelining), connection closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def feed_category(book_id):\n off = request.args.get(\"offset\") or 0\n entries, __, pagination = calibre_db.fill_indexpage((int(off) / (int(config.config_books_per_page)) + 1), 0,\n db.Books,\n db.Books.tags.any(db.Tags.id == book_id),\n [db.Books.timestamp.desc()])\n return render_xml_template('feed.xml', entries=entries, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": "def test_date_parsing(value, result):\n if result == errors.DateError:\n with pytest.raises(errors.DateError):\n parse_date(value)\n else:\n assert parse_date(value) == result", "label_name": "CWE-835", "label": 835}
{"code": " def func_begin(self, name):\n ctype = get_c_type(name)\n self.emit(\"PyObject*\", 0)\n self.emit(\"ast2obj_%s(void* _o)\" % (name), 0)\n self.emit(\"{\", 0)\n self.emit(\"%s o = (%s)_o;\" % (ctype, ctype), 1)\n self.emit(\"PyObject *result = NULL, *value = NULL;\", 1)\n self.emit('if (!o) {', 1)\n self.emit(\"Py_INCREF(Py_None);\", 2)\n self.emit('return Py_None;', 2)\n self.emit(\"}\", 1)\n self.emit('', 0)", "label_name": "CWE-125", "label": 125}
{"code": "def update_dir_structure_gdrive(book_id, first_author, renamed_author):\n book = calibre_db.get_book(book_id)\n\n authordir = book.path.split('/')[0]\n titledir = book.path.split('/')[1]\n new_authordir = rename_all_authors(first_author, renamed_author, gdrive=True)\n new_titledir = get_valid_filename(book.title, chars=96) + u\" (\" + str(book_id) + u\")\"\n\n if titledir != new_titledir:\n gFile = gd.getFileFromEbooksFolder(os.path.dirname(book.path), titledir)\n if gFile:\n gd.moveGdriveFileRemote(gFile, new_titledir)\n book.path = book.path.split('/')[0] + u'/' + new_titledir\n gd.updateDatabaseOnEdit(gFile['id'], book.path) # only child folder affected\n else:\n return _(u'File %(file)s not found on Google Drive', file=book.path) # file not found\n\n if authordir != new_authordir and authordir not in renamed_author:\n gFile = gd.getFileFromEbooksFolder(os.path.dirname(book.path), new_titledir)\n if gFile:\n gd.moveGdriveFolderRemote(gFile, new_authordir)\n book.path = new_authordir + u'/' + book.path.split('/')[1]\n gd.updateDatabaseOnEdit(gFile['id'], book.path)\n else:\n return _(u'File %(file)s not found on Google Drive', file=authordir) # file not found\n\n # change location in database to new author/title path\n book.path = os.path.join(new_authordir, new_titledir).replace('\\\\', '/')\n return rename_files_on_change(first_author, renamed_author, book, gdrive=True)", "label_name": "CWE-918", "label": 918}
{"code": " def testInputPreProcessFormats(self):\n input_str = 'input1=/path/file.txt[ab3];input2=file2'\n input_expr_str = 'input3=np.zeros([2,2]);input4=[4,5]'\n input_dict = saved_model_cli.preprocess_inputs_arg_string(input_str)\n input_expr_dict = saved_model_cli.preprocess_input_exprs_arg_string(\n input_expr_str)\n self.assertTrue(input_dict['input1'] == ('/path/file.txt', 'ab3'))\n self.assertTrue(input_dict['input2'] == ('file2', None))\n print(input_expr_dict['input3'])\n self.assertAllClose(input_expr_dict['input3'], np.zeros([2, 2]))\n self.assertAllClose(input_expr_dict['input4'], [4, 5])\n self.assertTrue(len(input_dict) == 2)\n self.assertTrue(len(input_expr_dict) == 2)", "label_name": "CWE-94", "label": 94}
{"code": "def execute_cmd(cmd, from_async=False):\n\t\"\"\"execute a request as python module\"\"\"\n\tfor hook in frappe.get_hooks(\"override_whitelisted_methods\", {}).get(cmd, []):\n\t\t# override using the first hook\n\t\tcmd = hook\n\t\tbreak\n\n\t# via server script\n\tif run_server_script_api(cmd):\n\t\treturn None\n\n\ttry:\n\t\tmethod = get_attr(cmd)\n\texcept Exception as e:\n\t\tif frappe.local.conf.developer_mode:\n\t\t\traise e\n\t\telse:\n\t\t\tfrappe.respond_as_web_page(title='Invalid Method', html='Method not found',\n\t\t\tindicator_color='red', http_status_code=404)\n\t\treturn\n\n\tif from_async:\n\t\tmethod = method.queue\n\n\tis_whitelisted(method)\n\tis_valid_http_method(method)\n\n\treturn frappe.call(method, **frappe.form_dict)", "label_name": "CWE-79", "label": 79}
{"code": " def test_counts_view_html(self):\n response = self.get_counts(\"html\")\n self.assertEqual(response.status_code, 200)\n self.assertHTMLEqual(\n response.content.decode(),\n \"\"\"\n\n \n Name \n Email \n Count total \n Edits total \n Source words total \n Source chars total \n Target words total \n Target chars total \n Count new \n Edits new \n Source words new \n Source chars new \n Target words new \n Target chars new \n Count approved \n Edits approved \n Source words approved \n Source chars approved \n Target words approved \n Target chars approved \n Count edited \n Edits edited \n Source words edited \n Source chars edited \n Target words edited \n Target chars edited \n \n \n Weblate Test \n weblate@example.org \n 1 \n 14 \n 2 \n 14 \n 2 \n 14 \n 1 \n 14 \n 2 \n 14 \n 2 \n 14 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n 0 \n \n
\n\"\"\",\n )", "label_name": "CWE-79", "label": 79}
{"code": " def testFlushFunction(self):\n logdir = self.get_temp_dir()\n with context.eager_mode():\n writer = summary_ops.create_file_writer_v2(\n logdir, max_queue=999999, flush_millis=999999)\n with writer.as_default():\n get_total = lambda: len(events_from_logdir(logdir))\n # Note: First tf.compat.v1.Event is always file_version.\n self.assertEqual(1, get_total())\n summary_ops.write('tag', 1, step=0)\n summary_ops.write('tag', 1, step=0)\n self.assertEqual(1, get_total())\n summary_ops.flush()\n self.assertEqual(3, get_total())\n # Test \"writer\" parameter\n summary_ops.write('tag', 1, step=0)\n self.assertEqual(3, get_total())\n summary_ops.flush(writer=writer)\n self.assertEqual(4, get_total())\n summary_ops.write('tag', 1, step=0)\n self.assertEqual(4, get_total())\n summary_ops.flush(writer=writer._resource) # pylint:disable=protected-access\n self.assertEqual(5, get_total())", "label_name": "CWE-475", "label": 475}
{"code": " def fetch_file(self, in_path, out_path):\n ''' fetch a file from chroot to local '''\n\n if not in_path.startswith(os.path.sep):\n in_path = os.path.join(os.path.sep, in_path)\n normpath = os.path.normpath(in_path)\n in_path = os.path.join(self.chroot, normpath[1:])\n\n vvv(\"FETCH %s TO %s\" % (in_path, out_path), host=self.chroot)\n if not os.path.exists(in_path):\n raise errors.AnsibleFileNotFound(\"file or module does not exist: %s\" % in_path)\n try:\n shutil.copyfile(in_path, out_path)\n except shutil.Error:\n traceback.print_exc()\n raise errors.AnsibleError(\"failed to copy: %s and %s are the same\" % (in_path, out_path))\n except IOError:\n traceback.print_exc()\n raise errors.AnsibleError(\"failed to transfer file to %s\" % out_path)", "label_name": "CWE-59", "label": 59}
{"code": " def make_homeserver(self, reactor, clock):\n\n self.fetches = []\n\n async def get_file(destination, path, output_stream, args=None, max_size=None):\n \"\"\"\n Returns tuple[int,dict,str,int] of file length, response headers,\n absolute URI, and response code.\n \"\"\"\n\n def write_to(r):\n data, response = r\n output_stream.write(data)\n return response\n\n d = Deferred()\n d.addCallback(write_to)\n self.fetches.append((d, destination, path, args))\n return await make_deferred_yieldable(d)\n\n client = Mock()\n client.get_file = get_file\n\n self.storage_path = self.mktemp()\n self.media_store_path = self.mktemp()\n os.mkdir(self.storage_path)\n os.mkdir(self.media_store_path)\n\n config = self.default_config()\n config[\"media_store_path\"] = self.media_store_path\n config[\"thumbnail_requirements\"] = {}\n config[\"max_image_pixels\"] = 2000000\n\n provider_config = {\n \"module\": \"synapse.rest.media.v1.storage_provider.FileStorageProviderBackend\",\n \"store_local\": True,\n \"store_synchronous\": False,\n \"store_remote\": True,\n \"config\": {\"directory\": self.storage_path},\n }\n config[\"media_storage_providers\"] = [provider_config]\n\n hs = self.setup_test_homeserver(config=config, http_client=client)\n\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def unarchive(byte_array: bytes, directory: Text) -> Text:\n \"\"\"Tries to unpack a byte array interpreting it as an archive.\n\n Tries to use tar first to unpack, if that fails, zip will be used.\"\"\"\n\n try:\n tar = tarfile.open(fileobj=IOReader(byte_array))\n tar.extractall(directory)\n tar.close()\n return directory\n except tarfile.TarError:\n zip_ref = zipfile.ZipFile(IOReader(byte_array))\n zip_ref.extractall(directory)\n zip_ref.close()\n return directory", "label_name": "CWE-22", "label": 22}
{"code": "def main(srcfile, dump_module=False):\n argv0 = sys.argv[0]\n components = argv0.split(os.sep)\n argv0 = os.sep.join(components[-2:])\n auto_gen_msg = common_msg % argv0\n mod = asdl.parse(srcfile)\n if dump_module:\n print('Parsed Module:')\n print(mod)\n if not asdl.check(mod):\n sys.exit(1)\n if INC_DIR:\n p = \"%s/%s-ast.h\" % (INC_DIR, mod.name)\n f = open(p, \"w\")\n f.write(auto_gen_msg)\n f.write('#include \"asdl.h\"\\n\\n')\n c = ChainOfVisitors(TypeDefVisitor(f),\n StructVisitor(f),\n PrototypeVisitor(f),\n )\n c.visit(mod)\n f.write(\"PyObject* Ta3AST_mod2obj(mod_ty t);\\n\")\n f.write(\"mod_ty Ta3AST_obj2mod(PyObject* ast, PyArena* arena, int mode);\\n\")\n f.write(\"int Ta3AST_Check(PyObject* obj);\\n\")\n f.close()\n\n if SRC_DIR:\n p = os.path.join(SRC_DIR, str(mod.name) + \"-ast.c\")\n f = open(p, \"w\")\n f.write(auto_gen_msg)\n f.write('#include \\n')\n f.write('\\n')\n f.write('#include \"Python.h\"\\n')\n f.write('#include \"%s-ast.h\"\\n' % mod.name)\n f.write('\\n')\n f.write(\"static PyTypeObject AST_type;\\n\")\n v = ChainOfVisitors(\n PyTypesDeclareVisitor(f),\n PyTypesVisitor(f),\n Obj2ModPrototypeVisitor(f),\n FunctionVisitor(f),\n ObjVisitor(f),\n Obj2ModVisitor(f),\n ASTModuleVisitor(f),\n PartingShots(f),\n )\n v.visit(mod)\n f.close()", "label_name": "CWE-125", "label": 125}
{"code": " def test_http10_generator(self):\n body = string.ascii_letters\n to_send = (\n \"GET / HTTP/1.0\\n\"\n \"Connection: Keep-Alive\\n\"\n \"Content-Length: %d\\n\\n\" % len(body)\n )\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(headers.get(\"content-length\"), None)\n self.assertEqual(headers.get(\"connection\"), \"close\")\n self.assertEqual(response_body, tobytes(body))\n # remote closed connection (despite keepalive header), because\n # generators cannot have a content-length divined\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def strip_illegal_bytes_parser(xml):\n return parse(BytesIO(re_xml_illegal_bytes.sub(b'', xml)))", "label_name": "CWE-611", "label": 611}
{"code": "def create_access(request, topic_id):\n topic_private = TopicPrivate.objects.for_create_or_404(topic_id, request.user)\n form = TopicPrivateInviteForm(\n topic=topic_private.topic,\n data=post_data(request))\n\n if form.is_valid():\n form.save()\n notify_access(user=form.get_user(), topic_private=topic_private)\n else:\n messages.error(request, utils.render_form_errors(form))\n\n return redirect(request.POST.get('next', topic_private.get_absolute_url()))", "label_name": "CWE-601", "label": 601}
{"code": "def whitelist(allow_guest=False, xss_safe=False, methods=None):\n\t\"\"\"\n\tDecorator for whitelisting a function and making it accessible via HTTP.\n\tStandard request will be `/api/method/[path.to.method]`\n\n\t:param allow_guest: Allow non logged-in user to access this method.\n\t:param methods: Allowed http method to access the method.\n\n\tUse as:\n\n\t\t@frappe.whitelist()\n\t\tdef myfunc(param1, param2):\n\t\t\tpass\n\t\"\"\"\n\n\tif not methods:\n\t\tmethods = ['GET', 'POST', 'PUT', 'DELETE']\n\n\tdef innerfn(fn):\n\t\tglobal whitelisted, guest_methods, xss_safe_methods, allowed_http_methods_for_whitelisted_func\n\t\twhitelisted.append(fn)\n\n\t\tallowed_http_methods_for_whitelisted_func[fn] = methods\n\n\t\tif allow_guest:\n\t\t\tguest_methods.append(fn)\n\n\t\t\tif xss_safe:\n\t\t\t\txss_safe_methods.append(fn)\n\n\t\treturn fn\n\n\treturn innerfn", "label_name": "CWE-79", "label": 79}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(\"server\", http_client=None)\n return hs", "label_name": "CWE-601", "label": 601}
{"code": " def setUp(self):\n self.mock_federation_resource = MockHttpResource()\n\n self.mock_http_client = Mock(spec=[])\n self.mock_http_client.put_json = DeferredMockCallable()\n\n hs = yield setup_test_homeserver(\n self.addCleanup, http_client=self.mock_http_client, keyring=Mock(),\n )\n\n self.filtering = hs.get_filtering()\n\n self.datastore = hs.get_datastore()", "label_name": "CWE-601", "label": 601}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(\n \"server\", http_client=None, federation_sender=Mock()\n )\n return hs", "label_name": "CWE-601", "label": 601}
{"code": " def func_begin(self, name):\n ctype = get_c_type(name)\n self.emit(\"PyObject*\", 0)\n self.emit(\"ast2obj_%s(void* _o)\" % (name), 0)\n self.emit(\"{\", 0)\n self.emit(\"%s o = (%s)_o;\" % (ctype, ctype), 1)\n self.emit(\"PyObject *result = NULL, *value = NULL;\", 1)\n self.emit('if (!o) {', 1)\n self.emit(\"Py_INCREF(Py_None);\", 2)\n self.emit('return Py_None;', 2)\n self.emit(\"}\", 1)\n self.emit('', 0)", "label_name": "CWE-125", "label": 125}
{"code": "def category_list():\n if current_user.check_visibility(constants.SIDEBAR_CATEGORY):\n if current_user.get_view_property('category', 'dir') == 'desc':\n order = db.Tags.name.desc()\n order_no = 0\n else:\n order = db.Tags.name.asc()\n order_no = 1\n entries = calibre_db.session.query(db.Tags, func.count('books_tags_link.book').label('count')) \\\n .join(db.books_tags_link).join(db.Books).order_by(order).filter(calibre_db.common_filters()) \\\n .group_by(text('books_tags_link.tag')).all()\n charlist = calibre_db.session.query(func.upper(func.substr(db.Tags.name, 1, 1)).label('char')) \\\n .join(db.books_tags_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(func.upper(func.substr(db.Tags.name, 1, 1))).all()\n return render_title_template('list.html', entries=entries, folder='web.books_list', charlist=charlist,\n title=_(u\"Categories\"), page=\"catlist\", data=\"category\", order=order_no)\n else:\n abort(404)", "label_name": "CWE-918", "label": 918}
{"code": "def get_file(path):\n try:\n data_file, metadata = get_info(\n path,\n pathlib.Path(app.config[\"DATA_ROOT\"])\n )\n except (OSError, ValueError):\n return flask.Response(\n \"Not Found\",\n 404,\n mimetype=\"text/plain\",\n )\n\n response = flask.make_response(flask.send_file(\n str(data_file),\n ))\n generate_headers(\n response.headers,\n metadata[\"headers\"],\n )\n return response", "label_name": "CWE-22", "label": 22}
{"code": "def edit_book_languages(languages, book, upload=False, invalid=None):\n input_languages = languages.split(',')\n unknown_languages = []\n if not upload:\n input_l = isoLanguages.get_language_codes(get_locale(), input_languages, unknown_languages)\n else:\n input_l = isoLanguages.get_valid_language_codes(get_locale(), input_languages, unknown_languages)\n for l in unknown_languages:\n log.error(\"'%s' is not a valid language\", l)\n if isinstance(invalid, list):\n invalid.append(l)\n else:\n raise ValueError(_(u\"'%(langname)s' is not a valid language\", langname=l))\n # ToDo: Not working correct\n if upload and len(input_l) == 1:\n # If the language of the file is excluded from the users view, it's not imported, to allow the user to view\n # the book it's language is set to the filter language\n if input_l[0] != current_user.filter_language() and current_user.filter_language() != \"all\":\n input_l[0] = calibre_db.session.query(db.Languages). \\\n filter(db.Languages.lang_code == current_user.filter_language()).first().lang_code\n # Remove duplicates\n input_l = helper.uniq(input_l)\n return modify_database_object(input_l, book.languages, db.Languages, calibre_db.session, 'languages')", "label_name": "CWE-918", "label": 918}
{"code": "def mysql_insensitive_exact(field: Field, value: str) -> Criterion:\n return functions.Upper(functions.Cast(field, SqlTypes.CHAR)).eq(functions.Upper(f\"{value}\"))", "label_name": "CWE-89", "label": 89}
{"code": " def test_notfilelike_http10(self):\n to_send = \"GET /notfilelike HTTP/1.0\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def test_parse_header_no_cr_in_headerplus(self):\n data = b\"GET /foobar HTTP/8.4\"\n self.parser.parse_header(data)\n self.assertEqual(self.parser.first_line, data)", "label_name": "CWE-444", "label": 444}
{"code": " def process_statistics(self, metadata, _):\n args = [metadata.hostname, '-p', metadata.profile, '-g',\n ':'.join([g for g in metadata.groups])]\n for notifier in os.listdir(self.data):\n if ((notifier[-1] == '~') or\n (notifier[:2] == '.#') or\n (notifier[-4:] == '.swp') or\n (notifier in ['SCCS', '.svn', '4913'])):\n continue\n npath = self.data + '/' + notifier\n self.logger.debug(\"Running %s %s\" % (npath, \" \".join(args)))\n async_run(npath, args)", "label_name": "CWE-78", "label": 78}
{"code": "def list_users():\n off = int(request.args.get(\"offset\") or 0)\n limit = int(request.args.get(\"limit\") or 10)\n search = request.args.get(\"search\")\n sort = request.args.get(\"sort\", \"id\")\n state = None\n if sort == \"state\":\n state = json.loads(request.args.get(\"state\", \"[]\"))\n else:\n if sort not in ub.User.__table__.columns.keys():\n sort = \"id\"\n order = request.args.get(\"order\", \"\").lower()\n\n if sort != \"state\" and order:\n order = text(sort + \" \" + order)\n elif not state:\n order = ub.User.id.asc()\n\n all_user = ub.session.query(ub.User)\n if not config.config_anonbrowse:\n all_user = all_user.filter(ub.User.role.op('&')(constants.ROLE_ANONYMOUS) != constants.ROLE_ANONYMOUS)\n\n total_count = filtered_count = all_user.count()\n\n if search:\n all_user = all_user.filter(or_(func.lower(ub.User.name).ilike(\"%\" + search + \"%\"),\n func.lower(ub.User.kindle_mail).ilike(\"%\" + search + \"%\"),\n func.lower(ub.User.email).ilike(\"%\" + search + \"%\")))\n if state:\n users = calibre_db.get_checkbox_sorted(all_user.all(), state, off, limit, request.args.get(\"order\", \"\").lower())\n else:\n users = all_user.order_by(order).offset(off).limit(limit).all()\n if search:\n filtered_count = len(users)\n\n for user in users:\n if user.default_language == \"all\":\n user.default = _(\"All\")\n else:\n user.default = LC.parse(user.default_language).get_language_name(get_locale())\n\n table_entries = {'totalNotFiltered': total_count, 'total': filtered_count, \"rows\": users}\n js_list = json.dumps(table_entries, cls=db.AlchemyEncoder)\n response = make_response(js_list)\n response.headers[\"Content-Type\"] = \"application/json; charset=utf-8\"\n return response", "label_name": "CWE-918", "label": 918}
{"code": " def _download_file(bucket, filename, local_dir):\n key = bucket.get_key(filename)\n local_filename = os.path.join(local_dir, filename)\n key.get_contents_to_filename(local_filename)\n return local_filename", "label_name": "CWE-22", "label": 22}
{"code": " def handleMatch(m):\n s = m.group(1)\n if s.startswith('0x'):\n i = int(s, 16)\n elif s.startswith('0') and '.' not in s:\n try:\n i = int(s, 8)\n except ValueError:\n i = int(s)\n else:\n i = float(s)\n x = complex(i)\n if x.imag == 0:\n x = x.real\n # Need to use string-formatting here instead of str() because\n # use of str() on large numbers loses information:\n # str(float(33333333333333)) => '3.33333333333e+13'\n # float('3.33333333333e+13') => 33333333333300.0\n return '%.16f' % x\n return str(x)", "label_name": "CWE-94", "label": 94}
{"code": " def initSession(self, expire_on_commit=True):\n self.session = self.session_factory()\n self.session.expire_on_commit = expire_on_commit\n self.update_title_sort(self.config)", "label_name": "CWE-918", "label": 918}
{"code": " def create_code_for_user(cls, user, next=None):\n if not user.is_active:\n return None\n\n code = cls.generate_code()\n login_code = LoginCode(user=user, code=code)\n if next is not None:\n login_code.next = next\n login_code.save()\n return login_code", "label_name": "CWE-312", "label": 312}
{"code": "def update(request, pk):\n comment = Comment.objects.for_update_or_404(pk, request.user)\n form = CommentForm(data=post_data(request), instance=comment)\n if is_post(request) and form.is_valid():\n pre_comment_update(comment=Comment.objects.get(pk=comment.pk))\n comment = form.save()\n post_comment_update(comment=comment)\n return redirect(request.POST.get('next', comment.get_absolute_url()))\n return render(\n request=request,\n template_name='spirit/comment/update.html',\n context={'form': form})", "label_name": "CWE-601", "label": 601}
{"code": "def get_header_lines(header):\n \"\"\"\n Splits the header into lines, putting multi-line headers together.\n \"\"\"\n r = []\n lines = header.split(b\"\\n\")\n for line in lines:\n if line.startswith((b\" \", b\"\\t\")):\n if not r:\n # https://corte.si/posts/code/pathod/pythonservers/index.html\n raise ParsingError('Malformed header line \"%s\"' % tostr(line))\n r[-1] += line\n else:\n r.append(line)\n return r", "label_name": "CWE-444", "label": 444}
{"code": " def test_http11_list(self):\n body = string.ascii_letters\n to_send = \"GET /list HTTP/1.1\\n\" \"Content-Length: %d\\n\\n\" % len(body)\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n self.assertEqual(headers[\"content-length\"], str(len(body)))\n self.assertEqual(response_body, tobytes(body))\n # remote keeps connection open because it divined the content length\n # from a length-1 list\n self.sock.send(to_send)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")", "label_name": "CWE-444", "label": 444}
{"code": "def store_user_session():\n if flask_session.get('_user_id', \"\"):\n try:\n if not check_user_session(flask_session.get('_user_id', \"\"), flask_session.get('_id', \"\")):\n user_session = User_Sessions(flask_session.get('_user_id', \"\"), flask_session.get('_id', \"\"))\n session.add(user_session)\n session.commit()\n log.info(\"Login and store session : \" + flask_session.get('_id', \"\"))\n else:\n log.info(\"Found stored session : \" + flask_session.get('_id', \"\"))\n except (exc.OperationalError, exc.InvalidRequestError) as e:\n session.rollback()\n log.exception(e)\n else:\n log.error(\"No user id in session\")", "label_name": "CWE-79", "label": 79}
{"code": "def load_hparams_from_yaml(config_yaml: str, use_omegaconf: bool = True) -> Dict[str, Any]:\n \"\"\"Load hparams from a file.\n\n Args:\n config_yaml: Path to config yaml file\n use_omegaconf: If omegaconf is available and ``use_omegaconf=True``,\n the hparams will be converted to ``DictConfig`` if possible.\n\n >>> hparams = Namespace(batch_size=32, learning_rate=0.001, data_root='./any/path/here')\n >>> path_yaml = './testing-hparams.yaml'\n >>> save_hparams_to_yaml(path_yaml, hparams)\n >>> hparams_new = load_hparams_from_yaml(path_yaml)\n >>> vars(hparams) == hparams_new\n True\n >>> os.remove(path_yaml)\n \"\"\"\n fs = get_filesystem(config_yaml)\n if not fs.exists(config_yaml):\n rank_zero_warn(f\"Missing Tags: {config_yaml}.\", category=RuntimeWarning)\n return {}\n\n with fs.open(config_yaml, \"r\") as fp:\n hparams = yaml.load(fp, Loader=yaml.UnsafeLoader)\n\n if _OMEGACONF_AVAILABLE:\n if use_omegaconf:\n try:\n return OmegaConf.create(hparams)\n except (UnsupportedValueType, ValidationError):\n pass\n return hparams", "label_name": "CWE-502", "label": 502}
{"code": "def adv_search_shelf(q, include_shelf_inputs, exclude_shelf_inputs):\n q = q.outerjoin(ub.BookShelf, db.Books.id == ub.BookShelf.book_id)\\\n .filter(or_(ub.BookShelf.shelf == None, ub.BookShelf.shelf.notin_(exclude_shelf_inputs)))\n if len(include_shelf_inputs) > 0:\n q = q.filter(ub.BookShelf.shelf.in_(include_shelf_inputs))\n return q", "label_name": "CWE-918", "label": 918}
{"code": " def test_notfilelike_shortcl_http11(self):\n to_send = \"GET /notfilelike_shortcl HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n for t in range(0, 2):\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, 1)\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\" in response_body)", "label_name": "CWE-444", "label": 444}
{"code": "def _inject_metadata_into_fs(metadata, fs, execute=None):\n metadata_path = os.path.join(fs, \"meta.js\")\n metadata = dict([(m.key, m.value) for m in metadata])\n\n utils.execute('tee', metadata_path,\n process_input=jsonutils.dumps(metadata), run_as_root=True)", "label_name": "CWE-22", "label": 22}
{"code": "def test_get_frontend_context_variables_safe(component):\n # Set component.name to a potential XSS attack\n component.name = ' '\n\n class Meta:\n safe = [\n \"name\",\n ]\n\n setattr(component, \"Meta\", Meta())\n\n frontend_context_variables = component.get_frontend_context_variables()\n frontend_context_variables_dict = orjson.loads(frontend_context_variables)\n assert len(frontend_context_variables_dict) == 1\n assert (\n frontend_context_variables_dict.get(\"name\")\n == ' '\n )", "label_name": "CWE-79", "label": 79}
{"code": " def test_get_imports(self, mocker):\n from openapi_python_client.parser.properties import DateTimeProperty\n\n name = mocker.MagicMock()\n mocker.patch(\"openapi_python_client.utils.snake_case\")\n p = DateTimeProperty(name=name, required=True, default=None)\n assert p.get_imports(prefix=\"\") == {\n \"from datetime import datetime\",\n \"from typing import cast\",\n }\n\n p.required = False\n assert p.get_imports(prefix=\"\") == {\n \"from typing import Optional\",\n \"from datetime import datetime\",\n \"from typing import cast\",\n }", "label_name": "CWE-94", "label": 94}
{"code": " def test_uses_existing_file_and_ignores_xdg(self):\n with WindowsSafeTempDir() as d:\n default_db_file_location = os.path.join(self.home, '.b2_account_info')\n open(default_db_file_location, 'a').close()\n account_info = self._make_sqlite_account_info(\n env={\n 'HOME': self.home,\n 'USERPROFILE': self.home,\n XDG_CONFIG_HOME_ENV_VAR: d,\n }\n )\n actual_path = os.path.abspath(account_info.filename)\n assert default_db_file_location == actual_path\n assert not os.path.exists(os.path.join(d, 'b2'))", "label_name": "CWE-367", "label": 367}
{"code": "def register(request, registration_form=RegistrationForm):\n if request.user.is_authenticated:\n return redirect(request.GET.get('next', reverse('spirit:user:update')))\n\n form = registration_form(data=post_data(request))\n if (is_post(request) and\n not request.is_limited() and\n form.is_valid()):\n user = form.save()\n send_activation_email(request, user)\n messages.info(\n request, _(\n \"We have sent you an email to %(email)s \"\n \"so you can activate your account!\") % {'email': form.get_email()})\n\n # TODO: email-less activation\n # if not settings.REGISTER_EMAIL_ACTIVATION_REQUIRED:\n # login(request, user)\n # return redirect(request.GET.get('next', reverse('spirit:user:update')))\n\n return redirect(reverse(settings.LOGIN_URL))\n return render(\n request=request,\n template_name='spirit/user/auth/register.html',\n context={'form': form})", "label_name": "CWE-601", "label": 601}
{"code": " def test_send_empty_body(self):\n to_send = \"GET / HTTP/1.0\\n\" \"Content-Length: 0\\n\\n\"\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(echo.content_length, \"0\")\n self.assertEqual(echo.body, b\"\")", "label_name": "CWE-444", "label": 444}
{"code": " def testColocation(self):\n gpu_dev = test.gpu_device_name()\n\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32)\n v = 2. * (array_ops.zeros([128, 128]) + x)\n with ops.device(gpu_dev):\n stager = data_flow_ops.MapStagingArea([dtypes.float32])\n y = stager.put(1, [v], [0])\n expected_name = gpu_dev if 'gpu' not in gpu_dev else '/device:GPU:0'\n self.assertEqual(y.device, expected_name)\n with ops.device('/cpu:0'):\n _, x = stager.get(1)\n y = stager.peek(1)[0]\n _, z = stager.get()\n self.assertEqual(x[0].device, '/device:CPU:0')\n self.assertEqual(y.device, '/device:CPU:0')\n self.assertEqual(z[0].device, '/device:CPU:0')\n\n G.finalize()", "label_name": "CWE-843", "label": 843}
{"code": "def mysql_ends_with(field: Field, value: str) -> Criterion:\n return functions.Cast(field, SqlTypes.CHAR).like(f\"%{value}\")", "label_name": "CWE-89", "label": 89}
{"code": " def test_send_event_single_sender(self):\n \"\"\"Test that using a single federation sender worker correctly sends a\n new event.\n \"\"\"\n mock_client = Mock(spec=[\"put_json\"])\n mock_client.put_json.return_value = make_awaitable({})\n\n self.make_worker_hs(\n \"synapse.app.federation_sender\",\n {\"send_federation\": True},\n http_client=mock_client,\n )\n\n user = self.register_user(\"user\", \"pass\")\n token = self.login(\"user\", \"pass\")\n\n room = self.create_room_with_remote_server(user, token)\n\n mock_client.put_json.reset_mock()\n\n self.create_and_send_event(room, UserID.from_string(user))\n self.replicate()\n\n # Assert that the event was sent out over federation.\n mock_client.put_json.assert_called()\n self.assertEqual(mock_client.put_json.call_args[0][0], \"other_server\")\n self.assertTrue(mock_client.put_json.call_args[1][\"data\"].get(\"pdus\"))", "label_name": "CWE-601", "label": 601}
{"code": " def test_bad_integer(self):\n # issue13436: Bad error message with invalid numeric values\n body = [ast.ImportFrom(module='time',\n names=[ast.alias(name='sleep')],\n level=None,\n lineno=None, col_offset=None)]\n mod = ast.Module(body)\n with self.assertRaises(ValueError) as cm:\n compile(mod, 'test', 'exec')\n self.assertIn(\"invalid integer value: None\", str(cm.exception))", "label_name": "CWE-125", "label": 125}
{"code": " def export_bookmarks(self):\n filename = choose_save_file(\n self, 'export-viewer-bookmarks', _('Export bookmarks'),\n filters=[(_('Saved bookmarks'), ['pickle'])], all_files=False, initial_filename='bookmarks.pickle')\n if filename:\n with open(filename, 'wb') as fileobj:\n cPickle.dump(self.get_bookmarks(), fileobj, -1)", "label_name": "CWE-502", "label": 502}
{"code": " def check_valid_db(cls, config_calibre_dir, app_db_path, config_calibre_uuid):\n if not config_calibre_dir:\n return False, False\n dbpath = os.path.join(config_calibre_dir, \"metadata.db\")\n if not os.path.exists(dbpath):\n return False, False\n try:\n check_engine = create_engine('sqlite://',\n echo=False,\n isolation_level=\"SERIALIZABLE\",\n connect_args={'check_same_thread': False},\n poolclass=StaticPool)\n with check_engine.begin() as connection:\n connection.execute(text(\"attach database '{}' as calibre;\".format(dbpath)))\n connection.execute(text(\"attach database '{}' as app_settings;\".format(app_db_path)))\n local_session = scoped_session(sessionmaker())\n local_session.configure(bind=connection)\n database_uuid = local_session().query(Library_Id).one_or_none()\n # local_session.dispose()\n\n check_engine.connect()\n db_change = config_calibre_uuid != database_uuid.uuid\n except Exception:\n return False, False\n return True, db_change", "label_name": "CWE-918", "label": 918}
{"code": " async def initialize(self, bot):\r\n # temporary backwards compatibility\r\n key = await self.config.tenorkey()\r\n if not key:\r\n return\r\n await bot.set_shared_api_tokens(\"tenor\", api_key=key)\r\n await self.config.tenorkey.clear()\r", "label_name": "CWE-502", "label": 502}
{"code": " def test_http11_generator(self):\n body = string.ascii_letters\n to_send = \"GET / HTTP/1.1\\n\" \"Content-Length: %s\\n\\n\" % len(body)\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\")\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n expected = b\"\"\n for chunk in chunks(body, 10):\n expected += tobytes(\n \"%s\\r\\n%s\\r\\n\" % (str(hex(len(chunk))[2:].upper()), chunk)\n )\n expected += b\"0\\r\\n\\r\\n\"\n self.assertEqual(response_body, expected)\n # connection is always closed at the end of a chunked response\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def home_get_preview():\n vId = request.form['vId']\n d = db.sentences_stats('get_preview', vId)\n n = db.sentences_stats('id_networks', vId)\n return json.dumps({'status' : 'OK', 'vId' : vId, 'd' : d, 'n' : n});", "label_name": "CWE-79", "label": 79}
{"code": " def import_bookmarks(self):\n files = choose_files(self, 'export-viewer-bookmarks', _('Import bookmarks'),\n filters=[(_('Saved bookmarks'), ['pickle'])], all_files=False, select_only_single_file=True)\n if not files:\n return\n filename = files[0]\n\n imported = None\n with open(filename, 'rb') as fileobj:\n imported = cPickle.load(fileobj)\n\n if imported is not None:\n bad = False\n try:\n for bm in imported:\n if 'title' not in bm:\n bad = True\n break\n except Exception:\n pass\n\n if not bad:\n bookmarks = self.get_bookmarks()\n for bm in imported:\n if bm not in bookmarks:\n bookmarks.append(bm)\n self.set_bookmarks([bm for bm in bookmarks if bm['title'] != 'calibre_current_page_bookmark'])\n self.edited.emit(self.get_bookmarks())", "label_name": "CWE-502", "label": 502}
{"code": "def feed_ratings(book_id):\n off = request.args.get(\"offset\") or 0\n entries, __, pagination = calibre_db.fill_indexpage((int(off) / (int(config.config_books_per_page)) + 1), 0,\n db.Books,\n db.Books.ratings.any(db.Ratings.id == book_id),\n [db.Books.timestamp.desc()])\n return render_xml_template('feed.xml', entries=entries, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def testSimple(self):\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32)\n pi = array_ops.placeholder(dtypes.int64)\n gi = array_ops.placeholder(dtypes.int64)\n v = 2. * (array_ops.zeros([128, 128]) + x)\n with ops.device(test.gpu_device_name()):\n stager = data_flow_ops.MapStagingArea([dtypes.float32])\n stage = stager.put(pi, [v], [0])\n k, y = stager.get(gi)\n y = math_ops.reduce_max(math_ops.matmul(y, y))\n\n G.finalize()\n\n with self.session(graph=G) as sess:\n sess.run(stage, feed_dict={x: -1, pi: 0})\n for i in range(10):\n _, yval = sess.run([stage, y], feed_dict={x: i, pi: i + 1, gi: i})\n self.assertAllClose(4 * (i - 1) * (i - 1) * 128, yval, rtol=1e-4)", "label_name": "CWE-843", "label": 843}
{"code": " def test_file_position_after_tofile(self):\n # gh-4118\n sizes = [io.DEFAULT_BUFFER_SIZE//8,\n io.DEFAULT_BUFFER_SIZE,\n io.DEFAULT_BUFFER_SIZE*8]\n\n for size in sizes:\n err_msg = \"%d\" % (size,)\n\n f = open(self.filename, 'wb')\n f.seek(size-1)\n f.write(b'\\0')\n f.seek(10)\n f.write(b'12')\n np.array([0], dtype=np.float64).tofile(f)\n pos = f.tell()\n f.close()\n assert_equal(pos, 10 + 2 + 8, err_msg=err_msg)\n\n f = open(self.filename, 'r+b')\n f.read(2)\n f.seek(0, 1) # seek between read&write required by ANSI C\n np.array([0], dtype=np.float64).tofile(f)\n pos = f.tell()\n f.close()\n assert_equal(pos, 10, err_msg=err_msg)\n\n os.unlink(self.filename)", "label_name": "CWE-59", "label": 59}
{"code": " def to_yaml(self, **kwargs):\n \"\"\"Returns a yaml string containing the network configuration.\n\n To load a network from a yaml save file, use\n `keras.models.model_from_yaml(yaml_string, custom_objects={})`.\n\n `custom_objects` should be a dictionary mapping\n the names of custom losses / layers / etc to the corresponding\n functions / classes.\n\n Args:\n **kwargs: Additional keyword arguments\n to be passed to `yaml.dump()`.\n\n Returns:\n A YAML string.\n\n Raises:\n ImportError: if yaml module is not found.\n \"\"\"\n if yaml is None:\n raise ImportError(\n 'Requires yaml module installed (`pip install pyyaml`).')\n return yaml.dump(self._updated_config(), **kwargs)", "label_name": "CWE-502", "label": 502}
{"code": "def parse_line(s):\n s = s.rstrip()\n\n r = re.sub(REG_LINE_GPERF, '', s)\n if r != s: return r\n r = re.sub(REG_HASH_FUNC, 'hash(OnigCodePoint codes[])', s)\n if r != s: return r\n r = re.sub(REG_STR_AT, 'onig_codes_byte_at(codes, \\\\1)', s)\n if r != s: return r\n r = re.sub(REG_UNFOLD_KEY, 'unicode_unfold_key(OnigCodePoint code)', s)\n if r != s: return r\n r = re.sub(REG_ENTRY, '{\\\\1, \\\\2, \\\\3}', s)\n if r != s: return r\n r = re.sub(REG_EMPTY_ENTRY, '{0xffffffff, \\\\1, \\\\2}', s)\n if r != s: return r\n r = re.sub(REG_IF_LEN, 'if (0 == 0)', s)\n if r != s: return r\n r = re.sub(REG_GET_HASH, 'int key = hash(&code);', s)\n if r != s: return r\n r = re.sub(REG_GET_CODE, 'OnigCodePoint gcode = wordlist[key].code;', s)\n if r != s: return r\n r = re.sub(REG_CODE_CHECK, 'if (code == gcode)', s)\n if r != s: return r\n\n return s", "label_name": "CWE-787", "label": 787}
{"code": "def render_search_results(term, offset=None, order=None, limit=None):\n join = db.books_series_link, db.Books.id == db.books_series_link.c.book, db.Series\n entries, result_count, pagination = calibre_db.get_search_results(term,\n offset,\n order,\n limit,\n False,\n config.config_read_column,\n *join)\n return render_title_template('search.html',\n searchterm=term,\n pagination=pagination,\n query=term,\n adv_searchterm=term,\n entries=entries,\n result_count=result_count,\n title=_(u\"Search\"),\n page=\"search\",\n order=order[1])", "label_name": "CWE-918", "label": 918}
{"code": " def post(self, request, *args, **kwargs): # doccov: ignore\n command = request.POST.get(\"command\")\n if command:\n dispatcher = getattr(self, \"dispatch_%s\" % command, None)\n if not callable(dispatcher):\n raise Problem(_(\"Unknown command: `%s`.\") % command)\n dispatch_kwargs = dict(request.POST.items())\n rv = dispatcher(**dispatch_kwargs)\n if rv:\n return rv\n self.request.method = \"GET\" # At this point, we won't want to cause form validation\n self.build_form() # and it's not a bad idea to rebuild the form\n return super(EditorView, self).get(request, *args, **kwargs)\n\n if request.POST.get(\"save\") and self.form and self.form.is_valid():\n self.form.save()\n self.save_layout()\n\n # after we save the new layout configs, make sure to reload the saved data in forms\n # so the returned get() response contains updated data\n self.build_form()\n\n if request.POST.get(\"publish\") == \"1\":\n return self.dispatch_publish()\n\n return self.get(request, *args, **kwargs)", "label_name": "CWE-79", "label": 79}
{"code": " def get_http_client(self) -> MatrixFederationHttpClient:\n tls_client_options_factory = context_factory.FederationPolicyForHTTPS(\n self.config\n )\n return MatrixFederationHttpClient(self, tls_client_options_factory)", "label_name": "CWE-601", "label": 601}
{"code": " def _remove_javascript_link(self, link):\n # links like \"j a v a s c r i p t:\" might be interpreted in IE\n new = _substitute_whitespace('', link)\n if _is_javascript_scheme(new):\n # FIXME: should this be None to delete?\n return ''\n return link", "label_name": "CWE-79", "label": 79}
{"code": " def test_send_with_body(self):\n to_send = \"GET / HTTP/1.0\\n\" \"Content-Length: 5\\n\\n\"\n to_send += \"hello\"\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(echo.content_length, \"5\")\n self.assertEqual(echo.body, b\"hello\")", "label_name": "CWE-444", "label": 444}
{"code": " def test_double_linefeed(self):\n self.assertEqual(self._callFUT(b\"\\n\\n\"), 2)", "label_name": "CWE-444", "label": 444}
{"code": "def upload_cover(request, book):\n if 'btn-upload-cover' in request.files:\n requested_file = request.files['btn-upload-cover']\n # check for empty request\n if requested_file.filename != '':\n if not current_user.role_upload():\n abort(403)\n ret, message = helper.save_cover(requested_file, book.path)\n if ret is True:\n return True\n else:\n flash(message, category=\"error\")\n return False\n return None", "label_name": "CWE-918", "label": 918}
{"code": " async def check_credentials(username: str, password: str) -> bool:\n return (username, password) == credentials", "label_name": "CWE-203", "label": 203}
{"code": "def view_configuration():\n read_column = calibre_db.session.query(db.Custom_Columns)\\\n .filter(and_(db.Custom_Columns.datatype == 'bool', db.Custom_Columns.mark_for_delete == 0)).all()\n restrict_columns = calibre_db.session.query(db.Custom_Columns)\\\n .filter(and_(db.Custom_Columns.datatype == 'text', db.Custom_Columns.mark_for_delete == 0)).all()\n languages = calibre_db.speaking_language()\n translations = [LC('en')] + babel.list_translations()\n return render_title_template(\"config_view_edit.html\", conf=config, readColumns=read_column,\n restrictColumns=restrict_columns,\n languages=languages,\n translations=translations,\n title=_(u\"UI Configuration\"), page=\"uiconfig\")", "label_name": "CWE-918", "label": 918}
{"code": "void AveragePool(const float* input_data, const Dims<4>& input_dims,\n int stride_width, int stride_height, int pad_width,\n int pad_height, int kwidth, int kheight, float* output_data,\n const Dims<4>& output_dims) {\n float output_activation_min, output_activation_max;\n GetActivationMinMax(Ac, &output_activation_min, &output_activation_max);\n\n AveragePool(input_data, input_dims, stride_width, stride_height, pad_width,\n pad_height, kwidth, kheight, output_activation_min,\n output_activation_max, output_data, output_dims);\n}", "label_name": "CWE-835", "label": 835}
{"code": " def emit(self, s, depth, reflow=True):\n # XXX reflow long lines?\n if reflow:\n lines = reflow_lines(s, depth)\n else:\n lines = [s]\n for line in lines:\n line = (\" \" * TABSIZE * depth) + line + \"\\n\"\n self.file.write(line)", "label_name": "CWE-125", "label": 125}
{"code": " def item_to_bm(self, item):\n return cPickle.loads(bytes(item.data(Qt.UserRole)))", "label_name": "CWE-502", "label": 502}
{"code": " def _request(self, method, path, queries=(), body=None, ensure_encoding=True,\n log_request_body=True):", "label_name": "CWE-295", "label": 295}
{"code": "def _not_here_yet(request, *args, **kwargs):\n return HttpResponse(\"Not here yet: %s (%r, %r)\" % (request.path, args, kwargs), status=410)", "label_name": "CWE-79", "label": 79}
{"code": " def test_filelike_nocl_http11(self):\n to_send = \"GET /filelike_nocl HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n for t in range(0, 2):\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)", "label_name": "CWE-444", "label": 444}
{"code": "def publish(request, topic_id, pk=None):\n initial = None\n if pk: # todo: move to form\n comment = get_object_or_404(\n Comment.objects.for_access(user=request.user), pk=pk)\n quote = markdown.quotify(comment.comment, comment.user.st.nickname)\n initial = {'comment': quote}\n\n user = request.user\n topic = get_object_or_404(\n Topic.objects.opened().for_access(user),\n pk=topic_id)\n form = CommentForm(\n user=user,\n topic=topic,\n data=post_data(request),\n initial=initial)\n\n if is_post(request) and not request.is_limited() and form.is_valid():\n if not user.st.update_post_hash(form.get_comment_hash()):\n # Hashed comment may have not been saved yet\n return redirect(\n request.POST.get('next', None) or\n Comment\n .get_last_for_topic(topic_id)\n .get_absolute_url())\n\n comment = form.save()\n comment_posted(comment=comment, mentions=form.mentions)\n return redirect(request.POST.get('next', comment.get_absolute_url()))\n\n return render(\n request=request,\n template_name='spirit/comment/publish.html',\n context={\n 'form': form,\n 'topic': topic})", "label_name": "CWE-601", "label": 601}
{"code": "def create_class_from_xml_string(target_class, xml_string):\n \"\"\"Creates an instance of the target class from a string.\n\n :param target_class: The class which will be instantiated and populated\n with the contents of the XML. This class must have a c_tag and a\n c_namespace class variable.\n :param xml_string: A string which contains valid XML. The root element\n of the XML string should match the tag and namespace of the desired\n class.\n\n :return: An instance of the target class with members assigned according to\n the contents of the XML - or None if the root XML tag and namespace did\n not match those of the target class.\n \"\"\"\n if not isinstance(xml_string, six.binary_type):\n xml_string = xml_string.encode('utf-8')\n tree = ElementTree.fromstring(xml_string)\n return create_class_from_element_tree(target_class, tree)", "label_name": "CWE-611", "label": 611}
{"code": " def xsrf_token(self):\n \"\"\"The XSRF-prevention token for the current user/session.\n\n To prevent cross-site request forgery, we set an '_xsrf' cookie\n and include the same '_xsrf' value as an argument with all POST\n requests. If the two do not match, we reject the form submission\n as a potential forgery.\n\n See http://en.wikipedia.org/wiki/Cross-site_request_forgery\n \"\"\"\n if not hasattr(self, \"_xsrf_token\"):\n token = self.get_cookie(\"_xsrf\")\n if not token:\n token = binascii.b2a_hex(os.urandom(16))\n expires_days = 30 if self.current_user else None\n self.set_cookie(\"_xsrf\", token, expires_days=expires_days)\n self._xsrf_token = token\n return self._xsrf_token", "label_name": "CWE-203", "label": 203}
{"code": " def test_logout_post(self):\n login_code = LoginCode.objects.create(user=self.user, code='foobar')\n\n self.client.login(username=self.user.username, code=login_code.code)\n\n response = self.client.post('/accounts/logout/?next=/accounts/login/')\n\n self.assertEqual(response.status_code, 302)\n self.assertEqual(response['Location'], '/accounts/login/')\n self.assertTrue(response.wsgi_request.user.is_anonymous)", "label_name": "CWE-312", "label": 312}
{"code": "def help_page(page_slug: str) -> str:\n \"\"\"Fava's included documentation.\"\"\"\n if page_slug not in HELP_PAGES:\n abort(404)\n html = markdown2.markdown_path(\n (resource_path(\"help\") / (page_slug + \".md\")),\n extras=[\"fenced-code-blocks\", \"tables\", \"header-ids\"],\n )\n return render_template(\n \"_layout.html\",\n active_page=\"help\",\n page_slug=page_slug,\n help_html=render_template_string(\n html,\n beancount_version=beancount_version,\n fava_version=fava_version,\n ),\n HELP_PAGES=HELP_PAGES,\n )", "label_name": "CWE-79", "label": 79}
{"code": "async def handle_404(request, response):\n if 'json' not in response.headers['Content-Type']:\n if request.path.endswith('/'):\n return web.HTTPFound(request.path.rstrip('/'))\n return web.json_response({\n \"status\": 404,\n \"message\": \"Page '{}' not found\".format(request.path)\n }, status=404)\n return response", "label_name": "CWE-601", "label": 601}
{"code": " def get_pos_tagger(self):\n from nltk.corpus import brown\n\n regexp_tagger = RegexpTagger(\n [\n (r\"^-?[0-9]+(.[0-9]+)?$\", \"CD\"), # cardinal numbers\n (r\"(The|the|A|a|An|an)$\", \"AT\"), # articles\n (r\".*able$\", \"JJ\"), # adjectives\n (r\".*ness$\", \"NN\"), # nouns formed from adjectives\n (r\".*ly$\", \"RB\"), # adverbs\n (r\".*s$\", \"NNS\"), # plural nouns\n (r\".*ing$\", \"VBG\"), # gerunds\n (r\".*ed$\", \"VBD\"), # past tense verbs\n (r\".*\", \"NN\"), # nouns (default)\n ]\n )\n brown_train = brown.tagged_sents(categories=\"news\")\n unigram_tagger = UnigramTagger(brown_train, backoff=regexp_tagger)\n bigram_tagger = BigramTagger(brown_train, backoff=unigram_tagger)\n trigram_tagger = TrigramTagger(brown_train, backoff=bigram_tagger)\n\n # Override particular words\n main_tagger = RegexpTagger(\n [(r\"(A|a|An|an)$\", \"ex_quant\"), (r\"(Every|every|All|all)$\", \"univ_quant\")],\n backoff=trigram_tagger,\n )\n\n return main_tagger", "label_name": "CWE-1333", "label": 1333}
{"code": "def get_valid_filename(value, replace_whitespace=True, chars=128):\n \"\"\"\n Returns the given string converted to a string that can be used for a clean\n filename. Limits num characters to 128 max.\n \"\"\"\n if value[-1:] == u'.':\n value = value[:-1]+u'_'\n value = value.replace(\"/\", \"_\").replace(\":\", \"_\").strip('\\0')\n if use_unidecode:\n if config.config_unicode_filename:\n value = (unidecode.unidecode(value))\n else:\n value = value.replace(u'\u00a7', u'SS')\n value = value.replace(u'\u00df', u'ss')\n value = unicodedata.normalize('NFKD', value)\n re_slugify = re.compile(r'[\\W\\s-]', re.UNICODE)\n value = re_slugify.sub('', value)\n if replace_whitespace:\n # *+:\\\"/<>? are replaced by _\n value = re.sub(r'[*+:\\\\\\\"/<>?]+', u'_', value, flags=re.U)\n # pipe has to be replaced with comma\n value = re.sub(r'[|]+', u',', value, flags=re.U)\n value = value[:chars].strip()\n if not value:\n raise ValueError(\"Filename cannot be empty\")\n return value", "label_name": "CWE-918", "label": 918}
{"code": " def sentences_stats(self, type, vId = None):\n return self.sql_execute(self.prop_sentences_stats(type, vId))", "label_name": "CWE-89", "label": 89}
{"code": "def feed_hot():\n off = request.args.get(\"offset\") or 0\n all_books = ub.session.query(ub.Downloads, func.count(ub.Downloads.book_id)).order_by(\n func.count(ub.Downloads.book_id).desc()).group_by(ub.Downloads.book_id)\n hot_books = all_books.offset(off).limit(config.config_books_per_page)\n entries = list()\n for book in hot_books:\n downloadBook = calibre_db.get_book(book.Downloads.book_id)\n if downloadBook:\n entries.append(\n calibre_db.get_filtered_book(book.Downloads.book_id)\n )\n else:\n ub.delete_download(book.Downloads.book_id)\n numBooks = entries.__len__()\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1),\n config.config_books_per_page, numBooks)\n return render_xml_template('feed.xml', entries=entries, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def _copy_file(self, in_path, out_path):\n if not os.path.exists(in_path):\n raise errors.AnsibleFileNotFound(\"file or module does not exist: %s\" % in_path)\n try:\n shutil.copyfile(in_path, out_path)\n except shutil.Error:\n traceback.print_exc()\n raise errors.AnsibleError(\"failed to copy: %s and %s are the same\" % (in_path, out_path))\n except IOError:\n traceback.print_exc()\n raise errors.AnsibleError(\"failed to transfer file to %s\" % out_path)", "label_name": "CWE-59", "label": 59}
{"code": "def check_read_formats(entry):\n EXTENSIONS_READER = {'TXT', 'PDF', 'EPUB', 'CBZ', 'CBT', 'CBR', 'DJVU'}\n bookformats = list()\n if len(entry.data):\n for ele in iter(entry.data):\n if ele.format.upper() in EXTENSIONS_READER:\n bookformats.append(ele.format.lower())\n return bookformats", "label_name": "CWE-918", "label": 918}
{"code": "def ends_with(field: Term, value: str) -> Criterion:\n return field.like(f\"%{value}\")", "label_name": "CWE-89", "label": 89}
{"code": "def author_list():\n if current_user.check_visibility(constants.SIDEBAR_AUTHOR):\n if current_user.get_view_property('author', 'dir') == 'desc':\n order = db.Authors.sort.desc()\n order_no = 0\n else:\n order = db.Authors.sort.asc()\n order_no = 1\n entries = calibre_db.session.query(db.Authors, func.count('books_authors_link.book').label('count')) \\\n .join(db.books_authors_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(text('books_authors_link.author')).order_by(order).all()\n charlist = calibre_db.session.query(func.upper(func.substr(db.Authors.sort, 1, 1)).label('char')) \\\n .join(db.books_authors_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(func.upper(func.substr(db.Authors.sort, 1, 1))).all()\n # If not creating a copy, readonly databases can not display authornames with \"|\" in it as changing the name\n # starts a change session\n autor_copy = copy.deepcopy(entries)\n for entry in autor_copy:\n entry.Authors.name = entry.Authors.name.replace('|', ',')\n return render_title_template('list.html', entries=autor_copy, folder='web.books_list', charlist=charlist,\n title=u\"Authors\", page=\"authorlist\", data='author', order=order_no)\n else:\n abort(404)", "label_name": "CWE-918", "label": 918}
{"code": " def test_login_post(self):\n login_code = LoginCode.objects.create(user=self.user, code='foobar', next='/private/')\n\n response = self.client.post('/accounts/login/code/', {\n 'code': login_code.code,\n })\n\n self.assertEqual(response.status_code, 302)\n self.assertEqual(response['Location'], '/private/')\n self.assertEqual(response.wsgi_request.user, self.user)\n self.assertFalse(LoginCode.objects.filter(pk=login_code.pk).exists())", "label_name": "CWE-312", "label": 312}
{"code": "def render_archived_books(page, sort_param):\n order = sort_param[0] or []\n archived_books = (\n ub.session.query(ub.ArchivedBook)\n .filter(ub.ArchivedBook.user_id == int(current_user.id))\n .filter(ub.ArchivedBook.is_archived == True)\n .all()\n )\n archived_book_ids = [archived_book.book_id for archived_book in archived_books]\n\n archived_filter = db.Books.id.in_(archived_book_ids)\n\n entries, random, pagination = calibre_db.fill_indexpage_with_archived_books(page, db.Books,\n 0,\n archived_filter,\n order,\n True,\n False, 0)\n\n name = _(u'Archived Books') + ' (' + str(len(archived_book_ids)) + ')'\n pagename = \"archived\"\n return render_title_template('index.html', random=random, entries=entries, pagination=pagination,\n title=name, page=pagename, order=sort_param[1])", "label_name": "CWE-918", "label": 918}
{"code": "def download(url, location):\n \"\"\"\n Download files to the specified location.\n :param url: The file URL.\n :type url: str\n :param location: The absolute path to where the downloaded\n file is to be stored.\n :type location: str\n \"\"\"\n request = urllib2.urlopen(url)\n try:\n content = request.read()\n fp = open(location, 'w+')\n try:\n fp.write(content)\n finally:\n fp.close()\n finally:\n request.close()", "label_name": "CWE-295", "label": 295}
{"code": "def check_username(username):\n username = username.strip()\n if ub.session.query(ub.User).filter(func.lower(ub.User.name) == username.lower()).scalar():\n log.error(u\"This username is already taken\")\n raise Exception (_(u\"This username is already taken\"))\n return username", "label_name": "CWE-918", "label": 918}
{"code": "def get_cc_columns(filter_config_custom_read=False):\n tmpcc = calibre_db.session.query(db.Custom_Columns)\\\n .filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions)).all()\n cc = []\n r = None\n if config.config_columns_to_ignore:\n r = re.compile(config.config_columns_to_ignore)\n\n for col in tmpcc:\n if filter_config_custom_read and config.config_read_column and config.config_read_column == col.id:\n continue\n if r and r.match(col.name):\n continue\n cc.append(col)\n\n return cc", "label_name": "CWE-918", "label": 918}
{"code": "def runserverobj(method, docs=None, dt=None, dn=None, arg=None, args=None):\n\tfrappe.desk.form.run_method.runserverobj(method, docs=docs, dt=dt, dn=dn, arg=arg, args=args)", "label_name": "CWE-79", "label": 79}
{"code": " def make_homeserver(self, reactor, clock):\n self.mock_federation = Mock()\n self.mock_registry = Mock()\n\n self.query_handlers = {}\n\n def register_query_handler(query_type, handler):\n self.query_handlers[query_type] = handler\n\n self.mock_registry.register_query_handler = register_query_handler\n\n hs = self.setup_test_homeserver(\n http_client=None,\n resource_for_federation=Mock(),\n federation_client=self.mock_federation,\n federation_registry=self.mock_registry,\n )\n\n self.handler = hs.get_directory_handler()\n\n self.store = hs.get_datastore()\n\n self.my_room = RoomAlias.from_string(\"#my-room:test\")\n self.your_room = RoomAlias.from_string(\"#your-room:test\")\n self.remote_room = RoomAlias.from_string(\"#another:remote\")\n\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def adv_search_serie(q, include_series_inputs, exclude_series_inputs):\n for serie in include_series_inputs:\n q = q.filter(db.Books.series.any(db.Series.id == serie))\n for serie in exclude_series_inputs:\n q = q.filter(not_(db.Books.series.any(db.Series.id == serie)))\n return q", "label_name": "CWE-918", "label": 918}
{"code": "def _get_element_ptr_tuplelike(parent, key):\n typ = parent.typ\n assert isinstance(typ, TupleLike)\n\n if isinstance(typ, StructType):\n assert isinstance(key, str)\n subtype = typ.members[key]\n attrs = list(typ.tuple_keys())\n index = attrs.index(key)\n annotation = key\n else:\n assert isinstance(key, int)\n subtype = typ.members[key]\n attrs = list(range(len(typ.members)))\n index = key\n annotation = None\n\n # generated by empty() + make_setter\n if parent.value == \"~empty\":\n return IRnode.from_list(\"~empty\", typ=subtype)\n\n if parent.value == \"multi\":\n assert parent.encoding != Encoding.ABI, \"no abi-encoded literals\"\n return parent.args[index]\n\n ofst = 0 # offset from parent start\n\n if parent.encoding in (Encoding.ABI, Encoding.JSON_ABI):\n if parent.location == STORAGE:\n raise CompilerPanic(\"storage variables should not be abi encoded\") # pragma: notest\n\n member_t = typ.members[attrs[index]]\n\n for i in range(index):\n member_abi_t = typ.members[attrs[i]].abi_type\n ofst += member_abi_t.embedded_static_size()\n\n return _getelemptr_abi_helper(parent, member_t, ofst)\n\n if parent.location.word_addressable:\n for i in range(index):\n ofst += typ.members[attrs[i]].storage_size_in_words\n elif parent.location.byte_addressable:\n for i in range(index):\n ofst += typ.members[attrs[i]].memory_bytes_required\n else:\n raise CompilerPanic(f\"bad location {parent.location}\") # pragma: notest\n\n return IRnode.from_list(\n add_ofst(parent, ofst),\n typ=subtype,\n location=parent.location,\n encoding=parent.encoding,\n annotation=annotation,\n )", "label_name": "CWE-190", "label": 190}
{"code": " def atom_timestamp(self):\n return (self.timestamp.strftime('%Y-%m-%dT%H:%M:%S+00:00') or '')", "label_name": "CWE-918", "label": 918}
{"code": " def __init__(self):\n self.reqparse = reqparse.RequestParser()\n super(AuthenticatedService, self).__init__()\n self.auth_dict = dict()\n if current_user.is_authenticated():\n roles_marshal = []\n for role in current_user.roles:\n roles_marshal.append(marshal(role.__dict__, ROLE_FIELDS))\n\n roles_marshal.append({\"name\": current_user.role})\n\n for role in RBACRole.roles[current_user.role].get_parents():\n roles_marshal.append({\"name\": role.name})\n\n self.auth_dict = {\n \"authenticated\": True,\n \"user\": current_user.email,\n \"roles\": roles_marshal\n }\n else:\n if app.config.get('FRONTED_BY_NGINX'):\n url = \"https://{}:{}{}\".format(app.config.get('FQDN'), app.config.get('NGINX_PORT'), '/login')\n else:\n url = \"http://{}:{}{}\".format(app.config.get('FQDN'), app.config.get('API_PORT'), '/login')\n self.auth_dict = {\n \"authenticated\": False,\n \"user\": None,\n \"url\": url\n }", "label_name": "CWE-601", "label": 601}
{"code": "def edit_all_cc_data(book_id, book, to_save):\n cc = calibre_db.session.query(db.Custom_Columns).filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions)).all()\n return edit_cc_data(book_id, book, to_save, cc)", "label_name": "CWE-918", "label": 918}
{"code": "def send_mail(book_id, book_format, convert, kindle_mail, calibrepath, user_id):\n \"\"\"Send email with attachments\"\"\"\n book = calibre_db.get_book(book_id)\n\n if convert == 1:\n # returns None if success, otherwise errormessage\n return convert_book_format(book_id, calibrepath, u'epub', book_format.lower(), user_id, kindle_mail)\n if convert == 2:\n # returns None if success, otherwise errormessage\n return convert_book_format(book_id, calibrepath, u'azw3', book_format.lower(), user_id, kindle_mail)\n\n for entry in iter(book.data):\n if entry.format.upper() == book_format.upper():\n converted_file_name = entry.name + '.' + book_format.lower()\n link = '{} '.format(url_for('web.show_book', book_id=book_id), escape(book.title))\n EmailText = _(u\"%(book)s send to Kindle\", book=link)\n WorkerThread.add(user_id, TaskEmail(_(u\"Send to Kindle\"), book.path, converted_file_name,\n config.get_mail_settings(), kindle_mail,\n EmailText, _(u'This e-mail has been sent via Calibre-Web.')))\n return\n return _(u\"The requested file could not be read. Maybe wrong permissions?\")", "label_name": "CWE-918", "label": 918}
{"code": " def test_login_unknown_code(self):\n response = self.client.post('/accounts/login/code/', {\n 'code': 'unknown',\n })\n\n self.assertEqual(response.status_code, 200)\n self.assertEqual(response.context['form'].errors, {\n 'code': ['Login code is invalid. It might have expired.'],\n })", "label_name": "CWE-312", "label": 312}
{"code": "def format_runtime(runtime):\n retVal = \"\"\n if runtime.days:\n retVal = format_unit(runtime.days, 'duration-day', length=\"long\", locale=get_locale()) + ', '\n mins, seconds = divmod(runtime.seconds, 60)\n hours, minutes = divmod(mins, 60)\n # ToDo: locale.number_symbols._data['timeSeparator'] -> localize time separator ?\n if hours:\n retVal += '{:d}:{:02d}:{:02d}s'.format(hours, minutes, seconds)\n elif minutes:\n retVal += '{:2d}:{:02d}s'.format(minutes, seconds)\n else:\n retVal += '{:2d}s'.format(seconds)\n return retVal", "label_name": "CWE-918", "label": 918}
{"code": " def test_login_get(self):\n login_code = LoginCode.objects.create(user=self.user, code='foobar')\n\n response = self.client.get('/accounts/login/code/', {\n 'code': login_code.code,\n })\n\n self.assertEqual(response.status_code, 200)\n self.assertEqual(response.context['form'].cleaned_data['code'], login_code)\n self.assertTrue(response.wsgi_request.user.is_anonymous)\n self.assertTrue(LoginCode.objects.filter(pk=login_code.pk).exists())", "label_name": "CWE-312", "label": 312}
{"code": " def __init__(self, text, book):\n self.text = text\n self.book = book", "label_name": "CWE-918", "label": 918}
{"code": " def test_equal_body(self):\n # check server doesnt close connection when body is equal to\n # cl header\n to_send = tobytes(\n \"GET /equal_body HTTP/1.0\\n\"\n \"Connection: Keep-Alive\\n\"\n \"Content-Length: 0\\n\"\n \"\\n\"\n )\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n content_length = int(headers.get(\"content-length\")) or None\n self.assertEqual(content_length, 9)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(content_length, len(response_body))\n self.assertEqual(response_body, tobytes(\"abcdefghi\"))\n # remote does not close connection (keepalive header)\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")", "label_name": "CWE-444", "label": 444}
{"code": " def get_imports(self, *, prefix: str) -> Set[str]:\n \"\"\"\n Get a set of import strings that should be included when this property is used somewhere\n\n Args:\n prefix: A prefix to put before any relative (local) module names.\n \"\"\"\n imports = super().get_imports(prefix=prefix)\n imports.update({\"from datetime import datetime\", \"from typing import cast\"})\n return imports", "label_name": "CWE-94", "label": 94}
{"code": "def get_cc_columns(filter_config_custom_read=False):\n tmpcc = calibre_db.session.query(db.Custom_Columns)\\\n .filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions)).all()\n cc = []\n r = None\n if config.config_columns_to_ignore:\n r = re.compile(config.config_columns_to_ignore)\n\n for col in tmpcc:\n if filter_config_custom_read and config.config_read_column and config.config_read_column == col.id:\n continue\n if r and r.match(col.name):\n continue\n cc.append(col)\n\n return cc", "label_name": "CWE-918", "label": 918}
{"code": "def feed_categoryindex():\n shift = 0\n off = int(request.args.get(\"offset\") or 0)\n entries = calibre_db.session.query(func.upper(func.substr(db.Tags.name, 1, 1)).label('id'))\\\n .join(db.books_tags_link).join(db.Books).filter(calibre_db.common_filters())\\\n .group_by(func.upper(func.substr(db.Tags.name, 1, 1))).all()\n elements = []\n if off == 0:\n elements.append({'id': \"00\", 'name':_(\"All\")})\n shift = 1\n for entry in entries[\n off + shift - 1:\n int(off + int(config.config_books_per_page) - shift)]:\n elements.append({'id': entry.id, 'name': entry.id})\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries) + 1)\n return render_xml_template('feed.xml',\n letterelements=elements,\n folder='opds.feed_letter_category',\n pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def MD5(self,data:str):\n sha = hashlib.md5(bytes(data.encode()))\n hash = str(sha.digest())\n return self.__Salt(hash,salt=self.salt)", "label_name": "CWE-916", "label": 916}
{"code": "def field_names(ctx, rd, field):\n '''\n Get a list of all names for the specified field\n Optional: ?library_id=\n '''\n db, library_id = get_library_data(ctx, rd)[:2]\n return tuple(db.all_field_names(field))", "label_name": "CWE-502", "label": 502}
{"code": " def as_const(self, eval_ctx=None):\n eval_ctx = get_eval_context(self, eval_ctx)\n if eval_ctx.volatile:\n raise Impossible()\n obj = self.node.as_const(eval_ctx)\n\n # don't evaluate context functions\n args = [x.as_const(eval_ctx) for x in self.args]\n if isinstance(obj, _context_function_types):\n if getattr(obj, 'contextfunction', False):\n raise Impossible()\n elif getattr(obj, 'evalcontextfunction', False):\n args.insert(0, eval_ctx)\n elif getattr(obj, 'environmentfunction', False):\n args.insert(0, self.environment)\n\n kwargs = dict(x.as_const(eval_ctx) for x in self.kwargs)\n if self.dyn_args is not None:\n try:\n args.extend(self.dyn_args.as_const(eval_ctx))\n except Exception:\n raise Impossible()\n if self.dyn_kwargs is not None:\n try:\n kwargs.update(self.dyn_kwargs.as_const(eval_ctx))\n except Exception:\n raise Impossible()\n try:\n return obj(*args, **kwargs)\n except Exception:\n raise Impossible()", "label_name": "CWE-134", "label": 134}
{"code": "def execute_cmd(cmd, from_async=False):\n\t\"\"\"execute a request as python module\"\"\"\n\tfor hook in frappe.get_hooks(\"override_whitelisted_methods\", {}).get(cmd, []):\n\t\t# override using the first hook\n\t\tcmd = hook\n\t\tbreak\n\n\t# via server script\n\tif run_server_script_api(cmd):\n\t\treturn None\n\n\ttry:\n\t\tmethod = get_attr(cmd)\n\texcept Exception as e:\n\t\tif frappe.local.conf.developer_mode:\n\t\t\traise e\n\t\telse:\n\t\t\tfrappe.respond_as_web_page(title='Invalid Method', html='Method not found',\n\t\t\tindicator_color='red', http_status_code=404)\n\t\treturn\n\n\tif from_async:\n\t\tmethod = method.queue\n\n\tis_whitelisted(method)\n\tis_valid_http_method(method)\n\n\treturn frappe.call(method, **frappe.form_dict)", "label_name": "CWE-79", "label": 79}
{"code": "def move_files_on_change(calibre_path, new_authordir, new_titledir, localbook, db_filename, original_filepath, path):\n new_path = os.path.join(calibre_path, new_authordir, new_titledir)\n new_name = get_valid_filename(localbook.title, chars=96) + ' - ' + new_authordir\n try:\n if original_filepath:\n if not os.path.isdir(new_path):\n os.makedirs(new_path)\n shutil.move(os.path.normcase(original_filepath), os.path.normcase(os.path.join(new_path, db_filename)))\n log.debug(\"Moving title: %s to %s/%s\", original_filepath, new_path, new_name)\n else:\n # Check new path is not valid path\n if not os.path.exists(new_path):\n # move original path to new path\n log.debug(\"Moving title: %s to %s\", path, new_path)\n shutil.move(os.path.normcase(path), os.path.normcase(new_path))\n else: # path is valid copy only files to new location (merge)\n log.info(\"Moving title: %s into existing: %s\", path, new_path)\n # Take all files and subfolder from old path (strange command)\n for dir_name, __, file_list in os.walk(path):\n for file in file_list:\n shutil.move(os.path.normcase(os.path.join(dir_name, file)),\n os.path.normcase(os.path.join(new_path + dir_name[len(path):], file)))\n # change location in database to new author/title path\n localbook.path = os.path.join(new_authordir, new_titledir).replace('\\\\','/')\n except OSError as ex:\n log.error(\"Rename title from: %s to %s: %s\", path, new_path, ex)\n log.debug(ex, exc_info=True)\n return _(\"Rename title from: '%(src)s' to '%(dest)s' failed with error: %(error)s\",\n src=path, dest=new_path, error=str(ex))\n return False", "label_name": "CWE-918", "label": 918}
{"code": "\tdef innerfn(fn):\n\t\tglobal whitelisted, guest_methods, xss_safe_methods, allowed_http_methods_for_whitelisted_func\n\t\twhitelisted.append(fn)\n\n\t\tallowed_http_methods_for_whitelisted_func[fn] = methods\n\n\t\tif allow_guest:\n\t\t\tguest_methods.append(fn)\n\n\t\t\tif xss_safe:\n\t\t\t\txss_safe_methods.append(fn)\n\n\t\treturn fn", "label_name": "CWE-79", "label": 79}
{"code": "def sanitized_join(path: str, root: pathlib.Path) -> pathlib.Path:\n result = (root / path).absolute()\n if not str(result).startswith(str(root) + \"/\"):\n raise ValueError(\"resulting path is outside root\")\n return result", "label_name": "CWE-22", "label": 22}
{"code": " def read_templates(\n self,\n filenames: List[str],\n custom_template_directory: Optional[str] = None,\n autoescape: bool = False,", "label_name": "CWE-79", "label": 79}
{"code": "def parse_configuration_file(config_path):\n \"\"\"\n Read the config file for an experiment to get ParlAI settings.\n\n :param config_path:\n path to config\n\n :return:\n parsed configuration dictionary\n \"\"\"\n result = {}\n result[\"configs\"] = {}\n with open(config_path) as f:\n cfg = yaml.load(f.read(), Loader=yaml.FullLoader)\n # get world path\n result[\"world_path\"] = cfg.get(\"world_module\")\n if not result[\"world_path\"]:\n raise ValueError(\"Did not specify world module\")\n result[\"overworld\"] = cfg.get(\"overworld\")\n if not result[\"overworld\"]:\n raise ValueError(\"Did not specify overworld\")\n result[\"max_workers\"] = cfg.get(\"max_workers\")\n if not result[\"max_workers\"]:\n raise ValueError(\"Did not specify max_workers\")\n result[\"task_name\"] = cfg.get(\"task_name\")\n if not result[\"task_name\"]:\n raise ValueError(\"Did not specify task name\")\n task_world = cfg.get(\"tasks\")\n if task_world is None or len(task_world) == 0:\n raise ValueError(\"task not in config file\")\n # get task file\n for task_name, configuration in task_world.items():\n if \"task_world\" not in configuration:\n raise ValueError(\"{} does not specify a task\".format(task_name))\n result[\"configs\"][task_name] = WorldConfig(\n world_name=task_name,\n onboarding_name=configuration.get(\"onboard_world\"),\n task_name=configuration.get(\"task_world\"),\n max_time_in_pool=configuration.get(\"timeout\") or 300,\n agents_required=configuration.get(\"agents_required\") or 1,\n backup_task=configuration.get(\"backup_task\"),\n )\n # get world options, additional args\n result[\"world_opt\"] = cfg.get(\"opt\", {})\n result[\"additional_args\"] = cfg.get(\"additional_args\", {})\n\n return result", "label_name": "CWE-502", "label": 502}
{"code": " def testPartialIndexInsert(self):\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32)\n f = array_ops.placeholder(dtypes.float32)\n v = array_ops.placeholder(dtypes.float32)\n pi = array_ops.placeholder(dtypes.int64)\n gi = array_ops.placeholder(dtypes.int64)\n with ops.device(test.gpu_device_name()):\n stager = data_flow_ops.MapStagingArea(\n [dtypes.float32, dtypes.float32, dtypes.float32])\n stage_xf = stager.put(pi, [x, f], [0, 2])\n stage_v = stager.put(pi, [v], [1])\n key, ret = stager.get(gi)\n size = stager.size()\n isize = stager.incomplete_size()\n\n G.finalize()\n\n with self.session(graph=G) as sess:\n # 0 complete and incomplete entries\n self.assertTrue(sess.run([size, isize]) == [0, 0])\n # Stage key 0, x and f tuple entries\n sess.run(stage_xf, feed_dict={pi: 0, x: 1, f: 2})\n self.assertTrue(sess.run([size, isize]) == [0, 1])\n # Stage key 1, x and f tuple entries\n sess.run(stage_xf, feed_dict={pi: 1, x: 1, f: 2})\n self.assertTrue(sess.run([size, isize]) == [0, 2])\n\n # Now complete key 0 with tuple entry v\n sess.run(stage_v, feed_dict={pi: 0, v: 1})\n # 1 complete and 1 incomplete entry\n self.assertTrue(sess.run([size, isize]) == [1, 1])\n # We can now obtain tuple associated with key 0\n self.assertTrue(sess.run([key, ret], feed_dict={gi: 0}) == [0, [1, 1, 2]])\n\n # 0 complete and 1 incomplete entry\n self.assertTrue(sess.run([size, isize]) == [0, 1])\n # Now complete key 1 with tuple entry v\n sess.run(stage_v, feed_dict={pi: 1, v: 3})\n # We can now obtain tuple associated with key 1\n self.assertTrue(sess.run([key, ret], feed_dict={gi: 1}) == [1, [1, 3, 2]])", "label_name": "CWE-843", "label": 843}
{"code": " def load_djpeg(self):\n\n # ALTERNATIVE: handle JPEGs via the IJG command line utilities\n\n import tempfile, os\n file = tempfile.mktemp()\n os.system(\"djpeg %s >%s\" % (self.filename, file))\n\n try:\n self.im = Image.core.open_ppm(file)\n finally:\n try: os.unlink(file)\n except: pass\n\n self.mode = self.im.mode\n self.size = self.im.size\n\n self.tile = []", "label_name": "CWE-59", "label": 59}
{"code": " def test_http10_list(self):\n body = string.ascii_letters\n to_send = (\n \"GET /list HTTP/1.0\\n\"\n \"Connection: Keep-Alive\\n\"\n \"Content-Length: %d\\n\\n\" % len(body)\n )\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(headers[\"content-length\"], str(len(body)))\n self.assertEqual(headers.get(\"connection\"), \"Keep-Alive\")\n self.assertEqual(response_body, tobytes(body))\n # remote keeps connection open because it divined the content length\n # from a length-1 list\n self.sock.send(to_send)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")", "label_name": "CWE-444", "label": 444}
{"code": "def _moderate(request, pk, field_name, to_value, action=None, message=None):\n topic = get_object_or_404(Topic, pk=pk)\n\n if is_post(request):\n count = (\n Topic.objects\n .filter(pk=pk)\n .exclude(**{field_name: to_value})\n .update(**{\n field_name: to_value,\n 'reindex_at': timezone.now()}))\n\n if count and action is not None:\n Comment.create_moderation_action(\n user=request.user,\n topic=topic,\n action=action)\n\n if message is not None:\n messages.info(request, message)\n\n return redirect(request.POST.get(\n 'next', topic.get_absolute_url()))\n\n return render(\n request=request,\n template_name='spirit/topic/moderate.html',\n context={'topic': topic})", "label_name": "CWE-601", "label": 601}
{"code": " def testInputPreProcessErrorBadFormat(self):\n input_str = 'inputx=file[[v1]v2'\n with self.assertRaises(RuntimeError):\n saved_model_cli.preprocess_inputs_arg_string(input_str)\n input_str = 'inputx:file'\n with self.assertRaises(RuntimeError):\n saved_model_cli.preprocess_inputs_arg_string(input_str)\n input_str = 'inputx:np.zeros((5))'\n with self.assertRaises(RuntimeError):\n saved_model_cli.preprocess_input_exprs_arg_string(input_str)", "label_name": "CWE-94", "label": 94}
{"code": "def feed_publisher(book_id):\n off = request.args.get(\"offset\") or 0\n entries, __, pagination = calibre_db.fill_indexpage((int(off) / (int(config.config_books_per_page)) + 1), 0,\n db.Books,\n db.Books.publishers.any(db.Publishers.id == book_id),\n [db.Books.timestamp.desc()])\n return render_xml_template('feed.xml', entries=entries, pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": "def _rpsl_db_query_to_graphql_out(query: RPSLDatabaseQuery, info: GraphQLResolveInfo):\n \"\"\"\n Given an RPSL database query, execute it and clean up the output\n to be suitable to return to GraphQL.\n\n Main changes are:\n - Enum handling\n - Adding the asn and prefix fields if applicable\n - Ensuring the right fields are returned as a list of strings or a string\n \"\"\"\n database_handler = info.context['request'].app.state.database_handler\n if info.context.get('sql_trace'):\n if 'sql_queries' not in info.context:\n info.context['sql_queries'] = [repr(query)]\n else:\n info.context['sql_queries'].append(repr(query))\n\n for row in database_handler.execute_query(query, refresh_on_error=True):\n graphql_result = {snake_to_camel_case(k): v for k, v in row.items() if k != 'parsed_data'}\n if 'object_text' in row:\n graphql_result['objectText'] = remove_auth_hashes(row['object_text'])\n if 'rpki_status' in row:\n graphql_result['rpkiStatus'] = row['rpki_status']\n if row.get('ip_first') is not None and row.get('prefix_length'):\n graphql_result['prefix'] = row['ip_first'] + '/' + str(row['prefix_length'])\n if row.get('asn_first') is not None and row.get('asn_first') == row.get('asn_last'):\n graphql_result['asn'] = row['asn_first']\n\n object_type = resolve_rpsl_object_type(row)\n for key, value in row.get('parsed_data', dict()).items():\n if key == 'auth':\n value = remove_auth_hashes(value)\n graphql_type = schema.graphql_types[object_type][key]\n if graphql_type == 'String' and isinstance(value, list):\n value = '\\n'.join(value)\n graphql_result[snake_to_camel_case(key)] = value\n yield graphql_result", "label_name": "CWE-212", "label": 212}
{"code": " def _load_from(self, data: bytes) -> None:\n if data.strip() == b'':\n data = XMP_EMPTY # on some platforms lxml chokes on empty documents\n\n def basic_parser(xml):\n return parse(BytesIO(xml))\n\n def strip_illegal_bytes_parser(xml):\n return parse(BytesIO(re_xml_illegal_bytes.sub(b'', xml)))\n\n def recovery_parser(xml):\n parser = XMLParser(recover=True)\n return parse(BytesIO(xml), parser)\n\n def replace_with_empty_xmp(_xml=None):\n log.warning(\"Error occurred parsing XMP, replacing with empty XMP.\")\n return basic_parser(XMP_EMPTY)\n\n if self.overwrite_invalid_xml:\n parsers: Iterable[Callable] = [\n basic_parser,\n strip_illegal_bytes_parser,\n recovery_parser,\n replace_with_empty_xmp,\n ]\n else:\n parsers = [basic_parser]\n\n for parser in parsers:\n try:\n self._xmp = parser(data)\n except (XMLSyntaxError if self.overwrite_invalid_xml else NeverRaise) as e:\n if str(e).startswith(\"Start tag expected, '<' not found\") or str(\n e\n ).startswith(\"Document is empty\"):\n self._xmp = replace_with_empty_xmp()\n break\n else:\n break\n\n try:\n pis = self._xmp.xpath('/processing-instruction()')\n for pi in pis:\n etree.strip_tags(self._xmp, pi.tag)\n self._get_rdf_root()\n except (Exception if self.overwrite_invalid_xml else NeverRaise) as e:\n log.warning(\"Error occurred parsing XMP\", exc_info=e)\n self._xmp = replace_with_empty_xmp()\n return", "label_name": "CWE-611", "label": 611}
{"code": " def test_received_error_from_parser(self):\n from waitress.utilities import BadRequest\n\n data = b\"\"\"\\\nGET /foobar HTTP/1.1\nTransfer-Encoding: chunked\nX-Foo: 1\n\ngarbage\n\"\"\"\n # header\n result = self.parser.received(data)\n # body\n result = self.parser.received(data[result:])\n self.assertEqual(result, 8)\n self.assertTrue(self.parser.completed)\n self.assertTrue(isinstance(self.parser.error, BadRequest))", "label_name": "CWE-444", "label": 444}
{"code": " def __init__(self, pidfile=None):\n if not pidfile:\n self.pidfile = \"/tmp/%s.pid\" % self.__class__.__name__.lower()\n else:\n self.pidfile = pidfile", "label_name": "CWE-59", "label": 59}
{"code": "def feed_authorindex():\n shift = 0\n off = int(request.args.get(\"offset\") or 0)\n entries = calibre_db.session.query(func.upper(func.substr(db.Authors.sort, 1, 1)).label('id'))\\\n .join(db.books_authors_link).join(db.Books).filter(calibre_db.common_filters())\\\n .group_by(func.upper(func.substr(db.Authors.sort, 1, 1))).all()\n\n elements = []\n if off == 0:\n elements.append({'id': \"00\", 'name':_(\"All\")})\n shift = 1\n for entry in entries[\n off + shift - 1:\n int(off + int(config.config_books_per_page) - shift)]:\n elements.append({'id': entry.id, 'name': entry.id})\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries) + 1)\n return render_xml_template('feed.xml',\n letterelements=elements,\n folder='opds.feed_letter_author',\n pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": " def test_request_body_too_large_with_wrong_cl_http10(self):\n body = \"a\" * self.toobig\n to_send = \"GET / HTTP/1.0\\n\" \"Content-Length: 5\\n\\n\"\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\")\n # first request succeeds (content-length 5)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # server trusts the content-length header; no pipelining,\n # so request fulfilled, extra bytes are thrown away\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def toggle_archived(book_id):\n is_archived = change_archived_books(book_id, message=\"Book {} archivebit toggled\".format(book_id))\n if is_archived:\n remove_synced_book(book_id)\n return \"\"", "label_name": "CWE-918", "label": 918}
{"code": " def test_logout_unknown_token(self):\n login_code = LoginCode.objects.create(user=self.user, code='foobar')\n\n self.client.login(username=self.user.username, code=login_code.code)\n\n response = self.client.post(\n '/accounts-rest/logout/',\n HTTP_AUTHORIZATION='Token unknown',\n )\n\n self.assertEqual(response.status_code, 200)", "label_name": "CWE-312", "label": 312}
{"code": " def stmt(self, stmt, msg=None):\n mod = ast.Module([stmt])\n self.mod(mod, msg)", "label_name": "CWE-125", "label": 125}
{"code": " def test_replay_banner_metadata(self, fmod):\n \"\"\" Test adding metadata in replay banner (both framed and non-frame)\n \"\"\"\n resp = self.get('/test/20140103030321{0}/http://example.com/?example=1', fmod)\n assert 'Custom Banner Here!
' in resp.text\n assert '\"some\":\"value\"' in resp.text", "label_name": "CWE-79", "label": 79}
{"code": "def run_custom_method(doctype, name, custom_method):\n\t\"\"\"cmd=run_custom_method&doctype={doctype}&name={name}&custom_method={custom_method}\"\"\"\n\tdoc = frappe.get_doc(doctype, name)\n\tif getattr(doc, custom_method, frappe._dict()).is_whitelisted:\n\t\tfrappe.call(getattr(doc, custom_method), **frappe.local.form_dict)\n\telse:\n\t\tfrappe.throw(_(\"Not permitted\"), frappe.PermissionError)", "label_name": "CWE-79", "label": 79}
{"code": "def head_file(path):\n try:\n data_file, metadata = get_info(\n path,\n pathlib.Path(app.config[\"DATA_ROOT\"])\n )\n\n stat = data_file.stat()\n except (OSError, ValueError):\n return flask.Response(\n \"Not Found\",\n 404,\n mimetype=\"text/plain\",\n )\n\n response = flask.Response()\n response.headers[\"Content-Length\"] = str(stat.st_size)\n generate_headers(\n response.headers,\n metadata[\"headers\"],\n )\n return response", "label_name": "CWE-22", "label": 22}
{"code": "def parse_soap_enveloped_saml(text, body_class, header_class=None):\n \"\"\"Parses a SOAP enveloped SAML thing and returns header parts and body\n\n :param text: The SOAP object as XML\n :return: header parts and body as saml.samlbase instances\n \"\"\"\n envelope = ElementTree.fromstring(text)\n assert envelope.tag == '{%s}Envelope' % NAMESPACE\n\n # print(len(envelope))\n body = None\n header = {}\n for part in envelope:\n # print(\">\",part.tag)\n if part.tag == '{%s}Body' % NAMESPACE:\n for sub in part:\n try:\n body = saml2.create_class_from_element_tree(body_class, sub)\n except Exception:\n raise Exception(\n \"Wrong body type (%s) in SOAP envelope\" % sub.tag)\n elif part.tag == '{%s}Header' % NAMESPACE:\n if not header_class:\n raise Exception(\"Header where I didn't expect one\")\n # print(\"--- HEADER ---\")\n for sub in part:\n # print(\">>\",sub.tag)\n for klass in header_class:\n # print(\"?{%s}%s\" % (klass.c_namespace,klass.c_tag))\n if sub.tag == \"{%s}%s\" % (klass.c_namespace, klass.c_tag):\n header[sub.tag] = \\\n saml2.create_class_from_element_tree(klass, sub)\n break\n\n return body, header", "label_name": "CWE-611", "label": 611}
{"code": "def delete(request, pk):\n favorite = get_object_or_404(TopicFavorite, pk=pk, user=request.user)\n favorite.delete()\n return redirect(request.POST.get('next', favorite.topic.get_absolute_url()))", "label_name": "CWE-601", "label": 601}
{"code": " def sql_insert(self, sentence):\n self.cursor.execute(sentence)\n self.conn.commit()\n return True", "label_name": "CWE-89", "label": 89}
{"code": "def camera_img_return_path(camera_unique_id, img_type, filename):\n \"\"\"Return an image from stills or time-lapses\"\"\"\n camera = Camera.query.filter(Camera.unique_id == camera_unique_id).first()\n camera_path = assure_path_exists(\n os.path.join(PATH_CAMERAS, '{uid}'.format(uid=camera.unique_id)))\n if img_type == 'still':\n if camera.path_still:\n path = camera.path_still\n else:\n path = os.path.join(camera_path, img_type)\n elif img_type == 'timelapse':\n if camera.path_timelapse:\n path = camera.path_timelapse\n else:\n path = os.path.join(camera_path, img_type)\n else:\n return \"Unknown Image Type\"\n\n if os.path.isdir(path):\n files = (files for files in os.listdir(path)\n if os.path.isfile(os.path.join(path, files)))\n else:\n files = []\n if filename in files:\n path_file = os.path.join(path, filename)\n return send_file(path_file, mimetype='image/jpeg')\n\n return \"Image not found\"", "label_name": "CWE-22", "label": 22}
{"code": " def test_roundtrip_file(self):\n f = open(self.filename, 'wb')\n self.x.tofile(f)\n f.close()\n # NB. doesn't work with flush+seek, due to use of C stdio\n f = open(self.filename, 'rb')\n y = np.fromfile(f, dtype=self.dtype)\n f.close()\n assert_array_equal(y, self.x.flat)\n os.unlink(self.filename)", "label_name": "CWE-59", "label": 59}
{"code": " def check_valid_db(cls, config_calibre_dir, app_db_path, config_calibre_uuid):\n if not config_calibre_dir:\n return False, False\n dbpath = os.path.join(config_calibre_dir, \"metadata.db\")\n if not os.path.exists(dbpath):\n return False, False\n try:\n check_engine = create_engine('sqlite://',\n echo=False,\n isolation_level=\"SERIALIZABLE\",\n connect_args={'check_same_thread': False},\n poolclass=StaticPool)\n with check_engine.begin() as connection:\n connection.execute(text(\"attach database '{}' as calibre;\".format(dbpath)))\n connection.execute(text(\"attach database '{}' as app_settings;\".format(app_db_path)))\n local_session = scoped_session(sessionmaker())\n local_session.configure(bind=connection)\n database_uuid = local_session().query(Library_Id).one_or_none()\n # local_session.dispose()\n\n check_engine.connect()\n db_change = config_calibre_uuid != database_uuid.uuid\n except Exception:\n return False, False\n return True, db_change", "label_name": "CWE-918", "label": 918}
{"code": " def _load_yamlconfig(self, configfile):\n yamlconfig = None\n try:\n if self._recent_pyyaml():\n # https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation\n # only for 5.1+\n yamlconfig = yaml.load(open(configfile), Loader=yaml.FullLoader)\n else:\n yamlconfig = yaml.load(open(configfile))\n except yaml.YAMLError as exc:\n logger.error(\"Error in configuration file {0}:\".format(configfile))\n if hasattr(exc, 'problem_mark'):\n mark = exc.problem_mark\n raise PystemonConfigException(\"error position: (%s:%s)\" % (mark.line + 1, mark.column + 1))\n for includes in yamlconfig.get(\"includes\", []):\n try:\n logger.debug(\"loading include '{0}'\".format(includes))\n yamlconfig.update(yaml.load(open(includes)))\n except Exception as e:\n raise PystemonConfigException(\"failed to load '{0}': {1}\".format(includes, e))\n return yamlconfig", "label_name": "CWE-502", "label": 502}
{"code": " def get_recipe_from_file(self, file):\n recipe_html = file.getvalue().decode(\"utf-8\")\n\n recipe_json, recipe_tree, html_data, images = get_recipe_from_source(recipe_html, 'CookBookApp', self.request)\n\n recipe = Recipe.objects.create(\n name=recipe_json['name'].strip(),\n created_by=self.request.user, internal=True,\n space=self.request.space)\n\n try:\n recipe.servings = re.findall('([0-9])+', recipe_json['recipeYield'])[0]\n except Exception as e:\n pass\n\n try:\n recipe.working_time = iso_duration_to_minutes(recipe_json['prepTime'])\n recipe.waiting_time = iso_duration_to_minutes(recipe_json['cookTime'])\n except Exception:\n pass\n\n step = Step.objects.create(instruction=recipe_json['recipeInstructions'], space=self.request.space, )\n\n if 'nutrition' in recipe_json:\n step.instruction = step.instruction + '\\n\\n' + recipe_json['nutrition']\n\n step.save()\n recipe.steps.add(step)\n\n ingredient_parser = IngredientParser(self.request, True)\n for ingredient in recipe_json['recipeIngredient']:\n f = ingredient_parser.get_food(ingredient['ingredient']['text'])\n u = ingredient_parser.get_unit(ingredient['unit']['text'])\n step.ingredients.add(Ingredient.objects.create(\n food=f, unit=u, amount=ingredient['amount'], note=ingredient['note'], space=self.request.space,\n ))\n\n if len(images) > 0:\n try:\n response = requests.get(images[0])\n self.import_recipe_image(recipe, BytesIO(response.content))\n except Exception as e:\n print('failed to import image ', str(e))\n\n recipe.save()\n return recipe", "label_name": "CWE-918", "label": 918}
{"code": " def test_invalid_sum(self):\n pos = dict(lineno=2, col_offset=3)\n m = ast.Module([ast.Expr(ast.expr(**pos), **pos)])\n with self.assertRaises(TypeError) as cm:\n compile(m, \"\", \"exec\")\n self.assertIn(\"but got <_ast.expr\", str(cm.exception))", "label_name": "CWE-125", "label": 125}
{"code": "def malt_regex_tagger():\n from nltk.tag import RegexpTagger\n\n _tagger = RegexpTagger(\n [\n (r\"\\.$\", \".\"),\n (r\"\\,$\", \",\"),\n (r\"\\?$\", \"?\"), # fullstop, comma, Qmark\n (r\"\\($\", \"(\"),\n (r\"\\)$\", \")\"), # round brackets\n (r\"\\[$\", \"[\"),\n (r\"\\]$\", \"]\"), # square brackets\n (r\"^-?[0-9]+(.[0-9]+)?$\", \"CD\"), # cardinal numbers\n (r\"(The|the|A|a|An|an)$\", \"DT\"), # articles\n (r\"(He|he|She|she|It|it|I|me|Me|You|you)$\", \"PRP\"), # pronouns\n (r\"(His|his|Her|her|Its|its)$\", \"PRP$\"), # possessive\n (r\"(my|Your|your|Yours|yours)$\", \"PRP$\"), # possessive\n (r\"(on|On|in|In|at|At|since|Since)$\", \"IN\"), # time prepopsitions\n (r\"(for|For|ago|Ago|before|Before)$\", \"IN\"), # time prepopsitions\n (r\"(till|Till|until|Until)$\", \"IN\"), # time prepopsitions\n (r\"(by|By|beside|Beside)$\", \"IN\"), # space prepopsitions\n (r\"(under|Under|below|Below)$\", \"IN\"), # space prepopsitions\n (r\"(over|Over|above|Above)$\", \"IN\"), # space prepopsitions\n (r\"(across|Across|through|Through)$\", \"IN\"), # space prepopsitions\n (r\"(into|Into|towards|Towards)$\", \"IN\"), # space prepopsitions\n (r\"(onto|Onto|from|From)$\", \"IN\"), # space prepopsitions\n (r\".*able$\", \"JJ\"), # adjectives\n (r\".*ness$\", \"NN\"), # nouns formed from adjectives\n (r\".*ly$\", \"RB\"), # adverbs\n (r\".*s$\", \"NNS\"), # plural nouns\n (r\".*ing$\", \"VBG\"), # gerunds\n (r\".*ed$\", \"VBD\"), # past tense verbs\n (r\".*\", \"NN\"), # nouns (default)\n ]\n )\n return _tagger.tag", "label_name": "CWE-1333", "label": 1333}
{"code": " def expr(self, node, msg=None, *, exc=ValueError):\n mod = ast.Module([ast.Expr(node)])\n self.mod(mod, msg, exc=exc)", "label_name": "CWE-125", "label": 125}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(\n resource_for_federation=Mock(), http_client=None\n )\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def join_in(request, topic_id):\n # todo: replace by create_access()?\n # This is for topic creators who left their own topics and want to join again\n topic = get_object_or_404(\n Topic,\n pk=topic_id,\n user=request.user,\n category_id=settings.ST_TOPIC_PRIVATE_CATEGORY_PK)\n form = TopicPrivateJoinForm(\n topic=topic,\n user=request.user,\n data=post_data(request))\n if is_post(request) and form.is_valid():\n topic_private = form.save()\n notify_access(user=form.get_user(), topic_private=topic_private)\n return redirect(request.POST.get('next', topic.get_absolute_url()))\n return render(\n request=request,\n template_name='spirit/topic/private/join.html',\n context={\n 'topic': topic,\n 'form': form})", "label_name": "CWE-601", "label": 601}
{"code": " def test_request_body_too_large_with_no_cl_http11(self):\n body = \"a\" * self.toobig\n to_send = \"GET / HTTP/1.1\\n\\n\"\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\")\n # server trusts the content-length header (assumed 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # server assumes pipelined requests due to http/1.1, and the first\n # request was assumed c-l 0 because it had no content-length header,\n # so entire body looks like the header of the subsequent request\n # second response is an error response\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"431\", \"Request Header Fields Too Large\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": "def clean_id(id_):\n '''\n Returns if the passed id is clean.\n '''\n if re.search(r'\\.\\.\\{sep}'.format(sep=os.sep), id_):\n return False\n return True", "label_name": "CWE-22", "label": 22}
{"code": "def render_delete_book_result(book_format, jsonResponse, warning, book_id):\n if book_format:\n if jsonResponse:\n return json.dumps([warning, {\"location\": url_for(\"editbook.edit_book\", book_id=book_id),\n \"type\": \"success\",\n \"format\": book_format,\n \"message\": _('Book Format Successfully Deleted')}])\n else:\n flash(_('Book Format Successfully Deleted'), category=\"success\")\n return redirect(url_for('editbook.edit_book', book_id=book_id))\n else:\n if jsonResponse:\n return json.dumps([warning, {\"location\": url_for('web.index'),\n \"type\": \"success\",\n \"format\": book_format,\n \"message\": _('Book Successfully Deleted')}])\n else:\n flash(_('Book Successfully Deleted'), category=\"success\")\n return redirect(url_for('web.index'))", "label_name": "CWE-918", "label": 918}
{"code": "def needs_clamp(t, encoding):\n if encoding not in (Encoding.ABI, Encoding.JSON_ABI):\n return False\n if isinstance(t, (ByteArrayLike, DArrayType)):\n if encoding == Encoding.JSON_ABI:\n # don't have bytestring size bound from json, don't clamp\n return False\n return True\n if isinstance(t, BaseType) and t.typ not in (\"int256\", \"uint256\", \"bytes32\"):\n return True\n if isinstance(t, SArrayType):\n return needs_clamp(t.subtype, encoding)\n if isinstance(t, TupleLike):\n return any(needs_clamp(m, encoding) for m in t.tuple_members())\n return False", "label_name": "CWE-190", "label": 190}
{"code": " def test_login(self):\n login_code = LoginCode.objects.create(user=self.user, code='foobar', next='/private/')\n\n response = self.client.post('/accounts-rest/login/code/', {\n 'code': login_code.code,\n })\n\n self.assertEqual(response.status_code, 200)\n self.assertFalse(LoginCode.objects.filter(pk=login_code.pk).exists())\n\n token = Token.objects.filter(user=self.user).first()\n\n self.assertIsNotNone(token)\n self.assertEqual(response.data, {\n 'key': token.key,\n 'next': '/private/',\n })", "label_name": "CWE-312", "label": 312}
{"code": " def write_data_table(self, report, report_data, has_totals=True):\n self.data.append([c[\"title\"] for c in report.schema])\n for datum in report_data:\n datum = report.read_datum(datum)\n self.data.append([format_data(data, format_iso_dates=True) for data in datum])\n\n if has_totals:\n for datum in report.get_totals(report_data):\n datum = report.read_datum(datum)\n self.data.append([format_data(data) for data in datum])", "label_name": "CWE-1236", "label": 1236}
{"code": " def __init__(self, hs):\n super().__init__(hs)\n\n self.http_client = SimpleHttpClient(hs)\n # We create a blacklisting instance of SimpleHttpClient for contacting identity\n # servers specified by clients\n self.blacklisting_http_client = SimpleHttpClient(\n hs, ip_blacklist=hs.config.federation_ip_range_blacklist\n )\n self.federation_http_client = hs.get_http_client()\n self.hs = hs", "label_name": "CWE-601", "label": 601}
{"code": " def test_request_body_too_large_with_wrong_cl_http11_connclose(self):\n body = \"a\" * self.toobig\n to_send = \"GET / HTTP/1.1\\nContent-Length: 5\\nConnection: close\\n\\n\"\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n # server trusts the content-length header (5)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def append(self, key, value):\n self.dict.setdefault(_hkey(key), []).append(\n value if isinstance(value, unicode) else str(value))", "label_name": "CWE-93", "label": 93}
{"code": " def testInvalidSparseTensor(self):\n with test_util.force_cpu():\n shape = [2, 2]\n val = [0]\n dense = constant_op.constant(np.zeros(shape, dtype=np.int32))\n\n for bad_idx in [\n [[-1, 0]], # -1 is invalid.\n [[1, 3]], # ...so is 3.\n ]:\n sparse = sparse_tensor.SparseTensorValue(bad_idx, val, shape)\n s = sparse_ops.sparse_add(sparse, dense)\n\n with self.assertRaisesRegex(errors_impl.InvalidArgumentError,\n \"invalid index\"):\n self.evaluate(s)", "label_name": "CWE-476", "label": 476}
{"code": " def filter(self, names):\n for name in [_hkey(n) for n in names]:\n if name in self.dict:\n del self.dict[name]", "label_name": "CWE-93", "label": 93}
{"code": "def upload_cover(request, book):\n if 'btn-upload-cover' in request.files:\n requested_file = request.files['btn-upload-cover']\n # check for empty request\n if requested_file.filename != '':\n if not current_user.role_upload():\n abort(403)\n ret, message = helper.save_cover(requested_file, book.path)\n if ret is True:\n return True\n else:\n flash(message, category=\"error\")\n return False\n return None", "label_name": "CWE-918", "label": 918}
{"code": " def test_basic_auth_invalid_credentials(self):\n with self.assertRaises(InvalidStatusCode) as raised:\n self.start_client(user_info=(\"hello\", \"ihateyou\"))\n self.assertEqual(raised.exception.status_code, 401)", "label_name": "CWE-203", "label": 203}
{"code": " def test_render_quoting(self):\n w = widgets.AdminURLFieldWidget()\n self.assertHTMLEqual(\n conditional_escape(w.render('test', 'http://example.com/some text ')),\n 'Currently:http://example.com/<sometag>some text</sometag> Change: some text\" />
'\n )\n self.assertHTMLEqual(\n conditional_escape(w.render('test', 'http://example-\u00e4\u00fc\u00f6.com/some text ')),\n 'Currently:http://example-\u00e4\u00fc\u00f6.com/<sometag>some text</sometag> Change: some text\" />
'\n )", "label_name": "CWE-79", "label": 79}
{"code": " def exec_command(self, cmd, tmp_path, become_user=None, sudoable=False, executable=None, in_data=None):\n ''' run a command on the zone '''\n\n if sudoable and self.runner.become and self.runner.become_method not in self.become_methods_supported:\n raise errors.AnsibleError(\"Internal Error: this module does not support running commands via %s\" % self.runner.become_method)\n\n if in_data:\n raise errors.AnsibleError(\"Internal Error: this module does not support optimized module pipelining\")\n\n # We happily ignore privilege escalation\n if executable == '/bin/sh':\n executable = None\n local_cmd = self._generate_cmd(executable, cmd)\n\n vvv(\"EXEC %s\" % (local_cmd), host=self.zone)\n p = subprocess.Popen(local_cmd, shell=isinstance(local_cmd, basestring),\n cwd=self.runner.basedir,\n stdin=subprocess.PIPE,\n stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n\n stdout, stderr = p.communicate()\n return (p.returncode, '', stdout, stderr)", "label_name": "CWE-59", "label": 59}
{"code": "def _re_word_boundary(r: str) -> str:\n \"\"\"\n Adds word boundary characters to the start and end of an\n expression to require that the match occur as a whole word,\n but do so respecting the fact that strings starting or ending\n with non-word characters will change word boundaries.\n \"\"\"\n # we can't use \\b as it chokes on unicode. however \\W seems to be okay\n # as shorthand for [^0-9A-Za-z_].\n return r\"(^|\\W)%s(\\W|$)\" % (r,)", "label_name": "CWE-331", "label": 331}
{"code": " def test_date_and_server(self):\n to_send = \"GET / HTTP/1.0\\n\" \"Content-Length: 0\\n\\n\"\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, echo = self._read_echo(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.0\")\n self.assertEqual(headers.get(\"server\"), \"waitress\")\n self.assertTrue(headers.get(\"date\"))", "label_name": "CWE-444", "label": 444}
{"code": " def test_multi_file(\n self,\n driver,\n live_server,\n freeze,\n upload_file,\n another_upload_file,\n yet_another_upload_file,", "label_name": "CWE-22", "label": 22}
{"code": " def respond_error(self, context, exception):\n context.respond_server_error()\n stack = traceback.format_exc()\n return \"\"\"\n \n \n\n \n\n \n \n \n Server error\n
\n \n%s\n \n \n \n \"\"\" % stack", "label_name": "CWE-79", "label": 79}
{"code": "def check_send_to_kindle_with_converter(formats):\n bookformats = list()\n if 'EPUB' in formats and 'MOBI' not in formats:\n bookformats.append({'format': 'Mobi',\n 'convert': 1,\n 'text': _('Convert %(orig)s to %(format)s and send to Kindle',\n orig='Epub',\n format='Mobi')})\n if 'AZW3' in formats and not 'MOBI' in formats:\n bookformats.append({'format': 'Mobi',\n 'convert': 2,\n 'text': _('Convert %(orig)s to %(format)s and send to Kindle',\n orig='Azw3',\n format='Mobi')})\n return bookformats", "label_name": "CWE-918", "label": 918}
{"code": "def main():\n app = create_app()\n\n init_errorhandler()\n\n app.register_blueprint(web)\n app.register_blueprint(opds)\n app.register_blueprint(jinjia)\n app.register_blueprint(about)\n app.register_blueprint(shelf)\n app.register_blueprint(admi)\n app.register_blueprint(remotelogin)\n app.register_blueprint(meta)\n app.register_blueprint(gdrive)\n app.register_blueprint(editbook)\n if kobo_available:\n app.register_blueprint(kobo)\n app.register_blueprint(kobo_auth)\n if oauth_available:\n app.register_blueprint(oauth)\n success = web_server.start()\n sys.exit(0 if success else 1)", "label_name": "CWE-918", "label": 918}
{"code": " def __init__(self, sourceName: str):\n self.sourceName = sourceName\n self.type = \"file\"\n self.content = None", "label_name": "CWE-22", "label": 22}
{"code": "async def get_user_list(\n *, client: Client, an_enum_value: List[AnEnum], some_date: Union[date, datetime],", "label_name": "CWE-94", "label": 94}
{"code": " def test_level_as_none(self):\n body = [ast.ImportFrom(module='time',\n names=[ast.alias(name='sleep')],\n level=None,\n lineno=0, col_offset=0)]\n mod = ast.Module(body)\n code = compile(mod, 'test', 'exec')\n ns = {}\n exec(code, ns)\n self.assertIn('sleep', ns)", "label_name": "CWE-125", "label": 125}
{"code": " def sql_insert(self, sentence):\n self.cursor.execute(sentence)\n self.conn.commit()\n return True", "label_name": "CWE-79", "label": 79}
{"code": " def prepare_context(self, request, context, *args, **kwargs):\n \"\"\" Hook for adding additional data to the context dict \"\"\"\n pass", "label_name": "CWE-601", "label": 601}
{"code": " def test_login_inactive_user(self):\n self.user.is_active = False\n self.user.save()\n\n login_code = LoginCode.objects.create(user=self.user, code='foobar')\n\n response = self.client.post('/accounts-rest/login/code/', {\n 'code': login_code.code,\n })\n\n self.assertEqual(response.status_code, 400)\n self.assertEqual(response.json(), {\n 'code': ['Unable to log in with provided login code.'],\n })", "label_name": "CWE-312", "label": 312}
{"code": "def create(request, comment_id):\n comment = get_object_or_404(Comment, pk=comment_id)\n form = FlagForm(\n user=request.user,\n comment=comment,\n data=post_data(request))\n\n if is_post(request) and form.is_valid():\n form.save()\n return redirect(request.POST.get('next', comment.get_absolute_url()))\n\n return render(\n request=request,\n template_name='spirit/comment/flag/create.html',\n context={\n 'form': form,\n 'comment': comment})", "label_name": "CWE-601", "label": 601}
{"code": "def async_run(prog, args):\n pid = os.fork()\n if pid:\n os.waitpid(pid, 0)\n else:\n dpid = os.fork()\n if not dpid:\n os.system(\" \".join([prog] + args))\n os._exit(0)", "label_name": "CWE-78", "label": 78}
{"code": "def _hkey(s):\n return s.title().replace('_', '-')", "label_name": "CWE-93", "label": 93}
{"code": " def make_homeserver(self, reactor, clock):\n\n hs = self.setup_test_homeserver(\n http_client=None, homeserver_to_use=GenericWorkerServer\n )\n\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def test_spinal_case():\n assert utils.spinal_case(\"keep_alive\") == \"keep-alive\"", "label_name": "CWE-22", "label": 22}
{"code": " def testInputParserBothDuplicate(self):\n x0 = np.array([[1], [2]])\n input_path = os.path.join(test.get_temp_dir(), 'input.npz')\n np.savez(input_path, a=x0)\n x1 = np.ones([2, 10])\n input_str = 'x0=' + input_path + '[a]'\n input_expr_str = 'x0=np.ones([2,10])'\n feed_dict = saved_model_cli.load_inputs_from_input_arg_string(\n input_str, input_expr_str, '')\n self.assertTrue(np.all(feed_dict['x0'] == x1))", "label_name": "CWE-94", "label": 94}
{"code": " def test_parse_header_11_expect_continue(self):\n data = b\"GET /foobar HTTP/1.1\\nexpect: 100-continue\"\n self.parser.parse_header(data)\n self.assertEqual(self.parser.expect_continue, True)", "label_name": "CWE-444", "label": 444}
{"code": "def job_list(request, client_id, project_name):\n \"\"\"\n get job list of project from one client\n :param request: request object\n :param client_id: client id\n :param project_name: project name\n :return: list of jobs\n \"\"\"\n if request.method == 'GET':\n client = Client.objects.get(id=client_id)\n scrapyd = get_scrapyd(client)\n try:\n result = scrapyd.list_jobs(project_name)\n jobs = []\n statuses = ['pending', 'running', 'finished']\n for status in statuses:\n for job in result.get(status):\n job['status'] = status\n jobs.append(job)\n return JsonResponse(jobs)\n except ConnectionError:\n return JsonResponse({'message': 'Connect Error'}, status=500)", "label_name": "CWE-78", "label": 78}
{"code": "def _keyify(key):\n return _key_pattern.sub(' ', key.lower())", "label_name": "CWE-79", "label": 79}
{"code": "def _get_object_element(dataset, seq_no, rel_path, download_link):\n \"\"\"If rel_path and download_link are not None, we are called from scope.\n Otherwise we are called from ID and need to run SQL query to fetch these attrs.\"\"\"\n\n if rel_path is None:\n query = \"SELECT rel_path, download_link FROM \" + \\\n dataset + \\\n \" WHERE sequence_no = %s\"\n\n cnx = mysql.connector.connect(user=DB_USER,\n password=DB_PASSWORD,\n host=DB_HOST,\n database=DB_DBNAME,\n port=DB_PORT)\n cursor = cnx.cursor()\n cursor.execute(query, (seq_no,))\n\n row = cursor.fetchone()\n\n if not row:\n return None\n\n rel_path, download_link = row[0], row[1]\n\n if LOCAL_OBJ_URI:\n src_uri = 'file://' + os.path.join(DATAROOT, dataset, rel_path)\n else:\n src_uri = url_for('.get_object_src_http', dataset=dataset, rel_path=rel_path)\n\n return ' ' \\\n .format(\n quoteattr(url_for('.get_object_id', dataset=dataset, seq_no=seq_no)),\n quoteattr(src_uri),\n quoteattr(download_link))", "label_name": "CWE-22", "label": 22}
{"code": "def vote(request, pk):\n # TODO: check if user has access to this topic/poll\n poll = get_object_or_404(\n CommentPoll.objects.unremoved(),\n pk=pk\n )\n\n if not request.user.is_authenticated:\n return redirect_to_login(next=poll.get_absolute_url())\n\n form = PollVoteManyForm(user=request.user, poll=poll, data=request.POST)\n\n if form.is_valid():\n CommentPollChoice.decrease_vote_count(poll=poll, voter=request.user)\n form.save_m2m()\n CommentPollChoice.increase_vote_count(poll=poll, voter=request.user)\n return redirect(request.POST.get('next', poll.get_absolute_url()))\n\n messages.error(request, utils.render_form_errors(form))\n return redirect(request.POST.get('next', poll.get_absolute_url()))", "label_name": "CWE-601", "label": 601}
{"code": "def ratings_list():\n if current_user.check_visibility(constants.SIDEBAR_RATING):\n if current_user.get_view_property('ratings', 'dir') == 'desc':\n order = db.Ratings.rating.desc()\n order_no = 0\n else:\n order = db.Ratings.rating.asc()\n order_no = 1\n entries = calibre_db.session.query(db.Ratings, func.count('books_ratings_link.book').label('count'),\n (db.Ratings.rating / 2).label('name')) \\\n .join(db.books_ratings_link).join(db.Books).filter(calibre_db.common_filters()) \\\n .group_by(text('books_ratings_link.rating')).order_by(order).all()\n return render_title_template('list.html', entries=entries, folder='web.books_list', charlist=list(),\n title=_(u\"Ratings list\"), page=\"ratingslist\", data=\"ratings\", order=order_no)\n else:\n abort(404)", "label_name": "CWE-918", "label": 918}
{"code": "def feed_authorindex():\n shift = 0\n off = int(request.args.get(\"offset\") or 0)\n entries = calibre_db.session.query(func.upper(func.substr(db.Authors.sort, 1, 1)).label('id'))\\\n .join(db.books_authors_link).join(db.Books).filter(calibre_db.common_filters())\\\n .group_by(func.upper(func.substr(db.Authors.sort, 1, 1))).all()\n\n elements = []\n if off == 0:\n elements.append({'id': \"00\", 'name':_(\"All\")})\n shift = 1\n for entry in entries[\n off + shift - 1:\n int(off + int(config.config_books_per_page) - shift)]:\n elements.append({'id': entry.id, 'name': entry.id})\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries) + 1)\n return render_xml_template('feed.xml',\n letterelements=elements,\n folder='opds.feed_letter_author',\n pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": "def validate_and_sanitize_search_inputs(fn, instance, args, kwargs):\n\tkwargs.update(dict(zip(fn.__code__.co_varnames, args)))\n\tsanitize_searchfield(kwargs['searchfield'])\n\tkwargs['start'] = cint(kwargs['start'])\n\tkwargs['page_len'] = cint(kwargs['page_len'])\n\n\tif kwargs['doctype'] and not frappe.db.exists('DocType', kwargs['doctype']):\n\t\treturn []\n\n\treturn fn(**kwargs)", "label_name": "CWE-79", "label": 79}
{"code": "def _get_index_absolute_path(index):\n return os.path.join(INDEXDIR, index)", "label_name": "CWE-22", "label": 22}
{"code": "def format_errormsg(message: str) -> str:\n \"\"\"Match account names in error messages and insert HTML links for them.\"\"\"\n match = re.search(ACCOUNT_RE, message)\n if not match:\n return message\n account = match.group()\n url = flask.url_for(\"account\", name=account)\n return (\n message.replace(account, f'{account} ')\n .replace(\"for '\", \"for \")\n .replace(\"': \", \": \")\n )", "label_name": "CWE-79", "label": 79}
{"code": "def home_get_dat():\n d = db.sentences_stats('get_data')\n n = db.sentences_stats('all_networks')\n\n ('clean_online')\n rows = db.sentences_stats('get_clicks')\n c = rows[0][0]\n rows = db.sentences_stats('get_sessions')\n s = rows[0][0]\n rows = db.sentences_stats('get_online')\n o = rows[0][0]\n\n return json.dumps({'status' : 'OK', 'd' : d, 'n' : n, 'c' : c, 's' : s, 'o' : o});", "label_name": "CWE-89", "label": 89}
{"code": " def __new__(cls, sourceName: str):\n \"\"\"Dispatches to the right subclass.\"\"\"\n if cls != InputSource:\n # Only take control of calls to InputSource(...) itself.\n return super().__new__(cls)\n\n if sourceName == \"-\":\n return StdinInputSource(sourceName)\n if sourceName.startswith(\"https:\"):\n return UrlInputSource(sourceName)\n return FileInputSource(sourceName)", "label_name": "CWE-78", "label": 78}
{"code": " def testSizeAndClear(self):\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32, name='x')\n pi = array_ops.placeholder(dtypes.int64)\n gi = array_ops.placeholder(dtypes.int64)\n v = 2. * (array_ops.zeros([128, 128]) + x)\n with ops.device(test.gpu_device_name()):\n stager = data_flow_ops.MapStagingArea(\n [dtypes.float32, dtypes.float32],\n shapes=[[], [128, 128]],\n names=['x', 'v'])\n stage = stager.put(pi, {'x': x, 'v': v})\n size = stager.size()\n clear = stager.clear()\n\n G.finalize()\n\n with self.session(graph=G) as sess:\n sess.run(stage, feed_dict={x: -1, pi: 3})\n self.assertEqual(sess.run(size), 1)\n sess.run(stage, feed_dict={x: -1, pi: 1})\n self.assertEqual(sess.run(size), 2)\n sess.run(clear)\n self.assertEqual(sess.run(size), 0)", "label_name": "CWE-843", "label": 843}
{"code": "def job_browse(job_id: int, path):\n \"\"\"\n Browse directory of the job.\n :param job_id: int\n :param path: str\n \"\"\"\n\n try:\n # Query job information\n job_info = query_internal_api(f\"/internal/jobs/{job_id}\", \"get\")\n\n # Base directory of the job\n job_base_dir = os.path.dirname(os.path.dirname(job_info[\"outputdir\"]))\n\n except Exception as err:\n # Display error on the GUI\n flash(str(err), \"danger\")\n return redirect(url_for(\"job_page\", job_id=job_id))\n\n # Join the base and the requested path\n abs_path = os.path.join(job_base_dir, path)\n\n # URL path variable for going back\n back_path = os.path.dirname(abs_path).replace(job_base_dir, \"\")\n\n # If path doesn't exist\n if not os.path.exists(abs_path):\n flash(\"Directory for this job does not exist.\", \"warning\")\n return redirect(url_for(\"job_page\", job_id=job_id))\n\n # Check if path is a file and send\n if os.path.isfile(abs_path):\n return send_file(abs_path)\n\n files_info = []\n\n # Show directory contents\n files = os.listdir(abs_path)\n\n # Store directory information\n for file in files:\n files_info.append({\n \"file\": file,\n \"directory\": os.path.isdir(os.path.join(abs_path, file))\n })\n\n return render_template('job_dir.html', title=f\"Job {job_id} Directory\",\n job_id=job_id,\n abs_path=abs_path,\n files_info=files_info,\n back_path=back_path)", "label_name": "CWE-22", "label": 22}
{"code": " def test___post_init__(self):\n from openapi_python_client.parser.properties import StringProperty\n\n sp = StringProperty(name=\"test\", required=True, default=\"A Default Value\",)\n\n assert sp.default == '\"A Default Value\"'", "label_name": "CWE-94", "label": 94}
{"code": " async def actset(self, ctx):\r\n \"\"\"\r\n Configure various settings for the act cog.\r\n \"\"\"\r", "label_name": "CWE-502", "label": 502}
{"code": "def get_list(an_enum_value: List[AnEnum] = Query(...), some_date: Union[date, datetime] = Query(...)):\n \"\"\" Get a list of things \"\"\"\n return", "label_name": "CWE-94", "label": 94}
{"code": " def test_request_body_too_large_with_wrong_cl_http11(self):\n body = \"a\" * self.toobig\n to_send = \"GET / HTTP/1.1\\n\" \"Content-Length: 5\\n\\n\"\n to_send += body\n to_send = tobytes(to_send)\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\")\n # first request succeeds (content-length 5)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # second response is an error response\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"431\", \"Request Header Fields Too Large\", \"HTTP/1.0\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n # connection has been closed\n self.send_check_error(to_send)\n self.assertRaises(ConnectionClosed, read_http, fp)", "label_name": "CWE-444", "label": 444}
{"code": " def test_parse_header_bad_content_length(self):\n data = b\"GET /foobar HTTP/8.4\\r\\ncontent-length: abc\\r\\n\"\n self.parser.parse_header(data)\n self.assertEqual(self.parser.body_rcv, None)", "label_name": "CWE-444", "label": 444}
{"code": "def profile():\n languages = calibre_db.speaking_language()\n translations = babel.list_translations() + [LC('en')]\n kobo_support = feature_support['kobo'] and config.config_kobo_sync\n if feature_support['oauth'] and config.config_login_type == 2:\n oauth_status = get_oauth_status()\n local_oauth_check = oauth_check\n else:\n oauth_status = None\n local_oauth_check = {}\n\n if request.method == \"POST\":\n change_profile(kobo_support, local_oauth_check, oauth_status, translations, languages)\n return render_title_template(\"user_edit.html\",\n translations=translations,\n profile=1,\n languages=languages,\n content=current_user,\n kobo_support=kobo_support,\n title=_(u\"%(name)s's profile\", name=current_user.name),\n page=\"me\",\n registered_oauth=local_oauth_check,\n oauth_status=oauth_status)", "label_name": "CWE-918", "label": 918}
{"code": "def remove_auth_hashes(input: Optional[str]):\n if not input:\n return input\n # If there are no hashes, skip the RE for performance.\n if not any([pw_hash in input for pw_hash in PASSWORD_HASHERS_ALL.keys()]):\n return input\n return re_remove_passwords.sub(r'\\1 %s # Filtered for security' % PASSWORD_HASH_DUMMY_VALUE, input)", "label_name": "CWE-212", "label": 212}
{"code": " def test_keepalive_http_11(self):\n # Handling of Keep-Alive within HTTP 1.1\n\n # All connections are kept alive, unless stated otherwise\n data = \"Default: Keep me alive\"\n s = tobytes(\n \"GET / HTTP/1.1\\n\" \"Content-Length: %d\\n\" \"\\n\" \"%s\" % (len(data), data)\n )\n self.connect()\n self.sock.send(s)\n response = httplib.HTTPResponse(self.sock)\n response.begin()\n self.assertEqual(int(response.status), 200)\n self.assertTrue(response.getheader(\"connection\") != \"close\")", "label_name": "CWE-444", "label": 444}
{"code": " def __init__(self, *, openapi: GeneratorData) -> None:\n self.openapi: GeneratorData = openapi\n self.env: Environment = Environment(loader=PackageLoader(__package__), trim_blocks=True, lstrip_blocks=True)\n\n self.project_name: str = self.project_name_override or f\"{openapi.title.replace(' ', '-').lower()}-client\"\n self.project_dir: Path = Path.cwd() / self.project_name\n\n self.package_name: str = self.package_name_override or self.project_name.replace(\"-\", \"_\")\n self.package_dir: Path = self.project_dir / self.package_name\n self.package_description: str = f\"A client library for accessing {self.openapi.title}\"\n self.version: str = openapi.version\n\n self.env.filters.update(self.TEMPLATE_FILTERS)", "label_name": "CWE-22", "label": 22}
{"code": " def testPartialIndexGets(self):\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32)\n f = array_ops.placeholder(dtypes.float32)\n v = array_ops.placeholder(dtypes.float32)\n pi = array_ops.placeholder(dtypes.int64)\n pei = array_ops.placeholder(dtypes.int64)\n gi = array_ops.placeholder(dtypes.int64)\n with ops.device(test.gpu_device_name()):\n # Test again with partial index gets\n stager = data_flow_ops.MapStagingArea(\n [dtypes.float32, dtypes.float32, dtypes.float32])\n stage_xvf = stager.put(pi, [x, v, f], [0, 1, 2])\n key_xf, get_xf = stager.get(gi, [0, 2])\n key_v, get_v = stager.get(gi, [1])\n size = stager.size()\n isize = stager.incomplete_size()\n\n G.finalize()\n\n with self.session(graph=G) as sess:\n # Stage complete tuple\n sess.run(stage_xvf, feed_dict={pi: 0, x: 1, f: 2, v: 3})\n\n self.assertTrue(sess.run([size, isize]) == [1, 0])\n\n # Partial get using indices\n self.assertTrue(\n sess.run([key_xf, get_xf], feed_dict={\n gi: 0\n }) == [0, [1, 2]])\n\n # Still some of key 0 left\n self.assertTrue(sess.run([size, isize]) == [1, 0])\n\n # Partial get of remaining index\n self.assertTrue(sess.run([key_v, get_v], feed_dict={gi: 0}) == [0, [3]])\n\n # All gone\n self.assertTrue(sess.run([size, isize]) == [0, 0])", "label_name": "CWE-843", "label": 843}
{"code": " async def on_message(self, message):\r\n if message.author.bot:\r\n return\r\n\r\n ctx = await self.bot.get_context(message)\r\n if ctx.prefix is None or not ctx.invoked_with.replace(\"_\", \"\").isalpha():\r\n return\r\n\r\n if ctx.valid and ctx.command.enabled:\r\n try:\r\n if await ctx.command.can_run(ctx):\r\n return\r\n except commands.errors.CheckFailure:\r\n return\r\n\r\n ctx.command = self.act\r\n await self.bot.invoke(ctx)\r", "label_name": "CWE-502", "label": 502}
{"code": " def test_notfilelike_http11(self):\n to_send = \"GET /notfilelike HTTP/1.1\\n\\n\"\n to_send = tobytes(to_send)\n\n self.connect()\n\n for t in range(0, 2):\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line, headers, response_body = read_http(fp)\n self.assertline(line, \"200\", \"OK\", \"HTTP/1.1\")\n cl = int(headers[\"content-length\"])\n self.assertEqual(cl, len(response_body))\n ct = headers[\"content-type\"]\n self.assertEqual(ct, \"image/jpeg\")\n self.assertTrue(b\"\\377\\330\\377\" in response_body)", "label_name": "CWE-444", "label": 444}
{"code": "def publish(request, user_id=None):\n initial = None\n if user_id: # todo: move to form\n user_to = get_object_or_404(User, pk=user_id)\n initial = {'users': [user_to.st.nickname]}\n\n user = request.user\n tform = TopicForPrivateForm(\n user=user, data=post_data(request))\n cform = CommentForm(\n user=user, data=post_data(request))\n tpform = TopicPrivateManyForm(\n user=user, data=post_data(request), initial=initial)\n\n if (is_post(request) and\n all([tform.is_valid(), cform.is_valid(), tpform.is_valid()]) and\n not request.is_limited()):\n if not user.st.update_post_hash(tform.get_topic_hash()):\n return redirect(\n request.POST.get('next', None) or\n tform.category.get_absolute_url())\n\n # wrap in transaction.atomic?\n topic = tform.save()\n cform.topic = topic\n comment = cform.save()\n comment_posted(comment=comment, mentions=None)\n tpform.topic = topic\n tpform.save_m2m()\n TopicNotification.bulk_create(\n users=tpform.get_users(), comment=comment)\n return redirect(topic.get_absolute_url())\n\n return render(\n request=request,\n template_name='spirit/topic/private/publish.html',\n context={\n 'tform': tform,\n 'cform': cform,\n 'tpform': tpform})", "label_name": "CWE-601", "label": 601}
{"code": " def _decompress(compressed_path: Text, target_path: Text) -> None:\n\n with tarfile.open(compressed_path, \"r:gz\") as tar:\n tar.extractall(target_path) # target dir will be created if it not exists", "label_name": "CWE-22", "label": 22}
{"code": " def render(self, name, value, attrs=None):\n html = super(AdminURLFieldWidget, self).render(name, value, attrs)\n if value:\n value = force_text(self._format_value(value))\n final_attrs = {'href': mark_safe(smart_urlquote(value))}\n html = format_html(\n '{0} {2} {3} {4}
',\n _('Currently:'), flatatt(final_attrs), value,\n _('Change:'), html\n )\n return html", "label_name": "CWE-79", "label": 79}
{"code": " def POST(self, path, body=None, ensure_encoding=True, log_request_body=True):\n return self._request('POST', path, body=body, ensure_encoding=ensure_encoding,\n log_request_body=log_request_body)", "label_name": "CWE-295", "label": 295}
{"code": " def sql_execute(self, sentence):\n self.cursor.execute(sentence)\n return self.cursor.fetchall()", "label_name": "CWE-79", "label": 79}
{"code": "\tdef decompile(self):\n\t\tself.writeln(\"** Decompiling APK...\", clr.OKBLUE)\n\t\twith ZipFile(self.file) as zipped:\n\t\t\ttry:\n\t\t\t\tdex = self.tempdir + \"/\" + self.apk.package + \".dex\"\n\t\t\t\twith open(dex, \"wb\") as classes:\n\t\t\t\t\tclasses.write(zipped.read(\"classes.dex\"))\n\t\t\texcept Exception as e:\n\t\t\t\tsys.exit(self.writeln(str(e), clr.WARNING))\n\t\tdec = \"%s %s -d %s --deobf\" % (self.jadx, dex, self.tempdir)\n\t\tos.system(dec)\n\t\treturn self.tempdir", "label_name": "CWE-88", "label": 88}
{"code": "def login():\n from flask_login import current_user\n\n redirect_url = request.args.get(\"redirect\", request.script_root + url_for(\"index\"))\n permissions = sorted(\n filter(\n lambda x: x is not None and isinstance(x, OctoPrintPermission),\n map(\n lambda x: getattr(Permissions, x.strip()),\n request.args.get(\"permissions\", \"\").split(\",\"),\n ),\n ),\n key=lambda x: x.get_name(),\n )\n if not permissions:\n permissions = [Permissions.STATUS, Permissions.SETTINGS_READ]\n\n user_id = request.args.get(\"user_id\", \"\")\n\n if (not user_id or current_user.get_id() == user_id) and has_permissions(\n *permissions\n ):\n return redirect(redirect_url)\n\n render_kwargs = {\n \"theming\": [],\n \"redirect_url\": redirect_url,\n \"permission_names\": map(lambda x: x.get_name(), permissions),\n \"user_id\": user_id,\n \"logged_in\": not current_user.is_anonymous,\n }\n\n try:\n additional_assets = _add_additional_assets(\"octoprint.theming.login\")\n\n # backwards compatibility to forcelogin & loginui plugins which were replaced by this built-in dialog\n additional_assets += _add_additional_assets(\"octoprint.plugin.forcelogin.theming\")\n additional_assets += _add_additional_assets(\"octoprint.plugin.loginui.theming\")\n\n render_kwargs.update({\"theming\": additional_assets})\n except Exception:\n _logger.exception(\"Error processing theming CSS, ignoring\")\n\n return render_template(\"login.jinja2\", **render_kwargs)", "label_name": "CWE-79", "label": 79}
{"code": "def feed_booksindex():\n shift = 0\n off = int(request.args.get(\"offset\") or 0)\n entries = calibre_db.session.query(func.upper(func.substr(db.Books.sort, 1, 1)).label('id'))\\\n .filter(calibre_db.common_filters()).group_by(func.upper(func.substr(db.Books.sort, 1, 1))).all()\n\n elements = []\n if off == 0:\n elements.append({'id': \"00\", 'name':_(\"All\")})\n shift = 1\n for entry in entries[\n off + shift - 1:\n int(off + int(config.config_books_per_page) - shift)]:\n elements.append({'id': entry.id, 'name': entry.id})\n\n pagination = Pagination((int(off) / (int(config.config_books_per_page)) + 1), config.config_books_per_page,\n len(entries) + 1)\n return render_xml_template('feed.xml',\n letterelements=elements,\n folder='opds.feed_letter_books',\n pagination=pagination)", "label_name": "CWE-918", "label": 918}
{"code": "def get_install_extras_require():\n extras_require = {\n 'action': ['chevron'],\n 'browser': ['zeroconf==0.19.1' if PY2 else 'zeroconf>=0.19.1'],\n 'cloud': ['requests'],\n 'docker': ['docker>=2.0.0'],\n 'export': ['bernhard', 'cassandra-driver', 'couchdb', 'elasticsearch',\n 'graphitesender', 'influxdb>=1.0.0', 'kafka-python', 'pika',\n 'paho-mqtt', 'potsdb', 'prometheus_client', 'pyzmq',\n 'statsd'],\n 'folders': ['scandir'], # python_version<\"3.5\"\n 'gpu': ['py3nvml'],\n 'graph': ['pygal'],\n 'ip': ['netifaces'],\n 'raid': ['pymdstat'],\n 'smart': ['pySMART.smartx'],\n 'snmp': ['pysnmp'],\n 'sparklines': ['sparklines'],\n 'web': ['bottle', 'requests'],\n 'wifi': ['wifi']\n }\n # Add automatically the 'all' target\n extras_require.update({'all': [i[0] for i in extras_require.values()]})\n\n return extras_require", "label_name": "CWE-611", "label": 611}
{"code": "def file(path):\n path = secure_filename(path)\n if app.interface.encrypt and isinstance(app.interface.examples, str) and path.startswith(app.interface.examples):\n with open(os.path.join(app.cwd, path), \"rb\") as encrypted_file:\n encrypted_data = encrypted_file.read()\n file_data = encryptor.decrypt(\n app.interface.encryption_key, encrypted_data)\n return send_file(io.BytesIO(file_data), attachment_filename=os.path.basename(path))\n else:\n return send_file(os.path.join(app.cwd, path))", "label_name": "CWE-22", "label": 22}
{"code": "def update_server_key(conf):\n \"\"\"\n Download the server's RSA key and store in the location\n specified in the configuration.\n :param conf: The consumer configuration object.\n :type conf: dict\n \"\"\"\n host = conf['server']['host']\n location = conf['server']['rsa_pub']\n url = 'https://%s/pulp/static/rsa_pub.key' % host\n try:\n os.makedirs(os.path.dirname(location))\n except OSError, e:\n if e.errno != errno.EEXIST:\n raise\n download(url, location)", "label_name": "CWE-295", "label": 295}
{"code": " def test_keepalive_http11_connclose(self):\n # specifying Connection: close explicitly\n data = \"Don't keep me alive\"\n s = tobytes(\n \"GET / HTTP/1.1\\n\"\n \"Connection: close\\n\"\n \"Content-Length: %d\\n\"\n \"\\n\"\n \"%s\" % (len(data), data)\n )\n self.connect()\n self.sock.send(s)\n response = httplib.HTTPResponse(self.sock)\n response.begin()\n self.assertEqual(int(response.status), 200)\n self.assertEqual(response.getheader(\"connection\"), \"close\")", "label_name": "CWE-444", "label": 444}
{"code": " def traverse(cls, base, request, path_items):\n \"\"\"See ``zope.app.pagetemplate.engine``.\"\"\"\n\n path_items = list(path_items)\n path_items.reverse()\n\n while path_items:\n name = path_items.pop()\n\n if name == '_':\n warnings.warn('Traversing to the name `_` is deprecated '\n 'and will be removed in Zope 6.',\n DeprecationWarning)\n elif name.startswith('_'):\n raise NotFound(name)\n\n if ITraversable.providedBy(base):\n base = getattr(base, cls.traverse_method)(name)\n else:\n base = traversePathElement(base, name, path_items,\n request=request)\n\n return base", "label_name": "CWE-22", "label": 22}
{"code": "def get_install_requires():\n requires = ['psutil>=5.3.0', 'future']\n if sys.platform.startswith('win'):\n requires.append('bottle')\n requires.append('requests')\n\n return requires", "label_name": "CWE-611", "label": 611}
{"code": " def test_module(self):\n body = [ast.Num(42)]\n x = ast.Module(body)\n self.assertEqual(x.body, body)", "label_name": "CWE-125", "label": 125}
{"code": " def make_homeserver(self, reactor, clock):\n\n self.hs = self.setup_test_homeserver(\n \"red\", http_client=None, federation_client=Mock(),\n )\n\n self.hs.get_federation_handler = Mock()\n self.hs.get_federation_handler.return_value.maybe_backfill = Mock(\n return_value=make_awaitable(None)\n )\n\n async def _insert_client_ip(*args, **kwargs):\n return None\n\n self.hs.get_datastore().insert_client_ip = _insert_client_ip\n\n return self.hs", "label_name": "CWE-601", "label": 601}
{"code": " def get_absolute_path(path):\n import os\n script_dir = os.path.dirname(__file__) # <-- absolute dir the script is in\n rel_path = path\n abs_file_path = os.path.join(script_dir, rel_path)\n return abs_file_path", "label_name": "CWE-22", "label": 22}
{"code": "def _get_obj_absolute_path(obj_path):\n return os.path.join(DATAROOT, obj_path)", "label_name": "CWE-22", "label": 22}
{"code": " def makeTrustRoot(self):\n # If this option is specified, use a specific root CA cert. This is useful for testing when it's not\n # practical to get the client cert signed by a real root CA but should never be used on a production server.\n caCertFilename = self.sydent.cfg.get('http', 'replication.https.cacert')\n if len(caCertFilename) > 0:\n try:\n fp = open(caCertFilename)\n caCert = twisted.internet.ssl.Certificate.loadPEM(fp.read())\n fp.close()\n except:\n logger.warn(\"Failed to open CA cert file %s\", caCertFilename)\n raise\n logger.warn(\"Using custom CA cert file: %s\", caCertFilename)\n return twisted.internet._sslverify.OpenSSLCertificateAuthorities([caCert.original])\n else:\n return twisted.internet.ssl.OpenSSLDefaultPaths()", "label_name": "CWE-770", "label": 770}
{"code": " def stmt(self, stmt, msg=None):\n mod = ast.Module([stmt])\n self.mod(mod, msg)", "label_name": "CWE-125", "label": 125}
{"code": " def test_get_header_lines_tabbed(self):\n result = self._callFUT(b\"slam\\n\\tslim\")\n self.assertEqual(result, [b\"slam\\tslim\"])", "label_name": "CWE-444", "label": 444}
{"code": " def make_homeserver(self, reactor, clock):\n hs = self.setup_test_homeserver(http_client=None)\n self.handler = hs.get_federation_handler()\n self.store = hs.get_datastore()\n return hs", "label_name": "CWE-601", "label": 601}
{"code": "def test_bind_invalid_entry(topology_st):\n \"\"\"Test the failing bind does not return information about the entry\n\n :id: 5cd9b083-eea6-426b-84ca-83c26fc49a6f\n\n :customerscenario: True\n\n :setup: Standalone instance\n\n :steps:\n 1: bind as non existing entry\n 2: check that bind info does not report 'No such entry'\n\n :expectedresults:\n 1: pass\n 2: pass\n \"\"\"\n\n topology_st.standalone.restart()\n INVALID_ENTRY=\"cn=foooo,%s\" % DEFAULT_SUFFIX\n try:\n topology_st.standalone.simple_bind_s(INVALID_ENTRY, PASSWORD)\n except ldap.LDAPError as e:\n log.info('test_bind_invalid_entry: Failed to bind as %s (expected)' % INVALID_ENTRY)\n log.info('exception description: ' + e.args[0]['desc'])\n if 'info' in e.args[0]:\n log.info('exception info: ' + e.args[0]['info'])\n assert e.args[0]['desc'] == 'Invalid credentials'\n assert 'info' not in e.args[0]\n pass\n\n log.info('test_bind_invalid_entry: PASSED')\n\n # reset credentials\n topology_st.standalone.simple_bind_s(DN_DM, PW_DM)", "label_name": "CWE-203", "label": 203}
{"code": " def test_expect_continue(self):\n # specifying Connection: close explicitly\n data = \"I have expectations\"\n to_send = tobytes(\n \"GET / HTTP/1.1\\n\"\n \"Connection: close\\n\"\n \"Content-Length: %d\\n\"\n \"Expect: 100-continue\\n\"\n \"\\n\"\n \"%s\" % (len(data), data)\n )\n self.connect()\n self.sock.send(to_send)\n fp = self.sock.makefile(\"rb\", 0)\n line = fp.readline() # continue status line\n version, status, reason = (x.strip() for x in line.split(None, 2))\n self.assertEqual(int(status), 100)\n self.assertEqual(reason, b\"Continue\")\n self.assertEqual(version, b\"HTTP/1.1\")\n fp.readline() # blank line\n line = fp.readline() # next status line\n version, status, reason = (x.strip() for x in line.split(None, 2))\n headers = parse_headers(fp)\n length = int(headers.get(\"content-length\")) or None\n response_body = fp.read(length)\n self.assertEqual(int(status), 200)\n self.assertEqual(length, len(response_body))\n self.assertEqual(response_body, tobytes(data))", "label_name": "CWE-444", "label": 444}
{"code": "def update(request, pk):\n notification = get_object_or_404(TopicNotification, pk=pk, user=request.user)\n form = NotificationForm(data=request.POST, instance=notification)\n\n if form.is_valid():\n form.save()\n else:\n messages.error(request, utils.render_form_errors(form))\n\n return redirect(request.POST.get(\n 'next', notification.topic.get_absolute_url()))", "label_name": "CWE-601", "label": 601}
{"code": "def feed_get_cover(book_id):\n return get_book_cover(book_id)", "label_name": "CWE-918", "label": 918}
{"code": " def get_field_options(self, field):\n options = {}\n options['label'] = field.label\n options['help_text'] = field.help_text\n options['required'] = field.required\n options['initial'] = field.default_value\n return options", "label_name": "CWE-79", "label": 79}
{"code": " def _cbrt(x):\n return math.pow(x, 1.0/3)", "label_name": "CWE-94", "label": 94}
{"code": "def pref_set(key, value):\n if get_user() is None:\n return \"Authentication required\", 401\n\n get_preferences()[key] = (None if value == 'null' else value)\n return Response(json.dumps({'key': key, 'success': ''})), 201", "label_name": "CWE-79", "label": 79}
{"code": " def _deny_hook(self, resource=None):\n app = self.get_app()\n if current_user.is_authenticated():\n status = 403\n else:\n status = 401\n #abort(status)\n\n if app.config.get('FRONTED_BY_NGINX'):\n url = \"https://{}:{}{}\".format(app.config.get('FQDN'), app.config.get('NGINX_PORT'), '/login')\n else:\n url = \"http://{}:{}{}\".format(app.config.get('FQDN'), app.config.get('API_PORT'), '/login')\n if current_user.is_authenticated():\n auth_dict = {\n \"authenticated\": True,\n \"user\": current_user.email,\n \"roles\": current_user.role,\n }\n else:\n auth_dict = {\n \"authenticated\": False,\n \"user\": None,\n \"url\": url\n }\n\n return Response(response=json.dumps({\"auth\": auth_dict}), status=status, mimetype=\"application/json\")", "label_name": "CWE-601", "label": 601}
{"code": "def another_upload_file(request):\n path = tempfile.mkdtemp()\n file_name = os.path.join(path, \"another_%s.txt\" % request.node.name)\n with open(file_name, \"w\") as f:\n f.write(request.node.name)\n return file_name", "label_name": "CWE-22", "label": 22}
{"code": " def test_received_preq_completed_n_lt_data(self):\n inst, sock, map = self._makeOneWithMap()\n inst.server = DummyServer()\n preq = DummyParser()\n inst.request = preq\n preq.completed = True\n preq.empty = False\n line = b\"GET / HTTP/1.1\\n\\n\"\n preq.retval = len(line)\n inst.received(line + line)\n self.assertEqual(inst.request, None)\n self.assertEqual(len(inst.requests), 2)\n self.assertEqual(len(inst.server.tasks), 1)", "label_name": "CWE-444", "label": 444}
{"code": " def testDictionary(self):\n with ops.Graph().as_default() as G:\n with ops.device('/cpu:0'):\n x = array_ops.placeholder(dtypes.float32)\n pi = array_ops.placeholder(dtypes.int64)\n gi = array_ops.placeholder(dtypes.int64)\n v = 2. * (array_ops.zeros([128, 128]) + x)\n with ops.device(test.gpu_device_name()):\n stager = data_flow_ops.MapStagingArea(\n [dtypes.float32, dtypes.float32],\n shapes=[[], [128, 128]],\n names=['x', 'v'])\n stage = stager.put(pi, {'x': x, 'v': v})\n key, ret = stager.get(gi)\n z = ret['x']\n y = ret['v']\n y = math_ops.reduce_max(z * math_ops.matmul(y, y))\n\n G.finalize()\n\n with self.session(graph=G) as sess:\n sess.run(stage, feed_dict={x: -1, pi: 0})\n for i in range(10):\n _, yval = sess.run([stage, y], feed_dict={x: i, pi: i + 1, gi: i})\n self.assertAllClose(\n 4 * (i - 1) * (i - 1) * (i - 1) * 128, yval, rtol=1e-4)", "label_name": "CWE-843", "label": 843}
{"code": "def check_auth(username, password):\n try:\n username = username.encode('windows-1252')\n except UnicodeEncodeError:\n username = username.encode('utf-8')\n user = ub.session.query(ub.User).filter(func.lower(ub.User.name) ==\n username.decode('utf-8').lower()).first()\n if bool(user and check_password_hash(str(user.password), password)):\n return True\n else:\n ip_Address = request.headers.get('X-Forwarded-For', request.remote_addr)\n log.warning('OPDS Login failed for user \"%s\" IP-address: %s', username.decode('utf-8'), ip_Address)\n return False", "label_name": "CWE-918", "label": 918}
{"code": "def boboAwareZopeTraverse(object, path_items, econtext):\n \"\"\"Traverses a sequence of names, first trying attributes then items.\n\n This uses zope.traversing path traversal where possible and interacts\n correctly with objects providing OFS.interface.ITraversable when\n necessary (bobo-awareness).\n \"\"\"\n request = getattr(econtext, 'request', None)\n path_items = list(path_items)\n path_items.reverse()\n\n while path_items:\n name = path_items.pop()\n\n if name == '_':\n warnings.warn('Traversing to the name `_` is deprecated '\n 'and will be removed in Zope 6.',\n DeprecationWarning)\n elif name.startswith('_'):\n raise NotFound(name)\n\n if OFS.interfaces.ITraversable.providedBy(object):\n object = object.restrictedTraverse(name)\n else:\n object = traversePathElement(object, name, path_items,\n request=request)\n return object", "label_name": "CWE-22", "label": 22}
{"code": " def test_invalid_identitifer(self):\n m = ast.Module([ast.Expr(ast.Name(42, ast.Load()))])\n ast.fix_missing_locations(m)\n with self.assertRaises(TypeError) as cm:\n compile(m, \"\", \"exec\")\n self.assertIn(\"identifier must be of type str\", str(cm.exception))", "label_name": "CWE-125", "label": 125}
{"code": " def receivePing():\n vrequest = request.form['id']\n db.sentences_victim('report_online', [vrequest])\n return json.dumps({'status' : 'OK', 'vId' : vrequest});", "label_name": "CWE-89", "label": 89}
{"code": "def mysql_contains(field: Field, value: str) -> Criterion:\n return functions.Cast(field, SqlTypes.CHAR).like(f\"%{value}%\")", "label_name": "CWE-89", "label": 89}
{"code": "def test_datetime_parsing(value, result):\n if result == errors.DateTimeError:\n with pytest.raises(errors.DateTimeError):\n parse_datetime(value)\n else:\n assert parse_datetime(value) == result", "label_name": "CWE-835", "label": 835}
{"code": "def delete_book_gdrive(book, book_format):\n error = None\n if book_format:\n name = ''\n for entry in book.data:\n if entry.format.upper() == book_format:\n name = entry.name + '.' + book_format\n gFile = gd.getFileFromEbooksFolder(book.path, name)\n else:\n gFile = gd.getFileFromEbooksFolder(os.path.dirname(book.path), book.path.split('/')[1])\n if gFile:\n gd.deleteDatabaseEntry(gFile['id'])\n gFile.Trash()\n else:\n error = _(u'Book path %(path)s not found on Google Drive', path=book.path) # file not found\n\n return error is None, error", "label_name": "CWE-918", "label": 918}
{"code": "def get_cms_details(url):\n # this function will fetch cms details using cms_detector\n response = {}\n cms_detector_command = 'python3 /usr/src/github/CMSeeK/cmseek.py -u {} --random-agent --batch --follow-redirect'.format(url)\n os.system(cms_detector_command)\n\n response['status'] = False\n response['message'] = 'Could not detect CMS!'\n\n parsed_url = urlparse(url)\n\n domain_name = parsed_url.hostname\n port = parsed_url.port\n\n find_dir = domain_name\n\n if port:\n find_dir += '_{}'.format(port)\n\n\n print(url)\n print(find_dir)\n\n # subdomain may also have port number, and is stored in dir as _port\n\n cms_dir_path = '/usr/src/github/CMSeeK/Result/{}'.format(find_dir)\n cms_json_path = cms_dir_path + '/cms.json'\n\n if os.path.isfile(cms_json_path):\n cms_file_content = json.loads(open(cms_json_path, 'r').read())\n if not cms_file_content.get('cms_id'):\n return response\n response = {}\n response = cms_file_content\n response['status'] = True\n # remove cms dir path\n try:\n shutil.rmtree(cms_dir_path)\n except Exception as e:\n print(e)\n\n return response", "label_name": "CWE-78", "label": 78}
{"code": " def testDuplicateHeaders(self):\n # Ensure that headers with the same key get concatenated as per\n # RFC2616.\n data = b\"\"\"\\\nGET /foobar HTTP/8.4\nx-forwarded-for: 10.11.12.13\nx-forwarded-for: unknown,127.0.0.1\nX-Forwarded_for: 255.255.255.255\ncontent-length: 7\n\nHello.\n\"\"\"\n self.feed(data)\n self.assertTrue(self.parser.completed)\n self.assertEqual(\n self.parser.headers,\n {\n \"CONTENT_LENGTH\": \"7\",\n \"X_FORWARDED_FOR\": \"10.11.12.13, unknown,127.0.0.1\",\n },\n )", "label_name": "CWE-444", "label": 444}
{"code": " def test_login_inactive_user(self):\n self.user.is_active = False\n self.user.save()\n\n login_code = LoginCode.objects.create(user=self.user, code='foobar')\n\n response = self.client.post('/accounts/login/code/', {\n 'code': login_code.code,\n })\n\n self.assertEqual(response.status_code, 200)\n self.assertEqual(response.context['form'].errors, {\n 'code': ['Unable to log in with provided login code.'],\n })", "label_name": "CWE-312", "label": 312}
{"code": "def _inject_admin_password_into_fs(admin_passwd, fs, execute=None):\n \"\"\"Set the root password to admin_passwd\n\n admin_password is a root password\n fs is the path to the base of the filesystem into which to inject\n the key.\n\n This method modifies the instance filesystem directly,\n and does not require a guest agent running in the instance.\n\n \"\"\"\n # The approach used here is to copy the password and shadow\n # files from the instance filesystem to local files, make any\n # necessary changes, and then copy them back.\n\n admin_user = 'root'\n\n fd, tmp_passwd = tempfile.mkstemp()\n os.close(fd)\n fd, tmp_shadow = tempfile.mkstemp()\n os.close(fd)\n\n utils.execute('cp', os.path.join(fs, 'etc', 'passwd'), tmp_passwd,\n run_as_root=True)\n utils.execute('cp', os.path.join(fs, 'etc', 'shadow'), tmp_shadow,\n run_as_root=True)\n _set_passwd(admin_user, admin_passwd, tmp_passwd, tmp_shadow)\n utils.execute('cp', tmp_passwd, os.path.join(fs, 'etc', 'passwd'),\n run_as_root=True)\n os.unlink(tmp_passwd)\n utils.execute('cp', tmp_shadow, os.path.join(fs, 'etc', 'shadow'),\n run_as_root=True)\n os.unlink(tmp_shadow)", "label_name": "CWE-22", "label": 22}
{"code": "def edit_all_cc_data(book_id, book, to_save):\n cc = calibre_db.session.query(db.Custom_Columns).filter(db.Custom_Columns.datatype.notin_(db.cc_exceptions)).all()\n return edit_cc_data(book_id, book, to_save, cc)", "label_name": "CWE-918", "label": 918}
{"code": "def create_book_on_upload(modif_date, meta):\n title = meta.title\n authr = meta.author\n sort_authors, input_authors, db_author, renamed_authors = prepare_authors_on_upload(title, authr)\n\n title_dir = helper.get_valid_filename(title, chars=96)\n author_dir = helper.get_valid_filename(db_author.name, chars=96)\n\n # combine path and normalize path from windows systems\n path = os.path.join(author_dir, title_dir).replace('\\\\', '/')\n\n # Calibre adds books with utc as timezone\n db_book = db.Books(title, \"\", sort_authors, datetime.utcnow(), datetime(101, 1, 1),\n '1', datetime.utcnow(), path, meta.cover, db_author, [], \"\")\n\n modif_date |= modify_database_object(input_authors, db_book.authors, db.Authors, calibre_db.session,\n 'author')\n\n # Add series_index to book\n modif_date |= edit_book_series_index(meta.series_id, db_book)\n\n # add languages\n invalid=[]\n modif_date |= edit_book_languages(meta.languages, db_book, upload=True, invalid=invalid)\n if invalid:\n for l in invalid:\n flash(_(u\"'%(langname)s' is not a valid language\", langname=l), category=\"warning\")\n\n # handle tags\n modif_date |= edit_book_tags(meta.tags, db_book)\n\n # handle publisher\n modif_date |= edit_book_publisher(meta.publisher, db_book)\n\n # handle series\n modif_date |= edit_book_series(meta.series, db_book)\n\n # Add file to book\n file_size = os.path.getsize(meta.file_path)\n db_data = db.Data(db_book, meta.extension.upper()[1:], file_size, title_dir)\n db_book.data.append(db_data)\n calibre_db.session.add(db_book)\n\n # flush content, get db_book.id available\n calibre_db.session.flush()\n return db_book, input_authors, title_dir, renamed_authors", "label_name": "CWE-918", "label": 918}
{"code": " public static void zipFolder(String srcFolder, String destZipFile, String ignore) throws Exception {\n try (FileOutputStream fileWriter = new FileOutputStream(destZipFile);\n ZipOutputStream zip = new ZipOutputStream(fileWriter)){\n addFolderToZip(\"\", srcFolder, zip, ignore);\n zip.flush();\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void install(\n String displayName, String description, String[] dependencies,\n String account, String password, String config) throws URISyntaxException {\n\n String javaHome = System.getProperty(\"java.home\");\n String javaBinary = javaHome + \"\\\\bin\\\\java.exe\";\n\n File jar = new File(WindowsService.class.getProtectionDomain().getCodeSource().getLocation().toURI());\n String command = javaBinary\n + \" -Duser.dir=\\\"\" + jar.getParentFile().getAbsolutePath() + \"\\\"\"\n + \" -jar \\\"\" + jar.getAbsolutePath() + \"\\\"\"\n + \" --service \\\"\" + config + \"\\\"\";\n\n StringBuilder dep = new StringBuilder();\n\n if (dependencies != null) {\n for (String s : dependencies) {\n dep.append(s);\n dep.append(\"\\0\");\n }\n }\n dep.append(\"\\0\");\n\n SERVICE_DESCRIPTION desc = new SERVICE_DESCRIPTION();\n desc.lpDescription = description;\n\n SC_HANDLE serviceManager = openServiceControlManager(null, Winsvc.SC_MANAGER_ALL_ACCESS);\n\n if (serviceManager != null) {\n SC_HANDLE service = ADVAPI_32.CreateService(serviceManager, serviceName, displayName,\n Winsvc.SERVICE_ALL_ACCESS, WinNT.SERVICE_WIN32_OWN_PROCESS, WinNT.SERVICE_AUTO_START,\n WinNT.SERVICE_ERROR_NORMAL,\n command,\n null, null, dep.toString(), account, password);\n\n if (service != null) {\n ADVAPI_32.ChangeServiceConfig2(service, Winsvc.SERVICE_CONFIG_DESCRIPTION, desc);\n ADVAPI_32.CloseServiceHandle(service);\n }\n ADVAPI_32.CloseServiceHandle(serviceManager);\n }\n }", "label_name": "CWE-428", "label": 428}
{"code": "\tpublic PersistedMapper persistMapper(String sessionId, String mapperId, Serializable mapper, int expirationTime) {\n\t\tPersistedMapper m = new PersistedMapper();\n\t\tm.setMapperId(mapperId);\n\t\tDate currentDate = new Date();\n\t\tm.setLastModified(currentDate);\n\t\tif(expirationTime > 0) {\n\t\t\tCalendar cal = Calendar.getInstance();\n\t\t\tcal.setTime(currentDate);\n\t\t\tcal.add(Calendar.SECOND, expirationTime);\n\t\t\tm.setExpirationDate(cal.getTime());\n\t\t}\n\t\tm.setOriginalSessionId(sessionId);\n\t\t\n\t\tString configuration = XStreamHelper.createXStreamInstance().toXML(mapper);\n\t\tm.setXmlConfiguration(configuration);\n\t\t\n\t\tdbInstance.getCurrentEntityManager().persist(m);\n\t\treturn m;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public Document read(File file) throws DocumentException {\n try {\n /*\n * We cannot convert the file to an URL because if the filename\n * contains '#' characters, there will be problems with the URL in\n * the InputSource (because a URL like\n * http://myhost.com/index#anchor is treated the same as\n * http://myhost.com/index) Thanks to Christian Oetterli\n */\n InputSource source = new InputSource(new FileInputStream(file));\n if (this.encoding != null) {\n source.setEncoding(this.encoding);\n }\n String path = file.getAbsolutePath();\n\n if (path != null) {\n // Code taken from Ant FileUtils\n StringBuffer sb = new StringBuffer(\"file://\");\n\n // add an extra slash for filesystems with drive-specifiers\n if (!path.startsWith(File.separator)) {\n sb.append(\"/\");\n }\n\n path = path.replace('\\\\', '/');\n sb.append(path);\n\n source.setSystemId(sb.toString());\n }\n\n return read(source);\n } catch (FileNotFoundException e) {\n throw new DocumentException(e.getMessage(), e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic void configure(ServletContextHandler context) {\n\t\tcontext.setContextPath(\"/\");\n\t\t\n\t\tcontext.getSessionHandler().setMaxInactiveInterval(serverConfig.getSessionTimeout());\n\t\t\n\t\tcontext.setInitParameter(EnvironmentLoader.ENVIRONMENT_CLASS_PARAM, DefaultWebEnvironment.class.getName());\n\t\tcontext.addEventListener(new EnvironmentLoaderListener());\n\t\tcontext.addFilter(new FilterHolder(shiroFilter), \"/*\", EnumSet.allOf(DispatcherType.class));\n\t\t\n context.addFilter(new FilterHolder(gitFilter), \"/*\", EnumSet.allOf(DispatcherType.class));\n\t\t\n\t\tcontext.addServlet(new ServletHolder(preReceiveServlet), GitPreReceiveCallback.PATH + \"/*\");\n \n context.addServlet(new ServletHolder(postReceiveServlet), GitPostReceiveCallback.PATH + \"/*\");\n \n\t\t/*\n\t\t * Add wicket servlet as the default servlet which will serve all requests failed to \n\t\t * match a path pattern\n\t\t */\n\t\tcontext.addServlet(new ServletHolder(wicketServlet), \"/\");\n\t\t\n\t\tcontext.addServlet(new ServletHolder(attachmentUploadServlet), \"/attachment_upload\");\n\t\t\n\t\tcontext.addServlet(new ServletHolder(new ClasspathAssetServlet(ImageScope.class)), \"/img/*\");\n\t\tcontext.addServlet(new ServletHolder(new ClasspathAssetServlet(IconScope.class)), \"/icon/*\");\n\t\t\n\t\tcontext.getSessionHandler().addEventListener(new HttpSessionListener() {\n\n\t\t\t@Override\n\t\t\tpublic void sessionCreated(HttpSessionEvent se) {\n\t\t\t}\n\n\t\t\t@Override\n\t\t\tpublic void sessionDestroyed(HttpSessionEvent se) {\n\t\t\t\twebSocketManager.onDestroySession(se.getSession().getId());\n\t\t\t}\n\t\t\t\n\t\t});\n\t\t\n\t\t/*\n\t\t * Configure a servlet to serve contents under site folder. Site folder can be used \n\t\t * to hold site specific web assets. \n\t\t */\n\t\tServletHolder fileServletHolder = new ServletHolder(new FileAssetServlet(Bootstrap.getSiteDir()));\n\t\tcontext.addServlet(fileServletHolder, \"/site/*\");\n\t\tcontext.addServlet(fileServletHolder, \"/robots.txt\");\n\t\t\n\t\tcontext.addServlet(new ServletHolder(jerseyServlet), \"/rest/*\");\t\t\n\t}", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wControl, Translator trans) {\n\t\tVFSContainer currentContainer = folderComponent.getCurrentContainer();\n\n\t\tstatus = FolderCommandHelper.sanityCheck(wControl, folderComponent);\n\t\tif(status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\t\n\t\tFileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainerPath());\n\t\tstatus = FolderCommandHelper.sanityCheck3(wControl, folderComponent, selection);\n\t\tif(status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\t\t\n\t\tif(selection.getFiles().isEmpty()) {\n\t\t\tstatus = FolderCommandStatus.STATUS_FAILED;\n\t\t\twControl.setWarning(trans.translate(\"warning.file.selection.empty\"));\n\t\t\treturn null;\n\t\t}\n\t\t\n\t\tMediaResource mr = new ZipMediaResource(currentContainer, selection);\n\t\tureq.getDispatchResult().setResultingMediaResource(mr);\n\t\treturn null;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public static void initializeSsl() {\n try {\n SSLContext sc = SSLContext.getInstance(SSL);\n sc.init(null, trustAllCerts, new java.security.SecureRandom());\n HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());\n } catch (NoSuchAlgorithmException | KeyManagementException e) {\n throw ErrorUtil.createCommandException(\"initializing SSL failed: \" + e.getMessage());\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": "\tprivate Style getStyleState() {\n\t\treturn StyleSignatureBasic.of(SName.root, SName.element, SName.stateDiagram, SName.state).withTOBECHANGED(group.getStereotype())\n\t\t\t\t.getMergedStyle(diagram.getSkinParam().getCurrentStyleBuilder());\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " void requestResetPassword() throws Exception\n {\n when(this.authorizationManager.hasAccess(Right.PROGRAM)).thenReturn(true);\n UserReference userReference = mock(UserReference.class);\n ResetPasswordRequestResponse requestResponse = mock(ResetPasswordRequestResponse.class);\n when(this.resetPasswordManager.requestResetPassword(userReference)).thenReturn(requestResponse);\n InternetAddress userEmail = new InternetAddress(\"acme@xwiki.org\");\n when(requestResponse.getUserEmail()).thenReturn(userEmail);\n\n assertEquals(userEmail, this.scriptService.requestResetPassword(userReference));\n verify(this.resetPasswordManager).sendResetPasswordEmailRequest(requestResponse);\n }", "label_name": "CWE-640", "label": 640}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tpoly.update(ciphertext, ciphertextOffset, dataLen);\n\t\tfinish(ad, dataLen);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (polyKey[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencrypt(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": "\tpublic boolean updateConfiguration(String mapperId, Serializable mapper, int expirationTime) {\n\t\tString configuration = XStreamHelper.createXStreamInstance().toXML(mapper);\n\t\tDate currentDate = new Date();\n\t\tDate expirationDate = null;\n\t\tif(expirationTime > 0) {\n\t\t\tCalendar cal = Calendar.getInstance();\n\t\t\tcal.setTime(currentDate);\n\t\t\tcal.add(Calendar.SECOND, expirationTime);\n\t\t\texpirationDate = cal.getTime();\n\t\t}\n\t\tint row = dbInstance.getCurrentEntityManager().createNamedQuery(\"updateMapperByMapperId\")\n\t\t\t.setParameter(\"now\", currentDate)\n\t\t\t.setParameter(\"expirationDate\", expirationDate)\n\t\t\t.setParameter(\"config\", configuration)\n\t\t\t.setParameter(\"mapperId\", mapperId)\n\t\t\t.executeUpdate();\n\n\t\tdbInstance.commit();\n\t\treturn row > 0;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public void setMergeAdjacentText(boolean mergeAdjacentText) {\n this.mergeAdjacentText = mergeAdjacentText;\n }", "label_name": "CWE-611", "label": 611}
{"code": " void shouldNotDecodeSlash() {\n final PathAndQuery res = PathAndQuery.parse(\"%2F?%2F\");\n // Do not accept a relative path.\n assertThat(res).isNull();\n final PathAndQuery res1 = PathAndQuery.parse(\"/%2F?%2F\");\n assertThat(res1).isNotNull();\n assertThat(res1.path()).isEqualTo(\"/%2F\");\n assertThat(res1.query()).isEqualTo(\"%2F\");\n\n final PathAndQuery pathOnly = PathAndQuery.parse(\"/foo%2F\");\n assertThat(pathOnly).isNotNull();\n assertThat(pathOnly.path()).isEqualTo(\"/foo%2F\");\n assertThat(pathOnly.query()).isNull();\n\n final PathAndQuery queryOnly = PathAndQuery.parse(\"/?%2f=%2F\");\n assertThat(queryOnly).isNotNull();\n assertThat(queryOnly.path()).isEqualTo(\"/\");\n assertThat(queryOnly.query()).isEqualTo(\"%2F=%2F\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " private void securityCheck(String filename) {\n Assert.doesNotContain(filename, \"..\");\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic static XStream createXStreamInstanceForDBObjects() {\n\t\treturn new EnhancedXStream(true);\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public InternetAddress requestResetPassword(UserReference user) throws ResetPasswordException\n {\n if (this.authorizationManager.hasAccess(Right.PROGRAM)) {\n ResetPasswordRequestResponse resetPasswordRequestResponse =\n this.resetPasswordManager.requestResetPassword(user);\n this.resetPasswordManager.sendResetPasswordEmailRequest(resetPasswordRequestResponse);\n return resetPasswordRequestResponse.getUserEmail();\n } else {\n return null;\n }\n }", "label_name": "CWE-640", "label": 640}
{"code": "\tpublic void testCycle_ECDH_ES_Curve_P256_attackPoint1()\n\t\tthrows Exception {\n\t\t\n\t\tECKey ecJWK = generateECJWK(ECKey.Curve.P_256);\n\t\t\n\t\tBigInteger privateReceiverKey = ecJWK.toECPrivateKey().getS();\n\t\t\n\t\tJWEHeader header = new JWEHeader.Builder(JWEAlgorithm.ECDH_ES,\n\t\t\tEncryptionMethod.A128GCM)\n\t\t\t.agreementPartyUInfo(Base64URL.encode(\"Alice\"))\n\t\t\t.agreementPartyVInfo(Base64URL.encode(\"Bob\"))\n\t\t\t.build();\n\t\t\n\t\t// attacking point #1 with order 113 //\n\t\tBigInteger attackerOrderGroup1 = new BigInteger(\"113\");\n\t\tBigInteger receiverPrivateKeyModAttackerOrderGroup1 = privateReceiverKey\n\t\t\t.mod(attackerOrderGroup1);\n\t\t\n//\t\tSystem.out.println(\"The receiver private key is equal to \"\n//\t\t\t+ receiverPrivateKeyModAttackerOrderGroup1 + \" mod \"\n//\t\t\t+ attackerOrderGroup1);\n\t\t\n\t\t// The malicious JWE contains a public key with order 113\n\t\tString maliciousJWE1 = \"eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w\";\n\t\tJWEObject jweObject1 = JWEObject.parse(maliciousJWE1);\n\t\t\n\t\tECDHDecrypter decrypter = new ECDHDecrypter(ecJWK.toECPrivateKey());\n//\t\tdecrypter.getJCAContext().setKeyEncryptionProvider(BouncyCastleProviderSingleton.getInstance());\n\t\t\n\t\ttry {\n\t\t\tjweObject1.decrypt(decrypter);\n\t\t\tfail();\n\t\t} catch (JOSEException e) {\n\t\t\tassertEquals(\"Invalid ephemeral public key: Point not on expected curve\", e.getMessage());\n\t\t}\n\t\t\n\t\t// this proof that receiverPrivateKey is equals 26 % 113\n//\t\tassertEquals(\"Gambling is illegal at Bushwood sir, and I never slice.\",\n//\t\t\tjweObject1.getPayload().toString());\n\t\t\n\t\t// THIS CAN BE DOIN MANY TIME\n\t\t// ....\n\t\t// AND THAN CHINESE REMAINDER THEOREM FTW\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " private boolean isFileWithinDirectory(\n final File dir,\n final File file\n ) throws IOException {\n final File dir_ = dir.getAbsoluteFile();\n if (dir_.isDirectory()) {\n final File fl = new File(dir_, file.getPath());\n if (fl.isFile()) {\n if (fl.getCanonicalPath().startsWith(dir_.getCanonicalPath())) {\n // Prevent accessing files outside the load-path.\n // E.g.: ../../coffee\n return true;\n }\n }\n }\n\n return false;\n }", "label_name": "CWE-22", "label": 22}
{"code": " public SAXReader(String xmlReaderClassName) throws SAXException {\n if (xmlReaderClassName != null) {\n this.xmlReader = XMLReaderFactory\n .createXMLReader(xmlReaderClassName);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public boolean isIncludeExternalDTDDeclarations() {\n return includeExternalDTDDeclarations;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public static void serializeToStream(final OutputStream os, final Object payload) throws IOException {\n ObjectOutputStream oos = null;\n try {\n oos = new ObjectOutputStream(os);\n oos.writeObject(payload);\n } finally {\n if (oos != null) {\n try {\n oos.close();\n } catch (IOException ignore) {\n // empty catch block\n }\n }\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": " public void testFileRegionCountLargerThenFile(ServerBootstrap sb, Bootstrap cb) throws Throwable {\n File file = File.createTempFile(\"netty-\", \".tmp\");\n file.deleteOnExit();\n\n final FileOutputStream out = new FileOutputStream(file);\n out.write(data);\n out.close();\n\n sb.childHandler(new SimpleChannelInboundHandler() {\n @Override\n protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) {\n // Just drop the message.\n }\n });\n cb.handler(new ChannelInboundHandlerAdapter());\n\n Channel sc = sb.bind().sync().channel();\n Channel cc = cb.connect(sc.localAddress()).sync().channel();\n\n // Request file region which is bigger then the underlying file.\n FileRegion region = new DefaultFileRegion(\n new RandomAccessFile(file, \"r\").getChannel(), 0, data.length + 1024);\n\n assertThat(cc.writeAndFlush(region).await().cause(), CoreMatchers.instanceOf(IOException.class));\n cc.close().sync();\n sc.close().sync();\n }", "label_name": "CWE-378", "label": 378}
{"code": " public void setErrorHandler(ErrorHandler errorHandler) {\n this.errorHandler = errorHandler;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public ModelAndView recover(HttpServletRequest request, HttpServletResponse response) throws Exception {\n\n Map map = new HashMap();\n String usernameOrEmail = StringUtils.trimToNull(request.getParameter(\"usernameOrEmail\"));\n\n if (usernameOrEmail != null) {\n\n map.put(\"usernameOrEmail\", usernameOrEmail);\n User user = getUserByUsernameOrEmail(usernameOrEmail);\n\n boolean captchaOk;\n if (settingsService.isCaptchaEnabled()) {\n String recaptchaResponse = request.getParameter(\"g-recaptcha-response\");\n ReCaptcha captcha = new ReCaptcha(settingsService.getRecaptchaSecretKey());\n captchaOk = recaptchaResponse != null && captcha.isValid(recaptchaResponse);\n } else {\n captchaOk = true;\n }\n \n if (!captchaOk) {\n map.put(\"error\", \"recover.error.invalidcaptcha\");\n } else if (user == null) {\n map.put(\"error\", \"recover.error.usernotfound\");\n } else if (user.getEmail() == null) {\n map.put(\"error\", \"recover.error.noemail\");\n } else {\n String password = RandomStringUtils.randomAlphanumeric(8);\n if (emailPassword(password, user.getUsername(), user.getEmail())) {\n map.put(\"sentTo\", user.getEmail());\n user.setLdapAuthenticated(false);\n user.setPassword(password);\n securityService.updateUser(user);\n } else {\n map.put(\"error\", \"recover.error.sendfailed\");\n }\n }\n }\n\n if (settingsService.isCaptchaEnabled()) {\n map.put(\"recaptchaSiteKey\", settingsService.getRecaptchaSiteKey());\n }\n\n return new ModelAndView(\"recover\", \"model\", map);\n }", "label_name": "CWE-335", "label": 335}
{"code": "\tpublic static XStream createXStreamInstance() {\n\t\treturn new EnhancedXStream(false);\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " private void renderState(FacesContext context) throws IOException {\n // Get the view state and write it to the response..\n PartialViewContext pvc = context.getPartialViewContext();\n PartialResponseWriter writer = pvc.getPartialResponseWriter();\n String viewStateId = Util.getViewStateId(context);\n\n writer.startUpdate(viewStateId);\n String state = context.getApplication().getStateManager().getViewState(context);\n writer.write(state);\n writer.endUpdate();\n\n ClientWindow window = context.getExternalContext().getClientWindow();\n if (null != window) {\n String clientWindowId = Util.getClientWindowId(context);\n writer.startUpdate(clientWindowId);\n writer.write(window.getId());\n writer.endUpdate();\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": " public void tearDown() throws Exception {\n if(embeddedServer != null) embeddedServer.extinguish();\n }", "label_name": "CWE-22", "label": 22}
{"code": " void resetPasswordUnexistingUser() throws Exception\n {\n when(this.userReference.toString()).thenReturn(\"user:Foobar\");\n when(this.userManager.exists(this.userReference)).thenReturn(false);\n String exceptionMessage = \"User [user:Foobar] doesn't exist\";\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noUser\",\n \"user:Foobar\")).thenReturn(exceptionMessage);\n ResetPasswordException resetPasswordException = assertThrows(ResetPasswordException.class,\n () -> this.resetPasswordManager.resetPassword(this.userReference, \"some password\"));\n assertEquals(exceptionMessage, resetPasswordException.getMessage());\n }", "label_name": "CWE-640", "label": 640}
{"code": " setImmediate(() => {\n if (!this.pendingPublishRequestCount) {\n return;\n }\n const starving_subscription = this._find_starving_subscription();\n if (starving_subscription) {\n doDebug && debugLog(chalk.bgWhite.red(\"feeding most late subscription subscriptionId = \"), starving_subscription.id);\n starving_subscription.process_subscription();\n }\n });", "label_name": "CWE-770", "label": 770}
{"code": " private void sendAllJSON(HttpExchange pExchange, ParsedUri pParsedUri, JSONAware pJson) throws IOException {\n OutputStream out = null;\n try {\n Headers headers = pExchange.getResponseHeaders();\n if (pJson != null) {\n headers.set(\"Content-Type\", getMimeType(pParsedUri) + \"; charset=utf-8\");\n String json = pJson.toJSONString();\n String callback = pParsedUri.getParameter(ConfigKey.CALLBACK.getKeyValue());\n String content = callback == null ? json : callback + \"(\" + json + \");\";\n byte[] response = content.getBytes(\"UTF8\");\n pExchange.sendResponseHeaders(200,response.length);\n out = pExchange.getResponseBody();\n out.write(response);\n } else {\n headers.set(\"Content-Type\", \"text/plain\");\n pExchange.sendResponseHeaders(200,-1);\n }\n } finally {\n if (out != null) {\n // Always close in order to finish the request.\n // Otherwise the thread blocks.\n out.close();\n }\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": " public void create() throws Exception {\n final JettyServerFactory jettyServerFactory = mock(JettyServerFactory.class);\n final StaticFilesConfiguration staticFilesConfiguration = mock(StaticFilesConfiguration.class);\n final Routes routes = mock(Routes.class);\n\n when(jettyServerFactory.create(100,10,10000)).thenReturn(new Server());\n\n final EmbeddedJettyFactory embeddedJettyFactory = new EmbeddedJettyFactory(jettyServerFactory);\n embeddedServer = embeddedJettyFactory.create(routes, staticFilesConfiguration, false);\n\n embeddedServer.ignite(\"localhost\", 8080, null, 100,10,10000);\n\n verify(jettyServerFactory, times(1)).create(100,10,10000);\n verifyNoMoreInteractions(jettyServerFactory);\n }", "label_name": "CWE-22", "label": 22}
{"code": " private Document marshallToDocument(JAXBElement object, Class type) throws SAMLException {\n try {\n JAXBContext context = JAXBContext.newInstance(type);\n Marshaller marshaller = context.createMarshaller();\n DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();\n dbf.setNamespaceAware(true);\n DocumentBuilder db = dbf.newDocumentBuilder();\n Document document = db.newDocument();\n marshaller.marshal(object, document);\n return document;\n } catch (JAXBException | ParserConfigurationException e) {\n throw new SAMLException(\"Unable to marshallRequest JAXB SAML object to DOM.\", e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(iv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ iv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\ttry {\n\t\t\tint result = cipher.update(ciphertext, ciphertextOffset, dataLen, plaintext, plaintextOffset);\n\t\t\tcipher.doFinal(plaintext, plaintextOffset + result);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public SAXReader(XMLReader xmlReader, boolean validating) {\n this.xmlReader = xmlReader;\n this.validating = validating;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public CreateCommentResponse save(CreateCommentRequest createCommentRequest) {\n CreateCommentResponse createCommentResponse = new CreateCommentResponse();\n if (createCommentRequest.getLogId() != null && createCommentRequest.getComment() != null) {\n if (isAllowComment(Integer.valueOf(createCommentRequest.getLogId()))) {\n String comment = Jsoup.clean(createCommentRequest.getComment(), Whitelist.basic());\n if (comment.length() > 0 && !ParseUtil.isGarbageComment(comment)) {\n new Comment().set(\"userHome\", createCommentRequest.getUserHome())\n .set(\"userMail\", createCommentRequest.getComment())\n .set(\"userIp\", createCommentRequest.getIp())\n .set(\"userName\", createCommentRequest.getUserName())\n .set(\"logId\", createCommentRequest.getLogId())\n .set(\"userComment\", comment)\n .set(\"user_agent\", createCommentRequest.getUserAgent())\n .set(\"reply_id\", createCommentRequest.getReplyId())\n .set(\"commTime\", new Date()).set(\"hide\", 1).save();\n } else {\n createCommentResponse.setError(1);\n createCommentResponse.setMessage(\"\");\n }\n } else {\n createCommentResponse.setError(1);\n createCommentResponse.setMessage(\"\");\n }\n } else {\n createCommentResponse.setError(1);\n createCommentResponse.setMessage(\"\");\n }\n Log log = new Log().findByIdOrAlias(createCommentRequest.getLogId());\n if (log != null) {\n createCommentResponse.setAlias(log.getStr(\"alias\"));\n }\n return createCommentResponse;\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic UPathHand(UPath source, Random rnd) {\n\n\t\tfinal UPath result = new UPath();\n\n\t\tPoint2D last = new Point2D.Double();\n\n\t\tfor (USegment segment : source) {\n\t\t\tfinal USegmentType type = segment.getSegmentType();\n\t\t\tif (type == USegmentType.SEG_MOVETO) {\n\t\t\t\tfinal double x = segment.getCoord()[0];\n\t\t\t\tfinal double y = segment.getCoord()[1];\n\t\t\t\tresult.moveTo(x, y);\n\t\t\t\tlast = new Point2D.Double(x, y);\n\t\t\t} else if (type == USegmentType.SEG_CUBICTO) {\n\t\t\t\tfinal double x2 = segment.getCoord()[4];\n\t\t\t\tfinal double y2 = segment.getCoord()[5];\n\t\t\t\tfinal HandJiggle jiggle = HandJiggle.create(last, 2.0, rnd);\n\n\t\t\t\tfinal CubicCurve2D tmp = new CubicCurve2D.Double(last.getX(), last.getY(), segment.getCoord()[0],\n\t\t\t\t\t\tsegment.getCoord()[1], segment.getCoord()[2], segment.getCoord()[3], x2, y2);\n\t\t\t\tjiggle.curveTo(tmp);\n\t\t\t\tjiggle.appendTo(result);\n\t\t\t\tlast = new Point2D.Double(x2, y2);\n\t\t\t} else if (type == USegmentType.SEG_LINETO) {\n\t\t\t\tfinal double x = segment.getCoord()[0];\n\t\t\t\tfinal double y = segment.getCoord()[1];\n\t\t\t\tfinal HandJiggle jiggle = new HandJiggle(last.getX(), last.getY(), defaultVariation, rnd);\n\t\t\t\tjiggle.lineTo(x, y);\n\t\t\t\tfor (USegment seg2 : jiggle.toUPath()) {\n\t\t\t\t\tif (seg2.getSegmentType() == USegmentType.SEG_LINETO) {\n\t\t\t\t\t\tresult.lineTo(seg2.getCoord()[0], seg2.getCoord()[1]);\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tlast = new Point2D.Double(x, y);\n\t\t\t} else {\n\t\t\t\tthis.path = source;\n\t\t\t\treturn;\n\t\t\t}\n\t\t}\n\t\tthis.path = result;\n\t\tthis.path.setDeltaShadow(source.getDeltaShadow());\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public Operation.OperationResult executeFixedCostOperation(\n final MessageFrame frame, final EVM evm) {\n\n Bytes shiftAmount = frame.popStackItem();\n final Bytes value = leftPad(frame.popStackItem());\n final boolean negativeNumber = value.get(0) < 0;\n if (shiftAmount.size() > 4 && (shiftAmount = shiftAmount.trimLeadingZeros()).size() > 4) {\n frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO);\n } else {\n final int shiftAmountInt = shiftAmount.toInt();\n\n if (shiftAmountInt >= 256) {\n frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO);\n } else {\n // first perform standard shift right.\n Bytes result = value.shiftRight(shiftAmountInt);\n\n // if a negative number, carry through the sign.\n if (negativeNumber) {\n final Bytes32 significantBits = ALL_BITS.shiftLeft(256 - shiftAmountInt);\n result = result.or(significantBits);\n }\n frame.pushStackItem(result);\n }\n }\n return successResponse;\n }", "label_name": "CWE-681", "label": 681}
{"code": "\tpublic final HColor getBackColor(ISkinParam skinParam, Style style) {\n\t\tif (colors == null || colors.getColor(ColorType.BACK) == null) {\n\t\t\tif (UseStyle.useBetaStyle() == false)\n\t\t\t\treturn HColorUtils.COL_D7E0F2;\n\n\t\t\treturn style.value(PName.BackGroundColor).asColor(skinParam.getThemeStyle(), skinParam.getIHtmlColorSet());\n\t\t}\n\t\treturn colors.getColor(ColorType.BACK);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public void warning(SAXParseException e) {\n }", "label_name": "CWE-611", "label": 611}
{"code": " void ampersand() {\n final PathAndQuery res = PathAndQuery.parse(\"/&?a=1&a=2&b=3\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/&\");\n assertThat(res.query()).isEqualTo(\"a=1&a=2&b=3\");\n\n // '%26' in a query string should never be decoded into '&'.\n final PathAndQuery res2 = PathAndQuery.parse(\"/%26?a=1%26a=2&b=3\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/&\");\n assertThat(res2.query()).isEqualTo(\"a=1%26a=2&b=3\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " void checkVerificationCode() throws Exception\n {\n when(this.userManager.exists(this.userReference)).thenReturn(true);\n InternetAddress email = new InternetAddress(\"foobar@xwiki.org\");\n when(this.userProperties.getEmail()).thenReturn(email);\n String verificationCode = \"abcd1245\";\n BaseObject xObject = mock(BaseObject.class);\n when(this.userDocument\n .getXObject(DefaultResetPasswordManager.RESET_PASSWORD_REQUEST_CLASS_REFERENCE))\n .thenReturn(xObject);\n String encodedVerificationCode = \"encodedVerificationCode\";\n when(xObject.getStringValue(DefaultResetPasswordManager.VERIFICATION_PROPERTY))\n .thenReturn(encodedVerificationCode);\n BaseClass baseClass = mock(BaseClass.class);\n when(xObject.getXClass(context)).thenReturn(baseClass);\n PasswordClass passwordClass = mock(PasswordClass.class);\n when(baseClass.get(DefaultResetPasswordManager.VERIFICATION_PROPERTY)).thenReturn(passwordClass);\n when(passwordClass.getEquivalentPassword(encodedVerificationCode, verificationCode))\n .thenReturn(encodedVerificationCode);\n String newVerificationCode = \"foobartest\";\n when(xWiki.generateRandomString(30)).thenReturn(newVerificationCode);\n String saveComment = \"Save new verification code\";\n when(this.localizationManager\n .getTranslationPlain(\"xe.admin.passwordReset.step2.versionComment.changeValidationKey\"))\n .thenReturn(saveComment);\n DefaultResetPasswordRequestResponse expected =\n new DefaultResetPasswordRequestResponse(this.userReference, email,\n newVerificationCode);\n\n assertEquals(expected, this.resetPasswordManager.checkVerificationCode(this.userReference, verificationCode));\n verify(this.xWiki).saveDocument(this.userDocument, saveComment, true, context);\n }", "label_name": "CWE-640", "label": 640}
{"code": "\tstatic public UStroke getStrokeInternal(IGroup group, ISkinParam skinParam, Style style) {\n\t\tfinal Colors colors = group.getColors();\n\t\tif (colors.getSpecificLineStroke() != null)\n\t\t\treturn colors.getSpecificLineStroke();\n\n\t\tif (style != null)\n\t\t\treturn style.getStroke();\n\n\t\tif (group.getUSymbol() != null && group.getUSymbol() != USymbols.PACKAGE)\n\t\t\treturn group.getUSymbol().getSkinParameter().getStroke(skinParam, group.getStereotype());\n\n\t\treturn GeneralImageBuilder.getForcedStroke(group.getStereotype(), skinParam);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public static void main(String[] args) throws LifecycleException {\n String webappDirLocation;\n if (Constants.IN_JAR) {\n webappDirLocation = \"webapp\";\n } else {\n webappDirLocation = \"src/main/webapp/\";\n }\n\n Tomcat tomcat = new Tomcat();\n\n String webPort = System.getenv(\"PORT\");\n if (webPort == null || webPort.isEmpty()) {\n webPort = \"8080\";\n }\n\n tomcat.setPort(Integer.valueOf(webPort));\n tomcat.getConnector();\n\n // Declare an alternative location for your \"WEB-INF/classes\" dir\n // Servlet 3.0 annotation will work\n File additionWebInfClasses;\n if (Constants.IN_JAR) {\n additionWebInfClasses = new File(\"\");\n } else {\n additionWebInfClasses = new File(\"target/classes\");\n }\n\n tomcat.setBaseDir(additionWebInfClasses.toString());\n //idea\u7684\u8def\u5f84eclipse\u542f\u52a8\u7684\u8def\u5f84\u6709\u533a\u522b\n if (!Constants.IN_JAR && !new File(\"\").getAbsolutePath().endsWith(File.separator + \"web\")) {\n webappDirLocation = \"web/\" + webappDirLocation;\n }\n tomcat.addWebapp(\"\", new File(webappDirLocation).getAbsolutePath());\n tomcat.start();\n tomcat.getServer().await();\n }", "label_name": "CWE-79", "label": 79}
{"code": " public AjaxResult updateAvatar(@RequestParam(\"avatarfile\") MultipartFile file)\r\n {\r\n SysUser currentUser = getSysUser();\r\n try\r\n {\r\n if (!file.isEmpty())\r\n {\r\n String avatar = FileUploadUtils.upload(RuoYiConfig.getAvatarPath(), file);\r\n currentUser.setAvatar(avatar);\r\n if (userService.updateUserInfo(currentUser) > 0)\r\n {\r\n setSysUser(userService.selectUserById(currentUser.getUserId()));\r\n return success();\r\n }\r\n }\r\n return error();\r\n }\r\n catch (Exception e)\r\n {\r\n log.error(\"\u4fee\u6539\u5934\u50cf\u5931\u8d25\uff01\", e);\r\n return error(e.getMessage());\r\n }\r\n }\r", "label_name": "CWE-79", "label": 79}
{"code": " public DefaultFileSystemResourceLoader(String path) {\n this.baseDirPath = Optional.of(Paths.get(normalize(path)));\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic FileSelection(UserRequest ureq, String currentContainerRelPath) {\n\t\tif (currentContainerRelPath.equals(\"/\")) currentContainerRelPath = \"\";\n\t\tthis.currentContainerRelPath = currentContainerRelPath;\n\t\tparse(ureq);\n\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tprivate String getTitleQTI12(QuestionItemImpl item) {\n\t\ttry {\n\t\t\tVFSLeaf leaf = qpoolService.getRootLeaf(item);\n\t\t\tItem xmlItem = QTIEditHelper.readItemXml(leaf);\n\t\t\treturn xmlItem.getTitle();\n\t\t} catch (NullPointerException e) {\n\t\t\tlog.warn(\"Cannot read files from dir: \" + item.getDirectory());\n\t\t}\n\t\treturn null;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public RoutingResultBuilder rawParam(String name, String value) {\n pathParams().put(requireNonNull(name, \"name\"),\n ArmeriaHttpUtil.decodePath(requireNonNull(value, \"value\")));\n return this;\n }", "label_name": "CWE-22", "label": 22}
{"code": " void hexadecimal() {\n assertThat(PathAndQuery.parse(\"/%\")).isNull();\n assertThat(PathAndQuery.parse(\"/%0\")).isNull();\n assertThat(PathAndQuery.parse(\"/%0X\")).isNull();\n assertThat(PathAndQuery.parse(\"/%X0\")).isNull();\n }", "label_name": "CWE-22", "label": 22}
{"code": " private int _readAndWriteBytes(OutputStream out, int total) throws IOException\n {\n int left = total;\n while (left > 0) {\n int avail = _inputEnd - _inputPtr;\n if (_inputPtr >= _inputEnd) {\n loadMoreGuaranteed();\n avail = _inputEnd - _inputPtr;\n }\n int count = Math.min(avail, left);\n out.write(_inputBuffer, _inputPtr, count);\n _inputPtr += count;\n left -= count;\n }\n _tokenIncomplete = false;\n return total;\n }", "label_name": "CWE-770", "label": 770}
{"code": " private void ensureInitialized() throws SQLException {\n if (!initialized) {\n throw new PSQLException(\n GT.tr(\n \"This SQLXML object has not been initialized, so you cannot retrieve data from it.\"),\n PSQLState.OBJECT_NOT_IN_STATE);\n }\n\n // Is anyone loading data into us at the moment?\n if (!active) {\n return;\n }\n\n if (byteArrayOutputStream != null) {\n try {\n data = conn.getEncoding().decode(byteArrayOutputStream.toByteArray());\n } catch (IOException ioe) {\n throw new PSQLException(GT.tr(\"Failed to convert binary xml data to encoding: {0}.\",\n conn.getEncoding().name()), PSQLState.DATA_ERROR, ioe);\n } finally {\n byteArrayOutputStream = null;\n active = false;\n }\n } else if (stringWriter != null) {\n // This is also handling the work for Stream, SAX, and StAX Results\n // as they will use the same underlying stringwriter variable.\n //\n data = stringWriter.toString();\n stringWriter = null;\n active = false;\n } else if (domResult != null) {\n // Copy the content from the result to a source\n // and use the identify transform to get it into a\n // friendlier result format.\n try {\n TransformerFactory factory = TransformerFactory.newInstance();\n Transformer transformer = factory.newTransformer();\n DOMSource domSource = new DOMSource(domResult.getNode());\n StringWriter stringWriter = new StringWriter();\n StreamResult streamResult = new StreamResult(stringWriter);\n transformer.transform(domSource, streamResult);\n data = stringWriter.toString();\n } catch (TransformerException te) {\n throw new PSQLException(GT.tr(\"Unable to convert DOMResult SQLXML data to a string.\"),\n PSQLState.DATA_ERROR, te);\n } finally {\n domResult = null;\n active = false;\n }\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic void archive(OLATResourceable ores, File exportDirectory) {\n\t\tObjectOutputStream out = null;\n\t\ttry {\n\t\t\tFile file = new File(exportDirectory, \"chat.xml\");\n\t\t\tWriter writer = new FileWriter(file);\n\t\t\tout = logXStream.createObjectOutputStream(writer);\n\t\t\t\n\t\t\tint counter = 0;\n\t\t\tList messages;\n\t\t\tdo {\n\t\t\t\tmessages = imDao.getMessages(ores, null, counter, BATCH_SIZE);\n\t\t\t\tfor(InstantMessage message:messages) {\n\t\t\t\t\tout.writeObject(message);\n\t\t\t\t}\n\t\t\t\tcounter += messages.size();\n\t\t\t} while(messages.size() == BATCH_SIZE);\n\t\t} catch (IOException e) {\n\t\t\tlog.error(\"\", e);\n\t\t} finally {\n\t\t\tIOUtils.closeQuietly(out);\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " protected final void _decodeNonStringName(int ch) throws IOException\n {\n final int type = ((ch >> 5) & 0x7);\n String name;\n if (type == CBORConstants.MAJOR_TYPE_INT_POS) {\n name = _numberToName(ch, false);\n } else if (type == CBORConstants.MAJOR_TYPE_INT_NEG) {\n name = _numberToName(ch, true);\n } else if (type == CBORConstants.MAJOR_TYPE_BYTES) {\n /* 08-Sep-2014, tatu: As per [Issue#5], there are codecs\n * (f.ex. Perl module \"CBOR::XS\") that use Binary data...\n */\n final int blen = _decodeExplicitLength(ch & 0x1F);\n byte[] b = _finishBytes(blen);\n // TODO: Optimize, if this becomes commonly used & bottleneck; we have\n // more optimized UTF-8 codecs available.\n name = new String(b, UTF8);\n } else {\n if ((ch & 0xFF) == CBORConstants.INT_BREAK) {\n _reportUnexpectedBreak();\n }\n throw _constructError(\"Unsupported major type (\"+type+\") for CBOR Objects, not (yet?) supported, only Strings\");\n }\n _parsingContext.setCurrentName(name);\n }", "label_name": "CWE-770", "label": 770}
{"code": "\tpublic void svgImage(UImageSvg image, double x, double y) {\n\t\t// https://developer.mozilla.org/fr/docs/Web/SVG/Element/image\n\t\tif (hidden == false) {\n\t\t\tfinal Element elt = (Element) document.createElement(\"image\");\n\t\t\telt.setAttribute(\"width\", format(image.getWidth()));\n\t\t\telt.setAttribute(\"height\", format(image.getHeight()));\n\t\t\telt.setAttribute(\"x\", format(x));\n\t\t\telt.setAttribute(\"y\", format(y));\n\n\t\t\tString svg = manageScale(image);\n\n\t\t\tfinal String svgHeader = \"\";\n\n\t\t\tsvg = svgHeader + svg.substring(5);\n\n\t\t\tfinal String s = toBase64(svg);\n\t\t\telt.setAttribute(\"xlink:href\", \"data:image/svg+xml;base64,\" + s);\n\n\t\t\tgetG().appendChild(elt);\n\t\t}\n\t\tensureVisible(x, y);\n\t\tensureVisible(x + image.getData(\"width\"), y + image.getData(\"height\"));\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private NameID parseNameId(NameIDType element) {\n NameID nameId = new NameID();\n nameId.format = NameIDFormat.fromSAMLFormat(element.getFormat());\n nameId.id = element.getValue();\n return nameId;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public static String serializeToString(final Object payload) throws IOException {\n final ByteArrayOutputStream bos = new ByteArrayOutputStream();\n serializeToStream(bos, payload);\n String agentData = null;\n try {\n agentData = bos.toString(\"8859_1\");\n } catch (UnsupportedEncodingException e) {\n logger.warn(\"Should always support 8859_1\", e);\n agentData = bos.toString();\n }\n return agentData;\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tprivate static void addMagic(SName sname) {\n\t\tfinal String cleanName = sname.name().replace(\"_\", \"\");\n\t\taddConvert(cleanName + \"BackgroundColor\", PName.BackGroundColor, sname);\n\t\taddConvert(cleanName + \"BorderColor\", PName.LineColor, sname);\n\t\taddConvert(cleanName + \"BorderThickness\", PName.LineThickness, sname);\n\t\taddConvert(cleanName + \"RoundCorner\", PName.RoundCorner, sname);\n\t\taddConvert(cleanName + \"DiagonalCorner\", PName.DiagonalCorner, sname);\n\t\taddConvert(cleanName + \"BorderStyle\", PName.LineStyle, sname);\n\t\taddConvert(cleanName + \"StereotypeFontColor\", PName.FontColor, SName.stereotype, sname);\n\t\taddConFont(cleanName, sname);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public Document read(InputStream in) throws DocumentException {\n InputSource source = new InputSource(in);\n if (this.encoding != null) {\n source.setEncoding(this.encoding);\n }\n\n return read(source);\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void testGetChunk() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n byte[] bytes = new byte[4096];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n test.setContent(tmpFile);\n ByteBuf buf1 = test.getChunk(1024);\n assertEquals(buf1.readerIndex(), 0);\n assertEquals(buf1.writerIndex(), 1024);\n ByteBuf buf2 = test.getChunk(1024);\n assertEquals(buf2.readerIndex(), 0);\n assertEquals(buf2.writerIndex(), 1024);\n assertFalse(\"Arrays should not be equal\",\n Arrays.equals(ByteBufUtil.getBytes(buf1), ByteBufUtil.getBytes(buf2)));\n } finally {\n test.delete();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " private static void handleResponse(HttpURLConnection conn, int statusCode, String terminalWidth) {\n try {\n // 200 - modules found\n // Other - Error occurred, json returned with the error message\n MapValue payload;\n if (statusCode == HttpURLConnection.HTTP_OK) {\n try (BufferedReader reader = new BufferedReader(\n new InputStreamReader(conn.getInputStream(), Charset.defaultCharset()))) {\n StringBuilder result = new StringBuilder();\n String line;\n while ((line = reader.readLine()) != null) {\n result.append(line);\n }\n payload = (MapValue) JSONParser.parse(result.toString());\n } catch (IOException e) {\n throw ErrorUtil.createCommandException(e.getMessage());\n }\n\n if (payload.getIntValue(\"count\") > 0) {\n ArrayValue modules = payload.getArrayValue(\"modules\");\n printModules(modules, terminalWidth);\n } else {\n outStream.println(\"no modules found\");\n }\n } else {\n StringBuilder result = new StringBuilder();\n try (BufferedReader reader = new BufferedReader(\n new InputStreamReader(conn.getErrorStream(), Charset.defaultCharset()))) {\n String line;\n while ((line = reader.readLine()) != null) {\n result.append(line);\n }\n } catch (IOException e) {\n throw ErrorUtil.createCommandException(e.getMessage());\n }\n\n payload = (MapValue) JSONParser.parse(result.toString());\n throw ErrorUtil.createCommandException(payload.getStringValue(\"message\"));\n }\n } finally {\n conn.disconnect();\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tpoly.update(ciphertext, ciphertextOffset, dataLen);\n\t\tfinish(ad, dataLen);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (polyKey[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencrypt(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": "\tpublic void reportJobCaches(byte[] cacheInstanceBytes) {\n\t\t@SuppressWarnings(\"unchecked\")\n\t\tCollection cacheInstances = (Collection) SerializationUtils\n\t\t\t\t.deserialize(cacheInstanceBytes);\n\t\tjobManager.reportJobCaches(getJobToken(), cacheInstances);\n\t}", "label_name": "CWE-502", "label": 502}
{"code": " public ErrorHandler getErrorHandler() {\n return errorHandler;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void setCharacterStream() throws Exception {\n String exmplar = \"value \";\n SQLXML pgSQLXML = con.createSQLXML();\n Writer writer = pgSQLXML.setCharacterStream();\n writer.write(exmplar);\n PreparedStatement preparedStatement = con.prepareStatement(\"insert into xmltab values (?)\");\n preparedStatement.setSQLXML(1,pgSQLXML);\n preparedStatement.execute();\n\n Statement statement = con.createStatement();\n ResultSet rs = statement.executeQuery(\"select * from xmltab\");\n assertTrue(rs.next());\n SQLXML result = rs.getSQLXML(1);\n assertNotNull(result);\n assertEquals(exmplar, result.getString());\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic PersistentTask createTask(String name, Serializable task,\n\t\t\tIdentity creator, OLATResource resource, String resSubPath, Date scheduledDate) {\n\t\tPersistentTask ptask = new PersistentTask();\n\t\tDate currentDate = new Date();\n\t\tptask.setCreationDate(currentDate);\n\t\tptask.setLastModified(currentDate);\n\t\tptask.setScheduledDate(scheduledDate);\n\t\tptask.setName(name);\n\t\tptask.setCreator(creator);\n\t\tptask.setResource(resource);\n\t\tptask.setResSubPath(resSubPath);\n\t\tptask.setStatus(TaskStatus.newTask);\n\t\tptask.setTask(xstream.toXML(task));\n\t\tdbInstance.getCurrentEntityManager().persist(ptask);\n\t\treturn ptask;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public void setDefaultHandler(ElementHandler handler) {\n getDispatchHandler().setDefaultHandler(handler);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic static byte[] decryptAuthenticated(final SecretKey secretKey,\n\t\t final byte[] iv,\n\t\t final byte[] cipherText,\n\t\t final byte[] aad,\n\t\t final byte[] authTag,\n\t\t final Provider ceProvider,\n\t\t\t\t\t\t final Provider macProvider)\n\t\tthrows JOSEException {\n\n\n\t\t// Extract MAC + AES/CBC keys from input secret key\n\t\tCompositeKey compositeKey = new CompositeKey(secretKey);\n\n\t\t// AAD length to 8 byte array\n\t\tbyte[] al = AAD.computeLength(aad);\n\n\t\t// Check MAC\n\t\tint hmacInputLength = aad.length + iv.length + cipherText.length + al.length;\n\t\tbyte[] hmacInput = ByteBuffer.allocate(hmacInputLength).\n\t\t\tput(aad).\n\t\t\tput(iv).\n\t\t\tput(cipherText).\n\t\t\tput(al).\n\t\t\tarray();\n\t\tbyte[] hmac = HMAC.compute(compositeKey.getMACKey(), hmacInput, macProvider);\n\n\t\tbyte[] expectedAuthTag = Arrays.copyOf(hmac, compositeKey.getTruncatedMACByteLength());\n\n\t\tboolean macCheckPassed = true;\n\n\t\tif (! ConstantTimeUtils.areEqual(expectedAuthTag, authTag)) {\n\t\t\t// Thwart timing attacks by delaying exception until after decryption\n\t\t\tmacCheckPassed = false;\n\t\t}\n\n\t\tbyte[] plainText = decrypt(compositeKey.getAESKey(), iv, cipherText, ceProvider);\n\n\t\tif (! macCheckPassed) {\n\n\t\t\tthrow new JOSEException(\"MAC check failed\");\n\t\t}\n\n\t\treturn plainText;\n\t}", "label_name": "CWE-354", "label": 354}
{"code": "\tpublic void renderHead(IHeaderResponse response) {\n\t\tsuper.renderHead(response);\n\t\tresponse.render(JavaScriptHeaderItem.forReference(new MarkdownResourceReference()));\n\t\t\n\t\tString encodedAttachmentSupport;\n\t\tif (getAttachmentSupport() != null) {\n\t\t\tencodedAttachmentSupport = Base64.encodeBase64String(SerializationUtils.serialize(getAttachmentSupport()));\n\t\t\tencodedAttachmentSupport = StringUtils.deleteWhitespace(encodedAttachmentSupport);\n\t\t\tencodedAttachmentSupport = StringEscapeUtils.escapeEcmaScript(encodedAttachmentSupport);\n\t\t\tencodedAttachmentSupport = \"'\" + encodedAttachmentSupport + \"'\";\n\t\t} else {\n\t\t\tencodedAttachmentSupport = \"undefined\";\n\t\t}\n\t\t\n\t\tString callback = ajaxBehavior.getCallbackFunction(explicit(\"action\"), explicit(\"param1\"), explicit(\"param2\"), \n\t\t\t\texplicit(\"param3\")).toString();\n\t\t\n\t\tString autosaveKey = getAutosaveKey();\n\t\tif (autosaveKey != null)\n\t\t\tautosaveKey = \"'\" + JavaScriptEscape.escapeJavaScript(autosaveKey) + \"'\";\n\t\telse\n\t\t\tautosaveKey = \"undefined\";\n\t\t\n\t\tString script = String.format(\"onedev.server.markdown.onDomReady('%s', %s, %d, %s, %d, %b, %b, '%s', %s);\", \n\t\t\t\tcontainer.getMarkupId(), \n\t\t\t\tcallback, \n\t\t\t\tATWHO_LIMIT, \n\t\t\t\tencodedAttachmentSupport, \n\t\t\t\tgetAttachmentSupport()!=null?getAttachmentSupport().getAttachmentMaxSize():0,\n\t\t\t\tgetUserMentionSupport() != null,\n\t\t\t\tgetReferenceSupport() != null, \n\t\t\t\tJavaScriptEscape.escapeJavaScript(ProjectNameValidator.PATTERN.pattern()),\n\t\t\t\tautosaveKey);\n\t\tresponse.render(OnDomReadyHeaderItem.forScript(script));\n\t\t\n\t\tscript = String.format(\"onedev.server.markdown.onLoad('%s');\", container.getMarkupId());\n\t\tresponse.render(OnLoadHeaderItem.forScript(script));\n\t}", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic PlayerBinary(String code, ISkinParam skinParam, TimingRuler ruler, boolean compact) {\n\t\tsuper(code, skinParam, ruler, compact);\n\t\tthis.style = getStyleSignature().getMergedStyle(skinParam.getCurrentStyleBuilder());\n\t\tthis.suggestedHeight = 30;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic Controller execute(FolderComponent fc, UserRequest ureq, WindowControl wContr, Translator trans) {\n\t\tthis.translator = trans;\n\t\tthis.folderComponent = fc;\n\t\tthis.fileSelection = new FileSelection(ureq, fc.getCurrentContainerPath());\n\n\t\tVFSContainer currentContainer = folderComponent.getCurrentContainer();\n\t\tList lockedFiles = hasLockedFiles(currentContainer, fileSelection);\n\t\tif (lockedFiles.isEmpty()) {\n\t\t\tString msg = trans.translate(\"del.confirm\") + \"\" + fileSelection.renderAsHtml() + \"
\";\t\t\n\t\t\t// create dialog controller\n\t\t\tdialogCtr = activateYesNoDialog(ureq, trans.translate(\"del.header\"), msg, dialogCtr);\n\t\t} else {\n\t\t\tString msg = FolderCommandHelper.renderLockedMessageAsHtml(trans, lockedFiles);\n\t\t\tList buttonLabels = Collections.singletonList(trans.translate(\"ok\"));\n\t\t\tlockedFiledCtr = activateGenericDialog(ureq, trans.translate(\"lock.title\"), msg, buttonLabels, lockedFiledCtr);\n\t\t}\n\t\treturn this;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " protected void setDispatchHandler(DispatchHandler dispatchHandler) {\n this.dispatchHandler = dispatchHandler;\n }", "label_name": "CWE-611", "label": 611}
{"code": " private Certificate toCertificate(KeyDescriptorType keyDescriptorType) {\n try {\n List keyData = keyDescriptorType.getKeyInfo().getContent();\n for (Object keyDatum : keyData) {\n if (keyDatum instanceof JAXBElement>) {\n JAXBElement> element = (JAXBElement>) keyDatum;\n if (element.getDeclaredType() == X509DataType.class) {\n X509DataType cert = (X509DataType) element.getValue();\n List certData = cert.getX509IssuerSerialOrX509SKIOrX509SubjectName();\n for (Object certDatum : certData) {\n element = (JAXBElement>) certDatum;\n if (element.getName().getLocalPart().equals(\"X509Certificate\")) {\n byte[] certBytes = (byte[]) element.getValue();\n CertificateFactory cf = CertificateFactory.getInstance(\"X.509\");\n return cf.generateCertificate(new ByteArrayInputStream(certBytes));\n }\n }\n }\n }\n }\n\n return null;\n } catch (CertificateException e) {\n throw new IllegalArgumentException(e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public static DomainSocketAddress newSocketAddress() {\n try {\n File file;\n do {\n file = File.createTempFile(\"NETTY\", \"UDS\");\n if (!file.delete()) {\n throw new IOException(\"failed to delete: \" + file);\n }\n } while (file.getAbsolutePath().length() > 128);\n return new DomainSocketAddress(file);\n } catch (IOException e) {\n throw new IllegalStateException(e);\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": " public ResponseEntity fetch(@PathVariable String key) {\n LitemallStorage litemallStorage = litemallStorageService.findByKey(key);\n if (key == null) {\n ResponseEntity.notFound();\n }\n String type = litemallStorage.getType();\n MediaType mediaType = MediaType.parseMediaType(type);\n\n Resource file = storageService.loadAsResource(key);\n if (file == null) {\n ResponseEntity.notFound();\n }\n return ResponseEntity.ok().contentType(mediaType).body(file);\n }", "label_name": "CWE-22", "label": 22}
{"code": " void getGadgets() throws Exception\n {\n assertEquals(new ArrayList<>(), this.defaultGadgetSource.getGadgets(testSource, macroTransformationContext));\n\n BaseObject gadgetObject1 = mock(BaseObject.class);\n when(xWikiDocument.getXObjects(gadgetClassReference)).thenReturn(Collections.singletonList(gadgetObject1));\n when(gadgetObject1.getOwnerDocument()).thenReturn(ownerDocument);\n when(gadgetObject1.getStringValue(\"title\")).thenReturn(\"Gadget 1\");\n when(gadgetObject1.getLargeStringValue(\"content\")).thenReturn(\"Some content\");\n when(gadgetObject1.getStringValue(\"position\")).thenReturn(\"0\");\n when(gadgetObject1.getNumber()).thenReturn(42);\n\n List gadgets = this.defaultGadgetSource.getGadgets(testSource, macroTransformationContext);\n assertEquals(1, gadgets.size());\n Gadget gadget = gadgets.get(0);\n assertEquals(\"Gadget 1\", gadget.getTitle().get(0).toString());\n assertEquals(\"Some content\", gadget.getContent().get(0).toString());\n assertEquals(\"42\", gadget.getId());\n }", "label_name": "CWE-94", "label": 94}
{"code": " private void testBSI()\n throws Exception\n {\n KeyPairGenerator kpGen = KeyPairGenerator.getInstance(\"ECDSA\", \"BC\");\n\n kpGen.initialize(new ECGenParameterSpec(TeleTrusTObjectIdentifiers.brainpoolP512r1.getId()));\n\n KeyPair kp = kpGen.generateKeyPair();\n\n byte[] data = \"Hello World!!!\".getBytes();\n String[] cvcAlgs = { \"SHA1WITHCVC-ECDSA\", \"SHA224WITHCVC-ECDSA\",\n \"SHA256WITHCVC-ECDSA\", \"SHA384WITHCVC-ECDSA\",\n \"SHA512WITHCVC-ECDSA\" };\n String[] cvcOids = { EACObjectIdentifiers.id_TA_ECDSA_SHA_1.getId(), EACObjectIdentifiers.id_TA_ECDSA_SHA_224.getId(),\n EACObjectIdentifiers.id_TA_ECDSA_SHA_256.getId(), EACObjectIdentifiers.id_TA_ECDSA_SHA_384.getId(),\n EACObjectIdentifiers.id_TA_ECDSA_SHA_512.getId() };\n\n testBsiAlgorithms(kp, data, cvcAlgs, cvcOids);\n\n String[] plainAlgs = { \"SHA1WITHPLAIN-ECDSA\", \"SHA224WITHPLAIN-ECDSA\",\n \"SHA256WITHPLAIN-ECDSA\", \"SHA384WITHPLAIN-ECDSA\",\n \"SHA512WITHPLAIN-ECDSA\", \"RIPEMD160WITHPLAIN-ECDSA\" };\n String[] plainOids = { BSIObjectIdentifiers.ecdsa_plain_SHA1.getId(), BSIObjectIdentifiers.ecdsa_plain_SHA224.getId(),\n BSIObjectIdentifiers.ecdsa_plain_SHA256.getId(), BSIObjectIdentifiers.ecdsa_plain_SHA384.getId(),\n BSIObjectIdentifiers.ecdsa_plain_SHA512.getId(), BSIObjectIdentifiers.ecdsa_plain_RIPEMD160.getId() };\n\n testBsiAlgorithms(kp, data, plainAlgs, plainOids);\n }", "label_name": "CWE-347", "label": 347}
{"code": " private static void handleErrorResponse(HttpURLConnection conn, String url, String moduleFullName) {\n try (BufferedReader reader = new BufferedReader(\n new InputStreamReader(conn.getErrorStream(), Charset.defaultCharset()))) {\n StringBuilder result = new StringBuilder();\n String line;\n while ((line = reader.readLine()) != null) {\n result.append(line);\n }\n\n MapValue payload = (MapValue) JSONParser.parse(result.toString());\n createError(\"error: \" + payload.getStringValue(\"message\"));\n } catch (IOException e) {\n createError(\"failed to pull the module '\" + moduleFullName + \"' from the remote repository '\" + url + \"'\");\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": " public T setResult(Class resultClass) throws SQLException {\n try {\n if (isDebugEnabled()) {\n debugCode(\n \"getSource(\" + (resultClass != null ? resultClass.getSimpleName() + \".class\" : \"null\") + ')');\n }\n checkEditable();\n if (resultClass == null || resultClass == DOMResult.class) {\n domResult = new DOMResult();\n state = State.SET_CALLED;\n return (T) domResult;\n } else if (resultClass == SAXResult.class) {\n SAXTransformerFactory transformerFactory = (SAXTransformerFactory) TransformerFactory.newInstance();\n TransformerHandler transformerHandler = transformerFactory.newTransformerHandler();\n Writer writer = setCharacterStreamImpl();\n transformerHandler.setResult(new StreamResult(writer));\n SAXResult saxResult = new SAXResult(transformerHandler);\n closable = writer;\n state = State.SET_CALLED;\n return (T) saxResult;\n } else if (resultClass == StAXResult.class) {\n XMLOutputFactory xof = XMLOutputFactory.newInstance();\n Writer writer = setCharacterStreamImpl();\n StAXResult staxResult = new StAXResult(xof.createXMLStreamWriter(writer));\n closable = writer;\n state = State.SET_CALLED;\n return (T) staxResult;\n } else if (StreamResult.class.equals(resultClass)) {\n Writer writer = setCharacterStreamImpl();\n StreamResult streamResult = new StreamResult(writer);\n closable = writer;\n state = State.SET_CALLED;\n return (T) streamResult;\n }\n throw unsupported(resultClass.getName());\n } catch (Exception e) {\n throw logAndConvert(e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " protected final void loadMoreGuaranteed() throws IOException {\n if (!loadMore()) { _reportInvalidEOF(); }\n }", "label_name": "CWE-770", "label": 770}
{"code": " public String toString() {\n return toNiceString(this.getClass(), \"clientId\", clientId, \"secret\", \"[protected]\",\n \"discoveryURI\", discoveryURI, \"scope\", scope, \"customParams\", customParams,\n \"clientAuthenticationMethod\", clientAuthenticationMethod, \"useNonce\", useNonce,\n \"preferredJwsAlgorithm\", preferredJwsAlgorithm, \"maxAge\", maxAge, \"maxClockSkew\", maxClockSkew,\n \"connectTimeout\", connectTimeout, \"readTimeout\", readTimeout, \"resourceRetriever\", resourceRetriever,\n \"responseType\", responseType, \"responseMode\", responseMode, \"logoutUrl\", logoutUrl,\n \"withState\", withState, \"stateGenerator\", stateGenerator, \"logoutHandler\", logoutHandler,\n \"tokenValidator\", tokenValidator, \"mappedClaims\", mappedClaims);\n }", "label_name": "CWE-347", "label": 347}
{"code": " public Stream getResources(String path) {\n Enumeration all;\n try {\n all = classLoader.getResources(prefixPath(path));\n } catch (IOException e) {\n return Stream.empty();\n }\n Stream.Builder builder = Stream.builder();\n while (all.hasMoreElements()) {\n URL url = all.nextElement();\n builder.accept(url);\n }\n return builder.build();\n }", "label_name": "CWE-22", "label": 22}
{"code": "\t public void doFilter(ServletRequest srequest, ServletResponse response, FilterChain filterChain) throws IOException, ServletException {\n\n/*\t \t\tHttpServletRequest request = (HttpServletRequest) srequest;\n\t \t\t//final String realIp = request.getHeader(X_FORWARDED_FOR);\n\n\t \t\t//if (realIp != null) {\n\t \t\t\tfilterChain.doFilter(new XssHttpServletRequestWrapper(request) {\n\t \t\t\t\t*//**\n\t \t\t\t\tpublic String getRemoteAddr() {\n\t \t\t\t\t\treturn realIp;\n\t \t\t\t\t}\n\n\t \t\t\t\tpublic String getRemoteHost() {\n\t \t\t\t\t\treturn realIp;\n\t \t\t\t\t}\n\t \t\t\t\t**//*\n\t \t\t\t}, response);\n\n\t \t\t\treturn;\n\t \t\t//}\n\n*/\n\n\t }", "label_name": "CWE-79", "label": 79}
{"code": " public void spliceToFile() throws Throwable {\n EventLoopGroup group = new EpollEventLoopGroup(1);\n File file = File.createTempFile(\"netty-splice\", null);\n file.deleteOnExit();\n\n SpliceHandler sh = new SpliceHandler(file);\n ServerBootstrap bs = new ServerBootstrap();\n bs.channel(EpollServerSocketChannel.class);\n bs.group(group).childHandler(sh);\n bs.childOption(EpollChannelOption.EPOLL_MODE, EpollMode.LEVEL_TRIGGERED);\n Channel sc = bs.bind(NetUtil.LOCALHOST, 0).syncUninterruptibly().channel();\n\n Bootstrap cb = new Bootstrap();\n cb.group(group);\n cb.channel(EpollSocketChannel.class);\n cb.handler(new ChannelInboundHandlerAdapter());\n Channel cc = cb.connect(sc.localAddress()).syncUninterruptibly().channel();\n\n for (int i = 0; i < data.length;) {\n int length = Math.min(random.nextInt(1024 * 64), data.length - i);\n ByteBuf buf = Unpooled.wrappedBuffer(data, i, length);\n cc.writeAndFlush(buf);\n i += length;\n }\n\n while (sh.future2 == null || !sh.future2.isDone() || !sh.future.isDone()) {\n if (sh.exception.get() != null) {\n break;\n }\n try {\n Thread.sleep(50);\n } catch (InterruptedException e) {\n // Ignore.\n }\n }\n\n sc.close().sync();\n cc.close().sync();\n\n if (sh.exception.get() != null && !(sh.exception.get() instanceof IOException)) {\n throw sh.exception.get();\n }\n\n byte[] written = new byte[data.length];\n FileInputStream in = new FileInputStream(file);\n\n try {\n Assert.assertEquals(written.length, in.read(written));\n Assert.assertArrayEquals(data, written);\n } finally {\n in.close();\n group.shutdownGracefully();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " public void doIconSize( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {\n String qs = req.getQueryString();\n if(qs==null || !ICON_SIZE.matcher(qs).matches())\n throw new ServletException();\n Cookie cookie = new Cookie(\"iconSize\", qs);\n cookie.setMaxAge(/* ~4 mo. */9999999); // #762\n rsp.addCookie(cookie);\n String ref = req.getHeader(\"Referer\");\n if(ref==null) ref=\".\";\n rsp.sendRedirect2(ref);\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic static SecretKey deriveSharedKey(final JWEHeader header,\n\t\t\t\t\t\tfinal SecretKey Z,\n\t\t\t\t\t\tfinal ConcatKDF concatKDF)\n\t\tthrows JOSEException {\n\n\t\tfinal int sharedKeyLength = sharedKeyLength(header.getAlgorithm(), header.getEncryptionMethod());\n\n\t\t// Set the alg ID for the concat KDF\n\t\tAlgorithmMode algMode = resolveAlgorithmMode(header.getAlgorithm());\n\n\t\tfinal String algID;\n\n\t\tif (algMode == AlgorithmMode.DIRECT) {\n\t\t\t// algID = enc\n\t\t\talgID = header.getEncryptionMethod().getName();\n\t\t} else if (algMode == AlgorithmMode.KW) {\n\t\t\t// algID = alg\n\t\t\talgID = header.getAlgorithm().getName();\n\t\t} else {\n\t\t\tthrow new JOSEException(\"Unsupported JWE ECDH algorithm mode: \" + algMode);\n\t\t}\n\n\t\treturn concatKDF.deriveKey(\n\t\t\tZ,\n\t\t\tsharedKeyLength,\n\t\t\tConcatKDF.encodeDataWithLength(algID.getBytes(Charset.forName(\"ASCII\"))),\n\t\t\tConcatKDF.encodeDataWithLength(header.getAgreementPartyUInfo()),\n\t\t\tConcatKDF.encodeDataWithLength(header.getAgreementPartyVInfo()),\n\t\t\tConcatKDF.encodeIntData(sharedKeyLength),\n\t\t\tConcatKDF.encodeNoData());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " public void testGetShellCommandLineBash_WithWorkingDirectory()\n throws Exception\n {\n Commandline cmd = new Commandline( new BourneShell() );\n cmd.setExecutable( \"/bin/echo\" );\n cmd.addArguments( new String[] {\n \"hello world\"\n } );\n File root = File.listRoots()[0];\n File workingDirectory = new File( root, \"path with spaces\" );\n cmd.setWorkingDirectory( workingDirectory );\n\n String[] shellCommandline = cmd.getShellCommandline();\n\n assertEquals( \"Command line size\", 3, shellCommandline.length );\n\n assertEquals( \"/bin/sh\", shellCommandline[0] );\n assertEquals( \"-c\", shellCommandline[1] );\n String expectedShellCmd = \"cd \\\"\" + root.getAbsolutePath()\n + \"path with spaces\\\" && /bin/echo \\'hello world\\'\";\n if ( Os.isFamily( Os.FAMILY_WINDOWS ) )\n {\n expectedShellCmd = \"cd \\\"\" + root.getAbsolutePath()\n + \"path with spaces\\\" && \\\\bin\\\\echo \\'hello world\\'\";\n }\n assertEquals( expectedShellCmd, shellCommandline[2] );\n }", "label_name": "CWE-78", "label": 78}
{"code": " private T unmarshallFromDocument(Document document, Class type) throws SAMLException {\n try {\n JAXBContext context = JAXBContext.newInstance(type);\n Unmarshaller unmarshaller = context.createUnmarshaller();\n JAXBElement element = unmarshaller.unmarshal(document, type);\n return element.getValue();\n } catch (JAXBException e) {\n throw new SAMLException(\"Unable to unmarshall SAML response\", e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " private String deflateAndEncode(byte[] result) {\n Deflater deflater = new Deflater(Deflater.DEFLATED, true);\n deflater.setInput(result);\n deflater.finish();\n byte[] deflatedResult = new byte[result.length];\n int length = deflater.deflate(deflatedResult);\n deflater.end();\n byte[] src = Arrays.copyOf(deflatedResult, length);\n return Base64.getEncoder().encodeToString(src);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic static UChange changeBack(UGraphic ug) {\n\t\tfinal HColor color = ug.getParam().getColor();\n\t\tif (color == null) {\n\t\t\treturn new HColorNone().bg();\n\t\t}\n\t\treturn color.bg();\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public boolean equals(Object obj) {\n if (obj == this) {\n return true;\n }\n if (obj instanceof ClassPathResource) {\n ClassPathResource otherRes = (ClassPathResource) obj;\n\n ClassLoader thisLoader = this.classLoader;\n ClassLoader otherLoader = otherRes.classLoader;\n\n return (this.path.equals(otherRes.path) &&\n thisLoader.equals(otherLoader) &&\n this.clazz.equals(otherRes.clazz));\n }\n return false;\n }", "label_name": "CWE-22", "label": 22}
{"code": " private String buildRedirectAuthnRequest(AuthnRequestType authnRequest, String relayState, boolean sign,\n PrivateKey key, Algorithm algorithm) throws SAMLException {\n try {\n byte[] xml = marshallToBytes(PROTOCOL_OBJECT_FACTORY.createAuthnRequest(authnRequest), AuthnRequestType.class);\n String encodedResult = deflateAndEncode(xml);\n String parameters = \"SAMLRequest=\" + URLEncoder.encode(encodedResult, \"UTF-8\");\n if (relayState != null) {\n parameters += \"&RelayState=\" + URLEncoder.encode(relayState, \"UTF-8\");\n }\n\n if (sign && key != null && algorithm != null) {\n Signature signature;\n parameters += \"&SigAlg=\" + URLEncoder.encode(algorithm.uri, \"UTF-8\");\n signature = Signature.getInstance(algorithm.name);\n signature.initSign(key);\n signature.update(parameters.getBytes(StandardCharsets.UTF_8));\n\n String signatureParameter = Base64.getEncoder().encodeToString(signature.sign());\n parameters += \"&Signature=\" + URLEncoder.encode(signatureParameter, \"UTF-8\");\n }\n\n return parameters;\n } catch (Exception e) {\n // Not possible but freak out\n throw new SAMLException(e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " private void visitorPermission(Invocation ai) {\n ai.invoke();\n String templateName = ai.getReturnValue();\n if (templateName == null) {\n return;\n }\n GlobalResourceHandler.printUserTime(\"Template before\");\n String templatePath = TemplateHelper.fullTemplateInfo(ai.getController(), true);\n GlobalResourceHandler.printUserTime(\"Template after\");\n TemplateVO templateVO = new TemplateService().getTemplateVO(JFinal.me().getContextPath(), new File(PathKit.getWebRootPath() + templatePath));\n String ext = ZrLogUtil.getViewExt(templateVO.getViewType());\n if (ai.getController().getAttr(\"log\") != null) {\n ai.getController().setAttr(\"pageLevel\", 1);\n } else if (ai.getController().getAttr(\"data\") != null) {\n if (\"/\".equals(ai.getActionKey()) && new File(PathKit.getWebRootPath() + templatePath + \"/\" + templateName + ext).exists()) {\n ai.getController().setAttr(\"pageLevel\", 2);\n } else {\n templateName = \"page\";\n ai.getController().setAttr(\"pageLevel\", 1);\n }\n } else {\n ai.getController().setAttr(\"pageLevel\", 2);\n }\n fullDevData(ai.getController());\n ai.getController().render(templatePath + \"/\" + templateName + ext);\n }", "label_name": "CWE-79", "label": 79}
{"code": " new X509TrustManager() {\n public java.security.cert.X509Certificate[] getAcceptedIssuers() {\n return new java.security.cert.X509Certificate[]{};\n }\n public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {\n //No need to implement.\n }\n public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {\n //No need to implement.\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": " public T getSource(Class sourceClass) throws SQLException {\n try {\n if (isDebugEnabled()) {\n debugCode(\n \"getSource(\" + (sourceClass != null ? sourceClass.getSimpleName() + \".class\" : \"null\") + ')');\n }\n checkReadable();\n if (sourceClass == null || sourceClass == DOMSource.class) {\n DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();\n return (T) new DOMSource(dbf.newDocumentBuilder().parse(new InputSource(value.getInputStream())));\n } else if (sourceClass == SAXSource.class) {\n return (T) new SAXSource(new InputSource(value.getInputStream()));\n } else if (sourceClass == StAXSource.class) {\n XMLInputFactory xif = XMLInputFactory.newInstance();\n return (T) new StAXSource(xif.createXMLStreamReader(value.getInputStream()));\n } else if (sourceClass == StreamSource.class) {\n return (T) new StreamSource(value.getInputStream());\n }\n throw unsupported(sourceClass.getName());\n } catch (Exception e) {\n throw logAndConvert(e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprotected void initUpgradesHistories() {\n\t\tFile upgradesDir = new File(WebappHelper.getUserDataRoot(), SYSTEM_DIR);\n\t\tFile upgradesHistoriesFile = new File(upgradesDir, INSTALLED_UPGRADES_XML);\n\t\tif (upgradesHistoriesFile.exists()) {\n\t\t\tupgradesHistories = (Map)upgradesXStream.fromXML(upgradesHistoriesFile);\n\t\t} else {\n\t\t\tif (upgradesHistories == null) {\n\t\t\t\tupgradesHistories = new HashMap<>();\n\t\t\t}\n\t\t\tneedsUpgrade = false; //looks like a new install, no upgrade necessary\n\t\t\tlog.info(\"This looks like a new install or dropped data, will not do any upgrades.\");\n\t\t\tcreateUpgradeData();\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public InternetAddress getUserEmail()\n {\n return userEmail;\n }", "label_name": "CWE-640", "label": 640}
{"code": " private String getMimeType(HttpServletRequest pReq) {\n String requestMimeType = pReq.getParameter(ConfigKey.MIME_TYPE.getKeyValue());\n if (requestMimeType != null) {\n return requestMimeType;\n }\n return configMimeType;\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic HomePageConfig loadConfigFor(Identity identity) {\n\t\tString userName = identity.getName();\n\t\tHomePageConfig retVal = null;\n\t\tFile configFile = getConfigFile(userName);\n\t\tif (!configFile.exists()) {\n\t\t\t// config file does not exist! create one, init the defaults, save it.\n\t\t\tretVal = loadAndSaveDefaults(identity);\n\t\t} else {\n\t\t\t// file exists, load it with XStream, resolve version\n\t\t\ttry {\n\t\t\t\tObject tmp = homeConfigXStream.fromXML(configFile);\n\t\t\t\tif (tmp instanceof HomePageConfig) {\n\t\t\t\t\tretVal = (HomePageConfig)tmp;\n\t\t\t\t\tif(retVal.resolveVersionIssues()) {\n\t\t\t\t\t\tsaveConfigTo(identity, retVal);\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} catch (Exception e) {\n\t\t\t\tlog.error(\"Error while loading homepage config from path::\" + configFile.getAbsolutePath() + \", fallback to default configuration\",\n\t\t\t\t\t\te);\n\t\t\t\tFileUtils.deleteFile(configFile);\n\t\t\t\tretVal = loadAndSaveDefaults(identity);\n\t\t\t\t// show message to user\n\t\t\t}\n\t\t}\n\t\treturn retVal;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " private static TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() {\n public java.security.cert.X509Certificate[] getAcceptedIssuers() {\n return new java.security.cert.X509Certificate[] {};\n }\n\n public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {\n //No need to implement.\n }\n\n public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {\n //No need to implement.\n }\n } };", "label_name": "CWE-306", "label": 306}
{"code": " public static int getStatusCode(HttpURLConnection conn) {\n try {\n return conn.getResponseCode();\n } catch (IOException e) {\n throw ErrorUtil\n .createCommandException(\"connection to the remote repository host failed: \" + e.getMessage());\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": " public ResponseEntity download(@PathVariable String key) {\n LitemallStorage litemallStorage = litemallStorageService.findByKey(key);\n if (key == null) {\n ResponseEntity.notFound();\n }\n String type = litemallStorage.getType();\n MediaType mediaType = MediaType.parseMediaType(type);\n\n Resource file = storageService.loadAsResource(key);\n if (file == null) {\n ResponseEntity.notFound();\n }\n return ResponseEntity.ok().contentType(mediaType).header(HttpHeaders.CONTENT_DISPOSITION,\n \"attachment; filename=\\\"\" + file.getFilename() + \"\\\"\").body(file);\n }", "label_name": "CWE-22", "label": 22}
{"code": " void routingResult() throws URISyntaxException {\n final RoutingResultBuilder builder = RoutingResult.builder();\n final RoutingResult routingResult = builder.path(\"/foo\")\n .query(\"bar=baz\")\n .rawParam(\"qux\", \"quux\")\n .negotiatedResponseMediaType(MediaType.JSON_UTF_8)\n .build();\n assertThat(routingResult.isPresent()).isTrue();\n assertThat(routingResult.path()).isEqualTo(\"/foo\");\n assertThat(routingResult.query()).isEqualTo(\"bar=baz\");\n assertThat(routingResult.pathParams()).containsOnly(new SimpleEntry<>(\"qux\", \"quux\"));\n assertThat(routingResult.negotiatedResponseMediaType()).isSameAs(MediaType.JSON_UTF_8);\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic CommandExecutionResult createRobustConcise(String code, String full, TimingStyle type, boolean compact) {\n\t\tfinal Player player = new PlayerRobustConcise(type, full, getSkinParam(), ruler, compactByDefault || compact);\n\t\tplayers.put(code, player);\n\t\tlastPlayer = player;\n\t\treturn CommandExecutionResult.ok();\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public BCXMSSMTPrivateKey(PrivateKeyInfo keyInfo)\n throws IOException\n {\n XMSSMTKeyParams keyParams = XMSSMTKeyParams.getInstance(keyInfo.getPrivateKeyAlgorithm().getParameters());\n this.treeDigest = keyParams.getTreeDigest().getAlgorithm();\n\n XMSSPrivateKey xmssMtPrivateKey = XMSSPrivateKey.getInstance(keyInfo.parsePrivateKey());\n\n try\n {\n XMSSMTPrivateKeyParameters.Builder keyBuilder = new XMSSMTPrivateKeyParameters\n .Builder(new XMSSMTParameters(keyParams.getHeight(), keyParams.getLayers(), DigestUtil.getDigest(treeDigest)))\n .withIndex(xmssMtPrivateKey.getIndex())\n .withSecretKeySeed(xmssMtPrivateKey.getSecretKeySeed())\n .withSecretKeyPRF(xmssMtPrivateKey.getSecretKeyPRF())\n .withPublicSeed(xmssMtPrivateKey.getPublicSeed())\n .withRoot(xmssMtPrivateKey.getRoot());\n\n if (xmssMtPrivateKey.getBdsState() != null)\n {\n keyBuilder.withBDSState((BDSStateMap)XMSSUtil.deserialize(xmssMtPrivateKey.getBdsState()));\n }\n\n this.keyParams = keyBuilder.build();\n }\n catch (ClassNotFoundException e)\n {\n throw new IOException(\"ClassNotFoundException processing BDS state: \" + e.getMessage());\n }\n }", "label_name": "CWE-470", "label": 470}
{"code": " public AuthenticationInfo loadAuthenticationInfo(JSONWebToken token) {\n Key key = getJWTKey();\n Jwt jwt;\n try {\n jwt = Jwts.parser().setSigningKey(key).parse(token.getPrincipal());\n } catch (JwtException e) {\n throw new AuthenticationException(e);\n }\n String credentials = legacyHashing ? token.getCredentials() : encryptPassword(token.getCredentials());\n Object principal = extractPrincipalFromWebToken(jwt);\n return new SimpleAuthenticationInfo(principal, credentials, getName());\n }", "label_name": "CWE-347", "label": 347}
{"code": "\tpublic static final void toStream(Binder binder, ZipOutputStream zout)\n\tthrows IOException {\n\t\ttry(OutputStream out=new ShieldOutputStream(zout)) {\n\t\t\tmyStream.toXML(binder, out);\n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"Cannot export this map: \" + binder, e);\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public String getStringParameterSQL(String param) {\n return \"'\" + param + \"'\";\n }", "label_name": "CWE-89", "label": 89}
{"code": "\tpublic Object getResourceDataForKey(String key) {\r\n\t\tObject data = null;\r\n\t\tString dataString = null;\r\n\t\tMatcher matcher = DATA_SEPARATOR_PATTERN.matcher(key);\r\n\t\tif (matcher.find()) {\r\n\t\t\tif (log.isDebugEnabled()) {\r\n\t\t\t\tlog.debug(Messages.getMessage(\r\n\t\t\t\t\t\tMessages.RESTORE_DATA_FROM_RESOURCE_URI_INFO, key,\r\n\t\t\t\t\t\tdataString));\r\n\t\t\t}\r\n\t\t\tint dataStart = matcher.end();\r\n\t\t\tdataString = key.substring(dataStart);\r\n\t\t\tbyte[] objectArray = null;\r\n\t\t\tbyte[] dataArray;\r\n\t\t\ttry {\r\n\t\t\t\tdataArray = dataString.getBytes(\"ISO-8859-1\");\r\n\t\t\t\tobjectArray = decrypt(dataArray);\r\n\t\t\t} catch (UnsupportedEncodingException e1) {\r\n\t\t\t\t// default encoding always presented.\r\n\t\t\t}\r\n\t\t\tif (\"B\".equals(matcher.group(1))) {\r\n\t\t\t\tdata = objectArray;\r\n\t\t\t} else {\r\n\t\t\t\ttry {\r\n\t\t\t\t\tObjectInputStream in = new ObjectInputStream(\r\n\t\t\t\t\t\t\tnew ByteArrayInputStream(objectArray));\r\n\t\t\t\t\tdata = in.readObject();\r\n\t\t\t\t} catch (StreamCorruptedException e) {\r\n\t\t\t\t\tlog.error(Messages\r\n\t\t\t\t\t\t\t.getMessage(Messages.STREAM_CORRUPTED_ERROR), e);\r\n\t\t\t\t} catch (IOException e) {\r\n\t\t\t\t\tlog.error(Messages\r\n\t\t\t\t\t\t\t.getMessage(Messages.DESERIALIZE_DATA_INPUT_ERROR),\r\n\t\t\t\t\t\t\te);\r\n\t\t\t\t} catch (ClassNotFoundException e) {\r\n\t\t\t\t\tlog\r\n\t\t\t\t\t\t\t.error(\r\n\t\t\t\t\t\t\t\t\tMessages\r\n\t\t\t\t\t\t\t\t\t\t\t.getMessage(Messages.DATA_CLASS_NOT_FOUND_ERROR),\r\n\t\t\t\t\t\t\t\t\te);\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\treturn data;\r\n\t}\r", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic static boolean isAbsolute(String url)\n\t{\n\t\tif (url.startsWith(\"//\")) // //www.domain.com/start\n\t\t{\n\t\t\treturn true;\n\t\t}\n\t\n\t\tif (url.startsWith(\"/\")) // /somePage.html\n\t\t{\n\t\t\treturn false;\n\t\t}\n\t\n\t\tboolean result = false;\n\t\n\t\ttry \n\t\t{\n\t\t\tURI uri = new URI(url);\n\t\t\tresult = uri.isAbsolute();\n\t\t}\n\t\tcatch (URISyntaxException e) {} //Ignore\n\t\n\t\treturn result;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic ChangeState(TimeTick when, String comment, Colors colors, String... states) {\n\t\tif (states.length == 0) {\n\t\t\tthrow new IllegalArgumentException();\n\t\t}\n\t\tthis.when = when;\n\t\tthis.states = states;\n\t\tthis.comment = comment;\n\t\tthis.colors = colors;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic SymbolContext getContext(ISkinParam skinParam, Style style) {\n\t\treturn new SymbolContext(getBackColor(skinParam, style), getLineColor(skinParam, style))\n\t\t\t\t.withStroke(new UStroke(1.5));\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wControl, Translator trans) {\n\t\tsetTranslator(trans);\n\t\tcurrentContainer = folderComponent.getCurrentContainer();\n\t\tif (currentContainer.canWrite() != VFSConstants.YES) {\n\t\t\tthrow new AssertException(\"Cannot write to current folder.\");\n\t\t}\n\t\t\n\t\tstatus = FolderCommandHelper.sanityCheck(wControl, folderComponent);\n\t\tif(status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\t\n\t\tselection = new FileSelection(ureq, folderComponent.getCurrentContainerPath());\n\t\tstatus = FolderCommandHelper.sanityCheck3(wControl, folderComponent, selection);\n\t\tif(status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\t\t\n\t\tif(selection.getFiles().isEmpty()) {\n\t\t\tstatus = FolderCommandStatus.STATUS_FAILED;\n\t\t\twControl.setWarning(trans.translate(\"warning.file.selection.empty\"));\n\t\t\treturn null;\n\t\t}\n\t\t\n\t\tinitForm(ureq);\n\t\treturn this;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic PlayerRobustConcise(TimingStyle type, String full, ISkinParam skinParam, TimingRuler ruler,\n\t\t\tboolean compact) {\n\t\tsuper(full, skinParam, ruler, compact);\n\t\tthis.type = type;\n\t\tthis.suggestedHeight = 0;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private byte[] marshallToBytes(JAXBElement object, Class type) throws SAMLException {\n try {\n JAXBContext context = JAXBContext.newInstance(type);\n Marshaller marshaller = context.createMarshaller();\n ByteArrayOutputStream baos = new ByteArrayOutputStream();\n marshaller.marshal(object, baos);\n return baos.toByteArray();\n } catch (JAXBException e) {\n throw new SAMLException(\"Unable to marshallRequest JAXB SAML object to bytes.\", e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public static String getRealIp(HttpServletRequest request) {\n //bae env\n if (ZrLogUtil.isBae() && request.getHeader(\"clientip\") != null) {\n return request.getHeader(\"clientip\");\n }\n String ip = request.getHeader(\"X-forwarded-for\");\n if (ip == null || ip.length() == 0 || \"unknown\".equalsIgnoreCase(ip)) {\n ip = request.getHeader(\"X-Real-IP\");\n }\n if (ip == null || ip.length() == 0 || \"unknown\".equalsIgnoreCase(ip)) {\n ip = request.getHeader(\"Proxy-Client-IP\");\n }\n if (ip == null || ip.length() == 0 || \"unknown\".equalsIgnoreCase(ip)) {\n ip = request.getHeader(\"WL-Proxy-Client-IP\");\n }\n if (ip == null || ip.length() == 0 || \"unknown\".equalsIgnoreCase(ip)) {\n ip = request.getRemoteAddr();\n }\n return ip;\n }", "label_name": "CWE-79", "label": 79}
{"code": " public String[] getCommandline()\n {\n final String[] args = getArguments();\n String executable = getExecutable();\n\n if ( executable == null )\n {\n return args;\n }\n final String[] result = new String[args.length + 1];\n result[0] = executable;\n System.arraycopy( args, 0, result, 1, args.length );\n return result;\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void testFileRegionCountLargerThenFile(ServerBootstrap sb, Bootstrap cb) throws Throwable {\n File file = File.createTempFile(\"netty-\", \".tmp\");\n file.deleteOnExit();\n\n final FileOutputStream out = new FileOutputStream(file);\n out.write(data);\n out.close();\n\n sb.childHandler(new SimpleChannelInboundHandler() {\n @Override\n protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) {\n // Just drop the message.\n }\n });\n cb.handler(new ChannelInboundHandlerAdapter());\n\n Channel sc = sb.bind().sync().channel();\n Channel cc = cb.connect(sc.localAddress()).sync().channel();\n\n // Request file region which is bigger then the underlying file.\n FileRegion region = new DefaultFileRegion(\n new RandomAccessFile(file, \"r\").getChannel(), 0, data.length + 1024);\n\n assertThat(cc.writeAndFlush(region).await().cause(), CoreMatchers.instanceOf(IOException.class));\n cc.close().sync();\n sc.close().sync();\n }", "label_name": "CWE-379", "label": 379}
{"code": " public void setValidation(boolean validation) {\n this.validating = validation;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic Media createMedia(String title, String description, Object mediaObject, String businessPath, Identity author) {\n\t\tMedia media = null;\n\t\tif (mediaObject instanceof EfficiencyStatement) {\n\t\t\tEfficiencyStatement statement = (EfficiencyStatement) mediaObject;\n\t\t\tString xml = myXStream.toXML(statement); \n\t\t\tmedia = mediaDao.createMedia(title, description, xml, EFF_MEDIA, businessPath, null, 90, author);\n\t\t\tThreadLocalUserActivityLogger.log(PortfolioLoggingAction.PORTFOLIO_MEDIA_ADDED, getClass(),\n\t\t\t\t\tLoggingResourceable.wrap(media));\n\t\t}\n\t\treturn media;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(enciv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ enciv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencryptCTR(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " void testDecodePath() throws Exception {\n // Fast path\n final String pathThatDoesNotNeedDecode = \"/foo_bar_baz\";\n assertThat(decodePath(pathThatDoesNotNeedDecode)).isSameAs(pathThatDoesNotNeedDecode);\n\n // Slow path\n assertThat(decodePath(\"/foo%20bar\\u007fbaz\")).isEqualTo(\"/foo bar\\u007fbaz\");\n assertThat(decodePath(\"/%C2%A2\")).isEqualTo(\"/\u00a2\"); // Valid UTF-8 sequence\n assertThat(decodePath(\"/%20\\u0080\")).isEqualTo(\"/ \ufffd\"); // Unallowed character\n assertThat(decodePath(\"/%\")).isEqualTo(\"/\ufffd\"); // No digit\n assertThat(decodePath(\"/%1\")).isEqualTo(\"/\ufffd\"); // Only a single digit\n assertThat(decodePath(\"/%G0\")).isEqualTo(\"/\ufffd\"); // First digit is not hex.\n assertThat(decodePath(\"/%0G\")).isEqualTo(\"/\ufffd\"); // Second digit is not hex.\n assertThat(decodePath(\"/%C3%28\")).isEqualTo(\"/\ufffd(\"); // Invalid UTF-8 sequence\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tprotected StyleSignatureBasic getStyleSignature() {\n\t\treturn StyleSignatureBasic.of(SName.root, SName.element, SName.timingDiagram, SName.binary);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic void export(Media media, ManifestBuilder manifest, File mediaArchiveDirectory, Locale locale) {\n\t\tEfficiencyStatement statement = null;\n\t\tif(StringHelper.containsNonWhitespace(media.getContent())) {\n\t\t\ttry {\n\t\t\t\tstatement = (EfficiencyStatement)myXStream.fromXML(media.getContent());\n\t\t\t} catch (Exception e) {\n\t\t\t\tlog.error(\"Cannot load efficiency statement from artefact\", e);\n\t\t\t}\n\t\t}\n\t\tif(statement != null) {\n\t\t\tList> assessmentNodes = statement.getAssessmentNodes();\n\t\t\tList assessmentNodeList = AssessmentHelper.assessmentNodeDataMapToList(assessmentNodes);\n\t\t\tSyntheticUserRequest ureq = new SyntheticUserRequest(media.getAuthor(), locale);\n\t\t\tIdentityAssessmentOverviewController details = new IdentityAssessmentOverviewController(ureq, new WindowControlMocker(), assessmentNodeList);\n\t\t\tsuper.exportContent(media, details.getInitialComponent(), null, mediaArchiveDirectory, locale);\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public static void execute(String url, String proxyHost, int proxyPort, String proxyUsername, String proxyPassword,\n String accessToken, String orgName, String moduleName, String version, Path baloPath) {\n initializeSsl();\n HttpURLConnection conn = createHttpUrlConnection(convertToUrl(url), proxyHost, proxyPort, proxyUsername,\n proxyPassword);\n conn.setInstanceFollowRedirects(false);\n setRequestMethod(conn, Utils.RequestMethod.POST);\n\n // Set headers\n conn.setRequestProperty(HttpHeaders.AUTHORIZATION, \"Bearer \" + accessToken);\n conn.setRequestProperty(PUSH_ORGANIZATION, orgName);\n conn.setRequestProperty(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_OCTET_STREAM);\n\n conn.setDoOutput(true);\n conn.setChunkedStreamingMode(BUFFER_SIZE);\n\n try (DataOutputStream outputStream = new DataOutputStream(conn.getOutputStream())) {\n // Send balo content by 1 kb chunks\n byte[] buffer = new byte[BUFFER_SIZE];\n int count;\n try (ProgressBar progressBar = new ProgressBar(\n orgName + \"/\" + moduleName + \":\" + version + \" [project repo -> central]\",\n getTotalFileSizeInKB(baloPath), 1000, outStream, ProgressBarStyle.ASCII, \" KB\", 1);\n FileInputStream fis = new FileInputStream(baloPath.toFile())) {\n while ((count = fis.read(buffer)) > 0) {\n outputStream.write(buffer, 0, count);\n outputStream.flush();\n progressBar.stepBy((long) NO_OF_BYTES);\n }\n }\n } catch (IOException e) {\n throw ErrorUtil.createCommandException(\"error occurred while uploading balo to central: \" + e.getMessage());\n }\n\n handleResponse(conn, orgName, moduleName, version);\n Authenticator.setDefault(null);\n }", "label_name": "CWE-306", "label": 306}
{"code": " public void addHandler(String path, ElementHandler handler) {\n getDispatchHandler().addHandler(path, handler);\n }", "label_name": "CWE-611", "label": 611}
{"code": " DefaultResetPasswordRequestResponse(UserReference reference, InternetAddress userEmail, String verificationCode)\n {\n this.userReference = reference;\n this.userEmail = userEmail;\n this.verificationCode = verificationCode;\n }", "label_name": "CWE-640", "label": 640}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t\tint result = cipher.update(plaintext, plaintextOffset, length, ciphertext, ciphertextOffset);\n\t\t\tcipher.doFinal(ciphertext, ciphertextOffset + result);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": "\tpublic boolean archiveNodeData(Locale locale, ICourse course, ArchiveOptions options,\n\t\t\tZipOutputStream exportStream, String archivePath, String charset) {\n\t\tString filename = \"checklist_\"\n\t\t\t\t+ StringHelper.transformDisplayNameToFileSystemName(getShortName())\n\t\t\t\t+ \"_\" + Formatter.formatDatetimeFilesystemSave(new Date(System.currentTimeMillis()));\n\t\tfilename = ZipUtil.concat(archivePath, filename);\n\t\t\n\t\tChecklist checklist = loadOrCreateChecklist(course.getCourseEnvironment().getCoursePropertyManager());\n\t\tString exportContent = XStreamHelper.createXStreamInstance().toXML(checklist);\n\t\ttry {\n\t\t\texportStream.putNextEntry(new ZipEntry(filename));\n\t\t\tIOUtils.write(exportContent, exportStream, \"UTF-8\");\n\t\t\texportStream.closeEntry();\n\t\t} catch (IOException e) {\n\t\t\tlog.error(\"\", e);\n\t\t}\n\t\treturn true;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic boolean isMetadataFileValid(OLATResource videoResource) {\n\t\tVFSContainer baseContainer = FileResourceManager.getInstance().getFileResourceRootImpl(videoResource);\n\t\tVFSLeaf metaDataFile = (VFSLeaf) baseContainer.resolve(FILENAME_VIDEO_METADATA_XML);\n\t\ttry {\n\t\t\tVideoMetadata meta = (VideoMetadata) XStreamHelper.readObject(XStreamHelper.createXStreamInstance(), metaDataFile);\n\t\t\treturn meta != null;\n\t\t} catch (Exception e) {\n\t\t\treturn false;\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(enciv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ enciv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencryptCTR(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " public static String getAttachedFilePath(String inputStudyOid) {\n \t// Using a standard library to validate/Sanitize user inputs which will be used in path expression to prevent from path traversal\n \tString studyOid = FilenameUtils.getName(inputStudyOid);\n String attachedFilePath = CoreResources.getField(\"attached_file_location\");\n if (attachedFilePath == null || attachedFilePath.length() <= 0) {\n attachedFilePath = CoreResources.getField(\"filePath\") + \"attached_files\" + File.separator + studyOid + File.separator;\n } else {\n attachedFilePath += studyOid + File.separator;\n }\n return attachedFilePath;\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic Controller execute(FolderComponent fc, UserRequest ureq, WindowControl windowControl, Translator trans) {\n\t\tthis.folderComponent = fc;\n\t\tthis.translator = trans;\n\t\tthis.fileSelection = new FileSelection(ureq, fc.getCurrentContainerPath());\n\t\t\t\t\n\t\tVelocityContainer main = new VelocityContainer(\"mc\", VELOCITY_ROOT + \"/movecopy.html\", translator, this);\n\t\tmain.contextPut(\"fileselection\", fileSelection);\n\t\t\n\t\t//check if command is executed on a file list containing invalid filenames or paths\n\t\tif(!fileSelection.getInvalidFileNames().isEmpty()) {\t\t\n\t\t\tmain.contextPut(\"invalidFileNames\", fileSelection.getInvalidFileNames());\n\t\t}\t\t\n\n\t\tselTree = new MenuTree(null, \"seltree\", this);\n\t\tFolderTreeModel ftm = new FolderTreeModel(ureq.getLocale(), fc.getRootContainer(),\n\t\t\t\ttrue, false, true, fc.getRootContainer().canWrite() == VFSConstants.YES, new EditableFilter());\n\t\tselTree.setTreeModel(ftm);\n\t\tselectButton = LinkFactory.createButton(move ? \"move\" : \"copy\", main, this);\n\t\tcancelButton = LinkFactory.createButton(\"cancel\", main, this);\n\n\t\tmain.put(\"seltree\", selTree);\n\t\tif (move) {\n\t\t\tmain.contextPut(\"move\", Boolean.TRUE);\n\t\t}\n\n\t\tsetInitialComponent(main);\n\t\treturn this;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " private void handle(ServletRequestHandler pReqHandler,HttpServletRequest pReq, HttpServletResponse pResp) throws IOException {\n JSONAware json = null;\n try {\n // Check access policy\n requestHandler.checkAccess(allowDnsReverseLookup ? pReq.getRemoteHost() : null,\n pReq.getRemoteAddr(),\n getOriginOrReferer(pReq));\n\n // Remember the agent URL upon the first request. Needed for discovery\n updateAgentDetailsIfNeeded(pReq);\n\n // Dispatch for the proper HTTP request method\n json = handleSecurely(pReqHandler, pReq, pResp);\n } catch (Throwable exp) {\n json = requestHandler.handleThrowable(\n exp instanceof RuntimeMBeanException ? ((RuntimeMBeanException) exp).getTargetException() : exp);\n } finally {\n setCorsHeader(pReq, pResp);\n\n if (json == null) {\n json = requestHandler.handleThrowable(new Exception(\"Internal error while handling an exception\"));\n }\n\n sendResponse(pResp, pReq, json);\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic void testSelectByOperations() {\n\n\t\tJWKSelector selector = new JWKSelector(new JWKMatcher.Builder().keyOperations(KeyOperation.SIGN, KeyOperation.VERIFY).build());\n\n\t\tList keyList = new ArrayList<>();\n\t\tkeyList.add(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\")\n\t\t\t.keyOperations(new HashSet<>(Arrays.asList(KeyOperation.SIGN, KeyOperation.VERIFY))).build());\n\t\tkeyList.add(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build());\n\n\t\tJWKSet jwkSet = new JWKSet(keyList);\n\n\t\tList matches = selector.select(jwkSet);\n\n\t\tRSAKey key1 = (RSAKey)matches.get(0);\n\t\tassertEquals(KeyType.RSA, key1.getKeyType());\n\t\tassertEquals(\"1\", key1.getKeyID());\n\n\t\tassertEquals(1, matches.size());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " static void setProperty(SchemaFactory schemaFactory, String propertyName) throws SAXException {\n try {\n schemaFactory.setProperty(propertyName, \"\");\n } catch (SAXException e) {\n if (Boolean.getBoolean(SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES)) {\n LOGGER.warning(\"Enabling XXE protection failed. The property \" + propertyName\n + \" is not supported by the SchemaFactory. The \" + SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES\n + \" system property is used so the XML processing continues in the UNSECURE mode\"\n + \" with XXE protection disabled!!!\");\n } else {\n LOGGER.severe(\"Enabling XXE protection failed. The property \" + propertyName\n + \" is not supported by the SchemaFactory. This usually mean an outdated XML processor\"\n + \" is present on the classpath (e.g. Xerces, Xalan). If you are not able to resolve the issue by\"\n + \" fixing the classpath, the \" + SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES\n + \" system property can be used to disable XML External Entity protections.\"\n + \" We don't recommend disabling the XXE as such the XML processor configuration is unsecure!!!\", e);\n throw e;\n }\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public Document read(String systemId) throws DocumentException {\n InputSource source = new InputSource(systemId);\n if (this.encoding != null) {\n source.setEncoding(this.encoding);\n }\n\n return read(source);\n }", "label_name": "CWE-611", "label": 611}
{"code": " private void onopen() {\n logger.fine(\"open\");\n\n this.cleanup();\n\n this.readyState = ReadyState.OPEN;\n this.emit(EVENT_OPEN);\n\n final io.socket.engineio.client.Socket socket = this.engine;\n this.subs.add(On.on(socket, Engine.EVENT_DATA, new Listener() {\n @Override\n public void call(Object... objects) {\n Object data = objects[0];\n if (data instanceof String) {\n Manager.this.ondata((String)data);\n } else if (data instanceof byte[]) {\n Manager.this.ondata((byte[])data);\n }\n }\n }));\n this.subs.add(On.on(socket, Engine.EVENT_ERROR, new Listener() {\n @Override\n public void call(Object... objects) {\n Manager.this.onerror((Exception)objects[0]);\n }\n }));\n this.subs.add(On.on(socket, Engine.EVENT_CLOSE, new Listener() {\n @Override\n public void call(Object... objects) {\n Manager.this.onclose((String)objects[0]);\n }\n }));\n this.decoder.onDecoded(new Parser.Decoder.Callback() {\n @Override\n public void call (Packet packet) {\n Manager.this.ondecoded(packet);\n }\n });\n }", "label_name": "CWE-476", "label": 476}
{"code": " public static DomainSocketAddress newSocketAddress() {\n try {\n File file;\n do {\n file = File.createTempFile(\"NETTY\", \"UDS\");\n if (!file.delete()) {\n throw new IOException(\"failed to delete: \" + file);\n }\n } while (file.getAbsolutePath().length() > 128);\n return new DomainSocketAddress(file);\n } catch (IOException e) {\n throw new IllegalStateException(e);\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " private boolean processStyleTag(Element ele, Node parentNode) {\n /*\n * Invoke the css parser on this element.\n */\n CssScanner styleScanner = new CssScanner(policy, messages, policy.isEmbedStyleSheets());\n\n try {\n Node firstChild = ele.getFirstChild();\n if (firstChild != null) {\n\n String toScan = firstChild.getNodeValue();\n CleanResults cr = styleScanner.scanStyleSheet(toScan, policy.getMaxInputSize());\n errorMessages.addAll(cr.getErrorMessages());\n\n /*\n * If IE gets an empty style tag, i.e. it will\n * break all CSS on the page. I wish I was kidding. So,\n * if after validation no CSS properties are left, we\n * would normally be left with an empty style tag and\n * break all CSS. To prevent that, we have this check.\n */\n\n final String cleanHTML = cr.getCleanHTML();\n\n if (cleanHTML == null || cleanHTML.equals(\"\")) {\n firstChild.setNodeValue(\"/* */\");\n } else {\n firstChild.setNodeValue(cleanHTML);\n }\n }\n\n } catch (DOMException | ScanException | ParseException | NumberFormatException e) {\n\n /*\n * ParseException shouldn't be possible anymore, but we'll leave it\n * here because I (Arshan) am hilariously dumb sometimes.\n * Batik can throw NumberFormatExceptions (see bug #48).\n */\n\n addError(ErrorMessageUtil.ERROR_CSS_TAG_MALFORMED, new Object[]{HTMLEntityEncoder.htmlEntityEncode(ele.getFirstChild().getNodeValue())});\n parentNode.removeChild(ele);\n return true;\n }\n return false;\n }", "label_name": "CWE-79", "label": 79}
{"code": " protected Map getPrincipal(Jwt jwt) {\n Map principal = new HashMap<>();\n principal.put(\"jwt\", (Serializable) jwt.getBody());\n return principal;\n }", "label_name": "CWE-347", "label": 347}
{"code": " private ByteArrayOutputStream initRequestResponseMocks(String callback,Runnable requestSetup,Runnable responseSetup) throws IOException {\n request = createMock(HttpServletRequest.class);\n response = createMock(HttpServletResponse.class);\n setNoCacheHeaders(response);\n\n expect(request.getParameter(ConfigKey.CALLBACK.getKeyValue())).andReturn(callback);\n requestSetup.run();\n responseSetup.run();\n\n class MyServletOutputStream extends ServletOutputStream {\n ByteArrayOutputStream baos;\n public void write(int b) throws IOException {\n baos.write(b);\n }\n\n public void setBaos(ByteArrayOutputStream baos){\n this.baos = baos;\n }\n }\n ByteArrayOutputStream baos = new ByteArrayOutputStream();\n MyServletOutputStream sos = new MyServletOutputStream();\n sos.setBaos(baos);\n expect(response.getOutputStream()).andReturn(sos);\n\n return baos;\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tprivate String clean(String svg) {\n\t\tsvg = svg.toLowerCase().replaceAll(\"\\\\s\", \"\");\n\t\tif (svg.contains(\"\"))\n\t\t\treturn EMPTY_SVG;\n\t\tif (svg.contains(\"\"))\n\t\t\treturn EMPTY_SVG;\n\t\treturn svg;\n\t}", "label_name": "CWE-79", "label": 79}
{"code": " public URL createURL(String spaces, String name, String queryString, String anchor, String wikiId,\n XWikiContext context, FilesystemExportContext exportContext) throws Exception\n {\n // Check if the current user has the right to view the SX file. We do this since this is what would happen\n // in XE when a SX action is called (check done in XWikiAction).\n // Note that we cannot just open an HTTP connection to the SX action here since we wouldn't be authenticated...\n // Thus we have to simulate the same behavior as the SX action...\n\n List spaceNames = this.legacySpaceResolve.resolve(spaces);\n DocumentReference sxDocumentReference = new DocumentReference(wikiId, spaceNames, name);\n this.authorizationManager.checkAccess(Right.VIEW, sxDocumentReference);\n\n // Set the SX document as the current document in the XWiki Context since unfortunately the SxSource code\n // uses the current document in the context instead of accepting it as a parameter...\n XWikiDocument sxDocument = context.getWiki().getDocument(sxDocumentReference, context);\n\n Map backup = new HashMap<>();\n XWikiDocument.backupContext(backup, context);\n try {\n sxDocument.setAsContextDoc(context);\n return processSx(spaceNames, name, queryString, context, exportContext);\n } finally {\n XWikiDocument.restoreContext(backup, context);\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " private static File newFile() throws IOException {\n File file = File.createTempFile(\"netty-\", \".tmp\");\n file.deleteOnExit();\n\n final FileOutputStream out = new FileOutputStream(file);\n out.write(data);\n out.close();\n return file;\n }", "label_name": "CWE-379", "label": 379}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " private static void testInvalidHeaders0(String requestStr) {\n EmbeddedChannel channel = new EmbeddedChannel(new HttpRequestDecoder());\n assertTrue(channel.writeInbound(Unpooled.copiedBuffer(requestStr, CharsetUtil.US_ASCII)));\n HttpRequest request = channel.readInbound();\n assertTrue(request.decoderResult().isFailure());\n assertTrue(request.decoderResult().cause() instanceof IllegalArgumentException);\n assertFalse(channel.finish());\n }", "label_name": "CWE-444", "label": 444}
{"code": "\tpublic static Object readObject(XStream xStream, String xml) {\n\t\ttry(InputStream is = new ByteArrayInputStream(xml.getBytes(ENCODING))) {\n\t\t\treturn readObject(xStream, is);\n\t\t} catch (Exception e) {\n\t\t\tthrow new OLATRuntimeException(XStreamHelper.class,\n\t\t\t\t\t\"could not read Object from string: \" + xml, e);\n\t\t} \n\t}", "label_name": "CWE-91", "label": 91}
{"code": " protected XMLReader installXMLFilter(XMLReader reader) {\n XMLFilter filter = getXMLFilter();\n\n if (filter != null) {\n // find the root XMLFilter\n XMLFilter root = filter;\n\n while (true) {\n XMLReader parent = root.getParent();\n\n if (parent instanceof XMLFilter) {\n root = (XMLFilter) parent;\n } else {\n break;\n }\n }\n\n root.setParent(reader);\n\n return filter;\n }\n\n return reader;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public PropertiesRequest getRequestedFields( InputStream in ) {\r\n\t\tfinal Set set = new LinkedHashSet();\r\n try { \r\n ByteArrayOutputStream bout = new ByteArrayOutputStream();\r\n StreamUtils.readTo( in, bout, false, true );\r\n byte[] arr = bout.toByteArray();\r\n if( arr.length > 1 ) {\r\n ByteArrayInputStream bin = new ByteArrayInputStream( arr );\r\n XMLReader reader = XMLReaderFactory.createXMLReader();\r\n\t\t\t\treader.setFeature(\"http://xml.org/sax/features/external-parameter-entities\", false);\r\n PropFindSaxHandler handler = new PropFindSaxHandler();\r\n reader.setContentHandler( handler );\r\n try {\r\n reader.parse( new InputSource( bin ) );\r\n if( handler.isAllProp() ) {\r\n return new PropertiesRequest();\r\n } else {\r\n set.addAll( handler.getAttributes().keySet() );\r\n }\r\n } catch( IOException e ) {\r\n log.warn( \"exception parsing request body\", e );\r\n // ignore\r\n } catch( SAXException e ) {\r\n log.warn( \"exception parsing request body\", e );\r\n // ignore\r\n }\r\n } \r\n } catch( Exception ex ) {\r\n\t\t\t// There's a report of an exception being thrown here by IT Hit Webdav client\r\n\t\t\t// Perhaps we can just log the error and return an empty set. Usually this\r\n\t\t\t// class is wrapped by the MsPropFindRequestFieldParser which will use a default\r\n\t\t\t// set of properties if this returns an empty set\r\n\t\t\tlog.warn(\"Exception parsing PROPFIND request fields. Returning empty property set\", ex);\r\n //throw new RuntimeException( ex );\r\n }\r\n\t\treturn PropertiesRequest.toProperties(set);\r\n }\r", "label_name": "CWE-611", "label": 611}
{"code": " public void setEncoding(String encoding) {\n this.encoding = encoding;\n }", "label_name": "CWE-611", "label": 611}
{"code": " private boolean extract(ArrayList errors, URL source, File target) {\n FileOutputStream os = null;\n InputStream is = null;\n boolean extracting = false;\n try {\n if (!target.exists() || isStale(source, target) ) {\n is = source.openStream();\n if (is != null) {\n byte[] buffer = new byte[4096];\n os = new FileOutputStream(target);\n extracting = true;\n int read;\n while ((read = is.read(buffer)) != -1) {\n os.write(buffer, 0, read);\n }\n os.close();\n is.close();\n chmod(\"755\", target);\n }\n }\n } catch (Throwable e) {\n try {\n if (os != null)\n os.close();\n } catch (IOException e1) {\n }\n try {\n if (is != null)\n is.close();\n } catch (IOException e1) {\n }\n if (extracting && target.exists())\n target.delete();\n errors.add(e.getMessage());\n return false;\n }\n return true;\n }", "label_name": "CWE-94", "label": 94}
{"code": " private Optional> readPropertiesFromLoader(String fileName, String filePath, PropertySourceLoader propertySourceLoader) throws ConfigurationException {\n ResourceResolver resourceResolver = new ResourceResolver();\n Optional resourceLoader = resourceResolver.getSupportingLoader(filePath);\n ResourceLoader loader = resourceLoader.orElse(FileSystemResourceLoader.defaultLoader());\n try {\n Optional inputStream = loader.getResourceAsStream(filePath);\n if (inputStream.isPresent()) {\n return Optional.of(propertySourceLoader.read(fileName, inputStream.get()));\n } else {\n throw new ConfigurationException(\"Failed to read configuration file: \" + filePath);\n }\n } catch (IOException e) {\n throw new ConfigurationException(\"Unsupported properties file: \" + fileName);\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void testGetShellCommandLineBash_WithSingleQuotedArg()\n throws Exception\n {\n Commandline cmd = new Commandline( new BourneShell() );\n cmd.setExecutable( \"/bin/echo\" );\n cmd.addArguments( new String[] {\n \"\\'hello world\\'\"\n } );\n\n String[] shellCommandline = cmd.getShellCommandline();\n\n assertEquals( \"Command line size\", 3, shellCommandline.length );\n\n assertEquals( \"/bin/sh\", shellCommandline[0] );\n assertEquals( \"-c\", shellCommandline[1] );\n String expectedShellCmd = \"/bin/echo \\'hello world\\'\";\n if ( Os.isFamily( Os.FAMILY_WINDOWS ) )\n {\n expectedShellCmd = \"\\\\bin\\\\echo \\'hello world\\'\";\n }\n assertEquals( expectedShellCmd, shellCommandline[2] );\n }", "label_name": "CWE-78", "label": 78}
{"code": " public String list(Model model, // TODO model should no longer be injected\n @RequestParam(required = false, defaultValue = \"FILENAME\") SortBy sortBy,\n @RequestParam(required = false, defaultValue = \"false\") boolean desc,\n @RequestParam(required = false) String base) throws IOException, TemplateException {\n securityCheck(base);\n\n Path currentFolder = loggingPath(base);\n\n List files = getFileProvider(currentFolder).getFileEntries(currentFolder);\n List sortedFiles = sortFiles(files, sortBy, desc);\n\n model.addAttribute(\"sortBy\", sortBy);\n model.addAttribute(\"desc\", desc);\n model.addAttribute(\"files\", sortedFiles);\n model.addAttribute(\"currentFolder\", currentFolder.toAbsolutePath().toString());\n model.addAttribute(\"base\", base != null ? URLEncoder.encode(base, \"UTF-8\") : \"\");\n model.addAttribute(\"parent\", getParent(currentFolder));\n model.addAttribute(\"stylesheets\", stylesheets);\n\n return FreeMarkerTemplateUtils.processTemplateIntoString(freemarkerConfig.getTemplate(\"logview.ftl\"), model);\n }", "label_name": "CWE-22", "label": 22}
{"code": " protected static String unifyQuotes( String path )\n {\n if ( path == null )\n {\n return null;\n }\n\n if ( path.indexOf( \" \" ) == -1 && path.indexOf( \"'\" ) != -1 && path.indexOf( \"\\\"\" ) == -1 )\n {\n return StringUtils.escape( path );\n }\n\n return StringUtils.quoteAndEscape( path, '\\\"', BASH_QUOTING_TRIGGER_CHARS );\n }", "label_name": "CWE-78", "label": 78}
{"code": " public int getPosition()\n {\n if ( realPos == -1 )\n {\n realPos = ( getExecutable() == null ? 0 : 1 );\n for ( int i = 0; i < position; i++ )\n {\n Arg arg = (Arg) arguments.elementAt( i );\n realPos += arg.getParts().length;\n }\n }\n return realPos;\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void testWrapMemoryMapped() throws Exception {\n File file = File.createTempFile(\"netty-test\", \"tmp\");\n FileChannel output = null;\n FileChannel input = null;\n ByteBuf b1 = null;\n ByteBuf b2 = null;\n\n try {\n output = new RandomAccessFile(file, \"rw\").getChannel();\n byte[] bytes = new byte[1024];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n output.write(ByteBuffer.wrap(bytes));\n\n input = new RandomAccessFile(file, \"r\").getChannel();\n ByteBuffer m = input.map(FileChannel.MapMode.READ_ONLY, 0, input.size());\n\n b1 = buffer(m);\n\n ByteBuffer dup = m.duplicate();\n dup.position(2);\n dup.limit(4);\n\n b2 = buffer(dup);\n\n Assert.assertEquals(b2, b1.slice(2, 2));\n } finally {\n if (b1 != null) {\n b1.release();\n }\n if (b2 != null) {\n b2.release();\n }\n if (output != null) {\n output.close();\n }\n if (input != null) {\n input.close();\n }\n file.delete();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " void sharp() {\n final PathAndQuery res = PathAndQuery.parse(\"/#?a=b#1\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/#\");\n assertThat(res.query()).isEqualTo(\"a=b#1\");\n\n // '%23' in a query string should never be decoded into '#'.\n final PathAndQuery res2 = PathAndQuery.parse(\"/%23?a=b%231\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/#\");\n assertThat(res2.query()).isEqualTo(\"a=b%231\");\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(iv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ iv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\ttry {\n\t\t\tint result = cipher.update(ciphertext, ciphertextOffset, dataLen, plaintext, plaintextOffset);\n\t\t\tcipher.doFinal(plaintext, plaintextOffset + result);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " public List getShellCommandLine( String[] arguments )\n {\n\n List commandLine = new ArrayList();\n\n if ( getShellCommand() != null )\n {\n commandLine.add( getShellCommand() );\n }\n\n if ( getShellArgs() != null )\n {\n commandLine.addAll( getShellArgsList() );\n }\n\n commandLine.addAll( getCommandLine( getExecutable(), arguments ) );\n\n return commandLine;\n\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void testWhitespaceBeforeTransferEncoding02() {\n String requestStr = \"POST / HTTP/1.1\" +\n \" Transfer-Encoding : chunked\\r\\n\" +\n \"Host: target.com\" +\n \"Content-Length: 65\\r\\n\\r\\n\" +\n \"0\\r\\n\\r\\n\" +\n \"GET /maliciousRequest HTTP/1.1\\r\\n\" +\n \"Host: evilServer.com\\r\\n\" +\n \"Foo: x\";\n testInvalidHeaders0(requestStr);\n }", "label_name": "CWE-444", "label": 444}
{"code": " public AbstractXmlConfigRootTagRecognizer(String expectedRootNode) throws Exception {\n this.expectedRootNode = expectedRootNode;\n SAXParserFactory factory = SAXParserFactory.newInstance();\n saxParser = factory.newSAXParser();\n }", "label_name": "CWE-611", "label": 611}
{"code": " public String getEncoding() {\n return encoding;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void setUp() throws Exception {\n super.setUp();\n TestUtil.createTempTable(con, \"xmltab\",\"x xml\");\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprivate final void servlet31(HttpServletRequest request) {\n\t\ttry {\n\t\t\tfor(Part part:request.getParts()) {\n\t\t\t\tif(part.getContentType() != null && (StringHelper.containsNonWhitespace(part.getSubmittedFileName()) || !part.getContentType().startsWith(\"text/plain\"))) {\n\t\t\t\t\tcontentType = part.getContentType();\n\t\t\t\t\tfilename = part.getSubmittedFileName();\n\t\t\t\t\tif(filename != null) {\n\t\t\t\t\t\tfilename = UUID.randomUUID().toString().replace(\"-\", \"\") + \"_\" + filename;\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfilename = \"upload-\" + UUID.randomUUID().toString().replace(\"-\", \"\");\n\t\t\t\t\t}\n\t\t\t\t\tfile = new File(WebappHelper.getTmpDir(), filename);\n\t\t\t\t\tpart.write(file.getAbsolutePath());\n\t\t\t\t\tfile = new File(WebappHelper.getTmpDir(), filename);\n\t\t\t\t} else {\n\t\t\t\t\tString value = IOUtils.toString(part.getInputStream(), request.getCharacterEncoding());\n\t\t\t\t\tfields.put(part.getName(), value);\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\ttry {\n\t\t\t\t\tpart.delete();\n\t\t\t\t} catch (Exception e) {\n\t\t\t\t\t//we try (tomcat doesn't send exception but undertow)\n\t\t\t\t}\n\t\t\t}\n\t\t} catch (IOException | ServletException e) {\n\t\t\tlog.error(\"\", e);\n\t\t}\n\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic void testMatchOperation() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyOperation(KeyOperation.DECRYPT).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\")\n\t\t\t.keyOperations(new HashSet<>(Collections.singletonList(KeyOperation.DECRYPT))).build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"key_ops=decrypt\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " private static String bytesToHex(byte[] bytes, int length) {\n String out = \"\";\n for (int j = 0; j < length; j++) {\n int v = bytes[j] & 0xFF;\n out += hexArray[v >>> 4];\n out += hexArray[v & 0x0F];\n out += \" \";\n }\n return out;\n }", "label_name": "CWE-770", "label": 770}
{"code": " public JiffleRuntime getRuntimeInstance(Jiffle.RuntimeModel model) throws\n it.geosolutions.jaiext.jiffle.JiffleException {\n return createRuntimeInstance(model, getRuntimeBaseClass(model), false);\n }", "label_name": "CWE-94", "label": 94}
{"code": " void percent() {\n final PathAndQuery res = PathAndQuery.parse(\"/%25\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/%25\");\n assertThat(res.query()).isNull();\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic void todo_oldTasks() {\n\t\tString taskName = UUID.randomUUID().toString();\n\t\tPersistentTask ctask = persistentTaskDao.createTask(taskName, new DummyTask());\n\t\t\n\t\t//simulate a task from a previous boot\n\t\tPersistentTask ptask = new PersistentTask();\n\t\tptask.setCreationDate(new Date());\n\t\tptask.setLastModified(new Date());\n\t\tptask.setName(UUID.randomUUID().toString());\n\t\tptask.setStatus(TaskStatus.inWork);\n\t\tptask.setExecutorBootId(UUID.randomUUID().toString());\n\t\tptask.setExecutorNode(Integer.toString(WebappHelper.getNodeId()));\n\t\tptask.setTask(XStreamHelper.createXStreamInstance().toXML(new DummyTask()));\n\t\tdbInstance.getCurrentEntityManager().persist(ptask);\n\n\t\t//simulate a task from an other node\n\t\tPersistentTask alienTask = new PersistentTask();\n\t\talienTask.setCreationDate(new Date());\n\t\talienTask.setLastModified(new Date());\n\t\talienTask.setName(UUID.randomUUID().toString());\n\t\talienTask.setStatus(TaskStatus.inWork);\n\t\talienTask.setExecutorBootId(UUID.randomUUID().toString());\n\t\talienTask.setExecutorNode(Integer.toString(WebappHelper.getNodeId() + 1));\n\t\talienTask.setTask(XStreamHelper.createXStreamInstance().toXML(new DummyTask()));\n\t\tdbInstance.getCurrentEntityManager().persist(alienTask);\n\n\t\tdbInstance.commitAndCloseSession();\n\n\t\tList todos = persistentTaskDao.tasksToDo();\n\t\tAssert.assertNotNull(todos);\n\t\tAssert.assertFalse(todos.isEmpty());\n\t\tAssert.assertTrue(todos.contains(ptask.getKey()));\n\t\tAssert.assertTrue(todos.contains(ctask.getKey()));\n\t\tAssert.assertFalse(todos.contains(alienTask.getKey()));\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": "\tpublic String displayCategoryWithReference(@PathVariable final String friendlyUrl, @PathVariable final String ref, Model model, HttpServletRequest request, HttpServletResponse response, Locale locale) throws Exception {\n\t\t\n\t\t\n\t\t\n\t\treturn this.displayCategory(friendlyUrl,ref,model,request,response,locale);\n\t}", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic void testMatchType() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyType(KeyType.RSA).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"kty=RSA\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tList cleanForKeySlow(String key) {\n\t\tkey = StringUtils.trin(StringUtils.goLowerCase(key));\n\t\tkey = key.replaceAll(\"_|\\\\.|\\\\s\", \"\");\n\t\t// key = replaceSmart(key, \"partition\", \"package\");\n\t\tkey = replaceSmart(key, \"sequenceparticipant\", \"participant\");\n\t\tkey = replaceSmart(key, \"sequenceactor\", \"actor\");\n\t\tkey = key.replaceAll(\"activityarrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"objectarrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"classarrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"componentarrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"statearrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"usecasearrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"sequencearrow\", \"arrow\");\n\t\tkey = key.replaceAll(\"align$\", \"alignment\");\n\t\tfinal Matcher2 mm = stereoPattern.matcher(key);\n\t\tfinal List result = new ArrayList<>();\n\t\twhile (mm.find()) {\n\t\t\tfinal String s = mm.group(1);\n\t\t\tresult.add(key.replaceAll(stereoPatternString, \"\") + \"<<\" + s + \">>\");\n\t\t}\n\t\tif (result.size() == 0)\n\t\t\tresult.add(key);\n\n\t\treturn Collections.unmodifiableList(result);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private void checkParams()\n throws Exception\n {\n if (vi == null)\n {\n throw new Exception(\"no layers defined.\");\n }\n if (vi.length > 1)\n {\n for (int i = 0; i < vi.length - 1; i++)\n {\n if (vi[i] >= vi[i + 1])\n {\n throw new Exception(\n \"v[i] has to be smaller than v[i+1]\");\n }\n }\n }\n else\n {\n throw new Exception(\n \"Rainbow needs at least 1 layer, such that v1 < v2.\");\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": " protected TestPolicy(Policy.ParseContext parseContext) throws PolicyException {\n super(parseContext);\n }", "label_name": "CWE-79", "label": 79}
{"code": " public static void setRequestMethod(HttpURLConnection conn, RequestMethod method) {\n try {\n conn.setRequestMethod(getRequestMethodAsString(method));\n } catch (ProtocolException e) {\n throw ErrorUtil.createCommandException(e.getMessage());\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tpoly.update(ciphertext, ciphertextOffset, dataLen);\n\t\tfinish(ad, dataLen);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (polyKey[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencrypt(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public static HttpURLConnection createHttpUrlConnection(URL url, String proxyHost, int proxyPort,\n String proxyUsername, String proxyPassword) {\n try {\n Proxy proxy = getProxy(proxyHost, proxyPort, proxyUsername, proxyPassword);\n // set proxy if exists.\n if (proxy == null) {\n return (HttpURLConnection) url.openConnection();\n } else {\n return (HttpURLConnection) url.openConnection(proxy);\n }\n } catch (IOException e) {\n throw ErrorUtil.createCommandException(e.getMessage());\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": "\tpublic EfficiencyStatement getUserEfficiencyStatementByResourceKey(Long resourceKey, Identity identity){\n\t\tStringBuilder sb = new StringBuilder(256);\n\t\tsb.append(\"select statement from effstatementstandalone as statement\")\n\t\t .append(\" where statement.identity.key=:identityKey and statement.resourceKey=:resourceKey\");\n\n\t\tList statement = dbInstance.getCurrentEntityManager()\n\t\t\t\t.createQuery(sb.toString(), UserEfficiencyStatementStandalone.class)\n\t\t\t\t.setParameter(\"identityKey\", identity.getKey())\n\t\t\t\t.setParameter(\"resourceKey\", resourceKey)\n\t\t\t\t.getResultList();\n\t\tif(statement.isEmpty() || statement.get(0).getStatementXml() == null) {\n\t\t\treturn null;\n\t\t}\n\t\treturn (EfficiencyStatement)xstream.fromXML(statement.get(0).getStatementXml());\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " private void verifyHostname(X509Certificate cert)\n throws CertificateParsingException\n {\n try {\n Collection sans = cert.getSubjectAlternativeNames();\n if (sans == null) {\n String dn = cert.getSubjectX500Principal().getName();\n LdapName ln = new LdapName(dn);\n for (Rdn rdn : ln.getRdns()) {\n if (rdn.getType().equalsIgnoreCase(\"CN\")) {\n String peer = client.getServerName().toLowerCase();\n if (peer.equals(((String)rdn.getValue()).toLowerCase()))\n return;\n }\n }\n } else {\n Iterator i = sans.iterator();\n while (i.hasNext()) {\n List nxt = (List)i.next();\n if (((Integer)nxt.get(0)).intValue() == 2) {\n String peer = client.getServerName().toLowerCase();\n if (peer.equals(((String)nxt.get(1)).toLowerCase()))\n return;\n } else if (((Integer)nxt.get(0)).intValue() == 7) {\n String peer = ((CConn)client).getSocket().getPeerAddress();\n if (peer.equals(((String)nxt.get(1)).toLowerCase()))\n return;\n }\n }\n }\n Object[] answer = {\"YES\", \"NO\"};\n int ret = JOptionPane.showOptionDialog(null,\n \"Hostname verification failed. Do you want to continue?\",\n \"Hostname Verification Failure\",\n JOptionPane.YES_NO_OPTION, JOptionPane.WARNING_MESSAGE,\n null, answer, answer[0]);\n if (ret != JOptionPane.YES_OPTION)\n throw new WarningException(\"Hostname verification failed.\");\n } catch (CertificateParsingException e) {\n throw new SystemException(e.getMessage());\n } catch (InvalidNameException e) {\n throw new SystemException(e.getMessage());\n }\n }", "label_name": "CWE-295", "label": 295}
{"code": "\tpublic VFSContainer createChildContainer(String name) {\n\t\tFile fNewFile = new File(getBasefile(), name);\n\t\tif (!fNewFile.mkdir()) return null;\n\t\tLocalFolderImpl locFI = new LocalFolderImpl(fNewFile, this);\n\t\tlocFI.setDefaultItemFilter(defaultFilter);\n\t\treturn locFI;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public SAXReader(DocumentFactory factory) {\n this.factory = factory;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprivate static IRegex getRegexConcat() {\n\t\treturn RegexConcat.build(CommandBinary.class.getName(), RegexLeaf.start(), //\n\t\t\t\tnew RegexOptional( //\n\t\t\t\t\t\tnew RegexConcat( //\n\t\t\t\t\t\t\t\tnew RegexLeaf(\"COMPACT\", \"(compact)\"), //\n\t\t\t\t\t\t\t\tRegexLeaf.spaceOneOrMore())), //\n\t\t\t\tnew RegexLeaf(\"binary\"), //\n\t\t\t\tRegexLeaf.spaceOneOrMore(), //\n\t\t\t\tnew RegexLeaf(\"FULL\", \"[%g]([^%g]+)[%g]\"), //\n\t\t\t\tRegexLeaf.spaceOneOrMore(), //\n\t\t\t\tnew RegexLeaf(\"as\"), //\n\t\t\t\tRegexLeaf.spaceOneOrMore(), //\n\t\t\t\tnew RegexLeaf(\"CODE\", \"([%pLN_.@]+)\"), RegexLeaf.end());\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencryptCTR(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tpoly.update(ciphertext, ciphertextOffset, dataLen);\n\t\tfinish(ad, dataLen);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (polyKey[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencrypt(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " public Optional getResourceAsStream(String path) {\n Path filePath = getFilePath(normalize(path));\n try {\n return Optional.of(Files.newInputStream(filePath));\n } catch (IOException e) {\n return Optional.empty();\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " private Document parseFromBytes(byte[] bytes) throws SAMLException {\n DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();\n documentBuilderFactory.setNamespaceAware(true);\n try {\n DocumentBuilder builder = documentBuilderFactory.newDocumentBuilder();\n return builder.parse(new ByteArrayInputStream(bytes));\n } catch (ParserConfigurationException | SAXException | IOException e) {\n throw new SAMLException(\"Unable to parse SAML v2.0 authentication response\", e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public TList readListBegin() throws TException {\n return new TList(readByte(), readI32());\n }", "label_name": "CWE-770", "label": 770}
{"code": " public BourneShell()\n {\n this( false );\n }", "label_name": "CWE-78", "label": 78}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": " private byte[] decodeAndInflate(String encodedRequest) throws SAMLException {\n byte[] bytes = Base64.getMimeDecoder().decode(encodedRequest);\n Inflater inflater = new Inflater(true);\n inflater.setInput(bytes);\n inflater.finished();\n\n try {\n ByteArrayOutputStream baos = new ByteArrayOutputStream();\n byte[] result = new byte[bytes.length];\n while (!inflater.finished()) {\n int length = inflater.inflate(result);\n if (length > 0) {\n baos.write(result, 0, length);\n }\n }\n\n return baos.toByteArray();\n } catch (DataFormatException e) {\n throw new SAMLException(\"Invalid AuthnRequest. Inflating the bytes failed.\", e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " private void sendResponse(HttpServletResponse pResp, HttpServletRequest pReq, JSONAware pJson) throws IOException {\n String callback = pReq.getParameter(ConfigKey.CALLBACK.getKeyValue());\n setContentType(pResp, callback != null ? \"text/javascript\" : getMimeType(pReq));\n\n pResp.setStatus(HttpServletResponse.SC_OK);\n setNoCacheHeaders(pResp);\n if (pJson == null) {\n pResp.setContentLength(-1);\n } else {\n if (isStreamingEnabled(pReq)) {\n sendStreamingResponse(pResp, callback, (JSONStreamAware) pJson);\n } else {\n // Fallback, send as one object\n // TODO: Remove for 2.0 where should support only streaming\n sendAllJSON(pResp, callback, pJson);\n }\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tprotected String getCorsDomain(String referer, String userAgent)\n\t{\n\t\tString dom = null;\n\n\t\tif (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*draw[.]io/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".draw.io/\") + 8);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*diagrams[.]net/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".diagrams.net/\") + 13);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*quipelements[.]com/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".quipelements.com/\") + 17);\n\t\t}\n\t\t// Enables Confluence/Jira proxy via referer or hardcoded user-agent (for old versions)\n\t\t// UA refers to old FF on macOS so low risk and fixes requests from existing servers\n\t\telse if ((referer != null\n\t\t\t\t&& referer.equals(\"draw.io Proxy Confluence Server\"))\n\t\t\t\t|| (userAgent != null && userAgent.equals(\n\t\t\t\t\t\t\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:50.0) Gecko/20100101 Firefox/50.0\")))\n\t\t{\n\t\t\tdom = \"\";\n\t\t}\n\n\t\treturn dom;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic PlayerAnalog(String code, ISkinParam skinParam, TimingRuler ruler, boolean compact) {\n\t\tsuper(code, skinParam, ruler, compact);\n\t\tthis.suggestedHeight = 100;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic PersistentTask createTask(String name, Serializable task) {\n\t\tPersistentTask ptask = new PersistentTask();\n\t\tDate currentDate = new Date();\n\t\tptask.setCreationDate(currentDate);\n\t\tptask.setLastModified(currentDate);\n\t\tptask.setName(name);\n\t\tptask.setStatus(TaskStatus.newTask);\n\t\tptask.setTask(xstream.toXML(task));\n\t\tdbInstance.getCurrentEntityManager().persist(ptask);\n\t\treturn ptask;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public synchronized T getSource(Class sourceClass) throws SQLException {\n checkFreed();\n ensureInitialized();\n\n if (data == null) {\n return null;\n }\n\n try {\n if (sourceClass == null || DOMSource.class.equals(sourceClass)) {\n DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();\n DocumentBuilder builder = factory.newDocumentBuilder();\n builder.setErrorHandler(new NonPrintingErrorHandler());\n InputSource input = new InputSource(new StringReader(data));\n return (T) new DOMSource(builder.parse(input));\n } else if (SAXSource.class.equals(sourceClass)) {\n InputSource is = new InputSource(new StringReader(data));\n return (T) new SAXSource(is);\n } else if (StreamSource.class.equals(sourceClass)) {\n return (T) new StreamSource(new StringReader(data));\n } else if (StAXSource.class.equals(sourceClass)) {\n XMLInputFactory xif = XMLInputFactory.newInstance();\n XMLStreamReader xsr = xif.createXMLStreamReader(new StringReader(data));\n return (T) new StAXSource(xsr);\n }\n } catch (Exception e) {\n throw new PSQLException(GT.tr(\"Unable to decode xml data.\"), PSQLState.DATA_ERROR, e);\n }\n\n throw new PSQLException(GT.tr(\"Unknown XML Source class: {0}\", sourceClass),\n PSQLState.INVALID_PARAMETER_TYPE);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic static void ensurePointOnCurve(final ECPublicKey ephemeralPublicKey, final ECPrivateKey privateKey)\n\t\tthrows JOSEException {\n\t\t\n\t\t// Ensure the following is met:\n\t\t// (y^2) mod p = (x^3 + ax + b) mod p\n\t\tECParameterSpec ecParameterSpec = privateKey.getParams();\n\t\tEllipticCurve curve = ecParameterSpec.getCurve();\n\t\tECPoint point = ephemeralPublicKey.getW();\n\t\tBigInteger x = point.getAffineX();\n\t\tBigInteger y = point.getAffineY();\n\t\tBigInteger a = curve.getA();\n\t\tBigInteger b = curve.getB();\n\t\tBigInteger p = ((ECFieldFp) curve.getField()).getP();\n\t\tBigInteger leftSide = (y.pow(2)).mod(p);\n\t\tBigInteger rightSide = (x.pow(3).add(a.multiply(x)).add(b)).mod(p);\n\t\t\n\t\tif (! leftSide.equals(rightSide)) {\n\t\t\tthrow new JOSEException(\"Invalid ephemeral public key: Point not on expected curve\");\n\t\t}\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tprotected SymbolContext getContextLegacy() {\n\t\treturn new SymbolContext(HColorUtils.COL_D7E0F2, HColorUtils.COL_038048).withStroke(new UStroke(1.5));\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " protected void configureReader(XMLReader reader, DefaultHandler handler)\n throws DocumentException {\n // configure lexical handling\n SAXHelper.setParserProperty(reader, SAX_LEXICALHANDLER, handler);\n\n // try alternate property just in case\n SAXHelper.setParserProperty(reader, SAX_LEXICAL_HANDLER, handler);\n\n // register the DeclHandler\n if (includeInternalDTDDeclarations || includeExternalDTDDeclarations) {\n SAXHelper.setParserProperty(reader, SAX_DECL_HANDLER, handler);\n }\n\n // string interning\n SAXHelper.setParserFeature(reader, SAX_STRING_INTERNING,\n isStringInternEnabled());\n\n try {\n // configure validation support\n reader.setFeature(\"http://xml.org/sax/features/validation\",\n isValidating());\n\n if (errorHandler != null) {\n reader.setErrorHandler(errorHandler);\n } else {\n reader.setErrorHandler(handler);\n }\n } catch (Exception e) {\n if (isValidating()) {\n throw new DocumentException(\"Validation not supported for\"\n + \" XMLReader: \" + reader, e);\n }\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public TMap readMapBegin() throws TException {\n return new TMap(readByte(), readByte(), readI32());\n }", "label_name": "CWE-770", "label": 770}
{"code": "\tpublic static ResourceEvaluation evaluate(File file, String filename) {\n\t\tResourceEvaluation eval = new ResourceEvaluation();\n\t\ttry {\n\t\t\tImsManifestFileFilter visitor = new ImsManifestFileFilter();\n\t\t\tPath fPath = PathUtils.visit(file, filename, visitor);\n\t\t\tif(visitor.hasManifest()) {\n\t\t\t\tPath realManifestPath = visitor.getManifestPath();\n\t\t\t\tPath manifestPath = fPath.resolve(realManifestPath);\n\t\t\t\t\n\t\t\t\tRootSearcher rootSearcher = new RootSearcher();\n\t\t\t\tFiles.walkFileTree(fPath, rootSearcher);\n\t\t\t\tif(rootSearcher.foundRoot()) {\n\t\t\t\t\tmanifestPath = rootSearcher.getRoot().resolve(IMS_MANIFEST);\n\t\t\t\t} else {\n\t\t\t\t\tmanifestPath = fPath.resolve(IMS_MANIFEST);\n\t\t\t\t}\n\n\t\t\t\tDocument doc = IMSLoader.loadIMSDocument(manifestPath);\n\t\t\t\tif(validateImsManifest(doc)) {\n\t\t\t\t\tif(visitor.hasEditorTreeModel()) {\n\t\t\t\t\t\tXMLScanner scanner = new XMLScanner();\n\t\t\t\t\t\tscanner.scan(visitor.getEditorTreeModelPath());\n\t\t\t\t\t\teval.setValid(!scanner.hasEditorTreeModelMarkup());\t\n\t\t\t\t\t} else {\n\t\t\t\t\t\teval.setValid(true);\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\teval.setValid(false);\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\teval.setValid(false);\n\t\t\t}\n\t\t\tPathUtils.closeSubsequentFS(fPath);\n\t\t} catch (IOException | IllegalArgumentException e) {\n\t\t\tlog.error(\"\", e);\n\t\t\teval.setValid(false);\n\t\t}\n\t\treturn eval;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public void fatalError(SAXParseException e) {\n }", "label_name": "CWE-611", "label": 611}
{"code": " public BourneShell( boolean isLoginShell )\n {\n setShellCommand( \"/bin/sh\" );\n setArgumentQuoteDelimiter( '\\'' );\n setExecutableQuoteDelimiter( '\\\"' );\n setSingleQuotedArgumentEscaped( true );\n setSingleQuotedExecutableEscaped( false );\n setQuotedExecutableEnabled( true );\n setArgumentEscapePattern(\"'\\\\%s'\");\n\n if ( isLoginShell )\n {\n addShellArg( \"-l\" );\n }\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void testQuoteWorkingDirectoryAndExecutable_WDPathWithSingleQuotes()\n {\n Shell sh = newShell();\n\n sh.setWorkingDirectory( \"/usr/local/'something else'\" );\n sh.setExecutable( \"chmod\" );\n\n String executable = StringUtils.join( sh.getShellCommandLine( new String[]{} ).iterator(), \" \" );\n\n assertEquals( \"/bin/sh -c cd \\\"/usr/local/\\'something else\\'\\\" && chmod\", executable );\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void testQuoteWorkingDirectoryAndExecutable()\n {\n Shell sh = newShell();\n\n sh.setWorkingDirectory( \"/usr/local/bin\" );\n sh.setExecutable( \"chmod\" );\n\n String executable = StringUtils.join( sh.getShellCommandLine( new String[]{} ).iterator(), \" \" );\n\n assertEquals( \"/bin/sh -c cd /usr/local/bin && chmod\", executable );\n }", "label_name": "CWE-78", "label": 78}
{"code": " private void checkUserReference(UserReference userReference) throws ResetPasswordException\n {\n if (!this.userManager.exists(userReference)) {\n String exceptionMessage =\n this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noUser\",\n userReference.toString());\n throw new ResetPasswordException(exceptionMessage);\n }\n\n // FIXME: This check shouldn't be needed if we'd have the proper API to determine which kind of\n // authentication is used.\n if (!(userReference instanceof DocumentUserReference)) {\n throw new ResetPasswordException(\"Only user having a page on the wiki can reset their password.\");\n }\n }", "label_name": "CWE-640", "label": 640}
{"code": " public int hashCode()\n {\n return new HashCodeBuilder(17, 37)\n .append(userReference)\n .append(userEmail)\n .append(verificationCode)\n .toHashCode();\n }", "label_name": "CWE-640", "label": 640}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic static byte[] transcodeSignatureToConcat(final byte[] derSignature, int outputLength)\n\t\tthrows JOSEException {\n\n\t\tif (derSignature.length < 8 || derSignature[0] != 48) {\n\t\t\tthrow new JOSEException(\"Invalid ECDSA signature format\");\n\t\t}\n\n\t\tint offset;\n\t\tif (derSignature[1] > 0) {\n\t\t\toffset = 2;\n\t\t} else if (derSignature[1] == (byte) 0x81) {\n\t\t\toffset = 3;\n\t\t} else {\n\t\t\tthrow new JOSEException(\"Invalid ECDSA signature format\");\n\t\t}\n\n\t\tbyte rLength = derSignature[offset + 1];\n\n\t\tint i;\n\t\tfor (i = rLength; (i > 0) && (derSignature[(offset + 2 + rLength) - i] == 0); i--) {\n\t\t\t// do nothing\n\t\t}\n\n\t\tbyte sLength = derSignature[offset + 2 + rLength + 1];\n\n\t\tint j;\n\t\tfor (j = sLength; (j > 0) && (derSignature[(offset + 2 + rLength + 2 + sLength) - j] == 0); j--) {\n\t\t\t// do nothing\n\t\t}\n\n\t\tint rawLen = Math.max(i, j);\n\t\trawLen = Math.max(rawLen, outputLength / 2);\n\n\t\tif ((derSignature[offset - 1] & 0xff) != derSignature.length - offset\n\t\t\t|| (derSignature[offset - 1] & 0xff) != 2 + rLength + 2 + sLength\n\t\t\t|| derSignature[offset] != 2\n\t\t\t|| derSignature[offset + 2 + rLength] != 2) {\n\t\t\tthrow new JOSEException(\"Invalid ECDSA signature format\");\n\t\t}\n\n\t\tfinal byte[] concatSignature = new byte[2 * rawLen];\n\n\t\tSystem.arraycopy(derSignature, (offset + 2 + rLength) - i, concatSignature, rawLen - i, i);\n\t\tSystem.arraycopy(derSignature, (offset + 2 + rLength + 2 + sLength) - j, concatSignature, 2 * rawLen - j, j);\n\n\t\treturn concatSignature;\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t\tint result = cipher.update(plaintext, plaintextOffset, length, ciphertext, ciphertextOffset);\n\t\t\tcipher.doFinal(ciphertext, ciphertextOffset + result);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " private JsonNode yamlStreamToJson(InputStream yamlStream) {\n Yaml reader = new Yaml();\n ObjectMapper mapper = new ObjectMapper();\n\t\treturn mapper.valueToTree(reader.load(yamlStream));\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tprivate static ECPublicKey generateECPublicKey(final ECKey.Curve curve)\n\t\tthrows Exception {\n\t\t\n\t\tfinal ECParameterSpec ecParameterSpec = curve.toECParameterSpec();\n\t\t\n\t\tKeyPairGenerator generator = KeyPairGenerator.getInstance(\"EC\");\n\t\tgenerator.initialize(ecParameterSpec);\n\t\tKeyPair keyPair = generator.generateKeyPair();\n\t\t\n\t\treturn (ECPublicKey) keyPair.getPublic();\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " protected Object extractPrincipalFromWebToken(Jwt jwt) {\n Map body = (Map) jwt.getBody();\n String base64Principal = (String) body.get(\"serialized-principal\");\n byte[] serializedPrincipal = Base64.decode(base64Principal);\n Object principal;\n ClassLoader loader = Thread.currentThread().getContextClassLoader();\n try {\n Thread.currentThread().setContextClassLoader(codeBase.asClassLoader()); //In case the serialized principal is a POJO entity\n ObjectInputStream objectInputStream = new ObjectInputStream(new ByteArrayInputStream(serializedPrincipal)) {\n @Override\n protected Class> resolveClass(ObjectStreamClass desc) throws IOException, ClassNotFoundException {\n return codeBase.loadClass(desc.getName());\n }\n };\n principal = objectInputStream.readObject();\n objectInputStream.close();\n } catch (Exception e) {\n throw new AuthenticationException(e);\n } finally {\n Thread.currentThread().setContextClassLoader(loader);\n }\n return principal;\n }", "label_name": "CWE-347", "label": 347}
{"code": "\t\tpublic FileVisitResult visitFile(Path file, BasicFileAttributes attrs)\n\t throws IOException {\n\t String filename = file.getFileName().toString();\n\t if(filename.endsWith(WikiManager.WIKI_PROPERTIES_SUFFIX)) {\n\t \t\tString f = convertAlternativeFilename(file.toString());\n\t \t\tfinal Path destFile = Paths.get(wikiDir.toString(), f);\n\t \t\tresetAndCopyProperties(file, destFile);\n\t } else if (filename.endsWith(WIKI_FILE_SUFFIX)) {\n \t\t\tString f = convertAlternativeFilename(file.toString());\n\t \t\tfinal Path destFile = Paths.get(wikiDir.toString(), f);\n\t\t\t\tFiles.copy(file, destFile, StandardCopyOption.REPLACE_EXISTING);\n\t\t\t} else if (!filename.contains(WIKI_FILE_SUFFIX + \"-\")\n\t\t\t\t\t&& !filename.contains(WIKI_PROPERTIES_SUFFIX + \"-\")) {\n\t\t\t\tfinal Path destFile = Paths.get(mediaDir.toString(), file.toString());\n\t\t\t\tFiles.copy(file, destFile, StandardCopyOption.REPLACE_EXISTING);\n\t\t\t}\n\t return FileVisitResult.CONTINUE;\n\t\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic Player(String title, ISkinParam skinParam, TimingRuler ruler, boolean compact) {\n\t\tthis.skinParam = skinParam;\n\t\tthis.compact = compact;\n\t\tthis.ruler = ruler;\n\t\tthis.title = Display.getWithNewlines(title);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wControl, Translator translator) {\n\t\tVFSContainer currentContainer = folderComponent.getCurrentContainer();\n\t\tVFSContainer rootContainer = folderComponent.getRootContainer();\n\n\t\tif (!VFSManager.exists(currentContainer)) {\n\t\t\tstatus = FolderCommandStatus.STATUS_FAILED;\n\t\t\tshowError(translator.translate(\"FileDoesNotExist\"));\n\t\t\treturn null;\n\t\t}\n\t\tstatus = FolderCommandHelper.sanityCheck(wControl, folderComponent);\n\t\tif (status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\t\tFileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainerPath());\n\t\tstatus = FolderCommandHelper.sanityCheck3(wControl, folderComponent, selection);\n\t\tif (status == FolderCommandStatus.STATUS_FAILED) {\n\t\t\treturn null;\n\t\t}\n\n\t\tboolean selectionWithContainer = false;\n\t\tList filenames = selection.getFiles();\n\t\tList leafs = new ArrayList<>();\n\t\tfor (String file : filenames) {\n\t\t\tVFSItem item = currentContainer.resolve(file);\n\t\t\tif (item instanceof VFSContainer) {\n\t\t\t\tselectionWithContainer = true;\n\t\t\t} else if (item instanceof VFSLeaf) {\n\t\t\t\tleafs.add((VFSLeaf) item);\n\t\t\t}\n\t\t}\n\t\tif (selectionWithContainer) {\n\t\t\tif (leafs.isEmpty()) {\n\t\t\t\twControl.setError(getTranslator().translate(\"send.mail.noFileSelected\"));\n\t\t\t\treturn null;\n\t\t\t} else {\n\t\t\t\tsetFormWarning(getTranslator().translate(\"send.mail.selectionContainsFolder\"));\n\t\t\t}\n\t\t}\n\t\tsetFiles(rootContainer, leafs);\n\t\treturn this;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public void setEntityResolver(EntityResolver entityResolver) {\n this.entityResolver = entityResolver;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprivate TextBlock getTitleBlock(IGroup g) {\n\t\tfinal Display label = g.getDisplay();\n\t\tif (label == null)\n\t\t\treturn TextBlockUtils.empty(0, 0);\n\n\t\tfinal ISkinParam skinParam = dotData.getSkinParam();\n\t\tfinal FontConfiguration fontConfiguration;\n\t\tif (UseStyle.useBetaStyle()) {\n\t\t\tfinal SName sname = dotData.getUmlDiagramType().getStyleName();\n\t\t\tfinal StyleSignatureBasic signature;\n\t\t\tfinal USymbol uSymbol = g.getUSymbol();\n\t\t\tif (uSymbol == USymbols.RECTANGLE)\n\t\t\t\tsignature = StyleSignatureBasic.of(SName.root, SName.element, sname, uSymbol.getSName(), SName.title);\n\t\t\telse\n\t\t\t\tsignature = StyleSignatureBasic.of(SName.root, SName.element, sname, SName.title);\n\n\t\t\tfinal Style style = signature //\n\t\t\t\t\t.withTOBECHANGED(g.getStereotype()) //\n\t\t\t\t\t.with(g.getStereostyles()) //\n\t\t\t\t\t.getMergedStyle(skinParam.getCurrentStyleBuilder());\n\n\t\t\tfontConfiguration = style.getFontConfiguration(skinParam.getThemeStyle(), skinParam.getIHtmlColorSet());\n\t\t} else\n\t\t\tfontConfiguration = g.getFontConfigurationForTitle(skinParam);\n\t\tfinal HorizontalAlignment alignment = HorizontalAlignment.CENTER;\n\t\treturn label.create(fontConfiguration, alignment, dotData.getSkinParam());\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic T toBean(Class beanClass) {\r\n setTag(new Tag(beanClass));\r\n \r\n\t\tif (getVersion() != null) {\r\n\t\t\ttry {\r\n\t\t\t\tMigrationHelper.migrate(getVersion(), beanClass.newInstance(), this);\r\n\t\t\t\tremoveVersion();\r\n\t\t\t} catch (InstantiationException | IllegalAccessException e) {\r\n\t\t\t\tthrow new RuntimeException(e);\r\n\t\t\t}\r\n\t\t}\r\n\t\t\r\n return (T) new OneYaml().construct(this);\r\n\t}\r", "label_name": "CWE-502", "label": 502}
{"code": "\tprivate static String getOrderClause(Set joinAliases, String alias, Order order) {\n\n\t\tString property = order.getProperty();\n\t\tboolean qualifyReference = !property.contains(\"(\"); // ( indicates a function\n\n\t\tfor (String joinAlias : joinAliases) {\n\t\t\tif (property.startsWith(joinAlias.concat(\".\"))) {\n\t\t\t\tqualifyReference = false;\n\t\t\t\tbreak;\n\t\t\t}\n\t\t}\n\n\t\tString reference = qualifyReference && StringUtils.hasText(alias) ? String.format(\"%s.%s\", alias, property)\n\t\t\t\t: property;\n\t\tString wrapped = order.isIgnoreCase() ? String.format(\"lower(%s)\", reference) : reference;\n\n\t\treturn String.format(\"%s %s\", wrapped, toJpaDirection(order));\n\t}", "label_name": "CWE-89", "label": 89}
{"code": "\tprivate void parse(UserRequest ureq) {\n\t\tString[] sFiles = ureq.getHttpReq().getParameterValues(FORM_ID);\n\t\tif (sFiles == null || sFiles.length == 0) return;\n\t\tfiles = Arrays.asList(sFiles);\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public void spliceToFile() throws Throwable {\n EventLoopGroup group = new EpollEventLoopGroup(1);\n File file = File.createTempFile(\"netty-splice\", null);\n file.deleteOnExit();\n\n SpliceHandler sh = new SpliceHandler(file);\n ServerBootstrap bs = new ServerBootstrap();\n bs.channel(EpollServerSocketChannel.class);\n bs.group(group).childHandler(sh);\n bs.childOption(EpollChannelOption.EPOLL_MODE, EpollMode.LEVEL_TRIGGERED);\n Channel sc = bs.bind(NetUtil.LOCALHOST, 0).syncUninterruptibly().channel();\n\n Bootstrap cb = new Bootstrap();\n cb.group(group);\n cb.channel(EpollSocketChannel.class);\n cb.handler(new ChannelInboundHandlerAdapter());\n Channel cc = cb.connect(sc.localAddress()).syncUninterruptibly().channel();\n\n for (int i = 0; i < data.length;) {\n int length = Math.min(random.nextInt(1024 * 64), data.length - i);\n ByteBuf buf = Unpooled.wrappedBuffer(data, i, length);\n cc.writeAndFlush(buf);\n i += length;\n }\n\n while (sh.future2 == null || !sh.future2.isDone() || !sh.future.isDone()) {\n if (sh.exception.get() != null) {\n break;\n }\n try {\n Thread.sleep(50);\n } catch (InterruptedException e) {\n // Ignore.\n }\n }\n\n sc.close().sync();\n cc.close().sync();\n\n if (sh.exception.get() != null && !(sh.exception.get() instanceof IOException)) {\n throw sh.exception.get();\n }\n\n byte[] written = new byte[data.length];\n FileInputStream in = new FileInputStream(file);\n\n try {\n Assert.assertEquals(written.length, in.read(written));\n Assert.assertArrayEquals(data, written);\n } finally {\n in.close();\n group.shutdownGracefully();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": "\tpublic EfficiencyStatement getUserEfficiencyStatementByCourseRepositoryEntry(RepositoryEntry courseRepoEntry, Identity identity){\n\t\tUserEfficiencyStatementImpl s = getUserEfficiencyStatementFull(courseRepoEntry, identity);\n\t\tif(s == null || s.getStatementXml() == null) {\n\t\t\treturn null;\n\t\t}\n\t\treturn (EfficiencyStatement)xstream.fromXML(s.getStatementXml());\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public String getExecutable()\n {\n if ( Os.isFamily( Os.FAMILY_WINDOWS ) )\n {\n return super.getExecutable();\n }\n\n return unifyQuotes( super.getExecutable());\n }", "label_name": "CWE-78", "label": 78}
{"code": "\tpublic XssHttpServletRequestWrapper(HttpServletRequest request) {\n\t\tsuper(request);\n\t}", "label_name": "CWE-79", "label": 79}
{"code": " protected int addFileNames(List list) { // This appears to only be used by unit tests and the copy\n // constructor\n for (String file : list) {\n workUnitList.add(new WorkUnit(file));\n }\n return size();\n }", "label_name": "CWE-502", "label": 502}
{"code": " private void ondata(String data) {\n try {\n this.decoder.add(data);\n } catch (DecodingException e) {\n this.onerror(e);\n }\n }", "label_name": "CWE-476", "label": 476}
{"code": "\tfinal protected SymbolContext getContext() {\n\t\tif (UseStyle.useBetaStyle() == false)\n\t\t\treturn getContextLegacy();\n\n\t\tfinal Style style = getStyleSignature().getMergedStyle(skinParam.getCurrentStyleBuilder());\n\t\tfinal HColor lineColor = style.value(PName.LineColor).asColor(skinParam.getThemeStyle(),\n\t\t\t\tskinParam.getIHtmlColorSet());\n\t\tfinal HColor backgroundColor = style.value(PName.BackGroundColor).asColor(skinParam.getThemeStyle(),\n\t\t\t\tskinParam.getIHtmlColorSet());\n\n\t\treturn new SymbolContext(backgroundColor, lineColor).withStroke(getStroke());\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " void requestResetPasswordUnexistingUser()\n {\n when(this.userReference.toString()).thenReturn(\"user:Foobar\");\n when(this.userManager.exists(this.userReference)).thenReturn(false);\n String exceptionMessage = \"User [user:Foobar] doesn't exist\";\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noUser\",\n \"user:Foobar\")).thenReturn(exceptionMessage);\n ResetPasswordException resetPasswordException = assertThrows(ResetPasswordException.class,\n () -> this.resetPasswordManager.requestResetPassword(this.userReference));\n assertEquals(exceptionMessage, resetPasswordException.getMessage());\n }", "label_name": "CWE-640", "label": 640}
{"code": " public Claims validateToken(String token) throws AuthenticationException {\n try {\n RsaKeyUtil rsaKeyUtil = new RsaKeyUtil();\n PublicKey publicKey = rsaKeyUtil.fromPemEncoded(keycloakPublicKey);\n\n return Jwts.parser().setSigningKey(publicKey).parseJws(token.replace(\"Bearer \", \"\")).getBody();\n } catch (Exception e){\n throw new AuthenticationException(String.format(\"Failed to check user authorization for token: %s\", token), e);\n }\n }", "label_name": "CWE-290", "label": 290}
{"code": "\t public void doFilter(ServletRequest srequest, ServletResponse response, FilterChain filterChain) throws IOException, ServletException {\n\n/*\t \t\tHttpServletRequest request = (HttpServletRequest) srequest;\n\t \t\t//final String realIp = request.getHeader(X_FORWARDED_FOR);\n\n\t \t\t//if (realIp != null) {\n\t \t\t\tfilterChain.doFilter(new XssHttpServletRequestWrapper(request) {\n\t \t\t\t\t*//**\n\t \t\t\t\tpublic String getRemoteAddr() {\n\t \t\t\t\t\treturn realIp;\n\t \t\t\t\t}\n\n\t \t\t\t\tpublic String getRemoteHost() {\n\t \t\t\t\t\treturn realIp;\n\t \t\t\t\t}\n\t \t\t\t\t**//*\n\t \t\t\t}, response);\n\n\t \t\t\treturn;\n\t \t\t//}\n\n*/\n\n\t }", "label_name": "CWE-79", "label": 79}
{"code": " private Runnable getDiscoveryRequestSetup(final String url) {\n return new Runnable() {\n public void run() {\n expect(request.getHeader(\"Origin\")).andStubReturn(null);\n expect(request.getHeader(\"Referer\")).andStubReturn(null);\n expect(request.getRemoteHost()).andReturn(\"localhost\");\n expect(request.getRemoteAddr()).andReturn(\"127.0.0.1\");\n expect(request.getRequestURI()).andReturn(\"/jolokia/\");\n expect(request.getParameterMap()).andReturn(null);\n expect(request.getAttribute(ConfigKey.JAAS_SUBJECT_REQUEST_ATTRIBUTE)).andReturn(null);\n\n expect(request.getPathInfo()).andReturn(HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getParameter(ConfigKey.MIME_TYPE.getKeyValue())).andReturn(\"text/plain\");\n StringBuffer buf = new StringBuffer();\n buf.append(url).append(HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getRequestURL()).andReturn(buf);\n expect(request.getRequestURI()).andReturn(\"/jolokia\" + HttpTestUtil.HEAP_MEMORY_GET_REQUEST);\n expect(request.getContextPath()).andReturn(\"/jolokia\");\n expect(request.getAuthType()).andReturn(\"BASIC\");\n expect(request.getAttribute(\"subject\")).andReturn(null);\n expect(request.getParameter(ConfigKey.STREAMING.getKeyValue())).andReturn(null);\n\n }\n };\n }", "label_name": "CWE-79", "label": 79}
{"code": " protected SAXContentHandler createContentHandler(XMLReader reader) {\n return new SAXContentHandler(getDocumentFactory(), dispatchHandler);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tfinal protected CommandExecutionResult executeArg(TimingDiagram diagram, LineLocation location, RegexResult arg) {\n\t\tfinal String compact = arg.get(\"COMPACT\", 0);\n\t\tfinal String code = arg.get(\"CODE\", 0);\n\t\tString full = arg.get(\"FULL\", 0);\n\t\tif (full == null) {\n\t\t\tfull = code;\n\t\t}\n\t\tfinal TimingStyle type = TimingStyle.valueOf(arg.get(\"TYPE\", 0).toUpperCase());\n\t\treturn diagram.createRobustConcise(code, full, type, compact != null);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public static String printFormattedMetadata(final IBaseDataObject payload) {\n final StringBuilder out = new StringBuilder();\n out.append(LS);\n for (final Map.Entry> entry : payload.getParameters().entrySet()) {\n out.append(entry.getKey() + SEP + entry.getValue() + LS);\n }\n return out.toString();\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic static void closeSubsequentFS(Path path) {\n\t\tif(path != null && FileSystems.getDefault() != path.getFileSystem()) {\n\t\t\tIOUtils.closeQuietly(path.getFileSystem());\n\t\t}\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public Document read(Reader reader) throws DocumentException {\n InputSource source = new InputSource(reader);\n if (this.encoding != null) {\n source.setEncoding(this.encoding);\n }\n\n return read(source);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tfinal protected Style getStyle() {\n\t\treturn getStyleSignature().getMergedStyle(skinParam.getCurrentStyleBuilder());\n\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " protected final boolean loadMore() throws IOException\n {\n if (_inputStream != null) {\n _currInputProcessed += _inputEnd;\n\n int count = _inputStream.read(_inputBuffer, 0, _inputBuffer.length);\n if (count > 0) {\n _inputPtr = 0;\n _inputEnd = count;\n return true;\n }\n // End of input\n _closeInput();\n // Should never return 0, so let's fail\n if (count == 0) {\n throw new IOException(\"InputStream.read() returned 0 characters when trying to read \"+_inputBuffer.length+\" bytes\");\n }\n }\n return false;\n }", "label_name": "CWE-770", "label": 770}
{"code": " void sendResetPasswordEmailRequest() throws Exception\n {\n when(this.referenceSerializer.serialize(this.userReference)).thenReturn(\"user:Foobar\");\n when(this.userProperties.getFirstName()).thenReturn(\"Foo\");\n when(this.userProperties.getLastName()).thenReturn(\"Bar\");\n\n AuthenticationResourceReference resourceReference =\n new AuthenticationResourceReference(AuthenticationAction.RESET_PASSWORD);\n\n String verificationCode = \"foobar4242\";\n resourceReference.addParameter(\"u\", \"user:Foobar\");\n resourceReference.addParameter(\"v\", verificationCode);\n ExtendedURL firstExtendedURL =\n new ExtendedURL(Arrays.asList(\"authenticate\", \"reset\"), resourceReference.getParameters());\n when(this.resourceReferenceSerializer.serialize(resourceReference)).thenReturn(firstExtendedURL);\n when(this.urlNormalizer.normalize(firstExtendedURL)).thenReturn(\n new ExtendedURL(Arrays.asList(\"xwiki\", \"authenticate\", \"reset\"), resourceReference.getParameters())\n );\n XWikiURLFactory urlFactory = mock(XWikiURLFactory.class);\n when(this.context.getURLFactory()).thenReturn(urlFactory);\n when(urlFactory.getServerURL(this.context)).thenReturn(new URL(\"http://xwiki.org\"));\n\n InternetAddress email = new InternetAddress(\"foobar@xwiki.org\");\n DefaultResetPasswordRequestResponse requestResponse =\n new DefaultResetPasswordRequestResponse(this.userReference, email,\n verificationCode);\n this.resetPasswordManager.sendResetPasswordEmailRequest(requestResponse);\n verify(this.resetPasswordMailSender).sendResetPasswordEmail(\"Foo Bar\", email,\n new URL(\"http://xwiki.org/xwiki/authenticate/reset?u=user%3AFoobar&v=foobar4242\"));\n }", "label_name": "CWE-640", "label": 640}
{"code": " void allReservedCharacters() {\n final PathAndQuery res = PathAndQuery.parse(\"/#/:[]@!$&'()*+,;=?a=/#/:[]@!$&'()*+,;=\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/#/:[]@!$&'()*+,;=\");\n assertThat(res.query()).isEqualTo(\"a=/#/:[]@!$&'()*+,;=\");\n\n final PathAndQuery res2 =\n PathAndQuery.parse(\"/%23%2F%3A%5B%5D%40%21%24%26%27%28%29%2A%2B%2C%3B%3D%3F\" +\n \"?a=%23%2F%3A%5B%5D%40%21%24%26%27%28%29%2A%2B%2C%3B%3D%3F\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/#%2F:[]@!$&'()*+,;=?\");\n assertThat(res2.query()).isEqualTo(\"a=%23%2F%3A%5B%5D%40%21%24%26%27%28%29%2A%2B%2C%3B%3D%3F\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void testBourneShellQuotingCharacters()\n throws Exception\n {\n // { ' ', '$', ';', '&', '|', '<', '>', '*', '?', '(', ')' };\n // test with values http://steve-parker.org/sh/bourne.shtml Appendix B - Meta-characters and Reserved Words\n Commandline commandline = new Commandline( newShell() );\n commandline.setExecutable( \"chmod\" );\n commandline.getShell().setQuotedArgumentsEnabled( true );\n commandline.createArg().setValue( \" \" );\n commandline.createArg().setValue( \"|\" );\n commandline.createArg().setValue( \"&&\" );\n commandline.createArg().setValue( \"||\" );\n commandline.createArg().setValue( \";\" );\n commandline.createArg().setValue( \";;\" );\n commandline.createArg().setValue( \"&\" );\n commandline.createArg().setValue( \"()\" );\n commandline.createArg().setValue( \"<\" );\n commandline.createArg().setValue( \"<<\" );\n commandline.createArg().setValue( \">\" );\n commandline.createArg().setValue( \">>\" );\n commandline.createArg().setValue( \"*\" );\n commandline.createArg().setValue( \"?\" );\n commandline.createArg().setValue( \"[\" );\n commandline.createArg().setValue( \"]\" );\n commandline.createArg().setValue( \"{\" );\n commandline.createArg().setValue( \"}\" );\n commandline.createArg().setValue( \"`\" );\n\n String[] lines = commandline.getShellCommandline();\n System.out.println( Arrays.asList( lines ) );\n\n assertEquals( \"/bin/sh\", lines[0] );\n assertEquals( \"-c\", lines[1] );\n assertEquals( \"chmod ' ' '|' '&&' '||' ';' ';;' '&' '()' '<' '<<' '>' '>>' '*' '?' '[' ']' '{' '}' '`'\",\n lines[2] );\n\n }", "label_name": "CWE-78", "label": 78}
{"code": " private ModelAndView renameGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {\n \n String oldName = request.getParameter(\"groupName\");\n String newName = request.getParameter(\"newName\");\n \n if (StringUtils.hasText(oldName) && StringUtils.hasText(newName)) {\n m_groupRepository.renameGroup(oldName, newName);\n }\n \n return listGroups(request, response);\n }", "label_name": "CWE-79", "label": 79}
{"code": " private void testKeyFactory(ECPublicKey pub, ECPrivateKey priv)\n throws Exception\n {\n KeyFactory ecFact = KeyFactory.getInstance(\"ECDSA\");\n\n ECPublicKeySpec pubSpec = (ECPublicKeySpec)ecFact.getKeySpec(pub, ECPublicKeySpec.class);\n ECPrivateKeySpec privSpec = (ECPrivateKeySpec)ecFact.getKeySpec(priv, ECPrivateKeySpec.class);\n\n if (!pubSpec.getW().equals(pub.getW()) || !pubSpec.getParams().getCurve().equals(pub.getParams().getCurve()))\n {\n fail(\"pubSpec not correct\");\n }\n\n if (!privSpec.getS().equals(priv.getS()) || !privSpec.getParams().getCurve().equals(priv.getParams().getCurve()))\n {\n fail(\"privSpec not correct\");\n }\n\n ECPublicKey pubKey = (ECPublicKey)ecFact.translateKey(pub);\n ECPrivateKey privKey = (ECPrivateKey)ecFact.translateKey(priv);\n\n if (!pubKey.getW().equals(pub.getW()) || !pubKey.getParams().getCurve().equals(pub.getParams().getCurve()))\n {\n fail(\"pubKey not correct\");\n }\n\n if (!privKey.getS().equals(priv.getS()) || !privKey.getParams().getCurve().equals(priv.getParams().getCurve()))\n {\n fail(\"privKey not correct\");\n }\n }", "label_name": "CWE-347", "label": 347}
{"code": " private Template getClassloaderTemplate(ClassLoader classloader, String suffixPath, String templateName)\n {\n String templatePath = suffixPath + templateName;\n\n URL url = classloader.getResource(templatePath);\n\n return url != null ? new ClassloaderTemplate(new ClassloaderResource(url, templateName)) : null;\n }", "label_name": "CWE-22", "label": 22}
{"code": " void requestResetPasswordNoEmail() throws Exception\n {\n when(this.userManager.exists(this.userReference)).thenReturn(true);\n String exceptionMessage = \"User has no email address.\";\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noEmail\"))\n .thenReturn(exceptionMessage);\n ResetPasswordException resetPasswordException = assertThrows(ResetPasswordException.class,\n () -> this.resetPasswordManager.requestResetPassword(this.userReference));\n assertEquals(exceptionMessage, resetPasswordException.getMessage());\n }", "label_name": "CWE-640", "label": 640}
{"code": " private static boolean pathContainsDoubleDots(Bytes path) {\n final int length = path.length;\n byte b0 = 0;\n byte b1 = 0;\n byte b2 = '/';\n for (int i = 1; i < length; i++) {\n final byte b3 = path.data[i];\n if (b3 == '/' && b2 == '.' && b1 == '.' && b0 == '/') {\n return true;\n }\n b0 = b1;\n b1 = b2;\n b2 = b3;\n }\n\n return b0 == '/' && b1 == '.' && b2 == '.';\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void testWrapMemoryMapped() throws Exception {\n File file = File.createTempFile(\"netty-test\", \"tmp\");\n FileChannel output = null;\n FileChannel input = null;\n ByteBuf b1 = null;\n ByteBuf b2 = null;\n\n try {\n output = new RandomAccessFile(file, \"rw\").getChannel();\n byte[] bytes = new byte[1024];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n output.write(ByteBuffer.wrap(bytes));\n\n input = new RandomAccessFile(file, \"r\").getChannel();\n ByteBuffer m = input.map(FileChannel.MapMode.READ_ONLY, 0, input.size());\n\n b1 = buffer(m);\n\n ByteBuffer dup = m.duplicate();\n dup.position(2);\n dup.limit(4);\n\n b2 = buffer(dup);\n\n Assert.assertEquals(b2, b1.slice(2, 2));\n } finally {\n if (b1 != null) {\n b1.release();\n }\n if (b2 != null) {\n b2.release();\n }\n if (output != null) {\n output.close();\n }\n if (input != null) {\n input.close();\n }\n file.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " public static Document toXml(final List list) {\n final Element root = new Element(\"payload-list\");\n for (final IBaseDataObject d : list) {\n final Document doc = toXml(d);\n root.addContent(doc.detachRootElement());\n logger.debug(\"Adding xml content for \" + d.shortName() + \" to document\");\n }\n final Document doc = new Document(root);\n return doc;\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tprivate Document parseXml(String xmlContent) {\n\t\ttry {\n\t\t\tDocumentBuilder builder = DocumentBuilderFactory.newInstance().newDocumentBuilder();\n\t\t\tDocument document = builder.parse(new InputSource(new StringReader(xmlContent)));\n\n\t\t\tdocument.getDocumentElement().normalize();\n\n\t\t\treturn document;\n\t\t} catch (Exception e) {\n\t\t\tthrow new JadxRuntimeException(\"Can not parse xml content\", e);\n\t\t}\n\t}", "label_name": "CWE-611", "label": 611}
{"code": " public boolean equals(Object o)\n {\n if (this == o) {\n return true;\n }\n\n if (o == null || getClass() != o.getClass()) {\n return false;\n }\n\n DefaultResetPasswordRequestResponse that = (DefaultResetPasswordRequestResponse) o;\n\n return new EqualsBuilder()\n .append(userReference, that.userReference)\n .append(userEmail, that.userEmail)\n .append(verificationCode, that.verificationCode)\n .isEquals();\n }", "label_name": "CWE-640", "label": 640}
{"code": " public void initWithcustomAccessRestrictor() throws ServletException {\n prepareStandardInitialisation();\n servlet.destroy();\n }", "label_name": "CWE-79", "label": 79}
{"code": " private static File newFile() throws IOException {\n File file = File.createTempFile(\"netty-\", \".tmp\");\n file.deleteOnExit();\n\n final FileOutputStream out = new FileOutputStream(file);\n out.write(data);\n out.close();\n return file;\n }", "label_name": "CWE-378", "label": 378}
{"code": " public void clientIdChanged(ClientModel client, String newClientId) {\n logger.debugf(\"Updating clientId from '%s' to '%s'\", client.getClientId(), newClientId);\n\n UserModel serviceAccountUser = realmManager.getSession().users().getServiceAccount(client);\n if (serviceAccountUser != null) {\n String username = ServiceAccountConstants.SERVICE_ACCOUNT_USER_PREFIX + newClientId;\n serviceAccountUser.setUsername(username);\n serviceAccountUser.setEmail(username + \"@placeholder.org\");\n }\n }", "label_name": "CWE-798", "label": 798}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t\tint result = cipher.update(plaintext, plaintextOffset, length, ciphertext, ciphertextOffset);\n\t\t\tcipher.doFinal(ciphertext, ciphertextOffset + result);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public static byte[] serializeToBytes(final Object payload) throws IOException {\n final ByteArrayOutputStream bos = new ByteArrayOutputStream();\n serializeToStream(bos, payload);\n return bos.toByteArray();\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic boolean importWiki(File file, String filename, File targetDirectory) {\n\t\ttry {\n\t\t\tPath path = FileResource.getResource(file, filename);\n\t\t\tif(path == null) {\n\t\t\t\treturn false;\n\t\t\t}\n\t\t\t\n\t\t\tPath destDir = targetDirectory.toPath();\n\t\t\tFiles.walkFileTree(path, new ImportVisitor(destDir));\n\t\t\tPathUtils.closeSubsequentFS(path);\n\t\t\treturn true;\n\t\t} catch (IOException e) {\n\t\t\tlog.error(\"\", e);\n\t\t\treturn false;\n\t\t}\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public XMLReader getXMLReader() throws SAXException {\n if (xmlReader == null) {\n xmlReader = createXMLReader();\n }\n\n return xmlReader;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t\tint result = cipher.update(plaintext, plaintextOffset, length, ciphertext, ciphertextOffset);\n\t\t\tcipher.doFinal(ciphertext, ciphertextOffset + result);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " protected BigDecimal bcdToBigDecimal() {\n if (usingBytes) {\n // Converting to a string here is faster than doing BigInteger/BigDecimal arithmetic.\n BigDecimal result = new BigDecimal(toNumberString());\n if (isNegative()) {\n result = result.negate();\n }\n return result;\n } else {\n long tempLong = 0L;\n for (int shift = (precision - 1); shift >= 0; shift--) {\n tempLong = tempLong * 10 + getDigitPos(shift);\n }\n BigDecimal result = BigDecimal.valueOf(tempLong);\n result = result.scaleByPowerOfTen(scale);\n if (isNegative())\n result = result.negate();\n return result;\n }\n }", "label_name": "CWE-190", "label": 190}
{"code": "\tpublic PersistentTask updateTask(Task task, Serializable runnableTask, Identity modifier, Date scheduledDate) {\n\t\tPersistentTask ptask = dbInstance.getCurrentEntityManager()\n\t\t\t\t.find(PersistentTask.class, task.getKey(), LockModeType.PESSIMISTIC_WRITE);\n\t\tif(ptask != null) {\n\t\t\tptask.setLastModified(new Date());\n\t\t\tptask.setScheduledDate(scheduledDate);\n\t\t\tptask.setStatus(TaskStatus.newTask);\n\t\t\tptask.setStatusBeforeEditStr(null);\n\t\t\tptask.setTask(xstream.toXML(runnableTask));\n\n\t\t\tptask = dbInstance.getCurrentEntityManager().merge(ptask);\n\t\t\tif(modifier != null) {\n\t\t\t\t//add to the list of modifier\n\t\t\t\tPersistentTaskModifier mod = new PersistentTaskModifier();\n\t\t\t\tmod.setCreationDate(new Date());\n\t\t\t\tmod.setModifier(modifier);\n\t\t\t\tmod.setTask(ptask);\n\t\t\t\tdbInstance.getCurrentEntityManager().persist(mod);\n\t\t\t}\n\t\t\tdbInstance.commit();\n\t\t}\n\t\treturn ptask;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public SAXReader(DocumentFactory factory, boolean validating) {\n this.factory = factory;\n this.validating = validating;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprivate final HColor getBackColor(UmlDiagramType umlDiagramType, Style style) {\n\t\tif (EntityUtils.groupRoot(group))\n\t\t\treturn null;\n\n\t\tfinal HColor result = group.getColors().getColor(ColorType.BACK);\n\t\tif (result != null)\n\t\t\treturn result;\n\n\t\tfinal Stereotype stereo = group.getStereotype();\n\n\t\tif (UseStyle.useBetaStyle())\n\t\t\treturn style.value(PName.BackGroundColor).asColor(skinParam.getThemeStyle(), skinParam.getIHtmlColorSet());\n\n\t\tfinal USymbol sym = group.getUSymbol() == null ? USymbols.PACKAGE : group.getUSymbol();\n\t\tfinal ColorParam backparam = umlDiagramType == UmlDiagramType.ACTIVITY ? ColorParam.partitionBackground\n\t\t\t\t: sym.getColorParamBack();\n\t\tfinal HColor c1 = skinParam.getHtmlColor(backparam, stereo, false);\n\t\tif (c1 != null)\n\t\t\treturn c1;\n\n\t\tif (parentCluster == null)\n\t\t\treturn null;\n\n\t\treturn parentCluster.getBackColor(umlDiagramType, style);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic XssHttpServletRequestWrapper(HttpServletRequest request) {\n\t\tsuper(request);\n\t}", "label_name": "CWE-79", "label": 79}
{"code": " public static String decodePath(String path) {\n if (path.indexOf('%') < 0) {\n // No need to decoded; not percent-encoded\n return path;\n }\n\n // Decode percent-encoded characters.\n // An invalid character is replaced with 0xFF, which will be replaced into '\ufffd' by UTF-8 decoder.\n final int len = path.length();\n try (TemporaryThreadLocals tempThreadLocals = TemporaryThreadLocals.acquire()) {\n final byte[] buf = tempThreadLocals.byteArray(len);\n int dstLen = 0;\n for (int i = 0; i < len; i++) {\n final char ch = path.charAt(i);\n if (ch != '%') {\n buf[dstLen++] = (byte) ((ch & 0xFF80) == 0 ? ch : 0xFF);\n continue;\n }\n\n // Decode a percent-encoded character.\n final int hexEnd = i + 3;\n if (hexEnd > len) {\n // '%' or '%x' (must be followed by two hexadigits)\n buf[dstLen++] = (byte) 0xFF;\n break;\n }\n\n final int digit1 = decodeHexNibble(path.charAt(++i));\n final int digit2 = decodeHexNibble(path.charAt(++i));\n if (digit1 < 0 || digit2 < 0) {\n // The first or second digit is not hexadecimal.\n buf[dstLen++] = (byte) 0xFF;\n } else {\n buf[dstLen++] = (byte) ((digit1 << 4) | digit2);\n }\n }\n\n return new String(buf, 0, dstLen, StandardCharsets.UTF_8);\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic void saveCustomConfigAndCompileCSS(Map> customConfig, CourseEnvironment courseEnvironment){\n\t\tVFSContainer themeBase = null;\n\t\tVFSContainer base = null;\n\t\tbase = (VFSContainer) courseEnvironment.getCourseBaseContainer().resolve(CourseLayoutHelper.LAYOUT_COURSE_SUBFOLDER);\n\t\tif (base == null) {\n\t\t\tbase = courseEnvironment.getCourseBaseContainer().createChildContainer(CourseLayoutHelper.LAYOUT_COURSE_SUBFOLDER);\n\t\t}\n\t\tthemeBase = (VFSContainer) base.resolve(\"/\" + CourseLayoutHelper.CONFIG_KEY_CUSTOM);\n\t\tif (themeBase == null) {\n\t\t\tthemeBase = base.createChildContainer(CourseLayoutHelper.CONFIG_KEY_CUSTOM);\n\t\t}\n\t\tVFSLeaf configTarget = (VFSLeaf) themeBase.resolve(CUSTOM_CONFIG_XML);\n\t\tif (configTarget == null) {\n\t\t\tconfigTarget = themeBase.createChildLeaf(CUSTOM_CONFIG_XML);\n\t\t} \n\t\t\n\t\tXStream xStream = XStreamHelper.createXStreamInstance();\n\t\txStream.toXML(customConfig, configTarget.getOutputStream(false));\n\t\t\n\t\t// compile the css-files\n\t\tStringBuilder sbMain = new StringBuilder();\n\t\tStringBuilder sbIFrame = new StringBuilder();\n\t\tfor (Entry> iterator : customConfig.entrySet()) {\n\t\t\tString type = iterator.getKey();\n\t\t\tMap elementConfig = iterator.getValue();\t\t\t\n\t\t AbstractLayoutElement configuredLayEl = createLayoutElementByType(type, elementConfig);\n\t\t\tsbIFrame.append(configuredLayEl.getCSSForIFrame());\t\n\t\t\tsbMain.append(configuredLayEl.getCSSForMain());\t\n\t\t}\n\t\t\n\t\t// attach line for logo, if there is any to cssForMain:\n\t\tappendLogoPart(sbMain, themeBase);\n\t\t\n\t\tVFSLeaf mainFile = (VFSLeaf) themeBase.resolve(MAIN_CSS);\n\t\tif (mainFile == null) mainFile = themeBase.createChildLeaf(MAIN_CSS);\n\t\tVFSLeaf iFrameFile = (VFSLeaf) themeBase.resolve(IFRAME_CSS);\n\t\tif (iFrameFile == null) iFrameFile = themeBase.createChildLeaf(IFRAME_CSS);\n\t\tFileUtils.save(mainFile.getOutputStream(false), sbMain.toString(), \"utf-8\");\n\t\tFileUtils.save(iFrameFile.getOutputStream(false), sbIFrame.toString(), \"utf-8\");\t\t\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " setStringInputSource(ThreadContext context, IRubyObject data, IRubyObject url)\n {\n source = new InputSource();\n ParserContext.setUrl(context, source, url);\n\n Ruby ruby = context.getRuntime();\n\n if (!(data instanceof RubyString)) {\n throw ruby.newArgumentError(\"must be kind_of String\");\n }\n\n RubyString stringData = (RubyString) data;\n\n if (stringData.encoding(context) != null) {\n RubyString stringEncoding = stringData.encoding(context).asString();\n String encName = NokogiriHelpers.getValidEncodingOrNull(stringEncoding);\n if (encName != null) {\n java_encoding = encName;\n }\n }\n\n ByteList bytes = stringData.getByteList();\n\n stringDataSize = bytes.length() - bytes.begin();\n ByteArrayInputStream stream = new ByteArrayInputStream(bytes.unsafeBytes(), bytes.begin(), bytes.length());\n source.setByteStream(stream);\n source.setEncoding(java_encoding);\n }", "label_name": "CWE-241", "label": 241}
{"code": " public TMap readMapBegin() throws TException {\n int size = readVarint32();\n byte keyAndValueType = size == 0 ? 0 : readByte();\n return new TMap(\n getTType((byte) (keyAndValueType >> 4)), getTType((byte) (keyAndValueType & 0xf)), size);\n }", "label_name": "CWE-770", "label": 770}
{"code": "\tpublic Response attachTaskFile(@PathParam(\"courseId\") Long courseId, @PathParam(\"nodeId\") String nodeId,\n\t\t\t@Context HttpServletRequest request) {\n\t\t\tICourse course = CoursesWebService.loadCourse(courseId);\n\t\tCourseEditorTreeNode parentNode = getParentNode(course, nodeId);\n\t\tif(course == null) {\n\t\t\treturn Response.serverError().status(Status.NOT_FOUND).build();\n\t\t}\n\t\tif(parentNode == null) {\n\t\t\treturn Response.serverError().status(Status.NOT_FOUND).build();\n\t\t} else if(!(parentNode.getCourseNode() instanceof TACourseNode)) {\n\t\t\treturn Response.serverError().status(Status.NOT_ACCEPTABLE).build();\n\t\t}\n\t\tif (!isAuthorEditor(course, request)) {\n\t\t\treturn Response.serverError().status(Status.UNAUTHORIZED).build();\n\t\t}\n\n\t\tInputStream in = null;\n\t\tMultipartReader reader = null;\n\t\ttry {\n\t\t\treader = new MultipartReader(request);\n\t\t\tString filename = reader.getValue(\"filename\", \"task\");\n\t\t\tString taskFolderPath = TACourseNode.getTaskFolderPathRelToFolderRoot(course, parentNode.getCourseNode());\n\t\t\tVFSContainer taskFolder = VFSManager.olatRootContainer(taskFolderPath, null);\n\t\t\tVFSLeaf singleFile = (VFSLeaf) taskFolder.resolve(\"/\" + filename);\n\t\t\tif (singleFile == null) {\n\t\t\t\tsingleFile = taskFolder.createChildLeaf(\"/\" + filename);\n\t\t\t}\n\t\t\tFile file = reader.getFile();\n\t\t\tif(file != null) {\n\t\t\t\tin = new FileInputStream(file);\n\t\t\t\tOutputStream out = singleFile.getOutputStream(false);\n\t\t\t\tIOUtils.copy(in, out);\n\t\t\t\tIOUtils.closeQuietly(out);\n\t\t\t} else {\n\t\t\t\treturn Response.status(Status.NOT_ACCEPTABLE).build();\n\t\t\t}\n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"\", e);\n\t\t\treturn Response.serverError().status(Status.INTERNAL_SERVER_ERROR).build();\n\t\t} finally {\n\t\t\tMultipartReader.closeQuietly(reader);\n\t\t\tIOUtils.closeQuietly(in);\n\t\t}\n\t\t\n\t\treturn Response.ok().build();\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " void plus() {\n final PathAndQuery res = PathAndQuery.parse(\"/+?a+b=c+d\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/+\");\n assertThat(res.query()).isEqualTo(\"a+b=c+d\");\n\n final PathAndQuery res2 = PathAndQuery.parse(\"/%2b?a%2bb=c%2bd\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/+\");\n assertThat(res2.query()).isEqualTo(\"a%2Bb=c%2Bd\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " public TSet readSetBegin() throws TException {\n return new TSet(readByte(), readI32());\n }", "label_name": "CWE-770", "label": 770}
{"code": " private Template getClassloaderTemplate(String suffixPath, String templateName)\n {\n return getClassloaderTemplate(Thread.currentThread().getContextClassLoader(), suffixPath, templateName);\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tfinal protected CommandExecutionResult executeArg(TimingDiagram diagram, LineLocation location, RegexResult arg) {\n\t\tfinal String compact = arg.get(\"COMPACT\", 0);\n\t\tfinal String code = arg.get(\"CODE\", 0);\n\t\tfinal String full = arg.get(\"FULL\", 0);\n\t\treturn diagram.createBinary(code, full, compact != null);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\t\tpublic void configure(ICourse course, CourseNode newNode, ModuleConfiguration moduleConfig) {\n\t\t\t\n\t\t\tif(displayType != null && (STCourseNodeEditController.CONFIG_VALUE_DISPLAY_TOC.equals(displayType)\n\t\t\t\t\t|| STCourseNodeEditController.CONFIG_VALUE_DISPLAY_PEEKVIEW.equals(displayType)\n\t\t\t\t\t|| STCourseNodeEditController.CONFIG_VALUE_DISPLAY_FILE.equals(displayType))) {\n\t\t\t\tmoduleConfig.setStringValue(STCourseNodeEditController.CONFIG_KEY_DISPLAY_TYPE, displayType);\n\t\t\t}\n\t\t\t\n\t\t\tif(STCourseNodeEditController.CONFIG_VALUE_DISPLAY_FILE.equals(moduleConfig.getStringValue(STCourseNodeEditController.CONFIG_KEY_DISPLAY_TYPE))) {\n\t\t\t\tif(in != null && StringHelper.containsNonWhitespace(filename)) {\n\t\t\t\t\tVFSContainer rootContainer = course.getCourseFolderContainer();\n\t\t\t\t\tVFSLeaf singleFile = (VFSLeaf) rootContainer.resolve(\"/\" + filename);\n\t\t\t\t\tif (singleFile == null) {\n\t\t\t\t\t\tsingleFile = rootContainer.createChildLeaf(\"/\" + filename);\n\t\t\t\t\t}\n\t\n\t\t\t\t\tmoduleConfig.set(STCourseNodeEditController.CONFIG_KEY_FILE, \"/\" + filename);\n\t\t\t\t\tOutputStream out = singleFile.getOutputStream(false);\n\t\t\t\t\tFileUtils.copy(in, out);\n\t\t\t\t\tFileUtils.closeSafely(out);\n\t\t\t\t\tFileUtils.closeSafely(in);\n\t\t\t\t} else if (StringHelper.containsNonWhitespace(filename)) {\n\t\t\t\t\tVFSContainer rootContainer = course.getCourseFolderContainer();\n\t\t\t\t\tVFSLeaf singleFile = (VFSLeaf) rootContainer.resolve(\"/\" + filename);\n\t\t\t\t\tif(singleFile != null) {\n\t\t\t\t\t\tmoduleConfig.set(STCourseNodeEditController.CONFIG_KEY_FILE, \"/\" + filename);\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}", "label_name": "CWE-22", "label": 22}
{"code": " public static final void testClosedArray() {\n // Discovered by fuzzer with seed -Dfuzz.seed=df3b4778ce54d00a\n assertSanitized(\"-1742461140214282\", \"\\ufeff-01742461140214282]\");\n }", "label_name": "CWE-611", "label": 611}
{"code": " void semicolon() {\n final PathAndQuery res = PathAndQuery.parse(\"/;?a=b;c=d\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/;\");\n assertThat(res.query()).isEqualTo(\"a=b;c=d\");\n\n // '%3B' in a query string should never be decoded into ';'.\n final PathAndQuery res2 = PathAndQuery.parse(\"/%3b?a=b%3Bc=d\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/;\");\n assertThat(res2.query()).isEqualTo(\"a=b%3Bc=d\");\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic RefUpdated uploadFiles(Collection uploads, String directory, String commitMessage) {\r\n\t\tMap newBlobs = new HashMap<>();\r\n\t\t\r\n\t\tString parentPath = getDirectory();\r\n\t\t\r\n\t\tif (directory != null) { \r\n\t\t\tif (parentPath != null)\r\n\t\t\t\tparentPath += \"/\" + directory;\r\n\t\t\telse\r\n\t\t\t\tparentPath = directory;\r\n\t\t}\r\n\t\t\r\n\t\tUser user = Preconditions.checkNotNull(SecurityUtils.getUser());\r\n\t\tBlobIdent blobIdent = getBlobIdent();\r\n\t\t\r\n\t\tfor (FileUpload upload: uploads) {\r\n\t\t\tString blobPath = upload.getClientFileName();\r\n\t\t\tif (parentPath != null)\r\n\t\t\t\tblobPath = parentPath + \"/\" + blobPath;\r\n\t\t\t\r\n\t\t\tif (getProject().isReviewRequiredForModification(user, blobIdent.revision, blobPath)) \r\n\t\t\t\tthrow new BlobEditException(\"Review required for this change. Please submit pull request instead\");\r\n\t\t\telse if (getProject().isBuildRequiredForModification(user, blobIdent.revision, blobPath)) \r\n\t\t\t\tthrow new BlobEditException(\"Build required for this change. Please submit pull request instead\");\r\n\t\t\t\r\n\t\t\tBlobContent blobContent = new BlobContent.Immutable(upload.getBytes(), FileMode.REGULAR_FILE);\r\n\t\t\tnewBlobs.put(blobPath, blobContent);\r\n\t\t}\r\n\r\n\t\tBlobEdits blobEdits = new BlobEdits(Sets.newHashSet(), newBlobs);\r\n\t\tString refName = blobIdent.revision!=null?GitUtils.branch2ref(blobIdent.revision):\"refs/heads/master\";\r\n\r\n\t\tObjectId prevCommitId;\r\n\t\tif (blobIdent.revision != null)\r\n\t\t\tprevCommitId = getProject().getRevCommit(blobIdent.revision, true).copy();\r\n\t\telse\r\n\t\t\tprevCommitId = ObjectId.zeroId();\r\n\r\n\t\twhile (true) {\r\n\t\t\ttry {\r\n\t\t\t\tObjectId newCommitId = blobEdits.commit(getProject().getRepository(), refName, prevCommitId, \r\n\t\t\t\t\t\tprevCommitId, user.asPerson(), commitMessage);\r\n\t\t\t\treturn new RefUpdated(getProject(), refName, prevCommitId, newCommitId);\r\n\t\t\t} catch (ObjectAlreadyExistsException|NotTreeException e) {\r\n\t\t\t\tthrow new BlobEditException(e.getMessage());\r\n\t\t\t} catch (ObsoleteCommitException e) {\r\n\t\t\t\tprevCommitId = e.getOldCommitId();\r\n\t\t\t}\r\n\t\t}\r\n\t}\r", "label_name": "CWE-434", "label": 434}
{"code": " public boolean isStringInternEnabled() {\n return stringInternEnabled;\n }", "label_name": "CWE-611", "label": 611}
{"code": " protected void onStart() {\n super.onStart();\n Intent intent = getIntent();\n intent.putExtra(\n SettingsActivity.SP_FEED_LIST_LAYOUT,\n mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT, \"0\")\n );\n setResult(RESULT_OK,intent);\n }", "label_name": "CWE-829", "label": 829}
{"code": " public void testReadBytesAndWriteBytesWithFileChannel() throws IOException {\n File file = File.createTempFile(\"file-channel\", \".tmp\");\n RandomAccessFile randomAccessFile = null;\n try {\n randomAccessFile = new RandomAccessFile(file, \"rw\");\n FileChannel channel = randomAccessFile.getChannel();\n // channelPosition should never be changed\n long channelPosition = channel.position();\n\n byte[] bytes = {'a', 'b', 'c', 'd'};\n int len = bytes.length;\n ByteBuf buffer = newBuffer(len);\n buffer.resetReaderIndex();\n buffer.resetWriterIndex();\n buffer.writeBytes(bytes);\n\n int oldReaderIndex = buffer.readerIndex();\n assertEquals(len, buffer.readBytes(channel, 10, len));\n assertEquals(oldReaderIndex + len, buffer.readerIndex());\n assertEquals(channelPosition, channel.position());\n\n ByteBuf buffer2 = newBuffer(len);\n buffer2.resetReaderIndex();\n buffer2.resetWriterIndex();\n int oldWriterIndex = buffer2.writerIndex();\n assertEquals(len, buffer2.writeBytes(channel, 10, len));\n assertEquals(channelPosition, channel.position());\n assertEquals(oldWriterIndex + len, buffer2.writerIndex());\n assertEquals('a', buffer2.getByte(0));\n assertEquals('b', buffer2.getByte(1));\n assertEquals('c', buffer2.getByte(2));\n assertEquals('d', buffer2.getByte(3));\n buffer.release();\n buffer2.release();\n } finally {\n if (randomAccessFile != null) {\n randomAccessFile.close();\n }\n file.delete();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": "\tpublic void testMatchTwoTypes() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyTypes(KeyType.RSA, KeyType.EC).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build()));\n\t\tassertTrue(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"kty=[RSA, EC]\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(enciv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ enciv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencryptCTR(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public void testGetBytesAndSetBytesWithFileChannel() throws IOException {\n File file = File.createTempFile(\"file-channel\", \".tmp\");\n RandomAccessFile randomAccessFile = null;\n try {\n randomAccessFile = new RandomAccessFile(file, \"rw\");\n FileChannel channel = randomAccessFile.getChannel();\n // channelPosition should never be changed\n long channelPosition = channel.position();\n\n byte[] bytes = {'a', 'b', 'c', 'd'};\n int len = bytes.length;\n ByteBuf buffer = newBuffer(len);\n buffer.resetReaderIndex();\n buffer.resetWriterIndex();\n buffer.writeBytes(bytes);\n\n int oldReaderIndex = buffer.readerIndex();\n assertEquals(len, buffer.getBytes(oldReaderIndex, channel, 10, len));\n assertEquals(oldReaderIndex, buffer.readerIndex());\n assertEquals(channelPosition, channel.position());\n\n ByteBuf buffer2 = newBuffer(len);\n buffer2.resetReaderIndex();\n buffer2.resetWriterIndex();\n int oldWriterIndex = buffer2.writerIndex();\n assertEquals(buffer2.setBytes(oldWriterIndex, channel, 10, len), len);\n assertEquals(channelPosition, channel.position());\n\n assertEquals(oldWriterIndex, buffer2.writerIndex());\n assertEquals('a', buffer2.getByte(oldWriterIndex));\n assertEquals('b', buffer2.getByte(oldWriterIndex + 1));\n assertEquals('c', buffer2.getByte(oldWriterIndex + 2));\n assertEquals('d', buffer2.getByte(oldWriterIndex + 3));\n\n buffer.release();\n buffer2.release();\n } finally {\n if (randomAccessFile != null) {\n randomAccessFile.close();\n }\n file.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": "\tprivate void saveToFile(VFSLeaf glossaryFile, List glossaryItemArr) {\n\t\t// cdata-tags should be used instead of strings, overwrite writer.\n\t\tglossaryItemArr = removeEmptyGlossaryItems(glossaryItemArr);\n\t\tXStreamHelper.writeObject(xstreamWriter, glossaryFile, glossaryItemArr);\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " private XMLGregorianCalendar toXMLGregorianCalendar(ZonedDateTime instant) {\n if (instant == null) {\n return null;\n }\n\n return new XMLGregorianCalendarImpl(GregorianCalendar.from(instant));\n }", "label_name": "CWE-611", "label": 611}
{"code": " public int addFileName(String file) {\n workUnitList.add(new WorkUnit(file));\n return size();\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic OutputStream getOutputStream(boolean append) {\n\t\treturn null;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public void testGetShellCommandLineBash()\n throws Exception\n {\n Commandline cmd = new Commandline( new BourneShell() );\n cmd.setExecutable( \"/bin/echo\" );\n cmd.addArguments( new String[] {\n \"hello world\"\n } );\n\n String[] shellCommandline = cmd.getShellCommandline();\n\n assertEquals( \"Command line size\", 3, shellCommandline.length );\n\n assertEquals( \"/bin/sh\", shellCommandline[0] );\n assertEquals( \"-c\", shellCommandline[1] );\n String expectedShellCmd = \"/bin/echo \\'hello world\\'\";\n if ( Os.isFamily( Os.FAMILY_WINDOWS ) )\n {\n expectedShellCmd = \"\\\\bin\\\\echo \\'hello world\\'\";\n }\n assertEquals( expectedShellCmd, shellCommandline[2] );\n }", "label_name": "CWE-78", "label": 78}
{"code": " public static File createTempFile(String prefix, String suffix, File directory) throws IOException {\n if (javaVersion() >= 7) {\n if (directory == null) {\n return Files.createTempFile(prefix, suffix).toFile();\n }\n return Files.createTempFile(directory.toPath(), prefix, suffix).toFile();\n }\n if (directory == null) {\n return File.createTempFile(prefix, suffix);\n }\n File file = File.createTempFile(prefix, suffix, directory);\n // Try to adjust the perms, if this fails there is not much else we can do...\n file.setReadable(false, false);\n file.setReadable(true, true);\n return file;\n }", "label_name": "CWE-379", "label": 379}
{"code": "\tpublic void testSelectByType() {\n\n\t\tJWKSelector selector = new JWKSelector(new JWKMatcher.Builder().keyType(KeyType.RSA).build());\n\n\t\tList keyList = new ArrayList<>();\n\t\tkeyList.add(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build());\n\t\tkeyList.add(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build());\n\n\t\tJWKSet jwkSet = new JWKSet(keyList);\n\n\t\tList matches = selector.select(jwkSet);\n\n\t\tRSAKey key1 = (RSAKey)matches.get(0);\n\t\tassertEquals(KeyType.RSA, key1.getKeyType());\n\t\tassertEquals(\"1\", key1.getKeyID());\n\n\t\tassertEquals(1, matches.size());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tprotected SymbolContext getContextLegacy() {\n\t\treturn new SymbolContext(HColorUtils.COL_D7E0F2, HColorUtils.COL_038048).withStroke(new UStroke(1.5));\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tprotected StyleSignatureBasic getStyleSignature() {\n\t\tif (type == TimingStyle.CONCISE)\n\t\t\treturn StyleSignatureBasic.of(SName.root, SName.element, SName.timingDiagram, SName.concise);\n\t\tif (type == TimingStyle.ROBUST)\n\t\t\treturn StyleSignatureBasic.of(SName.root, SName.element, SName.timingDiagram, SName.robust);\n\t\tthrow new IllegalStateException();\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private ZonedDateTime toZonedDateTime(XMLGregorianCalendar instant) {\n if (instant == null) {\n return null;\n }\n\n return instant.toGregorianCalendar().toZonedDateTime();\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprivate List loadGlossaryItemListFromFile(VFSLeaf glossaryFile) {\n\t\tList glossaryItemList = new ArrayList<>();\n\t\tif (glossaryFile == null) { return new ArrayList<>(); }\n\t\t\n\t\tObject glossObj = XStreamHelper.readObject(xstreamReader, glossaryFile);\n\t\tif (glossObj instanceof ArrayList) {\n\t\t\tArrayList glossItemsFromFile = (ArrayList) glossObj;\n\t\t\tglossaryItemList.addAll(glossItemsFromFile);\n\t\t} else {\n\t\t\tlog.error(\"The Glossary-XML-File \" + glossaryFile.toString() + \" seems not to be correct!\");\n\t\t}\n\n\t\tCollections.sort(glossaryItemList);\n\t\treturn glossaryItemList;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public boolean isIgnoreComments() {\n return ignoreComments;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic String getOrderBy() {\n\t\treturn orderBy;\n\t}", "label_name": "CWE-89", "label": 89}
{"code": " public void create_withNullThreadPool() throws Exception {\n final JettyServerFactory jettyServerFactory = mock(JettyServerFactory.class);\n final StaticFilesConfiguration staticFilesConfiguration = mock(StaticFilesConfiguration.class);\n final Routes routes = mock(Routes.class);\n\n when(jettyServerFactory.create(100,10,10000)).thenReturn(new Server());\n\n final EmbeddedJettyFactory embeddedJettyFactory = new EmbeddedJettyFactory(jettyServerFactory).withThreadPool(null);\n embeddedServer = embeddedJettyFactory.create(routes, staticFilesConfiguration, false);\n\n embeddedServer.ignite(\"localhost\", 8080, null, 100,10,10000);\n\n verify(jettyServerFactory, times(1)).create(100,10,10000);\n verifyNoMoreInteractions(jettyServerFactory);\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tprivate static ECPrivateKey generateECPrivateKey(final ECKey.Curve curve)\n\t\tthrows Exception {\n\t\t\n\t\tfinal ECParameterSpec ecParameterSpec = curve.toECParameterSpec();\n\t\t\n\t\tKeyPairGenerator generator = KeyPairGenerator.getInstance(\"EC\");\n\t\tgenerator.initialize(ecParameterSpec);\n\t\tKeyPair keyPair = generator.generateKeyPair();\n\t\t\n\t\treturn (ECPrivateKey) keyPair.getPrivate();\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " public static void unzipFilesToPath(String jarPath, String destinationDir) throws IOException {\n File file = new File(jarPath);\n try (JarFile jar = new JarFile(file)) {\n\n // fist get all directories,\n // then make those directory on the destination Path\n /*for (Enumeration enums = jar.entries(); enums.hasMoreElements(); ) {\n JarEntry entry = (JarEntry) enums.nextElement();\n\n String fileName = destinationDir + File.separator + entry.getName();\n File f = new File(fileName);\n\n if (fileName.endsWith(\"/\")) {\n f.mkdirs();\n }\n\n }*/\n\n //now create all files\n for (Enumeration enums = jar.entries(); enums.hasMoreElements(); ) {\n JarEntry entry = enums.nextElement();\n\n String fileName = destinationDir + File.separator + entry.getName();\n File f = new File(fileName);\n\n if (!f.getCanonicalPath().startsWith(destinationDir)) {\n System.out.println(\"Zip Slip exploit detected. Skipping entry \" + entry.getName());\n continue;\n }\n\n File parent = f.getParentFile();\n if (!parent.exists()) {\n parent.mkdirs();\n }\n\n if (!fileName.endsWith(\"/\")) {\n try (InputStream is = jar.getInputStream(entry);\n FileOutputStream fos = new FileOutputStream(f)) {\n // write contents of 'is' to 'fos'\n while (is.available() > 0) {\n fos.write(is.read());\n }\n }\n }\n }\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " public SAXReader(XMLReader xmlReader) {\n this.xmlReader = xmlReader;\n }", "label_name": "CWE-611", "label": 611}
{"code": " void relative() {\n assertThat(PathAndQuery.parse(\"foo\")).isNull();\n }", "label_name": "CWE-22", "label": 22}
{"code": " public T getRuntimeInstance(Class baseClass) throws\n it.geosolutions.jaiext.jiffle.JiffleException {\n RuntimeModel model = RuntimeModel.get(baseClass);\n if (model == null) {\n throw new it.geosolutions.jaiext.jiffle.JiffleException(baseClass.getName() +\n \" does not implement a required Jiffle runtime interface\");\n }\n\n return (T) createRuntimeInstance(model, baseClass, false);\n }", "label_name": "CWE-94", "label": 94}
{"code": "\tpublic void testSelectByTwoTypes() {\n\n\t\tJWKSelector selector = new JWKSelector(new JWKMatcher.Builder().keyTypes(KeyType.RSA, KeyType.EC).build());\n\n\t\tList keyList = new ArrayList<>();\n\t\tkeyList.add(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").build());\n\t\tkeyList.add(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build());\n\n\t\tJWKSet jwkSet = new JWKSet(keyList);\n\n\t\tList matches = selector.select(jwkSet);\n\n\t\tRSAKey key1 = (RSAKey)matches.get(0);\n\t\tassertEquals(KeyType.RSA, key1.getKeyType());\n\t\tassertEquals(\"1\", key1.getKeyID());\n\n\t\tECKey key2 = (ECKey)matches.get(1);\n\t\tassertEquals(KeyType.EC, key2.getKeyType());\n\t\tassertEquals(\"2\", key2.getKeyID());\n\n\t\tassertEquals(2, matches.size());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " private void parseAttributesForKnownElements(Map> subdirs, Node desc) {\n // NOTE: NamedNodeMap does not have any particular order...\n NamedNodeMap attributes = desc.getAttributes();\n\n for (Node attr : asIterable(attributes)) {\n if (!XMP.ELEMENTS.contains(attr.getNamespaceURI())) {\n continue;\n }\n\n List dir = subdirs.get(attr.getNamespaceURI());\n\n if (dir == null) {\n dir = new ArrayList();\n subdirs.put(attr.getNamespaceURI(), dir);\n }\n\n dir.add(new XMPEntry(attr.getNamespaceURI() + attr.getLocalName(), attr.getLocalName(), attr.getNodeValue()));\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void create_withThreadPool() throws Exception {\n final QueuedThreadPool threadPool = new QueuedThreadPool(100);\n final JettyServerFactory jettyServerFactory = mock(JettyServerFactory.class);\n final StaticFilesConfiguration staticFilesConfiguration = mock(StaticFilesConfiguration.class);\n final Routes routes = mock(Routes.class);\n\n when(jettyServerFactory.create(threadPool)).thenReturn(new Server(threadPool));\n\n final EmbeddedJettyFactory embeddedJettyFactory = new EmbeddedJettyFactory(jettyServerFactory).withThreadPool(threadPool);\n embeddedServer = embeddedJettyFactory.create(routes, staticFilesConfiguration, false);\n\n embeddedServer.ignite(\"localhost\", 8080, null, 0,0,0);\n\n verify(jettyServerFactory, times(1)).create(threadPool);\n verifyNoMoreInteractions(jettyServerFactory);\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(iv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ iv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\ttry {\n\t\t\tint result = cipher.update(ciphertext, ciphertextOffset, dataLen, plaintext, plaintextOffset);\n\t\t\tcipher.doFinal(plaintext, plaintextOffset + result);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": "\tprotected String getCorsDomain(String referer, String userAgent)\n\t{\n\t\tString dom = null;\n\n\t\tif (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*draw[.]io/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".draw.io/\") + 8);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*diagrams[.]net/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".diagrams.net/\") + 13);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*quipelements[.]com/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".quipelements.com/\") + 17);\n\t\t}\n\t\t// Enables Confluence/Jira proxy via referer or hardcoded user-agent (for old versions)\n\t\t// UA refers to old FF on macOS so low risk and fixes requests from existing servers\n\t\telse if ((referer != null\n\t\t\t\t&& referer.equals(\"draw.io Proxy Confluence Server\"))\n\t\t\t\t|| (userAgent != null && userAgent.equals(\n\t\t\t\t\t\t\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:50.0) Gecko/20100101 Firefox/50.0\")))\n\t\t{\n\t\t\tdom = \"\";\n\t\t}\n\n\t\treturn dom;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public void setXMLReader(XMLReader reader) {\n this.xmlReader = reader;\n }", "label_name": "CWE-611", "label": 611}
{"code": " private Path getFilePath(String path) {\n return baseDirPath.map(dir -> dir.resolve(path)).orElseGet(() -> Paths.get(path));\n }", "label_name": "CWE-22", "label": 22}
{"code": " void requestResetPassword() throws Exception\n {\n when(this.userManager.exists(this.userReference)).thenReturn(true);\n InternetAddress email = new InternetAddress(\"foobar@xwiki.org\");\n when(this.userProperties.getEmail()).thenReturn(email);\n BaseObject xObject = mock(BaseObject.class);\n when(this.userDocument\n .getXObject(DefaultResetPasswordManager.RESET_PASSWORD_REQUEST_CLASS_REFERENCE, true, this.context))\n .thenReturn(xObject);\n String verificationCode = \"abcde1234\";\n when(this.xWiki.generateRandomString(30)).thenReturn(verificationCode);\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.versionComment\"))\n .thenReturn(\"Save verification code 42\");\n\n ResetPasswordRequestResponse expectedResult =\n new DefaultResetPasswordRequestResponse(this.userReference, email,\n verificationCode);\n assertEquals(expectedResult, this.resetPasswordManager.requestResetPassword(this.userReference));\n verify(xObject).set(DefaultResetPasswordManager.VERIFICATION_PROPERTY, verificationCode, context);\n verify(this.xWiki).saveDocument(this.userDocument, \"Save verification code 42\", true, this.context);\n }", "label_name": "CWE-640", "label": 640}
{"code": " public void setXMLFilter(XMLFilter filter) {\n this.xmlFilter = filter;\n }", "label_name": "CWE-611", "label": 611}
{"code": " void checkVerificationCodeUnexistingUser()\n {\n when(this.userReference.toString()).thenReturn(\"user:Foobar\");\n when(this.userManager.exists(this.userReference)).thenReturn(false);\n String exceptionMessage = \"User [user:Foobar] doesn't exist\";\n when(this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noUser\",\n \"user:Foobar\")).thenReturn(exceptionMessage);\n ResetPasswordException resetPasswordException = assertThrows(ResetPasswordException.class,\n () -> this.resetPasswordManager.checkVerificationCode(this.userReference, \"some code\"));\n assertEquals(exceptionMessage, resetPasswordException.getMessage());\n }", "label_name": "CWE-640", "label": 640}
{"code": " public String toString() {\n if (query == null) {\n return path;\n }\n return path + \"?\" + query;\n }", "label_name": "CWE-22", "label": 22}
{"code": " static void setAttribute(TransformerFactory transformerFactory, String attributeName) {\n try {\n transformerFactory.setAttribute(attributeName, \"\");\n } catch (IllegalArgumentException iae) {\n if (Boolean.getBoolean(SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES)) {\n LOGGER.warning(\"Enabling XXE protection failed. The attribute \" + attributeName\n + \" is not supported by the TransformerFactory. The \" + SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES\n + \" system property is used so the XML processing continues in the UNSECURE mode\"\n + \" with XXE protection disabled!!!\");\n } else {\n LOGGER.severe(\"Enabling XXE protection failed. The attribute \" + attributeName\n + \" is not supported by the TransformerFactory. This usually mean an outdated XML processor\"\n + \" is present on the classpath (e.g. Xerces, Xalan). If you are not able to resolve the issue by\"\n + \" fixing the classpath, the \" + SYSTEM_PROPERTY_IGNORE_XXE_PROTECTION_FAILURES\n + \" system property can be used to disable XML External Entity protections.\"\n + \" We don't recommend disabling the XXE as such the XML processor configuration is unsecure!!!\", iae);\n throw iae;\n }\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void testPullCount() throws IOException {\n initializeSsl();\n String url = RepoUtils.getRemoteRepoURL() + \"/modules/info/\" + orgName + \"/\" + moduleName + \"/*/\";\n HttpURLConnection conn = createHttpUrlConnection(convertToUrl(url), \"\", 0, \"\", \"\");\n conn.setInstanceFollowRedirects(false);\n setRequestMethod(conn, Utils.RequestMethod.GET);\n\n int statusCode = conn.getResponseCode();\n if (statusCode == 200) {\n try (BufferedReader reader = new BufferedReader(new InputStreamReader(conn.getInputStream(),\n Charset.defaultCharset()))) {\n StringBuilder result = new StringBuilder();\n String line;\n while ((line = reader.readLine()) != null) {\n result.append(line);\n }\n Object payload = JSONParser.parse(result.toString());\n if (payload instanceof MapValue) {\n long pullCount = ((MapValue) payload).getIntValue(\"totalPullCount\");\n Assert.assertEquals(pullCount, totalPullCount);\n } else {\n Assert.fail(\"error: invalid response received\");\n }\n }\n } else {\n Assert.fail(\"error: could not connect to remote repository to find the latest version of module\");\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": " public byte[] toByteArray()\n {\n\t\t/* index || secretKeySeed || secretKeyPRF || publicSeed || root */\n int n = params.getDigestSize();\n int indexSize = (params.getHeight() + 7) / 8;\n int secretKeySize = n;\n int secretKeyPRFSize = n;\n int publicSeedSize = n;\n int rootSize = n;\n int totalSize = indexSize + secretKeySize + secretKeyPRFSize + publicSeedSize + rootSize;\n byte[] out = new byte[totalSize];\n int position = 0;\n\t\t/* copy index */\n byte[] indexBytes = XMSSUtil.toBytesBigEndian(index, indexSize);\n XMSSUtil.copyBytesAtOffset(out, indexBytes, position);\n position += indexSize;\n\t\t/* copy secretKeySeed */\n XMSSUtil.copyBytesAtOffset(out, secretKeySeed, position);\n position += secretKeySize;\n\t\t/* copy secretKeyPRF */\n XMSSUtil.copyBytesAtOffset(out, secretKeyPRF, position);\n position += secretKeyPRFSize;\n\t\t/* copy publicSeed */\n XMSSUtil.copyBytesAtOffset(out, publicSeed, position);\n position += publicSeedSize;\n\t\t/* copy root */\n XMSSUtil.copyBytesAtOffset(out, root, position);\n\t\t/* concatenate bdsState */\n byte[] bdsStateOut = null;\n try\n {\n bdsStateOut = XMSSUtil.serialize(bdsState);\n }\n catch (IOException e)\n {\n e.printStackTrace();\n throw new RuntimeException(\"error serializing bds state\");\n }\n return Arrays.concatenate(out, bdsStateOut);\n }", "label_name": "CWE-470", "label": 470}
{"code": " public Response workspaceClientEnqueue(@FormParam(WorkSpaceAdapter.CLIENT_NAME) String clientName,\n @FormParam(WorkSpaceAdapter.WORK_BUNDLE_OBJ) String workBundleString) {\n logger.debug(\"TPWorker incoming execute! check prio={}\", Thread.currentThread().getPriority());\n // TODO Doesn't look like anything is actually calling this, should we remove this?\n final boolean success;\n try {\n // Look up the place reference\n final String nsName = KeyManipulator.getServiceLocation(clientName);\n final IPickUpSpace place = (IPickUpSpace) Namespace.lookup(nsName);\n if (place == null) {\n throw new IllegalArgumentException(\"No client place found using name \" + clientName);\n }\n\n final ObjectInputStream ois = new ObjectInputStream(new ByteArrayInputStream(workBundleString.getBytes(\"8859_1\")));\n WorkBundle paths = (WorkBundle) ois.readObject();\n success = place.enque(paths);\n } catch (Exception e) {\n logger.warn(\"WorkSpaceClientEnqueWorker exception\", e);\n return Response.serverError().entity(\"WorkSpaceClientEnqueWorker exception:\\n\" + e.getMessage()).build();\n }\n\n if (success) {\n // old success from WorkSpaceClientEnqueWorker\n // return WORKER_SUCCESS;\n return Response.ok().entity(\"Successful add to the PickUpPlaceClient queue\").build();\n } else {\n // old failure from WorkSpaceClientEnqueWorker\n // return new WorkerStatus(WorkerStatus.FAILURE, \"WorkSpaceClientEnqueWorker failed, queue full\");\n return Response.serverError().entity(\"WorkSpaceClientEnqueWorker failed, queue full\").build();\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic static boolean copyResource(File file, String filename, File targetDirectory, PathMatcher filter) {\n\t\ttry {\n\t\t\tPath path = getResource(file, filename);\n\t\t\tif(path == null) {\n\t\t\t\treturn false;\n\t\t\t}\n\t\t\t\n\t\t\tPath destDir = targetDirectory.toPath();\n\t\t\tFiles.walkFileTree(path, new CopyVisitor(path, destDir, filter));\n\t\t\tPathUtils.closeSubsequentFS(path);\n\t\t\treturn true;\n\t\t} catch (IOException e) {\n\t\t\tlog.error(\"\", e);\n\t\t\treturn false;\n\t\t}\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public RainbowParameters(int[] vi)\n {\n this.vi = vi;\n try\n {\n checkParams();\n }\n catch (Exception e)\n {\n e.printStackTrace();\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": " public Process execute()\n throws CommandLineException\n {\n // TODO: Provided only for backward compat. with <= 1.4\n verifyShellState();\n\n Process process;\n\n //addEnvironment( \"MAVEN_TEST_ENVAR\", \"MAVEN_TEST_ENVAR_VALUE\" );\n\n String[] environment = getEnvironmentVariables();\n\n File workingDir = shell.getWorkingDirectory();\n\n try\n {\n if ( workingDir == null )\n {\n process = Runtime.getRuntime().exec( getShellCommandline(), environment );\n }\n else\n {\n if ( !workingDir.exists() )\n {\n throw new CommandLineException( \"Working directory \\\"\" + workingDir.getPath()\n + \"\\\" does not exist!\" );\n }\n else if ( !workingDir.isDirectory() )\n {\n throw new CommandLineException( \"Path \\\"\" + workingDir.getPath()\n + \"\\\" does not specify a directory.\" );\n }\n\n process = Runtime.getRuntime().exec( getShellCommandline(), environment, workingDir );\n }\n }\n catch ( IOException ex )\n {\n throw new CommandLineException( \"Error while executing process.\", ex );\n }\n\n return process;\n }", "label_name": "CWE-78", "label": 78}
{"code": "\tprivate HColor getColor(ColorParam colorParam, Stereotype stereo) {\n\t\tfinal ISkinParam skinParam = diagram.getSkinParam();\n\t\treturn rose.getHtmlColor(skinParam, stereo, colorParam);\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic void testMatchOperations() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyOperations(new LinkedHashSet<>(Arrays.asList(KeyOperation.SIGN, KeyOperation.VERIFY))).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\")\n\t\t\t.keyOperations(new HashSet<>(Arrays.asList(KeyOperation.SIGN, KeyOperation.VERIFY))).build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"key_ops=[sign, verify]\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " private boolean isStale(URL source, File target) {\n \n if( source.getProtocol().equals(\"jar\") ) {\n // unwrap the jar protocol...\n try {\n String parts[] = source.getFile().split(Pattern.quote(\"!\"));\n source = new URL(parts[0]);\n } catch (MalformedURLException e) {\n return false;\n }\n }\n \n File sourceFile=null;\n if( source.getProtocol().equals(\"file\") ) {\n sourceFile = new File(source.getFile());\n }\n if( sourceFile!=null && sourceFile.exists() ) {\n if( sourceFile.lastModified() > target.lastModified() ) {\n return true;\n }\n }\n return false;\n }", "label_name": "CWE-94", "label": 94}
{"code": " public ResetPasswordRequestResponse requestResetPassword(UserReference userReference) throws ResetPasswordException\n {\n this.checkUserReference(userReference);\n\n UserProperties userProperties = this.userPropertiesResolver.resolve(userReference);\n InternetAddress email = userProperties.getEmail();\n\n if (email == null) {\n String exceptionMessage =\n this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.noEmail\");\n throw new ResetPasswordException(exceptionMessage);\n }\n\n DocumentUserReference documentUserReference = (DocumentUserReference) userReference;\n DocumentReference reference = documentUserReference.getReference();\n XWikiContext context = this.contextProvider.get();\n\n try {\n XWikiDocument userDocument = context.getWiki().getDocument(reference, context);\n\n if (userDocument.getXObject(LDAP_CLASS_REFERENCE) != null) {\n String exceptionMessage =\n this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.error.ldapUser\",\n userReference.toString());\n throw new ResetPasswordException(exceptionMessage);\n }\n\n BaseObject xObject = userDocument.getXObject(RESET_PASSWORD_REQUEST_CLASS_REFERENCE, true, context);\n String verificationCode = context.getWiki().generateRandomString(30);\n xObject.set(VERIFICATION_PROPERTY, verificationCode, context);\n\n String saveComment =\n this.localizationManager.getTranslationPlain(\"xe.admin.passwordReset.versionComment\");\n context.getWiki().saveDocument(userDocument, saveComment, true, context);\n\n return new DefaultResetPasswordRequestResponse(userReference, email, verificationCode);\n } catch (XWikiException e) {\n throw new ResetPasswordException(\"Error when reading user document to perform reset password request.\", e);\n }\n }", "label_name": "CWE-640", "label": 640}
{"code": " public static IRubyObject from_document(ThreadContext context, IRubyObject klazz, IRubyObject document) {\n XmlDocument doc = ((XmlDocument) ((XmlNode) document).document(context));\n\n RubyArray errors = (RubyArray) doc.getInstanceVariable(\"@errors\");\n if (!errors.isEmpty()) {\n throw ((XmlSyntaxError) errors.first()).toThrowable();\n }\n\n DOMSource source = new DOMSource(doc.getDocument());\n\n IRubyObject uri = doc.url(context);\n\n if (!uri.isNil()) {\n source.setSystemId(uri.convertToString().asJavaString());\n }\n\n return getSchema(context, (RubyClass)klazz, source);\n }", "label_name": "CWE-611", "label": 611}
{"code": " void doubleQuote() {\n final PathAndQuery res = PathAndQuery.parse(\"/\\\"?\\\"\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/%22\");\n assertThat(res.query()).isEqualTo(\"%22\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " public byte[] allocateJobCaches(byte[] cacheAllocationRequestBytes) {\n\t\tCacheAllocationRequest allocationRequest = (CacheAllocationRequest) SerializationUtils\n\t\t\t\t.deserialize(cacheAllocationRequestBytes);\n\t\treturn SerializationUtils.serialize((Serializable) jobManager.allocateJobCaches(\n\t\t\t\tgetJobToken(), allocationRequest.getCurrentTime(), allocationRequest.getInstances()));\n }", "label_name": "CWE-502", "label": 502}
{"code": " public boolean isValidating() {\n return validating;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic void drawU(UGraphic ug) {\n\t\tug = ug.apply(backColor.bg()).apply(borderColor);\n\t\tfinal URectangle rect = new URectangle(dim.getWidth(), dim.getHeight()).rounded(rounded);\n\t\trect.setDeltaShadow(shadowing);\n\t\tug.apply(stroke).draw(rect);\n\n\t\tfinal double yLine = titleHeight + attributeHeight;\n\n\t\tug = ug.apply(imgBackcolor.bg());\n\n\t\tfinal double thickness = stroke.getThickness();\n\n\t\tfinal URectangle inner = new URectangle(dim.getWidth() - 4 * thickness,\n\t\t\t\tdim.getHeight() - titleHeight - 4 * thickness - attributeHeight).rounded(rounded);\n\t\tug.apply(imgBackcolor).apply(new UTranslate(2 * thickness, yLine + 2 * thickness)).draw(inner);\n\n\t\tif (titleHeight > 0) {\n\t\t\tug.apply(stroke).apply(UTranslate.dy(yLine)).draw(ULine.hline(dim.getWidth()));\n\t\t}\n\n\t\tif (attributeHeight > 0) {\n\t\t\tug.apply(stroke).apply(UTranslate.dy(yLine - attributeHeight)).draw(ULine.hline(dim.getWidth()));\n\t\t}\n\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public String getShortDescription() {\n if(note != null) {\n return Messages.Cause_RemoteCause_ShortDescriptionWithNote(addr, note);\n } else {\n return Messages.Cause_RemoteCause_ShortDescription(addr);\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic static String applySorting(String query, Sort sort, String alias) {\n\n\t\tAssert.hasText(query);\n\n\t\tif (null == sort || !sort.iterator().hasNext()) {\n\t\t\treturn query;\n\t\t}\n\n\t\tStringBuilder builder = new StringBuilder(query);\n\n\t\tif (!ORDER_BY.matcher(query).matches()) {\n\t\t\tbuilder.append(\" order by \");\n\t\t} else {\n\t\t\tbuilder.append(\", \");\n\t\t}\n\n\t\tSet aliases = getOuterJoinAliases(query);\n\n\t\tfor (Order order : sort) {\n\t\t\tbuilder.append(getOrderClause(aliases, alias, order)).append(\", \");\n\t\t}\n\n\t\tbuilder.delete(builder.length() - 2, builder.length());\n\n\t\treturn builder.toString();\n\t}", "label_name": "CWE-89", "label": 89}
{"code": "\tpublic static boolean isAbsolute(String url)\n\t{\n\t\tif (url.startsWith(\"//\")) // //www.domain.com/start\n\t\t{\n\t\t\treturn true;\n\t\t}\n\t\n\t\tif (url.startsWith(\"/\")) // /somePage.html\n\t\t{\n\t\t\treturn false;\n\t\t}\n\t\n\t\tboolean result = false;\n\t\n\t\ttry \n\t\t{\n\t\t\tURI uri = new URI(url);\n\t\t\tresult = uri.isAbsolute();\n\t\t}\n\t\tcatch (URISyntaxException e) {} //Ignore\n\t\n\t\treturn result;\n\t}", "label_name": "CWE-601", "label": 601}
{"code": " public void encodeByteArray() {\n Packet packet = new Packet<>(Parser.BINARY_EVENT);\n packet.data = \"abc\".getBytes(Charset.forName(\"UTF-8\"));\n packet.id = 23;\n packet.nsp = \"/cool\";\n Helpers.testBin(packet);\n }", "label_name": "CWE-476", "label": 476}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(iv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ iv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\ttry {\n\t\t\tint result = cipher.update(ciphertext, ciphertextOffset, dataLen, plaintext, plaintextOffset);\n\t\t\tcipher.doFinal(plaintext, plaintextOffset + result);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public static void zipFolderAPKTool(String srcFolder, String destZipFile) throws Exception {\n try (FileOutputStream fileWriter = new FileOutputStream(destZipFile);\n ZipOutputStream zip = new ZipOutputStream(fileWriter)){\n addFolderToZipAPKTool(\"\", srcFolder, zip);\n zip.flush();\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " public static void main(\n String[] args)\n {\n Security.addProvider(new BouncyCastleProvider());\n\n runTest(new ECDSA5Test());\n }", "label_name": "CWE-347", "label": 347}
{"code": " public void testSetContentFromFile() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n byte[] bytes = new byte[4096];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n test.setContent(tmpFile);\n ByteBuf buf = test.getByteBuf();\n assertEquals(buf.readerIndex(), 0);\n assertEquals(buf.writerIndex(), bytes.length);\n assertArrayEquals(bytes, test.get());\n assertArrayEquals(bytes, ByteBufUtil.getBytes(buf));\n } finally {\n //release the ByteBuf\n test.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " public static void execute(String url, String proxyHost, int proxyPort, String proxyUsername, String proxyPassword,\n String terminalWidth) {\n initializeSsl();\n HttpURLConnection conn = createHttpUrlConnection(convertToUrl(url), proxyHost, proxyPort, proxyUsername,\n proxyPassword);\n conn.setInstanceFollowRedirects(false);\n setRequestMethod(conn, Utils.RequestMethod.GET);\n handleResponse(conn, getStatusCode(conn), terminalWidth);\n Authenticator.setDefault(null);\n }", "label_name": "CWE-306", "label": 306}
{"code": " public void setDocumentFactory(DocumentFactory documentFactory) {\n this.factory = documentFactory;\n }", "label_name": "CWE-611", "label": 611}
{"code": " parse_io(ThreadContext context,\n IRubyObject klazz,\n IRubyObject data,\n IRubyObject enc)\n {\n //int encoding = (int)enc.convertToInteger().getLongValue();\n final Ruby runtime = context.runtime;\n XmlSaxParserContext ctx = newInstance(runtime, (RubyClass) klazz);\n ctx.initialize(runtime);\n ctx.setIOInputSource(context, data, runtime.getNil());\n return ctx;\n }", "label_name": "CWE-241", "label": 241}
{"code": " public void setIgnoreComments(boolean ignoreComments) {\n this.ignoreComments = ignoreComments;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": "\tpublic RoundedContainer(Dimension2D dim, double titleHeight, double attributeHeight, HColor borderColor,\n\t\t\tHColor backColor, HColor imgBackcolor, UStroke stroke, double rounded, double shadowing) {\n\t\tif (dim.getWidth() == 0) {\n\t\t\tthrow new IllegalArgumentException();\n\t\t}\n\t\tthis.rounded = rounded;\n\t\tthis.dim = dim;\n\t\tthis.imgBackcolor = imgBackcolor;\n\t\tthis.titleHeight = titleHeight;\n\t\tthis.borderColor = borderColor;\n\t\tthis.backColor = backColor;\n\t\tthis.attributeHeight = attributeHeight;\n\t\tthis.stroke = stroke;\n\t\tthis.shadowing = shadowing;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public DefaultFileSystemResourceLoader(Path path) {\n this.baseDirPath = Optional.of(path);\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length) throws ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencrypt(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tpoly.update(ciphertext, ciphertextOffset, length);\n\t\tfinish(ad, length);\n\t\tSystem.arraycopy(polyKey, 0, ciphertext, ciphertextOffset + length, 16);\n\t\treturn length + 16;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public boolean isStripWhitespaceText() {\n return stripWhitespaceText;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public BCXMSSMTPrivateKey(PrivateKeyInfo keyInfo)\n throws IOException\n {\n XMSSMTKeyParams keyParams = XMSSMTKeyParams.getInstance(keyInfo.getPrivateKeyAlgorithm().getParameters());\n this.treeDigest = keyParams.getTreeDigest().getAlgorithm();\n\n XMSSPrivateKey xmssMtPrivateKey = XMSSPrivateKey.getInstance(keyInfo.parsePrivateKey());\n\n try\n {\n XMSSMTPrivateKeyParameters.Builder keyBuilder = new XMSSMTPrivateKeyParameters\n .Builder(new XMSSMTParameters(keyParams.getHeight(), keyParams.getLayers(), DigestUtil.getDigest(treeDigest)))\n .withIndex(xmssMtPrivateKey.getIndex())\n .withSecretKeySeed(xmssMtPrivateKey.getSecretKeySeed())\n .withSecretKeyPRF(xmssMtPrivateKey.getSecretKeyPRF())\n .withPublicSeed(xmssMtPrivateKey.getPublicSeed())\n .withRoot(xmssMtPrivateKey.getRoot());\n\n if (xmssMtPrivateKey.getBdsState() != null)\n {\n keyBuilder.withBDSState((BDSStateMap)XMSSUtil.deserialize(xmssMtPrivateKey.getBdsState()));\n }\n\n this.keyParams = keyBuilder.build();\n }\n catch (ClassNotFoundException e)\n {\n throw new IOException(\"ClassNotFoundException processing BDS state: \" + e.getMessage());\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic static List checkLockedFileBeforeUnzipNonStrict(VFSLeaf zipLeaf, VFSContainer targetDir, Identity identity) {\n\t\tList lockedFiles = new ArrayList<>();\n\t\tVFSLockManager vfsLockManager = CoreSpringFactory.getImpl(VFSLockManager.class);\n\t\t\n\t\ttry(InputStream in = zipLeaf.getInputStream();\n\t\t\t\tnet.sf.jazzlib.ZipInputStream oZip = new net.sf.jazzlib.ZipInputStream(in);) {\n\t\t\t// unzip files\n\t\t\tnet.sf.jazzlib.ZipEntry oEntr = oZip.getNextEntry();\n\t\t\twhile (oEntr != null) {\n\t\t\t\tif (oEntr.getName() != null && !oEntr.getName().startsWith(DIR_NAME__MACOSX)) {\n\t\t\t\t\tif (oEntr.isDirectory()) {\n\t\t\t\t\t\t// skip MacOSX specific metadata directory\n\t\t\t\t\t\t// directories aren't locked\n\t\t\t\t\t\toZip.closeEntry();\n\t\t\t\t\t\toEntr = oZip.getNextEntry();\n\t\t\t\t\t\tcontinue;\n\t\t\t\t\t} else {\n\t\t\t\t\t\t// search file\n\t\t\t\t\t\tVFSContainer createIn = targetDir;\n\t\t\t\t\t\tString name = oEntr.getName();\n\t\t\t\t\t\t// check if entry has directories which did not show up as\n\t\t\t\t\t\t// directories above\n\t\t\t\t\t\tint dirSepIndex = name.lastIndexOf('/');\n\t\t\t\t\t\tif (dirSepIndex == -1) {\n\t\t\t\t\t\t\t// try it windows style, backslash is also valid format\n\t\t\t\t\t\t\tdirSepIndex = name.lastIndexOf('\\\\');\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif (dirSepIndex > 0) {\n\t\t\t\t\t\t\t// get subdirs\n\t\t\t\t\t\t\tcreateIn = getAllSubdirs(targetDir, name.substring(0, dirSepIndex), identity, false);\n\t\t\t\t\t\t\tif (createIn == null) {\n\t\t\t\t\t\t\t\t//sub directories don't exist, and aren't locked\n\t\t\t\t\t\t\t\toZip.closeEntry();\n\t\t\t\t\t\t\t\toEntr = oZip.getNextEntry();\n\t\t\t\t\t\t\t\tcontinue;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tname = name.substring(dirSepIndex + 1);\n\t\t\t\t\t\t}\n\t\t\t\t\t\t\n\t\t\t\t\t\tVFSLeaf newEntry = (VFSLeaf)createIn.resolve(name);\n\t\t\t\t\t\tif(vfsLockManager.isLockedForMe(newEntry, identity, VFSLockApplicationType.vfs, null)) {\n\t\t\t\t\t\t\tlockedFiles.add(name);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\toZip.closeEntry();\n\t\t\t\toEntr = oZip.getNextEntry();\n\t\t\t}\n\t\t} catch (IOException e) {\n\t\t\treturn null;\n\t\t}\n\n\t\treturn lockedFiles;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " private static Stream provideFilesAndExpectedExceptionType() {\n return Stream.of(\n Arguments.of(\"abnormal/corrupt-header.rar\", CorruptHeaderException.class),\n Arguments.of(\"abnormal/mainHeaderNull.rar\", BadRarArchiveException.class)\n );\n }", "label_name": "CWE-835", "label": 835}
{"code": "\tprotected SymbolContext getContextLegacy() {\n\n\t\tif (UseStyle.useBetaStyle() == false)\n\t\t\treturn new SymbolContext(HColorUtils.COL_D7E0F2, HColorUtils.COL_038048).withStroke(new UStroke(2));\n\n\t\tfinal HColor lineColor = style.value(PName.LineColor).asColor(skinParam.getThemeStyle(),\n\t\t\t\tskinParam.getIHtmlColorSet());\n\t\tfinal HColor backgroundColor = style.value(PName.BackGroundColor).asColor(skinParam.getThemeStyle(),\n\t\t\t\tskinParam.getIHtmlColorSet());\n\n\t\treturn new SymbolContext(backgroundColor, lineColor).withStroke(getStroke());\n\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " private void decodeTest()\n {\n EllipticCurve curve = new EllipticCurve(\n new ECFieldFp(new BigInteger(\"6277101735386680763835789423207666416083908700390324961279\")), // q\n new BigInteger(\"fffffffffffffffffffffffffffffffefffffffffffffffc\", 16), // a\n new BigInteger(\"64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1\", 16)); // b\n\n ECPoint p = ECPointUtil.decodePoint(curve, Hex.decode(\"03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012\"));\n\n if (!p.getAffineX().equals(new BigInteger(\"188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012\", 16)))\n {\n fail(\"x uncompressed incorrectly\");\n }\n\n if (!p.getAffineY().equals(new BigInteger(\"7192b95ffc8da78631011ed6b24cdd573f977a11e794811\", 16)))\n {\n fail(\"y uncompressed incorrectly\");\n }\n }", "label_name": "CWE-347", "label": 347}
{"code": " public void testGetShellCommandLineNonWindows()\n throws Exception\n {\n Commandline cmd = new Commandline( new BourneShell() );\n cmd.setExecutable( \"/usr/bin\" );\n cmd.addArguments( new String[] {\n \"a\",\n \"b\"\n } );\n String[] shellCommandline = cmd.getShellCommandline();\n\n assertEquals( \"Command line size\", 3, shellCommandline.length );\n\n assertEquals( \"/bin/sh\", shellCommandline[0] );\n assertEquals( \"-c\", shellCommandline[1] );\n\n if ( Os.isFamily( Os.FAMILY_WINDOWS ) )\n {\n assertEquals( \"\\\\usr\\\\bin a b\", shellCommandline[2] );\n }\n else\n {\n assertEquals( \"/usr/bin a b\", shellCommandline[2] );\n }\n }", "label_name": "CWE-78", "label": 78}
{"code": " public Document read(URL url) throws DocumentException {\n String systemID = url.toExternalForm();\n\n InputSource source = new InputSource(systemID);\n if (this.encoding != null) {\n source.setEncoding(this.encoding);\n }\n\n return read(source);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tprotected Response attachToPost(Long messageKey, String filename, InputStream file, HttpServletRequest request) {\n\t\t//load message\n\t\tMessage mess = fom.loadMessage(messageKey);\n\t\tif(mess == null) {\n\t\t\treturn Response.serverError().status(Status.NOT_FOUND).build();\n\t\t}\n\t\tif(!forum.equalsByPersistableKey(mess.getForum())) {\n\t\t\treturn Response.serverError().status(Status.CONFLICT).build();\n\t\t}\n\t\treturn attachToPost(mess, filename, file, request);\n\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic static int sharedKeyLength(final JWEAlgorithm alg, final EncryptionMethod enc)\n\t\tthrows JOSEException {\n\n\t\tif (alg.equals(JWEAlgorithm.ECDH_ES)) {\n\n\t\t\tint length = enc.cekBitLength();\n\n\t\t\tif (length == 0) {\n\t\t\t\tthrow new JOSEException(\"Unsupported JWE encryption method \" + enc);\n\t\t\t}\n\n\t\t\treturn length;\n\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A128KW)) {\n\t\t\treturn 128;\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A192KW)) {\n\t\t\treturn 192;\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A256KW)) {\n\t\t\treturn 256;\n\t\t} else {\n\t\t\tthrow new JOSEException(AlgorithmSupportMessage.unsupportedJWEAlgorithm(\n\t\t\t\talg, ECDHCryptoProvider.SUPPORTED_ALGORITHMS));\n\t\t}\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " public void testGetChunk() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n byte[] bytes = new byte[4096];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n test.setContent(tmpFile);\n ByteBuf buf1 = test.getChunk(1024);\n assertEquals(buf1.readerIndex(), 0);\n assertEquals(buf1.writerIndex(), 1024);\n ByteBuf buf2 = test.getChunk(1024);\n assertEquals(buf2.readerIndex(), 0);\n assertEquals(buf2.writerIndex(), 1024);\n assertFalse(\"Arrays should not be equal\",\n Arrays.equals(ByteBufUtil.getBytes(buf1), ByteBufUtil.getBytes(buf2)));\n } finally {\n test.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " public void sendError(int sc, String msg) throws IOException {\n if (isIncluding()) {\n Logger.log(Logger.ERROR, Launcher.RESOURCES, \"IncludeResponse.Error\",\n new String[] { \"\" + sc, msg });\n return;\n }\n \n Logger.log(Logger.DEBUG, Launcher.RESOURCES,\n \"WinstoneResponse.SendingError\", new String[] { \"\" + sc, msg });\n\n if ((this.webAppConfig != null) && (this.req != null)) {\n \n RequestDispatcher rd = this.webAppConfig\n .getErrorDispatcherByCode(req.getRequestURI(), sc, msg, null);\n if (rd != null) {\n try {\n rd.forward(this.req, this);\n return;\n } catch (IllegalStateException err) {\n throw err;\n } catch (IOException err) {\n throw err;\n } catch (Throwable err) {\n Logger.log(Logger.WARNING, Launcher.RESOURCES,\n \"WinstoneResponse.ErrorInErrorPage\", new String[] {\n rd.getName(), sc + \"\" }, err);\n return;\n }\n }\n }\n // If we are here there was no webapp and/or no request object, so \n // show the default error page\n if (this.errorStatusCode == null) {\n this.statusCode = sc;\n }\n String output = Launcher.RESOURCES.getString(\"WinstoneResponse.ErrorPage\",\n new String[] { sc + \"\", (msg == null ? \"\" : msg), \"\",\n Launcher.RESOURCES.getString(\"ServerVersion\"),\n \"\" + new Date() });\n setContentLength(output.getBytes(getCharacterEncoding()).length);\n Writer out = getWriter();\n out.write(output);\n out.flush();\n }", "label_name": "CWE-79", "label": 79}
{"code": " public void view(@RequestParam String filename,\n @RequestParam(required = false) String base,\n @RequestParam(required = false) Integer tailLines,\n HttpServletResponse response) throws IOException {\n securityCheck(filename);\n response.setContentType(MediaType.TEXT_PLAIN_VALUE);\n\n Path path = loggingPath(base);\n FileProvider fileProvider = getFileProvider(path);\n if (tailLines != null) {\n fileProvider.tailContent(path, filename, response.getOutputStream(), tailLines);\n }\n else {\n fileProvider.streamContent(path, filename, response.getOutputStream());\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " void empty() {\n final PathAndQuery res = PathAndQuery.parse(null);\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/\");\n assertThat(res.query()).isNull();\n\n final PathAndQuery res2 = PathAndQuery.parse(\"\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/\");\n assertThat(res2.query()).isNull();\n\n final PathAndQuery res3 = PathAndQuery.parse(\"?\");\n assertThat(res3).isNotNull();\n assertThat(res3.path()).isEqualTo(\"/\");\n assertThat(res3.query()).isEqualTo(\"\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " protected XMLReader createXMLReader() throws SAXException {\n return SAXHelper.createXMLReader(isValidating());\n }", "label_name": "CWE-611", "label": 611}
{"code": "\t\tpublic void configure(ICourse course, CourseNode newNode, ModuleConfiguration moduleConfig) {\n\t\t\tnewNode.setDisplayOption(CourseNode.DISPLAY_OPTS_TITLE_DESCRIPTION_CONTENT);\n\t\t\tVFSContainer rootContainer = course.getCourseFolderContainer();\n\t\t\tVFSLeaf singleFile = (VFSLeaf) rootContainer.resolve(\"/\" + filename);\n\t\t\tif (singleFile == null) {\n\t\t\t\tsingleFile = rootContainer.createChildLeaf(\"/\" + filename);\n\t\t\t}\n\n\t\t\tif(in != null) {\n\t\t\t\tmoduleConfig.set(SPEditController.CONFIG_KEY_FILE, \"/\" + filename);\n\t\t\t\t\n\t\t\t\tOutputStream out = singleFile.getOutputStream(false);\n\t\t\t\tFileUtils.copy(in, out);\n\t\t\t\tFileUtils.closeSafely(out);\n\t\t\t\tFileUtils.closeSafely(in);\n\t\t\t} else {\n\t\t\t\tif(StringHelper.containsNonWhitespace(path)) {\n\t\t\t\t\tif(!path.startsWith(\"/\")) {\n\t\t\t\t\t\tpath = \"/\" + path;\n\t\t\t\t\t}\n\t\t\t\t\tif(!path.endsWith(\"/\")) {\n\t\t\t\t\t\tpath += \"/\";\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tpath = \"/\";\n\t\t\t\t}\n\t\t\t\tmoduleConfig.set(SPEditController.CONFIG_KEY_FILE, path + filename);\n\t\t\t}\n\t\t\t//saved node configuration\n\t\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic boolean checkUrlParameter(String url)\n\t{\n\t\tif (url != null)\n\t\t{\n\t\t\ttry\n\t\t\t{\n\t\t\t\tURL parsedUrl = new URL(url);\n\t\t\t\tString protocol = parsedUrl.getProtocol();\n\t\t\t\tString host = parsedUrl.getHost().toLowerCase();\n\n\t\t\t\treturn (protocol.equals(\"http\") || protocol.equals(\"https\"))\n\t\t\t\t\t\t&& !host.endsWith(\".internal\")\n\t\t\t\t\t\t&& !host.endsWith(\".local\")\n\t\t\t\t\t\t&& !host.contains(\"localhost\")\n\t\t\t\t\t\t&& !host.startsWith(\"0.\") // 0.0.0.0/8\n\t\t\t\t\t\t&& !host.startsWith(\"10.\") // 10.0.0.0/8\n\t\t\t\t\t\t&& !host.startsWith(\"127.\") // 127.0.0.0/8\n\t\t\t\t\t\t&& !host.startsWith(\"169.254.\") // 169.254.0.0/16\n\t\t\t\t\t\t&& !host.startsWith(\"172.16.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.17.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.18.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.19.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.20.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.21.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.22.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.23.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.24.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.25.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.26.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.27.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.28.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.29.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.30.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"172.31.\") // 172.16.0.0/12\n\t\t\t\t\t\t&& !host.startsWith(\"192.0.0.\") // 192.0.0.0/24\n\t\t\t\t\t\t&& !host.startsWith(\"192.168.\") // 192.168.0.0/16\n\t\t\t\t\t\t&& !host.startsWith(\"198.18.\") // 198.18.0.0/15\n\t\t\t\t\t\t&& !host.startsWith(\"198.19.\") // 198.18.0.0/15\n\t\t\t\t\t\t&& !host.endsWith(\".arpa\"); // reverse domain (needed?)\n\t\t\t}\n\t\t\tcatch (MalformedURLException e)\n\t\t\t{\n\t\t\t\treturn false;\n\t\t\t}\n\t\t}\n\t\telse\n\t\t{\n\t\t\treturn false;\n\t\t}\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public void write(byte[] b, int offset, int length) throws IOException {\n if (b == null) {\n throw new NullPointerException();\n }\n\n if (offset < 0 || offset + length > b.length) {\n throw new ArrayIndexOutOfBoundsException();\n }\n\n write(fd, b, offset, length);\n }", "label_name": "CWE-190", "label": 190}
{"code": " private static String encodeToPercents(Bytes value, boolean isPath) {\n final BitSet allowedChars = isPath ? ALLOWED_PATH_CHARS : ALLOWED_QUERY_CHARS;\n final int length = value.length;\n boolean needsEncoding = false;\n for (int i = 0; i < length; i++) {\n if (!allowedChars.get(value.data[i] & 0xFF)) {\n needsEncoding = true;\n break;\n }\n }\n\n if (!needsEncoding) {\n // Deprecated, but it fits perfect for our use case.\n // noinspection deprecation\n return new String(value.data, 0, 0, length);\n }\n\n final StringBuilder buf = new StringBuilder(length);\n for (int i = 0; i < length; i++) {\n final int b = value.data[i] & 0xFF;\n\n if (b == PERCENT_ENCODING_MARKER && (i + 1) < length) {\n final int marker = value.data[i + 1] & 0xFF;\n final String percentEncodedChar = MARKER_TO_PERCENT_ENCODED_CHAR[marker];\n if (percentEncodedChar != null) {\n buf.append(percentEncodedChar);\n i++;\n continue;\n }\n }\n\n if (allowedChars.get(b)) {\n buf.append((char) b);\n } else if (b == ' ') {\n if (isPath) {\n buf.append(\"%20\");\n } else {\n buf.append('+');\n }\n } else {\n buf.append('%');\n appendHexNibble(buf, b >>> 4);\n appendHexNibble(buf, b & 0xF);\n }\n }\n\n return buf.toString();\n }", "label_name": "CWE-22", "label": 22}
{"code": " public synchronized T setResult(Class resultClass) throws SQLException {\n checkFreed();\n initialize();\n\n if (resultClass == null || DOMResult.class.equals(resultClass)) {\n domResult = new DOMResult();\n active = true;\n return (T) domResult;\n } else if (SAXResult.class.equals(resultClass)) {\n try {\n SAXTransformerFactory transformerFactory =\n (SAXTransformerFactory) SAXTransformerFactory.newInstance();\n TransformerHandler transformerHandler = transformerFactory.newTransformerHandler();\n stringWriter = new StringWriter();\n transformerHandler.setResult(new StreamResult(stringWriter));\n active = true;\n return (T) new SAXResult(transformerHandler);\n } catch (TransformerException te) {\n throw new PSQLException(GT.tr(\"Unable to create SAXResult for SQLXML.\"),\n PSQLState.UNEXPECTED_ERROR, te);\n }\n } else if (StreamResult.class.equals(resultClass)) {\n stringWriter = new StringWriter();\n active = true;\n return (T) new StreamResult(stringWriter);\n } else if (StAXResult.class.equals(resultClass)) {\n stringWriter = new StringWriter();\n try {\n XMLOutputFactory xof = XMLOutputFactory.newInstance();\n XMLStreamWriter xsw = xof.createXMLStreamWriter(stringWriter);\n active = true;\n return (T) new StAXResult(xsw);\n } catch (XMLStreamException xse) {\n throw new PSQLException(GT.tr(\"Unable to create StAXResult for SQLXML\"),\n PSQLState.UNEXPECTED_ERROR, xse);\n }\n }\n\n throw new PSQLException(GT.tr(\"Unknown XML Result class: {0}\", resultClass),\n PSQLState.INVALID_PARAMETER_TYPE);\n }", "label_name": "CWE-611", "label": 611}
{"code": " public Directory read(final ImageInputStream input) throws IOException {\n Validate.notNull(input, \"input\");\n\n DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();\n factory.setNamespaceAware(true);\n\n try {\n // TODO: Consider parsing using SAX?\n // TODO: Determine encoding and parse using a Reader...\n // TODO: Refactor scanner to return inputstream?\n // TODO: Be smarter about ASCII-NULL termination/padding (the SAXParser aka Xerces DOMParser doesn't like it)...\n DocumentBuilder builder = factory.newDocumentBuilder();\n builder.setErrorHandler(new DefaultHandler());\n Document document = builder.parse(new InputSource(IIOUtil.createStreamAdapter(input)));\n\n// XMLSerializer serializer = new XMLSerializer(System.err, System.getProperty(\"file.encoding\"));\n// serializer.serialize(document);\n\n String toolkit = getToolkit(document);\n Node rdfRoot = document.getElementsByTagNameNS(XMP.NS_RDF, \"RDF\").item(0);\n NodeList descriptions = document.getElementsByTagNameNS(XMP.NS_RDF, \"Description\");\n\n return parseDirectories(rdfRoot, descriptions, toolkit);\n }\n catch (SAXException e) {\n throw new IIOException(e.getMessage(), e);\n }\n catch (ParserConfigurationException e) {\n throw new RuntimeException(e); // TODO: Or IOException?\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic static HColor noGradient(HColor color) {\n\t\tif (color instanceof HColorGradient) {\n\t\t\treturn ((HColorGradient) color).getColor1();\n\t\t}\n\t\treturn color;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic void testMatchUseNotSpecifiedOrSignature() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyUses(KeyUse.SIGNATURE, null).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").keyUse(KeyUse.SIGNATURE).build()));\n\t\tassertTrue(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"3\").keyUse(KeyUse.ENCRYPTION).build()));\n\t\t\n\t\tassertEquals(\"use=[sig, null]\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " protected EntityResolver createDefaultEntityResolver(String systemId) {\n String prefix = null;\n\n if ((systemId != null) && (systemId.length() > 0)) {\n int idx = systemId.lastIndexOf('/');\n\n if (idx > 0) {\n prefix = systemId.substring(0, idx + 1);\n }\n }\n\n return new SAXEntityResolver(prefix);\n }", "label_name": "CWE-611", "label": 611}
{"code": " public boolean isIncludeInternalDTDDeclarations() {\n return includeInternalDTDDeclarations;\n }", "label_name": "CWE-611", "label": 611}
{"code": " static XmlSchema createSchemaInstance(ThreadContext context, RubyClass klazz, Source source) {\n Ruby runtime = context.getRuntime();\n XmlRelaxng xmlRelaxng = (XmlRelaxng) NokogiriService.XML_RELAXNG_ALLOCATOR.allocate(runtime, klazz);\n xmlRelaxng.setInstanceVariable(\"@errors\", runtime.newEmptyArray());\n \n try {\n Schema schema = xmlRelaxng.getSchema(source, context);\n xmlRelaxng.setVerifier(schema.newVerifier());\n return xmlRelaxng;\n } catch (VerifierConfigurationException ex) {\n throw context.getRuntime().newRuntimeError(\"Could not parse document: \" + ex.getMessage());\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " public boolean isResetPasswordSent()\n {\n // If there is no form and we see an info box, then the request was sent.\n return !getDriver().hasElementWithoutWaiting(By.cssSelector(\"#resetPasswordForm\"))\n && messageBox.getText().contains(\"An e-mail was sent to\");\n }", "label_name": "CWE-640", "label": 640}
{"code": " public SAXReader(String xmlReaderClassName, boolean validating)\n throws SAXException {\n if (xmlReaderClassName != null) {\n this.xmlReader = XMLReaderFactory\n .createXMLReader(xmlReaderClassName);\n }\n\n this.validating = validating;\n }", "label_name": "CWE-611", "label": 611}
{"code": " private void sendStreamingResponse(HttpExchange pExchange, ParsedUri pParsedUri, JSONStreamAware pJson) throws IOException {\n Headers headers = pExchange.getResponseHeaders();\n if (pJson != null) {\n headers.set(\"Content-Type\", getMimeType(pParsedUri) + \"; charset=utf-8\");\n String callback = pParsedUri.getParameter(ConfigKey.CALLBACK.getKeyValue());\n pExchange.sendResponseHeaders(200, 0);\n Writer writer = new OutputStreamWriter(pExchange.getResponseBody(), \"UTF-8\");\n IoUtil.streamResponseAndClose(writer, pJson, callback);\n } else {\n headers.set(\"Content-Type\", \"text/plain\");\n pExchange.sendResponseHeaders(200,-1);\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic VideoMetadata readVideoMetadataFile(OLATResource videoResource){\n\t\tVFSContainer baseContainer= FileResourceManager.getInstance().getFileResourceRootImpl(videoResource);\n\t\tVFSLeaf metaDataFile = (VFSLeaf) baseContainer.resolve(FILENAME_VIDEO_METADATA_XML);\n\t\ttry {\n\t\t\treturn (VideoMetadata) XStreamHelper.readObject(XStreamHelper.createXStreamInstance(), metaDataFile);\n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"Error while parsing XStream file for videoResource::{}\", videoResource, e);\n\t\t\t// return an empty, so at least it displays something and not an error\n\t\t\tVideoMetadata meta = new VideoMetadataImpl();\n\t\t\tmeta.setWidth(800);\n\t\t\tmeta.setHeight(600);\n\t\t\treturn meta;\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " private static IRubyObject getSchema(ThreadContext context, RubyClass klazz, Source source) {\n String moduleName = klazz.getName();\n if (\"Nokogiri::XML::Schema\".equals(moduleName)) {\n return XmlSchema.createSchemaInstance(context, klazz, source);\n } else if (\"Nokogiri::XML::RelaxNG\".equals(moduleName)) {\n return XmlRelaxng.createSchemaInstance(context, klazz, source);\n }\n return context.getRuntime().getNil();\n }", "label_name": "CWE-611", "label": 611}
{"code": " public static IRubyObject read_memory(ThreadContext context, IRubyObject klazz, IRubyObject content) {\n String data = content.convertToString().asJavaString();\n return getSchema(context, (RubyClass) klazz, new StreamSource(new StringReader(data)));\n }", "label_name": "CWE-611", "label": 611}
{"code": " public DocumentFactory getDocumentFactory() {\n if (factory == null) {\n factory = DocumentFactory.getInstance();\n }\n\n return factory;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public boolean isMergeAdjacentText() {\n return mergeAdjacentText;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void encodeDeepBinaryJSONWithNullValue() throws JSONException {\n JSONObject data = new JSONObject(\"{a: \\\"b\\\", c: 4, e: {g: null}, h: null}\");\n data.put(\"h\", new byte[9]);\n\n Packet packet = new Packet<>(Parser.BINARY_EVENT);\n packet.data = data;\n packet.nsp = \"/\";\n packet.id = 600;\n Helpers.testBin(packet);\n }", "label_name": "CWE-476", "label": 476}
{"code": " private void checkParams()\n throws Exception\n {\n if (vi == null)\n {\n throw new Exception(\"no layers defined.\");\n }\n if (vi.length > 1)\n {\n for (int i = 0; i < vi.length - 1; i++)\n {\n if (vi[i] >= vi[i + 1])\n {\n throw new Exception(\n \"v[i] has to be smaller than v[i+1]\");\n }\n }\n }\n else\n {\n throw new Exception(\n \"Rainbow needs at least 1 layer, such that v1 < v2.\");\n }\n }", "label_name": "CWE-470", "label": 470}
{"code": " public void testEscapeSingleQuotesOnArgument()\n {\n Shell sh = newShell();\n\n sh.setWorkingDirectory( \"/usr/bin\" );\n sh.setExecutable( \"chmod\" );\n\n String[] args = { \"arg'withquote\" };\n\n List shellCommandLine = sh.getShellCommandLine( args );\n\n String cli = StringUtils.join( shellCommandLine.iterator(), \" \" );\n System.out.println( cli );\n assertEquals(\"cd /usr/bin && chmod 'arg'\\\\''withquote'\", shellCommandLine.get(shellCommandLine.size() - 1));\n }", "label_name": "CWE-78", "label": 78}
{"code": " public XMLFilter getXMLFilter() {\n return xmlFilter;\n }", "label_name": "CWE-611", "label": 611}
{"code": " public URIDryConverter(URI base, Map dependencyManifests, boolean isBuild) {\n super(base, dependencyManifests, isBuild);\n this.base = URI.create(base.toString() + \"/modules/info/\");\n try {\n SSLContext sc = SSLContext.getInstance(\"SSL\");\n sc.init(null, trustAllCerts, new java.security.SecureRandom());\n HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());\n proxy = getProxy();\n } catch (NoSuchAlgorithmException | KeyManagementException e) {\n // ignore errors\n }\n }", "label_name": "CWE-306", "label": 306}
{"code": " private AuthnRequestParseResult parseRequest(byte[] xmlBytes) throws SAMLException {\n String xml = new String(xmlBytes, StandardCharsets.UTF_8);\n if (logger.isDebugEnabled()) {\n logger.debug(\"SAMLRequest XML is\\n{}\", xml);\n }\n\n AuthnRequestParseResult result = new AuthnRequestParseResult();\n result.document = parseFromBytes(xmlBytes);\n result.authnRequest = unmarshallFromDocument(result.document, AuthnRequestType.class);\n result.request = new AuthenticationRequest();\n result.request.xml = xml;\n result.request.id = result.authnRequest.getID();\n result.request.issuer = result.authnRequest.getIssuer().getValue();\n result.request.issueInstant = result.authnRequest.getIssueInstant().toGregorianCalendar().toZonedDateTime();\n NameIDPolicyType nameIdPolicyType = result.authnRequest.getNameIDPolicy();\n if (nameIdPolicyType == null) {\n result.request.nameIdFormat = NameIDFormat.EmailAddress;\n } else {\n result.request.nameIdFormat = NameIDFormat.fromSAMLFormat(nameIdPolicyType.getFormat());\n }\n result.request.version = result.authnRequest.getVersion();\n return result;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (keySpec == null) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\ttry {\n\t\t\tsetup(ad);\n\t\t} catch (InvalidKeyException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (InvalidAlgorithmParameterException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(iv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ iv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\ttry {\n\t\t\tint result = cipher.update(ciphertext, ciphertextOffset, dataLen, plaintext, plaintextOffset);\n\t\t\tcipher.doFinal(plaintext, plaintextOffset + result);\n\t\t} catch (IllegalBlockSizeException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t} catch (BadPaddingException e) {\n\t\t\t// Shouldn't happen.\n\t\t\tthrow new IllegalStateException(e);\n\t\t}\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " public void testCreateHttpUrlConnection() {\n HttpURLConnection conn;\n // Test without proxy\n conn = createHttpUrlConnection(convertToUrl(TEST_URL), \"\", 0, \"\", \"\");\n Assert.assertNotNull(conn);\n // Test with the proxy\n conn = createHttpUrlConnection(convertToUrl(TEST_URL), \"http://localhost\", 9090, \"testUser\", \"testPassword\");\n Assert.assertNotNull(conn);\n }", "label_name": "CWE-306", "label": 306}
{"code": " public static Object deserialize(byte[] data)\n throws IOException, ClassNotFoundException\n {\n ByteArrayInputStream in = new ByteArrayInputStream(data);\n ObjectInputStream is = new ObjectInputStream(in);\n return is.readObject();\n }", "label_name": "CWE-502", "label": 502}
{"code": " public DefaultFileSystemResourceLoader(File baseDirPath) {\n this.baseDirPath = Optional.of(baseDirPath.toPath());\n }", "label_name": "CWE-22", "label": 22}
{"code": " private static void createBaloInHomeRepo(HttpURLConnection conn, String modulePathInBaloCache,\n String moduleNameWithOrg, boolean isNightlyBuild, String newUrl, String contentDisposition) {\n long responseContentLength = conn.getContentLengthLong();\n if (responseContentLength <= 0) {\n createError(\"invalid response from the server, please try again\");\n }\n String resolvedURI = conn.getHeaderField(RESOLVED_REQUESTED_URI);\n if (resolvedURI == null || resolvedURI.equals(\"\")) {\n resolvedURI = newUrl;\n }\n String[] uriParts = resolvedURI.split(\"/\");\n String moduleVersion = uriParts[uriParts.length - 3];\n\n validateModuleVersion(moduleVersion);\n String baloFile = getBaloFileName(contentDisposition, uriParts[uriParts.length - 1]);\n Path baloCacheWithModulePath = Paths.get(modulePathInBaloCache, moduleVersion);\n //.ballerina/balo_cache///\n\n Path baloPath = Paths.get(baloCacheWithModulePath.toString(), baloFile);\n if (baloPath.toFile().exists()) {\n createError(\"module already exists in the home repository: \" + baloPath.toString());\n }\n\n createBaloFileDirectory(baloCacheWithModulePath);\n writeBaloFile(conn, baloPath, moduleNameWithOrg + \":\" + moduleVersion, responseContentLength);\n handleNightlyBuild(isNightlyBuild, baloCacheWithModulePath);\n }", "label_name": "CWE-306", "label": 306}
{"code": "\tpublic void testCurveCheckOk()\n\t\tthrows Exception {\n\t\t\n\t\tECPublicKey ephemeralPublicKey = generateECPublicKey(ECKey.Curve.P_256);\n\t\tECPrivateKey privateKey = generateECPrivateKey(ECKey.Curve.P_256);\n\t\tECDH.ensurePointOnCurve(ephemeralPublicKey, privateKey);\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " public void setStripWhitespaceText(boolean stripWhitespaceText) {\n this.stripWhitespaceText = stripWhitespaceText;\n }", "label_name": "CWE-611", "label": 611}
{"code": "\t\tprivate void drawSingleCluster(UGraphic ug, IGroup group, ElkNode elkNode) {\n\t\t\tfinal Point2D corner = getPosition(elkNode);\n\t\t\tfinal URectangle rect = new URectangle(elkNode.getWidth(), elkNode.getHeight());\n\n\t\t\tPackageStyle packageStyle = group.getPackageStyle();\n\t\t\tfinal ISkinParam skinParam = diagram.getSkinParam();\n\t\t\tif (packageStyle == null)\n\t\t\t\tpackageStyle = skinParam.packageStyle();\n\n\t\t\tfinal UmlDiagramType umlDiagramType = diagram.getUmlDiagramType();\n\n\t\t\tfinal Style style = Cluster.getDefaultStyleDefinition(umlDiagramType.getStyleName(), group.getUSymbol())\n\t\t\t\t\t.getMergedStyle(skinParam.getCurrentStyleBuilder());\n\t\t\tfinal double shadowing = style.value(PName.Shadowing).asDouble();\n\t\t\tfinal UStroke stroke = Cluster.getStrokeInternal(group, skinParam, style);\n\n\t\t\tHColor backColor = getBackColor(umlDiagramType);\n\t\t\tbackColor = Cluster.getBackColor(backColor, skinParam, group.getStereotype(), umlDiagramType.getStyleName(),\n\t\t\t\t\tgroup.getUSymbol());\n\n\t\t\tfinal double roundCorner = group.getUSymbol() == null ? 0\n\t\t\t\t\t: group.getUSymbol().getSkinParameter().getRoundCorner(skinParam, group.getStereotype());\n\n\t\t\tfinal TextBlock ztitle = getTitleBlock(group);\n\t\t\tfinal TextBlock zstereo = TextBlockUtils.empty(0, 0);\n\n\t\t\tfinal ClusterDecoration decoration = new ClusterDecoration(packageStyle, group.getUSymbol(), ztitle,\n\t\t\t\t\tzstereo, 0, 0, elkNode.getWidth(), elkNode.getHeight(), stroke);\n\n\t\t\tfinal HColor borderColor = HColorUtils.BLACK;\n\t\t\tdecoration.drawU(ug.apply(new UTranslate(corner)), backColor, borderColor, shadowing, roundCorner,\n\t\t\t\t\tskinParam.getHorizontalAlignment(AlignmentParam.packageTitleAlignment, null, false, null),\n\t\t\t\t\tskinParam.getStereotypeAlignment(), 0);\n\n//\t\t\t// Print a simple rectangle right now\n//\t\t\tug.apply(HColorUtils.BLACK).apply(new UStroke(1.5)).apply(new UTranslate(corner)).draw(rect);\n\t\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tprotected String getCorsDomain(String referer, String userAgent)\n\t{\n\t\tString dom = null;\n\n\t\tif (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*draw[.]io/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".draw.io/\") + 8);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*diagrams[.]net/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".diagrams.net/\") + 13);\n\t\t}\n\t\telse if (referer != null && referer.toLowerCase()\n\t\t\t\t.matches(\"https?://([a-z0-9,-]+[.])*quipelements[.]com/.*\"))\n\t\t{\n\t\t\tdom = referer.toLowerCase().substring(0,\n\t\t\t\t\treferer.indexOf(\".quipelements.com/\") + 17);\n\t\t}\n\t\t// Enables Confluence/Jira proxy via referer or hardcoded user-agent (for old versions)\n\t\t// UA refers to old FF on macOS so low risk and fixes requests from existing servers\n\t\telse if ((referer != null\n\t\t\t\t&& referer.equals(\"draw.io Proxy Confluence Server\"))\n\t\t\t\t|| (userAgent != null && userAgent.equals(\n\t\t\t\t\t\t\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:50.0) Gecko/20100101 Firefox/50.0\")))\n\t\t{\n\t\t\tdom = \"\";\n\t\t}\n\n\t\treturn dom;\n\t}", "label_name": "CWE-601", "label": 601}
{"code": " public void testQuoteWorkingDirectoryAndExecutable_WDPathWithSingleQuotes_BackslashFileSep()\n {\n Shell sh = newShell();\n\n sh.setWorkingDirectory( \"\\\\usr\\\\local\\\\'something else'\" );\n sh.setExecutable( \"chmod\" );\n\n String executable = StringUtils.join( sh.getShellCommandLine( new String[]{} ).iterator(), \" \" );\n\n assertEquals( \"/bin/sh -c cd \\\"\\\\usr\\\\local\\\\\\'something else\\'\\\" && chmod\", executable );\n }", "label_name": "CWE-78", "label": 78}
{"code": " public void performTest()\n throws Exception\n {\n testKeyConversion();\n testAdaptiveKeyConversion();\n decodeTest();\n testECDSA239bitPrime();\n testECDSA239bitBinary();\n testGeneration();\n testKeyPairGenerationWithOIDs();\n testNamedCurveParameterPreservation();\n testNamedCurveSigning();\n testBSI();\n testMQVwithHMACOnePass();\n testAlgorithmParameters();\n }", "label_name": "CWE-347", "label": 347}
{"code": " private JsonNode yamlPathToJson(Path path) throws IOException {\n Yaml reader = new Yaml();\n ObjectMapper mapper = new ObjectMapper();\n Path p;\n \n try (InputStream in = Files.newInputStream(path)) {\n \treturn mapper.valueToTree(reader.load(in));\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": " protected HtmlRenderable htmlBody() {\n return HtmlElement.li().content(\n HtmlElement.span(HtmlAttribute.cssClass(\"artifact\")).content(\n HtmlElement.a(HtmlAttribute.href(getUrl()))\n .content(getFileName())\n )\n );\n\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic PlayerClock(String title, ISkinParam skinParam, TimingRuler ruler, int period, int pulse, int offset,\n\t\t\tboolean compact) {\n\t\tsuper(title, skinParam, ruler, compact);\n\t\tthis.displayTitle = title.length() > 0;\n\t\tthis.period = period;\n\t\tthis.pulse = pulse;\n\t\tthis.offset = offset;\n\t\tthis.suggestedHeight = 30;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " public void testByteSerialization() throws Exception {\n final IBaseDataObject d = DataObjectFactory.getInstance(\"abc\".getBytes(), \"testfile\", Form.UNKNOWN);\n final byte[] bytes = PayloadUtil.serializeToBytes(d);\n final String s1 = new String(bytes);\n assertTrue(\"Serializedion must include data from payload\", s1.indexOf(\"abc\") > -1);\n }", "label_name": "CWE-502", "label": 502}
{"code": "\tpublic static int beta() {\n\t\tfinal int beta = 1;\n\t\treturn beta;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " protected List getRawCommandLine( String executable, String[] arguments )\n {\n List commandLine = new ArrayList();\n StringBuilder sb = new StringBuilder();\n\n if ( executable != null )\n {\n String preamble = getExecutionPreamble();\n if ( preamble != null )\n {\n sb.append( preamble );\n }\n\n if ( isQuotedExecutableEnabled() )\n {\n char[] escapeChars = getEscapeChars( isSingleQuotedExecutableEscaped(), isDoubleQuotedExecutableEscaped() );\n\n sb.append( StringUtils.quoteAndEscape( getExecutable(), getExecutableQuoteDelimiter(), escapeChars, getQuotingTriggerChars(), '\\\\', false ) );\n }\n else\n {\n sb.append( getExecutable() );\n }\n }\n for ( int i = 0; i < arguments.length; i++ )\n {\n if ( sb.length() > 0 )\n {\n sb.append( \" \" );\n }\n\n if ( isQuotedArgumentsEnabled() )\n {\n char[] escapeChars = getEscapeChars( isSingleQuotedArgumentEscaped(), isDoubleQuotedArgumentEscaped() );\n\n sb.append( StringUtils.quoteAndEscape( arguments[i], getArgumentQuoteDelimiter(), escapeChars, getQuotingTriggerChars(), getArgumentEscapePattern(), false ) );\n }\n else\n {\n sb.append( arguments[i] );\n }\n }\n\n commandLine.add( sb.toString() );\n\n return commandLine;\n }", "label_name": "CWE-78", "label": 78}
{"code": "\tpublic static int version() {\n\t\treturn 1202204;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic static AlgorithmMode resolveAlgorithmMode(final JWEAlgorithm alg)\n\t\tthrows JOSEException {\n\n\t\tif (alg.equals(JWEAlgorithm.ECDH_ES)) {\n\n\t\t\treturn AlgorithmMode.DIRECT;\n\n\t\t} else if (alg.equals(JWEAlgorithm.ECDH_ES_A128KW) ||\n\t\t\talg.equals(JWEAlgorithm.ECDH_ES_A192KW) ||\n\t\t\talg.equals(JWEAlgorithm.ECDH_ES_A256KW)) {\n\n\t\t\treturn AlgorithmMode.KW;\n\t\t} else {\n\n\t\t\tthrow new JOSEException(AlgorithmSupportMessage.unsupportedJWEAlgorithm(\n\t\t\t\talg,\n\t\t\t\tECDHCryptoProvider.SUPPORTED_ALGORITHMS));\n\t\t}\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\tpublic static Path visit(File file, String filename, FileVisitor visitor) \n\tthrows IOException, IllegalArgumentException {\n\t\tif(!StringHelper.containsNonWhitespace(filename)) {\n\t\t\tfilename = file.getName();\n\t\t}\n\t\t\n\t\tPath fPath = null;\n\t\tif(file.isDirectory()) {\n\t\t\tfPath = file.toPath();\n\t\t} else if(filename != null && filename.toLowerCase().endsWith(\".zip\")) {\n\t\t\ttry {\n\t\t\t\tfPath = FileSystems.newFileSystem(file.toPath(), null).getPath(\"/\");\n\t\t\t} catch (ProviderNotFoundException | ServiceConfigurationError e) {\n\t\t\t\tthrow new IOException(\"Unreadable file with .zip extension: \" + file, e);\n\t\t\t}\n\t\t} else {\n\t\t\tfPath = file.toPath();\n\t\t}\n\t\tif(fPath != null) {\n\t\t Files.walkFileTree(fPath, visitor);\n\t\t}\n\t\treturn fPath;\n\t}", "label_name": "CWE-22", "label": 22}
{"code": " public static void beforeClass() throws IOException {\n final Random r = new Random();\n for (int i = 0; i < BYTES.length; i++) {\n BYTES[i] = (byte) r.nextInt(255);\n }\n\n tmp = File.createTempFile(\"netty-traffic\", \".tmp\");\n tmp.deleteOnExit();\n FileOutputStream out = null;\n try {\n out = new FileOutputStream(tmp);\n out.write(BYTES);\n out.flush();\n } catch (IOException e) {\n throw new RuntimeException(e);\n } finally {\n if (out != null) {\n try {\n out.close();\n } catch (IOException e) {\n // ignore\n }\n }\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " private RDFDescription parseAsResource(Node node) {\n // See: http://www.w3.org/TR/REC-rdf-syntax/#section-Syntax-parsetype-resource\n List entries = new ArrayList();\n\n for (Node child : asIterable(node.getChildNodes())) {\n if (child.getNodeType() != Node.ELEMENT_NODE) {\n continue;\n }\n\n entries.add(new XMPEntry(child.getNamespaceURI() + child.getLocalName(), child.getLocalName(), getChildTextValue(child)));\n }\n\n return new RDFDescription(entries);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic static long compileTime() {\n\t\treturn 1649510957985L;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tprotected SymbolContext getContextLegacy() {\n\t\tthrow new UnsupportedOperationException();\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic int encryptWithAd(byte[] ad, byte[] plaintext, int plaintextOffset,\n\t\t\tbyte[] ciphertext, int ciphertextOffset, int length)\n\t\t\tthrows ShortBufferException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the plaintext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (space < 16 || length > (space - 16))\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tencryptCTR(plaintext, plaintextOffset, ciphertext, ciphertextOffset, length);\n\t\tghash.update(ciphertext, ciphertextOffset, length);\n\t\tghash.pad(ad != null ? ad.length : 0, length);\n\t\tghash.finish(ciphertext, ciphertextOffset + length, 16);\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\tciphertext[ciphertextOffset + length + index] ^= hashKey[index];\n\t\treturn length + 16;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tpoly.update(ciphertext, ciphertextOffset, dataLen);\n\t\tfinish(ad, dataLen);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (polyKey[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencrypt(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public AsciiString generateSessionId() {\n ThreadLocalRandom random = ThreadLocalRandom.current();\n UUID uuid = new UUID(random.nextLong(), random.nextLong());\n return AsciiString.of(uuid.toString());\n }", "label_name": "CWE-338", "label": 338}
{"code": "\t\tpublic FileVisitResult visitFile(Path file, BasicFileAttributes attrs)\n\t throws IOException {\n\t\t\tString filename = file.getFileName().toString();\n\t\t\tPath normalizedPath = file.normalize();\n\t\t\tif(!normalizedPath.startsWith(destDir)) {\n\t\t\t\tthrow new IOException(\"Invalid ZIP\");\n\t\t\t}\n\t\t\t\n\t if(filename.endsWith(WikiManager.WIKI_PROPERTIES_SUFFIX)) {\n\t \tString f = convertAlternativeFilename(file.toString());\n\t \tfinal Path destFile = Paths.get(wikiDir.toString(), f);\n\t \tresetAndCopyProperties(file, destFile);\n\t } else if (filename.endsWith(WIKI_FILE_SUFFIX)) {\n\t \tString f = convertAlternativeFilename(file.toString());\n\t \tfinal Path destFile = Paths.get(wikiDir.toString(), f);\n\t \tFiles.copy(file, destFile, StandardCopyOption.REPLACE_EXISTING);\n\t\t\t} else if (!filename.contains(WIKI_FILE_SUFFIX + \"-\")\n\t\t\t\t\t&& !filename.contains(WIKI_PROPERTIES_SUFFIX + \"-\")) {\n\t\t\t\tfinal Path destFile = Paths.get(mediaDir.toString(), file.toString());\n\t\t\t\tFiles.copy(file, destFile, StandardCopyOption.REPLACE_EXISTING);\n\t\t\t}\n\t return FileVisitResult.CONTINUE;\n\t\t}", "label_name": "CWE-22", "label": 22}
{"code": " public void testRenameTo() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n final int totalByteCount = 4096;\n byte[] bytes = new byte[totalByteCount];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n ByteBuf content = Unpooled.wrappedBuffer(bytes);\n test.setContent(content);\n boolean succ = test.renameTo(tmpFile);\n assertTrue(succ);\n FileInputStream fis = new FileInputStream(tmpFile);\n try {\n byte[] buf = new byte[totalByteCount];\n int count = 0;\n int offset = 0;\n int size = totalByteCount;\n while ((count = fis.read(buf, offset, size)) > 0) {\n offset += count;\n size -= count;\n if (offset >= totalByteCount || size <= 0) {\n break;\n }\n }\n assertArrayEquals(bytes, buf);\n assertEquals(0, fis.available());\n } finally {\n fis.close();\n }\n } finally {\n //release the ByteBuf in AbstractMemoryHttpData\n test.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": " public NettyHttpHeaders() {\n this.nettyHeaders = new DefaultHttpHeaders(false);\n this.conversionService = ConversionService.SHARED;\n }", "label_name": "CWE-444", "label": 444}
{"code": " public void setProperty(String name, Object value) throws SAXException {\n getXMLReader().setProperty(name, value);\n }", "label_name": "CWE-611", "label": 611}
{"code": "\tpublic VFSLeaf createChildLeaf(String name) {\n\t\tFile fNewFile = new File(getBasefile(), name);\n\t\ttry {\n\t\t\tif(!fNewFile.getParentFile().exists()) {\n\t\t\t\tfNewFile.getParentFile().mkdirs();\n\t\t\t}\n\t\t\tif (!fNewFile.createNewFile()) {\n\t\t\t\tlog.warn(\"Could not create a new leaf::\" + name + \" in container::\" + getBasefile().getAbsolutePath() + \" - file alreay exists\");\n\t\t\t\treturn null;\n\t\t\t} \n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"Error while creating child leaf::\" + name + \" in container::\" + getBasefile().getAbsolutePath(), e);\n\t\t\treturn null;\n\t\t}\n\t\treturn new LocalFileImpl(fNewFile, this);\n\t}", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic static final Binder fromPath(Path path)\n\tthrows IOException {\t\n\t\ttry(InputStream inStream = Files.newInputStream(path)) {\n\t\t\treturn (Binder)myStream.fromXML(inStream);\n\t\t} catch (Exception e) {\n\t\t\tlog.error(\"Cannot import this map: \" + path, e);\n\t\t\treturn null;\n\t\t}\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic void testUpdateMapper_serializade_withExpirationDate() {\n\t\t//create a mapper\n\t\tString mapperId = UUID.randomUUID().toString();\n\t\tString sessionId = UUID.randomUUID().toString().substring(0, 32);\n\t\tPersistentMapper sMapper = new PersistentMapper(\"mapper-to-persist-until\");\n\t\tPersistedMapper pMapper = mapperDao.persistMapper(sessionId, mapperId, sMapper, 60000);\n\t\tAssert.assertNotNull(pMapper);\n\t\tdbInstance.commitAndCloseSession();\n\t\t\n\t\t//load the mapper\n\t\tPersistedMapper loadedMapper = mapperDao.loadByMapperId(mapperId);\n\t\tAssert.assertNotNull(loadedMapper);\n\t\tObject objReloaded = XStreamHelper.createXStreamInstance().fromXML(pMapper.getXmlConfiguration());\n\t\tAssert.assertTrue(objReloaded instanceof PersistentMapper);\n\t\tPersistentMapper sMapperReloaded = (PersistentMapper)objReloaded;\n\t\tAssert.assertEquals(\"mapper-to-persist-until\", sMapperReloaded.getKey());\n\t\tAssert.assertNotNull(loadedMapper.getExpirationDate());\n\t\t\n\t\t//update\n\t\tPersistentMapper sMapper2 = new PersistentMapper(\"mapper-to-update-until\");\n\t\tboolean updated = mapperDao.updateConfiguration(mapperId, sMapper2, 120000);\n\t\tAssert.assertTrue(updated);\n\t\tdbInstance.commitAndCloseSession();\n\t\t\n\t\t//load the updated mapper\n\t\tPersistedMapper loadedMapper2 = mapperDao.loadByMapperId(mapperId);\n\t\tAssert.assertNotNull(loadedMapper2);\n\t\tObject objReloaded2 = XStreamHelper.createXStreamInstance().fromXML(loadedMapper2.getXmlConfiguration());\n\t\tAssert.assertTrue(objReloaded2 instanceof PersistentMapper);\n\t\tPersistentMapper sMapperReloaded2 = (PersistentMapper)objReloaded2;\n\t\tAssert.assertEquals(\"mapper-to-update-until\", sMapperReloaded2.getKey());\n\t\tAssert.assertNotNull(loadedMapper2.getExpirationDate());\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tpublic void testLoadMapper_serializade() {\n\t\t//create a mapper\n\t\tString mapperId = UUID.randomUUID().toString();\n\t\tString sessionId = UUID.randomUUID().toString().substring(0, 32);\n\t\tPersistentMapper sMapper = new PersistentMapper(\"mapper-to-persist\");\n\t\tPersistedMapper pMapper = mapperDao.persistMapper(sessionId, mapperId, sMapper, -1);\n\t\tAssert.assertNotNull(pMapper);\n\t\tdbInstance.commitAndCloseSession();\n\t\t\n\t\t//load the mapper\n\t\tPersistedMapper loadedMapper = mapperDao.loadByMapperId(mapperId);\n\t\tAssert.assertNotNull(loadedMapper);\n\t\tAssert.assertEquals(pMapper, loadedMapper);\n\t\tAssert.assertEquals(mapperId, loadedMapper.getMapperId());\n\n\t\tObject objReloaded = XStreamHelper.createXStreamInstance().fromXML(pMapper.getXmlConfiguration());\n\t\tAssert.assertTrue(objReloaded instanceof PersistentMapper);\n\t\tPersistentMapper sMapperReloaded = (PersistentMapper)objReloaded;\n\t\tAssert.assertEquals(\"mapper-to-persist\", sMapperReloaded.getKey());\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public Operation.OperationResult executeFixedCostOperation(\n final MessageFrame frame, final EVM evm) {\n Bytes shiftAmount = frame.popStackItem();\n if (shiftAmount.size() > 4 && (shiftAmount = shiftAmount.trimLeadingZeros()).size() > 4) {\n frame.popStackItem();\n frame.pushStackItem(UInt256.ZERO);\n } else {\n final int shiftAmountInt = shiftAmount.toInt();\n final Bytes value = leftPad(frame.popStackItem());\n\n if (shiftAmountInt >= 256) {\n frame.pushStackItem(UInt256.ZERO);\n } else {\n frame.pushStackItem(value.shiftRight(shiftAmountInt));\n }\n }\n return successResponse;\n }", "label_name": "CWE-681", "label": 681}
{"code": "\tpublic static String compileMustache(Map context, String template) {\n\t\tif (context == null || StringUtils.isBlank(template)) {\n\t\t\treturn \"\";\n\t\t}\n\t\tWriter writer = new StringWriter();\n\t\ttry {\n\t\t\tMustache.compiler().escapeHTML(false).emptyStringIsFalse(true).compile(template).execute(context, writer);\n\t\t} finally {\n\t\t\ttry {\n\t\t\t\twriter.close();\n\t\t\t} catch (IOException e) {\n\t\t\t\tlogger.error(null, e);\n\t\t\t}\n\t\t}\n\t\treturn writer.toString();\n\t}", "label_name": "CWE-79", "label": 79}
{"code": " public void testSetRequestMethod() {\n HttpURLConnection conn = createHttpUrlConnection(convertToUrl(TEST_URL), \"\", 0, \"\", \"\");\n Utils.setRequestMethod(conn, Utils.RequestMethod.POST);\n Assert.assertEquals(conn.getRequestMethod(), \"POST\");\n }", "label_name": "CWE-306", "label": 306}
{"code": " CreateCommentResponse saveComment() {\n CreateCommentRequest createCommentRequest = ZrLogUtil.convertRequestParam(getRequest().getParameterMap(), CreateCommentRequest.class);\n createCommentRequest.setIp(WebTools.getRealIp(getRequest()));\n createCommentRequest.setUserAgent(getHeader(\"User-Agent\"));\n return commentService.save(createCommentRequest);\n }", "label_name": "CWE-79", "label": 79}
{"code": "\tpublic void testMatchUse() {\n\n\t\tJWKMatcher matcher = new JWKMatcher.Builder().keyUse(KeyUse.ENCRYPTION).build();\n\n\t\tassertTrue(matcher.matches(new RSAKey.Builder(new Base64URL(\"n\"), new Base64URL(\"e\")).keyID(\"1\").keyUse(KeyUse.ENCRYPTION).build()));\n\t\tassertFalse(matcher.matches(new ECKey.Builder(ECKey.Curve.P_256, new Base64URL(\"x\"), new Base64URL(\"y\")).keyID(\"2\").build()));\n\t\t\n\t\tassertEquals(\"use=enc\", matcher.toString());\n\t}", "label_name": "CWE-347", "label": 347}
{"code": "\t public String getHeader(String name) {\n\t //logger.info(\"Ineader .. parameter .......\");\n\t String value = super.getHeader(name);\n\t if (value == null)\n\t return null;\n\t //logger.info(\"Ineader RequestWrapper ........... value ....\");\n\t return cleanXSS(value);\n\t }", "label_name": "CWE-79", "label": 79}
{"code": " public static Object deserialize(byte[] data)\n throws IOException, ClassNotFoundException\n {\n ByteArrayInputStream in = new ByteArrayInputStream(data);\n ObjectInputStream is = new ObjectInputStream(in);\n return is.readObject();\n }", "label_name": "CWE-470", "label": 470}
{"code": " public void encodeByteArrayDeepInJson() throws JSONException {\n JSONObject data = new JSONObject(\"{a: \\\"hi\\\", b: {}, c: {a: \\\"bye\\\", b: {}}}\");\n data.getJSONObject(\"b\").put(\"why\", new byte[3]);\n data.getJSONObject(\"c\").getJSONObject(\"b\").put(\"a\", new byte[6]);\n\n Packet packet = new Packet<>(Parser.BINARY_EVENT);\n packet.data = data;\n packet.id = 999;\n packet.nsp = \"/deep\";\n Helpers.testBin(packet);\n }", "label_name": "CWE-476", "label": 476}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(enciv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ enciv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencryptCTR(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-125", "label": 125}
{"code": " public void headerMultipleContentLengthValidationShouldPropagate() {\n LastInboundHandler inboundHandler = new LastInboundHandler();\n request.addLong(HttpHeaderNames.CONTENT_LENGTH, 0);\n request.addLong(HttpHeaderNames.CONTENT_LENGTH, 1);\n Http2StreamChannel channel = newInboundStream(3, false, inboundHandler);\n try {\n inboundHandler.checkException();\n fail();\n } catch (Exception e) {\n assertThat(e, CoreMatchers.instanceOf(StreamException.class));\n }\n assertNull(inboundHandler.readInbound());\n assertFalse(channel.isActive());\n }", "label_name": "CWE-444", "label": 444}
{"code": " private static boolean nameContainsForbiddenSequence(String name) {\n boolean result = false;\n if (name != null) {\n name = name.toLowerCase();\n \n result = name.startsWith(\".\") ||\n name.contains(\"../\") ||\n name.contains(\"..\\\\\") ||\n name.startsWith(\"/\") ||\n name.startsWith(\"\\\\\") ||\n name.endsWith(\"/\") ||\n \n name.contains(\"..%2f\") ||\n name.contains(\"..%5c\") ||\n name.startsWith(\"%2f\") ||\n name.startsWith(\"%5c\") ||\n name.endsWith(\"%2f\") ||\n \n name.contains(\"..\\\\u002f\") ||\n name.contains(\"..\\\\u005c\") ||\n name.startsWith(\"\\\\u002f\") ||\n name.startsWith(\"\\\\u005c\") ||\n name.endsWith(\"\\\\u002f\")\n \n ;\n }\n \n return result;\n }", "label_name": "CWE-22", "label": 22}
{"code": " public Optional getResource(String path) {\n boolean isDirectory = isDirectory(path);\n\n if (!isDirectory) {\n URL url = classLoader.getResource(prefixPath(path));\n return Optional.ofNullable(url);\n }\n return Optional.empty();\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void write(byte[] b, int offset, int length) throws IOException {\n if (b == null) {\n throw new NullPointerException();\n }\n\n if (offset < 0 || offset + length > b.length) {\n throw new ArrayIndexOutOfBoundsException();\n }\n\n write(fd, b, offset, length);\n }", "label_name": "CWE-787", "label": 787}
{"code": " private String marshallToString(Document document) throws TransformerException {\n StringWriter sw = new StringWriter();\n TransformerFactory tf = TransformerFactory.newInstance();\n Transformer transformer = tf.newTransformer();\n transformer.transform(new DOMSource(document), new StreamResult(sw));\n return sw.toString();\n }", "label_name": "CWE-611", "label": 611}
{"code": " public void encodeByteArray2() {\n Packet packet = new Packet<>(Parser.BINARY_EVENT);\n packet.data = new byte[2];\n packet.id = 0;\n packet.nsp = \"/\";\n Helpers.testBin(packet);\n }", "label_name": "CWE-476", "label": 476}
{"code": " public void onTaskSelectionEvent(@Observes TaskSelectionEvent event){\n selectedTaskId = event.getTaskId();\n selectedTaskName = event.getTaskName();\n \n view.getTaskIdAndName().setText(String.valueOf(selectedTaskId) + \" - \"+selectedTaskName);\n \n view.getContent().clear();\n \n String placeToGo;\n if(event.getPlace() != null && !event.getPlace().equals(\"\")){\n placeToGo = event.getPlace();\n }else{\n placeToGo = \"Task Details\";\n }\n \n \n\n DefaultPlaceRequest defaultPlaceRequest = new DefaultPlaceRequest(placeToGo);\n //Set Parameters here: \n defaultPlaceRequest.addParameter(\"taskId\", String.valueOf(selectedTaskId));\n defaultPlaceRequest.addParameter(\"taskName\", selectedTaskName);\n\n Set activities = activityManager.getActivities(defaultPlaceRequest);\n AbstractWorkbenchScreenActivity activity = ((AbstractWorkbenchScreenActivity) activities.iterator().next());\n \n activitiesMap.put(placeToGo, activity);\n \n IsWidget widget = activity.getWidget();\n activity.launch(place, null);\n activity.onStartup(defaultPlaceRequest);\n view.getContent().add(widget);\n activity.onOpen();\n }", "label_name": "CWE-79", "label": 79}
{"code": " ReservedChar(int rawChar, String percentEncodedChar, byte marker) {\n this.rawChar = rawChar;\n this.percentEncodedChar = percentEncodedChar;\n this.marker = marker;\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic void testCurveCheckNegative_P256_attackPt2()\n\t\tthrows Exception {\n\t\t\n\t\t// The malicious JWE contains a public key with order 2447\n\t\tString maliciousJWE = \"eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiWE9YR1E5XzZRQ3ZCZzN1OHZDSS1VZEJ2SUNBRWNOTkJyZnFkN3RHN29RNCIsInkiOiJoUW9XTm90bk56S2x3aUNuZUprTElxRG5UTnc3SXNkQkM1M1ZVcVZqVkpjIiwiY3J2IjoiUC0yNTYifX0.UGb3hX3ePAvtFB9TCdWsNkFTv9QWxSr3MpYNiSBdW630uRXRBT3sxw.6VpU84oMob16DxOR98YTRw.y1UslvtkoWdl9HpugfP0rSAkTw1xhm_LbK1iRXzGdpYqNwIG5VU33UBpKAtKFBoA1Kk_sYtfnHYAvn-aes4FTg.UZPN8h7FcvA5MIOq-Pkj8A\";\n\t\tJWEObject jweObject = JWEObject.parse(maliciousJWE);\n\t\t\n\t\tECPublicKey ephemeralPublicKey = jweObject.getHeader().getEphemeralPublicKey().toECPublicKey();\n\t\t\n\t\tECPrivateKey privateKey = generateECPrivateKey(ECKey.Curve.P_256);\n\t\t\n\t\ttry {\n\t\t\tECDH.ensurePointOnCurve(ephemeralPublicKey, privateKey);\n\t\t\tfail();\n\t\t} catch (JOSEException e) {\n\t\t\tassertEquals(\"Invalid ephemeral public key: Point not on expected curve\", e.getMessage());\n\t\t}\n\t}", "label_name": "CWE-347", "label": 347}
{"code": " public SpotProtocolDecoder(Protocol protocol) {\n super(protocol);\n try {\n documentBuilder = DocumentBuilderFactory.newInstance().newDocumentBuilder();\n xPath = XPathFactory.newInstance().newXPath();\n messageExpression = xPath.compile(\"//messageList/message\");\n } catch (ParserConfigurationException | XPathExpressionException e) {\n throw new RuntimeException(e);\n }\n }", "label_name": "CWE-611", "label": 611}
{"code": " void equal() {\n final PathAndQuery res = PathAndQuery.parse(\"/=?a=b=1\");\n assertThat(res).isNotNull();\n assertThat(res.path()).isEqualTo(\"/=\");\n assertThat(res.query()).isEqualTo(\"a=b=1\");\n\n // '%3D' in a query string should never be decoded into '='.\n final PathAndQuery res2 = PathAndQuery.parse(\"/%3D?a%3db=1\");\n assertThat(res2).isNotNull();\n assertThat(res2.path()).isEqualTo(\"/=\");\n assertThat(res2.query()).isEqualTo(\"a%3Db=1\");\n }", "label_name": "CWE-22", "label": 22}
{"code": "\t\tprotected Class> getClassForNode(Node node) {\r\n\t\t\tClass> type = node.getType();\r\n\t\t\tif (type.getAnnotation(Editable.class) != null && !ClassUtils.isConcrete(type)) {\r\n\t\t\t\tImplementationRegistry registry = OneDev.getInstance(ImplementationRegistry.class);\r\n\t\t\t\tfor (Class> implementationClass: registry.getImplementations(node.getType())) {\r\n\t\t\t\t\tString implementationTag = new Tag(\"!\" + implementationClass.getSimpleName()).getValue();\r\n\t\t\t\t\tif (implementationTag.equals(node.getTag().getValue()))\r\n\t\t\t\t\t\treturn implementationClass;\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\t\r\n\t\t\treturn super.getClassForNode(node);\r\n\t\t}\r", "label_name": "CWE-502", "label": 502}
{"code": " public void setStringInternEnabled(boolean stringInternEnabled) {\n this.stringInternEnabled = stringInternEnabled;\n }", "label_name": "CWE-611", "label": 611}
{"code": " private static boolean appendOneByte(Bytes buf, int cp, boolean wasSlash, boolean isPath) {\n if (cp == 0x7F) {\n // Reject the control character: 0x7F\n return false;\n }\n\n if (cp >>> 5 == 0) {\n // Reject the control characters: 0x00..0x1F\n if (isPath) {\n return false;\n } else if (cp != 0x0A && cp != 0x0D && cp != 0x09) {\n // .. except 0x0A (LF), 0x0D (CR) and 0x09 (TAB) because they are used in a form.\n return false;\n }\n }\n\n if (cp == '/' && isPath) {\n if (!wasSlash) {\n buf.ensure(1);\n buf.add((byte) '/');\n } else {\n // Remove the consecutive slashes: '/path//with///consecutive////slashes'.\n }\n } else {\n buf.ensure(1);\n buf.add((byte) cp);\n }\n\n return true;\n }", "label_name": "CWE-22", "label": 22}
{"code": " public BCXMSSPrivateKey(PrivateKeyInfo keyInfo)\n throws IOException\n {\n XMSSKeyParams keyParams = XMSSKeyParams.getInstance(keyInfo.getPrivateKeyAlgorithm().getParameters());\n this.treeDigest = keyParams.getTreeDigest().getAlgorithm();\n\n XMSSPrivateKey xmssPrivateKey = XMSSPrivateKey.getInstance(keyInfo.parsePrivateKey());\n\n try\n {\n XMSSPrivateKeyParameters.Builder keyBuilder = new XMSSPrivateKeyParameters\n .Builder(new XMSSParameters(keyParams.getHeight(), DigestUtil.getDigest(treeDigest)))\n .withIndex(xmssPrivateKey.getIndex())\n .withSecretKeySeed(xmssPrivateKey.getSecretKeySeed())\n .withSecretKeyPRF(xmssPrivateKey.getSecretKeyPRF())\n .withPublicSeed(xmssPrivateKey.getPublicSeed())\n .withRoot(xmssPrivateKey.getRoot());\n\n if (xmssPrivateKey.getBdsState() != null)\n {\n keyBuilder.withBDSState((BDS)XMSSUtil.deserialize(xmssPrivateKey.getBdsState()));\n }\n\n this.keyParams = keyBuilder.build();\n }\n catch (ClassNotFoundException e)\n {\n throw new IOException(\"ClassNotFoundException processing BDS state: \" + e.getMessage());\n }\n }", "label_name": "CWE-502", "label": 502}
{"code": " public RainbowParameters(int[] vi)\n {\n this.vi = vi;\n try\n {\n checkParams();\n }\n catch (Exception e)\n {\n e.printStackTrace();\n }\n }", "label_name": "CWE-470", "label": 470}
{"code": " private String stripComments(String theScript) {\n return BLOCK_COMMENT_STRIPPER.matcher(theScript).replaceAll(\"\");\n }", "label_name": "CWE-94", "label": 94}
{"code": " void colon() {\n assertThat(PathAndQuery.parse(\"/:\")).isNotNull();\n assertThat(PathAndQuery.parse(\"/:/\")).isNotNull();\n assertThat(PathAndQuery.parse(\"/a/:\")).isNotNull();\n assertThat(PathAndQuery.parse(\"/a/:/\")).isNotNull();\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void resetPassword(UserReference userReference, String newPassword)\n throws ResetPasswordException\n {\n this.checkUserReference(userReference);\n XWikiContext context = this.contextProvider.get();\n\n DocumentUserReference documentUserReference = (DocumentUserReference) userReference;\n DocumentReference reference = documentUserReference.getReference();\n\n try {\n XWikiDocument userDocument = context.getWiki().getDocument(reference, context);\n userDocument.removeXObjects(RESET_PASSWORD_REQUEST_CLASS_REFERENCE);\n BaseObject userXObject = userDocument.getXObject(USER_CLASS_REFERENCE);\n userXObject.setStringValue(\"password\", newPassword);\n\n String saveComment = this.localizationManager.getTranslationPlain(\n \"xe.admin.passwordReset.step2.versionComment.passwordReset\");\n context.getWiki().saveDocument(userDocument, saveComment, true, context);\n } catch (XWikiException e) {\n throw new ResetPasswordException(\"Cannot open user document to perform reset password.\", e);\n }\n }", "label_name": "CWE-640", "label": 640}
{"code": " public void setSetContentFromFileExceptionally() throws Exception {\n final long maxSize = 4;\n DiskFileUpload f1 = new DiskFileUpload(\"file5\", \"file5\", \"application/json\", null, null, 0);\n f1.setMaxSize(maxSize);\n try {\n f1.setContent(Unpooled.wrappedBuffer(new byte[(int) maxSize]));\n File originalFile = f1.getFile();\n assertNotNull(originalFile);\n assertEquals(maxSize, originalFile.length());\n assertEquals(maxSize, f1.length());\n byte[] bytes = new byte[8];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n try {\n f1.setContent(tmpFile);\n fail(\"should not reach here!\");\n } catch (IOException e) {\n assertNotNull(f1.getFile());\n assertEquals(originalFile, f1.getFile());\n assertEquals(maxSize, f1.length());\n }\n } finally {\n f1.delete();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " private static void appendHexNibble(StringBuilder buf, int nibble) {\n if (nibble < 10) {\n buf.append((char) ('0' + nibble));\n } else {\n buf.append((char) ('A' + nibble - 10));\n }\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void shouldNotAllowToListFileOutsideRoot() throws Exception {\n // given\n expectedException.expect(IllegalArgumentException.class);\n expectedException.expectMessage(containsString(\"this String argument must not contain the substring [..]\"));\n\n // when\n logViewEndpoint.view(\"../somefile\", null, null, null);\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void setIncludeInternalDTDDeclarations(boolean include) {\n this.includeInternalDTDDeclarations = include;\n }", "label_name": "CWE-611", "label": 611}
{"code": " protected int addFileNames(String[] file) { // This appears to only be used by unit tests\n for (int i = 0; file != null && i < file.length; i++) {\n workUnitList.add(new WorkUnit(file[i]));\n }\n return size();\n }", "label_name": "CWE-502", "label": 502}
{"code": " private JWTClaimsSet fetchOidcProfile(BearerAccessToken accessToken) {\n final var userInfoRequest = new UserInfoRequest(configuration.findProviderMetadata().getUserInfoEndpointURI(),\n accessToken);\n final var userInfoHttpRequest = userInfoRequest.toHTTPRequest();\n configuration.configureHttpRequest(userInfoHttpRequest);\n try {\n final var httpResponse = userInfoHttpRequest.send();\n logger.debug(\"Token response: status={}, content={}\", httpResponse.getStatusCode(),\n httpResponse.getContent());\n final var userInfoResponse = UserInfoResponse.parse(httpResponse);\n if (userInfoResponse instanceof UserInfoErrorResponse) {\n logger.error(\"Bad User Info response, error={}\",\n ((UserInfoErrorResponse) userInfoResponse).getErrorObject().toJSONObject());\n throw new AuthenticationException();\n } else {\n final var userInfoSuccessResponse = (UserInfoSuccessResponse) userInfoResponse;\n final JWTClaimsSet userInfoClaimsSet;\n if (userInfoSuccessResponse.getUserInfo() != null) {\n userInfoClaimsSet = userInfoSuccessResponse.getUserInfo().toJWTClaimsSet();\n } else {\n userInfoClaimsSet = userInfoSuccessResponse.getUserInfoJWT().getJWTClaimsSet();\n }\n return userInfoClaimsSet;\n }\n } catch (IOException | ParseException | java.text.ParseException | AuthenticationException e) {\n throw new TechnicalException(e);\n }\n }", "label_name": "CWE-347", "label": 347}
{"code": " public InvalidExtensionException(String[] allowedExtension, String extension, String filename)\r\n {\r\n super(\"filename : [\" + filename + \"], extension : [\" + extension + \"], allowed extension : [\" + Arrays.toString(allowedExtension) + \"]\");\r\n this.allowedExtension = allowedExtension;\r\n this.extension = extension;\r\n this.filename = filename;\r\n }\r", "label_name": "CWE-79", "label": 79}
{"code": " public ClassPathResource(String path, ClassLoader classLoader) {\n Assert.notNull(path, \"Path must not be null\");\n Assert.state(doesNotContainFileColon(path), \"Path must not contain 'file:'\");\n\n String pathToUse = StringUtils.cleanPath(path);\n\n if (pathToUse.startsWith(\"/\")) {\n pathToUse = pathToUse.substring(1);\n }\n\n this.path = pathToUse;\n this.classLoader = (classLoader != null ? classLoader : ClassUtils.getDefaultClassLoader());\n }", "label_name": "CWE-22", "label": 22}
{"code": " protected String getContent(SxSource sxSource, FilesystemExportContext exportContext)\n {\n String content;\n\n // We know we're inside a SX file located at \"sx///sx.\". Inside this CSS\n // there can be URLs and we need to ensure that the prefix for these URLs lead to the root of the path, i.e.\n // 3 levels up (\"../../../\").\n // To make this happen we reuse the Doc Parent Level from FileSystemExportContext to a fixed value of 3.\n // We also make sure to put back the original value\n int originalDocParentLevel = exportContext.getDocParentLevel();\n try {\n exportContext.setDocParentLevels(3);\n content = sxSource.getContent();\n } finally {\n exportContext.setDocParentLevels(originalDocParentLevel);\n }\n\n return content;\n }", "label_name": "CWE-22", "label": 22}
{"code": "\tpublic static HColor unlinear(HColor color1, HColor color2, int completion) {\n\t\tif (completion == 0) {\n\t\t\treturn color1;\n\t\t}\n\t\tif (completion == 100) {\n\t\t\treturn color2;\n\t\t}\n\t\tif (color1 instanceof HColorSimple && color2 instanceof HColorSimple) {\n\t\t\treturn HColorSimple.unlinear((HColorSimple) color1, (HColorSimple) color2, completion);\n\t\t}\n\t\treturn color1;\n\t}", "label_name": "CWE-918", "label": 918}
{"code": " function findLateSubscriptionSortedByPriority() {\n if (late_subscriptions.length === 0) {\n return null;\n }\n late_subscriptions.sort(compare_subscriptions);\n\n // istanbul ignore next\n if (doDebug) {\n debugLog(\n late_subscriptions\n .map(\n (s: Subscription) =>\n \"[ id = \" +\n s.id +\n \" prio=\" +\n s.priority +\n \" t=\" +\n s.timeToExpiration +\n \" ka=\" +\n s.timeToKeepAlive +\n \" m?=\" +\n s.hasUncollectedMonitoredItemNotifications +\n \" \" + \n SubscriptionState[s.state] +\n \" \" + s.messageSent + \n \"]\"\n )\n .join(\" \\n\")\n );\n }\n return late_subscriptions[late_subscriptions.length - 1];\n }", "label_name": "CWE-770", "label": 770}
{"code": "\tpublic Mapper retrieveMapperById(String mapperId) {\n\t\tList mappers = dbInstance.getCurrentEntityManager()\n\t\t\t\t.createNamedQuery(\"loadMapperByKey\", PersistedMapper.class)\n\t\t\t\t.setParameter(\"mapperId\", mapperId)\n\t\t\t\t.getResultList();\n\t\tPersistedMapper pm = mappers.isEmpty() ? null : mappers.get(0);\n\t\t\n\t\tif(pm != null && StringHelper.containsNonWhitespace(pm.getXmlConfiguration())) {\n\t\t\tString configuration = pm.getXmlConfiguration();\n\t\t\t\n\t\t\tObject obj = XStreamHelper.createXStreamInstance().fromXML(configuration);\n\t\t\tif(obj instanceof Mapper) {\n\t\t\t\treturn (Mapper)obj;\n\t\t\t}\n\t\t}\n\t\treturn null;\n\t}", "label_name": "CWE-91", "label": 91}
{"code": "\tfinal protected FontConfiguration getFontConfiguration() {\n\t\tif (UseStyle.useBetaStyle() == false)\n\t\t\treturn FontConfiguration.create(skinParam, FontParam.TIMING, null);\n\t\treturn FontConfiguration.create(skinParam, StyleSignatureBasic.of(SName.root, SName.element, SName.timingDiagram)\n\t\t\t\t.getMergedStyle(skinParam.getCurrentStyleBuilder()));\n\t}", "label_name": "CWE-918", "label": 918}
{"code": "\tpublic int decryptWithAd(byte[] ad, byte[] ciphertext,\n\t\t\tint ciphertextOffset, byte[] plaintext, int plaintextOffset,\n\t\t\tint length) throws ShortBufferException, BadPaddingException {\n\t\tint space;\n\t\tif (ciphertextOffset > ciphertext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = ciphertext.length - ciphertextOffset;\n\t\tif (length > space)\n\t\t\tthrow new ShortBufferException();\n\t\tif (plaintextOffset > plaintext.length)\n\t\t\tspace = 0;\n\t\telse\n\t\t\tspace = plaintext.length - plaintextOffset;\n\t\tif (!haskey) {\n\t\t\t// The key is not set yet - return the ciphertext as-is.\n\t\t\tif (length > space)\n\t\t\t\tthrow new ShortBufferException();\n\t\t\tif (plaintext != ciphertext || plaintextOffset != ciphertextOffset)\n\t\t\t\tSystem.arraycopy(ciphertext, ciphertextOffset, plaintext, plaintextOffset, length);\n\t\t\treturn length;\n\t\t}\n\t\tif (length < 16)\n\t\t\tNoise.throwBadTagException();\n\t\tint dataLen = length - 16;\n\t\tif (dataLen > space)\n\t\t\tthrow new ShortBufferException();\n\t\tsetup(ad);\n\t\tghash.update(ciphertext, ciphertextOffset, dataLen);\n\t\tghash.pad(ad != null ? ad.length : 0, dataLen);\n\t\tghash.finish(enciv, 0, 16);\n\t\tint temp = 0;\n\t\tfor (int index = 0; index < 16; ++index)\n\t\t\ttemp |= (hashKey[index] ^ enciv[index] ^ ciphertext[ciphertextOffset + dataLen + index]);\n\t\tif ((temp & 0xFF) != 0)\n\t\t\tNoise.throwBadTagException();\n\t\tencryptCTR(ciphertext, ciphertextOffset, plaintext, plaintextOffset, dataLen);\n\t\treturn dataLen;\n\t}", "label_name": "CWE-787", "label": 787}
{"code": " public void testWhitespaceBeforeTransferEncoding01() {\n String requestStr = \"GET /some/path HTTP/1.1\\r\\n\" +\n \" Transfer-Encoding : chunked\\r\\n\" +\n \"Content-Length: 1\\r\\n\" +\n \"Host: netty.io\\r\\n\\r\\n\" +\n \"a\";\n testInvalidHeaders0(requestStr);\n }", "label_name": "CWE-444", "label": 444}
{"code": " public void testSetContentFromFile() throws Exception {\n TestHttpData test = new TestHttpData(\"test\", UTF_8, 0);\n try {\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n byte[] bytes = new byte[4096];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n test.setContent(tmpFile);\n ByteBuf buf = test.getByteBuf();\n assertEquals(buf.readerIndex(), 0);\n assertEquals(buf.writerIndex(), bytes.length);\n assertArrayEquals(bytes, test.get());\n assertArrayEquals(bytes, ByteBufUtil.getBytes(buf));\n } finally {\n //release the ByteBuf\n test.delete();\n }\n }", "label_name": "CWE-378", "label": 378}
{"code": " private void ondata(byte[] data) {\n try {\n this.decoder.add(data);\n } catch (DecodingException e) {\n this.onerror(e);\n }\n }", "label_name": "CWE-476", "label": 476}
{"code": "\tpublic static boolean saveLinkList(HashMap portletMap){\n\t\tXStream xstream = XStreamHelper.createXStreamInstance();\n\t\txstream.alias(\"LinksPortlet\", Map.class);\n\t\txstream.alias(ELEM_LINK, PortletLink.class);\n\t\txstream.alias(ELEM_INSTITUTION, PortletInstitution.class);\n\t\txstream.aliasAttribute(PortletInstitution.class, ATTR_INSTITUTION_NAME, ATTR_INSTITUTION_NAME);\n\t\tString output = xstream.toXML(portletMap);\n\t\tXStreamHelper.writeObject(xstream, fxConfXStreamFile, portletMap);\n\t\treturn (output.length() != 0);\t\t\n\t}", "label_name": "CWE-91", "label": 91}
{"code": " public static void fillArticleInfo(Log data, HttpServletRequest request, String suffix) {\n data.put(\"alias\", data.get(\"alias\") + suffix);\n data.put(\"url\", WebTools.getHomeUrl(request) + Constants.getArticleUri() + data.get(\"alias\"));\n data.put(\"noSchemeUrl\", WebTools.getHomeUrlWithHost(request) + Constants.getArticleUri() + data.get(\"alias\"));\n data.put(\"typeUrl\", WebTools.getHomeUrl(request) + Constants.getArticleUri() + \"sort/\" + data.get(\"typeAlias\") + suffix);\n Log lastLog = data.get(\"lastLog\");\n Log nextLog = data.get(\"nextLog\");\n nextLog.put(\"url\", WebTools.getHomeUrl(request) + Constants.getArticleUri() + nextLog.get(\"alias\") + suffix);\n lastLog.put(\"url\", WebTools.getHomeUrl(request) + Constants.getArticleUri() + lastLog.get(\"alias\") + suffix);\n //\u6ca1\u6709\u4f7f\u7528md\u7684toc\u76ee\u5f55\u7684\u6587\u7ae0\u624d\u5c1d\u8bd5\u4f7f\u7528\u7cfb\u7edf\u63d0\u53d6\u7684\u76ee\u5f55\n if (data.getStr(\"markdown\") != null && !data.getStr(\"markdown\").toLowerCase().contains(\"[toc]\")\n && !data.getStr(\"markdown\").toLowerCase().contains(\"[tocm]\")) {\n //\u6700\u57fa\u7840\u7684\u5b9e\u73b0\u65b9\u5f0f\uff0c\u82e5\u9700\u8981\u66f4\u5f3a\u5927\u7684\u5b9e\u73b0\u65b9\u5f0f\u5efa\u8bae\u4f7f\u7528JavaScript\u5b8c\u6210\uff08\u9875\u9762\u8f93\u5165toc\u5bf9\u8c61\uff09\n OutlineVO outlineVO = OutlineUtil.extractOutline(data.getStr(\"content\"));\n data.put(\"tocHtml\", OutlineUtil.buildTocHtml(outlineVO, \"\"));\n data.put(\"toc\", outlineVO);\n }\n if (!new CommentService().isAllowComment()) {\n data.set(\"canComment\", false);\n }\n }", "label_name": "CWE-79", "label": 79}
{"code": " public void testPrivateKeyParsingSHA256()\n throws IOException, ClassNotFoundException\n {\n XMSSMTParameters params = new XMSSMTParameters(20, 10, new SHA256Digest());\n XMSSMT mt = new XMSSMT(params, new SecureRandom());\n mt.generateKeys();\n byte[] privateKey = mt.exportPrivateKey();\n byte[] publicKey = mt.exportPublicKey();\n\n mt.importState(privateKey, publicKey);\n\n assertTrue(Arrays.areEqual(privateKey, mt.exportPrivateKey()));\n }", "label_name": "CWE-470", "label": 470}
{"code": " private static boolean doesNotContainFileColon(String path) {\n return !path.contains(\"file:\");\n }", "label_name": "CWE-22", "label": 22}
{"code": " public void toScientificString(StringBuilder result) {\n assert(!isApproximate);\n if (isNegative()) {\n result.append('-');\n }\n if (precision == 0) {\n result.append(\"0E+0\");\n return;\n }\n // NOTE: It is not safe to add to lOptPos (aka maxInt) or subtract from\n // rOptPos (aka -maxFrac) due to overflow.\n int upperPos = Math.min(precision + scale, lOptPos) - scale - 1;\n int lowerPos = Math.max(scale, rOptPos) - scale;\n int p = upperPos;\n result.append((char) ('0' + getDigitPos(p)));\n if ((--p) >= lowerPos) {\n result.append('.');\n for (; p >= lowerPos; p--) {\n result.append((char) ('0' + getDigitPos(p)));\n }\n }\n result.append('E');\n int _scale = upperPos + scale;\n if (_scale < 0) {\n _scale *= -1;\n result.append('-');\n } else {\n result.append('+');\n }\n if (_scale == 0) {\n result.append('0');\n }\n int insertIndex = result.length();\n while (_scale > 0) {\n int quot = _scale / 10;\n int rem = _scale % 10;\n result.insert(insertIndex, (char) ('0' + rem));\n _scale = quot;\n }\n }", "label_name": "CWE-190", "label": 190}
{"code": " public void error(SAXParseException e) {\n }", "label_name": "CWE-611", "label": 611}
{"code": " private File tempFile() throws IOException {\n String newpostfix;\n String diskFilename = getDiskFilename();\n if (diskFilename != null) {\n newpostfix = '_' + diskFilename;\n } else {\n newpostfix = getPostfix();\n }\n File tmpFile;\n if (getBaseDirectory() == null) {\n // create a temporary file\n tmpFile = File.createTempFile(getPrefix(), newpostfix);\n } else {\n tmpFile = File.createTempFile(getPrefix(), newpostfix, new File(\n getBaseDirectory()));\n }\n if (deleteOnExit()) {\n // See https://github.com/netty/netty/issues/10351\n DeleteFileOnExitHook.add(tmpFile.getPath());\n }\n return tmpFile;\n }", "label_name": "CWE-378", "label": 378}
{"code": " public void setSetContentFromFileExceptionally() throws Exception {\n final long maxSize = 4;\n DiskFileUpload f1 = new DiskFileUpload(\"file5\", \"file5\", \"application/json\", null, null, 0);\n f1.setMaxSize(maxSize);\n try {\n f1.setContent(Unpooled.wrappedBuffer(new byte[(int) maxSize]));\n File originalFile = f1.getFile();\n assertNotNull(originalFile);\n assertEquals(maxSize, originalFile.length());\n assertEquals(maxSize, f1.length());\n byte[] bytes = new byte[8];\n PlatformDependent.threadLocalRandom().nextBytes(bytes);\n File tmpFile = File.createTempFile(UUID.randomUUID().toString(), \".tmp\");\n tmpFile.deleteOnExit();\n FileOutputStream fos = new FileOutputStream(tmpFile);\n try {\n fos.write(bytes);\n fos.flush();\n } finally {\n fos.close();\n }\n try {\n f1.setContent(tmpFile);\n fail(\"should not reach here!\");\n } catch (IOException e) {\n assertNotNull(f1.getFile());\n assertEquals(originalFile, f1.getFile());\n assertEquals(maxSize, f1.length());\n }\n } finally {\n f1.delete();\n }\n }", "label_name": "CWE-379", "label": 379}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n OpData* data = reinterpret_cast(node->user_data);\n\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 2);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n\n const TfLiteTensor* input1 = GetInput(context, node, kInputTensor1);\n const TfLiteTensor* input2 = GetInput(context, node, kInputTensor2);\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n\n TF_LITE_ENSURE_TYPES_EQ(context, input1->type, input2->type);\n output->type = input2->type;\n\n data->requires_broadcast = !HaveSameShapes(input1, input2);\n\n TfLiteIntArray* output_size = nullptr;\n if (data->requires_broadcast) {\n TF_LITE_ENSURE_OK(context, CalculateShapeForBroadcast(\n context, input1, input2, &output_size));\n } else {\n output_size = TfLiteIntArrayCopy(input1->dims);\n }\n\n return context->ResizeTensor(context, output, output_size);\n}", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus L2Eval(TfLiteContext* context, TfLiteNode* node) {\n auto* params = reinterpret_cast(node->builtin_data);\n OpData* data = reinterpret_cast(node->user_data);\n\n TfLiteTensor* output = GetOutput(context, node, 0);\n const TfLiteTensor* input = GetInput(context, node, 0);\n switch (input->type) { // Already know in/out types are same.\n case kTfLiteFloat32:\n L2EvalFloat(context, node, params, data, input, output);\n break;\n case kTfLiteUInt8:\n // We don't have a quantized implementation, so just fall through to the\n // 'default' case.\n default:\n context->ReportError(context, \"Type %d not currently supported.\",\n input->type);\n return kTfLiteError;\n }\n return kTfLiteOk;\n}", "label_name": "CWE-125", "label": 125}
{"code": "TfLiteStatus PrepareHashtableSize(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 1);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n\n const TfLiteTensor* input_resource_id_tensor =\n GetInput(context, node, kInputResourceIdTensor);\n TF_LITE_ENSURE_EQ(context, input_resource_id_tensor->type, kTfLiteInt32);\n TF_LITE_ENSURE_EQ(context, NumDimensions(input_resource_id_tensor), 1);\n TF_LITE_ENSURE_EQ(context, SizeOfDimension(input_resource_id_tensor, 0), 1);\n\n TfLiteTensor* output_tensor = GetOutput(context, node, kOutputTensor);\n TF_LITE_ENSURE(context, output_tensor != nullptr);\n TF_LITE_ENSURE_EQ(context, output_tensor->type, kTfLiteInt64);\n TfLiteIntArray* outputSize = TfLiteIntArrayCreate(1);\n outputSize->data[0] = 1;\n return context->ResizeTensor(context, output_tensor, outputSize);\n}", "label_name": "CWE-125", "label": 125}
{"code": "inline void StringData::setSize(int len) {\n assertx(!isImmutable() && !hasMultipleRefs());\n assertx(len >= 0 && len <= capacity());\n mutableData()[len] = 0;\n m_lenAndHash = len;\n assertx(m_hash == 0);\n assertx(checkSane());\n}", "label_name": "CWE-125", "label": 125}
{"code": "Status CreateTempFile(Env* env, float value, uint64 size, string* filename) {\n const string dir = testing::TmpDir();\n *filename = io::JoinPath(dir, strings::StrCat(\"file_\", value));\n std::unique_ptr file;\n TF_RETURN_IF_ERROR(env->NewWritableFile(*filename, &file));\n for (uint64 i = 0; i < size; ++i) {\n StringPiece sp(static_cast(static_cast(&value)),\n sizeof(value));\n TF_RETURN_IF_ERROR(file->Append(sp));\n }\n TF_RETURN_IF_ERROR(file->Close());\n return Status::OK();\n}", "label_name": "CWE-125", "label": 125}
{"code": "R_API RBinJavaAttrInfo *r_bin_java_source_code_file_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {\n\tif (!sz) {\n\t\treturn NULL;\n\t}\n\tut64 offset = 0;\n\tRBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);\n\toffset += 6;\n\tif (!attr) {\n\t\treturn NULL;\n\t}\n\tattr->type = R_BIN_JAVA_ATTR_TYPE_SOURCE_FILE_ATTR;\n\t// if (buffer + offset > buffer + sz) return NULL;\n\tattr->info.source_file_attr.sourcefile_idx = R_BIN_JAVA_USHORT (buffer, offset);\n\toffset += 2;\n\tattr->size = offset;\n\t// IFDBG r_bin_java_print_source_code_file_attr_summary(attr);\n\treturn attr;\n}", "label_name": "CWE-805", "label": 805}
{"code": "int TLSOutStream::writeTLS(const U8* data, int length)\n{\n int n;\n\n n = gnutls_record_send(session, data, length);\n if (n == GNUTLS_E_INTERRUPTED || n == GNUTLS_E_AGAIN)\n return 0;\n\n if (n < 0)\n throw TLSException(\"writeTLS\", n);\n\n return n;\n}", "label_name": "CWE-787", "label": 787}
{"code": " bool PamBackend::start(const QString &user) {\n bool result;\n\n QString service = QStringLiteral(\"sddm\");\n\n if (user == QStringLiteral(\"sddm\") && m_greeter)\n service = QStringLiteral(\"sddm-greeter\");\n else if (m_app->session()->path().isEmpty())\n service = QStringLiteral(\"sddm-check\");\n else if (m_autologin)\n service = QStringLiteral(\"sddm-autologin\");\n result = m_pam->start(service, user);\n\n if (!result)\n m_app->error(m_pam->errorString(), Auth::ERROR_INTERNAL);\n\n return result;\n }", "label_name": "CWE-613", "label": 613}
{"code": "AuthenticationFeature::AuthenticationFeature(application_features::ApplicationServer& server)\n : ApplicationFeature(server, \"Authentication\"),\n _userManager(nullptr),\n _authCache(nullptr),\n _authenticationUnixSockets(true),\n _authenticationSystemOnly(true),\n _localAuthentication(true),\n _active(true),\n _authenticationTimeout(0.0) {\n setOptional(false);\n startsAfter();\n\n#ifdef USE_ENTERPRISE\n startsAfter();\n#endif\n}", "label_name": "CWE-613", "label": 613}
{"code": "int FdInStream::pos()\n{\n return offset + ptr - start;\n}", "label_name": "CWE-787", "label": 787}
{"code": "void fx_DataView(txMachine* the)\n{\n\ttxSlot* slot;\n\ttxBoolean flag = 0;\n\ttxInteger offset, size;\n\ttxSlot* info;\n\ttxSlot* instance;\n\ttxSlot* view;\n\ttxSlot* buffer;\n\tif (mxIsUndefined(mxTarget))\n\t\tmxTypeError(\"call: DataView\");\n\tif ((mxArgc > 0) && (mxArgv(0)->kind == XS_REFERENCE_KIND)) {\n\t\tslot = mxArgv(0)->value.reference->next;\n\t\tif (slot && ((slot->kind == XS_ARRAY_BUFFER_KIND) || (slot->kind == XS_HOST_KIND))) {\n\t\t\tflag = 1;\n\t\t}\n\t}\n\tif (!flag)\n\t\tmxTypeError(\"buffer is no ArrayBuffer instance\");\n\t\t\n\toffset = fxArgToByteLength(the, 1, 0);\n\tinfo = fxGetBufferInfo(the, mxArgv(0));\n\tif (info->value.bufferInfo.length < offset)\n\t\tmxRangeError(\"out of range byteOffset %ld\", offset);\n\tsize = fxArgToByteLength(the, 2, -1);\n\tif (size >= 0) {\n\t\tif (info->value.bufferInfo.length < (offset + size))\n\t\t\tmxRangeError(\"out of range byteLength %ld\", size);\n\t}\n\telse {\n\t\tif (info->value.bufferInfo.maxLength < 0)\n\t\t\tsize = info->value.bufferInfo.length - offset;\n\t}\n\tmxPushSlot(mxTarget);\n\tfxGetPrototypeFromConstructor(the, &mxDataViewPrototype);\n\tinstance = fxNewDataViewInstance(the);\n\tmxPullSlot(mxResult);\n\tview = instance->next;\n\tbuffer = view->next;\n\tbuffer->kind = XS_REFERENCE_KIND;\n\tbuffer->value.reference = mxArgv(0)->value.reference;\n\tinfo = fxGetBufferInfo(the, buffer);\n\tif (info->value.bufferInfo.maxLength >= 0) {\n\t\tif (info->value.bufferInfo.length < offset)\n\t\t\tmxRangeError(\"out of range byteOffset %ld\", offset);\n\t\telse if (size >= 0) {\n\t\t\tif (info->value.bufferInfo.length < (offset + size))\n\t\t\t\tmxRangeError(\"out of range byteLength %ld\", size);\n\t\t}\n\t}\n\tview->value.dataView.offset = offset;\n\tview->value.dataView.size = size;\n}", "label_name": "CWE-125", "label": 125}
{"code": "QString Helper::temporaryMountDevice(const QString &device, const QString &name, bool readonly)\n{\n QString mount_point = mountPoint(device);\n\n if (!mount_point.isEmpty())\n return mount_point;\n\n mount_point = \"%1/.%2/mount/%3\";\n const QStringList &tmp_paths = QStandardPaths::standardLocations(QStandardPaths::TempLocation);\n\n mount_point = mount_point.arg(tmp_paths.isEmpty() ? \"/tmp\" : tmp_paths.first()).arg(qApp->applicationName()).arg(name);\n\n if (!QDir::current().mkpath(mount_point)) {\n dCError(\"mkpath \\\"%s\\\" failed\", qPrintable(mount_point));\n\n return QString();\n }\n\n if (!mountDevice(device, mount_point, readonly)) {\n dCError(\"Mount the device \\\"%s\\\" to \\\"%s\\\" failed\", qPrintable(device), qPrintable(mount_point));\n\n return QString();\n }\n\n return mount_point;\n}", "label_name": "CWE-59", "label": 59}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n int num_inputs = NumInputs(node);\n TF_LITE_ENSURE(context, num_inputs >= 2);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n\n const TfLiteTensor* input1 = GetInput(context, node, kInputTensor1);\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n output->type = input1->type;\n\n // Check that all input tensors have the same shape and type.\n for (int i = kInputTensor1 + 1; i < num_inputs; ++i) {\n const TfLiteTensor* input = GetInput(context, node, i);\n TF_LITE_ENSURE(context, HaveSameShapes(input1, input));\n TF_LITE_ENSURE_TYPES_EQ(context, input1->type, input->type);\n }\n\n // Use the first input node's dimension to be the dimension of the output\n // node.\n TfLiteIntArray* input1_dims = input1->dims;\n TfLiteIntArray* output_dims = TfLiteIntArrayCopy(input1_dims);\n return context->ResizeTensor(context, output, output_dims);\n}", "label_name": "CWE-125", "label": 125}
{"code": "TEST_F(ZNCTest, AwayNotify) {\n auto znc = Run();\n auto ircd = ConnectIRCd();\n auto client = ConnectClient();\n client.Write(\"CAP LS\");\n client.Write(\"PASS :hunter2\");\n client.Write(\"NICK nick\");\n client.Write(\"USER user/test x x :x\");\n QByteArray cap_ls;\n client.ReadUntilAndGet(\" LS :\", cap_ls);\n ASSERT_THAT(cap_ls.toStdString(), AllOf(HasSubstr(\"cap-notify\"), Not(HasSubstr(\"away-notify\"))));\n client.Write(\"CAP REQ :cap-notify\");\n client.ReadUntil(\"ACK :cap-notify\");\n client.Write(\"CAP END\");\n client.ReadUntil(\" 001 \");\n ircd.ReadUntil(\"USER\");\n ircd.Write(\"CAP user LS :away-notify\");\n ircd.ReadUntil(\"CAP REQ :away-notify\");\n ircd.Write(\"CAP user ACK :away-notify\");\n ircd.ReadUntil(\"CAP END\");\n ircd.Write(\":server 001 user :welcome\");\n client.ReadUntil(\"CAP user NEW :away-notify\");\n client.Write(\"CAP REQ :away-notify\");\n client.ReadUntil(\"ACK :away-notify\");\n ircd.Write(\":x!y@z AWAY :reason\");\n client.ReadUntil(\":x!y@z AWAY :reason\");\n ircd.Close();\n client.ReadUntil(\"DEL :away-notify\");\n}", "label_name": "CWE-476", "label": 476}
{"code": " void operator()(OpKernelContext* ctx, const Index num_segments,\n const TensorShape& segment_ids_shape,\n typename TTypes::ConstFlat segment_ids,\n const Index data_size, const T* data,\n typename TTypes::Tensor output) {\n if (output.size() == 0) {\n return;\n }\n // Set 'output' to initial value.\n GPUDevice d = ctx->template eigen_device();\n GpuLaunchConfig config = GetGpuLaunchConfig(output.size(), d);\n TF_CHECK_OK(GpuLaunchKernel(\n SetToValue, config.block_count, config.thread_per_block, 0,\n d.stream(), output.size(), output.data(), InitialValueF()()));\n if (data_size == 0 || segment_ids_shape.num_elements() == 0) {\n return;\n }\n // Launch kernel to compute unsorted segment reduction.\n // Notes:\n // *) 'data_size' is the total number of elements to process.\n // *) 'segment_ids.shape' is a prefix of data's shape.\n // *) 'input_outer_dim_size' is the total number of segments to process.\n const Index input_outer_dim_size = segment_ids.dimension(0);\n const Index input_inner_dim_size = data_size / input_outer_dim_size;\n config = GetGpuLaunchConfig(data_size, d);\n\n TF_CHECK_OK(\n GpuLaunchKernel(UnsortedSegmentCustomKernel,\n config.block_count, config.thread_per_block, 0,\n d.stream(), input_outer_dim_size, input_inner_dim_size,\n num_segments, segment_ids.data(), data, output.data()));\n }", "label_name": "CWE-681", "label": 681}
{"code": " inline void skip(int bytes) {\n while (bytes > 0) {\n int n = check(1, bytes);\n ptr += n;\n bytes -= n;\n }\n }", "label_name": "CWE-787", "label": 787}
{"code": "int FdInStream::readWithTimeoutOrCallback(void* buf, int len, bool wait)\n{\n struct timeval before, after;\n if (timing)\n gettimeofday(&before, 0);\n\n int n;\n while (true) {\n do {\n fd_set fds;\n struct timeval tv;\n struct timeval* tvp = &tv;\n\n if (!wait) {\n tv.tv_sec = tv.tv_usec = 0;\n } else if (timeoutms != -1) {\n tv.tv_sec = timeoutms / 1000;\n tv.tv_usec = (timeoutms % 1000) * 1000;\n } else {\n tvp = 0;\n }\n\n FD_ZERO(&fds);\n FD_SET(fd, &fds);\n n = select(fd+1, &fds, 0, 0, tvp);\n } while (n < 0 && errno == EINTR);\n\n if (n > 0) break;\n if (n < 0) throw SystemException(\"select\",errno);\n if (!wait) return 0;\n if (!blockCallback) throw TimedOut();\n\n blockCallback->blockCallback();\n }\n\n do {\n n = ::recv(fd, (char*)buf, len, 0);\n } while (n < 0 && errno == EINTR);\n\n if (n < 0) throw SystemException(\"read\",errno);\n if (n == 0) throw EndOfStream();\n\n if (timing) {\n gettimeofday(&after, 0);\n int newTimeWaited = ((after.tv_sec - before.tv_sec) * 10000 +\n (after.tv_usec - before.tv_usec) / 100);\n int newKbits = n * 8 / 1000;\n\n // limit rate to between 10kbit/s and 40Mbit/s\n\n if (newTimeWaited > newKbits*1000) newTimeWaited = newKbits*1000;\n if (newTimeWaited < newKbits/4) newTimeWaited = newKbits/4;\n\n timeWaitedIn100us += newTimeWaited;\n timedKbits += newKbits;\n }\n\n return n;\n}", "label_name": "CWE-787", "label": 787}
{"code": "void jas_matrix_setall(jas_matrix_t *matrix, jas_seqent_t val)\n{\n\tint i;\n\tint j;\n\tjas_seqent_t *rowstart;\n\tint rowstep;\n\tjas_seqent_t *data;\n\n\tif (jas_matrix_numrows(matrix) > 0 && jas_matrix_numcols(matrix) > 0) {\n\t\tassert(matrix->rows_);\n\t\trowstep = jas_matrix_rowstep(matrix);\n\t\tfor (i = matrix->numrows_, rowstart = matrix->rows_[0]; i > 0; --i,\n\t\t rowstart += rowstep) {\n\t\t\tfor (j = matrix->numcols_, data = rowstart; j > 0; --j,\n\t\t\t ++data) {\n\t\t\t\t*data = val;\n\t\t\t}\n\t\t}\n\t}\n}", "label_name": "CWE-190", "label": 190}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 3);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 2);\n\n const TfLiteTensor* lookup = GetInput(context, node, 0);\n TF_LITE_ENSURE_EQ(context, NumDimensions(lookup), 1);\n TF_LITE_ENSURE_EQ(context, lookup->type, kTfLiteInt32);\n\n const TfLiteTensor* key = GetInput(context, node, 1);\n TF_LITE_ENSURE_EQ(context, NumDimensions(key), 1);\n TF_LITE_ENSURE_EQ(context, key->type, kTfLiteInt32);\n\n const TfLiteTensor* value = GetInput(context, node, 2);\n TF_LITE_ENSURE(context, NumDimensions(value) >= 1);\n TF_LITE_ENSURE_EQ(context, SizeOfDimension(key, 0),\n SizeOfDimension(value, 0));\n if (value->type == kTfLiteString) {\n TF_LITE_ENSURE_EQ(context, NumDimensions(value), 1);\n }\n\n TfLiteTensor* hits = GetOutput(context, node, 1);\n TF_LITE_ENSURE_EQ(context, hits->type, kTfLiteUInt8);\n TfLiteIntArray* hitSize = TfLiteIntArrayCreate(1);\n hitSize->data[0] = SizeOfDimension(lookup, 0);\n\n TfLiteTensor* output = GetOutput(context, node, 0);\n TF_LITE_ENSURE_EQ(context, value->type, output->type);\n\n TfLiteStatus status = kTfLiteOk;\n if (output->type != kTfLiteString) {\n TfLiteIntArray* outputSize = TfLiteIntArrayCreate(NumDimensions(value));\n outputSize->data[0] = SizeOfDimension(lookup, 0);\n for (int i = 1; i < NumDimensions(value); i++) {\n outputSize->data[i] = SizeOfDimension(value, i);\n }\n status = context->ResizeTensor(context, output, outputSize);\n }\n if (context->ResizeTensor(context, hits, hitSize) != kTfLiteOk) {\n status = kTfLiteError;\n }\n return status;\n}", "label_name": "CWE-125", "label": 125}
{"code": "ALWAYS_INLINE String serialize_impl(const Variant& value,\n const SerializeOptions& opts) {\n switch (value.getType()) {\n case KindOfClass:\n case KindOfLazyClass:\n case KindOfPersistentString:\n case KindOfString: {\n auto const str =\n isStringType(value.getType()) ? value.getStringData() :\n isClassType(value.getType()) ? classToStringHelper(value.toClassVal()) :\n lazyClassToStringHelper(value.toLazyClassVal());\n auto const size = str->size();\n if (size >= RuntimeOption::MaxSerializedStringSize) {\n throw Exception(\"Size of serialized string (%d) exceeds max\", size);\n }\n StringBuffer sb;\n sb.append(\"s:\");\n sb.append(size);\n sb.append(\":\\\"\");\n sb.append(str->data(), size);\n sb.append(\"\\\";\");\n return sb.detach();\n }\n case KindOfResource:\n return s_Res;\n\n case KindOfUninit:\n case KindOfNull:\n case KindOfBoolean:\n case KindOfInt64:\n case KindOfFunc:\n case KindOfPersistentVec:\n case KindOfVec:\n case KindOfPersistentDict:\n case KindOfDict:\n case KindOfPersistentKeyset:\n case KindOfKeyset:\n case KindOfPersistentDArray:\n case KindOfDArray:\n case KindOfPersistentVArray:\n case KindOfVArray:\n case KindOfDouble:\n case KindOfObject:\n case KindOfClsMeth:\n case KindOfRClsMeth:\n case KindOfRFunc:\n case KindOfRecord:\n break;\n }\n VariableSerializer vs(VariableSerializer::Type::Serialize);\n if (opts.keepDVArrays) vs.keepDVArrays();\n if (opts.forcePHPArrays) vs.setForcePHPArrays();\n if (opts.warnOnHackArrays) vs.setHackWarn();\n if (opts.warnOnPHPArrays) vs.setPHPWarn();\n if (opts.ignoreLateInit) vs.setIgnoreLateInit();\n if (opts.serializeProvenanceAndLegacy) vs.setSerializeProvenanceAndLegacy();\n // Keep the count so recursive calls to serialize() embed references properly.\n return vs.serialize(value, true, true);\n}", "label_name": "CWE-787", "label": 787}
{"code": "NO_INLINE JsVar *jspeFactorDelete() {\n JSP_ASSERT_MATCH(LEX_R_DELETE);\n JsVar *parent = 0;\n JsVar *a = jspeFactorMember(jspeFactor(), &parent);\n JsVar *result = 0;\n if (JSP_SHOULD_EXECUTE) {\n bool ok = false;\n if (jsvIsName(a) && !jsvIsNewChild(a)) {\n // if no parent, check in root?\n if (!parent && jsvIsChild(execInfo.root, a))\n parent = jsvLockAgain(execInfo.root);\n\n if (jsvHasChildren(parent)) {\n // else remove properly.\n if (jsvIsArray(parent)) {\n // For arrays, we must make sure we don't change the length\n JsVarInt l = jsvGetArrayLength(parent);\n jsvRemoveChild(parent, a);\n jsvSetArrayLength(parent, l, false);\n } else {\n jsvRemoveChild(parent, a);\n }\n ok = true;\n }\n }\n\n result = jsvNewFromBool(ok);\n }\n jsvUnLock2(a, parent);\n return result;\n}", "label_name": "CWE-787", "label": 787}
{"code": "void test_base64_lengths(void)\n{\n const char *in = \"FuseMuse\";\n char out1[32];\n char out2[32];\n size_t enclen;\n int declen;\n\n /* Encoding a zero-length string should fail */\n enclen = mutt_b64_encode(out1, in, 0, 32);\n if (!TEST_CHECK(enclen == 0))\n {\n TEST_MSG(\"Expected: %zu\", 0);\n TEST_MSG(\"Actual : %zu\", enclen);\n }\n\n /* Decoding a zero-length string should fail, too */\n out1[0] = '\\0';\n declen = mutt_b64_decode(out2, out1);\n if (!TEST_CHECK(declen == -1))\n {\n TEST_MSG(\"Expected: %zu\", -1);\n TEST_MSG(\"Actual : %zu\", declen);\n }\n\n /* Encode one to eight bytes, check the lengths of the returned string */\n for (size_t i = 1; i <= 8; ++i)\n {\n enclen = mutt_b64_encode(out1, in, i, 32);\n size_t exp = ((i + 2) / 3) << 2;\n if (!TEST_CHECK(enclen == exp))\n {\n TEST_MSG(\"Expected: %zu\", exp);\n TEST_MSG(\"Actual : %zu\", enclen);\n }\n declen = mutt_b64_decode(out2, out1);\n if (!TEST_CHECK(declen == i))\n {\n TEST_MSG(\"Expected: %zu\", i);\n TEST_MSG(\"Actual : %zu\", declen);\n }\n out2[declen] = '\\0';\n if (!TEST_CHECK(strncmp(out2, in, i) == 0))\n {\n TEST_MSG(\"Expected: %s\", in);\n TEST_MSG(\"Actual : %s\", out2);\n }\n }\n}", "label_name": "CWE-120", "label": 120}
{"code": "TfLiteStatus MockCustom::Invoke(TfLiteContext* context, TfLiteNode* node) {\n const TfLiteTensor* input = tflite::GetInput(context, node, 0);\n const int32_t* input_data = input->data.i32;\n const TfLiteTensor* weight = tflite::GetInput(context, node, 1);\n const uint8_t* weight_data = weight->data.uint8;\n TfLiteTensor* output = GetOutput(context, node, 0);\n int32_t* output_data = output->data.i32;\n output_data[0] =\n 0; // Catch output tensor sharing memory with an input tensor\n output_data[0] = input_data[0] + weight_data[0];\n return kTfLiteOk;\n}", "label_name": "CWE-125", "label": 125}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 5);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n\n const TfLiteTensor* ids = GetInput(context, node, 0);\n TF_LITE_ENSURE_EQ(context, NumDimensions(ids), 1);\n TF_LITE_ENSURE_EQ(context, ids->type, kTfLiteInt32);\n\n const TfLiteTensor* indices = GetInput(context, node, 1);\n TF_LITE_ENSURE_EQ(context, NumDimensions(indices), 2);\n TF_LITE_ENSURE_EQ(context, indices->type, kTfLiteInt32);\n\n const TfLiteTensor* shape = GetInput(context, node, 2);\n TF_LITE_ENSURE_EQ(context, NumDimensions(shape), 1);\n TF_LITE_ENSURE_EQ(context, shape->type, kTfLiteInt32);\n\n const TfLiteTensor* weights = GetInput(context, node, 3);\n TF_LITE_ENSURE_EQ(context, NumDimensions(weights), 1);\n TF_LITE_ENSURE_EQ(context, weights->type, kTfLiteFloat32);\n\n TF_LITE_ENSURE_EQ(context, SizeOfDimension(indices, 0),\n SizeOfDimension(ids, 0));\n TF_LITE_ENSURE_EQ(context, SizeOfDimension(indices, 0),\n SizeOfDimension(weights, 0));\n\n const TfLiteTensor* value = GetInput(context, node, 4);\n TF_LITE_ENSURE(context, NumDimensions(value) >= 2);\n\n // Mark the output as a dynamic tensor.\n TfLiteTensor* output = GetOutput(context, node, 0);\n TF_LITE_ENSURE_TYPES_EQ(context, output->type, kTfLiteFloat32);\n output->allocation_type = kTfLiteDynamic;\n\n return kTfLiteOk;\n}", "label_name": "CWE-125", "label": 125}
{"code": "FdInStream::FdInStream(int fd_, int timeoutms_, int bufSize_,\n bool closeWhenDone_)\n : fd(fd_), closeWhenDone(closeWhenDone_),\n timeoutms(timeoutms_), blockCallback(0),\n timing(false), timeWaitedIn100us(5), timedKbits(0),\n bufSize(bufSize_ ? bufSize_ : DEFAULT_BUF_SIZE), offset(0)\n{\n ptr = end = start = new U8[bufSize];\n}", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus GenericPrepare(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 1);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n const TfLiteTensor* input = GetInput(context, node, 0);\n TfLiteTensor* output = GetOutput(context, node, 0);\n TF_LITE_ENSURE_TYPES_EQ(context, input->type, output->type);\n\n return context->ResizeTensor(context, output,\n TfLiteIntArrayCopy(input->dims));\n}", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {\n OpData* data = reinterpret_cast(node->user_data);\n\n const TfLiteTensor* input1 = GetInput(context, node, kInputTensor1);\n const TfLiteTensor* input2 = GetInput(context, node, kInputTensor2);\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n\n switch (output->type) {\n case kTfLiteInt32: {\n // TensorFlow does not support negative for int32.\n TF_LITE_ENSURE_OK(context, CheckValue(context, input2));\n PowImpl(input1, input2, output, data->requires_broadcast);\n break;\n }\n case kTfLiteFloat32: {\n PowImpl(input1, input2, output, data->requires_broadcast);\n break;\n }\n default: {\n context->ReportError(context, \"Unsupported data type: %d\", output->type);\n return kTfLiteError;\n }\n }\n return kTfLiteOk;\n}", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n const TfLiteTensor* input = GetInput(context, node, kInputTensor);\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 1);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n TF_LITE_ENSURE_TYPES_EQ(context, input->type, kTfLiteFloat32);\n output->type = input->type;\n TfLiteIntArray* output_size = TfLiteIntArrayCopy(input->dims);\n return context->ResizeTensor(context, output, output_size);\n}", "label_name": "CWE-125", "label": 125}
{"code": " absl::Status IsSupported(const TfLiteContext* context,\n const TfLiteNode* tflite_node,\n const TfLiteRegistration* registration) final {\n if (mirror_pad_) {\n const TfLiteMirrorPaddingParams* tf_options;\n RETURN_IF_ERROR(RetrieveBuiltinData(tflite_node, &tf_options));\n if (tf_options->mode !=\n TfLiteMirrorPaddingMode::kTfLiteMirrorPaddingReflect) {\n return absl::InvalidArgumentError(\n \"Only Reflective padding is supported for Mirror Pad operation.\");\n }\n }\n RETURN_IF_ERROR(CheckMaxSupportedOpVersion(registration, 2));\n RETURN_IF_ERROR(CheckInputsOutputs(context, tflite_node,\n /*runtime_inputs=*/1, /*outputs=*/1));\n RETURN_IF_ERROR(CheckTensorIsAvailable(context, tflite_node, 1));\n auto pad_tensor = tflite::GetInput(context, tflite_node, 1);\n if (pad_tensor->dims->size != 2) {\n return absl::InvalidArgumentError(absl::StrCat(\n \"Invalid paddings tensor dimension: expected 2 dim, got \",\n pad_tensor->dims->size, \" dim\"));\n }\n bool supported =\n pad_tensor->dims->data[0] == 3 || pad_tensor->dims->data[0] == 4;\n if (!supported || pad_tensor->dims->data[1] != 2) {\n return absl::InvalidArgumentError(absl::StrCat(\n \"Invalid paddings tensor shape: expected 4x2 or 3x2, got \",\n pad_tensor->dims->data[0], \"x\", pad_tensor->dims->data[1]));\n }\n return absl::OkStatus();\n }", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {\n const TfLiteTensor* input = GetInput(context, node, kInputTensor);\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 1);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n TF_LITE_ENSURE_TYPES_EQ(context, input->type, kTfLiteFloat32);\n output->type = input->type;\n TfLiteIntArray* output_size = TfLiteIntArrayCopy(input->dims);\n return context->ResizeTensor(context, output, output_size);\n}", "label_name": "CWE-125", "label": 125}
{"code": "TfLiteTensor* GetOutput(TfLiteContext* context, const TfLiteNode* node,\n int index) {\n if (context->tensors != nullptr) {\n return &context->tensors[node->outputs->data[index]];\n } else {\n return context->GetTensor(context, node->outputs->data[index]);\n }\n}", "label_name": "CWE-787", "label": 787}
{"code": " int GetU8 (int nPos, bool *pbSuccess)\n {\n //*pbSuccess = true;\n if ( nPos < 0 || nPos >= m_nLen )\n {\n *pbSuccess = false;\n return 0;\n }\n return m_sFile[ nPos ];\n }", "label_name": "CWE-787", "label": 787}
{"code": "int FdOutStream::writeWithTimeout(const void* data, int length, int timeoutms)\n{\n int n;\n\n do {\n fd_set fds;\n struct timeval tv;\n struct timeval* tvp = &tv;\n\n if (timeoutms != -1) {\n tv.tv_sec = timeoutms / 1000;\n tv.tv_usec = (timeoutms % 1000) * 1000;\n } else {\n tvp = NULL;\n }\n\n FD_ZERO(&fds);\n FD_SET(fd, &fds);\n n = select(fd+1, 0, &fds, 0, tvp);\n } while (n < 0 && errno == EINTR);\n\n if (n < 0)\n throw SystemException(\"select\", errno);\n\n if (n == 0)\n return 0;\n\n do {\n // select only guarantees that you can write SO_SNDLOWAT without\n // blocking, which is normally 1. Use MSG_DONTWAIT to avoid\n // blocking, when possible.\n#ifndef MSG_DONTWAIT\n n = ::send(fd, (const char*)data, length, 0);\n#else\n n = ::send(fd, (const char*)data, length, MSG_DONTWAIT);\n#endif\n } while (n < 0 && (errno == EINTR));\n\n if (n < 0)\n throw SystemException(\"write\", errno);\n\n gettimeofday(&lastWrite, NULL);\n\n return n;\n}", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus HardSwishEval(TfLiteContext* context, TfLiteNode* node) {\n HardSwishData* data = static_cast(node->user_data);\n\n const TfLiteTensor* input = GetInput(context, node, 0);\n TfLiteTensor* output = GetOutput(context, node, 0);\n switch (input->type) {\n case kTfLiteFloat32: {\n if (kernel_type == kReference) {\n reference_ops::HardSwish(\n GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n } else {\n optimized_ops::HardSwish(\n GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n }\n return kTfLiteOk;\n } break;\n case kTfLiteUInt8: {\n HardSwishParams& params = data->params;\n if (kernel_type == kReference) {\n reference_ops::HardSwish(\n params, GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n } else {\n optimized_ops::HardSwish(\n params, GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n }\n return kTfLiteOk;\n } break;\n case kTfLiteInt8: {\n HardSwishParams& params = data->params;\n if (kernel_type == kReference) {\n reference_ops::HardSwish(\n params, GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n } else {\n optimized_ops::HardSwish(\n params, GetTensorShape(input), GetTensorData(input),\n GetTensorShape(output), GetTensorData(output));\n }\n return kTfLiteOk;\n } break;\n default:\n TF_LITE_KERNEL_LOG(\n context,\n \"Only float32, uint8 and int8 are supported currently, got %s.\",\n TfLiteTypeGetName(input->type));\n return kTfLiteError;\n }\n}", "label_name": "CWE-787", "label": 787}
{"code": "int FdOutStream::length()\n{\n return offset + ptr - sentUpTo;\n}", "label_name": "CWE-787", "label": 787}
{"code": " static TfLiteRegistration DynamicCopyOpRegistration() {\n TfLiteRegistration reg = {nullptr, nullptr, nullptr, nullptr};\n\n reg.prepare = [](TfLiteContext* context, TfLiteNode* node) {\n // Output 0 is dynamic\n TfLiteTensor* output0 = GetOutput(context, node, 0);\n SetTensorToDynamic(output0);\n // Output 1 has the same shape as input.\n const TfLiteTensor* input = GetInput(context, node, 0);\n TfLiteTensor* output1 = GetOutput(context, node, 1);\n TF_LITE_ENSURE_STATUS(context->ResizeTensor(\n context, output1, TfLiteIntArrayCopy(input->dims)));\n return kTfLiteOk;\n };\n\n reg.invoke = [](TfLiteContext* context, TfLiteNode* node) {\n // Not implemented since this isn't required in testing.\n return kTfLiteOk;\n };\n return reg;\n }", "label_name": "CWE-125", "label": 125}
{"code": "inline int StringData::size() const { return m_len; }", "label_name": "CWE-787", "label": 787}
{"code": "static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream)\n{\n\tunsigned int header_len;\n\n\t// The first field at the start of a level 3 header is supposed to\n\t// indicate word size, with the idea being that the header format\n\t// can be extended beyond 32-bit words in the future. In practise,\n\t// nothing supports anything other than 32-bit (4 bytes), and neither\n\t// do we.\n\n\tif (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) {\n\t\treturn 0;\n\t}\n\n\t// Read the full header.\n\n\tif (!extend_raw_data(header, stream,\n\t LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) {\n\t\treturn 0;\n\t}\n\n\t// Read the header length field (including extended headers), and\n\t// extend to this full length. Because this is a 32-bit value,\n\t// we must place a sensible limit on the amount of data that will\n\t// be read, to avoid possibly allocating gigabytes of memory.\n\n\theader_len = lha_decode_uint32(&RAW_DATA(header, 24));\n\n\tif (header_len > LEVEL_3_MAX_HEADER_LEN) {\n\t\treturn 0;\n\t}\n\n\tif (!extend_raw_data(header, stream,\n\t header_len - RAW_DATA_LEN(header))) {\n\t\treturn 0;\n\t}\n\n\t// Compression method:\n\n\tmemcpy((*header)->compress_method, &RAW_DATA(header, 2), 5);\n\t(*header)->compress_method[5] = '\\0';\n\n\t// File lengths:\n\n\t(*header)->compressed_length = lha_decode_uint32(&RAW_DATA(header, 7));\n\t(*header)->length = lha_decode_uint32(&RAW_DATA(header, 11));\n\n\t// Unix-style timestamp.\n\n\t(*header)->timestamp = lha_decode_uint32(&RAW_DATA(header, 15));\n\n\t// CRC.\n\n\t(*header)->crc = lha_decode_uint16(&RAW_DATA(header, 21));\n\n\t// OS type:\n\n\t(*header)->os_type = RAW_DATA(header, 23);\n\n\tif (!decode_extended_headers(header, 28)) {\n\t\treturn 0;\n\t}\n\n\treturn 1;\n}", "label_name": "CWE-190", "label": 190}
{"code": "int64_t OutputFile::readImpl(char* /*buffer*/, int64_t /*length*/) {\n raise_warning(\"cannot read from a php://output stream\");\n return -1;\n}", "label_name": "CWE-125", "label": 125}
{"code": "TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {\n const TfLitePackParams* data =\n reinterpret_cast(node->builtin_data);\n\n TfLiteTensor* output = GetOutput(context, node, kOutputTensor);\n switch (output->type) {\n case kTfLiteFloat32: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n case kTfLiteUInt8: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n case kTfLiteInt8: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n case kTfLiteInt16: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n case kTfLiteInt32: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n case kTfLiteInt64: {\n return PackImpl(context, node, output, data->values_count,\n data->axis);\n }\n default: {\n context->ReportError(context, \"Type '%s' is not supported by pack.\",\n TfLiteTypeGetName(output->type));\n return kTfLiteError;\n }\n }\n\n return kTfLiteOk;\n}", "label_name": "CWE-787", "label": 787}
{"code": "int TLSInStream::pos()\n{\n return offset + ptr - start;\n}", "label_name": "CWE-787", "label": 787}
{"code": "void jas_seq2d_bindsub(jas_matrix_t *s, jas_matrix_t *s1, int xstart,\n int ystart, int xend, int yend)\n{\n\tjas_matrix_bindsub(s, s1, ystart - s1->ystart_, xstart - s1->xstart_,\n\t yend - s1->ystart_ - 1, xend - s1->xstart_ - 1);\n}", "label_name": "CWE-190", "label": 190}
{"code": "TfLiteStatus PrepareSimple(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_EQ(context, NumInputs(node), 2);\n TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);\n\n OpContext op_context(context, node);\n TF_LITE_ENSURE_TYPES_EQ(context, op_context.axis->type, kTfLiteInt32);\n TF_LITE_ENSURE_OK(context, InitializeTemporaries(context, node, &op_context));\n\n TfLiteTensor* resolved_axis = GetTemporary(context, node, /*index=*/1);\n // Leaves work to Eval if axis is not constant; else resizes output.\n if (!IsConstantTensor(op_context.axis)) {\n SetTensorToDynamic(op_context.output);\n SetTensorToDynamic(resolved_axis);\n return kTfLiteOk;\n }\n resolved_axis->allocation_type = kTfLiteArenaRw;\n TF_LITE_ENSURE_OK(context,\n ResizeTempAxis(context, &op_context, resolved_axis));\n TF_LITE_ENSURE_OK(context, ResizeOutputTensor(context, &op_context));\n return kTfLiteOk;\n}", "label_name": "CWE-787", "label": 787}
{"code": " void writeBytes(const void* data, int length) {\n check(length);\n memcpy(ptr, data, length);\n ptr += length;\n }", "label_name": "CWE-787", "label": 787}
{"code": "TfLiteStatus PrepareMeanOrSum(TfLiteContext* context, TfLiteNode* node) {\n TF_LITE_ENSURE_OK(context, PrepareSimple(context, node));\n OpData* data = reinterpret_cast