instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @TestApi
@RequiresPermission(android.Manifest.permission.FORCE_DEVICE_POLICY_MANAGER_LOGS)
public long forceSecurityLogs() {
if (mService == null) {
return 0;
}
try {
return mService.forceSecurityLogs();
} catch (RemoteException re) {
throw re.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceSecurityLogs
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | forceSecurityLogs | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected CELLTYPE join(Set<CELLTYPE> cells) {
for (CELLTYPE cell : cells) {
if (getCellGroupForCell(cell) != null) {
throw new IllegalArgumentException(
"Cell already merged");
} else if (!this.cells.contain... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: join
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | join | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public void startRestrictingAutoJoinToSubscriptionId(int subscriptionId) {
int minDisableDurationMinutes = mContext.getResources().getInteger(R.integer
.config_wifiAllNonCarrierMergedWifiMinDisableDurationMinutes);
int maxDisableDurationMinutes = mContext.getResources().getInteger(R.inte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startRestrictingAutoJoinToSubscriptionId
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | startRestrictingAutoJoinToSubscriptionId | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isXMLOutput() {
return xmlOutput;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isXMLOutput
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | isXMLOutput | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public ExtendedClientDetails getExtendedClientDetails() {
return extendedClientDetails;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getExtendedClientDetails
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getExtendedClientDetails | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void restorePreferredActivities(byte[] backup, int userId) {
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
throw new SecurityException("Only the system may call restorePreferredActivities()");
}
try {
final XmlPullParser parser = Xml.newPullPar... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: restorePreferredActivities
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | restorePreferredActivities | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private void initAuthorizationPreFragment(Bundle savedInstanceState) {
/// step 0 - get UI elements in layout
mAuthStatusView = findViewById(R.id.auth_status_text);
/// step 1 - load and process relevant inputs (resources, intent, savedInstanceState)
if (savedInstanceState != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initAuthorizationPreFragment
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | initAuthorizationPreFragment | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | private static void compressFile(File file, ZipOutputStream out, String fullName) throws IOException {
if (notEmpty(file)) {
ZipEntry entry = new ZipEntry(fullName);
entry.setTime(file.lastModified());
out.putNextEntry(entry);
write(new FileInputStream(file), out,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: compressFile
File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2018-12914 | HIGH | 7.5 | sanluan/PublicCMS | compressFile | publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java | c19fe66378c75725f3e3a380a6cb9f8b8a7dcb71 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void doGet(HttpServletRequest req, HttpServletResponse resp)
throws ServletException, IOException {
String pathInfo = req.getPathInfo();
if (pathInfo == null) {
resp.setStatus(HttpURLConnection.HTTP_NOT_FOUND);
return;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doGet
File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
Repository: vaadin/osgi
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-31407 | MEDIUM | 5 | vaadin/osgi | doGet | flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java | 3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8 | 0 |
Analyze the following code function for security vulnerabilities | public String getSelectedRecordLanguage() {
return selectedRecordLanguage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSelectedRecordLanguage
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getSelectedRecordLanguage | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public static void tryConnectToPara(Callable<Boolean> callable) {
retryConnection(callable, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tryConnectToPara
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | tryConnectToPara | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
private static Float toFloat(@Nullable String v) {
try {
return v != null ? Float.parseFloat(v) : null;
} catch (NumberFormatException ignore) {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toFloat
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | toFloat | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPacketReplyTimeout(long timeout) {
packetReplyTimeout = timeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPacketReplyTimeout
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | setPacketReplyTimeout | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public void updateSessionManagement(HttpSession session, String destination) {
StringUtil.requireDefined(destination);
SessionManagement sessionManagement = SessionManagementProvider.getSessionManagement();
sessionManagement.validateSession(session.getId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSessionManagement
File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | updateSessionManagement | core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | public static boolean jsFunction_isSubscribed(Context cx, Scriptable thisObj, Object[] args, Function funObj)
throws ScriptException, APIManagementException {
String username = null;
if (args != null && args.length != 0) {
String providerName = (String) args[0];
Stri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_isSubscribed
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure coding... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_isSubscribed | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Decoder<Object> getValueDecoder() {
return decoder;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValueDecoder
File: redisson/src/main/java/org/redisson/codec/SerializationCodec.java
Repository: redisson
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-42809 | HIGH | 8.8 | redisson | getValueDecoder | redisson/src/main/java/org/redisson/codec/SerializationCodec.java | fe6a2571801656ff1599ef87bdee20f519a5d1fe | 0 |
Analyze the following code function for security vulnerabilities | private void setGoRevisionVariables(EnvironmentVariableContext environmentVariableContext, String fromRevision, String toRevision) {
setVariableWithName(environmentVariableContext, toRevision, GO_REVISION);
setVariableWithName(environmentVariableContext, toRevision, GO_TO_REVISION);
setVariableW... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setGoRevisionVariables
File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | setGoRevisionVariables | domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | public static Node getNode(Node node, Pattern... nodePath) {
List<Node> nodes = getNodes(node, nodePath);
if (nodes != null && nodes.size() > 0) {
return nodes.get(0);
} else {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNode
File: src/edu/stanford/nlp/util/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3869 | MEDIUM | 5 | stanfordnlp/CoreNLP | getNode | src/edu/stanford/nlp/util/XMLUtils.java | 5d83f1e8482ca304db8be726cad89554c88f136a | 0 |
Analyze the following code function for security vulnerabilities | protected XWikiDocument getTranslatedDocument(XWikiDocument doc, String language, XWikiContext context)
throws XWikiException
{
XWikiDocument tdoc;
if (StringUtils.isBlank(language) || language.equals("default") || language.equals(doc.getDefaultLanguage())) {
tdoc = doc;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTranslatedDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | getTranslatedDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java | b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554 | 0 |
Analyze the following code function for security vulnerabilities | private void reduceImageSizesForRemoteView(RemoteViews remoteView, Context context,
boolean isLowRam) {
if (remoteView != null) {
Resources resources = context.getResources();
int maxWidth = resources.getDimensionPixelSize(isLowRam
? R.dimen.notification_c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reduceImageSizesForRemoteView
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | reduceImageSizesForRemoteView | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public String dialogButtonsSetOkCancel(String setAttributes, String okAttributes, String cancelAttributes) {
return dialogButtons(new int[] {BUTTON_SET, BUTTON_OK, BUTTON_CANCEL}, new String[] {
setAttributes,
okAttributes,
cancelAttributes});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogButtonsSetOkCancel
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogButtonsSetOkCancel | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | public void setParams(List<ProfileParameter> params) {
this.params = params;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setParams
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setParams | base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public void contextInitialized(ServletContextEvent event) {
final ServletContext context = event.getServletContext();
File home=null;
try {
// use the current request to determine the language
LocaleProvider.setProvider(new LocaleProvider() {
public Local... | Vulnerability Classification:
- CWE: CWE-254
- CVE: CVE-2014-9634
- Severity: MEDIUM
- CVSS Score: 5.0
Description: [FIXED JENKINS-25019]
A truly conforming servlet 3.0 container does not allow us to set "secure cookie" flag beyond ServletContextListener.onInitialized().
If we see that, don't scare the users.
Functi... | [
"CWE-254"
] | CVE-2014-9634 | MEDIUM | 5 | jenkinsci/jenkins | contextInitialized | core/src/main/java/hudson/WebAppMain.java | 582128b9ac179a788d43c1478be8a5224dc19710 | 1 |
Analyze the following code function for security vulnerabilities | private static native long nativeOpenNonAsset(long ptr, int cookie, @NonNull String fileName,
int accessMode); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeOpenNonAsset
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeOpenNonAsset | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermissions("tag:list")
@GetMapping("/list")
public String list(@RequestParam(defaultValue = "1") Integer pageNo, String name, Model model) {
// name= SecurityUtil.sanitizeInput(name);
if (StringUtils.isEmpty(name)) name = null;
IPage<Tag> page = tagService.selectAll(pageNo, null... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2022-23391
- Severity: MEDIUM
- CVSS Score: 4.3
Description: 修复了一部分页面上输入框的xss注入
https://github.com/atjiu/pybbs/issues/171
Function: list
File: src/main/java/co/yiiu/pybbs/controller/admin/TagAdminController.java
Repository: atjiu/pybbs
Fixed Code:
@RequiresPermi... | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | list | src/main/java/co/yiiu/pybbs/controller/admin/TagAdminController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 1 |
Analyze the following code function for security vulnerabilities | private String getDefaultRoleHolderPackageName() {
String[] info = getDefaultRoleHolderPackageNameAndSignature();
if (info == null) {
return null;
}
return info[0];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultRoleHolderPackageName
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getDefaultRoleHolderPackageName | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public Authentication getAuthentication(HttpServletRequest request, byte[] key) {
return getAuthentication(request, key, Endpoint.DEFAULT_ALIAS);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthentication
File: JOpenId/src/org/expressme/openid/OpenIdManager.java
Repository: michaelliao/jopenid
The code follows secure coding practices. | [
"CWE-208"
] | CVE-2010-10006 | LOW | 1.4 | michaelliao/jopenid | getAuthentication | JOpenId/src/org/expressme/openid/OpenIdManager.java | c9baaa976b684637f0d5a50268e91846a7a719ab | 0 |
Analyze the following code function for security vulnerabilities | public Transport getTransport() {
return transport;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTransport
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | getTransport | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override public boolean enabledByDefault() { return _defaultState; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enabledByDefault
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | enabledByDefault | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | void installOthers() {
if (mCredentials.hasKeyPair()) {
saveKeyPair();
finish();
} else {
X509Certificate cert = mCredentials.getUserCertificate();
if (cert != null) {
// find matched private key
String key = Util.toMd5(cert... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installOthers
File: src/com/android/certinstaller/CertInstaller.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2422 | HIGH | 9.3 | android | installOthers | src/com/android/certinstaller/CertInstaller.java | 70dde9870e9450e10418a32206ac1bb30f036b2c | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setFactory(final JDOMFactory factory) {
setJDOMFactory(factory);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFactory
File: core/src/java/org/jdom2/input/SAXBuilder.java
Repository: hunterhacker/jdom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33813 | MEDIUM | 5 | hunterhacker/jdom | setFactory | core/src/java/org/jdom2/input/SAXBuilder.java | bd3ab78370098491911d7fe9d7a43b97144a234e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onTransact(int code, Parcel data, Parcel reply, int flags)
throws RemoteException {
try {
return super.onTransact(code, data, reply, flags);
} catch (RuntimeException e) {
if (!(e instanceof SecurityException) && !(e instanceof IllegalArgu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTransact
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | onTransact | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void writeStructBegin(TStruct struct) throws TException {
lastField_.push(lastFieldId_);
lastFieldId_ = 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeStructBegin
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | writeStructBegin | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | ContentProviderConnection incProviderCountLocked(ProcessRecord r,
final ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) {
if (r != null) {
for (int i=0; i<r.conProviders.size(); i++) {
ContentProviderConnection conn = r.conProviders.get(i);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: incProviderCountLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | incProviderCountLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private void cleanAppRestrictions(int userId) {
synchronized (mPackagesLock) {
File dir = Environment.getUserSystemDirectory(userId);
String[] files = dir.list();
if (files == null) return;
for (String fileName : files) {
if (fileName.startsWith(RE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanAppRestrictions
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | cleanAppRestrictions | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | final ArrayList<ActivityRecord> processStoppingActivitiesLocked(boolean remove) {
ArrayList<ActivityRecord> stops = null;
final boolean nowVisible = allResumedActivitiesVisible();
for (int activityNdx = mStoppingActivities.size() - 1; activityNdx >= 0; --activityNdx) {
ActivityRecor... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processStoppingActivitiesLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | processStoppingActivitiesLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | public String getURLToDeletePage(String space, String page)
{
return getURL(space, page, "delete", "confirm=1");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLToDeletePage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getURLToDeletePage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void addNotification(StatusBarNotification notification, RankingMap ranking)
throws InflationException {
String key = notification.getKey();
if (DEBUG) Log.d(TAG, "addNotification key=" + key);
mNotificationData.updateRanking(ranking);
Entry shadeEntry = createNotific... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addNotification
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | addNotification | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public boolean isForegroundDisplayForceDeferred() {
return FOREGROUND_SERVICE_DEFERRED == mFgsDeferBehavior;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isForegroundDisplayForceDeferred
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isForegroundDisplayForceDeferred | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
final void updateOomAdjLocked(String oomAdjReason) {
mOomAdjuster.updateOomAdjLocked(oomAdjReason);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateOomAdjLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateOomAdjLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static String collectionAsString(Collection<?> collection, String separator) {
StringBuffer string = new StringBuffer(128);
Iterator<?> it = collection.iterator();
while (it.hasNext()) {
string.append(it.next());
if (it.hasNext()) {
string.append(s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: collectionAsString
File: src/org/opencms/util/CmsStringUtil.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | collectionAsString | src/org/opencms/util/CmsStringUtil.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | List<IssuesDao> getIssue(IssuesRequest request); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIssue
File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getIssue | framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private boolean containsTurnScreenOnWindow() {
// When we are relaunching, it is possible for us to be unfrozen before our previous
// windows have been added back. Using the cached value ensures that our previous
// showWhenLocked preference is honored until relaunching is complete.
if ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: containsTurnScreenOnWindow
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | containsTurnScreenOnWindow | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean havePattern(int userId) throws RemoteException {
// Do we need a permissions check here?
return mStorage.hasPattern(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: havePattern
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | havePattern | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isRootUrlSecure() {
String url = getRootUrl();
return url!=null && url.startsWith("https");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRootUrlSecure
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | isRootUrlSecure | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | protected String getDocumentSkinExtensionURL(DocumentReference documentReference, String documentName,
String pluginName, XWikiContext context)
{
String queryString = String.format("%s&%s%s",
getLanguageQueryString(context),
getDocumentVersionQueryString(documentR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocumentSkinExtensionURL
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
Th... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | getDocumentSkinExtensionURL | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | private Object registeredObjectRead(int handle) throws InvalidObjectException {
Object res = objectsRead.get(handle - ObjectStreamConstants.baseWireHandle);
if (res == UNSHARED_OBJ) {
throw new InvalidObjectException("Cannot read back reference to unshared object");
}
return ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registeredObjectRead
File: luni/src/main/java/java/io/ObjectInputStream.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | registeredObjectRead | luni/src/main/java/java/io/ObjectInputStream.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | protected String transferSpecialCharacter(String str) {
String regEx="[`~!@#$%^&*()+=|{}':;',\\[\\].<>/?~!@#¥%……&*()——+|{}【】‘;:”“’。,、?]";
Pattern pattern = Pattern.compile(regEx);
Matcher matcher = pattern.matcher(str);
if(matcher.find()){
CharSequence cs = str;
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: transferSpecialCharacter
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | transferSpecialCharacter | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public @ColorInt int getPrimaryTextColor() {
return mPrimaryTextColor;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrimaryTextColor
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getPrimaryTextColor | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public List<WifiConfiguration> getConfiguredNetworksWithPasswords() {
return getConfiguredNetworks(false, false, Process.WIFI_UID);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfiguredNetworksWithPasswords
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getConfiguredNetworksWithPasswords | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean showEmptyTextWarnings() {
return mAttachmentsView.getAttachments().size() == 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showEmptyTextWarnings
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | showEmptyTextWarnings | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public byte[] getSessionID() {
return kexer.getSessionID();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSessionID
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getSessionID | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | private static int getMinimumSignatureSchemeVersionForTargetSdk(int targetSdkVersion) {
if (targetSdkVersion >= AndroidSdkVersion.R) {
return VERSION_APK_SIGNATURE_SCHEME_V2;
}
return VERSION_JAR_SIGNATURE_SCHEME;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMinimumSignatureSchemeVersionForTargetSdk
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | getMinimumSignatureSchemeVersionForTargetSdk | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | private VFSStatus copyFrom(VFSItem source, boolean checkQuota, Identity savedBy) {
if (source.canCopy() != VFSConstants.YES) {
log.warn("Cannot copy file {} security denied", source);
return VFSConstants.NO_SECURITY_DENIED;
}
String sourcename = source.getName();
File basefile = getBasefile();
// ch... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyFrom
File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | copyFrom | src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java | 336d5ce80681be61a0bbf4f73d2af5d1ff67e93a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void suppressResizeConfigChanges(boolean suppress) throws RemoteException {
mActivityTaskManager.suppressResizeConfigChanges(suppress);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: suppressResizeConfigChanges
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | suppressResizeConfigChanges | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void setOriginalPicture(String originalPicture) {
this.originalPicture = originalPicture;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOriginalPicture
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | setOriginalPicture | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public Locale getLocale()
{
return this.doc.getLocale();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocale
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getLocale | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public synchronized String getStatusText() {
return this.statusText;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatusText
File: Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | getStatusText | Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | public List<DeletedAttachment> getDeletedAttachments(String docName, XWikiContext context) throws XWikiException
{
if (hasAttachmentRecycleBin(context)) {
XWikiDocument doc = new XWikiDocument(getCurrentMixedDocumentReferenceResolver().resolve(docName));
return getAttachmentRecycleBi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeletedAttachments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getDeletedAttachments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public Registration addHeartbeatListener(HeartbeatListener listener) {
return addListener(HeartbeatListener.class, listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addHeartbeatListener
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | addHeartbeatListener | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PendingIntentInfo getInfoForIntentSender(IIntentSender sender) {
if (sender instanceof PendingIntentRecord) {
final PendingIntentRecord res = (PendingIntentRecord) sender;
final String packageName = res.key.packageName;
final int uid = res.uid;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInfoForIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getInfoForIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean disable(boolean saveState) throws RemoteException {
NfcPermissions.enforceAdminPermissions(mContext);
if (saveState) {
saveNfcOnSetting(false);
}
new EnableDisableTask().execute(TASK_DISABLE);
return true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disable
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | disable | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | public Object unmarshal(HierarchicalStreamReader reader, final UnmarshallingContext context) {
return fromString(reader.getValue());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/src/main/java/hudson/util/Secret.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-326"
] | CVE-2017-2598 | MEDIUM | 4 | jenkinsci/jenkins | unmarshal | core/src/main/java/hudson/util/Secret.java | e6aa166246d1734f4798a9e31f78842f4c85c28b | 0 |
Analyze the following code function for security vulnerabilities | public AutoCompletionCandidates doAutoCompleteUpstreamProjects(@QueryParameter String value) {
AutoCompletionCandidates candidates = new AutoCompletionCandidates();
List<Job> jobs = Jenkins.getInstance().getItems(Job.class);
for (Job job: jobs) {
if (job.getFullName()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doAutoCompleteUpstreamProjects
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | doAutoCompleteUpstreamProjects | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public void setAppointmentRequestId(Integer appointmentRequestId) {
this.appointmentRequestId = appointmentRequestId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAppointmentRequestId
File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
Repository: openmrs/openmrs-module-appointmentscheduling
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4727 | MEDIUM | 6.1 | openmrs/openmrs-module-appointmentscheduling | setAppointmentRequestId | api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java | 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<String> getCrossProfileCalendarPackagesForUser(int userHandle) {
if (!mHasFeature) {
return Collections.emptyList();
}
Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId");
Preconditions.checkCallAuthorization(
hasCall... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCrossProfileCalendarPackagesForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getCrossProfileCalendarPackagesForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public static LicenseInfo retrieveDistributor() {
final InputStream dis = PSystemVersion.class.getResourceAsStream("/distributor.txt");
if (dis == null)
return null;
try {
final BufferedReader br = new BufferedReader(new InputStreamReader(dis));
final String licenseString = br.readLine();
br.close();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: retrieveDistributor
File: src/net/sourceforge/plantuml/version/LicenseInfo.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | retrieveDistributor | src/net/sourceforge/plantuml/version/LicenseInfo.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | public @NotNull Dragonfly build() {
try {
return new Dragonfly(timeout, classLoader, directory, repositories, deleteOnRelocate, statusHandler);
} catch (IOException ex) {
throw new IllegalStateException(ex);
}
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-41967
- Severity: HIGH
- CVSS Score: 7.5
Description: fix: CVE-2022-41967
Dragonfly v0.3.0-SNAPSHOT fails to properly configure the
DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when
parsing maven-metadata.xml files provided by externa... | [
"CWE-611"
] | CVE-2022-41967 | HIGH | 7.5 | HyperaDev/Dragonfly | build | src/main/java/dev/hypera/dragonfly/DragonflyBuilder.java | 9661375e1135127ca6cdb5712e978bec33cc06b3 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return Objects.hash(_userId, _setiChannel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | hashCode | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.OneArgHandler promise(final String executor,
final Deferred.Initializer0 initializer) {
return req -> new Deferred(executor, initializer);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: promise
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | promise | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | private void ensureSecureSettingAndroidIdSetLocked(SettingsState secureSettings) {
Setting value = secureSettings.getSettingLocked(Settings.Secure.ANDROID_ID);
if (!value.isNull()) {
return;
}
final int userId = getUserIdFromKey(secureSettings.mKey);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ensureSecureSettingAndroidIdSetLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | ensureSecureSettingAndroidIdSetLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | public static void createFeature(FF4j ff4j, HttpServletRequest req) {
// uid
final String featureId = req.getParameter(FEATID);
if (featureId != null && !featureId.isEmpty()) {
Feature fp = new Feature(featureId, false);
// Description
final String featureDes... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-44262
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fix: Validate FlippingStrategy in various parsers (#624)
Function: createFeature
File: ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java
Repository: ff4j
Fixed Code:
public stati... | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | createFeature | ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 1 |
Analyze the following code function for security vulnerabilities | public void upgradeIfNeededLocked() {
// The version of all settings for a user is the same (all users have secure).
SettingsState secureSettings = getSettingsLocked(
SETTINGS_TYPE_SECURE, mUserId);
// Try an update from the current state.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: upgradeIfNeededLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | upgradeIfNeededLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPulling(String callId, Session.Info sessionInfo) {
Log.startSession(sessionInfo, LogUtils.Sessions.CSW_SET_PULLING, mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
log... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPulling
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | setPulling | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isMinorEdit()
{
return this.isMinorEdit;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMinorEdit
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | isMinorEdit | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public String getPersistentIdentifier() throws IndexUnreachableException {
synchronized (this) {
if (viewManager != null) {
return viewManager.getPi();
}
return "-";
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPersistentIdentifier
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getPersistentIdentifier | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public void onRequestPermissionsResult(int requestCode, String[] permissions, int[] grantResults) {
if(grantResults != null || grantResults.length == 0) {
requestForPermission = false;
return;
}
if (grantResults[0] == PackageManager.PERMISSION_GRANTED) {
Log.i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRequestPermissionsResult
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onRequestPermissionsResult | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void setProfileDescription(String profileDescription) {
this.profileDescription = profileDescription;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProfileDescription
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setProfileDescription | base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setCrossProfileContactsSearchDisabled(ComponentName who, boolean disabled) {
if (!mHasFeature) {
return;
}
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCrossProfileContactsSearchDisabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setCrossProfileContactsSearchDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void doUnexpectedFailure(Throwable error) {
// If the user is using a version of the application different to what
// the server expects the names of the RPC serialization policy files
// will not match, and in that case GWT just sends the exception to the
// log,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doUnexpectedFailure
File: frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java
Repository: oVirt/ovirt-engine
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2024-0822 | HIGH | 7.5 | oVirt/ovirt-engine | doUnexpectedFailure | frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java | 036f617316f6d7077cd213eb613eb4816e33d1fc | 0 |
Analyze the following code function for security vulnerabilities | public FingerprintUnlockController getFingerprintUnlockController() {
return mFingerprintUnlockController;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFingerprintUnlockController
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getFingerprintUnlockController | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private User _doCreateAccount(StaplerRequest req, StaplerResponse rsp, String formView) throws ServletException, IOException {
if(!allowsSignup())
throw HttpResponses.error(SC_UNAUTHORIZED,new Exception("User sign up is prohibited"));
boolean firstUser = !hasSomeUser();
User u = cre... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _doCreateAccount
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | _doCreateAccount | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | protected void setAction(int value) {
m_action = value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAction
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | setAction | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | public static IOException wrap(ShutdownSignalException ex, String message) {
IOException ioe = new IOException(message);
ioe.initCause(ex);
return ioe;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wrap
File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | wrap | src/main/java/com/rabbitmq/client/impl/AMQChannel.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private Set<Range<Integer>> getUidRangeSet(List<Integer> uids) {
Collections.sort(uids);
Set<Range<Integer>> uidRanges = new ArraySet<>();
int start = 0;
int next = 0;
for (int i : uids) {
if (start == next) {
start = i;
next = start + ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUidRangeSet
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getUidRangeSet | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void writeDesign(Element design, DesignContext context) {
super.writeDesign(design, context);
Attributes attrs = design.attributes();
Grid def = context.getDefaultInstance(this);
DesignAttributeHandler.writeAttribute("editable", attrs,
isEditorEnabl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeDesign
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | writeDesign | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void scanBarCode(ScanResult callback) {
if (getActivity() == null) {
return;
}
if (getActivity() instanceof CodenameOneActivity) {
((CodenameOneActivity) getActivity()).setIntentResultListener(this);
}
t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanBarCode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | scanBarCode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isMetricApiEnable() {
return Boolean.parseBoolean(getProperty(TS_ENABLE_METRICS_API, "true"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMetricApiEnable
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | isMetricApiEnable | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | boolean decProviderCountLocked(ContentProviderConnection conn,
ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) {
if (conn != null) {
cpr = conn.provider;
if (DEBUG_PROVIDER) Slog.v(TAG_PROVIDER,
"Removing provider requested by "
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decProviderCountLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | decProviderCountLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public static ActivityOptions makeThumbnailAspectScaleDownAnimation(View source,
Bitmap thumbnail, int startX, int startY, int targetWidth, int targetHeight,
Handler handler, OnAnimationStartedListener listener) {
return makeAspectScaledThumbnailAnimation(source, thumbnail, startX, start... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeThumbnailAspectScaleDownAnimation
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | makeThumbnailAspectScaleDownAnimation | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public String getStringUnchecked(String key, String defaultValue, int userId) {
if (Settings.Secure.LOCK_PATTERN_ENABLED.equals(key)) {
long ident = Binder.clearCallingIdentity();
try {
return mLockPatternUtils.isLockPatternEnabled(userId) ? "1" : "0";
} final... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStringUnchecked
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | getStringUnchecked | services/core/java/com/android/server/LockSettingsService.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | public File getBuildDirFor(Job job) {
return expandVariablesForDirectory(buildsDir, job);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBuildDirFor
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getBuildDirFor | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public String getPathName() {
return "universal";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPathName
File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
Repository: jogetworkflow/jw-community
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4560 | MEDIUM | 6.1 | jogetworkflow/jw-community | getPathName | wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java | ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onRttInitiationSuccess(String callId, Session.Info sessionInfo)
throws RemoteException {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRttInitiationSuccess
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | onRttInitiationSuccess | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isReturning() {
return mIsReturning;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isReturning
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | isReturning | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public void updateRowId(String columnName, @Nullable RowId x) throws SQLException {
updateRowId(findColumn(columnName), x);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateRowId
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateRowId | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private static void appendOpenNode(StringBuilder xml, String name, Object... attributes) {
xml.append('<').append(name);
appendAttributes(xml, attributes);
xml.append('>');
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: appendOpenNode
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | appendOpenNode | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | void logWindowList(final WindowList windows, String prefix) {
int N = windows.size();
while (N > 0) {
N--;
Slog.v(TAG, prefix + "#" + N + ": " + windows.get(N));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logWindowList
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | logWindowList | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public @ColorInt int getOrganizationColor(@NonNull ComponentName admin) {
throwIfParentInstance("getOrganizationColor");
try {
return mService.getOrganizationColor(admin);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOrganizationColor
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getOrganizationColor | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onRestoreInstanceState(@NonNull Bundle savedInstanceState) {
restoreInstanceState(savedInstanceState);
super.onRestoreInstanceState(savedInstanceState);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRestoreInstanceState
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
The code follows secure coding practices. | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | onRestoreInstanceState | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.