instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public void setDetailsGenerator(DetailsGenerator detailsGenerator)
throws IllegalArgumentException {
detailComponentManager.setDetailsGenerator(detailsGenerator);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDetailsGenerator
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setDetailsGenerator | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public void setConfigFile(String configFile) {
this.configFile = configFile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConfigFile
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
Repository: theonedev/onedev
The code follows secure coding practic... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | setConfigFile | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | private void handleSetOccluded(boolean isOccluded, boolean animate) {
Trace.beginSection("KeyguardViewMediator#handleSetOccluded");
synchronized (KeyguardViewMediator.this) {
if (mHiding && isOccluded) {
// We're in the process of going away but WindowManager wants to show a
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleSetOccluded
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | handleSetOccluded | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public @NonNull String[] getApkPaths() {
synchronized (this) {
if (mOpen) {
String[] paths = new String[mApkAssets.length];
final int count = mApkAssets.length;
for (int i = 0; i < count; i++) {
paths[i] = mApkAssets[i]... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApkPaths
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getApkPaths | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | private boolean isNumber(String str) {
return str.matches("-?\\d+(\\.\\d+)?");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNumber
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | isNumber | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Intent getIntent() {
KeyguardUpdateMonitor updateMonitor = KeyguardUpdateMonitor.getInstance(mContext);
boolean canSkipBouncer = updateMonitor.getUserCanSkipBouncer(
KeyguardUpdateMonitor.getCurrentUser());
boolean secure = mLockPatternUti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntent
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getIntent | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private int runSetInstallLocation() {
int loc;
String arg = nextArg();
if (arg == null) {
System.err.println("Error: no install location specified.");
return 1;
}
try {
loc = Integer.parseInt(arg);
} catch (NumberFormatException e) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runSetInstallLocation
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | runSetInstallLocation | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | public boolean isRedirectEnabled() {
return redirectEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRedirectEnabled
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | isRedirectEnabled | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public ViewAndroidDelegate getViewAndroidDelegate() {
return new ViewAndroidDelegate() {
@Override
public View acquireAnchorView() {
View anchorView = new View(getContext());
mContainerView.addView(anchorView);
return... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getViewAndroidDelegate
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getViewAndroidDelegate | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void animateCallControls(boolean show, long startDelay) {
if (isVoiceOnlyCall) {
if (spotlightView != null && spotlightView.getVisibility() != View.GONE) {
spotlightView.setVisibility(View.GONE);
}
} else if (!isPTTActive) {
float alpha;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: animateCallControls
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | animateCallControls | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void event(UserRequest ureq, Component source, Event event) {
// no events to catch
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: event
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | event | src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | public boolean consume(HttpServletRequest httpRequest,
HttpServletResponse httpResponse) throws IOException {
if (consumeWithFileResourceHandlers(httpRequest, httpResponse)) {
return true;
}
if (consumeWithJarResourceHandler(httpRequest, httpResponse)) {
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2016-9177
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix for #700 - Arbitrary File Read Vulnerability
Function: consume
File: src/main/java/spark/staticfiles/StaticFilesConfiguration.java
Repository: perwendel/spark
Fixed Code:
public boolean consume(Http... | [
"CWE-22"
] | CVE-2016-9177 | MEDIUM | 5 | perwendel/spark | consume | src/main/java/spark/staticfiles/StaticFilesConfiguration.java | 26b57d0596ee73c14c558463943ef0857e53b91f | 1 |
Analyze the following code function for security vulnerabilities | public Date getDate()
{
return this.doc.getDate();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getDate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setApplicationRestrictions(ComponentName who, String callerPackage,
String packageName, Bundle restrictions) {
final CallerIdentity caller = getCallerIdentity(who, callerPackage);
checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_APPLICATION_RESTRICTION... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApplicationRestrictions
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setApplicationRestrictions | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | default Map<String, V> asMap() {
Map<String, V> newMap = new LinkedHashMap<>();
for (Map.Entry<String, V> entry : this) {
String key = entry.getKey();
newMap.put(key, entry.getValue());
}
return newMap;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asMap
File: core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | asMap | core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | public void enableScreenAfterBoot() {
synchronized(mWindowMap) {
if (DEBUG_BOOT) {
RuntimeException here = new RuntimeException("here");
here.fillInStackTrace();
Slog.i(TAG, "enableScreenAfterBoot: mDisplayEnabled=" + mDisplayEnabled
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enableScreenAfterBoot
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | enableScreenAfterBoot | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
StringBuilder builder = new StringBuilder();
builder.append("UpdateIdentifier: ").append(mUpdateIdentifier).append("\n");
builder.append("CredentialPriority: ").append(mCredentialPriority).append("\n");
builder.append("SubscriptionCreationTime: ")... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | toString | framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | private void updateColorTransform() {
if (mSurfaceControl != null && mLastAppSaturationInfo != null) {
getPendingTransaction().setColorTransform(mSurfaceControl,
mLastAppSaturationInfo.mMatrix, mLastAppSaturationInfo.mTranslation);
mWmService.scheduleAnimationLocked()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateColorTransform
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | updateColorTransform | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public OnGoingLogicalCondition isNotEmpty() {
return getOnGoingLogicalCondition(new IsNotEmptyCondition(selector));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNotEmpty
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-11343 | HIGH | 7.5 | xjodoin/torpedoquery | isNotEmpty | src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java | 3c20b874fba9cc2a78b9ace10208de1602b56c3f | 0 |
Analyze the following code function for security vulnerabilities | public void onCompleted(GestureDescription gestureDescription) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCompleted
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | onCompleted | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | private void makeSpaceVisible(SpaceReference spaceReference, Session session)
{
XWikiSpace space = loadXWikiSpace(spaceReference, session);
makeSpaceVisible(space, session);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeSpaceVisible
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | makeSpaceVisible | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setManagedProfileMaximumTimeOff(ComponentName who, long timeoutMillis) {
Objects.requireNonNull(who, "ComponentName is null");
Preconditions.checkArgumentNonnegative(timeoutMillis, "Timeout must be non-negative.");
final CallerIdentity caller = getCallerIdentity(who);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setManagedProfileMaximumTimeOff
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setManagedProfileMaximumTimeOff | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void save4idNull(TestContext context) {
postgresClient = createFoo(context);
postgresClient.save(FOO, /* id */ null, xPojo, context.asyncAssertSuccess(save -> {
String id = save;
postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> {
context.assertEquals("x", get.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save4idNull
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | save4idNull | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean jsFunction_isCommentActivated() throws APIManagementException {
boolean commentActivated;
APIManagerConfiguration config =
ServiceReferenceHolder.getInstance()
.getAPIManagerConfigurationService()
.getAPIManagerConfig... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_isCommentActivated
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure ... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_isCommentActivated | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | URI uri() {
final String uri;
final String path = path();
if (isAbsoluteUri(path)) {
uri = path;
} else {
final String scheme = scheme();
checkState(scheme != null, ":scheme header does not exist.");
final String authority = authority();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uri
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | uri | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public void setupHost(final QSTileHost host) {
mHost = host;
host.setHeaderView(mExpandIndicator);
mHeaderQsPanel.setQSPanelAndHeader(mQsPanel, this);
mHeaderQsPanel.setHost(host, null /* No customization in header */);
setUserInfoController(host.getUserInfoController());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setupHost
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3886 | HIGH | 7.2 | android | setupHost | packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java | 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | 0 |
Analyze the following code function for security vulnerabilities | private static long getLongSafe(byte[] bytes, int offset) {
if (BIG_ENDIAN_NATIVE_ORDER) {
return (long) bytes[offset] << 56 |
((long) bytes[offset + 1] & 0xff) << 48 |
((long) bytes[offset + 2] & 0xff) << 40 |
((long) bytes[offset + 3] & 0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLongSafe
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | getLongSafe | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | private ArrayList<String> getLocalClaimURIs(List<LocalClaim> localClaims) {
// Using Java 8 streams to do the mapping will result in breaking at the axis level thus using the following
// approach.
ArrayList<String> localClaimsArray = new ArrayList<String>();
for (LocalClaim localClaim ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalClaimURIs
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-identity-... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getLocalClaimURIs | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString()
{
String str;
switch (operation) {
case INDEX:
str = "INDEX " + this.reference;
break;
case DELETE:
str = "DELETE " + this.deleteQuery;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/DefaultSolrIndexer.java
Repository: xwiki/xwiki-platform
... | [
"CWE-312",
"CWE-200"
] | CVE-2023-50719 | HIGH | 7.5 | xwiki/xwiki-platform | toString | xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/DefaultSolrIndexer.java | 3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea | 0 |
Analyze the following code function for security vulnerabilities | public void serviceDoneExecuting(IBinder token, int type, int startId,
int res) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serviceDoneExecuting
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | serviceDoneExecuting | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public String getAuthzAcl() {
return authzAcl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthzAcl
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getAuthzAcl | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isDownloaderProcess(final Context context) {
if (isDownloaderProcess != null) {
return isDownloaderProcess;
}
boolean result = false;
do {
if (FileDownloadProperties.getImpl().processNonSeparate) {
result = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDownloaderProcess
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | isDownloaderProcess | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | Tool toTool(Element elt) throws XmlReaderException {
Library lib = findLibrary(elt.getAttribute("lib"));
String name = elt.getAttribute("name");
if (name == null || name.equals("")) {
throw new XmlReaderException(Strings.get("toolNameMissing"));
}
Tool tool = lib.getTool(name);
if (tool == null) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toTool
File: src/com/cburch/logisim/file/XmlReader.java
Repository: logisim-evolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000889 | MEDIUM | 6.8 | logisim-evolution | toTool | src/com/cburch/logisim/file/XmlReader.java | 90aee8f8ceef463884cc400af4f6d1f109fb0972 | 0 |
Analyze the following code function for security vulnerabilities | boolean isDummyMainActivity(@Nullable ComponentName name) {
return name != null && DUMMY_MAIN_ACTIVITY.equals(name.getClassName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDummyMainActivity
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | isDummyMainActivity | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private void onClientRemoved(String clientUUID) {
int num = 0;
StorageId clientStorageId = new StorageId(clientUUID);
if (clientStorageId.isLocal()) {
num = em.createNamedQuery("deleteClientSessionsByClient").setParameter("clientId", clientUUID).executeUpdate();
} else {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onClientRemoved
File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-6563 | HIGH | 7.7 | keycloak | onClientRemoved | model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java | 11eb952e1df7cbb95b1e2c101dfd4839a2375695 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void setOverExpansion(float overExpansion, boolean isPixels) {
if (mConflictingQsExpansionGesture || mQsExpandImmediate) {
return;
}
if (mStatusBar.getBarState() != StatusBarState.KEYGUARD) {
mNotificationStackScroller.setOnHeightChangedListener(nu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOverExpansion
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setOverExpansion | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void initialize() throws InitializationException
{
CacheConfiguration cacheConfig = new CacheConfiguration();
cacheConfig.setConfigurationId("diff.html.dataURI");
LRUEvictionConfiguration lru = new LRUEvictionConfiguration();
lru.setMaxEntries(100);
cache... | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2023-48240
- Severity: HIGH
- CVSS Score: 8.8
Description: XWIKI-20818: Improve data URI converter
* Cache failures
* Properly dispose the caches
* Only send requests to trusted domains
* Only embed actual images
* Limit responses to 1MB
* Introduce configuratio... | [
"CWE-918"
] | CVE-2023-48240 | HIGH | 8.8 | xwiki/xwiki-platform | initialize | xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java | bff0203e739b6e3eb90af5736f04278c73c2a8bb | 1 |
Analyze the following code function for security vulnerabilities | public static XMLBuilder parse(String xmlString)
throws ParserConfigurationException, SAXException, IOException
{
return XMLBuilder.parse(new InputSource(new StringReader(xmlString)));
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2014-125087
- Severity: MEDIUM
- CVSS Score: 5.2
Description: Disable external entities by default to prevent XXE injection attacks, re #6
XML Builder classes now explicitly enable or disable
'external-general-entities' and 'external-parameter-entities' features... | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | parse | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 1 |
Analyze the following code function for security vulnerabilities | public TokenValidator getTokenValidator() {
return tokenValidator;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTokenValidator
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | getTokenValidator | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getSplashScreenThemeResName() {
return mSplashScreenThemeResName;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSplashScreenThemeResName
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | getSplashScreenThemeResName | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handleMessage(Message msg) {
switch (msg.what) {
case DISMISS_DIALOG_UI_MSG: {
final Dialog d = (Dialog) msg.obj;
d.dismiss();
break;
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleMessage
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | handleMessage | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | private void appendElement(StringBuilder breadcrumb, BrowseBarElement element) {
if (breadcrumb.length() > 0) {
breadcrumb.append(CONNECTOR);
}
if (StringUtil.isDefined(element.getLink())) {
breadcrumb.append("<a href=\"").append(element.getLink()).append("\"");
} else {
breadcrumb.app... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-47324
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Bug #13811: fixing stored XSS leading to full account takeover
* making HTML sanitize processing accessible for JSTL instructions
* sanitizing user notification title and contents on registering
* sanit... | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | appendElement | core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java | 9a55728729a3b431847045c674b3e883507d1e1a | 1 |
Analyze the following code function for security vulnerabilities | public int getBeginCharacterOffset() {
return fBeginCharacterOffset;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBeginCharacterOffset
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | getBeginCharacterOffset | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
protected boolean bindGuts(final ExpandableNotificationRow row,
NotificationMenuRowPlugin.MenuItem item) {
NotificationEntry entry = row.getEntry();
row.setGutsView(item);
row.setTag(entry.getSbn().getPackageName());
row.getGuts().setClosedListener((No... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindGuts
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | bindGuts | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setConnectTimeout(int connectionTimeout) {
this.connectionTimeout = connectionTimeout;
httpClient.property(ClientProperties.CONNECT_TIMEOUT, connectionTimeout);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConnectTimeout
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setConnectTimeout | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private String getOwnerPackageNameForUserLocked(int userId) {
return mOwners.getDeviceOwnerUserId() == userId
? mOwners.getDeviceOwnerPackageName()
: mOwners.getProfileOwnerPackage(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOwnerPackageNameForUserLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getOwnerPackageNameForUserLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private JsonObject readObject(boolean objectWithoutBraces) throws IOException {
return this.readObject(objectWithoutBraces, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readObject
File: src/main/org/hjson/HjsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | readObject | src/main/org/hjson/HjsonParser.java | 00e3b1325cb6c2b80b347dbec9181fd17ce0a599 | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage
public static native int getGlobalAssetCount(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalAssetCount
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getGlobalAssetCount | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M1")
public void setSpace(String spaces)
{
if (spaces != null) {
DocumentReference reference = getDocumentReference();
EntityReference spaceReference = getRelativeEntityReferenceResolver().resolve(spaces, EntityType.SPACE);
spaceReference = spa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSpace
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | setSpace | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public @Nullable Time getTime(
int i, java.util.@Nullable Calendar cal) throws SQLException {
byte[] value = getRawValue(i);
if (value == null) {
return null;
}
if (cal == null) {
cal = getDefaultCalendar();
}
if (isBinary(i)) {
int col = i - 1;
int oid... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTime
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getTime | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private void maybeClearLockTaskPolicyLocked() {
mInjector.binderWithCleanCallingIdentity(() -> {
final List<UserInfo> userInfos = mUserManager.getAliveUsers();
for (int i = userInfos.size() - 1; i >= 0; i--) {
int userId = userInfos.get(i).id;
if (canDPCMa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeClearLockTaskPolicyLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | maybeClearLockTaskPolicyLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static void setCachePathSetting(String cachePathSetting) {
if (StringUtils.isEmpty(cachePathSetting)) {
FilesUtils.cachePathSetting = null;
} else {
FilesUtils.cachePathSetting = cachePathSetting;
}
resetDeployPath();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCachePathSetting
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-18212 | MEDIUM | 4 | eclipse/lemminx | setCachePathSetting | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java | e37c399aa266be1b7a43061d4afc43dc230410d2 | 0 |
Analyze the following code function for security vulnerabilities | protected void launchOpenKeyChain(long keyId) {
PgpEngine pgp = XmppActivity.this.xmppConnectionService.getPgpEngine();
try {
startIntentSenderForResult(
pgp.getIntentForKey(keyId).getIntentSender(), 0, null, 0,
0, 0);
} catch (Throwable e) {
Toast.makeText(XmppActivity.this, R.string.openpgp_erro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: launchOpenKeyChain
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | launchOpenKeyChain | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | void sendPing(byte[] data, final ChannelExceptionHandler<AbstractHttp2StreamSinkChannel> exceptionHandler, boolean ack) {
Http2PingStreamSinkChannel ping = new Http2PingStreamSinkChannel(this, data, ack);
try {
ping.shutdownWrites();
if (!ping.flush()) {
ping.getW... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendPing
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | sendPing | core/src/main/java/io/undertow/protocols/http2/Http2Channel.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onClick(DialogInterface dialog, int which) {
AsyncTask.execute(new Runnable() {
@Override
public void run() {
setSaverMode(true);
}
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onClick
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | onClick | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void checkAccept(String host, int port) {
try {
if (enterPublicInterface())
return;
if (isConnectionAllowed(host, port))
return;
throw new SecurityException(formatLocalized("security.error_network_accept", host, port)); //$NON-NLS-1$
} finally {
exitPublicInterface();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAccept
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | checkAccept | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public FileVisitResult visitFile(Path file, BasicFileAttributes attrs)
throws IOException {
Path tokenZero = file.getName(0);
if("__MACOSX".equals(tokenZero.toString()) || Files.isHidden(file)) {
//ignore
} else if(rootFound == null) {
if(Files.isRegularFile(file)) {
if(file.getNameC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visitFile
File: src/main/java/org/olat/fileresource/types/FileResource.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | visitFile | src/main/java/org/olat/fileresource/types/FileResource.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | public void setEngineContext(XWikiEngineContext engine_context)
{
this.engine_context = engine_context;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEngineContext
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | setEngineContext | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public void getSelectionPath(int start, int end, Path dest) {
dest.reset();
if (start == end)
return;
if (end < start) {
int temp = end;
end = start;
start = temp;
}
int startline = getLineForOffset(start);
int endline = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSelectionPath
File: core/java/android/text/Layout.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9452 | MEDIUM | 4.3 | android | getSelectionPath | core/java/android/text/Layout.java | 3b6f84b77c30ec0bab5147b0cffc192c86ba2634 | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasFeatureManagedUsers() {
try {
return mIPackageManager.hasSystemFeature(PackageManager.FEATURE_MANAGED_USERS, 0);
} catch (RemoteException e) {
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasFeatureManagedUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | hasFeatureManagedUsers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canUseFingerprint(String opPackageName, boolean foregroundOnly, int uid,
int pid) {
checkPermission(USE_FINGERPRINT);
if (isKeyguard(opPackageName)) {
return true; // Keyguard is always allowed
}
if (!isCurrentUserOrProfile(UserHandle.getCallingUse... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canUseFingerprint
File: services/core/java/com/android/server/fingerprint/FingerprintService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | canUseFingerprint | services/core/java/com/android/server/fingerprint/FingerprintService.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public synchronized void closeInbound() throws SSLException {
if (isInboundDone) {
return;
}
isInboundDone = true;
engineClosed = true;
shutdown();
if (handshakeState != HandshakeState.NOT_STARTED && !receivedShutdown) {
throw new ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeInbound
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | closeInbound | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | @Unstable
public String getRenderedContent(String text, Syntax sourceSyntaxId, boolean restrictedTransformationContext,
XWikiDocument sDocument, boolean isolated, XWikiContext context)
{
return getRenderedContent(text, sourceSyntaxId, getOutputSyntax(), restrictedTransformationContext, sDocument... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getRenderedContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
private Action makeAction(@DrawableRes int icon, @StringRes int title,
@ColorInt Integer colorInt, @ColorRes int defaultColorRes, PendingIntent intent) {
if (colorInt == null || !mBuilder.isCallActionColorCustomizable()) {
colorInt = mBuilder.mContext.getColo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeAction
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeAction | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public void setContentInode(String contentInode) {
this.contentInode = contentInode;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContentInode
File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-254",
"CWE-264"
] | CVE-2016-8600 | MEDIUM | 5 | dotCMS/core | setContentInode | src/com/dotmarketing/cms/comment/struts/CommentsForm.java | cb84b130065c9eed1d1df9e4770ffa5d4bd30569 | 0 |
Analyze the following code function for security vulnerabilities | public void resetUserExpandedStates() {
ArrayList<Entry> activeNotifications = mNotificationData.getActiveNotifications();
final int notificationCount = activeNotifications.size();
for (int i = 0; i < notificationCount; i++) {
NotificationData.Entry entry = activeNotifications.get(i)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetUserExpandedStates
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | resetUserExpandedStates | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public int sendWithResult(int code, Intent intent, String resolvedType, IBinder allowlistToken,
IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) {
return sendInner(code, intent, resolvedType, allowlistToken, finishedReceiver,
requiredPermission, null, null... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendWithResult
File: services/core/java/com/android/server/am/PendingIntentRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | sendWithResult | services/core/java/com/android/server/am/PendingIntentRecord.java | 8418e3a017428683d173c0c82b0eb02d5b923a4e | 0 |
Analyze the following code function for security vulnerabilities | private void doSetVisibilityInternal(final boolean visible) {
if (getActivity() == null) {
return;
}
getActivity().runOnUiThread(new Runnable() {
public void run() {
currentVisible = visible ? View.VISIBLE : View.INVISIBLE;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doSetVisibilityInternal
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | doSetVisibilityInternal | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void setPublishedDir(String dir) {
publishedDir = dir;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPublishedDir
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | setPublishedDir | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | private void addDownloadLinkToJson(
final HttpServletRequest httpServletRequest, final String ref,
final JSONWriter json) {
String downloadURL = getBaseUrl(httpServletRequest) + REPORT_URL + "/" + ref;
json.key(JSON_DOWNLOAD_LINK).value(downloadURL);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addDownloadLinkToJson
File: core/src/main/java/org/mapfish/print/servlet/MapPrinterServlet.java
Repository: mapfish/mapfish-print
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-15231 | MEDIUM | 4.3 | mapfish/mapfish-print | addDownloadLinkToJson | core/src/main/java/org/mapfish/print/servlet/MapPrinterServlet.java | 89155f2506b9cee822e15ce60ccae390a1419d5e | 0 |
Analyze the following code function for security vulnerabilities | private void registerMessageListener() {
// do not register multiple packet listeners
if (mPacketListener != null)
mXMPPConnection.removePacketListener(mPacketListener);
PacketTypeFilter filter = new PacketTypeFilter(Message.class);
mPacketListener = new PacketListener() {
public void processPacket(Pack... | Vulnerability Classification:
- CWE: CWE-20, CWE-346
- CVE: CVE-2017-5589
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Smackable: improved carbon checks
Function: registerMessageListener
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
Fixed Code:
private void registerMessageL... | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | registerMessageListener | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 1 |
Analyze the following code function for security vulnerabilities | public static synchronized LicenseInfo retrieveNamedSlow() {
cache = LicenseInfo.NONE;
if (OptionFlags.ALLOW_INCLUDE == false)
return cache;
final String key = prefs.get("license", "");
if (key.length() > 0) {
cache = setIfValid(retrieveNamed(key), cache);
if (cache.isValid())
return cache;
}
... | Vulnerability Classification:
- CWE: CWE-284
- CVE: CVE-2023-3431
- Severity: MEDIUM
- CVSS Score: 5.3
Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead
https://github.com/plantuml/plantuml-server/issues/232
Function: retrieveNamedSlow
File: src/net/sourceforge/plantuml/version/Lice... | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | retrieveNamedSlow | src/net/sourceforge/plantuml/version/LicenseInfo.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 1 |
Analyze the following code function for security vulnerabilities | public void bind(final AjaxRequestTarget target)
{
actionButtons.render();
mainSubContainer.setVisible(true);
target.appendJavaScript(getJavaScriptAction());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bind
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | bind | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void visit(MaterialRevision revision) {
this.revision = revision;
modificationsJson = new ArrayList();
materialJson = new LinkedHashMap();
materialJson.put("revision", revision.getRevision().getRevision());
materialJson.put("revision_href", revision.getRevis... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-28629
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Improve escaping on legacy Freemarker templates
Function: visit
File: server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java
Repository: gocd
Fixed Code:
... | [
"CWE-79"
] | CVE-2023-28629 | MEDIUM | 5.4 | gocd | visit | server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java | 95f758229d419411a38577608709d8552cccf193 | 1 |
Analyze the following code function for security vulnerabilities | void removeChildActivityContainers(ActivityRecord parentActivity) {
final ArrayList<ActivityContainer> childStacks = parentActivity.mChildContainers;
for (int containerNdx = childStacks.size() - 1; containerNdx >= 0; --containerNdx) {
ActivityContainer container = childStacks.remove(containe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeChildActivityContainers
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | removeChildActivityContainers | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | private void resetConfigSetting(int mode, String prefix) {
if (DEBUG) {
Slog.v(LOG_TAG, "resetConfigSetting(" + mode + ", " + prefix + ")");
}
mutateConfigSetting(null, null, prefix, false,
MUTATION_OPERATION_RESET, mode);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetConfigSetting
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | resetConfigSetting | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public void createConnectionFailed(final Call call) {
Log.d(this, "createConnectionFailed(%s) via %s.", call, getComponentName());
BindCallback callback = new BindCallback() {
@Override
public void onSuccess() {
final String callId = mCallId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConnectionFailed
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | createConnectionFailed | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getNamespaceURI() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNamespaceURI
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | getNamespaceURI | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | public void setMinRoamingDownlinkBandwidth(long minRoamingDownlinkBandwidth) {
mMinRoamingDownlinkBandwidth = minRoamingDownlinkBandwidth;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMinRoamingDownlinkBandwidth
File: framework/java/android/net/wifi/hotspot2/pps/Policy.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21240 | MEDIUM | 5.5 | android | setMinRoamingDownlinkBandwidth | framework/java/android/net/wifi/hotspot2/pps/Policy.java | 69119d1d3102e27b6473c785125696881bce9563 | 0 |
Analyze the following code function for security vulnerabilities | private void cleanAllUnversionedFiles(ConsoleOutputStreamConsumer outputStreamConsumer) {
log(outputStreamConsumer, "Cleaning all unversioned files in working copy");
cleanUnversionedFilesInAllSubmodules();
cleanUnversionedFiles();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanAllUnversionedFiles
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | cleanAllUnversionedFiles | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
protected void setVarTextTemplate(final Template varTextTemplate) {
this.varTextTemplate = varTextTemplate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVarTextTemplate
File: varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java
Repository: indeedeng/util
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-36634 | MEDIUM | 5.4 | indeedeng/util | setVarTextTemplate | varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java | c0952a9db51a880e9544d9fac2a2218a6bfc9c63 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isSystemApp(PackageSetting ps) {
return (ps.pkgFlags & ApplicationInfo.FLAG_SYSTEM) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSystemApp
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isSystemApp | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public boolean enableMacRandomization(@NonNull String fqdn, boolean enable) {
ArrayList<PasspointProvider> passpointProviders = new ArrayList<>(mProviders.values());
boolean found = false;
// Loop through all profiles with matching FQDN
for (PasspointProvider provider : passpointProvide... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enableMacRandomization
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | enableMacRandomization | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isCurrentUserDemo() {
if (UserManager.isDeviceInDemoMode(mContext)) {
final int userId = mInjector.userHandleGetCallingUserId();
return mInjector.binderWithCleanCallingIdentity(
() -> mUserManager.getUserInfo(userId).isDemo());
}
return... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCurrentUserDemo
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isCurrentUserDemo | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void sendResult(List<ChooserTarget> targets) throws RemoteException {
synchronized (mLock) {
if (mChooserActivity == null) {
Log.e(TAG, "destroyed ChooserTargetServiceConnection received result from "
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendResult
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | sendResult | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public <T> T deserialize(Response response, GenericType<T> returnType) throws ApiException {
if (response == null || returnType == null) {
return null;
}
if ("byte[]".equals(returnType.toString())) {
// Handle binary response (byte array).
return (T) respo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deserialize
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | deserialize | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void clearPackagePersistentPreferredActivities(String packageName, int userId) {
int callingUid = Binder.getCallingUid();
if (callingUid != Process.SYSTEM_UID) {
throw new SecurityException(
"clearPackagePersistentPreferredActivities can only be run b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearPackagePersistentPreferredActivities
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | clearPackagePersistentPreferredActivities | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<String> getAllCrossProfilePackages() {
if (!mHasFeature) {
return Collections.emptyList();
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isSystemUid(caller) || isRootUid(caller) || hasCalli... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllCrossProfilePackages
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getAllCrossProfilePackages | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void processConfiguration() throws LifecycleException {
initIDPConfiguration();
initSTSConfiguration();
initKeyManager();
initHandlersChain();
initIdentityServer();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processConfiguration
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding ... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | processConfiguration | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setActive(String callId, Session.Info sessionInfo) {
Log.startSession(sessionInfo, LogUtils.Sessions.CSW_SET_ACTIVE,
mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setActive
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | setActive | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Set<String> getPackagesSuspendedByAdmin(@UserIdInt int userId) {
return DevicePolicyManagerService.this.getPackagesSuspendedByAdmin(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackagesSuspendedByAdmin
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getPackagesSuspendedByAdmin | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public void preserveSelectionOnNextLossOfFocus() {
mPreserveSelectionOnNextLossOfFocus = true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: preserveSelectionOnNextLossOfFocus
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | preserveSelectionOnNextLossOfFocus | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | private void testPathEquals(final String xPath, final String value, final SAXEventRecorder steppingFilter)
throws Exception {
final XPathFilter xPathFilter = new XPathFilter();
xPathFilter.setXPath(xPath);
xPathFilter.setMatchType(MatchType.EQUALS);
xPathFilter.setValue(value... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testPathEquals
File: stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | testPathEquals | stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | public String displayForm(String className, String header, String format)
{
return this.doc.displayForm(className, header, format, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayForm
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | displayForm | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public static UserManagerService getInstance() {
synchronized (UserManagerService.class) {
return sInstance;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstance
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | getInstance | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | public SwitchBar getSwitchBar() {
return mSwitchBar;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSwitchBar
File: src/com/android/settings/SettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | getSwitchBar | src/com/android/settings/SettingsActivity.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
final int prime = 31;
int result = 1;
result = prime * result + ((classId == null) ? 0 : classId.hashCode());
result = prime * result + ((constraints == null) ? 0 : constraints.hashCode());
result = prime * result + ((name == null) ? 0 : name... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | hashCode | base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public String getMetricsMode() {
return getProperty(TS_METRICS_MODE, "log");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetricsMode
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getMetricsMode | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void setSmoothParams() throws Exception {
assertPlotParam("smooth", "unique");
assertPlotParam("smooth", "frequency");
assertPlotParam("smooth", "fnormal");
assertPlotParam("smooth", "cumulative");
assertPlotParam("smooth", "cnormal");
assertPlotParam("smooth", "bins");
assert... | Vulnerability Classification:
- CWE: CWE-78
- CVE: CVE-2023-25826
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Improved fix for #2261.
Regular expressions wouldn't catch the newlines or possibly other
control characters. Now we'll use the TAG validation code to make
sure the inputs are only plain ASCII printabl... | [
"CWE-78"
] | CVE-2023-25826 | CRITICAL | 9.8 | OpenTSDB/opentsdb | setSmoothParams | test/tsd/TestGraphHandler.java | 26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25 | 1 |
Analyze the following code function for security vulnerabilities | protected String findUserDN(LdapContext ctx) throws LoginException
{
if (baseCtxDN == null)
{
return getIdentity().getName();
}
try
{
NamingEnumeration results = null;
Object[] filterArgs =
{getIdentity().getName()};
LdapContext ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findUserDN
File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
Repository: wildfly-security/jboss-negotiation
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2015-1849 | MEDIUM | 4.3 | wildfly-security/jboss-negotiation | findUserDN | jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java | 0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.