instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getNodeProperties() { return nodeProperties; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNodeProperties File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getNodeProperties
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public AssetHandler maxAge(final String maxAge) { Try.apply(() -> Long.parseLong(maxAge)) .recover(x -> ConfigFactory.empty() .withValue("v", ConfigValueFactory.fromAnyRef(maxAge)) .getDuration("v") .getSeconds()) .onSuccess(this::maxAge); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maxAge File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
maxAge
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public void onPropertiesChanged(DeviceConfig.Properties properties) { synchronized (mLock) { mEnforceBroadcastReceiverRestrictions = properties.getBoolean( ENFORCE_BROADCAST_RECEIVER_RESTRICTIONS, false); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPropertiesChanged File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
onPropertiesChanged
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public ProfileOutput getOutput(String name) { return getOutputByName(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOutput File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getOutput
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public int getStartX() { return mStartX; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStartX File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getStartX
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public static String getFullServiceURL(String shortUrl) { String result = null; try { URL u = new URL(shortUrl); URL weburl = SystemConfigurationUtil.getServiceURL( SAMLConstants.SAML_AM_NAMING, u.getProtocol(), u.getHost(), u.getPort(), u.getPath()); result = weburl.toString(); if (SAMLUtils.debug.messageEnabled()) { SAMLUtils.debug.message("SAMLUtils.getFullServiceURL:" + "full remote URL is: " + result); } } catch (Exception e) { if (SAMLUtils.debug.warningEnabled()) { SAMLUtils.debug.warning("SAMLUtils.getFullServiceURL:" + "Exception:", e); } } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFullServiceURL File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
getFullServiceURL
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
public static List<Triple<String, Element, String>> getTagElementTriplesFromFileNumBoundedSAXException( File f, String tag, int numIncludedSiblings) throws SAXException { List<Triple<String, Element, String>> sents = Generics.newArrayList(); try { DocumentBuilderFactory dbf = safeDocumentBuilderFactory(); DocumentBuilder db = dbf.newDocumentBuilder(); Document doc = db.parse(f); doc.getDocumentElement().normalize(); NodeList nodeList=doc.getElementsByTagName(tag); for (int i = 0; i < nodeList.getLength(); i++) { // Get element Node prevNode = nodeList.item(i).getPreviousSibling(); String prev = ""; int count = 0; while (prevNode != null && count <= numIncludedSiblings) { prev = prevNode.getTextContent() + prev; prevNode = prevNode.getPreviousSibling(); count++; } Node nextNode = nodeList.item(i).getNextSibling(); String next = ""; count = 0; while (nextNode != null && count <= numIncludedSiblings) { next = next + nextNode.getTextContent(); nextNode = nextNode.getNextSibling(); count++; } Element element = (Element)nodeList.item(i); Triple<String, Element, String> t = new Triple<>(prev, element, next); sents.add(t); } } catch (IOException | ParserConfigurationException e) { log.warn(e); } return sents; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTagElementTriplesFromFileNumBoundedSAXException File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-0239
HIGH
7.5
stanfordnlp/CoreNLP
getTagElementTriplesFromFileNumBoundedSAXException
src/edu/stanford/nlp/util/XMLUtils.java
1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd
0
Analyze the following code function for security vulnerabilities
@Deprecated // Only actually passes the first stage. Use newPipelineWithAllStagesPassed instead public Pipeline passPipeline(Pipeline pipeline) { for (Stage stage : pipeline.getStages()) { passStage(stage); } Stages loadedStages = new Stages(); for (Stage stage : pipeline.getStages()) { loadedStages.add(stageDao.stageById(stage.getId())); } Pipeline loadedPipeline = this.pipelineDao.loadPipeline(pipeline.getId()); loadedPipeline.setStages(loadedStages); return loadedPipeline; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: passPipeline File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
passPipeline
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
public static Path getDataFolder(String pi, String dataFolderName) throws PresentationException, IndexUnreachableException { if (pi == null) { throw new IllegalArgumentException("pi may not be null"); } String dataRepository = DataManager.getInstance().getSearchIndex().findDataRepositoryName(pi); return getDataFolder(pi, dataFolderName, dataRepository); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDataFolder File: goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-15124
MEDIUM
4
intranda/goobi-viewer-core
getDataFolder
goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java
44ceb8e2e7e888391e8a941127171d6366770df3
0
Analyze the following code function for security vulnerabilities
native boolean getRemoteServicesNative(byte[] address);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRemoteServicesNative File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
getRemoteServicesNative
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
@Override public void notifyAppTransitionCancelled() { synchronized (ActivityManagerService.this) { mStackSupervisor.notifyAppTransitionDone(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyAppTransitionCancelled File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
notifyAppTransitionCancelled
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void setMacAlgorithm(String macAlgorithm) { this.macAlgorithm = macAlgorithm; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMacAlgorithm File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java Repository: ratpack The code follows secure coding practices.
[ "CWE-312" ]
CVE-2021-29481
MEDIUM
5
ratpack
setMacAlgorithm
ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java
60302fae7ef26897b9a0ec0def6281a9425344cf
0
Analyze the following code function for security vulnerabilities
public void setIssuerDN(String issuerDN) { this.issuerDN = issuerDN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIssuerDN File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setIssuerDN
base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public ServerBuilder https(int port) { return port(new ServerPort(port, HTTPS)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: https File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
https
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public void setSpec(XGBoostJobSpec spec) { this.spec = spec; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSpec File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java Repository: apache/submarine The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
setSpec
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
0
Analyze the following code function for security vulnerabilities
private void requireFileExistence(File jar) { if (!Objects.requireNonNull(jar).isFile()) { throw new IllegalArgumentException( String.format("Expect '%s' to be an existing file", jar)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requireFileExistence File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-379" ]
CVE-2021-31411
MEDIUM
4.6
vaadin/flow
requireFileExistence
flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
82cea56045b8430f7a26f037c01486b1feffa51d
0
Analyze the following code function for security vulnerabilities
public void clear() { mUidMap.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clear File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clear
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static boolean deleteDirAndContents(File dir) { if (dir.isDirectory()) { String[] children = dir.list(); for (int i = 0; i < children.length; i++) { boolean success = deleteDirAndContents(new File(dir, children[i])); if (!success) return false; } } return dir.delete(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteDirAndContents File: src/main/java/bspkrs/mmv/RemoteZipHandler.java Repository: bspkrs/MCPMappingViewer The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4494
CRITICAL
9.8
bspkrs/MCPMappingViewer
deleteDirAndContents
src/main/java/bspkrs/mmv/RemoteZipHandler.java
6e602746c96b4756c271d080dae7d22ad804a1bd
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return "ActivityOptions(" + hashCode() + "), mPackageName=" + mPackageName + ", mAnimationType=" + mAnimationType + ", mStartX=" + mStartX + ", mStartY=" + mStartY + ", mWidth=" + mWidth + ", mHeight=" + mHeight; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
toString
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
void onUserInitialized(UserState uss, boolean foreground, int oldUserId, int newUserId) { synchronized (this) { if (foreground) { moveUserToForeground(uss, oldUserId, newUserId); } } completeSwitchAndInitialize(uss, newUserId, true, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserInitialized File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
onUserInitialized
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public static String vsm(String materialFingerprint, String revision) { return StrSubstitutor.replace("/materials/value_stream_map/${material_fingerprint}/${revision}", of( "material_fingerprint", materialFingerprint, "revision", revision)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: vsm File: spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
vsm
spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
private void readConfigurationDependentBehaviors() { mLongPressOnHomeBehavior = mContext.getResources().getInteger( com.android.internal.R.integer.config_longPressOnHomeBehavior); if (mLongPressOnHomeBehavior < LONG_PRESS_HOME_NOTHING || mLongPressOnHomeBehavior > LONG_PRESS_HOME_ASSIST) { mLongPressOnHomeBehavior = LONG_PRESS_HOME_NOTHING; } mDoubleTapOnHomeBehavior = mContext.getResources().getInteger( com.android.internal.R.integer.config_doubleTapOnHomeBehavior); if (mDoubleTapOnHomeBehavior < DOUBLE_TAP_HOME_NOTHING || mDoubleTapOnHomeBehavior > DOUBLE_TAP_HOME_RECENT_SYSTEM_UI) { mDoubleTapOnHomeBehavior = LONG_PRESS_HOME_NOTHING; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readConfigurationDependentBehaviors File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
readConfigurationDependentBehaviors
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public void onGuildMemberRemove(@NotNull GuildMemberRemoveEvent event) { super.onGuildMemberRemove(event); SQLResponse sqlResponse = Main.getInstance().getSqlConnector().getSqlWorker().getEntity(ChannelStats.class, "SELECT * FROM ChannelStats WHERE GID=?", event.getGuild().getId()); if (sqlResponse.isSuccess()) { ChannelStats channelStats = (ChannelStats) sqlResponse.getEntity(); if (channelStats.getMemberStatsChannelId() != null) { GuildChannel guildChannel = event.getGuild().getGuildChannelById(channelStats.getMemberStatsChannelId()); if (guildChannel != null) { guildChannel.getManager().setName("Overall Members: " + event.getGuild().getMemberCount()).queue(); } } event.getGuild().loadMembers().onSuccess(members -> { if (channelStats.getRealMemberStatsChannelId() != null) { GuildChannel guildChannel = event.getGuild().getGuildChannelById(channelStats.getRealMemberStatsChannelId()); if (guildChannel != null) { guildChannel.getManager().setName("Real Members: " + members.stream().filter(member -> !member.getUser().isBot()).count()).queue(); } } if (channelStats.getBotMemberStatsChannelId() != null) { GuildChannel guildChannel = event.getGuild().getGuildChannelById(channelStats.getBotMemberStatsChannelId()); if (guildChannel != null) { guildChannel.getManager().setName("Bot Members: " + members.stream().filter(member -> member.getUser().isBot()).count()).queue(); } } }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onGuildMemberRemove File: src/main/java/de/presti/ree6/events/OtherEvents.java Repository: Ree6-Applications/Ree6 The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-39302
MEDIUM
5.4
Ree6-Applications/Ree6
onGuildMemberRemove
src/main/java/de/presti/ree6/events/OtherEvents.java
459b5bc24f0ea27e50031f563373926e94b9aa0a
0
Analyze the following code function for security vulnerabilities
public static int getTotals(Structure structure,String typeField) { List fields = structure.getFields(); int total = 0; for(int i = 0; i < fields.size();i++) { Field field = (Field) fields.get(i); if(field.getFieldType().equals(typeField)) { total++; } } return total; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTotals File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getTotals
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public Intent getResultData() { return mResultData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResultData File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getResultData
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public void broadcastAuxiliarySupplicantEvent(String iface, @SupplicantEventCode int eventCode, MacAddress bssid, String reasonString) { sendMessage(iface, AUXILIARY_SUPPLICANT_EVENT, 0, 0, new SupplicantEventInfo(eventCode, bssid, reasonString)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: broadcastAuxiliarySupplicantEvent File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
broadcastAuxiliarySupplicantEvent
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public void resetTimeouts() throws RemoteException { NfcPermissions.enforceUserPermissions(mContext); mDeviceHost.resetTimeouts(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetTimeouts File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
resetTimeouts
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Override public List<Block> execute(LiveDataMacroParameters parameters, String content, MacroTransformationContext context) throws MacroExecutionException { // Load the JavaScript code of the Live Data widget. Map<String, Object> skinExtensionParameters = Collections.singletonMap("forceSkinAction", Boolean.TRUE); this.jsfx.use("uicomponents/widgets/liveData.js", skinExtensionParameters); GroupBlock output = new GroupBlock(); output.setParameter("class", "liveData loading"); if (parameters.getId() != null) { output.setParameter("id", parameters.getId()); } try { // Compute the live data configuration based on the macro parameters. LiveDataConfiguration liveDataConfig = getLiveDataConfiguration(content, parameters); // Add the default values. liveDataConfig = this.defaultLiveDataConfigResolver.resolve(liveDataConfig); // Serialize as JSON. ObjectMapper objectMapper = new ObjectMapper(); output.setParameter("data-config", objectMapper.writeValueAsString(liveDataConfig)); } catch (Exception e) { throw new MacroExecutionException("Failed to generate live data configuration from macro parameters.", e); } return Collections.singletonList(output); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-26480 - Severity: MEDIUM - CVSS Score: 5.4 Description: XWIKI-20143: Improved Live Data escaping Function: execute File: xwiki-platform-core/xwiki-platform-livedata/xwiki-platform-livedata-macro/src/main/java/org/xwiki/livedata/internal/macro/LiveDataMacro.java Repository: xwiki/xwiki-platform Fixed Code: @Override public List<Block> execute(LiveDataMacroParameters parameters, String content, MacroTransformationContext context) throws MacroExecutionException { // Load the JavaScript code of the Live Data widget. Map<String, Object> skinExtensionParameters = singletonMap("forceSkinAction", Boolean.TRUE); this.jsfx.use("uicomponents/widgets/liveData.js", skinExtensionParameters); GroupBlock output = new GroupBlock(); output.setParameter("class", "liveData loading"); if (parameters.getId() != null) { output.setParameter("id", parameters.getId()); } try { // Compute the live data configuration based on the macro parameters. LiveDataConfiguration liveDataConfig = this.liveDataMacroConfiguration.getLiveDataConfiguration(content, parameters); // Add the default values. liveDataConfig = this.defaultLiveDataConfigResolver.resolve(liveDataConfig); // Serialize as JSON. ObjectMapper objectMapper = new ObjectMapper(); output.setParameter("data-config", objectMapper.writeValueAsString(liveDataConfig)); // The content is trusted if the author has script right, or if no advanced configuration is used (i.e., // no macro content), and we are running in a trusted context. boolean trustedContent = StringUtils.isBlank(content) || (this.liveDataMacroRights.authorHasScriptRight() && !context.getTransformationContext().isRestricted()); output.setParameter("data-config-content-trusted", Boolean.toString(trustedContent)); } catch (Exception e) { throw new MacroExecutionException("Failed to generate live data configuration from macro parameters.", e); } return singletonList(output); }
[ "CWE-79" ]
CVE-2023-26480
MEDIUM
5.4
xwiki/xwiki-platform
execute
xwiki-platform-core/xwiki-platform-livedata/xwiki-platform-livedata-macro/src/main/java/org/xwiki/livedata/internal/macro/LiveDataMacro.java
556e7823260b826f344c1a6e95d935774587e028
1
Analyze the following code function for security vulnerabilities
static Html4SaxParserContext newInstance(final Ruby runtime, final RubyClass klazz) { Html4SaxParserContext instance = new Html4SaxParserContext(runtime, klazz); instance.initialize(runtime); return instance; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: ext/java/nokogiri/Html4SaxParserContext.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-241" ]
CVE-2022-29181
MEDIUM
6.4
sparklemotion/nokogiri
newInstance
ext/java/nokogiri/Html4SaxParserContext.java
db05ba9a1bd4b90aa6c76742cf6102a7c7297267
0
Analyze the following code function for security vulnerabilities
@Override public Properties getProperties() { return properties; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProperties File: services/src/main/java/org/keycloak/theme/ClassLoaderTheme.java Repository: keycloak The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-3856
MEDIUM
4.3
keycloak
getProperties
services/src/main/java/org/keycloak/theme/ClassLoaderTheme.java
73f0474008e1bebd0733e62a22aceda9e5de6743
0
Analyze the following code function for security vulnerabilities
void tempWhitelistAppForPowerSave(int callerPid, int callerUid, int targetUid, long duration) { if (DEBUG_WHITELISTS) { Slog.d(TAG, "tempWhitelistAppForPowerSave(" + callerPid + ", " + callerUid + ", " + targetUid + ", " + duration + ")"); } synchronized (mPidsSelfLocked) { final ProcessRecord pr = mPidsSelfLocked.get(callerPid); if (pr == null) { Slog.w(TAG, "tempWhitelistAppForPowerSave() no ProcessRecord for pid " + callerPid); return; } if (!pr.whitelistManager) { if (DEBUG_WHITELISTS) { Slog.d(TAG, "tempWhitelistAppForPowerSave() for target " + targetUid + ": pid " + callerPid + " is not allowed"); } return; } } final long token = Binder.clearCallingIdentity(); try { mLocalDeviceIdleController.addPowerSaveTempWhitelistAppDirect(targetUid, duration, true, "pe from uid:" + callerUid); } finally { Binder.restoreCallingIdentity(token); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempWhitelistAppForPowerSave File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
tempWhitelistAppForPowerSave
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public boolean containsLong(K name, long value) { return contains(name, fromLong(name, value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsLong File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
containsLong
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
private void outputChars() throws SAXException { final char[] ch = content.toString().toCharArray(); super.characters(ch, 0, ch.length); content.setLength(0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outputChars File: stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
outputChars
stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
private void setConfigurationsPriorToIpClientProvisioning(WifiConfiguration config) { mIpClient.setHttpProxy(config.getHttpProxy()); if (!TextUtils.isEmpty(mContext.getResources().getString( R.string.config_wifi_tcp_buffers))) { mIpClient.setTcpBufferSizes(mContext.getResources().getString( R.string.config_wifi_tcp_buffers)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConfigurationsPriorToIpClientProvisioning File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
setConfigurationsPriorToIpClientProvisioning
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private Properties jpaProperties() { Properties extraProperties = new Properties(); if (CommonConfig.isLocalTestMode()) { extraProperties.put("hibernate.dialect", DerbyTenSevenHapiFhirDialect.class.getName()); } else { extraProperties.put("hibernate.dialect", PostgreSQL94Dialect.class.getName()); } extraProperties.put("hibernate.format_sql", "false"); extraProperties.put("hibernate.show_sql", "false"); extraProperties.put("hibernate.hbm2ddl.auto", "update"); extraProperties.put("hibernate.jdbc.batch_size", "20"); extraProperties.put("hibernate.cache.use_query_cache", "false"); extraProperties.put("hibernate.cache.use_second_level_cache", "false"); extraProperties.put("hibernate.cache.use_structured_entries", "false"); extraProperties.put("hibernate.cache.use_minimal_puts", "false"); extraProperties.put(BackendSettings.backendKey(BackendSettings.TYPE), "lucene"); extraProperties.put(BackendSettings.backendKey(LuceneBackendSettings.ANALYSIS_CONFIGURER), HapiLuceneAnalysisConfigurer.class.getName()); extraProperties.put(BackendSettings.backendKey(LuceneIndexSettings.DIRECTORY_TYPE), "local-filesystem"); extraProperties.put(BackendSettings.backendKey(LuceneIndexSettings.DIRECTORY_ROOT), myFhirLuceneLocation); extraProperties.put(BackendSettings.backendKey(LuceneBackendSettings.LUCENE_VERSION), "LUCENE_CURRENT"); return extraProperties; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jpaProperties File: hapi-fhir-jpaserver-uhnfhirtest/src/main/java/ca/uhn/fhirtest/config/TestDstu2Config.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
jpaProperties
hapi-fhir-jpaserver-uhnfhirtest/src/main/java/ca/uhn/fhirtest/config/TestDstu2Config.java
a5e4f56e1c6f55093ff334cf698ffdeea2f33960
0
Analyze the following code function for security vulnerabilities
public void setDisallowEnterPictureInPictureWhileLaunching(boolean disallow) { mDisallowEnterPictureInPictureWhileLaunching = disallow; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDisallowEnterPictureInPictureWhileLaunching File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setDisallowEnterPictureInPictureWhileLaunching
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
private @Nullable List<String> getPermittedInputMethodsUnchecked(@UserIdInt int userId) { List<String> result = null; if (isPolicyEngineForFinanceFlagEnabled()) { Set<String> policy = mDevicePolicyEngine.getResolvedPolicy( PolicyDefinition.PERMITTED_INPUT_METHODS, userId); result = policy == null ? null : new ArrayList<>(policy); } else { synchronized (getLockObject()) { // Only device or profile owners can have permitted lists set. List<ActiveAdmin> admins = getActiveAdminsForAffectedUserInclPermissionBasedAdminLocked( userId); for (ActiveAdmin admin : admins) { List<String> fromAdmin = admin.permittedInputMethods; if (fromAdmin != null) { if (result == null) { result = new ArrayList<String>(fromAdmin); } else { result.retainAll(fromAdmin); } } } } } // If we have a permitted list add all system input methods. if (result != null) { List<InputMethodInfo> imes = InputMethodManagerInternal .get().getInputMethodListAsUser(userId); if (imes != null) { for (InputMethodInfo ime : imes) { ServiceInfo serviceInfo = ime.getServiceInfo(); ApplicationInfo applicationInfo = serviceInfo.applicationInfo; if ((applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) != 0) { result.add(serviceInfo.packageName); } } } } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermittedInputMethodsUnchecked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPermittedInputMethodsUnchecked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public Builder withIndex(long val) { index = val; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withIndex File: core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-470" ]
CVE-2018-1000613
HIGH
7.5
bcgit/bc-java
withIndex
core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java
4092ede58da51af9a21e4825fbad0d9a3ef5a223
0
Analyze the following code function for security vulnerabilities
@Override public View focusSearch(int direction) { if (direction == View.FOCUS_BACKWARD && mUrlBarDelegate.getCurrentTab().getView() != null) { return mUrlBarDelegate.getCurrentTab().getView(); } else { return super.focusSearch(direction); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: focusSearch File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
focusSearch
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Override public JsonDeserializer<?> createCollectionLikeDeserializer(DeserializationContext ctxt, CollectionLikeType type, final BeanDescription beanDesc) throws JsonMappingException { JavaType contentType = type.getContentType(); // Very first thing: is deserializer hard-coded for elements? JsonDeserializer<Object> contentDeser = contentType.getValueHandler(); final DeserializationConfig config = ctxt.getConfig(); // Then optional type info (1.5): if type has been resolved, we may already know type deserializer: TypeDeserializer contentTypeDeser = contentType.getTypeHandler(); // but if not, may still be possible to find: if (contentTypeDeser == null) { contentTypeDeser = findTypeDeserializer(config, contentType); } JsonDeserializer<?> deser = _findCustomCollectionLikeDeserializer(type, config, beanDesc, contentTypeDeser, contentDeser); if (deser != null) { // and then new with 2.2: ability to post-process it too (Issue#120) if (_factoryConfig.hasDeserializerModifiers()) { for (BeanDeserializerModifier mod : _factoryConfig.deserializerModifiers()) { deser = mod.modifyCollectionLikeDeserializer(config, type, beanDesc, deser); } } } return deser; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createCollectionLikeDeserializer File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
createCollectionLikeDeserializer
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public String getBasePath() { return basePath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBasePath File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getBasePath
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public String getName() { return "xwiki-core"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
static long parseLongAttribute(TypedXmlPullParser parser, String attribute, long def) { final String value = parseStringAttribute(parser, attribute); if (TextUtils.isEmpty(value)) { return def; } try { return Long.parseLong(value); } catch (NumberFormatException e) { Slog.e(TAG, "Error parsing long " + value); return def; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseLongAttribute File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
parseLongAttribute
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void checkRestrictedClass(Object o, Object method) { if (o instanceof Class || o instanceof ClassLoader || o instanceof Thread) { throw new MethodNotFoundException( "Cannot find method '" + method + "' in " + o.getClass() ); } }
Vulnerability Classification: - CWE: CWE-863 - CVE: CVE-2020-12668 - Severity: MEDIUM - CVSS Score: 6.8 Description: add method to blacklist Function: checkRestrictedClass File: src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java Repository: HubSpot/jinjava Fixed Code: private void checkRestrictedClass(Object o, Object method) { if ( o instanceof Class || o instanceof ClassLoader || o instanceof Thread || o instanceof Method ) { throw new MethodNotFoundException( "Cannot find method '" + method + "' in " + o.getClass() ); } }
[ "CWE-863" ]
CVE-2020-12668
MEDIUM
6.8
HubSpot/jinjava
checkRestrictedClass
src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java
5dfa5b87318744a4d020b66d5f7747acc36b213b
1
Analyze the following code function for security vulnerabilities
public String getExecutable() { return executable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExecutable File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
getExecutable
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
public void unhandledBack() throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unhandledBack File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
unhandledBack
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public <T> PageInfo<T> toPageInfo(Function<E, T> function) { List<T> list = new ArrayList<T>(this.size()); for (E e : this) { list.add(function.apply(e)); } PageInfo<T> pageInfo = new PageInfo<T>(list); pageInfo.setTotal(this.getTotal()); pageInfo.setPageNum(this.getPageNum()); pageInfo.setPageSize(this.getPageSize()); pageInfo.setPages(this.getPages()); pageInfo.setStartRow(this.getStartRow()); pageInfo.setEndRow(this.getEndRow()); pageInfo.calcByNavigatePages(PageInfo.DEFAULT_NAVIGATE_PAGES); return pageInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toPageInfo File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
toPageInfo
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
public void setHeaderVisible(boolean headerVisible) { getHeader().setVisible(headerVisible); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHeaderVisible File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setHeaderVisible
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
private void setLifecycleForAllControllers() { if (mProxySubscriptionMgr == null) { mProxySubscriptionMgr = ProxySubscriptionManager.getInstance(getContext()); } mProxySubscriptionMgr.setLifecycle(getLifecycle()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLifecycleForAllControllers File: src/com/android/settings/network/apn/ApnEditor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40125
HIGH
7.8
android
setLifecycleForAllControllers
src/com/android/settings/network/apn/ApnEditor.java
63d464c3fa5c7b9900448fef3844790756e557eb
0
Analyze the following code function for security vulnerabilities
void updateAppOpsState() { if (mAppOp == OP_NONE) { return; } final int uid = getOwningUid(); final String packageName = getOwningPackage(); if (mAppOpVisibility) { // There is a race between the check and the finish calls but this is fine // as this would mean we will get another change callback and will reconcile. int mode = mWmService.mAppOps.checkOpNoThrow(mAppOp, uid, packageName); if (mode != MODE_ALLOWED && mode != MODE_DEFAULT) { mWmService.mAppOps.finishOp(mAppOp, uid, packageName, null /* featureId */); setAppOpVisibilityLw(false); } } else { final int mode = mWmService.mAppOps.startOpNoThrow(mAppOp, uid, packageName, true /* startIfModeDefault */, null /* featureId */, "attempt-to-be-visible"); if (mode == MODE_ALLOWED || mode == MODE_DEFAULT) { setAppOpVisibilityLw(true); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAppOpsState File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
updateAppOpsState
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Test public void test() throws Exception { final Path input = StroomPipelineTestFileUtil.getTestResourcesFile(INPUT); final SAXParser parser = PARSER_FACTORY.newSAXParser(); final XMLReader xmlReader = parser.getXMLReader(); final SAXEventRecorder steppingFilter = new SAXEventRecorder(null, null); steppingFilter.clear(null); xmlReader.setContentHandler(steppingFilter); xmlReader.parse(new InputSource(Files.newBufferedReader(input))); testPathExists("/records", steppingFilter); testPathExists("records", steppingFilter); testPathExists("records/record", steppingFilter); testPathExists("records/record/data", steppingFilter); testPathExists("records/record/data[@name]", steppingFilter); testPathExists("records/record/data[@name = 'FileNo']", steppingFilter); testPathExists("records/record/data[@name = 'FileNo' and @value]", steppingFilter); testPathExists("records/record/data[@name = 'FileNo' and @value = '1']", steppingFilter); testPathExists("records/record", steppingFilter); testPathExists("records/record", steppingFilter); testPathEquals("records/record/data[@name = 'FileNo']/@value", "1", steppingFilter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: test File: stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
test
stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
public ServerBuilder gracefulShutdownTimeoutMillis(long quietPeriodMillis, long timeoutMillis) { return gracefulShutdownTimeout( Duration.ofMillis(quietPeriodMillis), Duration.ofMillis(timeoutMillis)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gracefulShutdownTimeoutMillis File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
gracefulShutdownTimeoutMillis
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
private static boolean shouldUseSystemProxy() { return "true".equals(System.getProperty("java.net.useSystemProxies")) && (!System.getProperty("http.proxyHost", "").isEmpty() || !System.getProperty("https.proxyHost", "").isEmpty()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldUseSystemProxy File: app/server/appsmith-interfaces/src/main/java/com/appsmith/util/WebClientUtils.java Repository: appsmithorg/appsmith The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-4096
MEDIUM
6.5
appsmithorg/appsmith
shouldUseSystemProxy
app/server/appsmith-interfaces/src/main/java/com/appsmith/util/WebClientUtils.java
769719ccfe667f059fe0b107a19ec9feb90f2e40
0
Analyze the following code function for security vulnerabilities
private ActivityManager.ProcessErrorStateInfo generateProcessError(ProcessRecord app, int condition, String activity, String shortMsg, String longMsg, String stackTrace) { ActivityManager.ProcessErrorStateInfo report = new ActivityManager.ProcessErrorStateInfo(); report.condition = condition; report.processName = app.processName; report.pid = app.pid; report.uid = app.info.uid; report.tag = activity; report.shortMsg = shortMsg; report.longMsg = longMsg; report.stackTrace = stackTrace; return report; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateProcessError File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
generateProcessError
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public long getSupportedFeatures() { return mWifiNative.getSupportedFeatureSet(mInterfaceName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSupportedFeatures File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getSupportedFeatures
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public boolean isColorized() { return extras.getBoolean(EXTRA_COLORIZED) && (hasColorizedPermission() || isForegroundService()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isColorized File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
isColorized
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override boolean check(AwsConfig c1, AwsConfig c2) { boolean c1Disabled = c1 == null || !c1.isEnabled(); boolean c2Disabled = c2 == null || !c2.isEnabled(); return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.getAccessKey(), c2.getAccessKey()) && nullSafeEqual(c1.getSecretKey(), c2.getSecretKey()) && nullSafeEqual(c1.getRegion(), c2.getRegion()) && nullSafeEqual(c1.getSecurityGroupName(), c2.getSecurityGroupName()) && nullSafeEqual(c1.getTagKey(), c2.getTagKey()) && nullSafeEqual(c1.getTagValue(), c2.getTagValue()) && nullSafeEqual(c1.getHostHeader(), c2.getHostHeader()) && nullSafeEqual(c1.getIamRole(), c2.getIamRole()) && nullSafeEqual(c1.getConnectionTimeoutSeconds(), c2.getConnectionTimeoutSeconds())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void setChildModal(Component child) { if (modalComponentStack == null) { modalComponentStack = new ArrayDeque<>(); } else if (isTopMostModal(child)) { return; } ElementUtil.setIgnoreParentInert(child.getElement(), true); if (modalComponentStack.isEmpty()) { ElementUtil.setInert(ui.getElement(), true); } else { // disable previous top most modal component ElementUtil.setIgnoreParentInert( modalComponentStack.peek().getElement(), false); } final boolean needsListener = !modalComponentStack.remove(child); modalComponentStack.push(child); if (needsListener) { /* * Handle removal automatically on element level always due to * possible component.getElement().removeFromParent() usage. */ AtomicReference<Registration> registrationCombination = new AtomicReference<>(); final Registration componentRemoval = () -> setChildModeless(child); final Registration listenerRegistration = child.getElement() .addDetachListener( event -> registrationCombination.get().remove()); registrationCombination.set(Registration.combine(componentRemoval, listenerRegistration)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setChildModal File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
setChildModal
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
public String getStringValue(EntityReference classReference, String fieldName) { return getStringValue(resolveClassReference(classReference), fieldName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStringValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getStringValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void captureAudio(final ActionListener response) { if(!checkForPermission(Manifest.permission.RECORD_AUDIO, "This is required to record the audio")){ return; } try { final Form current = Display.getInstance().getCurrent(); final File temp = File.createTempFile("mtmp", ".3gpp"); temp.deleteOnExit(); if (recorder != null) { recorder.release(); } recorder = new MediaRecorder(); recorder.setAudioSource(MediaRecorder.AudioSource.MIC); recorder.setOutputFormat(MediaRecorder.OutputFormat.THREE_GPP); recorder.setAudioEncoder(MediaRecorder.AudioEncoder.AMR_WB); recorder.setOutputFile(temp.getAbsolutePath()); final Form recording = new Form("Recording"); recording.setTransitionInAnimator(CommonTransitions.createEmpty()); recording.setTransitionOutAnimator(CommonTransitions.createEmpty()); recording.setLayout(new BorderLayout()); recorder.prepare(); recorder.start(); final Label time = new Label("00:00"); time.getAllStyles().setAlignment(Component.CENTER); Font f = Font.createSystemFont(Font.FACE_SYSTEM, Font.STYLE_PLAIN, Font.SIZE_LARGE); f = f.derive(getDisplayHeight() / 10, Font.STYLE_PLAIN); time.getAllStyles().setFont(f); recording.addComponent(BorderLayout.CENTER, time); recording.registerAnimated(new Animation() { long current = System.currentTimeMillis(); long zero = current; int sec = 0; public boolean animate() { long now = System.currentTimeMillis(); if (now - current > 1000) { current = now; sec++; return true; } return false; } public void paint(Graphics g) { int seconds = sec % 60; int minutes = sec / 60; String secStr = seconds < 10 ? "0" + seconds : "" + seconds; String minStr = minutes < 10 ? "0" + minutes : "" + minutes; String txt = minStr + ":" + secStr; time.setText(txt); } }); Container south = new Container(new com.codename1.ui.layouts.GridLayout(1, 2)); Command cancel = new Command("Cancel") { @Override public void actionPerformed(ActionEvent evt) { if (recorder != null) { recorder.stop(); recorder.release(); recorder = null; } current.showBack(); response.actionPerformed(null); } }; recording.setBackCommand(cancel); south.add(new com.codename1.ui.Button(cancel)); south.add(new com.codename1.ui.Button(new Command("Save") { @Override public void actionPerformed(ActionEvent evt) { if (recorder != null) { recorder.stop(); recorder.release(); recorder = null; } current.showBack(); response.actionPerformed(new ActionEvent(temp.getAbsolutePath())); } })); recording.addComponent(BorderLayout.SOUTH, south); recording.show(); } catch (IOException ex) { ex.printStackTrace(); throw new RuntimeException("failed to start audio recording"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: captureAudio File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
captureAudio
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public <T> T getScriptableObject() { if (scriptObject_ == null) { final SgmlPage page = getPage(); if (this == page) { final StringBuilder msg = new StringBuilder("No script object associated with the Page."); // because this is a strange case we like to provide as much info as possible msg.append(" class: '") .append(page.getClass().getName()) .append('\''); try { msg.append(" url: '") .append(page.getUrl()).append("' content: ") .append(page.getWebResponse().getContentAsString()); } catch (final Exception e) { // ok bad luck with detail msg.append(" no details: '").append(e).append('\''); } throw new IllegalStateException(msg.toString()); } final Object o = page.getScriptableObject(); if (o instanceof HtmlUnitScriptable) { scriptObject_ = ((HtmlUnitScriptable) o).makeScriptableFor(this); } } return (T) scriptObject_; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getScriptableObject File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getScriptableObject
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private static int findJavaHome(JavaConfig javaConfig, JavaFinder javaFinder, JavaFilter javaFilter, boolean save) throws IOException { File javaHomeDir; LaunchProperties launchProperties = javaConfig.getLaunchProperties(); // PRIORITY 1: JAVA_HOME_OVERRIDE property // If a valid java home override is specified in the launch properties, use that. // Someone presumably wants to force that specific version. javaHomeDir = launchProperties.getJavaHomeOverride(); if (javaConfig.isSupportedJavaHomeDir(javaHomeDir, javaFilter)) { if (save) { javaConfig.saveJavaHome(javaHomeDir); } System.out.println(javaHomeDir); return EXIT_SUCCESS; } // PRIORITY 2: Java on PATH // This program (LaunchSupport) was started with the Java on the PATH. Try to use this one // next because it is most likely the one that is being upgraded on the user's system. javaHomeDir = javaFinder.findSupportedJavaHomeFromCurrentJavaHome(javaConfig, javaFilter); if (javaHomeDir != null) { if (save) { javaConfig.saveJavaHome(javaHomeDir); } System.out.println(javaHomeDir); return EXIT_SUCCESS; } // PRIORITY 3: Last used Java // Check to see if a prior launch resulted in that Java being saved. If so, try to use that. javaHomeDir = javaConfig.getSavedJavaHome(); if (javaConfig.isSupportedJavaHomeDir(javaHomeDir, javaFilter)) { System.out.println(javaHomeDir); return EXIT_SUCCESS; } // PRIORITY 4: Find all supported Java installations, and use the newest. List<File> javaHomeDirs = javaFinder.findSupportedJavaHomeFromInstallations(javaConfig, javaFilter); if (!javaHomeDirs.isEmpty()) { javaHomeDir = javaHomeDirs.iterator().next(); if (save) { javaConfig.saveJavaHome(javaHomeDir); } System.out.println(javaHomeDir); return EXIT_SUCCESS; } return EXIT_FAILURE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findJavaHome File: GhidraBuild/LaunchSupport/src/main/java/LaunchSupport.java Repository: NationalSecurityAgency/ghidra The code follows secure coding practices.
[ "CWE-77" ]
CVE-2023-22671
CRITICAL
9.8
NationalSecurityAgency/ghidra
findJavaHome
GhidraBuild/LaunchSupport/src/main/java/LaunchSupport.java
1640b544c3d99b5ce8a89d9ca4b540da22be3a0e
0
Analyze the following code function for security vulnerabilities
public void writeRecords(final Object iRecords) throws IOException { writeRecords(iRecords, null, null, null, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeRecords File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
writeRecords
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
public long[] getProcessPss(int[] pids) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeIntArray(pids); mRemote.transact(GET_PROCESS_PSS_TRANSACTION, data, reply, 0); reply.readException(); long[] res = reply.createLongArray(); data.recycle(); reply.recycle(); return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessPss File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getProcessPss
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public void setOrganizationId(@NonNull String enterpriseId) { throwIfParentInstance("setOrganizationId"); setOrganizationIdForUser(mContext.getPackageName(), enterpriseId, myUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOrganizationId File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setOrganizationId
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void shutdown() { if (connection != null) { try { connection.close(); } catch (SQLException e) { logger.warn("Non-Managed connection could not be closed. Whoops!", e); } } }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2023-41887 - Severity: CRITICAL - CVSS Score: 9.8 Description: Properly escape JDBC URL components in database extension Function: shutdown File: extensions/database/src/com/google/refine/extension/database/mariadb/MariaDBConnectionManager.java Repository: OpenRefine Fixed Code: public void shutdown() { if (connection != null) { try { connection.close(); } catch (SQLException e) { logger.warn("Non-Managed connection could not be closed. Whoops!", e); } } }
[ "CWE-89" ]
CVE-2023-41887
CRITICAL
9.8
OpenRefine
shutdown
extensions/database/src/com/google/refine/extension/database/mariadb/MariaDBConnectionManager.java
693fde606d4b5b78b16391c29d110389eb605511
1
Analyze the following code function for security vulnerabilities
static byte[] hashSignature(Signature sig) { try { MessageDigest digest = MessageDigest.getInstance("SHA-256"); digest.update(sig.toByteArray()); return digest.digest(); } catch (NoSuchAlgorithmException e) { Slog.w(TAG, "No SHA-256 algorithm found!"); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashSignature File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
hashSignature
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
public static void close(ServerSocket serverSocket) { if (serverSocket == null) { return; } try { serverSocket.close(); } catch (IOException e) { Logger.getLogger(IOUtil.class).finest("closeResource failed", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
close
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKeyPrefix(String apiKeyPrefix) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKeyPrefix(apiKeyPrefix); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKeyPrefix File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKeyPrefix
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public static void printNode(OutputStream out, Node node, boolean prettyPrint, boolean includeXmlDeclaration) { try { Transformer serializer = tFactory.newTransformer(); if (prettyPrint) { //Setup indenting to "pretty print" serializer.setOutputProperty(OutputKeys.INDENT, "yes"); serializer.setOutputProperty("{http://xml.apache.org/xslt}indent-amount", "2"); } if ( ! includeXmlDeclaration) { serializer.setOutputProperty(OutputKeys.OMIT_XML_DECLARATION, "yes"); } DOMSource xmlSource = new DOMSource(node); StreamResult outputTarget = new StreamResult(out); serializer.transform(xmlSource, outputTarget); } catch (TransformerException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: printNode File: src/edu/stanford/nlp/time/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
printNode
src/edu/stanford/nlp/time/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
@Override public StaticHandler setDirectoryListing(boolean directoryListing) { this.directoryListing = directoryListing; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDirectoryListing File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java Repository: vert-x3/vertx-web The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-12542
HIGH
7.5
vert-x3/vertx-web
setDirectoryListing
vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b
0
Analyze the following code function for security vulnerabilities
public ModalDialog addContent(final AjaxRequestTarget target) { target.add(gridContentContainer); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addContent File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
addContent
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
@Override public boolean isRestricted() { synchronized (mPackagesLock) { return getUserInfoLocked(UserHandle.getCallingUserId()).isRestricted(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRestricted File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
isRestricted
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
public String elementAsString() throws TransformerException { Properties outputProperties = new Properties(); outputProperties.put(javax.xml.transform.OutputKeys.OMIT_XML_DECLARATION, "yes"); return elementAsString(outputProperties); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elementAsString File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
elementAsString
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
private JsonObject readObject(int depth) throws IOException { read(); JsonObject object=new JsonObject(); skipWhiteSpace(); if (readIf('}')) { return object; } do { skipWhiteSpace(); String name=readName(); skipWhiteSpace(); if (!readIf(':')) { throw expected("':'"); } skipWhiteSpace(); object.add(name, readValue(depth)); skipWhiteSpace(); } while (readIf(',')); if (!readIf('}')) { throw expected("',' or '}'"); } return object; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readObject File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readObject
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
public void setFeature(final String featureId, final boolean state) { if (featureId.equals(AUGMENTATIONS)) { fAugmentations = state; } else if (featureId.equals(IGNORE_SPECIFIED_CHARSET)) { fIgnoreSpecifiedCharset = state; } else if (featureId.equals(NOTIFY_CHAR_REFS)) { fNotifyCharRefs = state; } else if (featureId.equals(NOTIFY_XML_BUILTIN_REFS)) { fNotifyXmlBuiltinRefs = state; } else if (featureId.equals(NOTIFY_HTML_BUILTIN_REFS)) { fNotifyHtmlBuiltinRefs = state; } else if (featureId.equals(FIX_MSWINDOWS_REFS)) { fFixWindowsCharRefs = state; } else if (featureId.equals(SCRIPT_STRIP_CDATA_DELIMS)) { fScriptStripCDATADelims = state; } else if (featureId.equals(SCRIPT_STRIP_COMMENT_DELIMS)) { fScriptStripCommentDelims = state; } else if (featureId.equals(STYLE_STRIP_CDATA_DELIMS)) { fStyleStripCDATADelims = state; } else if (featureId.equals(STYLE_STRIP_COMMENT_DELIMS)) { fStyleStripCommentDelims = state; } else if (featureId.equals(PARSE_NOSCRIPT_CONTENT)) { fParseNoScriptContent = state; } else if (featureId.equals(ALLOW_SELFCLOSING_IFRAME)) { fAllowSelfclosingIframe = state; } else if (featureId.equals(ALLOW_SELFCLOSING_TAGS)) { fAllowSelfclosingTags = state; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFeature File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
setFeature
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
protected void collectProfileClaims(final OidcProfileDefinition profileDefinition, final OidcProfile profile, final Map<String, Object> claims) { claims.forEach((name, value) -> { if (configuration.getMappedClaims().containsKey(name)) { var actualName = configuration.getMappedClaims().get(name); logger.debug("Mapping claim {} as {} with values {} to profile", name, actualName, value); profileDefinition.convertAndAdd(profile, PROFILE_ATTRIBUTE, actualName, value); } else { logger.debug("Adding claim {} to profile with values {}", name, value); profileDefinition.convertAndAdd(profile, PROFILE_ATTRIBUTE, name, value); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: collectProfileClaims File: pac4j-oidc/src/main/java/org/pac4j/oidc/credentials/authenticator/UserInfoOidcAuthenticator.java Repository: pac4j The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-44878
MEDIUM
5
pac4j
collectProfileClaims
pac4j-oidc/src/main/java/org/pac4j/oidc/credentials/authenticator/UserInfoOidcAuthenticator.java
22b82ffd702a132d9f09da60362fc6264fc281ae
0
Analyze the following code function for security vulnerabilities
@Override public boolean isUserOriginated() { return userOriginated; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUserOriginated File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
isUserOriginated
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public static File getLogDirectory() { String neo4jHome = apocConfig().getString("dbms.directories.neo4j_home", ""); String logDir = apocConfig().getString("dbms.directories.logs", ""); File logs = logDir.isEmpty() ? new File(neo4jHome, "logs") : new File(logDir); if (logs.exists() && logs.canRead() && logs.isDirectory()) { return logs; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogDirectory File: core/src/main/java/apoc/util/FileUtils.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23532
MEDIUM
6.5
neo4j-contrib/neo4j-apoc-procedures
getLogDirectory
core/src/main/java/apoc/util/FileUtils.java
01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522
0
Analyze the following code function for security vulnerabilities
private static void initRvisByGene(String geneName) throws Exception { String sql = "SELECT * " + "FROM rvis " + "WHERE gene_name='" + geneName + "'"; ResultSet rset = DBManager.executeQuery(sql); if (rset.next()) { float f = FormatManager.getFloat(rset.getObject("rvis_percent")); String value = FormatManager.getString(f); if (value.equals("-")) { Output.rvisPercentile = "NA"; } Output.rvisPercentile = value + "%"; } rset.close(); }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2016-15021 - Severity: MEDIUM - CVSS Score: 5.2 Description: fixed sql injection vulnerability Function: initRvisByGene File: src/main/java/model/Input.java Repository: nickzren/alsdb Fixed Code: private static void initRvisByGene(String geneName) throws Exception { String sql = "SELECT * FROM rvis WHERE gene_name=?"; PreparedStatement stmt = DBManager.prepareStatement(sql); stmt.setString(1, geneName); ResultSet rset = stmt.executeQuery(); if (rset.next()) { float f = FormatManager.getFloat(rset.getObject("rvis_percent")); String value = FormatManager.getString(f); if (value.equals("-")) { Output.rvisPercentile = "NA"; } Output.rvisPercentile = value + "%"; } rset.close(); }
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
initRvisByGene
src/main/java/model/Input.java
cbc79a68145e845f951113d184b4de207c341599
1
Analyze the following code function for security vulnerabilities
private HibernateConfiguration getHibernateConfiguration() { if (this.hibernateConfiguration == null) { this.hibernateConfiguration = Utils.getComponent(HibernateConfiguration.class); } return this.hibernateConfiguration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHibernateConfiguration File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getHibernateConfiguration
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; MethodSignature that = (MethodSignature) o; return Objects.equals(name, that.name) && Arrays.equals(paramTypes, that.paramTypes); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: server/src/main/java/com/thoughtworks/go/remote/AgentRemoteInvokerServiceExporter.java Repository: gocd The code follows secure coding practices.
[ "CWE-284" ]
CVE-2022-39310
MEDIUM
6.5
gocd
equals
server/src/main/java/com/thoughtworks/go/remote/AgentRemoteInvokerServiceExporter.java
a644a7e5ed75d7b9e46f164fb83445f778077cf9
0
Analyze the following code function for security vulnerabilities
public javax.xml.rpc.Service loadService(Class serviceInterface) throws ServiceException { if (serviceInterface == null) { throw new IllegalArgumentException( Messages.getMessage("serviceFactoryIllegalServiceInterface")); } if (!(javax.xml.rpc.Service.class).isAssignableFrom(serviceInterface)) { throw new ServiceException( Messages.getMessage("serviceFactoryServiceInterfaceRequirement", serviceInterface.getName())); } else { String serviceImplementationName = serviceInterface.getName() + SERVICE_IMPLEMENTATION_SUFFIX; Service service = createService(serviceImplementationName); return service; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadService File: axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java Repository: apache/axis-axis1-java The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-51441
HIGH
7.2
apache/axis-axis1-java
loadService
axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java
685c309febc64aa393b2d64a05f90e7eb9f73e06
0
Analyze the following code function for security vulnerabilities
private boolean isForwardingCompleted() { if (mForwardingChangeResults == null) { return true; } for (Integer reason : mExpectedChangeResultReasons) { if (mForwardingChangeResults.get(reason) == null) { return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isForwardingCompleted File: src/com/android/phone/settings/VoicemailSettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
isForwardingCompleted
src/com/android/phone/settings/VoicemailSettingsActivity.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
public void updateScanDetailCacheFromWifiInfo(WifiInfo info) { WifiConfiguration config = getInternalConfiguredNetwork(info.getNetworkId()); ScanDetailCache scanDetailCache = getScanDetailCacheForNetwork(info.getNetworkId()); if (config != null && scanDetailCache != null) { ScanDetail scanDetail = scanDetailCache.getScanDetail(info.getBSSID()); if (scanDetail != null) { ScanResult result = scanDetail.getScanResult(); long previousSeen = result.seen; int previousRssi = result.level; // Update the scan result scanDetail.setSeen(); result.level = info.getRssi(); // Average the RSSI value long maxAge = SCAN_RESULT_MAXIMUM_AGE_MS; long age = result.seen - previousSeen; if (previousSeen > 0 && age > 0 && age < maxAge / 2) { // Average the RSSI with previously seen instances of this scan result double alpha = 0.5 - (double) age / (double) maxAge; result.level = (int) ((double) result.level * (1 - alpha) + (double) previousRssi * alpha); } if (mVerboseLoggingEnabled) { Log.v(TAG, "Updating scan detail cache freq=" + result.frequency + " BSSID=" + result.BSSID + " RSSI=" + result.level + " for " + config.getProfileKey()); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateScanDetailCacheFromWifiInfo File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
updateScanDetailCacheFromWifiInfo
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public final boolean isAllowSpecialCharsInStrings () { return m_bAllowSpecialCharsInStrings; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowSpecialCharsInStrings File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java Repository: phax/ph-commons The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34612
HIGH
7.5
phax/ph-commons
isAllowSpecialCharsInStrings
ph-json/src/main/java/com/helger/json/parser/JsonParser.java
02a4d034dcfb2b6e1796b25f519bf57a6796edce
0
Analyze the following code function for security vulnerabilities
public boolean sendMediaButton(String packageName, int pid, int uid, boolean asSystemService, KeyEvent keyEvent, int sequenceId, ResultReceiver cb) { try { if (KeyEvent.isMediaSessionKey(keyEvent.getKeyCode())) { final String reason = "action=" + KeyEvent.actionToString(keyEvent.getAction()) + ";code=" + KeyEvent.keyCodeToString(keyEvent.getKeyCode()); mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(), pid, uid, packageName, reason); } if (asSystemService) { mCb.onMediaButton(mContext.getPackageName(), Process.myPid(), Process.SYSTEM_UID, createMediaButtonIntent(keyEvent), sequenceId, cb); } else { mCb.onMediaButton(packageName, pid, uid, createMediaButtonIntent(keyEvent), sequenceId, cb); } return true; } catch (RemoteException e) { Log.e(TAG, "Remote failure in sendMediaRequest.", e); } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendMediaButton File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
sendMediaButton
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
@Override public int[] getSoftkeyCode(int index) { if (index == 0) { return leftSK; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSoftkeyCode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getSoftkeyCode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
void startAnimation(Animation anim) { // If we are an inset provider, all our animations are driven by the inset client. if (mControllableInsetProvider != null) { return; } final DisplayInfo displayInfo = getDisplayInfo(); anim.initialize(mWindowFrames.mFrame.width(), mWindowFrames.mFrame.height(), displayInfo.appWidth, displayInfo.appHeight); anim.restrictDuration(MAX_ANIMATION_DURATION); anim.scaleCurrentDuration(mWmService.getWindowAnimationScaleLocked()); final AnimationAdapter adapter = new LocalAnimationAdapter( new WindowAnimationSpec(anim, mSurfacePosition, false /* canSkipFirstFrame */, 0 /* windowCornerRadius */), mWmService.mSurfaceAnimationRunner); startAnimation(getPendingTransaction(), adapter); commitPendingTransaction(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startAnimation File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
startAnimation
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDeviceOrProfileOwnerInCallingUser(String packageName) { return isDeviceOwnerInCallingUser(packageName) || isProfileOwnerInCallingUser(packageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDeviceOrProfileOwnerInCallingUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isDeviceOrProfileOwnerInCallingUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public boolean bindSdkSandboxService(Intent service, ServiceConnection conn, int clientAppUid, String clientAppPackage, String processName, int flags) throws RemoteException { if (service == null) { throw new IllegalArgumentException("intent is null"); } if (conn == null) { throw new IllegalArgumentException("connection is null"); } if (clientAppPackage == null) { throw new IllegalArgumentException("clientAppPackage is null"); } if (processName == null) { throw new IllegalArgumentException("processName is null"); } if (service.getComponent() == null) { throw new IllegalArgumentException("service must specify explicit component"); } if (!UserHandle.isApp(clientAppUid)) { throw new IllegalArgumentException("uid is not within application range"); } if (mAppOpsService.checkPackage(clientAppUid, clientAppPackage) != MODE_ALLOWED) { throw new IllegalArgumentException("uid does not belong to provided package"); } Handler handler = mContext.getMainThreadHandler(); final IServiceConnection sd = mContext.getServiceDispatcher(conn, handler, flags); service.prepareToLeaveProcess(mContext); return ActivityManagerService.this.bindServiceInstance( mContext.getIApplicationThread(), mContext.getActivityToken(), service, service.resolveTypeIfNeeded(mContext.getContentResolver()), sd, flags, processName, /*isSdkSandboxService*/ true, clientAppUid, clientAppPackage, mContext.getOpPackageName(), UserHandle.getUserId(clientAppUid)) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindSdkSandboxService File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
bindSdkSandboxService
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public boolean setMeteredOverride(@NonNull String fqdn, @MeteredOverride int meteredOverride) { ArrayList<PasspointProvider> passpointProviders = new ArrayList<>(mProviders.values()); boolean found = false; // Loop through all profiles with matching FQDN for (PasspointProvider provider : passpointProviders) { if (TextUtils.equals(provider.getConfig().getHomeSp().getFqdn(), fqdn)) { if (provider.setMeteredOverride(meteredOverride)) { mWifiMetrics.logUserActionEvent( WifiMetrics.convertMeteredOverrideEnumToUserActionEventType( meteredOverride), provider.isFromSuggestion(), true); } found = true; } } if (found) { mWifiConfigManager.saveToStore(true); } return found; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMeteredOverride File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
setMeteredOverride
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object o) { if (this == o) { return true; } if (o == null || getClass() != o.getClass()) { return false; } if (!super.equals(o)) { return false; } ScmMaterial that = (ScmMaterial) o; return folder != null ? folder.equals(that.folder) : that.folder == null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
equals
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
private int getMaxMultiPressPowerCount() { if (mTriplePressOnPowerBehavior != MULTI_PRESS_POWER_NOTHING) { return 3; } if (mDoublePressOnPowerBehavior != MULTI_PRESS_POWER_NOTHING) { return 2; } return 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxMultiPressPowerCount File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
getMaxMultiPressPowerCount
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public static String writeToString(SsurgeonPattern pattern) { try { List<SsurgeonPattern> patterns = new LinkedList<>(); patterns.add(pattern); Document domDoc = createPatternXMLDoc(patterns); if (domDoc != null) { Transformer tformer = TransformerFactory.newInstance().newTransformer(); tformer.setOutputProperty(OutputKeys.INDENT, "yes"); StringWriter sw = new StringWriter(); tformer.transform(new DOMSource(domDoc), new StreamResult(sw)); return sw.toString(); } else { log.warning("Was not able to create XML document for pattern list."); } } catch (Exception e) { log.info("Error in writeToString, could not process pattern="+pattern); log.info(e); return null; } return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeToString File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3878
HIGH
7.5
stanfordnlp/CoreNLP
writeToString
src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
e5bbe135a02a74b952396751ed3015e8b8252e99
0
Analyze the following code function for security vulnerabilities
@Override public SyncNotedAppOp startOperation(IBinder token, int code, int uid, @Nullable String packageName, @Nullable String attributionTag, boolean startIfModeDefault, boolean shouldCollectAsyncNotedOp, @Nullable String message, boolean shouldCollectMessage, @AttributionFlags int attributionFlags, int attributionChainId, @NonNull UndecFunction<IBinder, Integer, Integer, String, String, Boolean, Boolean, String, Boolean, Integer, Integer, SyncNotedAppOp> superImpl) { if (uid == mTargetUid && isTargetOp(code)) { final int shellUid = UserHandle.getUid(UserHandle.getUserId(uid), Process.SHELL_UID); final long identity = Binder.clearCallingIdentity(); try { return superImpl.apply(token, code, shellUid, "com.android.shell", attributionTag, startIfModeDefault, shouldCollectAsyncNotedOp, message, shouldCollectMessage, attributionFlags, attributionChainId); } finally { Binder.restoreCallingIdentity(identity); } } return superImpl.apply(token, code, uid, packageName, attributionTag, startIfModeDefault, shouldCollectAsyncNotedOp, message, shouldCollectMessage, attributionFlags, attributionChainId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startOperation File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startOperation
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public void event(UserRequest ureq, Controller source, Event event) { if(source == emailCalloutCtrl) { if (event instanceof SingleIdentityChosenEvent) { addIdentity((SingleIdentityChosenEvent)event); } calloutCtrl.deactivate(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: event File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
event
src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
@android.support.annotation.RequiresApi(Build.VERSION_CODES.O) static void createChannelStatic(Context ctx) { NotificationManager mNotificationManager = (NotificationManager) ctx .getSystemService(Context.NOTIFICATION_SERVICE); // The id of the channel. String id = CHANNEL_ID; // The user-visible name of the channel. CharSequence name = "Media playback"; // The user-visible description of the channel. String description = "Media playback controls"; int importance = NotificationManager.IMPORTANCE_LOW; NotificationChannel mChannel = new NotificationChannel(id, name, importance); // Configure the notification channel. mChannel.setDescription(description); mChannel.setShowBadge(false); mChannel.setLockscreenVisibility(Notification.VISIBILITY_PUBLIC); mNotificationManager.createNotificationChannel(mChannel); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createChannelStatic File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createChannelStatic
Ports/Android/src/com/codename1/media/BackgroundAudioService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public List<External> perform() throws IOException, InterruptedException { return delegateTo(task); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: perform File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
perform
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public String getTempFolderPath() { return tempFolderPath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTempFolderPath File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getTempFolderPath
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0