instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static void stopEditing() { stopEditing(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopEditing File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
stopEditing
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public String getName() { return this.getClass().getName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/SolrIndexEventListener.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-312", "CWE-200" ]
CVE-2023-50719
HIGH
7.5
xwiki/xwiki-platform
getName
xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/SolrIndexEventListener.java
3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea
0
Analyze the following code function for security vulnerabilities
private String getEntryName(LocalDocumentReference reference) { String entryName = null; XarEntry entry = this.entries.get(reference); if (entry != null) { entryName = entry.getEntryName(); } return entryName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEntryName File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getEntryName
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public void setCreateUserId(Long createUserId) { this.createUserId = createUserId; }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-7171 - Severity: LOW - CVSS Score: 3.3 Description: fix(novel-admin): 友情链接URL格式校验 Function: setCreateUserId File: novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java Repository: 201206030/novel-plus Fixed Code: public void setCreateUserId(Long createUserId) { this.createUserId = createUserId; }
[ "CWE-79" ]
CVE-2023-7171
LOW
3.3
201206030/novel-plus
setCreateUserId
novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java
d6093d8182362422370d7eaf6c53afde9ee45215
1
Analyze the following code function for security vulnerabilities
private boolean isPermissionCheckFlagEnabled() { return DeviceConfig.getBoolean( NAMESPACE_DEVICE_POLICY_MANAGER, PERMISSION_BASED_ACCESS_EXPERIMENT_FLAG, DEFAULT_VALUE_PERMISSION_BASED_ACCESS_FLAG); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPermissionCheckFlagEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isPermissionCheckFlagEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void addBccAddresses(Collection<String> addresses) { addAddressesToList(addresses, mBcc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addBccAddresses File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
addBccAddresses
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
protected static void handleNotInService(int ss, PendingIntent sentIntent) { if (sentIntent != null) { try { if (ss == ServiceState.STATE_POWER_OFF) { sentIntent.send(RESULT_ERROR_RADIO_OFF); } else { sentIntent.send(RESULT_ERROR_NO_SERVICE); } } catch (CanceledException ex) {} } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleNotInService File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
handleNotInService
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
private void updateUrlDirection() { Layout layout = getLayout(); if (layout == null) return; int urlDirection; if (length() == 0) { urlDirection = LAYOUT_DIRECTION_LOCALE; } else if (layout.getParagraphDirection(0) == Layout.DIR_LEFT_TO_RIGHT) { urlDirection = LAYOUT_DIRECTION_LTR; } else { urlDirection = LAYOUT_DIRECTION_RTL; } if (urlDirection != mUrlDirection) { mUrlDirection = urlDirection; if (mUrlDirectionListener != null) { mUrlDirectionListener.onUrlDirectionChanged(urlDirection); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUrlDirection File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
updateUrlDirection
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
void getKeepClearAreas(Collection<Rect> outRestricted, Collection<Rect> outUnrestricted) { final Matrix tmpMatrix = new Matrix(); final float[] tmpFloat9 = new float[9]; getKeepClearAreas(outRestricted, outUnrestricted, tmpMatrix, tmpFloat9); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeepClearAreas File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getKeepClearAreas
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private static boolean arraysEqual(final byte[] a, final int aOff, final byte[] b, final int bOff, final int length) { if (length + aOff > a.length || length + bOff > b.length) { return false; } for (int i = 0; i < length; i++) { if (a[i + aOff] != b[i + bOff]) { return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: arraysEqual File: src/main/java/org/cryptacular/CiphertextHeaderV2.java Repository: vt-middleware/cryptacular The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-7226
MEDIUM
5
vt-middleware/cryptacular
arraysEqual
src/main/java/org/cryptacular/CiphertextHeaderV2.java
00395c232cdc62d4292ce27999c026fc1f076b1d
0
Analyze the following code function for security vulnerabilities
public long inputDispatchingTimedOut(int pid, boolean aboveSystem, String reason) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inputDispatchingTimedOut File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
inputDispatchingTimedOut
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
boolean supportsMultiWindow() { return supportsMultiWindowInDisplayArea(getDisplayArea()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsMultiWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
supportsMultiWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public static ShortcutPackage loadFromFile(ShortcutService s, ShortcutUser shortcutUser, File path, boolean fromBackup) { final AtomicFile file = new AtomicFile(path); final FileInputStream in; try { in = file.openRead(); } catch (FileNotFoundException e) { if (ShortcutService.DEBUG) { Slog.d(TAG, "Not found " + path); } return null; } try { ShortcutPackage ret = null; TypedXmlPullParser parser = Xml.resolvePullParser(in); int type; while ((type = parser.next()) != XmlPullParser.END_DOCUMENT) { if (type != XmlPullParser.START_TAG) { continue; } final int depth = parser.getDepth(); final String tag = parser.getName(); if (ShortcutService.DEBUG_LOAD || ShortcutService.DEBUG_REBOOT) { Slog.d(TAG, String.format("depth=%d type=%d name=%s", depth, type, tag)); } if ((depth == 1) && TAG_ROOT.equals(tag)) { ret = loadFromXml(s, shortcutUser, parser, fromBackup); continue; } ShortcutService.throwForInvalidTag(depth, tag); } return ret; } catch (IOException | XmlPullParserException e) { Slog.e(TAG, "Failed to read file " + file.getBaseFile(), e); return null; } finally { IoUtils.closeQuietly(in); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadFromFile File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
loadFromFile
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
private static ObjectStreamClass createClassDesc(Class<?> cl) { ObjectStreamClass result = new ObjectStreamClass(); boolean isArray = cl.isArray(); boolean serializable = isSerializable(cl); boolean externalizable = isExternalizable(cl); result.isSerializable = serializable; result.isExternalizable = externalizable; // Now we fill in the values result.setName(cl.getName()); result.setClass(cl); Class<?> superclass = cl.getSuperclass(); if (superclass != null) { result.setSuperclass(lookup(superclass)); } Field[] declaredFields = null; // Compute the SUID if (serializable || externalizable) { if (result.isEnum() || result.isProxy()) { result.setSerialVersionUID(0L); } else { declaredFields = cl.getDeclaredFields(); result.setSerialVersionUID(computeSerialVersionUID(cl, declaredFields)); } } // Serializables need field descriptors if (serializable && !isArray) { if (declaredFields == null) { declaredFields = cl.getDeclaredFields(); } result.buildFieldDescriptors(declaredFields); } else { // Externalizables or arrays do not need FieldDesc info result.setFields(NO_FIELDS); } // Copy all fields to loadFields - they should be read by default in // ObjectInputStream.defaultReadObject() method ObjectStreamField[] fields = result.getFields(); if (fields != null) { ObjectStreamField[] loadFields = new ObjectStreamField[fields.length]; for (int i = 0; i < fields.length; ++i) { loadFields[i] = new ObjectStreamField(fields[i].getName(), fields[i].getType(), fields[i].isUnshared()); // resolve type string to init typeString field in // ObjectStreamField loadFields[i].getTypeString(); } result.setLoadFields(loadFields); } byte flags = 0; if (externalizable) { flags |= ObjectStreamConstants.SC_EXTERNALIZABLE; flags |= ObjectStreamConstants.SC_BLOCK_DATA; // use protocol version 2 by default } else if (serializable) { flags |= ObjectStreamConstants.SC_SERIALIZABLE; } result.methodWriteReplace = findMethod(cl, "writeReplace"); result.methodReadResolve = findMethod(cl, "readResolve"); result.methodWriteObject = findPrivateMethod(cl, "writeObject", WRITE_PARAM_TYPES); result.methodReadObject = findPrivateMethod(cl, "readObject", READ_PARAM_TYPES); result.methodReadObjectNoData = findPrivateMethod(cl, "readObjectNoData", EmptyArray.CLASS); if (result.hasMethodWriteObject()) { flags |= ObjectStreamConstants.SC_WRITE_METHOD; } result.setFlags(flags); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createClassDesc File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
createClassDesc
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
final void setBroadcastTimeoutLocked(long timeoutTime) { if (! mPendingBroadcastTimeoutMessage) { Message msg = mHandler.obtainMessage(BROADCAST_TIMEOUT_MSG, this); mHandler.sendMessageAtTime(msg, timeoutTime); mPendingBroadcastTimeoutMessage = true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBroadcastTimeoutLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
setBroadcastTimeoutLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public ChunkFilterBlock initFilterBlock() { return new CharFilterBlock(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initFilterBlock File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
initFilterBlock
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public String getInlineCSS() { try { Sysprop custom = getCustomTheme(); String themeName = custom.getName(); String inline = CONF.inlineCSS(); String loadedTheme; if ("default".equalsIgnoreCase(themeName) || StringUtils.isBlank(themeName)) { return inline; } else if ("custom".equalsIgnoreCase(themeName)) { loadedTheme = (String) custom.getProperty("theme"); } else { loadedTheme = loadResource(getThemeKey(themeName)); if (StringUtils.isBlank(loadedTheme)) { FILE_CACHE.put("theme", "default"); custom.setName("default"); customTheme = pc.update(custom); return inline; } else { FILE_CACHE.put("theme", themeName); } } loadedTheme = StringUtils.replaceEachRepeatedly(loadedTheme, new String[] {"<", "</", "<script", "<SCRIPT"}, new String[] {"", "", "", ""}); return loadedTheme + "\n/*** END OF THEME CSS ***/\n" + inline; } catch (Exception e) { logger.debug("Failed to load inline CSS."); } return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInlineCSS File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getInlineCSS
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public void enableTdls(String remoteMacAddress, boolean enable) { mWifiNative.startTdls(mInterfaceName, remoteMacAddress, enable); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableTdls File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
enableTdls
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public AppWidgetProviderInfo getAppWidgetInfo(String callingPackage, int appWidgetId) { final int userId = UserHandle.getCallingUserId(); if (DEBUG) { Slog.i(TAG, "getAppWidgetInfo() " + userId); } // Make sure the package runs under the caller uid. mSecurityPolicy.enforceCallFromPackage(callingPackage); synchronized (mLock) { ensureGroupStateLoadedLocked(userId); // NOTE: The lookup is enforcing security across users by making // sure the caller can only access widgets it hosts or provides. Widget widget = lookupWidgetLocked(appWidgetId, Binder.getCallingUid(), callingPackage); if (widget != null && widget.provider != null && !widget.provider.zombie) { return cloneIfLocalBinder(widget.provider.info); } return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAppWidgetInfo File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getAppWidgetInfo
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public boolean isInRightsEditMode() { return getDriver().getCurrentUrl().contains("editor=rights"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInRightsEditMode File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
isInRightsEditMode
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
InsetsState getCompatInsetsState() { InsetsState state = getInsetsState(); if (hasCompatScale()) { state = new InsetsState(state, true); state.scale(mInvGlobalScale); } return state; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCompatInsetsState File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getCompatInsetsState
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private boolean packageNeedsWidgetBackupLocked(String packageName, int userId) { int N = mWidgets.size(); for (int i = 0; i < N; i++) { Widget widget = mWidgets.get(i); // Skip cross-user widgets. if (!isProviderAndHostInUser(widget, userId)) { continue; } if (widget.host.isInPackageForUser(packageName, userId)) { // this package is hosting widgets, so it knows widget IDs. return true; } Provider provider = widget.provider; if (provider != null && provider.isInPackageForUser(packageName, userId)) { // someone is hosting this app's widgets, so it knows widget IDs. return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: packageNeedsWidgetBackupLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
packageNeedsWidgetBackupLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public Node adoptNode(Node source) throws DOMException { return doc.adoptNode(source); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: adoptNode File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
adoptNode
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public void setFocusedTask(int taskId) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "setFocusedTask()"); if (DEBUG_FOCUS) Slog.d(TAG_FOCUS, "setFocusedTask: taskId=" + taskId); final long callingId = Binder.clearCallingIdentity(); try { synchronized (this) { final TaskRecord task = mStackSupervisor.anyTaskForIdLocked(taskId); if (task == null) { return; } final ActivityRecord r = task.topRunningActivityLocked(); if (setFocusedActivityLocked(r, "setFocusedTask")) { mStackSupervisor.resumeFocusedStackTopActivityLocked(); } } } finally { Binder.restoreCallingIdentity(callingId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocusedTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
setFocusedTask
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public void validateConcreteScmMaterial(ValidationContext validationContext) { if (getView() == null || getView().trim().isEmpty()) { errors.add(VIEW, "P4 view cannot be empty."); } if (StringUtils.isBlank(getServerAndPort())) { errors.add(SERVER_AND_PORT, "P4 port cannot be empty."); } validateEncryptedPassword(); }
Vulnerability Classification: - CWE: CWE-77 - CVE: CVE-2021-43286 - Severity: MEDIUM - CVSS Score: 6.5 Description: #000 - Validate URLs provided - Disallow URLs which are obviously not URLs. Function: validateConcreteScmMaterial File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/perforce/P4MaterialConfig.java Repository: gocd Fixed Code: @Override public void validateConcreteScmMaterial(ValidationContext validationContext) { if (getView() == null || getView().trim().isEmpty()) { errors.add(VIEW, "P4 view cannot be empty."); } if (StringUtils.isBlank(getServerAndPort())) { errors.add(SERVER_AND_PORT, "P4 port cannot be empty."); } if (!new UrlArgument(getUrl()).isValidURLOrLocalPath()) { errors.add(SERVER_AND_PORT, "P4 port seems to be invalid."); } view.validate(validationContext); }
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
validateConcreteScmMaterial
config/config-api/src/main/java/com/thoughtworks/go/config/materials/perforce/P4MaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
1
Analyze the following code function for security vulnerabilities
public void cancelTimeout() { mHandler.removeMessages(MESSAGE_TIMED_OUT, this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelTimeout File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
cancelTimeout
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Override public List<String> searchDocumentsNames(String wheresql, XWikiContext context) throws XWikiException { return searchDocumentsNames(wheresql, 0, 0, "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocumentsNames File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
searchDocumentsNames
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private static void nativeMemoryXmlGenerator(XmlGenerator gen, Config config) { NativeMemoryConfig nativeMemoryConfig = config.getNativeMemoryConfig(); if (nativeMemoryConfig == null) { gen.node("native-memory", null, "enabled", "false"); return; } gen.open("native-memory", "enabled", nativeMemoryConfig.isEnabled(), "allocator-type", nativeMemoryConfig.getAllocatorType()) .node("capacity", null, "unit", nativeMemoryConfig.getCapacity().getUnit(), "value", nativeMemoryConfig.getCapacity().getValue()) .node("min-block-size", nativeMemoryConfig.getMinBlockSize()) .node("page-size", nativeMemoryConfig.getPageSize()) .node("metadata-space-percentage", nativeMemoryConfig.getMetadataSpacePercentage()); PersistentMemoryConfig pmemConfig = nativeMemoryConfig.getPersistentMemoryConfig(); List<PersistentMemoryDirectoryConfig> directoryConfigs = pmemConfig.getDirectoryConfigs(); gen.open("persistent-memory", "enabled", pmemConfig.isEnabled(), "mode", pmemConfig.getMode().name() ); if (!directoryConfigs.isEmpty()) { gen.open("directories"); for (PersistentMemoryDirectoryConfig dirConfig : directoryConfigs) { if (dirConfig.isNumaNodeSet()) { gen.node("directory", dirConfig.getDirectory(), "numa-node", dirConfig.getNumaNode()); } else { gen.node("directory", dirConfig.getDirectory()); } } gen.close(); } gen.close().close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeMemoryXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
nativeMemoryXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
public boolean isDirectory(String file) { file = removeFilePrefix(file); return new File(file).isDirectory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDirectory File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isDirectory
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public List<DescriptorDigest> getDiffIds() throws DigestException { List<DescriptorDigest> processedDiffIds = new ArrayList<>(rootFs.layers.size()); for (String diffId : rootFs.layers) { processedDiffIds.add(DescriptorDigest.fromDigest(diffId.trim())); } return processedDiffIds; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDiffIds File: jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java Repository: GoogleContainerTools/jib The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-25914
CRITICAL
9.8
GoogleContainerTools/jib
getDiffIds
jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java
67fa40bc2c484da0546333914ea07a89fe44eaaf
0
Analyze the following code function for security vulnerabilities
public void updateBlob(String columnName, @Nullable Blob x) throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "updateBlob(String,Blob)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBlob File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBlob
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public Object getFingerprint( String md5sum ) throws IOException { Fingerprint r = fingerprintMap.get(md5sum); if(r==null) return new NoFingerprintMatch(md5sum); else return r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFingerprint File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getFingerprint
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public static boolean hasFieldCascadingField(Field field) { return field.getExtraAttrs().containsKey("_cascadingFieldParent") || field.getExtraAttrs().containsKey("_cascadingFieldChild"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasFieldCascadingField File: src/main/java/com/rebuild/core/support/general/ProtocolFilterParser.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
hasFieldCascadingField
src/main/java/com/rebuild/core/support/general/ProtocolFilterParser.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
protected final boolean isSpanned() { return mSpannedText; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSpanned File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
isSpanned
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
private static native void nativeDestroy(long ptr);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeDestroy File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeDestroy
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
Builder setLaunchedFromFeature(String fromFeature) { mLaunchedFromFeature = fromFeature; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLaunchedFromFeature File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setLaunchedFromFeature
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@RequestMapping public void redirect(HttpServletResponse response) throws IOException { response.sendRedirect("log/"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: redirect File: lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java Repository: lukashinsch/spring-boot-actuator-logview The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-21234
MEDIUM
4
lukashinsch/spring-boot-actuator-logview
redirect
lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java
760acbb939a8d1f7d1a7dfcd51ca848eea04e772
0
Analyze the following code function for security vulnerabilities
private static Map<ContentDigestAlgorithm, byte[]> getApkContentDigestsFromSigningSchemeResult( ApkSigningBlockUtils.Result apkSigningSchemeResult) { Map<ContentDigestAlgorithm, byte[]> apkContentDigests = new HashMap<>(); for (ApkSigningBlockUtils.Result.SignerInfo signerInfo : apkSigningSchemeResult.signers) { collectApkContentDigests(signerInfo.contentDigests, apkContentDigests); } return apkContentDigests; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApkContentDigestsFromSigningSchemeResult File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getApkContentDigestsFromSigningSchemeResult
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public Behavior createBehavior(String behaviorId) throws FacesException { notNull("behaviorId", behaviorId); Behavior behavior = createCDIBehavior(behaviorId); if (behavior != null) { return behavior; } behavior = newThing(behaviorId, behaviorMap); notNullNamedObject(behavior, behaviorId, "jsf.cannot_instantiate_behavior_error"); if (LOGGER.isLoggable(FINE)) { LOGGER.fine(MessageFormat.format("created behavior of type ''{0}''", behaviorId)); } associate.getAnnotationManager().applyBehaviorAnnotations(FacesContext.getCurrentInstance(), behavior); return behavior; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createBehavior File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
createBehavior
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
private void writeGrantedUriPermissions() { if (DEBUG_URI_PERMISSION) Slog.v(TAG, "writeGrantedUriPermissions()"); // Snapshot permissions so we can persist without lock ArrayList<UriPermission.Snapshot> persist = Lists.newArrayList(); synchronized (this) { final int size = mGrantedUriPermissions.size(); for (int i = 0; i < size; i++) { final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.valueAt(i); for (UriPermission perm : perms.values()) { if (perm.persistedModeFlags != 0) { persist.add(perm.snapshot()); } } } } FileOutputStream fos = null; try { fos = mGrantFile.startWrite(); XmlSerializer out = new FastXmlSerializer(); out.setOutput(fos, "utf-8"); out.startDocument(null, true); out.startTag(null, TAG_URI_GRANTS); for (UriPermission.Snapshot perm : persist) { out.startTag(null, TAG_URI_GRANT); writeIntAttribute(out, ATTR_SOURCE_USER_ID, perm.uri.sourceUserId); writeIntAttribute(out, ATTR_TARGET_USER_ID, perm.targetUserId); out.attribute(null, ATTR_SOURCE_PKG, perm.sourcePkg); out.attribute(null, ATTR_TARGET_PKG, perm.targetPkg); out.attribute(null, ATTR_URI, String.valueOf(perm.uri.uri)); writeBooleanAttribute(out, ATTR_PREFIX, perm.uri.prefix); writeIntAttribute(out, ATTR_MODE_FLAGS, perm.persistedModeFlags); writeLongAttribute(out, ATTR_CREATED_TIME, perm.persistedCreateTime); out.endTag(null, TAG_URI_GRANT); } out.endTag(null, TAG_URI_GRANTS); out.endDocument(); mGrantFile.finishWrite(fos); } catch (IOException e) { if (fos != null) { mGrantFile.failWrite(fos); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeGrantedUriPermissions File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
writeGrantedUriPermissions
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public String getRenderedContent(String text, String syntaxId, boolean restrictedTransformationContext, XWikiContext context) { return getRenderedContent(text, syntaxId, getOutputSyntax().toIdString(), restrictedTransformationContext, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
protected void onRequestRows(int firstRowIndex, int numberOfRows, int firstCachedRowIndex, int cacheSize) { setPushRows(Range.withLength(firstRowIndex, numberOfRows)); markAsDirty(); }
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2021-33609 - Severity: MEDIUM - CVSS Score: 4.0 Description: Add row limit to DataCommunicator row data requests Function: onRequestRows File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework Fixed Code: protected void onRequestRows(int firstRowIndex, int numberOfRows, int firstCachedRowIndex, int cacheSize) { if (numberOfRows > getMaximumAllowedRows()) { throw new IllegalStateException( "Client tried fetch more rows than allowed. This is denied to prevent denial of service."); } setPushRows(Range.withLength(firstRowIndex, numberOfRows)); markAsDirty(); }
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
onRequestRows
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
1
Analyze the following code function for security vulnerabilities
private void configureSecurity() { contributeFromPackage(Realm.class, AbstractAuthorizingRealm.class); bind(RememberMeManager.class).to(DefaultRememberMeManager.class); bind(WebSecurityManager.class).to(DefaultWebSecurityManager.class); bind(FilterChainResolver.class).to(DefaultFilterChainResolver.class); bind(BasicAuthenticationFilter.class); bind(BearerAuthenticationFilter.class); bind(PasswordService.class).to(DefaultPasswordService.class); bind(ShiroFilter.class); install(new ShiroAopModule()); contribute(FilterChainConfigurator.class, new FilterChainConfigurator() { @Override public void configure(FilterChainManager filterChainManager) { filterChainManager.createChain("/**/info/refs", "noSessionCreation, authcBasic, authcBearer"); filterChainManager.createChain("/**/git-upload-pack", "noSessionCreation, authcBasic, authcBearer"); filterChainManager.createChain("/**/git-receive-pack", "noSessionCreation, authcBasic, authcBearer"); } }); contributeFromPackage(Authenticator.class, Authenticator.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configureSecurity File: server-core/src/main/java/io/onedev/server/CoreModule.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
configureSecurity
server-core/src/main/java/io/onedev/server/CoreModule.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
private boolean isPotentialMMICode(Uri handle) { return (handle != null && handle.getSchemeSpecificPart() != null && handle.getSchemeSpecificPart().contains("#")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPotentialMMICode File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
isPotentialMMICode
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
void onTextChangedForAutocomplete(boolean textDeleted);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTextChangedForAutocomplete File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onTextChangedForAutocomplete
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
public boolean action(XWikiContext context) throws XWikiException { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: action File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
action
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
@Override public void onLlcpLinkDeactivated(NfcDepEndpoint device) { sendMessage(NfcService.MSG_LLCP_LINK_DEACTIVATED, device); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLlcpLinkDeactivated File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
onLlcpLinkDeactivated
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
private boolean isModified(File[] working, File[] stored) { for (File file : stored) { if (!file.exists()) { return true; } } return BrutIO.recursiveModifiedTime(working) > BrutIO.recursiveModifiedTime(stored); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isModified File: brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
isModified
brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
static boolean patchShadedLibraryId(InputStream in, OutputStream out, String originalName, String name) throws IOException { byte[] buffer = new byte[8192]; int length; // We read the whole native lib into memory to make it easier to monkey-patch the id. ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream(in.available()); while ((length = in.read(buffer)) > 0) { byteArrayOutputStream.write(buffer, 0, length); } byteArrayOutputStream.flush(); byte[] bytes = byteArrayOutputStream.toByteArray(); byteArrayOutputStream.close(); final boolean patched; // Try to patch the library id. if (!patchShadedLibraryId(bytes, originalName, name)) { // We did not find the Id, check if we used a originalName that has the os and arch as suffix. // If this is the case we should also try to patch with the os and arch suffix removed. String os = PlatformDependent.normalizedOs(); String arch = PlatformDependent.normalizedArch(); String osArch = "_" + os + "_" + arch; if (originalName.endsWith(osArch)) { patched = patchShadedLibraryId(bytes, originalName.substring(0, originalName.length() - osArch.length()), name); } else { patched = false; } } else { patched = true; } out.write(bytes, 0, bytes.length); return patched; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: patchShadedLibraryId File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
patchShadedLibraryId
common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
@Override public void fail(Throwable t) { ctx.fail(t); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fail File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLExecutionHandler.java Repository: quarkusio/quarkus The code follows secure coding practices.
[ "CWE-444" ]
CVE-2022-2466
CRITICAL
9.8
quarkusio/quarkus
fail
extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLExecutionHandler.java
08e5c3106ce4bfb18b24a38514eeba6464668b07
0
Analyze the following code function for security vulnerabilities
public String getServerName() { // Try to infer this from the configured root URL. // This makes it work correctly when Hudson runs behind a reverse proxy. String url = Jenkins.getInstance().getRootUrl(); try { if(url!=null) { String host = new URL(url).getHost(); if(host!=null) return host; } } catch (MalformedURLException e) { // fall back to HTTP request } return Stapler.getCurrentRequest().getServerName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServerName File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getServerName
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public static String formatSeconds(long time) { long hours, minutes, seconds; time = time / 1000; hours = time / 3600; time = time - (hours * 3600); minutes = time / 60; time = time - (minutes * 60); seconds = time; return (hours < 10 ? "0" + hours : hours) + ":" + (minutes < 10 ? "0" + minutes : minutes) + ":" + (seconds < 10 ? "0" + seconds : seconds); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatSeconds File: src/main/java/com/openkm/util/FormatUtil.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-40317
MEDIUM
5.4
openkm/document-management-system
formatSeconds
src/main/java/com/openkm/util/FormatUtil.java
870d518f7de349c3fa4c7b9883789fdca4590c4e
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKeyPrefix(String apiKeyPrefix) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKeyPrefix(apiKeyPrefix); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKeyPrefix File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKeyPrefix
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public void onEnrollmentProgress(int remaining) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEnrollmentProgress File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onEnrollmentProgress
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public void finishVoiceTask(IVoiceInteractionSession session) { synchronized (this) { final long origId = Binder.clearCallingIdentity(); try { // TODO: VI Consider treating local voice interactions and voice tasks // differently here mStackSupervisor.finishVoiceTask(session); } finally { Binder.restoreCallingIdentity(origId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishVoiceTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
finishVoiceTask
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Deprecated public XWikiAttachment addAttachment(String fileName, InputStream content, XWikiContext context) throws XWikiException, IOException { return setAttachment(fileName, content, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addAttachment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@PUT @Path("posts/{messageKey}") @Operation(summary = "Put posts", description = "Creates a new reply in the forum of the course node.") @ApiResponse(responseCode = "200", description = "Ok.", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = MessageVO.class)), @Content(mediaType = "application/xml", schema = @Schema(implementation = MessageVO.class)) }) @ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient.") @ApiResponse(responseCode = "404", description = "The author or message not found.") @Consumes({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) @Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) public Response replyToPost(@PathParam("messageKey") Long messageKey, ReplyVO reply, @Context HttpServletRequest httpRequest, @Context UriInfo uriInfo) { ServletUtil.printOutRequestHeaders(httpRequest); return replyToPost(messageKey, reply, null, httpRequest, uriInfo); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: replyToPost File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
replyToPost
src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
@Override public int setTimeout(int tech, int timeout) throws RemoteException { NfcPermissions.enforceUserPermissions(mContext); boolean success = mDeviceHost.setTimeout(tech, timeout); if (success) { return ErrorCodes.SUCCESS; } else { return ErrorCodes.ERROR_INVALID_PARAM; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTimeout File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
setTimeout
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
void getVisibleBounds(Rect bounds) { final Task task = getTask(); boolean intersectWithRootTaskBounds = task != null && task.cropWindowsToRootTaskBounds(); bounds.setEmpty(); mTmpRect.setEmpty(); if (intersectWithRootTaskBounds) { final Task rootTask = task.getRootTask(); if (rootTask != null) { rootTask.getDimBounds(mTmpRect); } else { intersectWithRootTaskBounds = false; } } bounds.set(mWindowFrames.mFrame); bounds.inset(getInsetsStateWithVisibilityOverride().calculateVisibleInsets( bounds, mAttrs.type, getWindowingMode(), mAttrs.softInputMode, mAttrs.flags)); if (intersectWithRootTaskBounds) { bounds.intersect(mTmpRect); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVisibleBounds File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getVisibleBounds
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public <V extends Component> Column<T, V> addComponentColumn( ValueProvider<T, V> componentProvider) { return addColumn(componentProvider, new ComponentRenderer()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addComponentColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addComponentColumn
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public boolean isJavascriptMimeType(String mimetype) { boolean result = "text/javascript".equalsIgnoreCase(mimetype) || "application/x-javascript".equalsIgnoreCase(mimetype) || "application/javascript".equalsIgnoreCase(mimetype); result |= "application/ecmascript".equalsIgnoreCase(mimetype) || "text/ecmascript".equalsIgnoreCase(mimetype); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isJavascriptMimeType File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SkinAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
isJavascriptMimeType
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SkinAction.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
@Override public IBinder onBind(Intent intent) { return mBinder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBind File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
onBind
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("deprecation") private Thread[] checkThreadGroup() { blockThreadCreation = true; int originalCount = testThreadGroup.activeCount(); if (originalCount == 0) return new Thread[0]; // everything ok var threads = new Thread[originalCount]; testThreadGroup.enumerate(threads); // try gentle shutdown; without that, runs on CI might fail because of previous. for (Thread thread : threads) { if (thread == null) continue; try { thread.interrupt(); thread.join(500 / originalCount + 1L); LOG.debug("State {} after interrupt and join of {}", thread.getState(), thread); //$NON-NLS-1$ } catch (@SuppressWarnings("unused") InterruptedException e) { Thread.currentThread().interrupt(); } } if (testThreadGroup.activeCount() == 0) return new Thread[0]; // try forceful shutdown var securityException = new SecurityException( formatLocalized("security.error_threads_not_stoppable", Arrays.toString(threads))); //$NON-NLS-1$ int alive = threads.length; TRIES: for (var i = 0; i < 50 && alive > 0; i++) { alive = 0; for (Thread thread : threads) { if (thread == null || !thread.isAlive()) continue; alive++; LOG.debug("Try {} to stop {}, state: {}", i + 1, thread, thread.getState()); //$NON-NLS-1$ /* * we definitely want to forcefully terminate all threads (otherwise, next tests * will fail) */ thread.stop(); try { thread.join(20 / originalCount + 1L); } catch (InterruptedException e) { LOG.warn("Error in checkThreadGroup 1", e); //$NON-NLS-1$ securityException.addSuppressed(e); Thread.currentThread().interrupt(); break TRIES; } } } for (Thread thread : threads) { if (thread == null || !thread.isAlive()) continue; try { thread.join(100 / originalCount + 1L); } catch (InterruptedException e) { LOG.warn("Error in checkThreadGroup 2", e); //$NON-NLS-1$ securityException.addSuppressed(e); Thread.currentThread().interrupt(); break; } if (thread.getState() != State.TERMINATED) LOG.error("THREAD STOP ERROR: Thread {} is still in state {}", thread, thread.getState()); //$NON-NLS-1$ } if (testThreadGroup.activeCount() > 0) throw securityException; return threads; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkThreadGroup File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
checkThreadGroup
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public static List<Structure> getStructuresUnderHost(Host h, User user, boolean respectFrontendRoles) throws DotDataException { HibernateUtil dh = new HibernateUtil(Structure.class); try{ String query = "from Structure where host = ?"; // order dh.setQuery(query); dh.setParam(h.getIdentifier()); List<Structure> resultList = dh.list(); return resultList; } catch(Exception e){ Logger.error(StructureFactory.class, e.getMessage(), e); throw new DotDataException(e.getMessage()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStructuresUnderHost File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructuresUnderHost
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
private static int longStrSize(String str) throws UnsupportedEncodingException { return str.getBytes("utf-8").length + 4; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: longStrSize File: src/main/java/com/rabbitmq/client/impl/Frame.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
longStrSize
src/main/java/com/rabbitmq/client/impl/Frame.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
private JsonValue readTrue() throws IOException { read(); readRequiredChar('r'); readRequiredChar('u'); readRequiredChar('e'); return JsonValue.TRUE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readTrue File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readTrue
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
public int getSpanEnd(Object tag) { return mSpanned.getSpanEnd(tag); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSpanEnd File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getSpanEnd
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
private String getLine(BufferedReader reader) throws IOException { String line = null; try { while ((line = reader.readLine()) != null) { cursor.lineNumber++; if (cursor.lineNumber < watermark) { continue; } else { watermark = 0; } if (line.length() == 0) { continue; } break; } } catch (SocketException | SocketTimeoutException e) { if (backOffPolicy.hasNext()) { watermark = watermark == 0 ? cursor.lineNumber + 1 : watermark; closeReader(); createReader(currentInput, cursor.uri); } else { URI uri = currentInput.uri(); LOGGER.error("Timeout during COPY FROM '" + uri.toString() + "' after " + MAX_SOCKET_TIMEOUT_RETRIES + " retries", e); } throw e; } catch (Exception e) { URI uri = currentInput.uri(); // it's nice to know which exact file/uri threw an error // when COPY FROM returns less rows than expected LOGGER.error("Error during COPY FROM '" + uri.toString() + "'", e); rethrowUnchecked(e); } return line; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLine File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
getLine
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
@Exported public boolean isConcurrentBuild() { return concurrentBuild; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConcurrentBuild File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
isConcurrentBuild
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public Fingerprint _getFingerprint( String md5sum ) throws IOException { return fingerprintMap.get(md5sum); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _getFingerprint File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
_getFingerprint
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public Bundle getUserRestrictions(int userId) { // checkManageUsersPermission("getUserRestrictions"); synchronized (mPackagesLock) { Bundle restrictions = mUserRestrictions.get(userId); return restrictions != null ? new Bundle(restrictions) : new Bundle(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserRestrictions File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
getUserRestrictions
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
public boolean isVerified() { return mVerified; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isVerified File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
isVerified
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public Form<T> bind( Lang lang, TypedMap attrs, JsonNode data, long maxChars, String... allowedFields) { return bind( lang, attrs, play.libs.Scala.asJava( play.api.data.FormUtils.fromJson( play.api.libs.json.Json.parse(play.libs.Json.stringify(data)), maxChars)), allowedFields); }
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2022-31018 - Severity: MEDIUM - CVSS Score: 5.0 Description: add depth limit for JSON form binding Function: bind File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework Fixed Code: public Form<T> bind( Lang lang, TypedMap attrs, JsonNode data, long maxChars, String... allowedFields) { return bind( lang, attrs, play.libs.Scala.asJava( play.api.data.FormUtils.fromJson( play.api.libs.json.Json.parse(play.libs.Json.stringify(data)), maxChars, maxJsonDepth())), allowedFields); }
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
bind
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
1
Analyze the following code function for security vulnerabilities
@GuardedBy(anyOf = {"this", "mProcLock"}) final ProcessMap<ProcessRecord> getProcessNamesLOSP() { return mProcessList.getProcessNamesLOSP(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessNamesLOSP File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getProcessNamesLOSP
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public void onStop() { super.onStop(); final Activity activity = getActivity(); messageListAdapter.unregisterListenerInAudioPlayer(); if (activity == null || !activity.isChangingConfigurations()) { hideSoftKeyboard(activity); messageListAdapter.stopAudioPlayer(); } if (this.conversation != null) { final String msg = this.binding.textinput.getText().toString(); storeNextMessage(msg); updateChatState(this.conversation, msg); this.activity.xmppConnectionService.getNotificationService().setOpenConversation(null); } this.reInitRequiredOnStart = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStop File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onStop
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public boolean setDynamicShortcuts(String packageName, ParceledListSlice shortcutInfoList, @UserIdInt int userId) { verifyCaller(packageName, userId); final boolean unlimited = injectHasUnlimitedShortcutsApiCallsPermission( injectBinderCallingPid(), injectBinderCallingUid()); final List<ShortcutInfo> newShortcuts = (List<ShortcutInfo>) shortcutInfoList.getList(); verifyShortcutInfoPackages(packageName, newShortcuts); final int size = newShortcuts.size(); List<ShortcutInfo> changedShortcuts = null; List<ShortcutInfo> removedShortcuts = null; final ShortcutPackage ps; synchronized (mLock) { throwIfUserLockedL(userId); ps = getPackageShortcutsForPublisherLocked(packageName, userId); ps.ensureImmutableShortcutsNotIncluded(newShortcuts, /*ignoreInvisible=*/ true); ps.ensureNoBitmapIconIfShortcutIsLongLived(newShortcuts); fillInDefaultActivity(newShortcuts); ps.enforceShortcutCountsBeforeOperation(newShortcuts, OPERATION_SET); // Throttling. if (!ps.tryApiCall(unlimited)) { return false; } // Initialize the implicit ranks for ShortcutPackage.adjustRanks(). ps.clearAllImplicitRanks(); assignImplicitRanks(newShortcuts); for (int i = 0; i < size; i++) { fixUpIncomingShortcutInfo(newShortcuts.get(i), /* forUpdate= */ false); } ArrayList<ShortcutInfo> cachedOrPinned = new ArrayList<>(); ps.findAll(cachedOrPinned, (ShortcutInfo si) -> si.isVisibleToPublisher() && si.isDynamic() && (si.isCached() || si.isPinned()), ShortcutInfo.CLONE_REMOVE_NON_KEY_INFO); // First, remove all un-pinned and non-cached; dynamic shortcuts removedShortcuts = ps.deleteAllDynamicShortcuts(); // Then, add/update all. We need to make sure to take over "pinned" flag. for (int i = 0; i < size; i++) { final ShortcutInfo newShortcut = newShortcuts.get(i); ps.addOrReplaceDynamicShortcut(newShortcut); } // Lastly, adjust the ranks. ps.adjustRanks(); changedShortcuts = prepareChangedShortcuts( cachedOrPinned, newShortcuts, removedShortcuts, ps); } packageShortcutsChanged(ps, changedShortcuts, removedShortcuts); verifyStates(); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDynamicShortcuts File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
setDynamicShortcuts
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public String getClassId() { return classId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClassId File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getClassId
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public List<ApplicationInfo> getPersistentApplications(int flags) { final ArrayList<ApplicationInfo> finalList = new ArrayList<ApplicationInfo>(); // reader synchronized (mPackages) { final Iterator<PackageParser.Package> i = mPackages.values().iterator(); final int userId = UserHandle.getCallingUserId(); while (i.hasNext()) { final PackageParser.Package p = i.next(); if (p.applicationInfo != null && (p.applicationInfo.flags&ApplicationInfo.FLAG_PERSISTENT) != 0 && (!mSafeMode || isSystemApp(p))) { PackageSetting ps = mSettings.mPackages.get(p.packageName); if (ps != null) { ApplicationInfo ai = PackageParser.generateApplicationInfo(p, flags, ps.readUserState(userId), userId); if (ai != null) { finalList.add(ai); } } } } } return finalList; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPersistentApplications File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getPersistentApplications
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public boolean containsValue(Object value) { return xObjects.containsValue(value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
containsValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public void onCreateConnectionComplete(Connection connection) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateConnectionComplete File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
onCreateConnectionComplete
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private void notifyFocusChanged() { WindowChangeListener[] windowChangeListeners; synchronized(mWindowMap) { if(mWindowChangeListeners.isEmpty()) { return; } windowChangeListeners = new WindowChangeListener[mWindowChangeListeners.size()]; windowChangeListeners = mWindowChangeListeners.toArray(windowChangeListeners); } int N = windowChangeListeners.length; for(int i = 0; i < N; i++) { windowChangeListeners[i].focusChanged(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyFocusChanged File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
notifyFocusChanged
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
protected void internalGetSubscriptions(AsyncResponse asyncResponse, boolean authoritative) { if (topicName.isGlobal()) { try { validateGlobalNamespaceOwnership(namespaceName); } catch (Exception e) { log.error("[{}] Failed to get subscriptions for topic {}", clientAppId(), topicName, e); resumeAsyncResponseExceptionally(asyncResponse, e); return; } } validateTopicOwnership(topicName, authoritative); // If the topic name is a partition name, no need to get partition topic metadata again if (topicName.isPartitioned()) { internalGetSubscriptionsForNonPartitionedTopic(asyncResponse, authoritative); } else { getPartitionedTopicMetadataAsync(topicName, authoritative, false).thenAccept(partitionMetadata -> { if (partitionMetadata.partitions > 0) { try { final Set<String> subscriptions = Sets.newConcurrentHashSet(); final List<CompletableFuture<Object>> subscriptionFutures = Lists.newArrayList(); if (topicName.getDomain() == TopicDomain.persistent) { final Map<Integer, CompletableFuture<Boolean>> existsFutures = Maps.newConcurrentMap(); for (int i = 0; i < partitionMetadata.partitions; i++) { String path = String.format("/managed-ledgers/%s/%s/%s", namespaceName.toString(), domain(), topicName.getPartition(i).getEncodedLocalName()); CompletableFuture<Boolean> exists = getLocalPolicies().existsAsync(path); existsFutures.put(i, exists); } FutureUtil.waitForAll(Lists.newArrayList(existsFutures.values())).thenApply(__ -> existsFutures.entrySet().stream().filter(e -> e.getValue().join().booleanValue()) .map(item -> topicName.getPartition(item.getKey()).toString()) .collect(Collectors.toList()) ).thenAccept(topics -> { if (log.isDebugEnabled()) { log.debug("activeTopics : {}", topics); } topics.forEach(topic -> { try { CompletableFuture<List<String>> subscriptionsAsync = pulsar().getAdminClient() .topics().getSubscriptionsAsync(topic); subscriptionFutures.add(subscriptionsAsync.thenApply(subscriptions::addAll)); } catch (PulsarServerException e) { throw new RestException(e); } }); }).thenAccept(__ -> resumeAsyncResponse(asyncResponse, subscriptions, subscriptionFutures)); } else { for (int i = 0; i < partitionMetadata.partitions; i++) { CompletableFuture<List<String>> subscriptionsAsync = pulsar().getAdminClient().topics() .getSubscriptionsAsync(topicName.getPartition(i).toString()); subscriptionFutures.add(subscriptionsAsync.thenApply(subscriptions::addAll)); } resumeAsyncResponse(asyncResponse, subscriptions, subscriptionFutures); } } catch (Exception e) { log.error("[{}] Failed to get list of subscriptions for {}", clientAppId(), topicName, e); asyncResponse.resume(e); } } else { internalGetSubscriptionsForNonPartitionedTopic(asyncResponse, authoritative); } }).exceptionally(ex -> { log.error("[{}] Failed to get subscriptions for topic {}", clientAppId(), topicName, ex); resumeAsyncResponseExceptionally(asyncResponse, ex); return null; }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalGetSubscriptions File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalGetSubscriptions
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
protected abstract String getFileSuffix();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileSuffix File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/org/xwiki/skinx/internal/AbstractSxExportURLFactoryActionHandler.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-116" ]
CVE-2022-23620
MEDIUM
5.8
xwiki/xwiki-platform
getFileSuffix
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/org/xwiki/skinx/internal/AbstractSxExportURLFactoryActionHandler.java
ab778254fb8f71c774e1c1239368c44fe3b6bba5
0
Analyze the following code function for security vulnerabilities
public ProfileAttribute getAttribute(String name) { for (ProfileAttribute attr : attrs) { if (attr.getName().equals(name)) return attr; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttribute File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getAttribute
base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public boolean isDisabled() { return this.user.isDisabled(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDisabled File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-41929
MEDIUM
4.9
xwiki/xwiki-platform
isDisabled
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
0
Analyze the following code function for security vulnerabilities
public String getStructuresByTypeGroup() { return structuresByTypeGroup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStructuresByTypeGroup File: src/com/dotmarketing/cache/ContentTypeCacheImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructuresByTypeGroup
src/com/dotmarketing/cache/ContentTypeCacheImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Override public void resetCarMode() { Log.startSession("TCI.rCM"); try { synchronized (mLock) { enforceShellOnly(Binder.getCallingUid(), "resetCarMode"); Binder.withCleanCallingIdentity(() -> { UiModeManager uiModeManager = mContext.getSystemService(UiModeManager.class); uiModeManager.disableCarMode(UiModeManager.DISABLE_CAR_MODE_ALL_PRIORITIES); }); } } finally { Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetCarMode File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
resetCarMode
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
@Override public BigInteger bigIntegerValueExact() { BigDecimal bd = bigDecimalValue(); if (Math.abs(bd.scale()) <= bigIntegerScaleLimit) { return bd.toBigIntegerExact(); } throw new UnsupportedOperationException( String.format(SCALE_LIMIT_EXCEPTION_MESSAGE, bd.scale(), bigIntegerScaleLimit)); }
Vulnerability Classification: - CWE: CWE-834 - CVE: CVE-2023-4043 - Severity: HIGH - CVSS Score: 7.5 Description: Exception message moved to messages bundle. Signed-off-by: Tomáš Kraus <tomas.kraus@oracle.com> Function: bigIntegerValueExact File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repository: eclipse-ee4j/parsson Fixed Code: @Override public BigInteger bigIntegerValueExact() { BigDecimal bd = bigDecimalValue(); if (Math.abs(bd.scale()) <= bigIntegerScaleLimit) { return bd.toBigIntegerExact(); } throw new UnsupportedOperationException( JsonMessages.NUMBER_SCALE_LIMIT_EXCEPTION(bd.scale(), bigIntegerScaleLimit)); }
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
bigIntegerValueExact
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
84764ffbe3d0376da242b27a9a526138d0dfb8e6
1
Analyze the following code function for security vulnerabilities
public void writeStructBegin(TStruct struct) {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeStructBegin File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
writeStructBegin
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public static Path getResource(File file, String filename, String fallbackEncoding) throws IOException { if(!StringHelper.containsNonWhitespace(filename)) { filename = file.getName(); } if(!StringHelper.containsNonWhitespace(fallbackEncoding)) { return getResource(file, filename); } Path fPath = null; if(file.isDirectory()) { fPath = file.toPath(); } else if(filename != null && filename.toLowerCase().endsWith(".zip")) { //perhaps find root folder and return it Map<String,String> env = new HashMap<>(); if(isEncodingOk(file, "UTF-8")) { env.put("encoding", "UTF-8"); } else if(isEncodingOk(file, fallbackEncoding)) { env.put("encoding", fallbackEncoding); } fPath = newFileSystem(file.toPath(), env).getPath("/"); RootSearcher rootSearcher = searchRootDirectory(fPath); if(rootSearcher.foundRoot()) { Path rootPath = rootSearcher.getRoot(); fPath = fPath.resolve(rootPath); } } else { fPath = file.toPath(); } return fPath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResource File: src/main/java/org/olat/fileresource/types/FileResource.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
getResource
src/main/java/org/olat/fileresource/types/FileResource.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
public Document parseDocument(ParserEnvironment environment) throws InvalidSyntaxException { return parseDocumentImpl(environment); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDocument File: src/main/java/graphql/parser/Parser.java Repository: graphql-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-28867
HIGH
7.5
graphql-java
parseDocument
src/main/java/graphql/parser/Parser.java
8a1c884c81c0b656db201cfd95881feb0f430a55
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAuthenticated() { return authed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAuthenticated File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
isAuthenticated
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
public void rotate(Object nativeGraphics, float angle, int x, int y) { ((AndroidGraphics) nativeGraphics).rotate(angle, x, y); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rotate File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
rotate
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public String getRef() { return ref; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRef File: src/main/java/object/Variant.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
getRef
src/main/java/object/Variant.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
protected void buildLimit(StringBuilder sql, int from, int limit) { sql.append(" LIMIT ").append(limit); sql.append(" OFFSET ").append(from); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildLimit File: oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2TraceQueryDAO.java Repository: apache/skywalking The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-13921
HIGH
7.5
apache/skywalking
buildLimit
oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2TraceQueryDAO.java
ddb6d9a5019a9c1fe31c364485a4e4b5066fefc3
0
Analyze the following code function for security vulnerabilities
private boolean resetPasswordInternal(String password, long tokenHandle, byte[] token, int flags, CallerIdentity caller) { final int callingUid = caller.getUid(); final int userHandle = UserHandle.getUserId(callingUid); final boolean isPin = PasswordMetrics.isNumericOnly(password); synchronized (getLockObject()) { final PasswordMetrics minMetrics = getPasswordMinimumMetricsUnchecked(userHandle); final List<PasswordValidationError> validationErrors; final int complexity = getAggregatedPasswordComplexityLocked(userHandle); // TODO: Consider changing validation API to take LockscreenCredential. if (password.isEmpty()) { validationErrors = PasswordMetrics.validatePasswordMetrics( minMetrics, complexity, new PasswordMetrics(CREDENTIAL_TYPE_NONE)); } else { // TODO(b/120484642): remove getBytes() below validationErrors = PasswordMetrics.validatePassword( minMetrics, complexity, isPin, password.getBytes()); } if (!validationErrors.isEmpty()) { Slogf.w(LOG_TAG, "Failed to reset password due to constraint violation: %s", validationErrors.get(0)); return false; } } DevicePolicyData policy = getUserData(userHandle); if (policy.mPasswordOwner >= 0 && policy.mPasswordOwner != callingUid) { Slogf.w(LOG_TAG, "resetPassword: already set by another uid and not entered by user"); return false; } boolean callerIsDeviceOwnerAdmin = isDefaultDeviceOwner(caller); boolean doNotAskCredentialsOnBoot = (flags & DevicePolicyManager.RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT) != 0; if (callerIsDeviceOwnerAdmin && doNotAskCredentialsOnBoot) { setDoNotAskCredentialsOnBoot(); } // Don't do this with the lock held, because it is going to call // back in to the service. final long ident = mInjector.binderClearCallingIdentity(); final LockscreenCredential newCredential; if (isPin) { newCredential = LockscreenCredential.createPin(password); } else { newCredential = LockscreenCredential.createPasswordOrNone(password); } try { if (tokenHandle == 0 || token == null) { if (!mLockPatternUtils.setLockCredential(newCredential, LockscreenCredential.createNone(), userHandle)) { return false; } } else { if (!mLockPatternUtils.setLockCredentialWithToken(newCredential, tokenHandle, token, userHandle)) { return false; } } boolean requireEntry = (flags & DevicePolicyManager.RESET_PASSWORD_REQUIRE_ENTRY) != 0; if (requireEntry) { mLockPatternUtils.requireStrongAuth(STRONG_AUTH_REQUIRED_AFTER_DPM_LOCK_NOW, UserHandle.USER_ALL); } synchronized (getLockObject()) { int newOwner = requireEntry ? callingUid : -1; if (policy.mPasswordOwner != newOwner) { policy.mPasswordOwner = newOwner; saveSettingsLocked(userHandle); } } } finally { mInjector.binderRestoreCallingIdentity(ident); } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetPasswordInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
resetPasswordInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setText(String text) { this.text = text; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setText File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setText
base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Test public void updateNullConnection2(TestContext context) { UpdateSection updateSection = new UpdateSection(); updateSection.addField("key").setValue("x"); postgresClientNullConnection(). update(FOO, updateSection, (Criterion) null, false, context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNullConnection2 File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
updateNullConnection2
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void setRunOptions(String runOptions) { this.runOptions = runOptions; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRunOptions File: server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
setRunOptions
server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
public ApiClient setDateFormat(DateFormat dateFormat) { this.dateFormat = dateFormat; // also set the date format for model (de)serialization with Date properties this.json.setDateFormat((DateFormat) dateFormat.clone()); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDateFormat File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setDateFormat
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0