instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public SyncAdapterType[] getSyncAdapterTypes() { return getSyncAdapterTypesAsUser(UserHandle.getCallingUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSyncAdapterTypes File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
getSyncAdapterTypes
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
public void setAuthToken(@Nullable String authToken) { this.authToken = authToken; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAuthToken File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/HipchatNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setAuthToken
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/HipchatNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
public Set<String> getTags() { return tags; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTags File: varexport/src/main/java/com/indeed/util/varexport/Variable.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
getTags
varexport/src/main/java/com/indeed/util/varexport/Variable.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
public static void run(final Supplier<? extends Jooby> app, final String... args) { Config conf = ConfigFactory.systemProperties() .withFallback(args(args)); System.setProperty("logback.configurationFile", logback(conf)); app.get().start(args); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
run
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void write(PrintWriter out, boolean includeDoc) { // getValue() will update the timestamp (if relevant) T localValue = getValue(); if (includeDoc) { out.println(); Long lastUpdate = getLastUpdated(); if (hasDoc() || lastUpdate != null) { out.print("# "); if (hasDoc()) { out.print(makePropertiesSafe(getDoc(), null)); } if (lastUpdate != null) { out.print(" (last update: " + lastUpdate + ")"); } out.println(); } } out.println(toString()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: varexport/src/main/java/com/indeed/util/varexport/Variable.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
write
varexport/src/main/java/com/indeed/util/varexport/Variable.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
public static Path getDataFilePath(String pi, String relativeFilePath) throws PresentationException, IndexUnreachableException { if (pi == null) { throw new IllegalArgumentException("pi may not be null"); } String dataRepositoryName = DataManager.getInstance().getSearchIndex().findDataRepositoryName(pi); String dataRepositoryPath = getDataRepositoryPath(dataRepositoryName); return Paths.get(dataRepositoryPath, relativeFilePath); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDataFilePath File: goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-15124
MEDIUM
4
intranda/goobi-viewer-core
getDataFilePath
goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java
44ceb8e2e7e888391e8a941127171d6366770df3
0
Analyze the following code function for security vulnerabilities
@Override public SerializationServiceBuilder setAllowUnsafe(boolean allowUnsafe) { this.allowUnsafe = allowUnsafe; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowUnsafe File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
setAllowUnsafe
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void refreshRows(Object... itemIds) { for (Object itemId : itemIds) { datasourceExtension.updateRowData(itemId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshRows File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
refreshRows
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public BaseRecipientAdapter getRecipientAdapter() { return new RecipientAdapter(this, mAccount); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecipientAdapter File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
getRecipientAdapter
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public byte[] readBinary() throws TException { int size = readI32(); checkReadLength(size); byte[] buf = new byte[size]; trans_.readAll(buf, 0, size); return buf; }
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2019-11938 - Severity: MEDIUM - CVSS Score: 5.0 Description: Java: Check the size of the remaining frame before deserializing a string Summary: In order to avoid over-allocating memory for malformed or truncated frame, we ensure that we have enough data in the current frame. This is a partial fix for CVE-2019-11938. Reviewed By: vitaut Differential Revision: D14505601 fbshipit-source-id: c90f248828b067a3a5debcc8df6a3f4e9da6d195 Function: readBinary File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift Fixed Code: public byte[] readBinary() throws TException { int size = readI32(); ensureContainerHasEnough(size, TType.BYTE); checkReadLength(size); byte[] buf = new byte[size]; trans_.readAll(buf, 0, size); return buf; }
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readBinary
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
1
Analyze the following code function for security vulnerabilities
public void userActivity() { if (mState == StatusBarState.KEYGUARD) { mKeyguardViewMediatorCallback.userActivity(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userActivity File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
userActivity
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public List<Group> findAll(Context context, List<MetadataField> metadataSortFields, int pageSize, int offset) throws SQLException { if (CollectionUtils.isEmpty(metadataSortFields)) { return groupDAO.findAll(context, pageSize, offset); } else { return groupDAO.findAll(context, metadataSortFields, pageSize, offset); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAll File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
findAll
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
TaskViewTransform getThumbnailTransitionTransform(TaskStack stack, TaskStackView stackView, int runningTaskId, Task runningTaskOut) { // Find the running task in the TaskStack Task task = null; ArrayList<Task> tasks = stack.getTasks(); if (runningTaskId != -1) { // Otherwise, try and find the task with the int taskCount = tasks.size(); for (int i = taskCount - 1; i >= 0; i--) { Task t = tasks.get(i); if (t.key.id == runningTaskId) { task = t; runningTaskOut.copyFrom(t); break; } } } if (task == null) { // If no task is specified or we can not find the task just use the front most one task = tasks.get(tasks.size() - 1); } // Get the transform for the running task stackView.getScroller().setStackScrollToInitialState(); mTmpTransform = stackView.getStackAlgorithm().getStackTransform(task, stackView.getScroller().getStackScroll(), mTmpTransform, null); return mTmpTransform; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThumbnailTransitionTransform File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
getThumbnailTransitionTransform
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
0
Analyze the following code function for security vulnerabilities
public void setPluginManager(XWikiPluginManager pluginManager) { this.pluginManager = pluginManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPluginManager File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setPluginManager
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void unregisterContentObserver(IContentObserver observer) { if (observer == null) { throw new IllegalArgumentException("You must pass a valid observer"); } synchronized (mRootNode) { mRootNode.removeObserverLocked(observer); if (false) Log.v(TAG, "Unregistered observer " + observer); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterContentObserver File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
unregisterContentObserver
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@XmlElement public boolean isRead() { return read; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRead File: core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
isRead
core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setStringValue(String className, String fieldName, String value) { setStringValue( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), fieldName, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStringValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setStringValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public Object advanced(String query) throws ApplicationException { if (query == null || query.trim().length() == 0) { return this; } query = StringUtilities.htmlSpecialChars(query); int page = 1, pageSize = 10, total = 0; this.request = (Request) this.context.getAttribute(HTTP_REQUEST); if (this.request.getParameter("page") == null || this.request.getParameter("page").toString().trim().length() == 0) { page = 1; } else { page = Integer.parseInt(this.request.getParameter("page").toString()); } if (this.request.getParameter("amount") == null || this.request.getParameter("amount").toString().trim().length() == 0) { total = 1; } else { total = Integer.parseInt(this.request.getParameter("amount").toString()); } long startTime = System.currentTimeMillis(); Pager pager = new Pager(); pager.setPageSize(pageSize); pager.setCurrentPage(page); pager.setListSize(total); if (query == null || query.length() > 0) { this.setVariable("keyword", ""); } else { this.setVariable("keyword", query); this.setVariable("search.title", query + " - "); } Document document = this.execute(query, pager.getStartIndex()); Element root = document.getRoot(); List<Element> vtable = root.getElementsByTagName("entry"); if (vtable.size() == 0) { this.setVariable("value", "Sorry, we could not get any related results with this keyword! " + StringUtilities.htmlSpecialChars(root.toString())); return this; } int n = 0, next, amount = Integer.parseInt(root.getElementsByTagName("opensearch:totalResults").get(0).getData()); pager.setListSize(amount); next = pager.getStartIndex();// 此位置即为当前页的第一条记录的ID // opensearch:totalResults StringBuffer html = new StringBuffer(); html.append("<ol class=\"searchresults\" start=\"" + next + "\">\r\n"); Element element, title, link; List<Element> t; String summary; Iterator<Element> item = vtable.iterator(); while (item.hasNext()) { element = item.next(); n++; link = element.getElementsByTagName("id").get(0); title = element.getElementsByTagName("title").get(0); t = element.getElementsByTagName("cse:PageMap").get(0) .getElementsByTagName("cse:DataObject"); if (t.size() >= 3) { t = t.get(1).getElementsByTagName("cse:Attribute"); summary = t.get(1).getAttribute("value"); } else summary = element.getElementsByTagName("summary").get(0).getData(); html.append("<li" + (n % 2 == 0 ? " class=\"even\"" : " class=\"odd\"") + "><a href=\"" + link.getData() + "\" target=\"_blank\">" + title.getData() + " </a><p>" + summary + "</p></li> \r\n"); next++; } html.append("</ol>\r\n"); String actionURL = this.context.getAttribute("HTTP_HOST") + "bible/advsearch/" + query + "&amount=" + amount + "&page"; pager.setFirstPageText(this.getProperty("page.first.text")); pager.setLastPageText(this.getProperty("page.last.text")); pager.setCurrentPageText(this.getProperty("page.current.text")); pager.setNextPageText(this.getProperty("page.next.text")); pager.setEndPageText(this.getProperty("page.end.text")); pager.setControlBarText(this.getProperty("page.controlbar.text")); html.append("<div class=\"pagination\" style=\"cursor:default\">" + pager.getPageControlBar(actionURL) + "</div>\r\n"); html.append("<!-- " + String.valueOf(System.currentTimeMillis() - startTime) + " -->"); int start = page - 1 == 0 ? 1 : (page - 1) * pageSize + 1, end = page * pageSize; this.setVariable("start", String.valueOf(start)); this.setVariable("end", String.valueOf(end)); this.setVariable("size", String.valueOf(pager.getSize())); this.setVariable("value", html.toString()); this.setText("search.info", start, end, query, pager.getSize()); this.setVariable("action", String.valueOf(this.context.getAttribute("HTTP_HOST")) + this.context.getAttribute("REQUEST_ACTION").toString()); Session session = request.getSession(); if (session.getAttribute("usr") != null) { this.usr = (User) session.getAttribute("usr"); this.setVariable("user.status", ""); this.setVariable("user.profile", "<a href=\"javascript:void(0)\" onmousedown=\"profileMenu.show(event,'1')\">" + this.usr.getEmail() + "</a>"); } else { this.setVariable("user.status", "<a href=\"" + this.getLink("user/login") + "\">" + this.getProperty("page.login.caption") + "</a>"); this.setVariable("user.profile", ""); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: advanced File: src/main/java/custom/application/search.java Repository: m0ver/bible-online The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-4454
CRITICAL
9.8
m0ver/bible-online
advanced
src/main/java/custom/application/search.java
6ef0aabfb2d4ccd53fcaa9707781303af357410e
0
Analyze the following code function for security vulnerabilities
void launchHomeFromHotKey() { if (isKeyguardShowingAndNotOccluded()) { // don't launch home if keyguard showing } else if (!mHideLockScreen && mKeyguardDelegate.isInputRestricted()) { // when in keyguard restricted mode, must first verify unlock // before launching home mKeyguardDelegate.verifyUnlock(new OnKeyguardExitResult() { @Override public void onKeyguardExitResult(boolean success) { if (success) { try { ActivityManagerNative.getDefault().stopAppSwitches(); } catch (RemoteException e) { } sendCloseSystemWindows(SYSTEM_DIALOG_REASON_HOME_KEY); startDockOrHome(); } } }); } else { // no keyguard stuff to worry about, just launch home! try { ActivityManagerNative.getDefault().stopAppSwitches(); } catch (RemoteException e) { } if (mRecentsVisible) { // Hide Recents and notify it to launch Home awakenDreams(); sendCloseSystemWindows(SYSTEM_DIALOG_REASON_HOME_KEY); hideRecentApps(false, true); } else { // Otherwise, just launch Home sendCloseSystemWindows(SYSTEM_DIALOG_REASON_HOME_KEY); startDockOrHome(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchHomeFromHotKey File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
launchHomeFromHotKey
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
private int index(int hash) { return hash & hashMask; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: index File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
index
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
public boolean hasCallerBindPermissionOrBindWhiteListedLocked(String packageName) { try { mContext.enforceCallingOrSelfPermission( android.Manifest.permission.BIND_APPWIDGET, null); } catch (SecurityException se) { if (!isCallerBindAppWidgetWhiteListedLocked(packageName)) { return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasCallerBindPermissionOrBindWhiteListedLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
hasCallerBindPermissionOrBindWhiteListedLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public void onNewDhcpResults(DhcpResultsParcelable dhcpResults) { if (dhcpResults != null) { sendMessage(CMD_IPV4_PROVISIONING_SUCCESS, dhcpResults); } else { sendMessage(CMD_IPV4_PROVISIONING_FAILURE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNewDhcpResults File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
onNewDhcpResults
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private ActivityManager.RecentTaskInfo createRecentTaskInfoFromTaskRecord(TaskRecord tr) { // Update the task description to reflect any changes in the task stack tr.updateTaskDescription(); // Compose the recent task info ActivityManager.RecentTaskInfo rti = new ActivityManager.RecentTaskInfo(); rti.id = tr.getTopActivity() == null ? INVALID_TASK_ID : tr.taskId; rti.persistentId = tr.taskId; rti.baseIntent = new Intent(tr.getBaseIntent()); rti.origActivity = tr.origActivity; rti.description = tr.lastDescription; rti.stackId = tr.stack != null ? tr.stack.mStackId : -1; rti.userId = tr.userId; rti.taskDescription = new ActivityManager.TaskDescription(tr.lastTaskDescription); rti.firstActiveTime = tr.firstActiveTime; rti.lastActiveTime = tr.lastActiveTime; rti.affiliatedTaskId = tr.mAffiliatedTaskId; rti.affiliatedTaskColor = tr.mAffiliatedTaskColor; return rti; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createRecentTaskInfoFromTaskRecord File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
createRecentTaskInfoFromTaskRecord
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public int getRequestedPasswordMinimumNonLetter(int userId) { return getDevicePolicyManager().getPasswordMinimumNonLetter(null, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestedPasswordMinimumNonLetter File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getRequestedPasswordMinimumNonLetter
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
public StatementList getStmts() { return stmts; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStmts File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
getStmts
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
protected abstract BigDecimal bcdToBigDecimal();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bcdToBigDecimal File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
bcdToBigDecimal
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
@Column(name = "status", nullable = false) public int getStatus() { return this.status; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatus File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getStatus
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = { "/history-server" }) public String actionHistoryServer(final HttpServletRequest theReq, final HomeRequest theRequest, final BindingResult theBindingResult, final ModelMap theModel) { doActionHistory(theReq, theRequest, theBindingResult, theModel, "history-server", "Server History"); return "result"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: actionHistoryServer File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-24301
MEDIUM
4.3
hapifhir/hapi-fhir
actionHistoryServer
hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java
adb3734fcbbf9a9165445e9ee5eef168dbcaedaf
0
Analyze the following code function for security vulnerabilities
public static Object getMapValue(String key, Map<String, Object> map) { try { try { if(((Object[]) map.get(key)).length > 1) { String returnValue = ""; for(Object object : ((Object[]) map.get(key))) { returnValue += object.toString() + ", "; } returnValue = returnValue.substring(0,returnValue.lastIndexOf(",")); return returnValue; } } catch(Exception ex) {} return ((Object[]) map.get(key))[0]; } catch (Exception e) { try { return (Object) map.get(key); } catch (Exception ex) { return null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMapValue File: src/com/dotmarketing/factories/EmailFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
getMapValue
src/com/dotmarketing/factories/EmailFactory.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
private InternalSkinManager getInternalSkinManager() { if (this.internalSkinManager == null) { this.internalSkinManager = Utils.getComponent(InternalSkinManager.class); } return this.internalSkinManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInternalSkinManager File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getInternalSkinManager
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY, conditional = true) public @Nullable CharSequence getOrganizationName(@Nullable ComponentName admin) { throwIfParentInstance("getOrganizationName"); try { return mService.getOrganizationName(admin, mContext.getPackageName()); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrganizationName File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getOrganizationName
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static AbstractProject findNearest(String name) { return findNearest(name,Hudson.getInstance()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findNearest File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
findNearest
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
private void registerPongTimeout(long wait_time, String id) { mPingID = id; mPingTimestamp = System.currentTimeMillis(); debugLog(String.format("Ping: registering timeout for %s: %1.3fs", id, wait_time/1000.)); mAlarmManager.set(AlarmManager.RTC_WAKEUP, System.currentTimeMillis() + wait_time, mPongTimeoutAlarmPendIntent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerPongTimeout File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
registerPongTimeout
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public SecurityRole build() { return new SecurityRole(name, ipatterns, WildcardMatcher.from(clusterPerms)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
build
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
private static EntityReferenceSerializer<String> getCompactEntityReferenceSerializer() { return Utils.getComponent(EntityReferenceSerializer.TYPE_STRING, "compact"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCompactEntityReferenceSerializer File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getCompactEntityReferenceSerializer
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@ModelAttribute("request") public HttpServletRequest request(HttpServletRequest request) { return request; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: request File: src/main/java/com/unboundid/webapp/ssam/SSAMController.java Repository: pingidentity/ssam The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-25084
MEDIUM
4
pingidentity/ssam
request
src/main/java/com/unboundid/webapp/ssam/SSAMController.java
f64b10d63bb19ca2228b0c2d561a1a6e5a3bf251
0
Analyze the following code function for security vulnerabilities
@Column(name = "serial_number", nullable = false, length = 100) public String getSerialNumber() { return this.serialNumber; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSerialNumber File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getSerialNumber
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
private void sendMessage(String iface, Handler handler, Message message) { message.setTarget(handler); // getData() will return the existing Bundle if it exists, or create a new one // This prevents clearing the existing data. message.getData().putString(KEY_IFACE, iface); message.sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendMessage File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
sendMessage
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void pushVolumeUpdate() { PlaybackInfo info; synchronized (mLock) { if (mDestroyed) { return; } info = getVolumeAttributes(); } Collection<ISessionControllerCallbackHolder> deadCallbackHolders = null; for (ISessionControllerCallbackHolder holder : mControllerCallbackHolders) { try { holder.mCallback.onVolumeInfoChanged(info); } catch (DeadObjectException e) { if (deadCallbackHolders == null) { deadCallbackHolders = new ArrayList<>(); } deadCallbackHolders.add(holder); logCallbackException("Removing dead callback in pushVolumeUpdate", holder, e); } catch (RemoteException e) { logCallbackException("unexpected exception in pushVolumeUpdate", holder, e); } } if (deadCallbackHolders != null) { mControllerCallbackHolders.removeAll(deadCallbackHolders); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushVolumeUpdate File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
pushVolumeUpdate
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public boolean launchAssistIntent(Intent intent, int requestType, String hint, int userHandle, Bundle args) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchAssistIntent File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
launchAssistIntent
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public int getAttributeCount() { if (mEventType == START_TAG) { final int count = nativeGetAttributeCount(mParseState); if (count == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null document"); } return count; } else { return -1; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeCount File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeCount
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public Set<Label> getLabels() { Set<Label> r = new TreeSet<Label>(); for (Label l : labels.values()) { if(!l.isEmpty()) r.add(l); } return r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLabels File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getLabels
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public SSLEngineResult.HandshakeStatus getHandshakeStatus() { debug("JSSEngine: getHandshakeStatus()"); // If task is NULL, we need to update the state to check if the // task has been "run". Even if it isn't, it would be good to // update the status here as well. However, we DO NOT want to // call updateHandshakeState() in the event we have a task to // run: we need to run it still! if (checkNeedCertValidation()) { return handshake_state; } // Always update the handshake state; this ensures that we catch // looping due to missing data and flip our expected direction. updateHandshakeState(); return handshake_state; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHandshakeStatus File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java Repository: dogtagpki/jss The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-4213
HIGH
7.5
dogtagpki/jss
getHandshakeStatus
src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
5922560a78d0dee61af8a33cc9cfbf4cfa291448
0
Analyze the following code function for security vulnerabilities
private void deactivateSessionDestructionContext(HttpSession session) { HttpSessionDestructionContext context = getSessionDestructionContext(); if (context.isActive()) { context.deactivate(); context.dissociate(session); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deactivateSessionDestructionContext File: impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
deactivateSessionDestructionContext
impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
static @Nullable ActivityRecord forTokenLocked(IBinder token) { if (token == null) return null; final Token activityToken; try { activityToken = (Token) token; } catch (ClassCastException e) { Slog.w(TAG, "Bad activity token: " + token, e); return null; } final ActivityRecord r = activityToken.mActivityRef.get(); return r == null || r.getRootTask() == null ? null : r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forTokenLocked File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
forTokenLocked
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public String getLogDetails(ApiCaseRelevanceRequest request) { Map<String, List<String>> mapping = request.getMapping(); Set<String> set = mapping.keySet(); if (CollectionUtils.isNotEmpty(set)) { ApiScenarioExample example = new ApiScenarioExample(); example.createCriteria().andIdIn(new ArrayList<>(set)); List<ApiScenario> scenarios = apiScenarioMapper.selectByExample(example); List<String> names = scenarios.stream().map(ApiScenario::getName).collect(Collectors.toList()); TestPlan testPlan = testPlanMapper.selectByPrimaryKey(request.getPlanId()); OperatingLogDetails details = new OperatingLogDetails(JSON.toJSONString(request.getSelectIds()), testPlan.getProjectId(), String.join(",", names), testPlan.getCreator(), new LinkedList<>()); return JSON.toJSONString(details); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogDetails File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getLogDetails
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
private static List<String> targetUriToStringList(TransactionContext txnCtx, NodeContext nodeCtx, Symbol targetUri) { Object value = SymbolEvaluator.evaluate(txnCtx, nodeCtx, targetUri, Row.EMPTY, SubQueryResults.EMPTY); if (targetUri.valueType().id() == DataTypes.STRING.id()) { String uri = (String) value; return Collections.singletonList(uri); } else if (DataTypes.STRING_ARRAY.equals(targetUri.valueType())) { return DataTypes.STRING_ARRAY.implicitCast(value); } // this case actually never happens because the check is already done in the analyzer throw AnalyzedCopyFrom.raiseInvalidType(targetUri.valueType()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: targetUriToStringList File: server/src/main/java/io/crate/execution/engine/collect/sources/FileCollectSource.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
targetUriToStringList
server/src/main/java/io/crate/execution/engine/collect/sources/FileCollectSource.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
protected void writeDesign(Element element, DesignContext designContext) { Attributes attributes = element.attributes(); ColumnState defaultState = new ColumnState(); if (getId() == null) { setId("column" + getGrid().getColumns().indexOf(this)); } DesignAttributeHandler.writeAttribute("column-id", attributes, getId(), null, String.class, designContext); // Sortable is a special attribute that depends on the data // provider. DesignAttributeHandler.writeAttribute("sortable", attributes, isSortable(), null, boolean.class, designContext); DesignAttributeHandler.writeAttribute("editable", attributes, isEditable(), defaultState.editable, boolean.class, designContext); DesignAttributeHandler.writeAttribute("resizable", attributes, isResizable(), defaultState.resizable, boolean.class, designContext); DesignAttributeHandler.writeAttribute("hidable", attributes, isHidable(), defaultState.hidable, boolean.class, designContext); DesignAttributeHandler.writeAttribute("hidden", attributes, isHidden(), defaultState.hidden, boolean.class, designContext); DesignAttributeHandler.writeAttribute("hiding-toggle-caption", attributes, getHidingToggleCaption(), defaultState.hidingToggleCaption, String.class, designContext); DesignAttributeHandler.writeAttribute("width", attributes, getWidth(), defaultState.width, Double.class, designContext); DesignAttributeHandler.writeAttribute("min-width", attributes, getMinimumWidth(), defaultState.minWidth, Double.class, designContext); DesignAttributeHandler.writeAttribute("max-width", attributes, getMaximumWidth(), defaultState.maxWidth, Double.class, designContext); DesignAttributeHandler.writeAttribute("expand", attributes, getExpandRatio(), defaultState.expandRatio, Integer.class, designContext); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeDesign File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
writeDesign
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public boolean shouldDumpDetails() { return mDumpDetails; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDumpDetails File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
shouldDumpDetails
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder stripWhitespaceOnlyTextNodes() throws XPathExpressionException { super.stripWhitespaceOnlyTextNodesImpl(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stripWhitespaceOnlyTextNodes File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
stripWhitespaceOnlyTextNodes
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
@Test public void executeTransNullConnection(TestContext context) throws Exception { setRootLevel(Level.FATAL); postgresClient().execute(null, "SELECT 1", context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeTransNullConnection File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
executeTransNullConnection
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void removeFields() { pageRefs.resetReleasePage(); for (int k = 1; k <= pageRefs.size(); ++k) { PdfDictionary page = pageRefs.getPageN(k); PdfArray annots = page.getAsArray(PdfName.ANNOTS); if (annots == null) { pageRefs.releasePage(k); continue; } for (int j = 0; j < annots.size(); ++j) { PdfObject obj = getPdfObjectRelease(annots.getPdfObject(j)); if (obj == null || !obj.isDictionary()) continue; PdfDictionary annot = (PdfDictionary)obj; if (PdfName.WIDGET.equals(annot.get(PdfName.SUBTYPE))) annots.remove(j--); } if (annots.isEmpty()) page.remove(PdfName.ANNOTS); else pageRefs.releasePage(k); } catalog.remove(PdfName.ACROFORM); pageRefs.resetReleasePage(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeFields File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
removeFields
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public void requestInteractiveBugReportWithDescription(String shareTitle, String shareDescription) { requestBugReportWithDescription(shareTitle, shareDescription, BugreportParams.BUGREPORT_MODE_INTERACTIVE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestInteractiveBugReportWithDescription File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
requestInteractiveBugReportWithDescription
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void visitorPermission(Invocation ai) { ai.invoke(); String templateName = ai.getReturnValue(); if (templateName == null) { return; } GlobalResourceHandler.printUserTime("Template before"); String templatePath = TemplateHelper.fullTemplateInfo(ai.getController(), true); GlobalResourceHandler.printUserTime("Template after"); TemplateVO templateVO = new TemplateService().getTemplateVO(JFinal.me().getContextPath(), new File(PathKit.getWebRootPath() + templatePath)); String ext = ZrLogUtil.getViewExt(templateVO.getViewType()); if (ai.getController().getAttr("log") != null) { ai.getController().setAttr("pageLevel", 1); } else if (ai.getController().getAttr("data") != null) { if ("/".equals(ai.getActionKey()) && new File(PathKit.getWebRootPath() + templatePath + "/" + templateName + ext).exists()) { ai.getController().setAttr("pageLevel", 2); } else { templateName = "page"; ai.getController().setAttr("pageLevel", 1); } } else { ai.getController().setAttr("pageLevel", 2); } fullDevData(ai.getController()); ai.getController().render(templatePath + "/" + templateName + ext); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2020-21316 - Severity: MEDIUM - CVSS Score: 4.3 Description: Fix #55,#56 xxs inject Function: visitorPermission File: web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java Repository: 94fzb/zrlog Fixed Code: private void visitorPermission(Invocation ai) { ai.invoke(); String templateName = ai.getReturnValue(); if (templateName == null) { return; } GlobalResourceHandler.printUserTime("Template before"); String templatePath = TemplateHelper.fullTemplateInfo(ai.getController(), true); GlobalResourceHandler.printUserTime("Template after"); TemplateVO templateVO = new TemplateService().getTemplateVO(JFinal.me().getContextPath(), new File(PathKit.getWebRootPath() + templatePath)); String ext = ZrLogUtil.getViewExt(templateVO.getViewType()); if (ai.getController().getAttr("log") != null) { ai.getController().setAttr("pageLevel", 1); } else if (ai.getController().getAttr("data") != null) { if ("/".equals(ai.getActionKey()) && new File(PathKit.getWebRootPath() + templatePath + "/" + templateName + ext).exists()) { ai.getController().setAttr("pageLevel", 2); } else { templateName = "page"; ai.getController().setAttr("pageLevel", 1); } } else { ai.getController().setAttr("pageLevel", 2); } fullDevData(ai.getController()); String viewPath = templatePath + "/" + templateName + ext; if (ext.equals(".ftl")) { BlogFrontendFreeMarkerRender render = new BlogFrontendFreeMarkerRender(viewPath); render.setContext(ai.getController().getRequest(), ai.getController().getResponse()); ai.getController().render(render); } else { ai.getController().render(viewPath); } }
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
visitorPermission
web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java
b921c1ae03b8290f438657803eee05226755c941
1
Analyze the following code function for security vulnerabilities
public String[] getCommandline() { final String[] args = getArguments(); String executable = getExecutable(); if ( executable == null ) { return args; } final String[] result = new String[args.length + 1]; result[0] = executable; System.arraycopy( args, 0, result, 1, args.length ); return result; }
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2017-1000487 - Severity: HIGH - CVSS Score: 7.5 Description: [PLXUTILS-161] Commandline shell injection problems Patch by Charles Duffy, applied unmodified Function: getCommandline File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java Repository: codehaus-plexus/plexus-utils Fixed Code: public String[] getCommandline() { final String[] args = getArguments(); String executable = getLiteralExecutable(); if ( executable == null ) { return args; } final String[] result = new String[args.length + 1]; result[0] = executable; System.arraycopy( args, 0, result, 1, args.length ); return result; }
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
getCommandline
src/main/java/org/codehaus/plexus/util/cli/Commandline.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
1
Analyze the following code function for security vulnerabilities
private Object readResolve() { securityWarningGiven = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readResolve File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-78" ]
CVE-2020-26217
HIGH
9.3
x-stream/xstream
readResolve
xstream/src/java/com/thoughtworks/xstream/XStream.java
0fec095d534126931c99fd38e9c6d41f5c685c1a
0
Analyze the following code function for security vulnerabilities
@Override public Node renameNode(Node n, String namespaceURI, String qualifiedName) throws DOMException { return doc.renameNode(n, namespaceURI, qualifiedName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameNode File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
renameNode
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
private static Callable<byte[]> requestWithPostAndResponse(final URL url, final Proxy proxy, final SecurityAuthentication authentication, final String data, final Map<String, Object> headers) { return new Callable<byte[]>() { public byte[] call() throws IOException { // Add proxy, if passed throw parameters final URLConnection connection = proxy == null ? url.openConnection() : url.openConnection(proxy); if (connection == null) return null; final boolean withContent = StringUtils.isNotEmpty(data); final HttpURLConnection http = (HttpURLConnection) connection; http.setRequestMethod("POST"); if (withContent) http.setDoOutput(true); applyEndpointAccessAuthentication(http, authentication); applyAdditionalHeaders(http, headers); final Charset charSet = extractCharset(http.getRequestProperty("Content-Type")); if (withContent) sendRequestAsBytes(http, data.getBytes(charSet != null ? charSet : StandardCharsets.UTF_8)); return retrieveResponseAsBytes(http); } }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestWithPostAndResponse File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
requestWithPostAndResponse
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public Translations toRestTranslations(URI baseUri, Document doc) throws XWikiException { Translations translations = this.objectFactory.createTranslations(); Locale defaultLocale = getDefaultLocale(doc); translations.setDefault(defaultLocale.toString()); List<Locale> locales = doc.getTranslationLocales(); List<String> spaces = Utils.getSpacesFromSpaceId(doc.getSpace()); // Add the default (original) page translation, if it makes sense. if (!locales.isEmpty() && !Locale.ROOT.equals(defaultLocale)) { Translation translation = this.objectFactory.createTranslation(); translation.setLanguage(translations.getDefault()); String pageTranslationUri = Utils .createURI(baseUri, PageResource.class, doc.getWiki(), spaces, doc.getDocumentReference().getName()) .toString(); Link pageTranslationLink = this.objectFactory.createLink(); pageTranslationLink.setHref(pageTranslationUri); pageTranslationLink.setRel(Relations.PAGE); translation.getLinks().add(pageTranslationLink); String historyUri = Utils.createURI(baseUri, PageHistoryResource.class, doc.getWiki(), spaces, doc.getDocumentReference().getName()).toString(); Link historyLink = this.objectFactory.createLink(); historyLink.setHref(historyUri); historyLink.setRel(Relations.HISTORY); translation.getLinks().add(historyLink); translations.getTranslations().add(translation); } for (Locale locale : locales) { Translation translation = this.objectFactory.createTranslation(); translation.setLanguage(locale.toString()); String pageTranslationUri = Utils.createURI(baseUri, PageTranslationResource.class, doc.getWiki(), spaces, doc.getDocumentReference().getName(), locale).toString(); Link pageTranslationLink = this.objectFactory.createLink(); pageTranslationLink.setHref(pageTranslationUri); pageTranslationLink.setRel(Relations.PAGE); translation.getLinks().add(pageTranslationLink); String historyUri = Utils.createURI(baseUri, PageTranslationHistoryResource.class, doc.getWiki(), spaces, doc.getDocumentReference().getName(), locale).toString(); Link historyLink = this.objectFactory.createLink(); historyLink.setHref(historyUri); historyLink.setRel(Relations.HISTORY); translation.getLinks().add(historyLink); translations.getTranslations().add(translation); } return translations; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toRestTranslations File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-35151
HIGH
7.5
xwiki/xwiki-platform
toRestTranslations
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java
824cd742ecf5439971247da11bfe7e0ad2b10ede
0
Analyze the following code function for security vulnerabilities
public static BufferedImage getDotd() { return getImage("dotd.png"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDotd File: src/net/sourceforge/plantuml/version/PSystemVersion.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getDotd
src/net/sourceforge/plantuml/version/PSystemVersion.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public <T> List<T> search(String sql, XWikiContext context) throws XWikiException { return getStore().search(sql, 0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: search File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
search
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void setStoreMetaSourceInformation(StoreMetaSourceInformationEnum theStoreMetaSourceInformation) { Validate.notNull(theStoreMetaSourceInformation, "theStoreMetaSourceInformation must not be null"); myStoreMetaSourceInformation = theStoreMetaSourceInformation; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStoreMetaSourceInformation File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setStoreMetaSourceInformation
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Override public boolean supportsOption(Option<?> option) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsOption File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
supportsOption
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
@Override public void onActivityResult(int requestCode, int resultCode, Intent data) { super.onActivityResult(requestCode, resultCode, data); switch (requestCode) { case CONFIRM_EXISTING_REQUEST: if (resultCode != Activity.RESULT_OK) { getActivity().setResult(RESULT_FINISHED); getActivity().finish(); } else { mCurrentCredential = data.getParcelableExtra( ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); } updateStage(Stage.Introduction); break; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onActivityResult File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onActivityResult
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
private void pauseCapture() { int end=current==-1 ? index : index-1; captureBuffer.append(buffer, captureStart, end-captureStart); captureStart=-1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pauseCapture File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
pauseCapture
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
public static int generateId(final String url, final String path, final boolean pathAsDirectory) { return CustomComponentHolder.getImpl().getIdGeneratorInstance() .generateId(url, path, pathAsDirectory); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateId File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
generateId
library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate[] findByGroupId_PrevAndNext(long kbTemplateId, long groupId, OrderByComparator<KBTemplate> orderByComparator) throws NoSuchTemplateException { KBTemplate kbTemplate = findByPrimaryKey(kbTemplateId); Session session = null; try { session = openSession(); KBTemplate[] array = new KBTemplateImpl[3]; array[0] = getByGroupId_PrevAndNext(session, kbTemplate, groupId, orderByComparator, true); array[1] = kbTemplate; array[2] = getByGroupId_PrevAndNext(session, kbTemplate, groupId, orderByComparator, false); return array; } catch (Exception e) { throw processException(e); } finally { closeSession(session); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByGroupId_PrevAndNext File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByGroupId_PrevAndNext
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
@Override public void setFactoryResetProtectionPolicy(ComponentName who, @Nullable FactoryResetProtectionPolicy policy) { if (!mHasFeature) { return; } Preconditions.checkNotNull(who, "ComponentName is null"); CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwnerOfOrganizationOwnedDevice(caller)); checkCanExecuteOrThrowUnsafe(DevicePolicyManager .OPERATION_SET_FACTORY_RESET_PROTECTION_POLICY); final int frpManagementAgentUid = getFrpManagementAgentUidOrThrow(); synchronized (getLockObject()) { ActiveAdmin admin = getProfileOwnerOrDeviceOwnerLocked(caller); admin.mFactoryResetProtectionPolicy = policy; saveSettingsLocked(caller.getUserId()); } mInjector.binderWithCleanCallingIdentity( () -> notifyResetProtectionPolicyChanged(frpManagementAgentUid)); DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_FACTORY_RESET_PROTECTION) .setAdmin(who) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFactoryResetProtectionPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setFactoryResetProtectionPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void suspendPersonalAppsInternal(int userId, boolean suspended) { if (getUserData(userId).mAppsSuspended == suspended) { return; } Slogf.i(LOG_TAG, "%s personal apps for user %d", suspended ? "Suspending" : "Unsuspending", userId); if (suspended) { suspendPersonalAppsInPackageManager(userId); } else { mInjector.getPackageManagerInternal().unsuspendForSuspendingPackage( PLATFORM_PACKAGE_NAME, userId); } synchronized (getLockObject()) { getUserData(userId).mAppsSuspended = suspended; saveSettingsLocked(userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: suspendPersonalAppsInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
suspendPersonalAppsInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void register(Module module) { this.modules.add(module); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: register File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java Repository: alibaba/fastjson The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-25845
MEDIUM
6.8
alibaba/fastjson
register
src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
8f3410f81cbd437f7c459f8868445d50ad301f15
0
Analyze the following code function for security vulnerabilities
public String toXML(boolean bWithObjects, boolean bWithRendering, boolean bWithAttachmentContent, boolean bWithVersions, XWikiContext context) throws XWikiException { StringWriter writer = new StringWriter(); toXML(new DefaultWriterOutputTarget(writer), bWithObjects, bWithRendering, bWithAttachmentContent, bWithVersions, true, context != null ? context.getWiki().getEncoding() : StandardCharsets.UTF_8.name()); return writer.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toXML File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
toXML
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private @Nonnull Cause trim(@Nonnull Cause c, int depth, Set<String> traversed) { if (!(c instanceof UpstreamCause)) { return c; } UpstreamCause uc = (UpstreamCause) c; List<Cause> cs = new ArrayList<Cause>(); if (depth > 0) { if (traversed.add(uc.upstreamUrl + uc.upstreamBuild)) { for (Cause c2 : uc.upstreamCauses) { cs.add(trim(c2, depth - 1, traversed)); } } } else if (traversed.size() < MAX_LEAF) { cs.add(new DeeplyNestedUpstreamCause()); } return new UpstreamCause(uc.upstreamProject, uc.upstreamBuild, uc.upstreamUrl, cs); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trim File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
trim
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
@Override public void setWriteListener(WriteListener writeListener) { // ignore }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWriteListener File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
setWriteListener
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@Override protected AESDecrypter initializeDecrypter(LocalFileHeader localFileHeader, char[] password, boolean useUtf8ForPassword) throws IOException { return new AESDecrypter(localFileHeader.getAesExtraDataRecord(), password, getSalt(localFileHeader), getPasswordVerifier(), useUtf8ForPassword); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initializeDecrypter File: src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
initializeDecrypter
src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
public void setHeightByRows(double rows) { if (rows <= 0.0d) { throw new IllegalArgumentException( "More than zero rows must be shown."); } if (Double.isInfinite(rows)) { throw new IllegalArgumentException( "Grid doesn't support infinite heights"); } if (Double.isNaN(rows)) { throw new IllegalArgumentException("NaN is not a valid row count"); } getState().heightMode = HeightMode.ROW; getState().heightByRows = rows; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHeightByRows File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setHeightByRows
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
protected void onAttach() { List<Pair<StateNode, Boolean>> attachedNodes = new ArrayList<>(); visitNodeTreeBottomUp(node -> attachedNodes .add(new Pair<>(node, node.handleOnAttach()))); for (Pair<StateNode, Boolean> pair : attachedNodes) { final boolean isInitial = pair.getSecond(); final StateNode node = pair.getFirst(); if (node.isRegistered() && (isInitial || node.hasBeenDetached)) { node.hasBeenAttached = true; node.fireAttachListeners(isInitial); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAttach File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
onAttach
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
@Override protected void onMeasure(int widthMeasureSpec, int heightMeasureSpec) { super.onMeasure(widthMeasureSpec, heightMeasureSpec); int width = MeasureSpec.getSize(widthMeasureSpec); int height = MeasureSpec.getSize(heightMeasureSpec); if (mTextLine1.getMeasuredWidth() != width || mTextLine1.getMeasuredHeight() != height) { mTextLine1.measure( MeasureSpec.makeMeasureSpec(widthMeasureSpec, MeasureSpec.AT_MOST), MeasureSpec.makeMeasureSpec(mSuggestionHeight, MeasureSpec.AT_MOST)); } if (mTextLine2.getMeasuredWidth() != width || mTextLine2.getMeasuredHeight() != height) { mTextLine2.measure( MeasureSpec.makeMeasureSpec(widthMeasureSpec, MeasureSpec.AT_MOST), MeasureSpec.makeMeasureSpec(mSuggestionHeight, MeasureSpec.AT_MOST)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onMeasure File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onMeasure
chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Override public Set<String> getOfflineStaticResources() { Set<String> urls = new HashSet<String>(); String contextPath = AppUtil.getRequestContextPath(); String pathName = getPathName(); String bn = ResourceBundleUtil.getMessage("build.number"); urls.add(contextPath + "/wro/common.css"); urls.add(contextPath + "/wro/" + pathName + ".preload.min.css"); urls.add(contextPath + "/wro/" + pathName + ".min.css"); urls.add(contextPath + "/wro/common.preload.js?build=" + bn); urls.add(contextPath + "/wro/common.js?build=" + bn); urls.add(contextPath + "/wro/form_common.js?build=" + bn); urls.add(contextPath + "/wro/" + pathName + ".preload.min.js"); urls.add(contextPath + "/wro/" + pathName + ".min.js"); urls.add(contextPath + "/" + pathName +"/lib/responsive-switch.min.js"); return urls; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOfflineStaticResources File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
getOfflineStaticResources
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
public String[] split(String str, String sep) { return StringUtils.split(str, sep); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: split File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
split
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public boolean enablePhoneAccount(PhoneAccountHandle accountHandle, boolean isEnabled) { enforceModifyPermission(); synchronized (mLock) { long token = Binder.clearCallingIdentity(); try { // enable/disable phone account return mPhoneAccountRegistrar.enablePhoneAccount(accountHandle, isEnabled); } finally { Binder.restoreCallingIdentity(token); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enablePhoneAccount File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
enablePhoneAccount
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
public boolean equals(Object object) { return object == null || object == this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
equals
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
@Override public void setContentType(String arg0) { // ignore }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContentType File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
setContentType
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private Collection<String> getStartedContainers(Collection<JsonNode> containerStatusNodes) { Collection<String> startedContainers = new HashSet<>(); for (JsonNode containerStatusNode: containerStatusNodes) { JsonNode stateNode = containerStatusNode.get("state"); if (stateNode.get("running") != null || stateNode.get("terminated") != null) startedContainers.add(containerStatusNode.get("name").asText()); } return startedContainers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStartedContainers File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
getStartedContainers
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
public String getAttributeType(int index) { return "CDATA"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeType File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeType
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public WindowContainerToken getLaunchTaskDisplayArea() { return mLaunchTaskDisplayArea; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchTaskDisplayArea File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getLaunchTaskDisplayArea
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
private String getFormat() { return mFormat; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFormat File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getFormat
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
@Override public int signum() { return isNegative() ? -1 : isZero() ? 0 : 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: signum File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
signum
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
ActiveAdmin getProfileOwnerLocked(@UserIdInt int userId) { ensureLocked(); final ComponentName poAdminComponent = mOwners.getProfileOwnerComponent(userId); ActiveAdmin poAdmin = getUserData(userId).mAdminMap.get(poAdminComponent); return poAdmin; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileOwnerLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getProfileOwnerLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public ServerBuilder localPort(int port, Iterable<SessionProtocol> protocols) { final long portGroup = ServerPort.nextPortGroup(); port(new ServerPort(new InetSocketAddress(NetUtil.LOCALHOST4, port), protocols, portGroup)); if (SystemInfo.hasIpV6()) { port(new ServerPort(new InetSocketAddress(NetUtil.LOCALHOST6, port), protocols, portGroup)); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: localPort File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
localPort
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
private void addPasspointInfoToLinkProperties(LinkProperties linkProperties) { // CaptivePortalData.Builder.setVenueFriendlyName API not available on R if (!SdkLevel.isAtLeastS()) { return; } WifiConfiguration currentNetwork = getConnectedWifiConfigurationInternal(); if (currentNetwork == null || !currentNetwork.isPasspoint()) { return; } ScanResult scanResult = mScanRequestProxy.getScanResult(mLastBssid); if (scanResult == null) { return; } URL venueUrl = mPasspointManager.getVenueUrl(scanResult); // Update the friendly name to populate the notification CaptivePortalData.Builder captivePortalDataBuilder = new CaptivePortalData.Builder() .setVenueFriendlyName(currentNetwork.providerFriendlyName); // Update the Venue URL if available if (venueUrl != null) { captivePortalDataBuilder.setVenueInfoUrl(Uri.parse(venueUrl.toString()), CaptivePortalData.CAPTIVE_PORTAL_DATA_SOURCE_PASSPOINT); } // Update the T&C URL if available. The network is captive if T&C URL is available if (mTermsAndConditionsUrl != null) { captivePortalDataBuilder.setUserPortalUrl( Uri.parse(mTermsAndConditionsUrl.toString()), CaptivePortalData.CAPTIVE_PORTAL_DATA_SOURCE_PASSPOINT).setCaptive(true); } linkProperties.setCaptivePortalData(captivePortalDataBuilder.build()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPasspointInfoToLinkProperties File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
addPasspointInfoToLinkProperties
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public Form<T> fill(T value) { if (value == null) { throw new RuntimeException("Cannot fill a form with a null value"); } return new Form<>( rootName, backedType, new HashMap<>(), new HashMap<>(), new ArrayList<>(), Optional.ofNullable(value), groups, messagesApi, formatters, validatorFactory, config, lang, directFieldAccess); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fill File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
fill
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
WindowState findMainWindow(boolean includeStartingApp) { WindowState candidate = null; for (int j = mChildren.size() - 1; j >= 0; --j) { final WindowState win = mChildren.get(j); final int type = win.mAttrs.type; // No need to loop through child window as base application and starting types can't be // child windows. if (type == TYPE_BASE_APPLICATION || (includeStartingApp && type == TYPE_APPLICATION_STARTING)) { // In cases where there are multiple windows, we prefer the non-exiting window. This // happens for example when replacing windows during an activity relaunch. When // constructing the animation, we want the new window, not the exiting one. if (win.mAnimatingExit) { candidate = win; } else { return win; } } } return candidate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findMainWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
findMainWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Test public void getByIdsInvalidJson(TestContext context) { // let the JSON to POJO conversion fail createInvalidJson(context).getById( INVALID_JSON, new JsonArray().add(INVALID_JSON_UUID), StringPojo.class, context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByIdsInvalidJson File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getByIdsInvalidJson
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public String getLocalName() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalName File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getLocalName
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private void addResources() { add(new BaseResourceMapper("downloads/server-log", new ServerLogResourceReference())); add(new BaseResourceMapper("downloads/projects/${project}/builds/${build}/log", new BuildLogResourceReference())); add(new BaseResourceMapper("projects/${project}/archive/${revision}", new ArchiveResourceReference())); add(new DynamicPathResourceMapper("projects/${project}/raw/${revision}/${path}", new RawBlobResourceReference())); add(new BaseResourceMapper("projects/${project}/attachment/${uuid}/${attachment}", new AttachmentResourceReference())); add(new DynamicPathResourceMapper("downloads/projects/${project}/builds/${build}/artifacts/${path}", new ArtifactResourceReference())); add(new BaseResourceMapper(SvgSpriteResourceReference.DEFAULT_MOUNT_PATH, new SvgSpriteResourceReference(IconScope.class))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addResources File: server-core/src/main/java/io/onedev/server/web/BaseUrlMapper.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
addResources
server-core/src/main/java/io/onedev/server/web/BaseUrlMapper.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object obj) { if (obj == null) { return false; } if (getClass() != obj.getClass()) { return false; } final ClasspathResourceHelper other = (ClasspathResourceHelper) obj; if (this.cacheTimestamp != other.cacheTimestamp) { return false; } if (this.enableMissingResourceLibraryDetection != other.enableMissingResourceLibraryDetection) { return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-6950
MEDIUM
4.3
eclipse-ee4j/mojarra
equals
impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java
cefbb9447e7be560e59da2da6bd7cb93776f7741
0
Analyze the following code function for security vulnerabilities
void reset() { changes = 0; activityRelaunched = false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reset File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
reset
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
void updateTokenInPlaceLocked(AppWindowToken wtoken, int transit) { if (transit != AppTransition.TRANSIT_UNSET) { if (wtoken.mAppAnimator.animation == AppWindowAnimator.sDummyAnimation) { wtoken.mAppAnimator.animation = null; } applyAnimationLocked(wtoken, null, transit, false, false); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTokenInPlaceLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
updateTokenInPlaceLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Exported public ModuleLocation[] getLocations() { return getLocations(null, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocations File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getLocations
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public String displayHidden(com.xpn.xwiki.api.PropertyClass pclass, String prefix, Collection object) { if ((pclass == null) || (object == null)) { return ""; } return this.doc.displayHidden(pclass.getBasePropertyClass(), prefix, object.getCollection(), getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayHidden File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
displayHidden
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0