instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { doPost(request, response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doGet File: dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
doGet
dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
public String getChannelId() { return mChannelId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChannelId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getChannelId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void setPolicyUpdate(UpdateParameter policyUpdate) { mPolicyUpdate = policyUpdate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPolicyUpdate File: framework/java/android/net/wifi/hotspot2/pps/Policy.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21240
MEDIUM
5.5
android
setPolicyUpdate
framework/java/android/net/wifi/hotspot2/pps/Policy.java
69119d1d3102e27b6473c785125696881bce9563
0
Analyze the following code function for security vulnerabilities
@Deprecated public AttachmentVersioningStore getAttachmentVersioningStore() { return getDefaultAttachmentArchiveStore(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentVersioningStore File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getAttachmentVersioningStore
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void index(Set<TrustAnchor> anchors) { for (TrustAnchor anchor : anchors) { index(anchor); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: index File: src/platform/java/org/conscrypt/TrustedCertificateIndex.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-345" ]
CVE-2016-0818
MEDIUM
4.3
android
index
src/platform/java/org/conscrypt/TrustedCertificateIndex.java
4c9f9c2201116acf790fca25af43995d29980ee0
0
Analyze the following code function for security vulnerabilities
private void updateResizingWindows(final WindowState w) { final WindowStateAnimator winAnimator = w.mWinAnimator; if (w.mHasSurface && w.mLayoutSeq == mLayoutSeq) { w.setInsetsChanged(); boolean configChanged = w.isConfigChanged(); if (DEBUG_CONFIGURATION && configCha...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateResizingWindows File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
updateResizingWindows
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public Builder setClientAuthentication(HttpExecuteInterceptor clientAuthentication) { this.clientAuthentication = clientAuthentication; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClientAuthentication File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
setClientAuthentication
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
protected Object getItemId(String rowKey) { return getParentGrid().getKeyMapper().get(rowKey); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getItemId File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getItemId
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public static JSONObject toJSONObject(String string, boolean keepStrings) throws JSONException { return toJSONObject(new StringReader(string), keepStrings); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toJSONObject File: src/main/java/org/json/XML.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2022-45688
HIGH
7.5
stleary/JSON-java
toJSONObject
src/main/java/org/json/XML.java
f566a1d9ee1f8139357017dc6c7def1da19cd8d4
0
Analyze the following code function for security vulnerabilities
@HotPath(caller = HotPath.PROCESS_CHANGE) @Override public void handleAppDied(WindowProcessController wpc, boolean restarting, Runnable finishInstrumentationCallback) { synchronized (mGlobalLockWithoutBoost) { mTaskSupervisor.beginDeferResume(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleAppDied File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
handleAppDied
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public static int countFiles(File dir) { File[] found = dir.listFiles(); int ret = 0; if (found != null) { for (int i = 0; i < found.length; i++) { if (found[i].isDirectory()) { ret += countFiles(found[i]); } ret++; } } return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countFiles File: src/main/java/com/openkm/util/FileUtils.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-377" ]
CVE-2022-3969
MEDIUM
5.5
openkm/document-management-system
countFiles
src/main/java/com/openkm/util/FileUtils.java
c069e4d73ab8864345c25119d8459495f45453e1
0
Analyze the following code function for security vulnerabilities
@Override public void dumpHeapFinished(String path) { synchronized (this) { if (Binder.getCallingPid() != mMemWatchDumpPid) { Slog.w(TAG, "dumpHeapFinished: Calling pid " + Binder.getCallingPid() + " does not match last pid " + mMemWatchDumpPid); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpHeapFinished File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
dumpHeapFinished
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public void createAdminUser() { createAdminUser(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAdminUser File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-35157
MEDIUM
4.8
xwiki/xwiki-platform
createAdminUser
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
35e9073ffec567861e0abeea072bd97921a3decf
0
Analyze the following code function for security vulnerabilities
public PrintStream createPrintStream(Charset charset) throws FileNotFoundException, UnsupportedEncodingException { return new PrintStream(internal, charset.name()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPrintStream File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
createPrintStream
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void join(JoinBy from, JoinBy to, String operation, String joinType, String cr, Handler<AsyncResult<ResultSet>> replyHandler) { Function<TotaledResults, ResultSet> resultSetMapper = totaledResults -> totaledResults.set; join(from, to, operation, joinType, cr, resultSetMapper, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: join File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
join
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void setResourceMetaCountHardLimit(Integer theResourceMetaCountHardLimit) { myResourceMetaCountHardLimit = theResourceMetaCountHardLimit; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setResourceMetaCountHardLimit File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setResourceMetaCountHardLimit
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
List<UserReference> getLikers(EntityReference target, int offset, int limit) throws LikeException;
Vulnerability Classification: - CWE: CWE-94 - CVE: CVE-2023-35152 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-17733: Use a LiveTable to display the page liked in user profile XWIKI-17724: Display Likers in a LiveTable * Use livetables in Likes UI * Add a new missing method to count user likes globally f...
[ "CWE-94" ]
CVE-2023-35152
HIGH
8.8
xwiki/xwiki-platform
getLikers
xwiki-platform-core/xwiki-platform-like/xwiki-platform-like-api/src/main/java/org/xwiki/like/LikeManager.java
0993a7ab3c102f9ac37ffe361a83a3dc302c0e45
1
Analyze the following code function for security vulnerabilities
public static void recursiveDelete(File file, File base) throws IOException { LOG.debug("Deleting: {}", file); if (!(file.getCanonicalPath().startsWith(base.getCanonicalPath()))) { throw new IOException("Trying to delete a file outside Netx's basedir: " + file.getCanonic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recursiveDelete File: core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
recursiveDelete
core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java
2ab070cdac087bd208f64fa8138bb709f8d7680c
0
Analyze the following code function for security vulnerabilities
public Token getSessionToken(HttpServletRequest request) { return getTokenInSession(SESSION_TOKEN_KEY, request, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionToken File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getSessionToken
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public void sendError(int i) throws IOException { this.response.sendError(i); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendError File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-601" ]
CVE-2022-23618
MEDIUM
5.8
xwiki/xwiki-platform
sendError
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
5251c02080466bf9fb55288f04a37671108f8096
0
Analyze the following code function for security vulnerabilities
public ArrayList<SyncStatusInfo> getSyncStatus() { synchronized (mAuthorities) { final int N = mSyncStatus.size(); ArrayList<SyncStatusInfo> ops = new ArrayList<SyncStatusInfo>(N); for (int i=0; i<N; i++) { ops.add(mSyncStatus.valueAt(i)); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSyncStatus File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getSyncStatus
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
@CalledByNative public int getViewportWidthPix() { return mViewportWidthPix; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewportWidthPix File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getViewportWidthPix
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private final boolean isParentInstance() { return mParentInstance; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isParentInstance File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isParentInstance
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static int countImportFiles(File dir) { File[] found = dir.listFiles(new RepositoryImporter.NoVersionFilenameFilter()); int ret = 0; if (found != null) { for (int i = 0; i < found.length; i++) { //log.info("File: {}", found[i].getPath()); if (found[i].isDirectory()) { ret += countImportFi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countImportFiles File: src/main/java/com/openkm/util/FileUtils.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-377" ]
CVE-2022-3969
MEDIUM
5.5
openkm/document-management-system
countImportFiles
src/main/java/com/openkm/util/FileUtils.java
c069e4d73ab8864345c25119d8459495f45453e1
0
Analyze the following code function for security vulnerabilities
@Override public Mono<APIConnection> datasourceCreate(DatasourceConfiguration datasourceConfiguration) { return APIConnectionFactory.createConnection(datasourceConfiguration); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: datasourceCreate File: app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java Repository: appsmithorg/appsmith The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-38298
HIGH
8.8
appsmithorg/appsmith
datasourceCreate
app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java
c59351ef94f9780c2a1ffc991e29b9272ab9fe64
0
Analyze the following code function for security vulnerabilities
boolean shouldEmphasizeHttpsScheme();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldEmphasizeHttpsScheme File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
shouldEmphasizeHttpsScheme
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Override public void onFinished(Preference preference, boolean reading) { if (mInitIndex < mPreferences.size()-1 && !isFinishing()) { mInitIndex++; CallForwardEditPreference pref = mPreferences.get(mInitIndex); pref.init(this, mPhone, mReplaceInvalidCFNumbers, mCallForwa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFinished File: src/com/android/phone/CdmaCallForwardOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
onFinished
src/com/android/phone/CdmaCallForwardOptions.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
public List<Delta> getRenderedContentDiff(String fromRev, XWikiContext context) throws XWikiException, DifferentiationFailedException { XWikiDocument revdoc = context.getWiki().getDocument(this, fromRev, context); return getRenderedContentDiff(revdoc, this, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContentDiff File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRenderedContentDiff
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void addSubscription(Subscription subscription) { subscriptions.put(subscription.getId(), subscription); server.getEventBus().post(new SubscriptionCreatedEvent(subscription)); subscription.setStateListener((s, ps, cs) -> { if (cs == State.Closing) { subscripti...
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2022-25897 - Severity: HIGH - CVSS Score: 7.5 Description: Allow max MonitoredItems per session to be configured via OpcUaServerConfigLimits Function: addSubscription File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/Subsc...
[ "CWE-770" ]
CVE-2022-25897
HIGH
7.5
eclipse/milo
addSubscription
opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java
4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5
1
Analyze the following code function for security vulnerabilities
@Override public void visit(Modification modification) { modifiedFilesJson = new ArrayList(); Map<String, Object> jsonMap = new LinkedHashMap<>(); jsonMap.put("user", modification.getUserDisplayName()); jsonMap.put("revision", modification.getRevision()); jsonMap.put("date",...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-28629 - Severity: MEDIUM - CVSS Score: 5.4 Description: Improve escaping on legacy Freemarker templates Function: visit File: server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java Repository: gocd Fixed Code: ...
[ "CWE-79" ]
CVE-2023-28629
MEDIUM
5.4
gocd
visit
server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java
95f758229d419411a38577608709d8552cccf193
1
Analyze the following code function for security vulnerabilities
protected void handleServiceAccept(Buffer buffer) throws Exception { handleServiceAccept(buffer.getString(), buffer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleServiceAccept File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
handleServiceAccept
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
@Override public void disconnectActivityFromServices(Object connectionHolder) { // 'connectionHolder' is an untyped ActivityServiceConnectionsHolder final ActivityServiceConnectionsHolder holder = (ActivityServiceConnectionsHolder) connectionHolder; synchr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disconnectActivityFromServices File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
disconnectActivityFromServices
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override protected boolean canDisposeBackingStore(final AbstractAuthorityFactory backingStore) { if (backingStore instanceof DirectEpsgFactory) { return ((DirectEpsgFactory) backingStore).canDispose(); } return super.canDisposeBackingStore(backingStore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canDisposeBackingStore File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/epsg/ThreadedEpsgFactory.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
canDisposeBackingStore
modules/library/referencing/src/main/java/org/geotools/referencing/factory/epsg/ThreadedEpsgFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
public static boolean isValidJavaClassName(String className) { if (CmsStringUtil.isEmpty(className)) { return false; } int length = className.length(); boolean nodot = true; for (int i = 0; i < length; i++) { char ch = className.charAt(i); if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidJavaClassName File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
isValidJavaClassName
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
private static void metricsConfig(XmlGenerator gen, Config config) { MetricsConfig metricsConfig = config.getMetricsConfig(); gen.open("metrics", "enabled", metricsConfig.isEnabled()) .open("management-center", "enabled", metricsConfig.getManagementCenterConfig().isEnabled()) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: metricsConfig File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
metricsConfig
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
private static boolean canUploadBeRetried(OCUpload upload, boolean gotWifi, boolean isCharging) { File file = new File(upload.getLocalPath()); boolean needsWifi = upload.isUseWifiOnly(); boolean needsCharging = upload.isWhileChargingOnly(); return file.exists() && (!needsWifi || gotWifi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canUploadBeRetried File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
canUploadBeRetried
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
private String buildXmlAdditionalProperties(S3Type xmlS3) { FileSetType xmlFileSet = xmlS3.getFileSet(); if(xmlFileSet == null) { return null; } ResourceS3FileSetInfo fileSetInfo = new ResourceS3FileSetInfo(); ResourceS3AdditionalProperties ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildXmlAdditionalProperties File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure coding p...
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
buildXmlAdditionalProperties
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
public boolean isMarkedCandidate() { return markedCandidate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMarkedCandidate File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
isMarkedCandidate
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
public TimeFrameUnits getMinTimeFrameUnits() { return minTimeFrameUnits; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMinTimeFrameUnits File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4727
MEDIUM
6.1
openmrs/openmrs-module-appointmentscheduling
getMinTimeFrameUnits
api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
2ccbe39c020809765de41eeb8ee4c70b5ec49cc8
0
Analyze the following code function for security vulnerabilities
public int hashCode() { return y.hashCode() ^ super.hashCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-310" ]
CVE-2016-1000339
MEDIUM
5
bcgit/bc-java
hashCode
core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java
413b42f4d770456508585c830cfcde95f9b0e93b
0
Analyze the following code function for security vulnerabilities
@Log(title = "个人信息", businessType = BusinessType.UPDATE) @PostMapping("/update") @ResponseBody public AjaxResult update(SysUser user) { SysUser currentUser = getSysUser(); currentUser.setUserName(user.getUserName()); currentUser.setEmail(user.getEmail()); currentUser.setP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java Repository: yangzongzhuan/RuoYi The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-32065
LOW
3.5
yangzongzhuan/RuoYi
update
ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java
d8b2a9a905fb750fa60e2400238cf4750a77c5e6
0
Analyze the following code function for security vulnerabilities
@Id @Column(name = "id", unique = true, nullable = false, length = 30) public String getId() { return this.id; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getId File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-18927
LOW
3.5
sanluan/PublicCMS
getId
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java
2b411dc2821c69539138aaf7632b938b659a58fa
0
Analyze the following code function for security vulnerabilities
@Override public void onSimStateChanged(int subId, int slotId, int simState) { if (DEBUG_SIM_STATES) { Log.d(TAG, "onSimStateChanged(subId=" + subId + ", slotId=" + slotId + ",state=" + simState + ")"); } int size = mKeyguardStateCall...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSimStateChanged File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onSimStateChanged
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
void onConnectionServiceChanged( Call call, ConnectionServiceWrapper oldService, ConnectionServiceWrapper newService);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConnectionServiceChanged File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
onConnectionServiceChanged
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
void dump(PrintWriter pw, String prefix) { pw.print(prefix); pw.print("title: "); pw.println(mTitle); pw.print(prefix); pw.print("subtitle: "); pw.println(mSubTitle); pw.print(prefix); pw.print("pendingUi: "); pw.println(mPendingUi); pw.print(prefix); pw.print("service: "); pw.println(mS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-610" ]
CVE-2023-40133
MEDIUM
5.5
android
dump
services/autofill/java/com/android/server/autofill/ui/SaveUi.java
08becc8c600f14c5529115cc1a1e0c97cd503f33
0
Analyze the following code function for security vulnerabilities
@Override public Citation getAuthority() { final Citation authority = super.getAuthority(); return (authority != null) ? authority : Citations.EPSG; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthority File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/epsg/ThreadedEpsgFactory.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getAuthority
modules/library/referencing/src/main/java/org/geotools/referencing/factory/epsg/ThreadedEpsgFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
void pendingAssistExtrasTimedOut(PendingAssistExtras pae) { IAssistDataReceiver receiver; synchronized (this) { mPendingAssistExtras.remove(pae); receiver = pae.receiver; } if (receiver != null) { // Caller wants result sent back to them. B...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pendingAssistExtrasTimedOut File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
pendingAssistExtrasTimedOut
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public CertPath getCertPath(CertPath cPath) { // Parameter ignored. return currentlyUsed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCertPath File: core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
getCertPath
core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java
2fd1e4b769911f2c6f7f3902f7ea21568ddc2f99
0
Analyze the following code function for security vulnerabilities
@Test public void setColorParams() throws Exception { assertPlotParam("bgcolor", "x000000"); assertPlotParam("bgcolor", "XDEADBE"); assertPlotParam("bgcolor", "%58DEADBE"); assertInvalidPlotParam("bgcolor", "XDEADBEF"); assertInvalidPlotParam("bgcolor", "%5BDEADBE"); assertPlotParam("fgcolor"...
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2023-36812 - Severity: CRITICAL - CVSS Score: 9.8 Description: Improved fix for #2261. Regular expressions wouldn't catch the newlines or possibly other control characters. Now we'll use the TAG validation code to make sure the inputs are only plain ASCII printabl...
[ "CWE-74" ]
CVE-2023-36812
CRITICAL
9.8
OpenTSDB/opentsdb
setColorParams
test/tsd/TestGraphHandler.java
07c4641471c6f5c2ab5aab615969e97211eb50d9
1
Analyze the following code function for security vulnerabilities
@Override public boolean isElementAllowed(String elementName) { return !this.forbidTags.contains(elementName) && (this.extraAllowedTags.contains(elementName) || isElementSafe(elementName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isElementAllowed File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/SecureHTMLElementSanitizer.java Repository: xwiki/xwiki-commons The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-31126
CRITICAL
9.6
xwiki/xwiki-commons
isElementAllowed
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/SecureHTMLElementSanitizer.java
0b8e9c45b7e7457043938f35265b2aa5adc76a68
0
Analyze the following code function for security vulnerabilities
@Override public int getRemotePort() { return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRemotePort File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getRemotePort
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@GET @Path("id/{userId}") @ApiOperation(value = "Get user details by userId", notes = "The user's permissions are only included if a user asks for his " + "own account or for users with the necessary permissions to edit permissions.") @ApiResponses({ @ApiResponse(code =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getbyId File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
getbyId
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
Long getId();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getId File: service-api/src/main/java/com/nexblocks/authguard/service/model/UserIdentifier.java Repository: AuthGuard The code follows secure coding practices.
[ "CWE-287" ]
CVE-2021-45890
HIGH
7.5
AuthGuard
getId
service-api/src/main/java/com/nexblocks/authguard/service/model/UserIdentifier.java
9783b1143da6576028de23e15a1f198b1f937b82
0
Analyze the following code function for security vulnerabilities
public boolean getSigning() { return signing == SigningState.FULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSigning File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
getSigning
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public Loader<Cursor> onCreateLoader(int id, Bundle args) { switch (id) { case INIT_DRAFT_USING_REFERENCE_MESSAGE: return new CursorLoader(this, mRefMessageUri, UIProvider.MESSAGE_PROJECTION, null, null, null); case REFERENCE_MESSAGE_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateLoader File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onCreateLoader
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition notIn(T... values) { return notIn(Arrays.asList(values)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notIn File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
notIn
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
private void migrate30(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("Settings.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { String key = element.elementTextTrim("k...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate30 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate30
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public String nextTo(String delimiters) throws JSONException { char c; StringBuilder sb = new StringBuilder(); for (;;) { c = this.next(); if (delimiters.indexOf(c) >= 0 || c == 0 || c == '\n' || c == '\r') { if (c != 0) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nextTo File: src/main/java/org/json/JSONTokener.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2022-45690
HIGH
7.5
stleary/JSON-java
nextTo
src/main/java/org/json/JSONTokener.java
7a124d857dc8da1165c87fa788e53359a317d0f7
0
Analyze the following code function for security vulnerabilities
public int getStatus() { return this.statusCode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatus File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
getStatus
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
@Override public byte[] getBackupPayload(@UserIdInt int userId) { enforceSystem(); if (DEBUG) { Slog.d(TAG, "Backing up user " + userId); } synchronized (mLock) { if (!isUserUnlockedL(userId)) { wtf("Can't backup: user " + userId + " is locked ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBackupPayload File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getBackupPayload
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public synchronized String getResponseHeader(String headerName) { Map headers = this.responseHeadersMap; return headers == null ? null : (String) headers.get(headerName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResponseHeader File: Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
getResponseHeader
Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean isKeyguardLocked() { return WindowManagerService.this.isKeyguardLocked(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyguardLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
isKeyguardLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@JsonProperty(FIELD_CACHE_TTL_OVERRIDE_ENABLED) public abstract Builder cacheTTLOverrideEnabled(boolean cacheTTLOverride);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cacheTTLOverrideEnabled File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
cacheTTLOverrideEnabled
graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
public static boolean unzip(VFSLeaf zipLeaf, VFSContainer targetDir, Identity identity, boolean versioning) { boolean unzipped = false; try(InputStream in = zipLeaf.getInputStream()) { unzipped = unzip(in, targetDir, identity, versioning); } catch(Exception e) { handleIOException("", e); } return unzipp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unzip File: src/main/java/org/olat/core/util/ZipUtil.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
unzip
src/main/java/org/olat/core/util/ZipUtil.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
private void removeRosterEntryFromGroups(RosterEntry rosterEntry) throws YaximXMPPException { Collection<RosterGroup> oldGroups = rosterEntry.getGroups(); for (RosterGroup group : oldGroups) { tryToRemoveUserFromGroup(group, rosterEntry); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeRosterEntryFromGroups File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
removeRosterEntryFromGroups
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public static final native int getUidForName(String name);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidForName File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
getUidForName
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
private Connection getStandaloneConnection(String newDB, boolean superUser) throws SQLException { String host = postgreSQLClientConfig.getString(HOST); int port = postgreSQLClientConfig.getInteger(PORT); String user = postgreSQLClientConfig.getString(_USERNAME); String pass = postgreSQLClientConfig.getS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStandaloneConnection File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getStandaloneConnection
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasLazyResultSet() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasLazyResultSet File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
hasLazyResultSet
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
private static byte[] retrieveResponseAsBytes(HttpURLConnection connection) throws IOException { final int responseCode = connection.getResponseCode(); if (responseCode < HttpURLConnection.HTTP_BAD_REQUEST) { try (InputStream input = connection.getInputStream()) { return retrieveData(input); } } else { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retrieveResponseAsBytes File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
retrieveResponseAsBytes
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void onefailAndOnePassedBuildInstances(Stage instance) { final JobInstance first = instance.getJobInstances().get(0); final JobInstance second = instance.getJobInstances().get(1); first.completing(Failed); second.completing(Failed); first.completed(new Date()); sec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onefailAndOnePassedBuildInstances File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
onefailAndOnePassedBuildInstances
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
public String getCurrentBranch() { CommandLine getCurrentBranchCommand = gitWd().withArg("rev-parse").withArg("--abbrev-ref").withArg("HEAD"); ConsoleResult consoleResult = runOrBomb(getCurrentBranchCommand); return consoleResult.outputAsString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentBranch File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
getCurrentBranch
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
private void handleAction(String templateName, WikiReference wikiReference) throws ResourceReferenceHandlerException { ExecutionContext executionContext = this.execution.getContext(); if (executionContext == null) { executionContext = new ExecutionContext(); } WikiReferen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleAction File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/resource/Aut...
[ "CWE-79" ]
CVE-2023-29506
MEDIUM
6.1
xwiki/xwiki-platform
handleAction
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/resource/AuthenticationResourceReferenceHandler.java
1943ea26c967ef868fb5f67c487d98d97cba0380
0
Analyze the following code function for security vulnerabilities
public static long[] uncompressLongArray(byte[] input) throws IOException { return uncompressLongArray(input, 0, input.length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uncompressLongArray File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
uncompressLongArray
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
public void setUsername(@Nullable String username) { this.username = username; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUsername File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setUsername
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wControl, Translator trans) { VFSContainer currentContainer = folderComponent.getCurrentContainer(); status = FolderCommandHelper.sanityCheck(wControl, folderComponent); if(status == FolderCommandStatus.STATUS_F...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-41152 - Severity: MEDIUM - CVSS Score: 4.0 Description: OO-5696: validate file selections against current container Function: execute File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java Repository: OpenOLAT Fixed Code: @Overrid...
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
execute
src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
1
Analyze the following code function for security vulnerabilities
private void startSettingsActivity() { mActivityStarter.startActivity(new Intent(android.provider.Settings.ACTION_SETTINGS), true /* dismissShade */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startSettingsActivity File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3886
HIGH
7.2
android
startSettingsActivity
packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting protected void initAttachments(Message refMessage) { addAttachments(refMessage.getAttachments()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initAttachments File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
initAttachments
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public int getColumnIndex(String key) { getStatement(false); final Integer index = mColumns.get(key); if (index == null) { throw new IllegalArgumentException("column '" + key + "' is invalid"); } return index; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColumnIndex File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
getColumnIndex
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
@Override public boolean isPackageSignedByKeySetExactly(String packageName, KeySet ks) { if (packageName == null || ks == null) { return false; } synchronized(mPackages) { final PackageParser.Package pkg = mPackages.get(packageName); if (pkg == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackageSignedByKeySetExactly File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isPackageSignedByKeySetExactly
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public boolean accept(VFSItem vfsItem) { VFSSecurityCallback secCallback = vfsItem.getLocalSecurityCallback(); if(secCallback != null && !secCallback.canWrite()) { return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: accept File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
accept
src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
private static native @Nullable String[] nativeGetLocales(long ptr, boolean excludeSystem);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetLocales File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetLocales
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public InputStream createInputStream() { if (context.getBody() != null) { byte[] data = new byte[context.getBody().length()]; context.getBody().getBytes(data); return new ByteArrayInputStream(data); } return new VertxInputStream(context, 10000, t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createInputStream File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follow...
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
createInputStream
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
@Override public boolean isApplicable(Class<? extends AbstractProject> jobType) { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isApplicable File: core/src/main/java/hudson/tasks/BuildTrigger.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
isApplicable
core/src/main/java/hudson/tasks/BuildTrigger.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public Writer write(Writer writer) throws JSONException { try { int hashMapSize = this.myHashMap.size(); boolean dropObjectKeyName = false; if (hashMapSize == 1) { dropObjectKeyName = dropRootElement || ignoredElements != null && ignoredElements.contains(keys().n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
write
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public void setOriginalDocument(XWikiDocument originalDocument) { this.originalDocument = originalDocument; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOriginalDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setOriginalDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public int removeMember(String memberId) { LBMember member; member = members.get(memberId); if(member != null){ if (member.poolId != null) pools.get(member.poolId).members.remove(memberId); members.remove(memberId); retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeMember File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java Repository: floodlight The code follows secure coding practices.
[ "CWE-362", "CWE-476" ]
CVE-2015-6569
MEDIUM
4.3
floodlight
removeMember
src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
7f5bedb625eec3ff4d29987c31cef2553a962b36
0
Analyze the following code function for security vulnerabilities
private void uploadAzureCopyAttachment(AttachmentRequest attachmentRequest, String platform, String platformId) { List<String> attachmentIds = attachmentService.getAttachmentIdsByParam(attachmentRequest); if (CollectionUtils.isNotEmpty(attachmentIds)) { attachmentIds.forEach(attachmentId -> ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uploadAzureCopyAttachment File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
uploadAzureCopyAttachment
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public static void copy(InputStream is, File dest) throws Exception { OutputStream os = null; try { os = new FileOutputStream(dest); byte[] buffer = new byte[1024]; int length; while ((length = is.read(buffer)) > 0) { os.write(buffer, 0, length); } } catch (Exception e) { logger.error("Excep...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: src/main/java/widoco/WidocoUtils.java Repository: dgarijo/Widoco The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4772
HIGH
7.8
dgarijo/Widoco
copy
src/main/java/widoco/WidocoUtils.java
f2279b76827f32190adfa9bd5229b7d5a147fa92
0
Analyze the following code function for security vulnerabilities
@Override public PacketCollector createPacketCollectorAndSend(StanzaFilter packetFilter, Stanza packet) throws NotConnectedException, InterruptedException { // Create the packet collector before sending the packet PacketCollector packetCollector = createPacketCollector(packetFilt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPacketCollectorAndSend File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
createPacketCollectorAndSend
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
private SupplicantState handleSupplicantStateChange(StateChangeResult stateChangeResult) { SupplicantState state = stateChangeResult.state; mWifiScoreCard.noteSupplicantStateChanging(mWifiInfo, state); // Supplicant state change // [31-13] Reserved for future use // [8 - 0] Suppl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSupplicantStateChange File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleSupplicantStateChange
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public static byte[] marshall(Parcelable parceable) { Parcel parcel = Parcel.obtain(); parceable.writeToParcel(parcel, 0); byte[] bytes = parcel.marshall(); parcel.recycle(); return bytes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshall File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
marshall
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setTimeOut(int timeOutInMilliseconds) { this.timeOut = timeOutInMilliseconds; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTimeOut File: JOpenId/src/org/expressme/openid/OpenIdManager.java Repository: michaelliao/jopenid The code follows secure coding practices.
[ "CWE-208" ]
CVE-2010-10006
LOW
1.4
michaelliao/jopenid
setTimeOut
JOpenId/src/org/expressme/openid/OpenIdManager.java
c9baaa976b684637f0d5a50268e91846a7a719ab
0
Analyze the following code function for security vulnerabilities
@Override protected List<Contentlet> findByStructure(String structureInode, int limit, int offset) throws DotDataException, DotStateException, DotSecurityException { HibernateUtil hu = new HibernateUtil(); hu.setQuery("select inode from inode in class " + com.dotmarketing.portlets.contentlet.business.Cont...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByStructure File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
findByStructure
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public void setSlug(String slug) { this.slug = slug; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSlug File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
setSlug
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
private void forwardHosted(Request request, Response response) throws ServletException, IOException { logger.trace("SAML 1.1::Proceeding to IDP index page"); RequestDispatcher dispatch = getContext().getServletContext() .getRequestDispatcher(getIdpConfiguration().getHostedURI()); re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forwardHosted File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practic...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
forwardHosted
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
private void onConfigurationChanged() { if (DEBUG) { Slog.i(TAG, "onConfigurationChanged()"); } Locale revised = Locale.getDefault(); if (revised == null || mLocale == null || !revised.equals(mLocale)) { mLocale = revised; synchronized (mLock) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConfigurationChanged File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
onConfigurationChanged
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Test public void testRoundTripOfInstantAndJavaUtilDate() throws Exception { ObjectMapper mapper = newMapper(); mapper.configure(SerializationFeature.WRITE_DATE_TIMESTAMPS_AS_NANOSECONDS, false); mapper.configure(SerializationFeature.WRITE_DATES_AS_TIMESTAMPS, false); mapper.conf...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testRoundTripOfInstantAndJavaUtilDate File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practic...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testRoundTripOfInstantAndJavaUtilDate
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
@Nullable protected AtWhoReferenceSupport getReferenceSupport() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getReferenceSupport File: server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
getReferenceSupport
server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
private int runListInstrumentation() { int flags = 0; // flags != 0 is only used to request meta-data boolean showPackage = false; String targetPackage = null; try { String opt; while ((opt=nextArg()) != null) { if (opt.equals("-f")) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runListInstrumentation File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runListInstrumentation
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
public ApiClient setAccessToken(String accessToken) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setAccessToken(accessToken); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAccessToken File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setAccessToken
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0