instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public void jumpTask(String procInsId, String currentTaskId, String targetTaskDefinitionKey, Map<String, Object> variables) {
jumpTask(getTaskEntity(currentTaskId), targetTaskDefinitionKey, variables);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jumpTask
File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
Repository: thinkgem/jeesite
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-34601 | CRITICAL | 9.8 | thinkgem/jeesite | jumpTask | src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java | 30750011b49f7c8d45d0f3ab13ed3a1a422655bb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isFocused() {
return mForceIsFocused || super.isFocused();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFocused
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | isFocused | chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Object filterToLabel(PackageParser.ActivityIntentInfo filter) {
return filter.activity;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: filterToLabel
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | filterToLabel | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long inputDispatchingTimedOut(int pid, final boolean aboveSystem, String reason) {
if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Requires permission "
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inputDispatchingTimedOut
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | inputDispatchingTimedOut | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | protected void addUserToGroup(String userName, String groupName, XWikiContext context) throws XWikiException
{
XWikiDocument groupDoc = getDocument(groupName, context);
DocumentReference groupClassReference = getGroupClass(context).getDocumentReference();
BaseObject memberObject =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addUserToGroup
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | addUserToGroup | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setLargeStringValue(String className, String fieldName, String value)
{
setLargeStringValue(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()),
fieldName, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLargeStringValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setLargeStringValue | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private static void kerberosAuthenticationGenerator(XmlGenerator gen, KerberosAuthenticationConfig c) {
if (c == null) {
return;
}
XmlGenerator kerberosGen = gen.open("kerberos");
addClusterLoginElements(kerberosGen, c)
.nodeIfContents("relax-flags-check", c.g... | Vulnerability Classification:
- CWE: CWE-522
- CVE: CVE-2023-33264
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Extend set of masked fields in ConfigXmlGenerator
Function: kerberosAuthenticationGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
Fixed Code:... | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | kerberosAuthenticationGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public Iterable<File> successors(File file) {
// check isDirectory() just because it may be faster than listFiles() on a non-directory
if (file.isDirectory()) {
File[] files = file.listFiles();
if (files != null) {
return Collections.unmodifiab... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: successors
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | successors | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | private static void mkdirsOrThrow(File dir) throws IOException {
if (!dir.exists() && !dir.mkdirs()) {
throw new IOException("Failed to create directory " + dir);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mkdirsOrThrow
File: pf4j/src/main/java/org/pf4j/util/Unzip.java
Repository: pf4j
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-40827 | HIGH | 7.5 | pf4j | mkdirsOrThrow | pf4j/src/main/java/org/pf4j/util/Unzip.java | ed9392069fe14c6c30d9f876710e5ad40f7ea8c1 | 0 |
Analyze the following code function for security vulnerabilities | public abstract JavaType withTypeHandler(Object h); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withTypeHandler
File: src/main/java/com/fasterxml/jackson/databind/JavaType.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | withTypeHandler | src/main/java/com/fasterxml/jackson/databind/JavaType.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int checkProvisioningPrecondition(String action, String packageName) {
Objects.requireNonNull(packageName, "packageName is null");
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
hasCallingOrSelfPermission(MANAGE_PROFI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkProvisioningPrecondition
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | checkProvisioningPrecondition | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void removeContextFeed()
{
this.execution.getContext().removeProperty(FEED_PROPERTY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContextFeed
File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
Repository: xwi... | [
"CWE-79"
] | CVE-2023-29202 | CRITICAL | 9 | xwiki/xwiki-platform | removeContextFeed | xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java | 5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isPackagePreserveVersion()
{
return this.packagePreserveVersion;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPackagePreserveVersion
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | isPackagePreserveVersion | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | public boolean restrictToAdmin(XWikiDocument document)
{
boolean updated = false;
// If some rights have already been set on the document, we consider that it has already been protected
// manually.
if (document.getXObjects(LOCAL_CLASS_REFERENCE).isEmpty()) {
updated = i... | Vulnerability Classification:
- CWE: CWE-269
- CVE: CVE-2023-34465
- Severity: HIGH
- CVSS Score: 8.1
Description: XWIKI-20671: Fix Mail.MailConfig initialization
Function: restrictToAdmin
File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bri... | [
"CWE-269"
] | CVE-2023-34465 | HIGH | 8.1 | xwiki/xwiki-platform | restrictToAdmin | xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/internal/DocumentInitializerRightsManager.java | 8910b8857d3442d2e8142f655fdc0512930354d1 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void cancel(@Nonnull Actor actor) {
cancelAndGet(actor);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancel
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | cancel | worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | private static Charset extractCharset(String contentType) {
if (StringUtils.isEmpty(contentType))
return null;
final Matcher matcher = Pattern.compile("(?i)\\bcharset=\\s*\"?([^\\s;\"]*)").matcher(contentType);
if (matcher.find())
try {
return Charset.forName(matcher.group(1));
} catch (Exception e)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractCharset
File: src/net/sourceforge/plantuml/security/SURL.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | extractCharset | src/net/sourceforge/plantuml/security/SURL.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void lockNow(Bundle options) {
mPolicy.lockNow(options);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lockNow
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | lockNow | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState()
throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(GET_PROCESSES_IN_ERROR_STATE_TRANSACTI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessesInErrorState
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getProcessesInErrorState | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | void setProfileAutoConnectionPriority (BluetoothDevice device, int profileId){
if (profileId == BluetoothProfile.HEADSET) {
HeadsetService hsService = HeadsetService.getHeadsetService();
List<BluetoothDevice> deviceList = hsService.getConnectedDevices();
if ((hsService !... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProfileAutoConnectionPriority
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | setProfileAutoConnectionPriority | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public Builder setHostnameVerifier(HostnameVerifier hostnameVerifier) {
this.hostnameVerifier = hostnameVerifier;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHostnameVerifier
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setHostnameVerifier | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public static Materials defaultSvnMaterialsWithUrl(String svnUrl) {
return new Materials(svnMaterial(svnUrl, "svnDir", null, null, false, null));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultSvnMaterialsWithUrl
File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | defaultSvnMaterialsWithUrl | domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | private JsonValue readFalse() throws IOException {
read();
readRequiredChar('a');
readRequiredChar('l');
readRequiredChar('s');
readRequiredChar('e');
return JsonValue.FALSE;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFalse
File: src/main/org/hjson/JsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | readFalse | src/main/org/hjson/JsonParser.java | 91bef056d56bf968451887421c89a44af1d692ff | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setTempFolderPath(String tempFolderPath) {
this.tempFolderPath = tempFolderPath;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTempFolderPath
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure co... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setTempFolderPath | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | boolean storageManagerIsFileBasedEncryptionEnabled() {
return StorageManager.isFileEncrypted();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: storageManagerIsFileBasedEncryptionEnabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | storageManagerIsFileBasedEncryptionEnabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public boolean isMetaDataDirty()
{
return this.isMetaDataDirty;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMetaDataDirty
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | isMetaDataDirty | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isDebugging() {
return debugging;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDebugging
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | isDebugging | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void saveWorkspace() {
synchronized (this) {
// TODO refactor this so that we check if the save is needed before writing to the file!
File tempFile = new File(_workspaceDir, "workspace.temp.json");
try {
if (!saveToFile(tempFile)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveWorkspace
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | saveWorkspace | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | private OnmsUser getOnmsUser(String username) {
OnmsUser user = null;
try {
user = m_userManager.getOnmsUser(username);
} catch (final Throwable t) {
throw getException(Status.INTERNAL_SERVER_ERROR, t);
}
if (user == null) throw getException(Status.NOT_FOU... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOnmsUser
File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-0872 | HIGH | 8 | OpenNMS/opennms | getOnmsUser | opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java | 34ab169a74b2bc489ab06d0dbf33fee1ed94c93c | 0 |
Analyze the following code function for security vulnerabilities | private void resetBodySelection() {
int length = mBodyView.getText().length();
int signatureStartPos = getSignatureStartPosition(
mSignature, mBodyView.getText().toString());
if (signatureStartPos > -1) {
// In case the user deleted the newlines...
mBodyVi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetBodySelection
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | resetBodySelection | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Optional<Argument<?>> getFirstTypeVariable() {
if (!typeParameters.isEmpty()) {
return typeParameters.values().stream().findFirst();
}
return Optional.empty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstTypeVariable
File: core/src/main/java/io/micronaut/core/type/DefaultArgument.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | getFirstTypeVariable | core/src/main/java/io/micronaut/core/type/DefaultArgument.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public OnGoingLogicalCondition eq(Class<? extends T> value) {
Condition conditionLocal = new EqualPolymorphicCondition<T>(selector, value);
return getOnGoingLogicalCondition(conditionLocal);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: eq
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-11343 | HIGH | 7.5 | xjodoin/torpedoquery | eq | src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java | 3c20b874fba9cc2a78b9ace10208de1602b56c3f | 0 |
Analyze the following code function for security vulnerabilities | private byte[] getLengthPrefix(byte[] data) {
return ByteBuffer.allocate(4).putInt(data.length).array();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLengthPrefix
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getLengthPrefix | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setAnchorViewPosition(
View view, float x, float y, float width, float height) {
mAnchorViews.put(view, new Position(x, y, width, height));
doSetAnchorViewPosition(view, x, y, width, height);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAnchorViewPosition
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | setAnchorViewPosition | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermissions("user:refresh_token")
@GetMapping("/refreshToken")
@ResponseBody
public Result refreshToken(Integer id) {
User user = userService.selectByIdNoCatch(id);
user.setToken(StringUtil.uuid());
userService.update(user);
return success(user.getToken());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refreshToken
File: src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
Repository: atjiu/pybbs
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | refreshToken | src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 0 |
Analyze the following code function for security vulnerabilities | public AvatarService avatarService() {
return xmppConnectionService.getAvatarService();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: avatarService
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | avatarService | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public Builder setClock(Clock clock) {
this.clock = Preconditions.checkNotNull(clock);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClock
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | setClock | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | @Pure
protected boolean isBinary(@Positive int column) {
return fields[column - 1].getFormat() == Field.BINARY_FORMAT;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBinary
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | isBinary | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public void appendWhereEscapeString(String inWhere) {
if (mWhereClause == null) {
mWhereClause = new StringBuilder(inWhere.length() + 16);
}
if (mWhereClause.length() == 0) {
mWhereClause.append('(');
}
DatabaseUtils.appendEscapedSQLString(mWhereClause, in... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2018-9493
- Severity: LOW
- CVSS Score: 2.1
Description: DO NOT MERGE. Extend SQLiteQueryBuilder for update and delete.
Developers often accept selection clauses from untrusted code, and
SQLiteQueryBuilder already supports a "strict" mode to help catch
SQL inject... | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | appendWhereEscapeString | core/java/android/database/sqlite/SQLiteQueryBuilder.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 1 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder2 comment(String comment) {
super.commentImpl(comment);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: comment
File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | comment | src/main/java/com/jamesmurty/utils/XMLBuilder2.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | Object getPropertyIdByColumnId(String columnId) {
return columnKeys.get(columnId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPropertyIdByColumnId
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getPropertyIdByColumnId | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private void filterHostKeyTypes(CryptoWishList cwl) {
if (verifier instanceof ExtendedServerHostKeyVerifier) {
ExtendedServerHostKeyVerifier extendedVerifier = (ExtendedServerHostKeyVerifier) verifier;
List<String> knownAlgorithms = extendedVerifier.getKnownKeyAlgorithmsForHost(hostname, port);
if (knownAlg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: filterHostKeyTypes
File: src/main/java/com/trilead/ssh2/transport/KexManager.java
Repository: connectbot/sshlib
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | connectbot/sshlib | filterHostKeyTypes | src/main/java/com/trilead/ssh2/transport/KexManager.java | 5c8b534f6e97db7ac0e0e579331213aa25c173ab | 0 |
Analyze the following code function for security vulnerabilities | public void updateRotationUnchecked(boolean alwaysSendConfiguration, boolean forceRelayout) {
if(DEBUG_ORIENTATION) Slog.v(TAG, "updateRotationUnchecked("
+ "alwaysSendConfiguration=" + alwaysSendConfiguration + ")");
long origId = Binder.clearCallingIdentity();
boolean chang... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateRotationUnchecked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | updateRotationUnchecked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public static Http2Headers toNettyHttp2(HttpHeaders in, boolean server) {
final Http2Headers out = new DefaultHttp2Headers(false, in.size());
// Trailers if it does not have :status.
if (server && !in.contains(HttpHeaderNames.STATUS)) {
for (Entry<AsciiString, String> entry : in) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toNettyHttp2
File: core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | toNettyHttp2 | core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XWikiDocument getRevision(XWikiDocument document, String revision) throws XWikiException
{
return getRevision(document != null ? document.getDocumentReferenceWithLocale() : null, revision);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevision
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-29208 | HIGH | 7.5 | xwiki/xwiki-platform | getRevision | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java | d9e947559077e947315bf700c5703dfc7dd8a8d7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void overridePendingAppTransitionScaleUp(int startX, int startY, int startWidth,
int startHeight) {
synchronized(mWindowMap) {
mAppTransition.overridePendingAppTransitionScaleUp(startX, startY, startWidth,
startHeight);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: overridePendingAppTransitionScaleUp
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | overridePendingAppTransitionScaleUp | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected long getMaxTextBufferSize() {
return session.getMaxTextMessageBufferSize();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxTextBufferSize
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | getMaxTextBufferSize | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | IActivityManager getIActivityManager() {
return ActivityManager.getService();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIActivityManager
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getIActivityManager | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public String getRecordingTextTracks(String recordId) {
return recordingServiceHelper.getRecordingTextTracks(recordId, captionsDir, getCaptionFileUrlDirectory());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRecordingTextTracks
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | getRecordingTextTracks | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Stream<JsonValue> getArrayStream() {
if (currentEvent != Event.START_ARRAY) {
throw new IllegalStateException(
JsonMessages.PARSER_GETARRAY_ERR(currentEvent));
}
Spliterator<JsonValue> spliterator =
new Spliterators.AbstractSpliter... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getArrayStream
File: impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java
Repository: eclipse-ee4j/parsson
The code follows secure coding practices. | [
"CWE-834"
] | CVE-2023-4043 | HIGH | 7.5 | eclipse-ee4j/parsson | getArrayStream | impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java | ab239fee273cb262910890f1a6fe666ae92cd623 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void drawImage(Object graphics, Object img, int x, int y) {
((AndroidGraphics) graphics).drawImage(img, x, y);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: drawImage
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | drawImage | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static String getFirstValidRedirectUri(KeycloakSession session, String rootUrl, Set<String> validRedirects) {
return getFirstValidRedirectUri(resolveValidRedirects(session, rootUrl, validRedirects));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstValidRedirectUri
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | getFirstValidRedirectUri | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public @Nullable String getLastResourceResolution() {
synchronized (this) {
ensureValidLocked();
return nativeGetLastResourceResolution(mObject);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastResourceResolution
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getLastResourceResolution | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public boolean validate() throws XWikiException
{
return this.doc.validate(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | validate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
long getResetIntervalForTest() {
return mResetInterval;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResetIntervalForTest
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getResetIntervalForTest | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public String getPageUrl() throws IndexUnreachableException {
String pageType = null;
if (StringUtils.isBlank(pageType)) {
pageType = navigationHelper.getPreferredView();
}
if (StringUtils.isBlank(pageType)) {
pageType = navigationHelper.getCurrentView();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageUrl
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getPageUrl | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public ClientConfig getDefaultClientConfig() {
ClientConfig clientConfig = new ClientConfig();
clientConfig.register(MultiPartFeature.class);
clientConfig.register(json);
clientConfig.register(JacksonFeature.class);
clientConfig.property(HttpUrlConnectorProvider.SET_METHOD_WORKAROUND, true);
// ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultClientConfig
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding prac... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getDefaultClientConfig | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | void setRequestedOrientation(int requestedOrientation) {
setOrientation(requestedOrientation, this);
// Push the new configuration to the requested app in case where it's not pushed, e.g. when
// the request is handled at task level with letterbox.
if (!getMergedOverrideConfiguration().... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRequestedOrientation
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setRequestedOrientation | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder root() {
return new XMLBuilder(getDocument());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: root
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | root | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | public FieldGroup getEditorFieldGroup() {
return editorFieldGroup;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEditorFieldGroup
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getEditorFieldGroup | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M1")
public void setObject(String className, int nb, BaseObject object)
{
setXObject(resolveClassReference(className), nb, object);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | setObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public List<BaseObject> getXObjects(EntityReference reference)
{
if (reference.getType() == EntityType.DOCUMENT) {
// class reference
return getXObjects(
getCurrentReferenceDocumentReferenceResolver().resolve(reference, getDocumentReference()));
}
ret... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getXObjects | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public int getSyncRandomOffset() {
return mSyncRandomOffset;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSyncRandomOffset
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | getSyncRandomOffset | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | void onExtrasChanged(Call call, Bundle extras) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("onExtrasChanged")) {
try {
logOutgoing("onExtrasChanged %s %s", callId, extras);
mServiceInterface.onExtrasChanged(callI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onExtrasChanged
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | onExtrasChanged | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject put(String key, int value) throws JSONException {
put(key, Integer.valueOf(value));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | put | src/main/java/org/codehaus/jettison/json/JSONObject.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public String removeEntry(String dn) {
logger.info("SecurityDomainProcessor: Removing entry " + dn);
String status = SUCCESS;
LdapBoundConnFactory connFactory = null;
LDAPConnection conn = null;
CMSEngine engine = CMS.getCMSEngine();
EngineConfig cs = engine.getConfig(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeEntry
File: base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | removeEntry | base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private List<String> optionList(String key, Map<String, Object> options) {
List<String> out = new ArrayList<>();
Object option = options.get(key);
if (option instanceof String) {
out.addAll(Arrays.asList(((String) option).split(",")));
} els... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optionList
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | optionList | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | private void unregisterAccountListener(String[] accountTypes, String opPackageName,
UserAccounts accounts) {
synchronized (accounts.mReceiversForType) {
if (accountTypes == null) {
// null for any type
accountTypes = new String[] {null};
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterAccountListener
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | unregisterAccountListener | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | private UserInfo getUserInfoLocked(int userId) {
UserInfo ui = mUsers.get(userId);
// If it is partial and not in the process of being removed, return as unknown user.
if (ui != null && ui.partial && !mRemovingUserIds.get(userId)) {
Slog.w(LOG_TAG, "getUserInfo: unknown user #" + use... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserInfoLocked
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | getUserInfoLocked | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | public void syncThirdPartyIssues() {
List<String> projectIds = trackProjectService.getThirdPartProjectIds();
projectIds.forEach(id -> {
try {
syncThirdPartyIssues(id);
} catch (Exception e) {
LogUtil.error(e.getMessage(), e);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncThirdPartyIssues
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | syncThirdPartyIssues | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public void initTargetPoC() {
localPoCButton.addActionListener(e -> {
JFileChooser fileChooser = new JFileChooser();
fileChooser.setFileSelectionMode(JFileChooser.FILES_ONLY);
int option = fileChooser.showOpenDialog(new JFrame());
if (option == JFileChooser.APPROV... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initTargetPoC
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | initTargetPoC | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 0 |
Analyze the following code function for security vulnerabilities | private void _readStringEscapeChar (@Nonnull final IJsonParsePosition aStartPos,
@Nonnull final JsonStringBuilder aStrStringOriginalContent,
@Nonnull final JsonStringBuilder aStrStringUnescapedContent) throws JsonParseException
{
final in... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _readStringEscapeChar
File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java
Repository: phax/ph-commons
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34612 | HIGH | 7.5 | phax/ph-commons | _readStringEscapeChar | ph-json/src/main/java/com/helger/json/parser/JsonParser.java | 02a4d034dcfb2b6e1796b25f519bf57a6796edce | 0 |
Analyze the following code function for security vulnerabilities | @Reference
public void setHttpClient(TrustedHttpClient httpClient) {
this.httpClient = httpClient;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHttpClient
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | setHttpClient | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | private void initAvatarView() {
final ImageView avatarView = findViewById(R.id.account_avatar);
final ImageView avatarTwoPaneView = findViewById(R.id.account_avatar_two_pane_version);
if (AvatarViewMixin.isAvatarSupported(this)) {
avatarView.setVisibility(View.VISIBLE);
g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initAvatarView
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | initAvatarView | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLabelChanged(CharSequence label) {
mMePreference.setTitle(label);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLabelChanged
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | onLabelChanged | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isColumnReorderingAllowed() {
return getState(false).columnReorderingAllowed;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isColumnReorderingAllowed
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | isColumnReorderingAllowed | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public void onKeyguardOccludedChanged(boolean keyguardOccluded) {
mNavigationBar.onKeyguardOccludedChanged(keyguardOccluded);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onKeyguardOccludedChanged
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onKeyguardOccludedChanged | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public int getTaskForActivity(IBinder token, boolean onlyRoot) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTaskForActivity
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getTaskForActivity | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getAllPhoneAccountsCount() {
try {
Log.startSession("TSI.gAPAC");
try {
enforceModifyPermission(
"getAllPhoneAccountsCount requires MODIFY_PHONE_STATE permission.");
} catch (Security... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllPhoneAccountsCount
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | getAllPhoneAccountsCount | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasSiblings() {
try {
return getCms().readResource(getParamResource(), CmsResourceFilter.ALL).getSiblingCount() > 1;
} catch (CmsException e) {
LOG.error(e.getLocalizedMessage(getLocale()), e);
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasSiblings
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | hasSiblings | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean canCreateRemoteAnimationTarget() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canCreateRemoteAnimationTarget
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | canCreateRemoteAnimationTarget | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void init(IAccessibilityServiceConnection connection, int connectionId,
IBinder windowToken) {
Message message = mCaller.obtainMessageIOO(DO_INIT, connectionId,
connection, windowToken);
mCaller.sendMessage(message);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | init | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | private SQLiteStatement getStatement(boolean allowReplace) throws SQLException {
if (allowReplace) {
if (mReplaceStatement == null) {
if (mInsertSQL == null) buildSQL();
// chop "INSERT" off the front and prepend "INSERT OR REPLACE" instead.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatement
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | getStatement | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | public void switchUserResource(WebSession session, String sign, String sourceId, UserDTO sessionUser) {
// 获取最新UserDTO
UserDTO user = getUserDTO(sessionUser.getId());
User newUser = new User();
if (StringUtils.equals("workspace", sign)) {
user.setLastWorkspaceId(sourceId);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchUserResource
File: framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-32699 | MEDIUM | 6.5 | metersphere | switchUserResource | framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java | c59e381d368990214813085a1a4877c5ef865411 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean scanPseudoAttribute(XMLAttributesImpl attributes)
throws IOException {
return scanAttribute(attributes,fSingleBoolean,'?');
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanPseudoAttribute
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | scanPseudoAttribute | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | void pauseChildStacks(ActivityRecord parent, boolean userLeaving, boolean uiSleeping,
boolean resuming, boolean dontWait) {
// TODO: Put all stacks in supervisor and iterate through them instead.
for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseChildStacks
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | pauseChildStacks | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | public void setTopControlsHeight(int topControlsHeightPix, boolean topControlsShrinkBlinkSize) {
if (topControlsHeightPix == mTopControlsHeightPix
&& topControlsShrinkBlinkSize == mTopControlsShrinkBlinkSize) {
return;
}
mTopControlsHeightPix = topControlsHeightPix;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTopControlsHeight
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | setTopControlsHeight | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | private void syncPut(String[] cacheNames, Object key, Object value) {
for (String cacheName : cacheNames) {
SyncCache syncCache = cacheManager.getCache(cacheName);
try {
syncCache.put(key, value);
} catch (RuntimeException e) {
if (errorHandler... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncPut
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | syncPut | runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | private static File buildFile(File parent, String name, String ext) {
if (TextUtils.isEmpty(ext)) {
return new File(parent, name);
} else {
return new File(parent, name + "." + ext);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildFile
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | buildFile | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getId() {
return SamlProtocol.LOGIN_PROTOCOL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getId
File: services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2021-3827 | MEDIUM | 6.8 | keycloak | getId | services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java | 44000caaf5051d7f218d1ad79573bd3d175cad0d | 0 |
Analyze the following code function for security vulnerabilities | public void setKeyLookup(final Function<String, SecretKey> keyLookup)
{
this.keyLookup = keyLookup;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyLookup
File: src/main/java/org/cryptacular/CiphertextHeaderV2.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | setKeyLookup | src/main/java/org/cryptacular/CiphertextHeaderV2.java | 00395c232cdc62d4292ce27999c026fc1f076b1d | 0 |
Analyze the following code function for security vulnerabilities | private static void createDirectory(File directory) {
if (!directory.exists())
directory.mkdirs();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDirectory
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | createDirectory | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | void dumpAnimatorLocked(PrintWriter pw, String[] args, boolean dumpAll) {
pw.println("WINDOW MANAGER ANIMATOR STATE (dumpsys window animator)");
mAnimator.dumpLocked(pw, " ", dumpAll);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpAnimatorLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | dumpAnimatorLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | private void start() {
LocalServices.addService(ActivityTaskManagerInternal.class, mInternal);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: start
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | start | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void save4returnId(TestContext context) {
postgresClient = createFoo(context);
postgresClient.save(FOO, xPojo, /* returnId */ true, context.asyncAssertSuccess(save -> {
String id = save;
postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> {
context.assertEquals("... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save4returnId
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | save4returnId | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public static String trimUnicodeSurrogates(String text) {
if (text != null) {
StringBuilder sb = new StringBuilder();
for (int i = 0; i < text.length(); i++) {
char ch = text.charAt(i);
if (!Character.isHighSurrogate(ch) && !Character.isLowSurrogate(ch)) {
sb.append(ch);
}
}
return sb.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimUnicodeSurrogates
File: src/main/java/com/openkm/util/FormatUtil.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-40317 | MEDIUM | 5.4 | openkm/document-management-system | trimUnicodeSurrogates | src/main/java/com/openkm/util/FormatUtil.java | 870d518f7de349c3fa4c7b9883789fdca4590c4e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected ModelAndView handleRequestInternal(HttpServletRequest request, HttpServletResponse response) throws Exception {
String operation = request.getParameter("operation");
if (!StringUtils.hasText(operation) && StringUtils.hasText(request.getParameter("groupName"))) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleRequestInternal
File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352",
"CWE-79"
] | CVE-2021-25929 | LOW | 3.5 | OpenNMS/opennms | handleRequestInternal | opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java | eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLaunchAnimationEnd(boolean launchIsFullScreen) {
if (launchIsFullScreen) {
mCentralSurfaces.instantCollapseNotificationPanel();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLaunchAnimationEnd
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | onLaunchAnimationEnd | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private static void ldapAuthenticationGenerator(XmlGenerator gen, LdapAuthenticationConfig c) {
if (c == null) {
return;
}
addClusterLoginElements(gen.open("ldap"), c)
.node("url", c.getUrl())
.nodeIfContents("socket-factory-class-name", c.getSocketFac... | Vulnerability Classification:
- CWE: CWE-522
- CVE: CVE-2023-33264
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Extend set of masked fields in ConfigXmlGenerator
Function: ldapAuthenticationGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
Fixed Code:
pri... | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | ldapAuthenticationGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 1 |
Analyze the following code function for security vulnerabilities | private void enforceSettingReadable(String settingName, int settingsType, int userId) {
if (UserHandle.getAppId(Binder.getCallingUid()) < Process.FIRST_APPLICATION_UID) {
return;
}
ApplicationInfo ai = getCallingApplicationInfoOrThrow();
if (ai.isSystemApp() || ai.isSignedWit... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceSettingReadable
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | enforceSettingReadable | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public ArtemisSecurityConfigurationBuilder withPackageBlacklist(Collection<PackageRule> packageBlacklist) {
blacklistedPackages = Set.copyOf(packageBlacklist);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withPackageBlacklist
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-501",
"CWE-653"
] | CVE-2024-23682 | HIGH | 8.2 | ls1intum/Ares | withPackageBlacklist | src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java | 4c146ff85a0fa6022087fb0cffa6b8021d51101f | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.