instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public String getAdType() { return this.xwiki.getAdType(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAdType File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getAdType
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public List<ResolveInfo> queryIntentContentProviders( Intent intent, String resolvedType, int flags, int userId) { if (!sUserManager.exists(userId)) return Collections.emptyList(); ComponentName comp = intent.getComponent(); if (comp == null) { if (intent.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryIntentContentProviders File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
queryIntentContentProviders
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public boolean updateSettingLocked(int type, int userId, String name, String value, String tag, boolean makeDefault, String packageName, boolean forceNotify, Set<String> criticalSettings) { final int key = makeKey(type, userId); boolean success = false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSettingLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
updateSettingLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
@Override public PacketCollector createPacketCollector(PacketCollector.Configuration configuration) { PacketCollector collector = new PacketCollector(this, configuration); // Add the collector to the list of active collectors. collectors.add(collector); return collector; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPacketCollector File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
createPacketCollector
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
private String checkJobName(String name) throws Failure { checkGoodName(name); name = name.trim(); projectNamingStrategy.checkName(name); if(getItem(name)!=null) throw new Failure(Messages.Hudson_JobAlreadyExists(name)); // looks good return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkJobName File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
checkJobName
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
String path() { final String path = get(HttpHeaderNames.PATH); checkState(path != null, ":path header does not exist."); return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: path File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
path
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override void pick(Point2D point, boolean boundingBox, List<List<SVGElement>> retVec) throws SVGException { if (getBoundingBox().contains(point)) { retVec.add(getPath(null)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pick File: svg-core/src/main/java/com/kitfox/svg/ImageSVG.java Repository: blackears/svgSalamander The code follows secure coding practices.
[ "CWE-918" ]
CVE-2017-5617
MEDIUM
5.8
blackears/svgSalamander
pick
svg-core/src/main/java/com/kitfox/svg/ImageSVG.java
826555b0a3229b6cf4671fe4de7aa51b5946b63d
0
Analyze the following code function for security vulnerabilities
@Override public JournaledFile makeDevicePoliciesJournaledFile(int userId) { return DevicePolicyManagerService.this.makeJournaledFile(userId, DEVICE_POLICIES_XML); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeDevicePoliciesJournaledFile File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
makeDevicePoliciesJournaledFile
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void readPdf() throws IOException { try { fileLength = tokens.getFile().length(); pdfVersion = tokens.checkPdfHeader(); try { readXref(); } catch (Exception e) { try { rebuilt = true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readPdf File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
readPdf
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public DaoConfig setMaximumTransactionBundleSize(Integer theMaximumTransactionBundleSize) { myMaximumTransactionBundleSize = theMaximumTransactionBundleSize; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaximumTransactionBundleSize File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setMaximumTransactionBundleSize
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public XWikiEngineContext getEngineContext() { return this.engine_context; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEngineContext File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getEngineContext
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void reset() { fileInputsIterator = null; currentInputUriIterator = null; currentInput = null; cursor.failure = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reset File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
reset
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
private Stream<NodeFeature> getDisallowFeatures() { return getInitializedFeatures() .filter(feature -> !feature.allowsChanges()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisallowFeatures File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getDisallowFeatures
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
@Override public boolean isRootVoiceInteraction(IBinder token) { synchronized(this) { ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return false; } return r.rootVoiceInteraction; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRootVoiceInteraction File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
isRootVoiceInteraction
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void back() { act.runOnUiThread(new Runnable() { public void run() { web.goBack(); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: back File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
back
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public CipherInformation getCipherInformation(boolean incoming) { return incoming ? inCipher : outCipher; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCipherInformation File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
getCipherInformation
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
private static final void copyString(String key, ContentValues from, ContentValues to) { String s = from.getAsString(key); if (s != null) { to.put(key, s); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyString File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
copyString
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
public Form<T> withDirectFieldAccess(boolean directFieldAccess) { return new Form<T>( this.rootName, this.backedType, this.rawData, this.files, this.errors, this.value, this.groups, this.messagesApi, this.formatters, this.validatorFacto...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withDirectFieldAccess File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
withDirectFieldAccess
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
private void updateNetworkPreferenceForUser(int userId, List<PreferentialNetworkServiceConfig> preferentialNetworkServiceConfigs) { if (!isManagedProfile(userId) && !isDeviceOwnerUserId(userId)) { return; } List<ProfileNetworkPreference> preferences = new ArrayList<>(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNetworkPreferenceForUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
updateNetworkPreferenceForUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void queryQuickShareAction(Bitmap image, UserHandle user) { CompletableFuture<List<Notification.Action>> quickShareActionsFuture = mScreenshotSmartActions.getSmartActionsFuture( mScreenshotId, null, image, mSmartActionsProvider, QUICK_SHARE...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-35676 - Severity: HIGH - CVSS Score: 7.8 Description: [DO NOT MERGE] Update quickshare intent rather than recreating Currently, we extract the quickshare intent and re-wrap it as a new PendingIntent once we get the screenshot URI. This is insecure as it l...
[ "CWE-Other" ]
CVE-2023-35676
HIGH
7.8
android
queryQuickShareAction
packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
109e58b62dc9fedcee93983678ef9d4931e72afa
1
Analyze the following code function for security vulnerabilities
private void scanScriptContent() throws IOException { final XMLStringBuffer buffer = new XMLStringBuffer(); boolean waitForEndComment = false; while (true) { int c = fCurrentEntity.read(); if (c == -1) { break; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanScriptContent File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
scanScriptContent
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
public XWikiVersioningStoreInterface getVersioningStore() { return this.versioningStore; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVersioningStore File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getVersioningStore
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void clearExternalStorageDataSync(String packageName, int userId, boolean allData) { final boolean mounted; if (Environment.isExternalStorageEmulated()) { mounted = true; } else { final String status = Environment.getExternalStorageState(); mounted = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearExternalStorageDataSync File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clearExternalStorageDataSync
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
static boolean isMainIntent(Intent intent) { return ACTION_MAIN.equals(intent.getAction()) && intent.hasCategory(CATEGORY_LAUNCHER) && intent.getCategories().size() == 1 && intent.getData() == null && intent.getType() == null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMainIntent File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isMainIntent
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private Contact _getContact(final String userId, final ContactType contactType) { User user = _getUser(userId); if (user != null && contactType != null) { for (Contact eachContact : user.getContacts()) { if (contactType.name().equals(eachContact.getType())) { return eachContact; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _getContact File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
_getContact
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
private void updateLockScreenTimeout() { synchronized (mScreenLockTimeout) { boolean enable = (mAllowLockscreenWhenOn && mAwake && mKeyguardDelegate != null && mKeyguardDelegate.isSecure()); if (mLockScreenTimerActive != enable) { if (enable) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLockScreenTimeout File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
updateLockScreenTimeout
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
protected void initModulePrefixes(ServletContext context) { ArrayList prefixList = new ArrayList(); Enumeration names = context.getAttributeNames(); while (names.hasMoreElements()) { String name = (String) names.nextElement(); if (!name.startsWith(Globals.MODULE_KEY)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initModulePrefixes File: src/share/org/apache/struts/action/ActionServlet.java Repository: kawasima/struts1-forever The code follows secure coding practices.
[ "CWE-Other", "CWE-20" ]
CVE-2016-1181
MEDIUM
6.8
kawasima/struts1-forever
initModulePrefixes
src/share/org/apache/struts/action/ActionServlet.java
eda3a79907ed8fcb0387a0496d0cb14332f250e8
0
Analyze the following code function for security vulnerabilities
protected final ThunkTable thunkTable(){ return _thunkTable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: thunkTable File: jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java Repository: eclipse-openj9/openj9 The code follows secure coding practices.
[ "CWE-440", "CWE-250" ]
CVE-2021-41035
HIGH
7.5
eclipse-openj9/openj9
thunkTable
jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java
c6e0d9296ff9a3084965d83e207403de373c0bad
0
Analyze the following code function for security vulnerabilities
public Page<E> pageSizeZero(Boolean pageSizeZero) { setPageSizeZero(pageSizeZero); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pageSizeZero File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
pageSizeZero
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
public boolean initFromExtras(Intent intent) { // If we were invoked with a SENDTO intent, the value // should take precedence final Uri dataUri = intent.getData(); if (dataUri != null) { if (MAIL_TO.equals(dataUri.getScheme())) { initFromMailTo(dataUri.toStri...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initFromExtras File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
initFromExtras
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
void reportResized() { // If the activity is scheduled to relaunch, skip sending the resized to ViewRootImpl now // since it will be destroyed anyway. This also prevents the client from receiving // windowing mode change before it is destroyed. if (mActivityRecord != null && mActivityRec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportResized File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
reportResized
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void setName(String name) { this.name = name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setName File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setName
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
public String formatDate(Date date, Locale locale) { // Example: 2004-12-10 13:20:00 PST StringBuilder dbuff = new StringBuilder(); DateFormat dateI = DateFormat.getDateInstance(DateFormat.SHORT, locale); dateI.setTimeZone(determineTimeZone()); DateFormat timeI = DateFormat.getTi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatDate File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
formatDate
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
@Override public void setValue(ELContext context, Object base, Object property, Object value) { super.setValue(context, base, validatePropertyName(property), value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setValue File: src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java Repository: HubSpot/jinjava The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-12668
MEDIUM
6.8
HubSpot/jinjava
setValue
src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java
5dfa5b87318744a4d020b66d5f7747acc36b213b
0
Analyze the following code function for security vulnerabilities
private void notifyStatusChanged(int moveId, int status) { notifyStatusChanged(moveId, status, -1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyStatusChanged File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
notifyStatusChanged
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public Experiment create(K8sClient api) { try { if (LOG.isDebugEnabled()) { LOG.debug("Create PyTorchJob resource: \n{}", YamlUtils.toPrettyYaml(this)); } PyTorchJob pyTorchJob = api.getPyTorchJobClient() .create(getMetadata().getNamespace(), this, new CreateOptions()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJob.java Repository: apache/submarine The code follows secure coding practic...
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
create
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
0
Analyze the following code function for security vulnerabilities
public void assignChildLayers(Transaction t) { // The surface of the main window might be preserved. So the child window on top of the main // window should be also on top of the preserved surface. int layer = PRESERVED_SURFACE_LAYER + 1; for (int i = 0; i < mChildren.size(); i++) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assignChildLayers File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
assignChildLayers
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void setRevokedBy(String revokedBy) { this.revokedBy = revokedBy; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRevokedBy File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setRevokedBy
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public ApiClient setServers(List<ServerConfiguration> servers) { this.servers = servers; updateBasePath(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServers File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setServers
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public boolean getDoNotAskCredentialsOnBoot() { if (mService != null) { try { return mService.getDoNotAskCredentialsOnBoot(); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDoNotAskCredentialsOnBoot File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getDoNotAskCredentialsOnBoot
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override protected void clearListener() { final Class bgListenerClass = getBackgroundLocationListener(); Thread t = new Thread(new Runnable() { @Override public void run() { //mGoogleApiClient must be connected while (!getmGoogleApiClient().i...
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2022-4903 - Severity: MEDIUM - CVSS Score: 5.1 Description: Fixed #3583 Pending Intent vulnerability Function: clearListener File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne Fixed Code: @O...
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
clearListener
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
1
Analyze the following code function for security vulnerabilities
public void activityIdle(IBinder token, Configuration config, boolean stopProfiling) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); if (c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityIdle File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activityIdle
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public Pipeline schedulePipeline(PipelineConfig pipelineConfig, BuildCause buildCause, Clock clock) { return schedulePipeline(pipelineConfig, buildCause, GoConstants.DEFAULT_APPROVED_BY, clock); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: schedulePipeline File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
schedulePipeline
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
public static String getFullUrl(HttpServletRequest request) { return "//" + request.getHeader("Host") + request.getRequestURI(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFullUrl File: common/src/main/java/com/zrlog/util/ZrLogUtil.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getFullUrl
common/src/main/java/com/zrlog/util/ZrLogUtil.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@Override public ServerBuilder tls(PrivateKey key, Iterable<? extends X509Certificate> keyCertChain) { return (ServerBuilder) TlsSetters.super.tls(key, keyCertChain); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tls File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
tls
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public static String HTMLEncode(String srcStr, char ch) { if (srcStr == null) { return null; } int fromIndex = 0; int toIndex; StringBuffer dstSB = new StringBuffer(); while((toIndex = srcStr.indexOf(ch, fromIndex)) != -1) { dstSB...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: HTMLEncode File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
HTMLEncode
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
private boolean hasMaximumOutgoingCalls() { return MAXIMUM_OUTGOING_CALLS <= getNumCallsWithState(OUTGOING_CALL_STATES); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasMaximumOutgoingCalls File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
hasMaximumOutgoingCalls
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
boolean isFullyTransparentBarAllowed(Rect rect) { return mLetterboxUiController.isFullyTransparentBarAllowed(rect); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFullyTransparentBarAllowed File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isFullyTransparentBarAllowed
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void updateBinaryStream(String columnName, @Nullable InputStream inputStream) throws SQLException { updateBinaryStream(findColumn(columnName), inputStream); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBinaryStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBinaryStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public static boolean isValidRestriction(@NonNull String restriction) { if (!USER_RESTRICTIONS.contains(restriction)) { Slog.e(TAG, "Unknown restriction: " + restriction); return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidRestriction File: services/core/java/com/android/server/pm/UserRestrictionsUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isValidRestriction
services/core/java/com/android/server/pm/UserRestrictionsUtils.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
void reportDescendantOrientationChangeIfNeeded() { // Orientation request is exposed only when we're visible. Therefore visibility change // will change requested orientation. Notify upward the hierarchy ladder to adjust // configuration. This is important to cases where activities with incompat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportDescendantOrientationChangeIfNeeded File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
reportDescendantOrientationChangeIfNeeded
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public boolean onUnbind(Intent intent) { ((FileDownloaderBinder) mBinder).clearListeners(); return false; // not accepting rebinding (default behaviour) }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUnbind File: src/main/java/com/owncloud/android/files/services/FileDownloader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
onUnbind
src/main/java/com/owncloud/android/files/services/FileDownloader.java
27559efb79d45782e000b762860658d49e9c35e9
0
Analyze the following code function for security vulnerabilities
protected String getExecutionPreamble() { if ( getWorkingDirectoryAsString() == null ) { return null; } String dir = getWorkingDirectoryAsString(); StringBuilder sb = new StringBuilder(); sb.append( "cd " ); sb.append( unifyQuotes( dir ) ); ...
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2017-1000487 - Severity: HIGH - CVSS Score: 7.5 Description: [PLXUTILS-161] Commandline shell injection problems Patch by Charles Duffy, applied unmodified Function: getExecutionPreamble File: src/main/java/org/codehaus/plexus/util/cli/shell/BourneShell.java Rep...
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
getExecutionPreamble
src/main/java/org/codehaus/plexus/util/cli/shell/BourneShell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
1
Analyze the following code function for security vulnerabilities
@Transactional @Override public void save(Project project, String oldPath) { dao.persist(project); if (oldPath != null && !oldPath.equals(project.getPath())) { Collection<Milestone> milestones = new ArrayList<>(); for (Milestone milestone: issueManager.queryUsedMilestones(project)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
save
server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
public int getAttributeListValue(int idx, String[] options, int defaultValue) { final int t = nativeGetAttributeDataType(mParseState, idx); if (t == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null document"); } final int v = nat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeListValue File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeListValue
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void shutdown() { if (connection != null) { try { connection.close(); } catch (SQLException e) { logger.warn("Non-Managed connection could not be closed. Whoops!", e); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shutdown File: extensions/database/src/com/google/refine/extension/database/pgsql/PgSQLConnectionManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
shutdown
extensions/database/src/com/google/refine/extension/database/pgsql/PgSQLConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
0
Analyze the following code function for security vulnerabilities
public IssueTemplateDao getThirdPartTemplate(String projectId) { IssueTemplateDao issueTemplateDao = new IssueTemplateDao(); if (StringUtils.isNotBlank(projectId)) { Project project = baseProjectService.getProjectById(projectId); List<PlatformCustomFieldItemDTO> thirdPartCustomFi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThirdPartTemplate File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getThirdPartTemplate
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
void dumpActivitiesLocked(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean dumpAll, boolean dumpClient, String dumpPackage, String header) { pw.println(header); boolean printedAnything = mRootWindowContainer.dumpActivities(fd, pw, dumpAll, dumpClient, dump...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpActivitiesLocked File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
dumpActivitiesLocked
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public void setUserRotationMode(int mode, int rot) { ContentResolver res = mContext.getContentResolver(); // mUserRotationMode and mUserRotation will be assigned by the content observer if (mode == WindowManagerPolicy.USER_ROTATION_LOCKED) { Settings.System.putIntForUs...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserRotationMode File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
setUserRotationMode
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public void onServiceDisconnected(ComponentName component) { if (DEBUG) Slog.v(TAG, "Disconnected from transport " + component); final String name = component.flattenToShortString(); EventLog.writeEvent(EventLogTags.BACKUP_TRANSPORT_LIFECYCLE, name, 0); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onServiceDisconnected File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
onServiceDisconnected
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private void parseQuery() { Query originalQuery = this.originalQuery; if (originalQuery == null) { return; } String sql = originalQuery.toString(null); StringTokenizer st = new StringTokenizer(sql, " \r\t\n"); boolean tableFound = false; boolean tablesChecked = false; String name =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseQuery File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
parseQuery
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
void onCallRemoved(Call call);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCallRemoved File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
onCallRemoved
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
private Process docker(String... subCommand) throws IOException { return processBuilderFactory.apply(Arrays.asList(subCommand)).start(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: docker File: jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java Repository: GoogleContainerTools/jib The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-25914
CRITICAL
9.8
GoogleContainerTools/jib
docker
jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java
67fa40bc2c484da0546333914ea07a89fe44eaaf
0
Analyze the following code function for security vulnerabilities
@BeforeEach public void startMail(TestUtils setup, TestConfiguration testConfiguration) { this.mail = new GreenMail(ServerSetupTest.SMTP); this.mail.start(); configureEmail(setup, testConfiguration); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startMail File: xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java Repositor...
[ "CWE-200" ]
CVE-2021-32731
MEDIUM
5
xwiki/xwiki-platform
startMail
xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java
0cf716250b3645a5974c80d8336dcdf885749dff
0
Analyze the following code function for security vulnerabilities
public void registerUidObserver(IUidObserver observer) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(observer != null ? observer.asBinder() : null); mRemote.tra...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerUidObserver File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
registerUidObserver
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return internal.hashCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
hashCode
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void setStoreDir(String path) { this.storeDir = path; }
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2018-25068 - Severity: MEDIUM - CVSS Score: 6.5 Description: Feature #4100 Fix critical Vulnerability "File.createTempFile" should not be used to create a directory Function: setStoreDir File: globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpo...
[ "CWE-668" ]
CVE-2018-25068
MEDIUM
6.5
devent/globalpom-utils
setStoreDir
globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java
77a820bac2f68e662ce261ecb050c643bd7ee560
1
Analyze the following code function for security vulnerabilities
@Override public void clearDeviceOwner(String packageName) { Objects.requireNonNull(packageName, "packageName is null"); final CallerIdentity caller = getCallerIdentity(packageName); synchronized (getLockObject()) { final ComponentName deviceOwnerComponent = mOwners.getDeviceOwn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearDeviceOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
clearDeviceOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean contains(String name, String value, boolean ignoreCase) { return contains((CharSequence) name, (CharSequence) value, ignoreCase); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: contains File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
contains
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
@Override public void setLastChosenActivity(Intent intent, String resolvedType, int flags, IntentFilter filter, int match, ComponentName activity) { final int userId = UserHandle.getCallingUserId(); if (DEBUG_PREFERRED) { Log.v(TAG, "setLastChosenActivity intent=" + intent ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLastChosenActivity File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setLastChosenActivity
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private PropertyName _findParamName(AnnotatedParameter param, AnnotationIntrospector intr) { if (param != null && intr != null) { PropertyName name = intr.findNameForDeserialization(param); if (name != null) { return name; } // 14-Apr-2014, tat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _findParamName File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_findParamName
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public Queue getQueue() { return queue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getQueue File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getQueue
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public JobId toRestJobId(List<String> id) { if (id == null) { return null; } JobId restJobId = this.objectFactory.createJobId(); restJobId.withElements(id); return restJobId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toRestJobId File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-35151
HIGH
7.5
xwiki/xwiki-platform
toRestJobId
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java
824cd742ecf5439971247da11bfe7e0ad2b10ede
0
Analyze the following code function for security vulnerabilities
@Override public String getImportUploadableDirectory(EPerson ePerson) throws Exception { String uploadDir = ConfigurationManager.getProperty("org.dspace.app.batchitemimport.work.dir"); if (uploadDir == null) { throw new Exception( "A dspace.cfg...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImportUploadableDirectory File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
getImportUploadableDirectory
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
7af52a0883a9dbc475cf3001f04ed11b24c8a4c0
0
Analyze the following code function for security vulnerabilities
private static File fakeFile(final String path) { final File file = mock(File.class); when(file.getPath()).thenReturn(path); when(file.toString()).thenReturn(path); return file; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fakeFile File: test/tsd/TestGraphHandler.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-78" ]
CVE-2023-25826
CRITICAL
9.8
OpenTSDB/opentsdb
fakeFile
test/tsd/TestGraphHandler.java
26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25
0
Analyze the following code function for security vulnerabilities
public void switchToAccount(Account account, String fingerprint) { switchToAccount(account, false, fingerprint); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: switchToAccount File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
switchToAccount
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public void stopAppSwitches() { mActivityTaskManager.stopAppSwitches(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopAppSwitches File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
stopAppSwitches
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public void clearAccounts(String packageName) { synchronized (mLock) { try { enforcePhoneAccountModificationForPackage(packageName); mPhoneAccountRegistrar .clearAccounts(packageName, Binder.getCallingUserH...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearAccounts File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
clearAccounts
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
public static Node getAttribute(Node node, String name) { return node.getAttributes().getNamedItem(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttribute File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
getAttribute
src/edu/stanford/nlp/util/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
public File privateKey() { return privateKey; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: privateKey File: handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
privateKey
handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
private static void wait(int i) { try { // sleep at most 4096 ms long sleep = (long) i * (long) i; Thread.sleep(sleep); } catch (InterruptedException e) { // ignore } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wait File: h2/src/main/org/h2/tools/Server.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
wait
h2/src/main/org/h2/tools/Server.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
Builder setLaunchedFromPackage(String fromPackage) { mLaunchedFromPackage = fromPackage; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLaunchedFromPackage File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setLaunchedFromPackage
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public void setNextOperationSafety(@DevicePolicyOperation int operation, @OperationSafetyReason int reason) { Preconditions.checkCallAuthorization( hasCallingOrSelfPermission(permission.MANAGE_DEVICE_ADMINS)); Slogf.i(LOG_TAG, "setNextOperationSafety(%s, %s)", ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNextOperationSafety File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setNextOperationSafety
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected List<Long> getModifiedProjectIds() { List<Long> modified = _projectsMetadata.entrySet().stream() .filter(e -> { ProjectMetadata metadata = e.getValue(); if (metadata == null) return false; return metadata.isDirty(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getModifiedProjectIds File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
getModifiedProjectIds
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
boolean isRelaunching() { return mPendingRelaunchCount > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRelaunching File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isRelaunching
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
void setServiceRegistry(ServiceRegistry serviceRegistry) { this.serviceRegistry = serviceRegistry; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServiceRegistry File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
setServiceRegistry
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
@Deprecated // since 2.12 protected boolean _parseBooleanFromInt(JsonParser p, DeserializationContext ctxt) throws IOException { // 13-Oct-2016, tatu: As per [databind#1324], need to be careful wrt // degenerate case of huge integers, legal in JSON. // ... this is, on the oth...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _parseBooleanFromInt File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_parseBooleanFromInt
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder xpathFind(String xpath) throws XPathExpressionException { return xpathFind(xpath, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xpathFind File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
xpathFind
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
private List<ComponentName> matchVerifiers(PackageInfoLite pkgInfo, List<ResolveInfo> receivers, final PackageVerificationState verificationState) { if (pkgInfo.verifiers.length == 0) { return null; } final int N = pkgInfo.verifiers.length; final List<ComponentNa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: matchVerifiers File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
matchVerifiers
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) void applyStyle(long themePtr, @AttrRes int defStyleAttr, @StyleRes int defStyleRes, @Nullable XmlBlock.Parser parser, @NonNull int[] inAttrs, long outValuesAddress, long outIndicesAddress) { Objects....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyStyle File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
applyStyle
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
static int deleteMessages(Context context, SQLiteDatabase db, String selection, String[] selectionArgs, Uri uri) { Cursor cursor = db.query(TABLE_PDU, new String[] { Mms._ID }, selection, selectionArgs, null, null, null); if (cursor == null) { return 0; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteMessages File: src/com/android/providers/telephony/MmsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-22" ]
CVE-2023-21268
MEDIUM
5.5
android
deleteMessages
src/com/android/providers/telephony/MmsProvider.java
ca4c9a19635119d95900793e7a41b820cd1d94d9
0
Analyze the following code function for security vulnerabilities
public boolean isDetailsVisible(T item) { return detailsManager.isDetailsVisible(item); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDetailsVisible File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
isDetailsVisible
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public void close() throws IOException { if (this.channel != null) { this.channel.close(); this.channel = null; } if (this.unpack != null) { this.unpack.cleanUp(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2022-23596
MEDIUM
5
junrar
close
src/main/java/com/github/junrar/Archive.java
7b16b3d90b91445fd6af0adfed22c07413d4fab7
0
Analyze the following code function for security vulnerabilities
public boolean isInWYSIWYGEditMode() { return getDriver().findElements(By.xpath("//div[@id='editcolumn' and contains(@class, 'editor-wysiwyg')]")) .size() > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInWYSIWYGEditMode File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
isInWYSIWYGEditMode
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public boolean checkCanCloseSystemDialogs(int pid, int uid, @Nullable String packageName) { return ActivityTaskManagerService.this.checkCanCloseSystemDialogs(pid, uid, packageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkCanCloseSystemDialogs File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
checkCanCloseSystemDialogs
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public static double[] uncompressDoubleArray(byte[] input, int offset, int length) throws IOException { int uncompressedLength = Snappy.uncompressedLength(input, offset, length); double[] result = new double[uncompressedLength / 8]; impl.rawUncompress(input, offset, length, resul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uncompressDoubleArray File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
uncompressDoubleArray
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
public void noteAlarmStart(IIntentSender sender, int sourceUid, String tag) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteAlarmStart File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
noteAlarmStart
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
boolean hasEmergencyCall() { for (Call call : mCalls) { if (call.isEmergencyCall()) { return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasEmergencyCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
hasEmergencyCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
public Hover doHover(DOMDocument xmlDocument, Position position, XMLHoverSettings settings, CancelChecker cancelChecker) { return hover.doHover(xmlDocument, position, settings, cancelChecker); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doHover File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
doHover
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
public static SQLiteConnectionManager getInstance() { if (instance == null) { if (logger.isDebugEnabled()) { logger.debug("::Creating new SQLite ConnectionManager ::"); } instance = new SQLiteConnectionManager(); } return instance; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
getInstance
extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
0