instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public String getAdType()
{
return this.xwiki.getAdType(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAdType
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getAdType | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<ResolveInfo> queryIntentContentProviders(
Intent intent, String resolvedType, int flags, int userId) {
if (!sUserManager.exists(userId)) return Collections.emptyList();
ComponentName comp = intent.getComponent();
if (comp == null) {
if (intent.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryIntentContentProviders
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryIntentContentProviders | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public boolean updateSettingLocked(int type, int userId, String name, String value,
String tag, boolean makeDefault, String packageName, boolean forceNotify,
Set<String> criticalSettings) {
final int key = makeKey(type, userId);
boolean success = false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSettingLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | updateSettingLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PacketCollector createPacketCollector(PacketCollector.Configuration configuration) {
PacketCollector collector = new PacketCollector(this, configuration);
// Add the collector to the list of active collectors.
collectors.add(collector);
return collector;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createPacketCollector
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | createPacketCollector | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | private String checkJobName(String name) throws Failure {
checkGoodName(name);
name = name.trim();
projectNamingStrategy.checkName(name);
if(getItem(name)!=null)
throw new Failure(Messages.Hudson_JobAlreadyExists(name));
// looks good
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkJobName
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | checkJobName | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | String path() {
final String path = get(HttpHeaderNames.PATH);
checkState(path != null, ":path header does not exist.");
return path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: path
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | path | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
void pick(Point2D point, boolean boundingBox, List<List<SVGElement>> retVec) throws SVGException
{
if (getBoundingBox().contains(point))
{
retVec.add(getPath(null));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pick
File: svg-core/src/main/java/com/kitfox/svg/ImageSVG.java
Repository: blackears/svgSalamander
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2017-5617 | MEDIUM | 5.8 | blackears/svgSalamander | pick | svg-core/src/main/java/com/kitfox/svg/ImageSVG.java | 826555b0a3229b6cf4671fe4de7aa51b5946b63d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public JournaledFile makeDevicePoliciesJournaledFile(int userId) {
return DevicePolicyManagerService.this.makeJournaledFile(userId, DEVICE_POLICIES_XML);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeDevicePoliciesJournaledFile
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | makeDevicePoliciesJournaledFile | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected void readPdf() throws IOException {
try {
fileLength = tokens.getFile().length();
pdfVersion = tokens.checkPdfHeader();
try {
readXref();
}
catch (Exception e) {
try {
rebuilt = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readPdf
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | readPdf | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public DaoConfig setMaximumTransactionBundleSize(Integer theMaximumTransactionBundleSize) {
myMaximumTransactionBundleSize = theMaximumTransactionBundleSize;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaximumTransactionBundleSize
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setMaximumTransactionBundleSize | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | public XWikiEngineContext getEngineContext()
{
return this.engine_context;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEngineContext
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getEngineContext | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void reset() {
fileInputsIterator = null;
currentInputUriIterator = null;
currentInput = null;
cursor.failure = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reset
File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
Repository: crate
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-24565 | MEDIUM | 6.5 | crate | reset | server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java | 4e857d675683095945dd524d6ba03e692c70ecd6 | 0 |
Analyze the following code function for security vulnerabilities | private Stream<NodeFeature> getDisallowFeatures() {
return getInitializedFeatures()
.filter(feature -> !feature.allowsChanges());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDisallowFeatures
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getDisallowFeatures | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isRootVoiceInteraction(IBinder token) {
synchronized(this) {
ActivityRecord r = ActivityRecord.isInStackLocked(token);
if (r == null) {
return false;
}
return r.rootVoiceInteraction;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRootVoiceInteraction
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | isRootVoiceInteraction | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void back() {
act.runOnUiThread(new Runnable() {
public void run() {
web.goBack();
}
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: back
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | back | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CipherInformation getCipherInformation(boolean incoming) {
return incoming ? inCipher : outCipher;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCipherInformation
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | getCipherInformation | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | private static final void copyString(String key, ContentValues from, ContentValues to) {
String s = from.getAsString(key);
if (s != null) {
to.put(key, s);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyString
File: src/com/android/providers/downloads/DownloadProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-0848 | HIGH | 7.2 | android | copyString | src/com/android/providers/downloads/DownloadProvider.java | bdc831357e7a116bc561d51bf2ddc85ff11c01a9 | 0 |
Analyze the following code function for security vulnerabilities | public Form<T> withDirectFieldAccess(boolean directFieldAccess) {
return new Form<T>(
this.rootName,
this.backedType,
this.rawData,
this.files,
this.errors,
this.value,
this.groups,
this.messagesApi,
this.formatters,
this.validatorFacto... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withDirectFieldAccess
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | withDirectFieldAccess | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | private void updateNetworkPreferenceForUser(int userId,
List<PreferentialNetworkServiceConfig> preferentialNetworkServiceConfigs) {
if (!isManagedProfile(userId) && !isDeviceOwnerUserId(userId)) {
return;
}
List<ProfileNetworkPreference> preferences = new ArrayList<>();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNetworkPreferenceForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | updateNetworkPreferenceForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void queryQuickShareAction(Bitmap image, UserHandle user) {
CompletableFuture<List<Notification.Action>> quickShareActionsFuture =
mScreenshotSmartActions.getSmartActionsFuture(
mScreenshotId, null, image, mSmartActionsProvider,
QUICK_SHARE... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-35676
- Severity: HIGH
- CVSS Score: 7.8
Description: [DO NOT MERGE] Update quickshare intent rather than recreating
Currently, we extract the quickshare intent and re-wrap it as a new
PendingIntent once we get the screenshot URI. This is insecure as
it l... | [
"CWE-Other"
] | CVE-2023-35676 | HIGH | 7.8 | android | queryQuickShareAction | packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java | 109e58b62dc9fedcee93983678ef9d4931e72afa | 1 |
Analyze the following code function for security vulnerabilities | private void scanScriptContent() throws IOException {
final XMLStringBuffer buffer = new XMLStringBuffer();
boolean waitForEndComment = false;
while (true) {
int c = fCurrentEntity.read();
if (c == -1) {
break;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanScriptContent
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | scanScriptContent | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | public XWikiVersioningStoreInterface getVersioningStore()
{
return this.versioningStore;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersioningStore
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getVersioningStore | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void clearExternalStorageDataSync(String packageName, int userId, boolean allData) {
final boolean mounted;
if (Environment.isExternalStorageEmulated()) {
mounted = true;
} else {
final String status = Environment.getExternalStorageState();
mounted = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearExternalStorageDataSync
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | clearExternalStorageDataSync | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | static boolean isMainIntent(Intent intent) {
return ACTION_MAIN.equals(intent.getAction())
&& intent.hasCategory(CATEGORY_LAUNCHER)
&& intent.getCategories().size() == 1
&& intent.getData() == null
&& intent.getType() == null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMainIntent
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isMainIntent | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private Contact _getContact(final String userId, final ContactType contactType) {
User user = _getUser(userId);
if (user != null && contactType != null) {
for (Contact eachContact : user.getContacts()) {
if (contactType.name().equals(eachContact.getType())) {
return eachContact;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _getContact
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | _getContact | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | private void updateLockScreenTimeout() {
synchronized (mScreenLockTimeout) {
boolean enable = (mAllowLockscreenWhenOn && mAwake &&
mKeyguardDelegate != null && mKeyguardDelegate.isSecure());
if (mLockScreenTimerActive != enable) {
if (enable) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateLockScreenTimeout
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | updateLockScreenTimeout | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | protected void initModulePrefixes(ServletContext context) {
ArrayList prefixList = new ArrayList();
Enumeration names = context.getAttributeNames();
while (names.hasMoreElements()) {
String name = (String) names.nextElement();
if (!name.startsWith(Globals.MODULE_KEY)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initModulePrefixes
File: src/share/org/apache/struts/action/ActionServlet.java
Repository: kawasima/struts1-forever
The code follows secure coding practices. | [
"CWE-Other",
"CWE-20"
] | CVE-2016-1181 | MEDIUM | 6.8 | kawasima/struts1-forever | initModulePrefixes | src/share/org/apache/struts/action/ActionServlet.java | eda3a79907ed8fcb0387a0496d0cb14332f250e8 | 0 |
Analyze the following code function for security vulnerabilities | protected final ThunkTable thunkTable(){ return _thunkTable; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: thunkTable
File: jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java
Repository: eclipse-openj9/openj9
The code follows secure coding practices. | [
"CWE-440",
"CWE-250"
] | CVE-2021-41035 | HIGH | 7.5 | eclipse-openj9/openj9 | thunkTable | jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java | c6e0d9296ff9a3084965d83e207403de373c0bad | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> pageSizeZero(Boolean pageSizeZero) {
setPageSizeZero(pageSizeZero);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pageSizeZero
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | pageSizeZero | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | public boolean initFromExtras(Intent intent) {
// If we were invoked with a SENDTO intent, the value
// should take precedence
final Uri dataUri = intent.getData();
if (dataUri != null) {
if (MAIL_TO.equals(dataUri.getScheme())) {
initFromMailTo(dataUri.toStri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initFromExtras
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | initFromExtras | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | void reportResized() {
// If the activity is scheduled to relaunch, skip sending the resized to ViewRootImpl now
// since it will be destroyed anyway. This also prevents the client from receiving
// windowing mode change before it is destroyed.
if (mActivityRecord != null && mActivityRec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportResized
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | reportResized | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public void setName(String name) {
this.name = name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setName
File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-254",
"CWE-264"
] | CVE-2016-8600 | MEDIUM | 5 | dotCMS/core | setName | src/com/dotmarketing/cms/comment/struts/CommentsForm.java | cb84b130065c9eed1d1df9e4770ffa5d4bd30569 | 0 |
Analyze the following code function for security vulnerabilities | public String formatDate(Date date, Locale locale) {
// Example: 2004-12-10 13:20:00 PST
StringBuilder dbuff = new StringBuilder();
DateFormat dateI = DateFormat.getDateInstance(DateFormat.SHORT, locale);
dateI.setTimeZone(determineTimeZone());
DateFormat timeI = DateFormat.getTi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: formatDate
File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
Repository: spacewalkproject/spacewalk
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2016-3079 | MEDIUM | 4.3 | spacewalkproject/spacewalk | formatDate | java/code/src/com/redhat/rhn/common/localization/LocalizationService.java | 7b9ff9ad | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setValue(ELContext context, Object base, Object property, Object value) {
super.setValue(context, base, validatePropertyName(property), value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValue
File: src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java
Repository: HubSpot/jinjava
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-12668 | MEDIUM | 6.8 | HubSpot/jinjava | setValue | src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java | 5dfa5b87318744a4d020b66d5f7747acc36b213b | 0 |
Analyze the following code function for security vulnerabilities | private void notifyStatusChanged(int moveId, int status) {
notifyStatusChanged(moveId, status, -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyStatusChanged
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | notifyStatusChanged | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Experiment create(K8sClient api) {
try {
if (LOG.isDebugEnabled()) {
LOG.debug("Create PyTorchJob resource: \n{}", YamlUtils.toPrettyYaml(this));
}
PyTorchJob pyTorchJob = api.getPyTorchJobClient()
.create(getMetadata().getNamespace(), this, new CreateOptions()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJob.java
Repository: apache/submarine
The code follows secure coding practic... | [
"CWE-502"
] | CVE-2023-46302 | CRITICAL | 9.8 | apache/submarine | create | submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJob.java | ed5ad3b824ba388259e0d1ea137d7fca5f0c288e | 0 |
Analyze the following code function for security vulnerabilities | public void assignChildLayers(Transaction t) {
// The surface of the main window might be preserved. So the child window on top of the main
// window should be also on top of the preserved surface.
int layer = PRESERVED_SURFACE_LAYER + 1;
for (int i = 0; i < mChildren.size(); i++) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: assignChildLayers
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | assignChildLayers | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public void setRevokedBy(String revokedBy) {
this.revokedBy = revokedBy;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRevokedBy
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setRevokedBy | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServers(List<ServerConfiguration> servers) {
this.servers = servers;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServers
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServers | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public boolean getDoNotAskCredentialsOnBoot() {
if (mService != null) {
try {
return mService.getDoNotAskCredentialsOnBoot();
} catch (RemoteException e) {
throw e.rethrowFromSystemServer();
}
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDoNotAskCredentialsOnBoot
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getDoNotAskCredentialsOnBoot | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void clearListener() {
final Class bgListenerClass = getBackgroundLocationListener();
Thread t = new Thread(new Runnable() {
@Override
public void run() {
//mGoogleApiClient must be connected
while (!getmGoogleApiClient().i... | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2022-4903
- Severity: MEDIUM
- CVSS Score: 5.1
Description: Fixed #3583 Pending Intent vulnerability
Function: clearListener
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
Fixed Code:
@O... | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | clearListener | Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java | dad49c9ef26a598619fc48d2697151a02987d478 | 1 |
Analyze the following code function for security vulnerabilities | public void activityIdle(IBinder token, Configuration config, boolean stopProfiling)
throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
if (c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityIdle
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | activityIdle | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public Pipeline schedulePipeline(PipelineConfig pipelineConfig, BuildCause buildCause, Clock clock) {
return schedulePipeline(pipelineConfig, buildCause, GoConstants.DEFAULT_APPROVED_BY, clock);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: schedulePipeline
File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | schedulePipeline | server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | public static String getFullUrl(HttpServletRequest request) {
return "//" + request.getHeader("Host") + request.getRequestURI();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFullUrl
File: common/src/main/java/com/zrlog/util/ZrLogUtil.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | getFullUrl | common/src/main/java/com/zrlog/util/ZrLogUtil.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder tls(PrivateKey key, Iterable<? extends X509Certificate> keyCertChain) {
return (ServerBuilder) TlsSetters.super.tls(key, keyCertChain);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tls
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | tls | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public static String HTMLEncode(String srcStr, char ch) {
if (srcStr == null) {
return null;
}
int fromIndex = 0;
int toIndex;
StringBuffer dstSB = new StringBuffer();
while((toIndex = srcStr.indexOf(ch, fromIndex)) != -1) {
dstSB... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: HTMLEncode
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | HTMLEncode | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasMaximumOutgoingCalls() {
return MAXIMUM_OUTGOING_CALLS <= getNumCallsWithState(OUTGOING_CALL_STATES);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasMaximumOutgoingCalls
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | hasMaximumOutgoingCalls | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | boolean isFullyTransparentBarAllowed(Rect rect) {
return mLetterboxUiController.isFullyTransparentBarAllowed(rect);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFullyTransparentBarAllowed
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isFullyTransparentBarAllowed | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void updateBinaryStream(String columnName,
@Nullable InputStream inputStream) throws SQLException {
updateBinaryStream(findColumn(columnName), inputStream);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBinaryStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateBinaryStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isValidRestriction(@NonNull String restriction) {
if (!USER_RESTRICTIONS.contains(restriction)) {
Slog.e(TAG, "Unknown restriction: " + restriction);
return false;
}
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidRestriction
File: services/core/java/com/android/server/pm/UserRestrictionsUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | isValidRestriction | services/core/java/com/android/server/pm/UserRestrictionsUtils.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | void reportDescendantOrientationChangeIfNeeded() {
// Orientation request is exposed only when we're visible. Therefore visibility change
// will change requested orientation. Notify upward the hierarchy ladder to adjust
// configuration. This is important to cases where activities with incompat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportDescendantOrientationChangeIfNeeded
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | reportDescendantOrientationChangeIfNeeded | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onUnbind(Intent intent) {
((FileDownloaderBinder) mBinder).clearListeners();
return false; // not accepting rebinding (default behaviour)
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUnbind
File: src/main/java/com/owncloud/android/files/services/FileDownloader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | onUnbind | src/main/java/com/owncloud/android/files/services/FileDownloader.java | 27559efb79d45782e000b762860658d49e9c35e9 | 0 |
Analyze the following code function for security vulnerabilities | protected String getExecutionPreamble()
{
if ( getWorkingDirectoryAsString() == null )
{
return null;
}
String dir = getWorkingDirectoryAsString();
StringBuilder sb = new StringBuilder();
sb.append( "cd " );
sb.append( unifyQuotes( dir ) );
... | Vulnerability Classification:
- CWE: CWE-78
- CVE: CVE-2017-1000487
- Severity: HIGH
- CVSS Score: 7.5
Description: [PLXUTILS-161] Commandline shell injection problems
Patch by Charles Duffy, applied unmodified
Function: getExecutionPreamble
File: src/main/java/org/codehaus/plexus/util/cli/shell/BourneShell.java
Rep... | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | getExecutionPreamble | src/main/java/org/codehaus/plexus/util/cli/shell/BourneShell.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 1 |
Analyze the following code function for security vulnerabilities | @Transactional
@Override
public void save(Project project, String oldPath) {
dao.persist(project);
if (oldPath != null && !oldPath.equals(project.getPath())) {
Collection<Milestone> milestones = new ArrayList<>();
for (Milestone milestone: issueManager.queryUsedMilestones(project)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | save | server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 0 |
Analyze the following code function for security vulnerabilities | public int getAttributeListValue(int idx,
String[] options, int defaultValue) {
final int t = nativeGetAttributeDataType(mParseState, idx);
if (t == ERROR_NULL_DOCUMENT) {
throw new NullPointerException("Null document");
}
final int v = nat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttributeListValue
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getAttributeListValue | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public void shutdown() {
if (connection != null) {
try {
connection.close();
} catch (SQLException e) {
logger.warn("Non-Managed connection could not be closed. Whoops!", e);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shutdown
File: extensions/database/src/com/google/refine/extension/database/pgsql/PgSQLConnectionManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | shutdown | extensions/database/src/com/google/refine/extension/database/pgsql/PgSQLConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 0 |
Analyze the following code function for security vulnerabilities | public IssueTemplateDao getThirdPartTemplate(String projectId) {
IssueTemplateDao issueTemplateDao = new IssueTemplateDao();
if (StringUtils.isNotBlank(projectId)) {
Project project = baseProjectService.getProjectById(projectId);
List<PlatformCustomFieldItemDTO> thirdPartCustomFi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThirdPartTemplate
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getThirdPartTemplate | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | void dumpActivitiesLocked(FileDescriptor fd, PrintWriter pw, String[] args,
int opti, boolean dumpAll, boolean dumpClient, String dumpPackage, String header) {
pw.println(header);
boolean printedAnything = mRootWindowContainer.dumpActivities(fd, pw, dumpAll, dumpClient,
dump... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpActivitiesLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | dumpActivitiesLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUserRotationMode(int mode, int rot) {
ContentResolver res = mContext.getContentResolver();
// mUserRotationMode and mUserRotation will be assigned by the content observer
if (mode == WindowManagerPolicy.USER_ROTATION_LOCKED) {
Settings.System.putIntForUs... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserRotationMode
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | setUserRotationMode | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onServiceDisconnected(ComponentName component) {
if (DEBUG) Slog.v(TAG, "Disconnected from transport " + component);
final String name = component.flattenToShortString();
EventLog.writeEvent(EventLogTags.BACKUP_TRANSPORT_LIFECYCLE, name, 0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onServiceDisconnected
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | onServiceDisconnected | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private void parseQuery() {
Query originalQuery = this.originalQuery;
if (originalQuery == null) {
return;
}
String sql = originalQuery.toString(null);
StringTokenizer st = new StringTokenizer(sql, " \r\t\n");
boolean tableFound = false;
boolean tablesChecked = false;
String name =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseQuery
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | parseQuery | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | void onCallRemoved(Call call); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCallRemoved
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | onCallRemoved | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | private Process docker(String... subCommand) throws IOException {
return processBuilderFactory.apply(Arrays.asList(subCommand)).start();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: docker
File: jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java
Repository: GoogleContainerTools/jib
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-25914 | CRITICAL | 9.8 | GoogleContainerTools/jib | docker | jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java | 67fa40bc2c484da0546333914ea07a89fe44eaaf | 0 |
Analyze the following code function for security vulnerabilities | @BeforeEach
public void startMail(TestUtils setup, TestConfiguration testConfiguration)
{
this.mail = new GreenMail(ServerSetupTest.SMTP);
this.mail.start();
configureEmail(setup, testConfiguration);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startMail
File: xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java
Repositor... | [
"CWE-200"
] | CVE-2021-32731 | MEDIUM | 5 | xwiki/xwiki-platform | startMail | xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java | 0cf716250b3645a5974c80d8336dcdf885749dff | 0 |
Analyze the following code function for security vulnerabilities | public void registerUidObserver(IUidObserver observer) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(observer != null ? observer.asBinder() : null);
mRemote.tra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerUidObserver
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | registerUidObserver | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return internal.hashCode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: src/net/sourceforge/plantuml/security/SFile.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | hashCode | src/net/sourceforge/plantuml/security/SFile.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | public void setStoreDir(String path) {
this.storeDir = path;
} | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2018-25068
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Feature #4100 Fix critical Vulnerability
"File.createTempFile" should not be used to create a directory
Function: setStoreDir
File: globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpo... | [
"CWE-668"
] | CVE-2018-25068 | MEDIUM | 6.5 | devent/globalpom-utils | setStoreDir | globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java | 77a820bac2f68e662ce261ecb050c643bd7ee560 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void clearDeviceOwner(String packageName) {
Objects.requireNonNull(packageName, "packageName is null");
final CallerIdentity caller = getCallerIdentity(packageName);
synchronized (getLockObject()) {
final ComponentName deviceOwnerComponent = mOwners.getDeviceOwn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearDeviceOwner
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | clearDeviceOwner | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean contains(String name, String value, boolean ignoreCase) {
return contains((CharSequence) name, (CharSequence) value, ignoreCase);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: contains
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | contains | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setLastChosenActivity(Intent intent, String resolvedType, int flags,
IntentFilter filter, int match, ComponentName activity) {
final int userId = UserHandle.getCallingUserId();
if (DEBUG_PREFERRED) {
Log.v(TAG, "setLastChosenActivity intent=" + intent
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLastChosenActivity
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setLastChosenActivity | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private PropertyName _findParamName(AnnotatedParameter param, AnnotationIntrospector intr)
{
if (param != null && intr != null) {
PropertyName name = intr.findNameForDeserialization(param);
if (name != null) {
return name;
}
// 14-Apr-2014, tat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _findParamName
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | _findParamName | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public Queue getQueue() {
return queue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getQueue
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getQueue | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public JobId toRestJobId(List<String> id)
{
if (id == null) {
return null;
}
JobId restJobId = this.objectFactory.createJobId();
restJobId.withElements(id);
return restJobId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toRestJobId
File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-35151 | HIGH | 7.5 | xwiki/xwiki-platform | toRestJobId | xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java | 824cd742ecf5439971247da11bfe7e0ad2b10ede | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getImportUploadableDirectory(EPerson ePerson)
throws Exception
{
String uploadDir = ConfigurationManager.getProperty("org.dspace.app.batchitemimport.work.dir");
if (uploadDir == null)
{
throw new Exception(
"A dspace.cfg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImportUploadableDirectory
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | getImportUploadableDirectory | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | private static File fakeFile(final String path) {
final File file = mock(File.class);
when(file.getPath()).thenReturn(path);
when(file.toString()).thenReturn(path);
return file;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fakeFile
File: test/tsd/TestGraphHandler.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2023-25826 | CRITICAL | 9.8 | OpenTSDB/opentsdb | fakeFile | test/tsd/TestGraphHandler.java | 26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25 | 0 |
Analyze the following code function for security vulnerabilities | public void switchToAccount(Account account, String fingerprint) {
switchToAccount(account, false, fingerprint);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchToAccount
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | switchToAccount | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void stopAppSwitches() {
mActivityTaskManager.stopAppSwitches();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopAppSwitches
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | stopAppSwitches | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void clearAccounts(String packageName) {
synchronized (mLock) {
try {
enforcePhoneAccountModificationForPackage(packageName);
mPhoneAccountRegistrar
.clearAccounts(packageName, Binder.getCallingUserH... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearAccounts
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | clearAccounts | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | public static Node getAttribute(Node node, String name) {
return node.getAttributes().getNamedItem(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttribute
File: src/edu/stanford/nlp/util/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3869 | MEDIUM | 5 | stanfordnlp/CoreNLP | getAttribute | src/edu/stanford/nlp/util/XMLUtils.java | 5d83f1e8482ca304db8be726cad89554c88f136a | 0 |
Analyze the following code function for security vulnerabilities | public File privateKey() {
return privateKey;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: privateKey
File: handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java
Repository: netty
The code follows secure coding practices. | [
"CWE-378",
"CWE-379"
] | CVE-2021-21290 | LOW | 1.9 | netty | privateKey | handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java | c735357bf29d07856ad171c6611a2e1a0e0000ec | 0 |
Analyze the following code function for security vulnerabilities | private static void wait(int i) {
try {
// sleep at most 4096 ms
long sleep = (long) i * (long) i;
Thread.sleep(sleep);
} catch (InterruptedException e) {
// ignore
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wait
File: h2/src/main/org/h2/tools/Server.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | wait | h2/src/main/org/h2/tools/Server.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | Builder setLaunchedFromPackage(String fromPackage) {
mLaunchedFromPackage = fromPackage;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLaunchedFromPackage
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setLaunchedFromPackage | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setNextOperationSafety(@DevicePolicyOperation int operation,
@OperationSafetyReason int reason) {
Preconditions.checkCallAuthorization(
hasCallingOrSelfPermission(permission.MANAGE_DEVICE_ADMINS));
Slogf.i(LOG_TAG, "setNextOperationSafety(%s, %s)",
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNextOperationSafety
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setNextOperationSafety | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected List<Long> getModifiedProjectIds() {
List<Long> modified = _projectsMetadata.entrySet().stream()
.filter(e -> {
ProjectMetadata metadata = e.getValue();
if (metadata == null) return false;
return metadata.isDirty();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getModifiedProjectIds
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | getModifiedProjectIds | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | boolean isRelaunching() {
return mPendingRelaunchCount > 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRelaunching
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isRelaunching | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | void setServiceRegistry(ServiceRegistry serviceRegistry) {
this.serviceRegistry = serviceRegistry;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServiceRegistry
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2020-5230 | MEDIUM | 5 | opencast | setServiceRegistry | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java | bbb473f34ab95497d6c432c81285efb0c739f317 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated // since 2.12
protected boolean _parseBooleanFromInt(JsonParser p, DeserializationContext ctxt)
throws IOException
{
// 13-Oct-2016, tatu: As per [databind#1324], need to be careful wrt
// degenerate case of huge integers, legal in JSON.
// ... this is, on the oth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _parseBooleanFromInt
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _parseBooleanFromInt | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder xpathFind(String xpath) throws XPathExpressionException {
return xpathFind(xpath, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xpathFind
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | xpathFind | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private List<ComponentName> matchVerifiers(PackageInfoLite pkgInfo,
List<ResolveInfo> receivers, final PackageVerificationState verificationState) {
if (pkgInfo.verifiers.length == 0) {
return null;
}
final int N = pkgInfo.verifiers.length;
final List<ComponentNa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: matchVerifiers
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | matchVerifiers | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
void applyStyle(long themePtr, @AttrRes int defStyleAttr, @StyleRes int defStyleRes,
@Nullable XmlBlock.Parser parser, @NonNull int[] inAttrs, long outValuesAddress,
long outIndicesAddress) {
Objects.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyStyle
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | applyStyle | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | static int deleteMessages(Context context, SQLiteDatabase db,
String selection, String[] selectionArgs, Uri uri) {
Cursor cursor = db.query(TABLE_PDU, new String[] { Mms._ID },
selection, selectionArgs, null, null, null);
if (cursor == null) {
return 0;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteMessages
File: src/com/android/providers/telephony/MmsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-22"
] | CVE-2023-21268 | MEDIUM | 5.5 | android | deleteMessages | src/com/android/providers/telephony/MmsProvider.java | ca4c9a19635119d95900793e7a41b820cd1d94d9 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isDetailsVisible(T item) {
return detailsManager.isDetailsVisible(item);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDetailsVisible
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | isDetailsVisible | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void close() throws IOException {
if (this.channel != null) {
this.channel.close();
this.channel = null;
}
if (this.unpack != null) {
this.unpack.cleanUp();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: src/main/java/com/github/junrar/Archive.java
Repository: junrar
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2022-23596 | MEDIUM | 5 | junrar | close | src/main/java/com/github/junrar/Archive.java | 7b16b3d90b91445fd6af0adfed22c07413d4fab7 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isInWYSIWYGEditMode()
{
return getDriver().findElements(By.xpath("//div[@id='editcolumn' and contains(@class, 'editor-wysiwyg')]"))
.size() > 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInWYSIWYGEditMode
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | isInWYSIWYGEditMode | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean checkCanCloseSystemDialogs(int pid, int uid, @Nullable String packageName) {
return ActivityTaskManagerService.this.checkCanCloseSystemDialogs(pid, uid,
packageName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkCanCloseSystemDialogs
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | checkCanCloseSystemDialogs | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public static double[] uncompressDoubleArray(byte[] input, int offset, int length)
throws IOException
{
int uncompressedLength = Snappy.uncompressedLength(input, offset, length);
double[] result = new double[uncompressedLength / 8];
impl.rawUncompress(input, offset, length, resul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uncompressDoubleArray
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | uncompressDoubleArray | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | public void noteAlarmStart(IIntentSender sender, int sourceUid, String tag)
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noteAlarmStart
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | noteAlarmStart | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | boolean hasEmergencyCall() {
for (Call call : mCalls) {
if (call.isEmergencyCall()) {
return true;
}
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasEmergencyCall
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | hasEmergencyCall | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | public Hover doHover(DOMDocument xmlDocument, Position position, XMLHoverSettings settings,
CancelChecker cancelChecker) {
return hover.doHover(xmlDocument, position, settings, cancelChecker);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doHover
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-18212 | MEDIUM | 4 | eclipse/lemminx | doHover | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java | e37c399aa266be1b7a43061d4afc43dc230410d2 | 0 |
Analyze the following code function for security vulnerabilities | public static SQLiteConnectionManager getInstance() {
if (instance == null) {
if (logger.isDebugEnabled()) {
logger.debug("::Creating new SQLite ConnectionManager ::");
}
instance = new SQLiteConnectionManager();
}
return instance;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstance
File: extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | getInstance | extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.