instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private boolean isLegacyPolicyVisibility() {
return (mPolicyVisibility & LEGACY_POLICY_VISIBILITY) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLegacyPolicyVisibility
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isLegacyPolicyVisibility | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public static int getTotalDates(Structure structure)
{
String typeField = Field.FieldType.DATE.toString();
int intDate = getTotals(structure,typeField);
typeField = Field.FieldType.DATE_TIME.toString();
int intDateTime = getTotals(structure,typeField);
return intDate + intDateTime;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTotalDates
File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | getTotalDates | src/com/dotmarketing/portlets/structure/factories/StructureFactory.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | void revertAndEndBackup() {
if (MORE_DEBUG) Slog.i(TAG, "Reverting backup queue - restaging everything");
addBackupTrace("transport error; reverting");
// We want to reset the backup schedule based on whatever the transport suggests
// by way of retry/backoff time.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: revertAndEndBackup
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | revertAndEndBackup | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private void inflateEmptyShadeView() {
mEmptyShadeView = (EmptyShadeView) LayoutInflater.from(mContext).inflate(
R.layout.status_bar_no_notifications, mStackScroller, false);
mStackScroller.setEmptyShadeView(mEmptyShadeView);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inflateEmptyShadeView
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | inflateEmptyShadeView | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static ByteSink asByteSink(File file, FileWriteMode... modes) {
return new FileByteSink(file, modes);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asByteSink
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | asByteSink | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | private void sendNotificationAccountUpdated(Account account, UserAccounts accounts) {
Map<String, Integer> packagesToVisibility = getRequestingPackages(account, accounts);
for (Entry<String, Integer> packageToVisibility : packagesToVisibility.entrySet()) {
if ((packageToVisibility.getValue(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendNotificationAccountUpdated
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | sendNotificationAccountUpdated | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Test(description = "Test and run a module which has a module name contains period. eg: foo.bar")
public void testBuildAndRunModuleWithPeriod() throws BallerinaTestException {
// Test ballerina init
Path projectPath = tempProjectDirectory.resolve("buildAndRunModuleWithPeriodProject");
// Cr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testBuildAndRunModuleWithPeriod
File: tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java
Repository: ballerina-platform/ballerina-lang
The code follows secure codin... | [
"CWE-306"
] | CVE-2021-32700 | MEDIUM | 5.8 | ballerina-platform/ballerina-lang | testBuildAndRunModuleWithPeriod | tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java | 4609ffee1744ecd16aac09303b1783bf0a525816 | 0 |
Analyze the following code function for security vulnerabilities | public static final String getRevision() {
return "a";
} | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-29784
- Severity: MEDIUM
- CVSS Score: 5.0
Description: 安全漏洞修复 感谢 姜洋-长亭科技
Function: getRevision
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java
Repository: sanluan/PublicCMS
Fixed Code:
public static fin... | [
"CWE-Other"
] | CVE-2022-29784 | MEDIUM | 5 | sanluan/PublicCMS | getRevision | publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java | d8d7626cf51e4968fb384e1637a3c0c9921f33e9 | 1 |
Analyze the following code function for security vulnerabilities | public SVNLogFilter createSVNLogFilter() {
return new DefaultSVNLogFilter(getExcludedRegionsPatterns(), getIncludedRegionsPatterns(),
getExcludedUsersNormalized(), getExcludedRevprop(), getExcludedCommitMessagesPatterns(), isIgnoreDirPropChanges());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createSVNLogFilter
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | createSVNLogFilter | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public void incrementUpvotes() {
if (this.upvotes == null) {
this.upvotes = 1L;
} else {
this.upvotes = this.upvotes + 1L;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: incrementUpvotes
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | incrementUpvotes | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public static NativeObject jsFunction_createApplicationKeys(Context cx, Scriptable thisObj,
Object[] args, Function funObj)
throws ScriptException, APIManagementException {
if (args != null && args.length > 7) {
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_createApplicationKeys
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secu... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_createApplicationKeys | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | public static void noSpace(String string) throws JSONException {
int i, length = string.length();
if (length == 0) {
throw new JSONException("Empty string.");
}
for (i = 0; i < length; i += 1) {
if (Character.isWhitespace(string.charAt(i))) {
throw... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noSpace
File: src/main/java/org/json/XML.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2022-45688 | HIGH | 7.5 | stleary/JSON-java | noSpace | src/main/java/org/json/XML.java | f566a1d9ee1f8139357017dc6c7def1da19cd8d4 | 0 |
Analyze the following code function for security vulnerabilities | public static String getScheme(HttpServletRequest request) {
if (null != request) {
String scheme = request.getHeader("X-Forwarded-Proto");
if ("https".equals(scheme) || "http".equals(scheme)) {
return scheme;
} else {
return request.getScheme(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScheme
File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | getScheme | publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | public Jooby caseSensitiveRouting(boolean enabled) {
this.caseSensitiveRouting = enabled;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: caseSensitiveRouting
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | caseSensitiveRouting | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | private @PersonalAppsSuspensionReason int makeSuspensionReasons(
boolean explicit, boolean timeout) {
int result = PERSONAL_APPS_NOT_SUSPENDED;
if (explicit) {
result |= PERSONAL_APPS_SUSPENDED_EXPLICITLY;
}
if (timeout) {
result |= PERSONAL_APPS_SUSPE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeSuspensionReasons
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | makeSuspensionReasons | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private String getJobToken() {
String jobToken = Job.getToken(request);
if (jobToken != null)
return jobToken;
else
throw new GeneralException("Job token is expected");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJobToken
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesResource.java
Repository: theonedev/onedev
The code follows secure coding practices... | [
"CWE-502"
] | CVE-2021-21243 | HIGH | 7.5 | theonedev/onedev | getJobToken | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesResource.java | 9637fc8fa461c5777282a0021c3deb1e7a48f137 | 0 |
Analyze the following code function for security vulnerabilities | static boolean signaturesMatch(Signature[] storedSigs, PackageInfo target) {
if (target == null) {
return false;
}
// If the target resides on the system partition, we allow it to restore
// data from the like-named package in a restore set even if the signatures
// ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: signaturesMatch
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | signaturesMatch | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Node getPreviousSibling() {
return doc.getPreviousSibling();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPreviousSibling
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | getPreviousSibling | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | private void dispatchDemoCommandToView(String command, Bundle args, int id) {
if (mStatusBarView == null) return;
View v = mStatusBarView.findViewById(id);
if (v instanceof DemoMode) {
((DemoMode)v).dispatchDemoCommand(command, args);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchDemoCommandToView
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | dispatchDemoCommandToView | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public List<String> getTraceLogs() {
return traceLogs;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTraceLogs
File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | getTraceLogs | src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DTDHandler getDTDHandler() {
return saxDTDHandler;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDTDHandler
File: core/src/java/org/jdom2/input/SAXBuilder.java
Repository: hunterhacker/jdom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33813 | MEDIUM | 5 | hunterhacker/jdom | getDTDHandler | core/src/java/org/jdom2/input/SAXBuilder.java | bd3ab78370098491911d7fe9d7a43b97144a234e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setDefaultDialerApplication(String packageName) {
if (!mHasFeature || !mHasTelephonyFeature) {
return;
}
final CallerIdentity caller = getCallerIdentity();
final int callerUserId = caller.getUserId();
Preconditions.checkCallAuthorization(isD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDefaultDialerApplication
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setDefaultDialerApplication | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void putStringForUser(ContentResolver resolver, String name, String value,
int userHandle) {
Settings.Secure.putStringForUser(resolver, name, value, userHandle);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: putStringForUser
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | putStringForUser | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public TailPrettyLoggable<String, LogWatch> sinceTime(String sinceTimestamp) {
return new PodOperationsImpl(getContext().withSinceTimestamp(sinceTimestamp));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sinceTime
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | sinceTime | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeSetActiveNavigationEntryTitleForUrl(long nativeTabAndroid, String url,
String title); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeSetActiveNavigationEntryTitleForUrl
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeSetActiveNavigationEntryTitleForUrl | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Jooby onStarted(final Throwing.Consumer<Registry> callback) {
requireNonNull(callback, "Callback is required.");
onStarted.add(callback);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStarted
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | onStarted | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getNameForUid(int uid) {
// reader
synchronized (mPackages) {
Object obj = mSettings.getUserIdLPr(UserHandle.getAppId(uid));
if (obj instanceof SharedUserSetting) {
final SharedUserSetting sus = (SharedUserSetting) obj;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNameForUid
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getNameForUid | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String getSpacePreference(String preferenceKey, SpaceReference spaceReference, String defaultValue,
XWikiContext context)
{
XWikiDocument currentDocument = context.getDoc();
try {
if (spaceReference != null) {
context.setDoc(new XWikiDocument(new DocumentR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpacePreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getSpacePreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void setAdminCanGrantSensorsPermissionForUserUnchecked(@UserIdInt int userId,
boolean canGrant) {
Slogf.d(LOG_TAG, "setAdminCanGrantSensorsPermissionForUserUnchecked(%d, %b)",
userId, canGrant);
synchronized (getLockObject()) {
ActiveAdmin owner = getDevic... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAdminCanGrantSensorsPermissionForUserUnchecked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setAdminCanGrantSensorsPermissionForUserUnchecked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void resendMessage(final Message message) {
if (message.isFileOrImage()) {
if (!(message.getConversation() instanceof Conversation)) {
return;
}
final Conversation conversation = (Conversation) message.getConversation();
DownloadableFile fi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resendMessage
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | resendMessage | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public @Nullable Reader getNCharacterStream(String columnName) throws SQLException {
return getNCharacterStream(findColumn(columnName));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNCharacterStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getNCharacterStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | void scheduleLaunchTaskBehindComplete(IBinder token) {
mHandler.obtainMessage(LAUNCH_TASK_BEHIND_COMPLETE, token).sendToTarget();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleLaunchTaskBehindComplete
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | scheduleLaunchTaskBehindComplete | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getMinY() {
if (HAS_MIN_Y) {
return getWorld().getMinHeight();
}
return super.getMinY();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMinY
File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | getMinY | worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping(value = { "/read" })
public String actionRead(HttpServletRequest theServletRequest, HomeRequest theRequest, BindingResult theBindingResult, ModelMap theModel) {
addCommonParams(theServletRequest, theRequest, theModel);
CaptureInterceptor interceptor = new CaptureInterceptor();
GenericClient clie... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2020-24301
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Resolve XSS vulnerability
Function: actionRead
File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java
Repository: hapifhir/hapi-fhir
Fixed Code:
@RequestMapping(value = { "/read"... | [
"CWE-79"
] | CVE-2020-24301 | MEDIUM | 4.3 | hapifhir/hapi-fhir | actionRead | hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java | adb3734fcbbf9a9165445e9ee5eef168dbcaedaf | 1 |
Analyze the following code function for security vulnerabilities | public static DiagnosticSeverity getNoGrammarSeverity(ContentModelSettings settings) {
DiagnosticSeverity defaultSeverity = DiagnosticSeverity.Hint;
if (settings == null || settings.getValidation() == null) {
return defaultSeverity;
}
XMLValidationSettings problems = settings.getValidation();
String noGram... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNoGrammarSeverity
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-18213 | MEDIUM | 6.5 | eclipse/lemminx | getNoGrammarSeverity | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java | c8bf3245a72cace50ee2aae5eee69538c58ce056 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final void activityIdle(IBinder token, Configuration config, boolean stopProfiling) {
final long origId = Binder.clearCallingIdentity();
synchronized (this) {
ActivityStack stack = ActivityRecord.getStackLocked(token);
if (stack != null) {
Act... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityIdle
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | activityIdle | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public long write(final InputStream inputStream, final RASegmentOutputStream segmentOutputStream,
final boolean close) {
long bytesWritten = 0;
try {
try {
bytesWritten = StreamUtil.streamToStream(inputStream, segmentOutputStream, close);
} f... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-1000651
- Severity: HIGH
- CVSS Score: 7.5
Description: gh-813 Turn on secure processing feature for XML parsers etc
Function: write
File: stroom-core-server/src/main/java/stroom/streamstore/server/fs/serializable/RawInputSegmentWriter.java
Repository: gchq... | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | write | stroom-core-server/src/main/java/stroom/streamstore/server/fs/serializable/RawInputSegmentWriter.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void setName(Group group, String name) throws SQLException {
if (group.isPermanent()) {
log.error("Attempt to rename permanent Group {} to {}.",
group.getName(), name);
throw new SQLException("Attempt to rename a permanent Group");
} els... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setName
File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | setName | dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isValidFragment(String fragmentName) {
// Almost all fragments are wrapped in this,
// except for a few that have their own activities.
for (int i = 0; i < SettingsGateway.ENTRY_FRAGMENTS.length; i++) {
if (SettingsGateway.ENTRY_FRAGMENTS[i].equals(fragmentName)) re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidFragment
File: src/com/android/settings/SettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | isValidFragment | src/com/android/settings/SettingsActivity.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | private CellIdentity getLastKnownCellIdentity() {
TelephonyManager telephonyManager = mContext.getSystemService(TelephonyManager.class);
if (telephonyManager != null) {
CellIdentity lastKnownCellIdentity = telephonyManager.getLastKnownCellIdentity();
try {
mAppOps... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastKnownCellIdentity
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | getLastKnownCellIdentity | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setAllowAppSwitches(@NonNull String type, int uid, int userId) {
synchronized (ActivityManagerService.this) {
if (mUserController.isUserRunning(userId, ActivityManager.FLAG_OR_STOPPED)) {
ArrayMap<String, Integer> types = mAllowAppSwitchUids.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAllowAppSwitches
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setAllowAppSwitches | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private void removeShortcutAsync(@NonNull final String... id) {
Objects.requireNonNull(id);
removeShortcutAsync(Arrays.asList(id));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeShortcutAsync
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | removeShortcutAsync | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | public void setDpcDownloaded(boolean downloaded) {
Preconditions.checkCallAuthorization(hasCallingOrSelfPermission(
MANAGE_PROFILE_AND_DEVICE_OWNERS));
int setTo = downloaded ? 1 : 0;
mInjector.binderWithCleanCallingIdentity(() -> Settings.Secure.putInt(
mContex... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDpcDownloaded
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setDpcDownloaded | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void performIdleMaintenance() {
if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Requires permission "
+ android.Manifest.permission.SET_ACTIVITY_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performIdleMaintenance
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | performIdleMaintenance | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | void initializeSendOrSave(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeSendOrSave
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | initializeSendOrSave | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @JsonProperty("RevokedBy")
public String getRevokedBy() {
return revokedBy;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevokedBy
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getRevokedBy | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public Rectangle getPageSizeWithRotation(PdfDictionary page) {
Rectangle rect = getPageSize(page);
int rotation = getPageRotation(page);
while (rotation > 0) {
rect = rect.rotate();
rotation -= 90;
}
return rect;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageSizeWithRotation
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getPageSizeWithRotation | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLoadProgressChanged(int progress) {
mContentsClient.onProgressChanged(progress);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLoadProgressChanged
File: android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | onLoadProgressChanged | android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void setProjectNamingStrategy(ProjectNamingStrategy ns) {
if(ns == null){
ns = DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY;
}
projectNamingStrategy = ns;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProjectNamingStrategy
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | setProjectNamingStrategy | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public void attachStack(int stackId, int displayId) {
final long origId = Binder.clearCallingIdentity();
try {
synchronized (mWindowMap) {
final DisplayContent displayContent = mDisplayContents.get(displayId);
if (displayContent != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachStack
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | attachStack | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void setAppFullscreen(IBinder token, boolean toOpaque) {
synchronized (mWindowMap) {
AppWindowToken atoken = findAppWindowToken(token);
if (atoken != null) {
atoken.appFullscreen = toOpaque;
setWindowOpaqueLocked(token, toOpaque);
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAppFullscreen
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setAppFullscreen | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void pulseWhileDozing(@NonNull PulseCallback callback, int reason) {
mDozeScrimController.pulse(new PulseCallback() {
@Override
public void onPulseStarted() {
callback.onPulseStarted();
Collection<HeadsUpManage... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pulseWhileDozing
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | pulseWhileDozing | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void removeContainerViewObserver(ContainerViewObserver observer) {
mContainerViewObservers.removeObserver(observer);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContainerViewObserver
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | removeContainerViewObserver | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void execute(String jobToken, JobContext jobContext) {
AgentQuery parsedQeury = AgentQuery.parse(agentQuery, true);
TaskLogger jobLogger = jobContext.getLogger();
OneDev.getInstance(ResourceManager.class).run(new AgentAwareRunnable() {
@Override
public void runOn(Long agentId, Session age... | Vulnerability Classification:
- CWE: CWE-610
- CVE: CVE-2022-39206
- Severity: CRITICAL
- CVSS Score: 9.9
Description: Fix the docker sock mount security vulnerability
Function: execute
File: server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExec... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | execute | server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 1 |
Analyze the following code function for security vulnerabilities | public String getLocalUserName(String user, XWikiContext context)
{
if (hasCentralizedAuthentication(context)) {
return getUserName(user, null, true, context);
} else {
return getUserName(user.substring(user.indexOf(':') + 1), null, true, context);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalUserName
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getLocalUserName | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void onDetach() {
List<StateNode> nodes = new ArrayList<>();
visitNodeTreeBottomUp(nodes::add);
nodes.forEach(StateNode::handleOnDetach);
for (StateNode node : nodes) {
if (node.hasBeenAttached) {
node.hasBeenDetached = true;
node.fireD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onDetach
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | onDetach | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public void sendVerificationEmail(Sysprop identifier, HttpServletRequest req) {
if (identifier != null) {
Map<String, Object> model = new HashMap<String, Object>();
Map<String, String> lang = getLang(req);
String subject = Utils.formatMessage(lang.get("signin.welcome"), CONF.appName());
String body = getD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendVerificationEmail
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | sendVerificationEmail | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | static void logInfo(final HttpQuery query, final String msg) {
LOG.info(query.channel().toString() + ' ' + msg);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logInfo
File: src/tsd/GraphHandler.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2023-25826 | CRITICAL | 9.8 | OpenTSDB/opentsdb | logInfo | src/tsd/GraphHandler.java | 26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25 | 0 |
Analyze the following code function for security vulnerabilities | public void rename(String newDocumentName, List<String> backlinkDocumentNames) throws XWikiException
{
rename(newDocumentName, backlinkDocumentNames, Collections.emptyList());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rename
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | rename | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> setEndRow(long endRow) {
this.endRow = endRow;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEndRow
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | setEndRow | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerHttpRequest serverRequest() {
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serverRequest
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code follows se... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | serverRequest | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | private Document getDocument(final InputStream input) throws SAXException {
try {
final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setValidating(true);
// get the dtd location
final String dtdFile = "/games/strategy/engine/xml/" + DTD_FILE_NAME;
fina... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-1000546
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Ensure XXE security
Function: getDocument
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
Fixed Code:
private Document getDocument(final Inp... | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | getDocument | game-core/src/main/java/games/strategy/engine/data/GameParser.java | e41eda46690989f03550315bbbfb833bbd28020c | 1 |
Analyze the following code function for security vulnerabilities | public void onSetUp() throws Exception {
databaseTester.onSetup();
pipelineTimeline.clearWhichIsEvilAndShouldNotBeUsedInRealWorld();
if (sqlMapClient != null) {
for (Cache cache : sqlMapClient.getConfiguration().getCaches()) {
cache.clear();
}
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSetUp
File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | onSetUp | server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | public JSONArray put(int index, Collection value) throws JSONException {
put(index, new JSONArray(value));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | put | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping(value = "/repository/restful/artifact/PUT/*", method = RequestMethod.PUT)
public ModelAndView putArtifact(@RequestParam("pipelineName") String pipelineName,
@RequestParam("pipelineCounter") String pipelineCounter,
@RequestParam(... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-43289
- Severity: MEDIUM
- CVSS Score: 5.0
Description: #000 - Validate stage counter during upload artifacts
Function: putArtifact
File: server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java
Repository: gocd
Fixed Code:
@Reque... | [
"CWE-22"
] | CVE-2021-43289 | MEDIUM | 5 | gocd | putArtifact | server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java | c22e0428164af25d3e91baabd3f538a41cadc82f | 1 |
Analyze the following code function for security vulnerabilities | @Test
public void closeClientTwiceTenant(TestContext context) {
PostgresClient c = PostgresClient.getInstance(vertx, TENANT);
context.assertNotNull(c.getClient(), "getClient()");
c.closeClient(context.asyncAssertSuccess());
context.assertNull(c.getClient(), "getClient()");
c.closeClient(context.as... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeClientTwiceTenant
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | closeClientTwiceTenant | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onStorageVolumeMounted(@Nullable String volumeUuid,
boolean fingerprintChanged) {
mPermissionManagerServiceImpl.onStorageVolumeMounted(volumeUuid, fingerprintChanged);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStorageVolumeMounted
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | onStorageVolumeMounted | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isAbleToLogin(String username, String password, String serverURL,
String tenantDomain) throws APIManagementException {
boolean loginStatus = false;
//String serverURL = config.getFirstProperty(APIConstants.AUTH_MANAGER_URL);
if (serverURL == null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAbleToLogin
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure coding practices... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | isAbleToLogin | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean equals(Object o) {
if (this == o) return true;
if (!(o instanceof RemoteCacheKey)) return false;
RemoteCacheKey that = (RemoteCacheKey) o;
if (forceReturnValue != that.forceReturnValue) return false;
return !(cacheName != null ? !cacheName.eq... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | equals | client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java | efc44b7b0a5dd4f44773808840dd9785cabcf21c | 0 |
Analyze the following code function for security vulnerabilities | public boolean requestVisibleBehind(IBinder token, boolean visible) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestVisibleBehind
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | requestVisibleBehind | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean dumpActivity(FileDescriptor fd, PrintWriter pw, String name,
String[] args, int opti, boolean dumpAll, boolean dumpVisibleRootTasksOnly,
boolean dumpFocusedRootTaskOnly, @UserIdInt int userId) {
return ActivityTaskManagerService.this.dumpActiv... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpActivity
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | dumpActivity | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getCoreConditionSQL(CoreCondition condition) {
String columnSQL = getColumnSQL(condition.getColumn());
CoreFunctionType type = condition.getFunction();
Object[] params = condition.getParameters();
if (CoreFunctionType.IS_NULL.equals(type)) {
return... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCoreConditionSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getCoreConditionSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setBasePath(String basePath) {
this.basePath = basePath;
setOauthBasePath(basePath);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBasePath
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setBasePath | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void execute() {
try {
transactionManager.run(new Runnable() {
@Override
public void run() {
Date now = new Date();
for (Iterator<Map.Entry<Long, Date>> it = updateDates.entrySet().iterator(); it.hasNext();) {
Map.Entry<Long, Date> entry = it.next();
if (now.getTim... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: execute
File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | execute | server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServerVariables(Map<String, String> serverVariables) {
this.serverVariables = serverVariables;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServerVariables
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServerVariables | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected void shareLink(boolean http) {
String uri = getShareableUri(http);
if (uri == null || uri.isEmpty()) {
return;
}
Intent intent = new Intent(Intent.ACTION_SEND);
intent.setType("text/plain");
intent.putExtra(Intent.EXTRA_TEXT, getShareableUri(http));
try {
startActivity(Intent.createChooser... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shareLink
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | shareLink | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public void remQsTile(ComponentName tile) {
mQSPanel.getHost().removeTile(tile);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: remQsTile
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | remQsTile | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public List<Delta> getContentDiff(String fromRev, XWikiContext context)
throws XWikiException, DifferentiationFailedException
{
XWikiDocument revdoc = context.getWiki().getDocument(this, fromRev, context);
return getContentDiff(revdoc, this, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContentDiff
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getContentDiff | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void privateMsgInMuc(Conversation conversation, String nick) {
switchToConversation(conversation, null, false, nick, true);
} | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2018-18467
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Do not insert text shared over XMPP uri when already drafting message
XMPP uris in the style of `xmpp:test@domain.tld?body=Something` can be used to
directly share a message with a specific contact. Pr... | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | privateMsgInMuc | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 1 |
Analyze the following code function for security vulnerabilities | public void refreshConfig() {
Yaml yaml = new Yaml();
StringWriter writer = new StringWriter();
yaml.dump(configObj, writer);
configStr = writer.toString();
try {
Files.write(Paths.get("config.yaml"),
configStr.getBytes(StandardCharsets.UTF_8));
... | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2022-41958
- Severity: HIGH
- CVSS Score: 7.8
Description: yaml rce
Function: refreshConfig
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
Fixed Code:
public void refreshConfig() {
Yaml yaml = new Yaml(new SafeConst... | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | refreshConfig | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 1 |
Analyze the following code function for security vulnerabilities | @Override
public IActivityClientController getActivityClientController() {
return mActivityClientController;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActivityClientController
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getActivityClientController | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | private static void fullNavBar(HttpServletRequest request, String suffix, BaseDataInitVO baseDataInitVO) {
List<LogNav> logNavList = baseDataInitVO.getLogNavs();
for (LogNav logNav : logNavList) {
String url = logNav.get("url").toString();
if ("/".equals(url) && ("/all-1".equals(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fullNavBar
File: web/src/main/java/com/zrlog/web/interceptor/TemplateHelper.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21316 | MEDIUM | 4.3 | 94fzb/zrlog | fullNavBar | web/src/main/java/com/zrlog/web/interceptor/TemplateHelper.java | b921c1ae03b8290f438657803eee05226755c941 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isImmersiveMode(int vis) {
final int flags = View.SYSTEM_UI_FLAG_IMMERSIVE | View.SYSTEM_UI_FLAG_IMMERSIVE_STICKY;
return mNavigationBar != null
&& (vis & View.SYSTEM_UI_FLAG_HIDE_NAVIGATION) != 0
&& (vis & flags) != 0
&& canHideNavigationB... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isImmersiveMode
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | isImmersiveMode | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void setDocumentConversionService(
DocumentConversionService documentConversionService) {
this.documentConversionService = documentConversionService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDocumentConversionService
File: bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43798 | MEDIUM | 5.4 | bigbluebutton | setDocumentConversionService | bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java | 02ba4c6ff8e78a0f4384ad1b7c7367c5a90376e8 | 0 |
Analyze the following code function for security vulnerabilities | private Intent newRequestAccountAccessIntent(Account account, String packageName,
int uid, RemoteCallback callback) {
return newGrantCredentialsPermissionIntent(account, packageName, uid,
new AccountAuthenticatorResponse(new IAccountAuthenticatorResponse.Stub() {
@Overrid... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newRequestAccountAccessIntent
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | newRequestAccountAccessIntent | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | private void consumeMethodFrame(Frame f) throws IOException {
if (f.type == AMQP.FRAME_METHOD) {
this.method = AMQImpl.readMethodFrom(f.getInputStream());
this.state = this.method.hasContent() ? CAState.EXPECTING_CONTENT_HEADER : CAState.COMPLETE;
} else {
throw new U... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: consumeMethodFrame
File: src/main/java/com/rabbitmq/client/impl/CommandAssembler.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | consumeMethodFrame | src/main/java/com/rabbitmq/client/impl/CommandAssembler.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private void resolveHostUidLocked(String pkg, int uid) {
final int N = mHosts.size();
for (int i = 0; i < N; i++) {
Host host = mHosts.get(i);
if (host.id.uid == UNKNOWN_UID && pkg.equals(host.id.packageName)) {
if (DEBUG) {
Slog.i(TAG, "host "... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveHostUidLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | resolveHostUidLocked | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public static void move(File from, File to) throws IOException {
checkNotNull(from);
checkNotNull(to);
checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to);
if (!from.renameTo(to)) {
copy(from, to);
if (!from.delete()) {
if (!to.delete()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: move
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | move | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | private static String subtag(String full, String attribute) {
int start = full.indexOf(attribute);
if (start < 0) {
return null;
}
start += attribute.length();
int end = full.indexOf(';', start);
if (end < 0) {
return full.substring(start);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: subtag
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | subtag | core/java/android/content/res/StringBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public <T> ApiResponse<T> invokeAPI(String path, String method, List<Pair> queryParams, Object body, Map<String, String> headerParams, Map<String, String> cookieParams, Map<String, Object> formParams, String accept, String contentType, String[] authNames, GenericType<T> returnType, boolean isBodyNullable)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: invokeAPI
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | invokeAPI | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasEditComment()
{
return this.xwiki.hasEditComment(this.context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasEditComment
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | hasEditComment | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private void setTitleFromIntent(Intent intent) {
Log.d(LOG_TAG, "Starting to set activity title");
final int initialTitleResId = intent.getIntExtra(EXTRA_SHOW_FRAGMENT_TITLE_RESID, -1);
if (initialTitleResId > 0) {
mInitialTitle = null;
mInitialTitleResId = initialTitleRe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTitleFromIntent
File: src/com/android/settings/SettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | setTitleFromIntent | src/com/android/settings/SettingsActivity.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | public void save(Page page, int... expectedCodes) throws Exception
{
save(page, true, expectedCodes);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | save | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Object> find(int page, int pageSize) {
Map<String, Object> data = new HashMap<>();
String sql = "select l.*,t.typeName,t.alias as typeAlias,u.userName,(select count(commentId) from " + Comment.TABLE_NAME + " where logId=l.logId) commentSize from " + TABLE_NAME + " l inner join user u ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: find
File: data/src/main/java/com/zrlog/model/Log.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-17420 | MEDIUM | 6.5 | 94fzb/zrlog | find | data/src/main/java/com/zrlog/model/Log.java | 157b8fbbb64eb22ddb52e7c5754e88180b7c3d4f | 0 |
Analyze the following code function for security vulnerabilities | public ClientConfig getClientConfig() {
return clientConfig;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientConfig
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure codin... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getClientConfig | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void generateData(Object itemId, Item item, JsonObject rowData) {
RowReference row = new RowReference(Grid.this);
row.set(itemId);
if (rowStyleGenerator != null) {
String style = rowStyleGenerator.getStyle(row);
put(GridState.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateData
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | generateData | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public void lockOrientation(boolean portrait) {
if (getActivity() == null) {
return;
}
if(portrait){
getActivity().setRequestedOrientation(ActivityInfo.SCREEN_ORIENTATION_PORTRAIT);
}else{
getActivity().setRequestedOrientation(ActivityInfo.SCREEN_ORIEN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lockOrientation
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | lockOrientation | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public NetworkUpdateResult updateBeforeSaveNetwork(WifiConfiguration config, int callingUid,
@NonNull String packageName) {
NetworkUpdateResult result = addOrUpdateNetwork(config, callingUid);
if (!result.isSuccess()) {
Log.e(TAG, "saveNetwork adding/updating config=" + config + ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBeforeSaveNetwork
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | updateBeforeSaveNetwork | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | final boolean isSleeping() {
final Task rootTask = getRootTask();
return rootTask != null ? rootTask.shouldSleepActivities() : mAtmService.isSleepingLocked();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSleeping
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isSleeping | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public int getXWikiPreferenceAsInt(String preference)
{
return this.xwiki.getXWikiPreferenceAsInt(preference, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXWikiPreferenceAsInt
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getXWikiPreferenceAsInt | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.