instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override protected void engineInit(int opmode, Key key, SecureRandom random) throws InvalidKeyException { checkAndSetEncodedKey(opmode, key); try { engineInitInternal(this.encodedKey, null, random); } catch (InvalidAlgorithmParameterException e) { // This can't actua...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineInit File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
engineInit
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
protected void setArgumentQuoteDelimiter( char argQuoteDelimiter ) { this.argQuoteDelimiter = argQuoteDelimiter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setArgumentQuoteDelimiter File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
setArgumentQuoteDelimiter
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
private void addAddressesToRecipientList( final List<String> recipients, final String addressString) { if (recipients == null) { throw new IllegalArgumentException("recipientList cannot be null"); } if (TextUtils.isEmpty(addressString)) { return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAddressesToRecipientList File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
addAddressesToRecipientList
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public SearchResult getForAdministrativeRead(SearchQuery q) throws SearchException, UnauthorizedException { User user = securityService.getUser(); if (!user.hasRole(GLOBAL_ADMIN_ROLE) && !user.hasRole(user.getOrganization().getAdminRole())) throw new UnauthorizedException(user, getClass().getN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getForAdministrativeRead File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
getForAdministrativeRead
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
private void updateServerStatusIconAndText(RemoteOperationResult result) { mServerStatusIcon = R.drawable.ic_alert; // the most common case in the switch below switch (result.getCode()) { case OK_SSL: mServerStatusIcon = R.drawable.ic_lock_white; mServerSt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateServerStatusIconAndText File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
updateServerStatusIconAndText
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private void setTargetRootTaskIfNeeded(ActivityRecord intentActivity) { intentActivity.getTaskFragment().clearLastPausedActivity(); Task intentTask = intentActivity.getTask(); if (mTargetRootTask == null) { // Update launch target task when it is not indicated. if (mSour...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTargetRootTaskIfNeeded File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setTargetRootTaskIfNeeded
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
public static String quoteArgument( String argument ) throws CommandLineException { return CommandLineUtils.quote( argument ); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: quoteArgument File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
quoteArgument
src/main/java/org/codehaus/plexus/util/cli/Commandline.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
void scheduleUpdateBinderHeavyHitterWatcherConfig() { // There are two sets of configs: the default watcher and the auto sampler, // the default one takes precedence. System would kick off auto sampler when there is // an anomaly (i.e., consecutive ANRs), but it'll be stopped automatically after...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleUpdateBinderHeavyHitterWatcherConfig File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
scheduleUpdateBinderHeavyHitterWatcherConfig
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void includeResource(ServletRequest request, Response response, RequestDispatcher dispatch) throws ServletException, IOException { dispatch.include(request, response); // we need to re-configure the content length because Tomcat will truncate the output with the size of the welcome page...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: includeResource File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding pract...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
includeResource
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public int getLaunchedFromUid(IBinder activityToken) { return ActivityClient.getInstance().getLaunchedFromUid(activityToken); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchedFromUid File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getLaunchedFromUid
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void loadXWikiCollectionInternal(BaseCollection object, XWikiContext context, boolean bTransaction, boolean alreadyLoaded) throws XWikiException { loadXWikiCollectionInternal(object, null, context, bTransaction, alreadyLoaded); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadXWikiCollectionInternal File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
loadXWikiCollectionInternal
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
void answer(Call call, int videoState) { final String callId = mCallIdMapper.getCallId(call); if (callId != null && isServiceValid("answer")) { try { logOutgoing("answer %s %d", callId, videoState); if (VideoProfile.isAudioOnly(videoState)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: answer File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
answer
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private String readName() throws IOException { if (current=='"' || current=='\'') return readStringInternal(false); StringBuilder name=new StringBuilder(); int space=-1, start=index; while (true) { if (current==':') { if (name.length()==0) throw error("Found ':' but no key name (for an em...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readName File: src/main/org/hjson/HjsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readName
src/main/org/hjson/HjsonParser.java
00e3b1325cb6c2b80b347dbec9181fd17ce0a599
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<String> searchDocuments(String parameterizedWhereClause, List<?> parameterValues) throws XWikiException { return this.xwiki.getStore().searchDocumentsNames(parameterizedWhereClause, parameterValues, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
searchDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public void setAffiliationIds(ComponentName admin, List<String> ids) { if (!mHasFeature) { return; } if (ids == null) { throw new IllegalArgumentException("ids must not be null"); } for (String id : ids) { if (TextUtils.isEmpty(id...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2023-21284 - Severity: MEDIUM - CVSS Score: 5.5 Description: Ensure policy has no absurdly long strings The following APIs now enforce limits and throw IllegalArgumentException when limits are violated: * DPM.setTrustAgentConfiguration() limits agent packgage nam...
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setAffiliationIds
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
1
Analyze the following code function for security vulnerabilities
@NotNull public static List<Element> getChildElementList( Element parent, String nodeName) { List<Element> list = new ArrayList<>(); for (org.w3c.dom.Node node = parent.getFirstChild(); node != null; node = node.getNextSibling()) { if (node.getNodeType() == org.w3c.dom.No...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildElementList File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java Repository: dbeaver The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3836
MEDIUM
4.3
dbeaver
getChildElementList
bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
4debf8f25184b7283681ed3fb5e9e887d9d4fe22
0
Analyze the following code function for security vulnerabilities
private boolean isLockTaskFeatureEnabled(int lockTaskFeature) throws RemoteException { int lockTaskFeatures = 0; if (isPolicyEngineForFinanceFlagEnabled()) { LockTaskPolicy policy = mDevicePolicyEngine.getResolvedPolicy( PolicyDefinition.LOCK_TASK, getCurrentForegroundUse...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLockTaskFeatureEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isLockTaskFeatureEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean getAutoTimeRequired() { if (!mHasFeature) { return false; } synchronized (getLockObject()) { ActiveAdmin deviceOwner = getDeviceOwnerAdminLocked(); if (deviceOwner != null && deviceOwner.requireAutoTime) { // If the...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAutoTimeRequired File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAutoTimeRequired
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected URL resolve(final String path) throws Exception { return loader.getResource(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolve File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
resolve
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
ConnInfo getConnInfo() { return connInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnInfo File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
getConnInfo
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
private static final Logger getLogger() { return Logger.getLogger(VaadinService.class.getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogger File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
getLogger
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
public void onScan() { if (PermissionUtil.checkSelfPermission(this, Manifest.permission.CAMERA)) { startQRScanner(); } else { PermissionUtil.requestCameraPermission(this); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onScan File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
onScan
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private void discardData() throws ClassNotFoundException, IOException { primitiveData = emptyStream; boolean resolve = mustResolve; mustResolve = false; do { byte tc = nextTC(); if (tc == TC_ENDBLOCKDATA) { mustResolve = resolve; re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: discardData File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
discardData
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
protected int engineGetBlockSize() { try { return cipher.getInputBlockSize(); } catch (NullPointerException e) { throw new IllegalStateException("RSA Cipher not initialised"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineGetBlockSize File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-361" ]
CVE-2016-1000345
MEDIUM
4.3
bcgit/bc-java
engineGetBlockSize
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java
21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35
0
Analyze the following code function for security vulnerabilities
protected abstract void sendStanzaInternal(Stanza packet) throws NotConnectedException, InterruptedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendStanzaInternal File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendStanzaInternal
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
boolean cleanupDisabledPackageReceiversLocked( String packageName, Set<String> filterByClasses, int userId, boolean doit) { boolean didSomething = false; for (int i = mParallelBroadcasts.size() - 1; i >= 0; i--) { didSomething |= mParallelBroadcasts.get(i).cleanupDisabledPackageR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanupDisabledPackageReceiversLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
cleanupDisabledPackageReceiversLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Nullable public URI getWebhookUrl() { return webhookUrl; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWebhookUrl File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
getWebhookUrl
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
private boolean isRegistered() { return isAttached() && getOwner().hasNode(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRegistered File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
isRegistered
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
public boolean isWhitespace() throws XmlPullParserException { // whitespace was stripped by aapt. return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWhitespace File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
isWhitespace
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public int getPasswordMinimumUpperCase(ComponentName who, int userHandle, boolean parent) { return getStrictestPasswordRequirement(who, userHandle, parent, admin -> admin.mPasswordPolicy.upperCase, PASSWORD_QUALITY_COMPLEX); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordMinimumUpperCase File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPasswordMinimumUpperCase
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Exported(visibility=3) public String getUpstreamProject() { return upstreamProject; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUpstreamProject File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
getUpstreamProject
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
@Override public void onConversationUpdate() { refreshUi(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConversationUpdate File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onConversationUpdate
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@TestOnly public int clone(ConsoleOutputStreamConsumer outputStreamConsumer, String url) { return clone(outputStreamConsumer, url, Integer.MAX_VALUE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clone File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
clone
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public boolean getAutoUpdate() { return autoUpdate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAutoUpdate File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
getAutoUpdate
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
protected void setLastSizeChangedWH(int w, int h) { // not used? //this.lastSizeChangeW = w; //this.lastSizeChangeH = h; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLastSizeChangedWH File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setLastSizeChangedWH
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void fireReadEvent() { if (activity != null && this.conversation != null) { String uuid = getLastVisibleMessageUuid(); if (uuid != null) { activity.onConversationRead(this.conversation, uuid); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fireReadEvent File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
fireReadEvent
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public void close() throws IOException { if (inflater != null) { inflater.end(); } super.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: src/main/java/net/lingala/zip4j/io/inputstream/InflaterInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
close
src/main/java/net/lingala/zip4j/io/inputstream/InflaterInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
protected String generateSetiId(String oortURL) { return Oort.replacePunctuation(oortURL, '_'); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateSetiId File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
generateSetiId
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthCredentials(String clientId, String clientSecret) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setCredentials(clientId, clientSecret, isDebugging()); return this; } } throw new RuntimeException("No O...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthCredentials File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practic...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthCredentials
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void setP2pModes(int initiatorModes, int targetModes) throws RemoteException { NfcPermissions.enforceAdminPermissions(mContext); mDeviceHost.setP2pInitiatorModes(initiatorModes); mDeviceHost.setP2pTargetModes(targetModes); applyRouting(true); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setP2pModes File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
setP2pModes
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
private Exception readException() throws WriteAbortedException, OptionalDataException, ClassNotFoundException, IOException { resetSeenObjects(); // Now we read the Throwable object that was saved // WARNING - the grammar says it is a Throwable, but the // WriteAbortedExcept...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readException File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readException
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void disconnect() { sendMessage(CMD_DISCONNECT, StaEvent.DISCONNECT_GENERIC); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disconnect File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
disconnect
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return "SQLiteDatabase: " + getPath(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
toString
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
public List<ApkSigningBlockUtils.Result.SignerInfo.ContentDigest> getContentDigests() { return mContentDigests; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentDigests File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getContentDigests
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public static PageParameters paramsOf(Project project, BlobIdent blobIdent) { return paramsOf(project, new State(blobIdent)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: paramsOf File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
paramsOf
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
@Override public void onCrossedThreshold(boolean above) { mStackScroller.setDimmed(!above /* dimmed */, true /* animate */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCrossedThreshold File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onCrossedThreshold
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static <T> T unmarshal(final Class<T> clazz, final InputStream stream, final boolean validate) { try (final Reader reader = new InputStreamReader(stream)) { return unmarshal(clazz, new InputSource(reader), null, validate, false); } catch (final IOException e) { throw EXCEP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unmarshal File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
unmarshal
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
public void removerCliente(Cliente cliente) throws ClassNotFoundException { Connection con = null; PreparedStatement stmt = null; try { con = ConnectionFactory.getConnection(); stmt = con.prepareStatement(stmtRemoveCliente); stmt.setLong(1, cliente.getIdClient...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removerCliente File: src/java/br/com/magazine/dao/ClienteDAO.java Repository: evandro-machado/Trabalho-Web2 The code follows secure coding practices.
[ "CWE-89" ]
CVE-2015-10061
MEDIUM
5.2
evandro-machado/Trabalho-Web2
removerCliente
src/java/br/com/magazine/dao/ClienteDAO.java
f59ac954625d0a4f6d34f069a2e26686a7a20aeb
0
Analyze the following code function for security vulnerabilities
private void setSignalStrengthDefaultValues() { mSignalStrength = new SignalStrength(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSignalStrengthDefaultValues File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
setSignalStrengthDefaultValues
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
@Override public ServerHttpResponse end(String data) { response.end(data); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: end File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follows secure codin...
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
end
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
protected abstract Object createDeserializationProxy(Object target, Map<String, ResultLoaderMap.LoadPair> unloadedProperties, ObjectFactory objectFactory, List<Class<?>> constructorArgTypes, List<Object> constructorArgs);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDeserializationProxy File: src/main/java/org/apache/ibatis/executor/loader/AbstractSerialStateHolder.java Repository: mybatis/mybatis-3 The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-26945
MEDIUM
5.1
mybatis/mybatis-3
createDeserializationProxy
src/main/java/org/apache/ibatis/executor/loader/AbstractSerialStateHolder.java
9caf480e05c389548c9889362c2cb080d728b5d8
0
Analyze the following code function for security vulnerabilities
@Override public String name() { return route.name(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: name File: jooby/src/main/java/org/jooby/internal/RouteImpl.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-15477
MEDIUM
4.3
jooby-project/jooby
name
jooby/src/main/java/org/jooby/internal/RouteImpl.java
34856a738829d8fedca4ed27bd6ff413af87186f
0
Analyze the following code function for security vulnerabilities
private void validateNotOutsideSandbox() { String dest = this.getFolder(); if (dest == null) { return; } if (!(FilenameUtil.isNormalizedPathOutsideWorkingDir(dest))) { setDestinationFolderError(format("Dest folder '%s' is not valid. It must be a sub-directory of t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateNotOutsideSandbox File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
validateNotOutsideSandbox
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
private boolean isActionAddedByCallStyle(Action action) { // This is an internal extra added by the style to these actions. If an app were to add // this extra to the action themselves, the action would be dropped. :shrug: return action != null && action.getExtras().getBoolean(KEY_A...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isActionAddedByCallStyle File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
isActionAddedByCallStyle
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public int countAttachments(String parametrizedSqlClause, List<?> parameterValues) throws XWikiException { return this.xwiki.countAttachments(parametrizedSqlClause, parameterValues, this.context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countAttachments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
countAttachments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@MediumTest @Test public void testAddCallToConference1() throws Exception { ParcelableCall conferenceCall = makeConferenceCall(); IdPair callId3 = startAndMakeActiveOutgoingCall("650-555-1214", mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA); // testAddCal...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 2...
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testAddCallToConference1
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
@Override public int getClearKeyCode() { return DROID_IMPL_KEY_CLEAR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClearKeyCode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getClearKeyCode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private int getIdleCurrentMa() { return getResources().getInteger(R.integer.config_bluetooth_idle_cur_ma); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIdleCurrentMa File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
getIdleCurrentMa
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
private static boolean isKeyValid(String key) { return !(TextUtils.isEmpty(key) || SettingsState.isBinary(key)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyValid File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isKeyValid
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
private void processAdmin(Context context, HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException, SQLException, AuthorizeException { // Token String token = request.getParameter("token"); boolean free = request.getParameter("submit_free") != nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAdmin File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java Repository: DSpace The code follows secure coding practices.
[ "CWE-601", "CWE-79" ]
CVE-2022-31192
MEDIUM
6.1
DSpace
processAdmin
dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java
28eb8158210d41168a62ed5f9e044f754513bc37
0
Analyze the following code function for security vulnerabilities
public List<? extends LocationLink> findTypeDefinition(DOMDocument xmlDocument, Position position, CancelChecker cancelChecker) { return typeDefinition.findTypeDefinition(xmlDocument, position, cancelChecker); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findTypeDefinition File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
findTypeDefinition
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
@Override public void mergeFiles(String projectName, String repositoryName, Revision revision, MergeQuery mergeQuery, AsyncMethodCallback resultHandler) { handle(projectManager.get(projectName).repos().get(repositoryName) .mergeFiles(convert(revision),...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeFiles File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java Repository: line/centraldogma The code follows secure coding practices.
[ "CWE-862" ]
CVE-2021-38388
MEDIUM
6.5
line/centraldogma
mergeFiles
server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd
0
Analyze the following code function for security vulnerabilities
private UserAccountDAO uadao() { return new UserAccountDAO(dataSource); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uadao File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
uadao
web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
public void includeHosts( String hosts ) { flags.addIncludedHost( hosts ) ; }
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2018-17228 - Severity: HIGH - CVSS Score: 7.5 Description: Adding hosts validation fixing https://github.com/narkisr/nmap4j/issues/9 Function: includeHosts File: src/main/java/org/nmap4j/Nmap4j.java Repository: narkisr/nmap4j Fixed Code: public void includeHosts...
[ "CWE-78" ]
CVE-2018-17228
HIGH
7.5
narkisr/nmap4j
includeHosts
src/main/java/org/nmap4j/Nmap4j.java
06b58aa3345d2f977553685a026b93e61f0c491e
1
Analyze the following code function for security vulnerabilities
@Override public boolean isTransformSupported() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTransformSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isTransformSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public List<String> getRecordLanguages() { return recordLanguages; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecordLanguages File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getRecordLanguages
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
@Override public void onPageStarted(WebView view, String url, Bitmap favicon) { Log.v(TAG, "Url changed: " + url); super.onPageStarted(view, url, favicon); nativeOnPageStarted(url, favicon); }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2021-29978 - Severity: HIGH - CVSS Score: 10.0 Description: Add rebase Function: onPageStarted File: android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java Repository: mozilla-mobile/mozilla-vpn-client Fixed Code: @Override public void onPageStarted(W...
[ "CWE-Other" ]
CVE-2021-29978
HIGH
10
mozilla-mobile/mozilla-vpn-client
onPageStarted
android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java
c8440f464a2f5c4e7d4990152ee5850df8b23f42
1
Analyze the following code function for security vulnerabilities
public List<BaseBlock> getHeaders() { return new ArrayList<BaseBlock>(headers); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaders File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2018-12418
MEDIUM
4.3
junrar
getHeaders
src/main/java/com/github/junrar/Archive.java
ad8d0ba8e155630da8a1215cee3f253e0af45817
0
Analyze the following code function for security vulnerabilities
private static boolean validateBssid(String bssid) { if (bssid == null) return true; if (bssid.isEmpty()) { Log.e(TAG, "validateBssid failed: empty string"); return false; } // Allow reset of bssid with "any". if (bssid.equals(ClientModeImpl.SUPPLICANT_BSS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateBssid File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
validateBssid
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
public void attachFile(List<String> spaces, String page, String name, InputStream is, boolean failIfExists, UsernamePasswordCredentials credentials) throws Exception { UsernamePasswordCredentials currentCredentials = getDefaultCredentials(); try { if (credentials != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachFile File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
attachFile
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthAuthorizationCodeFlow(String code) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).useAuthorizationCodeFlow(code); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthAuthorizationCodeFlow File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure codi...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthAuthorizationCodeFlow
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() { enforceNotIsolatedCaller("getProcessesInErrorState"); // assume our apps are happy - lazy create the list List<ActivityManager.ProcessErrorStateInfo> errList = null; final boolean allUsers = ActivityManager....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessesInErrorState File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
getProcessesInErrorState
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@PUT @Path("task/{nodeId}/configuration") @Operation(summary = "This attaches the run-time configuration", description = "This attaches the run-time configuration onto a given task element") @ApiResponse(responseCode = "200", description = "The task node configuration", content = { @Content(mediaType = "applicati...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addTaskConfiguration File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
addTaskConfiguration
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
boolean isProcessAliveLocked(ProcessRecord proc) { if (proc.procStatFile == null) { proc.procStatFile = "/proc/" + proc.pid + "/stat"; } mProcessStateStatsLongs[0] = 0; if (!Process.readProcFile(proc.procStatFile, PROCESS_STATE_STATS_FORMAT, null, mProcessStat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isProcessAliveLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
isProcessAliveLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private int getAggregatedPasswordComplexityLocked(@UserIdInt int userHandle, boolean deviceWideOnly) { ensureLocked(); final List<ActiveAdmin> admins; if (deviceWideOnly) { admins = getActiveAdminsForUserAndItsManagedProfilesLocked(userHandle, /* shoul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAggregatedPasswordComplexityLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAggregatedPasswordComplexityLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKey(String apiKey) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKey(apiKey); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKey File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKey
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private Block tranform(XDOM xdom, Block block) throws RenderingException { TransformationContext transformationContext = new TransformationContext(xdom, this.configuration.getDefaultSyntax(), false); transformationContext.setTargetSyntax(this.configuration.getTargetSyntax()); tra...
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-26471 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20234: It's possible to execute anything with superadmin right through comments and async macro Function: tranform File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/...
[ "CWE-284" ]
CVE-2023-26471
HIGH
8.8
xwiki/xwiki-platform
tranform
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java
00532d9f1404287cf3ec3a05056640d809516006
1
Analyze the following code function for security vulnerabilities
AssetManager rebaseTheme(long themePtr, @NonNull AssetManager newAssetManager, @StyleRes int[] styleIds, @StyleRes boolean[] force, int count) { // Exchange ownership of the theme with the new asset manager. if (this != newAssetManager) { synchronized (this) { ens...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rebaseTheme File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
rebaseTheme
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public boolean hostedByPackageForUser(String packageName, int userId) { final int N = widgets.size(); for (int i = 0; i < N; i++) { Widget widget = widgets.get(i); if (packageName.equals(widget.host.id.packageName) && widget.host.getUserId(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hostedByPackageForUser File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
hostedByPackageForUser
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public ViewPage createPageWithAttachment(EntityReference reference, String content, String title, String attachmentName, InputStream attachmentData, UsernamePasswordCredentials credentials) throws Exception { ViewPage vp = createPage(reference, content, title); attachFile(reference, attachme...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPageWithAttachment File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
createPageWithAttachment
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public static boolean isDirectoryDirty(File dir) { File nomedia = new File(dir, ".nomedia"); // We return false for directories that don't have .nomedia if (!nomedia.exists()) { return false; } // We don't write to ".nomedia" dirs, only to ".nomedia" files. If this ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDirectoryDirty File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
isDirectoryDirty
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
private void startQsSizeChangeAnimation(int oldHeight, final int newHeight) { if (mQsSizeChangeAnimator != null) { oldHeight = (int) mQsSizeChangeAnimator.getAnimatedValue(); mQsSizeChangeAnimator.cancel(); } mQsSizeChangeAnimator = ValueAnimator.ofInt(oldHeight, newHeigh...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startQsSizeChangeAnimation File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
startQsSizeChangeAnimation
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static <T extends Descriptor> T find(Collection<? extends T> list, String className) { for (T d : list) { if(d.getClass().getName().equals(className)) return d; } // Since we introduced Descriptor.getId(), it is a preferred method of identifying descriptor by a...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2013-7330 - Severity: MEDIUM - CVSS Score: 4.0 Description: [SECURITY-55] This patch makes standard post-build action refuse to let you configure a downstream project you cannot currently build. The one from parameterized-trigger will show an error in the config...
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
find
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
1
Analyze the following code function for security vulnerabilities
private void handleGroupSummaryRemoved(String key, RankingMap ranking) { Entry entry = mNotificationData.get(key); if (entry != null && entry.row != null && entry.row.isSummaryWithChildren()) { if (entry.notification.getOverrideGroupKey() != null && !entry.row.isD...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleGroupSummaryRemoved File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
handleGroupSummaryRemoved
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setTreatBaseUrlsAsLocal(Set<String> theTreatBaseUrlsAsLocal) { myModelConfig.setTreatBaseUrlsAsLocal(theTreatBaseUrlsAsLocal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTreatBaseUrlsAsLocal File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setTreatBaseUrlsAsLocal
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
private CloseableHttpResponse getHttpResponse(BaseMessage message) throws Exception { URI uri = null; HttpRequestBase httpRequest; if (message instanceof CustomWebhookMessage) { CustomWebhookMessage customWebhookMessage = (CustomWebhookMessage) message; uri = buildUri(cus...
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2021-31828 - Severity: MEDIUM - CVSS Score: 5.5 Description: Support deny list for destinations Function: getHttpResponse File: notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java Repository: op...
[ "CWE-918" ]
CVE-2021-31828
MEDIUM
5.5
opendistro-for-elasticsearch/alerting
getHttpResponse
notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java
49cc584dd6bd38ca26129eeaca5cd04e40a27f25
1
Analyze the following code function for security vulnerabilities
private void energyInfoCallback (int status, int ctrl_state, long tx_time, long rx_time, long idle_time, long energy_used) throws RemoteException { if (ctrl_state >= BluetoothActivityEnergyInfo.BT_STACK_STATE_INVALID && ctrl_state <= BluetoothActivityEnergyInfo.BT_STACK_STATE_STA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: energyInfoCallback File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
energyInfoCallback
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
boolean isLastLockedTask(TaskRecord task) { return mLockTaskModeTasks.size() == 1 && mLockTaskModeTasks.contains(task); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLastLockedTask File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
isLastLockedTask
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override public void unfreezeInsetsAfterStartInput() { if (mActivityRecord != null) { mActivityRecord.mImeInsetsFrozenUntilStartInput = false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unfreezeInsetsAfterStartInput File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
unfreezeInsetsAfterStartInput
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public ActivityManager.TaskThumbnail getTaskThumbnail(int id) { synchronized (this) { enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER, "getTaskThumbnail()"); TaskRecord tr = mStackSupervisor.anyTaskForIdLocked(id, false); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTaskThumbnail File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
getTaskThumbnail
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
boolean canShowWindows() { return allDrawn && !(isAnimating(PARENTS, ANIMATION_TYPE_APP_TRANSITION) && hasNonDefaultColorWindow()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canShowWindows File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
canShowWindows
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public boolean isUIActive(UI ui) { if (ui.isClosing()) { return false; } // Check for long running tasks Lock lockInstance = ui.getSession().getLockInstance(); if (lockInstance instanceof ReentrantLock) { if (((ReentrantLock) lockInstance).hasQueuedThread...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUIActive File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
isUIActive
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
@Override public ConfigurationInfo getDeviceConfigurationInfo() { ConfigurationInfo config = new ConfigurationInfo(); synchronized (mGlobalLock) { final Configuration globalConfig = getGlobalConfigurationForCallingPid(); config.reqTouchScreen = globalConfig.touchscreen; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceConfigurationInfo File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getDeviceConfigurationInfo
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public void setConnectionTimeout(int timeout) { if(timeout < 0) { throw new IllegalArgumentException("TCP connection timeout cannot be negative"); } this.connectionTimeout = timeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectionTimeout File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setConnectionTimeout
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
private void fillInDefaultActivity(List<ShortcutInfo> shortcuts) { ComponentName defaultActivity = null; for (int i = shortcuts.size() - 1; i >= 0; i--) { final ShortcutInfo si = shortcuts.get(i); if (si.getActivity() == null) { if (defaultActivity == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillInDefaultActivity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
fillInDefaultActivity
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void announceSearchResultIfNeeded() { if (AccessibilityManager.getInstance(mContext).isEnabled()) { if (mAnnounceFilterResult == null) { mAnnounceFilterResult = new AnnounceFilterResult(); } mAnnounceFilterResult.post(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: announceSearchResultIfNeeded File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-610" ]
CVE-2023-40133
MEDIUM
5.5
android
announceSearchResultIfNeeded
services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
08becc8c600f14c5529115cc1a1e0c97cd503f33
0
Analyze the following code function for security vulnerabilities
public boolean isInAdminMode() { return getDriver().getCurrentUrl().contains("/admin/"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInAdminMode File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
isInAdminMode
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public static int executeUpdateDelete(@NonNull SQLiteDatabase db, @NonNull String sql, @Nullable Object[] bindArgs) throws SQLException { Trace.beginSection("executeUpdateDelete"); try (SQLiteStatement st = db.compileStatement(sql)) { bindArgs(st, bindArgs); return st...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeUpdateDelete File: src/com/android/providers/media/util/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-35683
MEDIUM
5.5
android
executeUpdateDelete
src/com/android/providers/media/util/DatabaseUtils.java
23d156ed1bed6d2c2b325f0be540d0afca510c49
0
Analyze the following code function for security vulnerabilities
@Override public SocketAddress getLocalAddress() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalAddress File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
getLocalAddress
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
public OHttpRequest getRequest() { return request; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequest File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
getRequest
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0