instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
protected void engineInit(int opmode, Key key, SecureRandom random) throws InvalidKeyException {
checkAndSetEncodedKey(opmode, key);
try {
engineInitInternal(this.encodedKey, null, random);
} catch (InvalidAlgorithmParameterException e) {
// This can't actua... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineInit
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | engineInit | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | protected void setArgumentQuoteDelimiter( char argQuoteDelimiter )
{
this.argQuoteDelimiter = argQuoteDelimiter;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setArgumentQuoteDelimiter
File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | setArgumentQuoteDelimiter | src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | private void addAddressesToRecipientList(
final List<String> recipients, final String addressString) {
if (recipients == null) {
throw new IllegalArgumentException("recipientList cannot be null");
}
if (TextUtils.isEmpty(addressString)) {
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addAddressesToRecipientList
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | addAddressesToRecipientList | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SearchResult getForAdministrativeRead(SearchQuery q) throws SearchException, UnauthorizedException {
User user = securityService.getUser();
if (!user.hasRole(GLOBAL_ADMIN_ROLE) && !user.hasRole(user.getOrganization().getAdminRole()))
throw new UnauthorizedException(user, getClass().getN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getForAdministrativeRead
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-21318 | MEDIUM | 5.5 | opencast | getForAdministrativeRead | modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java | b18c6a7f81f08ed14884592a6c14c9ab611ad450 | 0 |
Analyze the following code function for security vulnerabilities | private void updateServerStatusIconAndText(RemoteOperationResult result) {
mServerStatusIcon = R.drawable.ic_alert; // the most common case in the switch below
switch (result.getCode()) {
case OK_SSL:
mServerStatusIcon = R.drawable.ic_lock_white;
mServerSt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateServerStatusIconAndText
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | updateServerStatusIconAndText | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | private void setTargetRootTaskIfNeeded(ActivityRecord intentActivity) {
intentActivity.getTaskFragment().clearLastPausedActivity();
Task intentTask = intentActivity.getTask();
if (mTargetRootTask == null) {
// Update launch target task when it is not indicated.
if (mSour... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTargetRootTaskIfNeeded
File: services/core/java/com/android/server/wm/ActivityStarter.java
Repository: android
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-21269 | HIGH | 7.8 | android | setTargetRootTaskIfNeeded | services/core/java/com/android/server/wm/ActivityStarter.java | 70ec64dc5a2a816d6aa324190a726a85fd749b30 | 0 |
Analyze the following code function for security vulnerabilities | public static String quoteArgument( String argument )
throws CommandLineException
{
return CommandLineUtils.quote( argument );
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: quoteArgument
File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | quoteArgument | src/main/java/org/codehaus/plexus/util/cli/Commandline.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | void scheduleUpdateBinderHeavyHitterWatcherConfig() {
// There are two sets of configs: the default watcher and the auto sampler,
// the default one takes precedence. System would kick off auto sampler when there is
// an anomaly (i.e., consecutive ANRs), but it'll be stopped automatically after... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleUpdateBinderHeavyHitterWatcherConfig
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | scheduleUpdateBinderHeavyHitterWatcherConfig | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void includeResource(ServletRequest request, Response response, RequestDispatcher dispatch)
throws ServletException, IOException {
dispatch.include(request, response);
// we need to re-configure the content length because Tomcat will truncate the output with the size of the welcome page... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: includeResource
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding pract... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | includeResource | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getLaunchedFromUid(IBinder activityToken) {
return ActivityClient.getInstance().getLaunchedFromUid(activityToken);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLaunchedFromUid
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getLaunchedFromUid | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void loadXWikiCollectionInternal(BaseCollection object, XWikiContext context, boolean bTransaction,
boolean alreadyLoaded) throws XWikiException
{
loadXWikiCollectionInternal(object, null, context, bTransaction, alreadyLoaded);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadXWikiCollectionInternal
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | loadXWikiCollectionInternal | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | void answer(Call call, int videoState) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("answer")) {
try {
logOutgoing("answer %s %d", callId, videoState);
if (VideoProfile.isAudioOnly(videoState)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: answer
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | answer | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | private String readName() throws IOException {
if (current=='"' || current=='\'') return readStringInternal(false);
StringBuilder name=new StringBuilder();
int space=-1, start=index;
while (true) {
if (current==':') {
if (name.length()==0) throw error("Found ':' but no key name (for an em... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readName
File: src/main/org/hjson/HjsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | readName | src/main/org/hjson/HjsonParser.java | 00e3b1325cb6c2b80b347dbec9181fd17ce0a599 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<String> searchDocuments(String parameterizedWhereClause, List<?> parameterValues) throws XWikiException
{
return this.xwiki.getStore().searchDocumentsNames(parameterizedWhereClause, parameterValues, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: searchDocuments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | searchDocuments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setAffiliationIds(ComponentName admin, List<String> ids) {
if (!mHasFeature) {
return;
}
if (ids == null) {
throw new IllegalArgumentException("ids must not be null");
}
for (String id : ids) {
if (TextUtils.isEmpty(id... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2023-21284
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Ensure policy has no absurdly long strings
The following APIs now enforce limits and throw IllegalArgumentException
when limits are violated:
* DPM.setTrustAgentConfiguration() limits agent packgage nam... | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setAffiliationIds | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 1 |
Analyze the following code function for security vulnerabilities | @NotNull
public static List<Element> getChildElementList(
Element parent,
String nodeName) {
List<Element> list = new ArrayList<>();
for (org.w3c.dom.Node node = parent.getFirstChild(); node != null; node = node.getNextSibling()) {
if (node.getNodeType() == org.w3c.dom.No... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getChildElementList
File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
Repository: dbeaver
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3836 | MEDIUM | 4.3 | dbeaver | getChildElementList | bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java | 4debf8f25184b7283681ed3fb5e9e887d9d4fe22 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isLockTaskFeatureEnabled(int lockTaskFeature) throws RemoteException {
int lockTaskFeatures = 0;
if (isPolicyEngineForFinanceFlagEnabled()) {
LockTaskPolicy policy = mDevicePolicyEngine.getResolvedPolicy(
PolicyDefinition.LOCK_TASK, getCurrentForegroundUse... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLockTaskFeatureEnabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isLockTaskFeatureEnabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getAutoTimeRequired() {
if (!mHasFeature) {
return false;
}
synchronized (getLockObject()) {
ActiveAdmin deviceOwner = getDeviceOwnerAdminLocked();
if (deviceOwner != null && deviceOwner.requireAutoTime) {
// If the... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAutoTimeRequired
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getAutoTimeRequired | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected URL resolve(final String path) throws Exception {
return loader.getResource(path);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolve
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | resolve | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | ConnInfo getConnInfo() {
return connInfo;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnInfo
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getConnInfo | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | private static final Logger getLogger() {
return Logger.getLogger(VaadinService.class.getName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLogger
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | getLogger | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | public void onScan() {
if (PermissionUtil.checkSelfPermission(this, Manifest.permission.CAMERA)) {
startQRScanner();
} else {
PermissionUtil.requestCameraPermission(this);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onScan
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | onScan | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | private void discardData() throws ClassNotFoundException, IOException {
primitiveData = emptyStream;
boolean resolve = mustResolve;
mustResolve = false;
do {
byte tc = nextTC();
if (tc == TC_ENDBLOCKDATA) {
mustResolve = resolve;
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: discardData
File: luni/src/main/java/java/io/ObjectInputStream.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | discardData | luni/src/main/java/java/io/ObjectInputStream.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | protected int engineGetBlockSize()
{
try
{
return cipher.getInputBlockSize();
}
catch (NullPointerException e)
{
throw new IllegalStateException("RSA Cipher not initialised");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineGetBlockSize
File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-361"
] | CVE-2016-1000345 | MEDIUM | 4.3 | bcgit/bc-java | engineGetBlockSize | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java | 21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract void sendStanzaInternal(Stanza packet) throws NotConnectedException, InterruptedException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendStanzaInternal
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | sendStanzaInternal | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | boolean cleanupDisabledPackageReceiversLocked(
String packageName, Set<String> filterByClasses, int userId, boolean doit) {
boolean didSomething = false;
for (int i = mParallelBroadcasts.size() - 1; i >= 0; i--) {
didSomething |= mParallelBroadcasts.get(i).cleanupDisabledPackageR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanupDisabledPackageReceiversLocked
File: services/core/java/com/android/server/am/BroadcastQueue.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | cleanupDisabledPackageReceiversLocked | services/core/java/com/android/server/am/BroadcastQueue.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public URI getWebhookUrl() {
return webhookUrl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWebhookUrl
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getWebhookUrl | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isRegistered() {
return isAttached() && getOwner().hasNode(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRegistered
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | isRegistered | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public boolean isWhitespace() throws XmlPullParserException {
// whitespace was stripped by aapt.
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isWhitespace
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | isWhitespace | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getPasswordMinimumUpperCase(ComponentName who, int userHandle, boolean parent) {
return getStrictestPasswordRequirement(who, userHandle, parent,
admin -> admin.mPasswordPolicy.upperCase, PASSWORD_QUALITY_COMPLEX);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPasswordMinimumUpperCase
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getPasswordMinimumUpperCase | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Exported(visibility=3)
public String getUpstreamProject() {
return upstreamProject;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUpstreamProject
File: core/src/main/java/hudson/model/Cause.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2067 | LOW | 3.5 | jenkinsci/jenkins | getUpstreamProject | core/src/main/java/hudson/model/Cause.java | 5d57c855f3147bfc5e7fda9252317b428a700014 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onConversationUpdate() {
refreshUi();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConversationUpdate
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onConversationUpdate | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @TestOnly
public int clone(ConsoleOutputStreamConsumer outputStreamConsumer, String url) {
return clone(outputStreamConsumer, url, Integer.MAX_VALUE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clone
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | clone | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | public boolean getAutoUpdate() {
return autoUpdate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAutoUpdate
File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | getAutoUpdate | domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | protected void setLastSizeChangedWH(int w, int h) {
// not used?
//this.lastSizeChangeW = w;
//this.lastSizeChangeH = h;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLastSizeChangedWH
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setLastSizeChangedWH | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private void fireReadEvent() {
if (activity != null && this.conversation != null) {
String uuid = getLastVisibleMessageUuid();
if (uuid != null) {
activity.onConversationRead(this.conversation, uuid);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fireReadEvent
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | fireReadEvent | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void close() throws IOException {
if (inflater != null) {
inflater.end();
}
super.close();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: src/main/java/net/lingala/zip4j/io/inputstream/InflaterInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | close | src/main/java/net/lingala/zip4j/io/inputstream/InflaterInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | protected String generateSetiId(String oortURL) {
return Oort.replacePunctuation(oortURL, '_');
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateSetiId
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | generateSetiId | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setOauthCredentials(String clientId, String clientSecret) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).setCredentials(clientId, clientSecret, isDebugging());
return this;
}
}
throw new RuntimeException("No O... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOauthCredentials
File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practic... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setOauthCredentials | samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setP2pModes(int initiatorModes, int targetModes) throws RemoteException {
NfcPermissions.enforceAdminPermissions(mContext);
mDeviceHost.setP2pInitiatorModes(initiatorModes);
mDeviceHost.setP2pTargetModes(targetModes);
applyRouting(true);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setP2pModes
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | setP2pModes | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | private Exception readException() throws WriteAbortedException,
OptionalDataException, ClassNotFoundException, IOException {
resetSeenObjects();
// Now we read the Throwable object that was saved
// WARNING - the grammar says it is a Throwable, but the
// WriteAbortedExcept... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readException
File: luni/src/main/java/java/io/ObjectInputStream.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | readException | luni/src/main/java/java/io/ObjectInputStream.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public void disconnect() {
sendMessage(CMD_DISCONNECT, StaEvent.DISCONNECT_GENERIC);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disconnect
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | disconnect | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return "SQLiteDatabase: " + getPath();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | toString | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | public List<ApkSigningBlockUtils.Result.SignerInfo.ContentDigest> getContentDigests() {
return mContentDigests;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContentDigests
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | getContentDigests | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | public static PageParameters paramsOf(Project project, BlobIdent blobIdent) {
return paramsOf(project, new State(blobIdent));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: paramsOf
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | paramsOf | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCrossedThreshold(boolean above) {
mStackScroller.setDimmed(!above /* dimmed */, true /* animate */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCrossedThreshold
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onCrossedThreshold | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final InputStream stream, final boolean validate) {
try (final Reader reader = new InputStreamReader(stream)) {
return unmarshal(clazz, new InputSource(reader), null, validate, false);
} catch (final IOException e) {
throw EXCEP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | public void removerCliente(Cliente cliente) throws ClassNotFoundException {
Connection con = null;
PreparedStatement stmt = null;
try {
con = ConnectionFactory.getConnection();
stmt = con.prepareStatement(stmtRemoveCliente);
stmt.setLong(1, cliente.getIdClient... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removerCliente
File: src/java/br/com/magazine/dao/ClienteDAO.java
Repository: evandro-machado/Trabalho-Web2
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2015-10061 | MEDIUM | 5.2 | evandro-machado/Trabalho-Web2 | removerCliente | src/java/br/com/magazine/dao/ClienteDAO.java | f59ac954625d0a4f6d34f069a2e26686a7a20aeb | 0 |
Analyze the following code function for security vulnerabilities | private void setSignalStrengthDefaultValues() {
mSignalStrength = new SignalStrength(true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSignalStrengthDefaultValues
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | setSignalStrengthDefaultValues | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerHttpResponse end(String data) {
response.end(data);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: end
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code follows secure codin... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | end | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract Object createDeserializationProxy(Object target, Map<String, ResultLoaderMap.LoadPair> unloadedProperties, ObjectFactory objectFactory,
List<Class<?>> constructorArgTypes, List<Object> constructorArgs); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDeserializationProxy
File: src/main/java/org/apache/ibatis/executor/loader/AbstractSerialStateHolder.java
Repository: mybatis/mybatis-3
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-26945 | MEDIUM | 5.1 | mybatis/mybatis-3 | createDeserializationProxy | src/main/java/org/apache/ibatis/executor/loader/AbstractSerialStateHolder.java | 9caf480e05c389548c9889362c2cb080d728b5d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String name() {
return route.name();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: name
File: jooby/src/main/java/org/jooby/internal/RouteImpl.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-15477 | MEDIUM | 4.3 | jooby-project/jooby | name | jooby/src/main/java/org/jooby/internal/RouteImpl.java | 34856a738829d8fedca4ed27bd6ff413af87186f | 0 |
Analyze the following code function for security vulnerabilities | private void validateNotOutsideSandbox() {
String dest = this.getFolder();
if (dest == null) {
return;
}
if (!(FilenameUtil.isNormalizedPathOutsideWorkingDir(dest))) {
setDestinationFolderError(format("Dest folder '%s' is not valid. It must be a sub-directory of t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateNotOutsideSandbox
File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | validateNotOutsideSandbox | config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | private boolean isActionAddedByCallStyle(Action action) {
// This is an internal extra added by the style to these actions. If an app were to add
// this extra to the action themselves, the action would be dropped. :shrug:
return action != null && action.getExtras().getBoolean(KEY_A... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isActionAddedByCallStyle
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isActionAddedByCallStyle | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public int countAttachments(String parametrizedSqlClause, List<?> parameterValues) throws XWikiException
{
return this.xwiki.countAttachments(parametrizedSqlClause, parameterValues, this.context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: countAttachments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | countAttachments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @MediumTest
@Test
public void testAddCallToConference1() throws Exception {
ParcelableCall conferenceCall = makeConferenceCall();
IdPair callId3 = startAndMakeActiveOutgoingCall("650-555-1214",
mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA);
// testAddCal... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-21283
- Severity: MEDIUM
- CVSS Score: 5.5
Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61
Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634
Fixes: 2... | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | testAddCallToConference1 | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public int getClearKeyCode() {
return DROID_IMPL_KEY_CLEAR;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClearKeyCode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getClearKeyCode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private int getIdleCurrentMa() {
return getResources().getInteger(R.integer.config_bluetooth_idle_cur_ma);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIdleCurrentMa
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | getIdleCurrentMa | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isKeyValid(String key) {
return !(TextUtils.isEmpty(key) || SettingsState.isBinary(key));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyValid
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | isKeyValid | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private void processAdmin(Context context,
HttpServletRequest request,
HttpServletResponse response)
throws ServletException, IOException, SQLException, AuthorizeException
{
// Token
String token = request.getParameter("token");
boolean free = request.getParameter("submit_free") != nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processAdmin
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-601",
"CWE-79"
] | CVE-2022-31192 | MEDIUM | 6.1 | DSpace | processAdmin | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java | 28eb8158210d41168a62ed5f9e044f754513bc37 | 0 |
Analyze the following code function for security vulnerabilities | public List<? extends LocationLink> findTypeDefinition(DOMDocument xmlDocument, Position position,
CancelChecker cancelChecker) {
return typeDefinition.findTypeDefinition(xmlDocument, position, cancelChecker);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findTypeDefinition
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-18212 | MEDIUM | 4 | eclipse/lemminx | findTypeDefinition | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java | e37c399aa266be1b7a43061d4afc43dc230410d2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void mergeFiles(String projectName, String repositoryName, Revision revision,
MergeQuery mergeQuery, AsyncMethodCallback resultHandler) {
handle(projectManager.get(projectName).repos().get(repositoryName)
.mergeFiles(convert(revision),... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergeFiles
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | mergeFiles | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | private UserAccountDAO uadao() {
return new UserAccountDAO(dataSource);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uadao
File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | uadao | web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | public void includeHosts( String hosts ) {
flags.addIncludedHost( hosts ) ;
} | Vulnerability Classification:
- CWE: CWE-78
- CVE: CVE-2018-17228
- Severity: HIGH
- CVSS Score: 7.5
Description: Adding hosts validation fixing https://github.com/narkisr/nmap4j/issues/9
Function: includeHosts
File: src/main/java/org/nmap4j/Nmap4j.java
Repository: narkisr/nmap4j
Fixed Code:
public void includeHosts... | [
"CWE-78"
] | CVE-2018-17228 | HIGH | 7.5 | narkisr/nmap4j | includeHosts | src/main/java/org/nmap4j/Nmap4j.java | 06b58aa3345d2f977553685a026b93e61f0c491e | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isTransformSupported() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTransformSupported
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isTransformSupported | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public List<String> getRecordLanguages() {
return recordLanguages;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRecordLanguages
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getRecordLanguages | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onPageStarted(WebView view, String url, Bitmap favicon)
{
Log.v(TAG, "Url changed: " + url);
super.onPageStarted(view, url, favicon);
nativeOnPageStarted(url, favicon);
} | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2021-29978
- Severity: HIGH
- CVSS Score: 10.0
Description: Add rebase
Function: onPageStarted
File: android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java
Repository: mozilla-mobile/mozilla-vpn-client
Fixed Code:
@Override
public void onPageStarted(W... | [
"CWE-Other"
] | CVE-2021-29978 | HIGH | 10 | mozilla-mobile/mozilla-vpn-client | onPageStarted | android/src/org/mozilla/firefox/vpn/qt/VPNWebView.java | c8440f464a2f5c4e7d4990152ee5850df8b23f42 | 1 |
Analyze the following code function for security vulnerabilities | public List<BaseBlock> getHeaders() {
return new ArrayList<BaseBlock>(headers);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHeaders
File: src/main/java/com/github/junrar/Archive.java
Repository: junrar
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2018-12418 | MEDIUM | 4.3 | junrar | getHeaders | src/main/java/com/github/junrar/Archive.java | ad8d0ba8e155630da8a1215cee3f253e0af45817 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean validateBssid(String bssid) {
if (bssid == null) return true;
if (bssid.isEmpty()) {
Log.e(TAG, "validateBssid failed: empty string");
return false;
}
// Allow reset of bssid with "any".
if (bssid.equals(ClientModeImpl.SUPPLICANT_BSS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateBssid
File: service/java/com/android/server/wifi/WifiConfigurationUtil.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21252 | MEDIUM | 5.5 | android | validateBssid | service/java/com/android/server/wifi/WifiConfigurationUtil.java | 50b08ee30e04d185e5ae97a5f717d436fd5a90f3 | 0 |
Analyze the following code function for security vulnerabilities | public void attachFile(List<String> spaces, String page, String name, InputStream is, boolean failIfExists,
UsernamePasswordCredentials credentials) throws Exception
{
UsernamePasswordCredentials currentCredentials = getDefaultCredentials();
try {
if (credentials != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachFile
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | attachFile | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setOauthAuthorizationCodeFlow(String code) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).useAuthorizationCodeFlow(code);
return this;
}
}
throw new RuntimeException("No OAuth2 authentication configured!");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOauthAuthorizationCodeFlow
File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure codi... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setOauthAuthorizationCodeFlow | samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() {
enforceNotIsolatedCaller("getProcessesInErrorState");
// assume our apps are happy - lazy create the list
List<ActivityManager.ProcessErrorStateInfo> errList = null;
final boolean allUsers = ActivityManager.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessesInErrorState
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getProcessesInErrorState | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("task/{nodeId}/configuration")
@Operation(summary = "This attaches the run-time configuration", description = "This attaches the run-time configuration onto a given task element")
@ApiResponse(responseCode = "200", description = "The task node configuration", content = {
@Content(mediaType = "applicati... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addTaskConfiguration
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | addTaskConfiguration | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | boolean isProcessAliveLocked(ProcessRecord proc) {
if (proc.procStatFile == null) {
proc.procStatFile = "/proc/" + proc.pid + "/stat";
}
mProcessStateStatsLongs[0] = 0;
if (!Process.readProcFile(proc.procStatFile, PROCESS_STATE_STATS_FORMAT, null,
mProcessStat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isProcessAliveLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | isProcessAliveLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private int getAggregatedPasswordComplexityLocked(@UserIdInt int userHandle,
boolean deviceWideOnly) {
ensureLocked();
final List<ActiveAdmin> admins;
if (deviceWideOnly) {
admins = getActiveAdminsForUserAndItsManagedProfilesLocked(userHandle,
/* shoul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAggregatedPasswordComplexityLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getAggregatedPasswordComplexityLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setApiKey(String apiKey) {
for (Authentication auth : authentications.values()) {
if (auth instanceof ApiKeyAuth) {
((ApiKeyAuth) auth).setApiKey(apiKey);
return this;
}
}
throw new RuntimeException("No API key authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApiKey
File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setApiKey | samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private Block tranform(XDOM xdom, Block block) throws RenderingException
{
TransformationContext transformationContext =
new TransformationContext(xdom, this.configuration.getDefaultSyntax(), false);
transformationContext.setTargetSyntax(this.configuration.getTargetSyntax());
tra... | Vulnerability Classification:
- CWE: CWE-284
- CVE: CVE-2023-26471
- Severity: HIGH
- CVSS Score: 8.8
Description: XWIKI-20234: It's possible to execute anything with superadmin right through comments and async macro
Function: tranform
File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/... | [
"CWE-284"
] | CVE-2023-26471 | HIGH | 8.8 | xwiki/xwiki-platform | tranform | xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java | 00532d9f1404287cf3ec3a05056640d809516006 | 1 |
Analyze the following code function for security vulnerabilities | AssetManager rebaseTheme(long themePtr, @NonNull AssetManager newAssetManager,
@StyleRes int[] styleIds, @StyleRes boolean[] force, int count) {
// Exchange ownership of the theme with the new asset manager.
if (this != newAssetManager) {
synchronized (this) {
ens... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rebaseTheme
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | rebaseTheme | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public boolean hostedByPackageForUser(String packageName, int userId) {
final int N = widgets.size();
for (int i = 0; i < N; i++) {
Widget widget = widgets.get(i);
if (packageName.equals(widget.host.id.packageName)
&& widget.host.getUserId(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hostedByPackageForUser
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | hostedByPackageForUser | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public ViewPage createPageWithAttachment(EntityReference reference, String content, String title,
String attachmentName, InputStream attachmentData, UsernamePasswordCredentials credentials) throws Exception
{
ViewPage vp = createPage(reference, content, title);
attachFile(reference, attachme... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createPageWithAttachment
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | createPageWithAttachment | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isDirectoryDirty(File dir) {
File nomedia = new File(dir, ".nomedia");
// We return false for directories that don't have .nomedia
if (!nomedia.exists()) {
return false;
}
// We don't write to ".nomedia" dirs, only to ".nomedia" files. If this ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDirectoryDirty
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | isDirectoryDirty | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | private void startQsSizeChangeAnimation(int oldHeight, final int newHeight) {
if (mQsSizeChangeAnimator != null) {
oldHeight = (int) mQsSizeChangeAnimator.getAnimatedValue();
mQsSizeChangeAnimator.cancel();
}
mQsSizeChangeAnimator = ValueAnimator.ofInt(oldHeight, newHeigh... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startQsSizeChangeAnimation
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | startQsSizeChangeAnimation | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static <T extends Descriptor> T find(Collection<? extends T> list, String className) {
for (T d : list) {
if(d.getClass().getName().equals(className))
return d;
}
// Since we introduced Descriptor.getId(), it is a preferred method of identifying descriptor by a... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2013-7330
- Severity: MEDIUM
- CVSS Score: 4.0
Description: [SECURITY-55]
This patch makes standard post-build action refuse to let you configure a downstream project you cannot currently build.
The one from parameterized-trigger will show an error in the config... | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | find | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 1 |
Analyze the following code function for security vulnerabilities | private void handleGroupSummaryRemoved(String key,
RankingMap ranking) {
Entry entry = mNotificationData.get(key);
if (entry != null && entry.row != null
&& entry.row.isSummaryWithChildren()) {
if (entry.notification.getOverrideGroupKey() != null && !entry.row.isD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleGroupSummaryRemoved
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | handleGroupSummaryRemoved | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void setTreatBaseUrlsAsLocal(Set<String> theTreatBaseUrlsAsLocal) {
myModelConfig.setTreatBaseUrlsAsLocal(theTreatBaseUrlsAsLocal);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTreatBaseUrlsAsLocal
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setTreatBaseUrlsAsLocal | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | private CloseableHttpResponse getHttpResponse(BaseMessage message) throws Exception {
URI uri = null;
HttpRequestBase httpRequest;
if (message instanceof CustomWebhookMessage) {
CustomWebhookMessage customWebhookMessage = (CustomWebhookMessage) message;
uri = buildUri(cus... | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2021-31828
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Support deny list for destinations
Function: getHttpResponse
File: notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java
Repository: op... | [
"CWE-918"
] | CVE-2021-31828 | MEDIUM | 5.5 | opendistro-for-elasticsearch/alerting | getHttpResponse | notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java | 49cc584dd6bd38ca26129eeaca5cd04e40a27f25 | 1 |
Analyze the following code function for security vulnerabilities | private void energyInfoCallback (int status, int ctrl_state,
long tx_time, long rx_time, long idle_time, long energy_used)
throws RemoteException {
if (ctrl_state >= BluetoothActivityEnergyInfo.BT_STACK_STATE_INVALID &&
ctrl_state <= BluetoothActivityEnergyInfo.BT_STACK_STATE_STA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: energyInfoCallback
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | energyInfoCallback | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | boolean isLastLockedTask(TaskRecord task) {
return mLockTaskModeTasks.size() == 1 && mLockTaskModeTasks.contains(task);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLastLockedTask
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | isLastLockedTask | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void unfreezeInsetsAfterStartInput() {
if (mActivityRecord != null) {
mActivityRecord.mImeInsetsFrozenUntilStartInput = false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unfreezeInsetsAfterStartInput
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | unfreezeInsetsAfterStartInput | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ActivityManager.TaskThumbnail getTaskThumbnail(int id) {
synchronized (this) {
enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER,
"getTaskThumbnail()");
TaskRecord tr = mStackSupervisor.anyTaskForIdLocked(id, false);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTaskThumbnail
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | getTaskThumbnail | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | boolean canShowWindows() {
return allDrawn && !(isAnimating(PARENTS, ANIMATION_TYPE_APP_TRANSITION)
&& hasNonDefaultColorWindow());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canShowWindows
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | canShowWindows | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isUIActive(UI ui) {
if (ui.isClosing()) {
return false;
}
// Check for long running tasks
Lock lockInstance = ui.getSession().getLockInstance();
if (lockInstance instanceof ReentrantLock) {
if (((ReentrantLock) lockInstance).hasQueuedThread... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUIActive
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | isUIActive | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ConfigurationInfo getDeviceConfigurationInfo() {
ConfigurationInfo config = new ConfigurationInfo();
synchronized (mGlobalLock) {
final Configuration globalConfig = getGlobalConfigurationForCallingPid();
config.reqTouchScreen = globalConfig.touchscreen;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceConfigurationInfo
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getDeviceConfigurationInfo | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public void setConnectionTimeout(int timeout) {
if(timeout < 0) {
throw new IllegalArgumentException("TCP connection timeout cannot be negative");
}
this.connectionTimeout = timeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConnectionTimeout
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | setConnectionTimeout | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private void fillInDefaultActivity(List<ShortcutInfo> shortcuts) {
ComponentName defaultActivity = null;
for (int i = shortcuts.size() - 1; i >= 0; i--) {
final ShortcutInfo si = shortcuts.get(i);
if (si.getActivity() == null) {
if (defaultActivity == null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillInDefaultActivity
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | fillInDefaultActivity | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private void announceSearchResultIfNeeded() {
if (AccessibilityManager.getInstance(mContext).isEnabled()) {
if (mAnnounceFilterResult == null) {
mAnnounceFilterResult = new AnnounceFilterResult();
}
mAnnounceFilterResult.post();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: announceSearchResultIfNeeded
File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | announceSearchResultIfNeeded | services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isInAdminMode()
{
return getDriver().getCurrentUrl().contains("/admin/");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInAdminMode
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | isInAdminMode | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public static int executeUpdateDelete(@NonNull SQLiteDatabase db, @NonNull String sql,
@Nullable Object[] bindArgs) throws SQLException {
Trace.beginSection("executeUpdateDelete");
try (SQLiteStatement st = db.compileStatement(sql)) {
bindArgs(st, bindArgs);
return st... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeUpdateDelete
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | executeUpdateDelete | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SocketAddress getLocalAddress() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalAddress
File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2019-10184 | MEDIUM | 5 | undertow-io/undertow | getLocalAddress | servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java | d2715e3afa13f50deaa19643676816ce391551e9 | 0 |
Analyze the following code function for security vulnerabilities | public OHttpRequest getRequest() {
return request;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequest
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | getRequest | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.