instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public ZentaoConfig setUserConfig(UserDTO.PlatformInfo userPlatInfo) {
ZentaoConfig zentaoConfig = getConfig();
if (userPlatInfo != null && StringUtils.isNotBlank(userPlatInfo.getZentaoUserName())
&& StringUtils.isNotBlank(userPlatInfo.getZentaoPassword())) {
zentaoConfig.set... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserConfig
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | setUserConfig | test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public boolean handleApplicationWtf(final IBinder app, final String tag, boolean system,
final ApplicationErrorReport.CrashInfo crashInfo) {
final int callingUid = Binder.getCallingUid();
final int callingPid = Binder.getCallingPid();
if (system) {
// If this is coming f... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleApplicationWtf
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | handleApplicationWtf | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onWindowFocusChanged(boolean hasWindowFocus) {
super.onWindowFocusChanged(hasWindowFocus);
if (hasWindowFocus) {
if (mShowKeyboardOnWindowFocus && isFocused()) {
// Without the call to post(..), the keyboard was not getting shown when the
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onWindowFocusChanged
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | onWindowFocusChanged | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | boolean checkEnterPictureInPictureAppOpsState() {
return mAtmService.getAppOpsManager().checkOpNoThrow(
OP_PICTURE_IN_PICTURE, info.applicationInfo.uid, packageName) == MODE_ALLOWED;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkEnterPictureInPictureAppOpsState
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | checkEnterPictureInPictureAppOpsState | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public String dialogHorizontalSpacer(int width) {
return "<td><span style=\"display:block; height: 1px; width: " + width + "px;\"></span></td>";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogHorizontalSpacer
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogHorizontalSpacer | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | private boolean mayProceed(String studyOid, StudySubjectBean ssBean) throws Exception {
boolean accessPermission = false;
ParticipantPortalRegistrar participantPortalRegistrar= new ParticipantPortalRegistrar();
Study study = getParentStudy(studyOid);
StudyParameterValue pStatus = studyPa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mayProceed
File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | mayProceed | web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | private void dynamicConfigurationXmlGenerator(XmlGenerator gen, Config config) {
DynamicConfigurationConfig dynamicConfigurationConfig = config.getDynamicConfigurationConfig();
gen.open("dynamic-configuration")
.node("persistence-enabled", dynamicConfigurationConfig.isPersistenceEnabled... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dynamicConfigurationXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | dynamicConfigurationXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Pair<Boolean, Intent> saveAndVerifyInBackground() {
final boolean success = mUtils.setLockCredential(
mChosenPassword, mCurrentCredential, mUserId);
if (success) {
unifyProfileCredentialIfRequested();
}
Inten... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-40117
- Severity: HIGH
- CVSS Score: 7.8
Description: RESTRICT AUTOMERGE: Catch exceptions from setLockCredential()
When LockPatternUtils#setLockCredential() fails, it can either return
false or throw an exception. Catch the exception and treat it the sa... | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | saveAndVerifyInBackground | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 1 |
Analyze the following code function for security vulnerabilities | private void getCarrierCustomizedConfig() {
mReadOnlyApn = false;
mReadOnlyApnTypes = null;
mReadOnlyApnFields = null;
final CarrierConfigManager configManager = (CarrierConfigManager)
getSystemService(Context.CARRIER_CONFIG_SERVICE);
if (configManager != null) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCarrierCustomizedConfig
File: src/com/android/settings/network/apn/ApnEditor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40125 | HIGH | 7.8 | android | getCarrierCustomizedConfig | src/com/android/settings/network/apn/ApnEditor.java | 63d464c3fa5c7b9900448fef3844790756e557eb | 0 |
Analyze the following code function for security vulnerabilities | private void verifyArgs(String... args) throws SQLException {
for (int i = 0; args != null && i < args.length; i++) {
String arg = args[i];
if (arg == null) {
} else if ("-?".equals(arg) || "-help".equals(arg)) {
// ok
} else if (arg.startsWith("-w... | Vulnerability Classification:
- CWE: CWE-312
- CVE: CVE-2022-45868
- Severity: HIGH
- CVSS Score: 7.8
Description: Disallow plain webAdminPassword values to force usage of hashes
Function: verifyArgs
File: h2/src/main/org/h2/tools/Server.java
Repository: h2database
Fixed Code:
private void verifyArgs(String... args)... | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | verifyArgs | h2/src/main/org/h2/tools/Server.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 1 |
Analyze the following code function for security vulnerabilities | @Test
public void pojo2jsonMap(TestContext context) throws Exception {
Map<String,String> m = new HashMap<>();
m.put("a", "b");
context.assertEquals("{\"a\":\"b\"}", PostgresClient.pojo2json(m));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pojo2jsonMap
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | pojo2jsonMap | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public String hostUrl() {
final StringBuilder url = new StringBuilder();
if (protocol != null) {
url.append(protocol);
url.append("://");
}
if (host != null) {
url.append(host);
}
if (port != Defaults.DEFAULT_PORT) {
url.append(':');
url.append(port);
}
return url.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hostUrl
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | hostUrl | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void focusLost() {
Log.d("Codename One", "native focus loss");
// EDT
super.focusLost();
if (layoutWrapper != null && getActivity() != null) {
getActivity().runOnUiThread(new Runnable() {
public void run() {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: focusLost
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | focusLost | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
void saveDirtyInfo() {
if (DEBUG || DEBUG_REBOOT) {
Slog.d(TAG, "saveDirtyInfo");
}
if (mShutdown.get()) {
return;
}
try {
Trace.traceBegin(Trace.TRACE_TAG_SYSTEM_SERVER, "shortcutSaveDirtyInfo");
synchronized... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveDirtyInfo
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40092 | MEDIUM | 5.5 | android | saveDirtyInfo | services/core/java/com/android/server/pm/ShortcutService.java | a5e55363e69b3c84d3f4011c7b428edb1a25752c | 0 |
Analyze the following code function for security vulnerabilities | @GetMapping("/{id}")
public Result detail(@PathVariable Integer id, HttpServletRequest request) {
Map<String, Object> map = new HashMap<>();
// 查询话题详情
Topic topic = topicService.selectById(id);
// 查询话题关联的标签
List<Tag> tags = tagService.selectByTopicId(id);
// 查询话题的评论
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: detail
File: src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java
Repository: atjiu/pybbs
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | detail | src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 0 |
Analyze the following code function for security vulnerabilities | @Transactional(readOnly = false)
public ProcessInstance getProcIns(String procInsId) {
return runtimeService.createProcessInstanceQuery().processInstanceId(procInsId).singleResult();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcIns
File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
Repository: thinkgem/jeesite
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-34601 | CRITICAL | 9.8 | thinkgem/jeesite | getProcIns | src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java | 30750011b49f7c8d45d0f3ab13ed3a1a422655bb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void createConnectionComplete(String id, Session.Info info) throws RemoteException {
Log.i(ConnectionServiceFixture.this, "createConnectionComplete: %s", id);
mConnectionServiceDelegateAdapter.createConnectionComplete(id, null /*Session.Info*/);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConnectionComplete
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | createConnectionComplete | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void mutate(String sql, Handler<AsyncResult<String>> replyHandler) {
execute(sql, res -> {
if (res.failed()) {
replyHandler.handle(Future.failedFuture(res.cause()));
return;
}
replyHandler.handle(Future.succeededFuture(res.result().toString()));
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mutate
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | mutate | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void setSuppressNotification(boolean suppressed) {
if (suppressed) {
mFlags |= Notification.BubbleMetadata.FLAG_SUPPRESS_NOTIFICATION;
} else {
mFlags &= ~Notification.BubbleMetadata.FLAG_SUPPRESS_NOTIFICATION;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSuppressNotification
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setSuppressNotification | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void write(String text) throws IOException {
HtmlUtils.writeUnescapedTextForXML(getWrapped(), text);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-17091 | MEDIUM | 4.3 | eclipse-ee4j/mojarra | write | impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java | a3fa9573789ed5e867c43ea38374f4dbd5a8f81f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTrustAgentConfiguration(ComponentName admin, ComponentName agent,
PersistableBundle args, boolean parent) {
if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) {
return;
}
Objects.requireNonNull(admin, "admin is null");
Objec... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2023-21284
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Ensure policy has no absurdly long strings
The following APIs now enforce limits and throw IllegalArgumentException
when limits are violated:
* DPM.setTrustAgentConfiguration() limits agent packgage nam... | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setTrustAgentConfiguration | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasKey() {
return haskey;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasKey
File: src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | hasKey | src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Analyze the following code function for security vulnerabilities | @Sessional
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
String clientIp = request.getHeader("X-Forwarded-For");
if (clientIp == null) clientIp = request.getRemoteAddr();
if (!InetAddress.getByName(clientIp)... | Vulnerability Classification:
- CWE: CWE-287
- CVE: CVE-2022-39205
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Fix security vulnerability related to Git pre/post receive callback
Function: doPost
File: server-core/src/main/java/io/onedev/server/git/hookcallback/GitPostReceiveCallback.java
Repository: theonede... | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | doPost | server-core/src/main/java/io/onedev/server/git/hookcallback/GitPostReceiveCallback.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 1 |
Analyze the following code function for security vulnerabilities | private boolean onyxWebFamily(QTI21Infos fileInfos) {
if(fileInfos == null || fileInfos.getEditor() == null) return false;
return "ONYX Editor".equals(fileInfos.getEditor());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onyxWebFamily
File: src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | onyxWebFamily | src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | void setLocusId(LocusId locusId) {
if (Objects.equals(locusId, mLocusId)) return;
mLocusId = locusId;
final Task task = getTask();
if (task != null) getTask().dispatchTaskInfoChangedIfNeeded(false /* force */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLocusId
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setLocusId | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void setAdaptiveFetch(boolean adaptiveFetch) throws SQLException {
checkClosed();
updateQueryInsideAdaptiveFetchCache(adaptiveFetch);
this.adaptiveFetch = adaptiveFetch;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAdaptiveFetch
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | setAdaptiveFetch | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private void dealExtend(List<SysExtendField> extendList, List<String> dictionaryValueList, Map<String, String> map,
StringBuilder sb) {
if (CommonUtils.notEmpty(extendList)) {
for (SysExtendField extendField : extendList) {
if (extendField.isSearchable()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dealExtend
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | dealExtend | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onPause() {
super.onPause();
mServiceListing.setListening(false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPause
File: src/com/android/settings/notification/NotificationAccessSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35667 | HIGH | 7.8 | android | onPause | src/com/android/settings/notification/NotificationAccessSettings.java | d8355ac47e068ad20c6a7b1602e72f0585ec0085 | 0 |
Analyze the following code function for security vulnerabilities | protected byte[] getClientKexData() {
synchronized (kexState) {
return (clientKexData == null) ? null : clientKexData.clone();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientKexData
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | getClientKexData | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
@Override
public MediaType contentType() {
final String contentTypeString = get(HttpHeaderNames.CONTENT_TYPE);
if (contentTypeString == null) {
return null;
}
try {
return MediaType.parse(contentTypeString);
} catch (IllegalArgumentExcep... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: contentType
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | contentType | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public JobLog toRestJobLog(LogTail logQueue, URI self, String level, String fromLevel) throws IOException
{
// Filter log
Iterable<LogEvent> logs;
if (level != null) {
LogLevel logLevel = LogLevel.valueOf(level.toUpperCase());
logs = logQueue.getLogEvents(logLevel).st... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toRestJobLog
File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-35151 | HIGH | 7.5 | xwiki/xwiki-platform | toRestJobLog | xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-server/src/main/java/org/xwiki/rest/internal/ModelFactory.java | 824cd742ecf5439971247da11bfe7e0ad2b10ede | 0 |
Analyze the following code function for security vulnerabilities | public boolean isFatal() {
return fatal;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFatal
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | isFatal | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | public WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage,
Intent intent, String resolvedType, IBinder resultTo, String resultWho,
int requestCode, int flags, ProfilerInfo profilerInfo, Bundle options,
int userId) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAndWait
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | startActivityAndWait | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public int startActivityAsUser(IApplicationThread caller, String callingPackage, Intent intent,
String resolvedType, IBinder resultTo, String resultWho, int requestCode, int flags,
ProfilerInfo profilerInfo, Bundle options, int userId) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAsUser
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | startActivityAsUser | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | protected String getPrimaryColor() {
Color p = Color.valueOf(getDefaultColor("primary"));
String primary = p.color;
if ("custom".equals(getPropertyString("primaryColor"))) {
primary = getPropertyString("customPrimary");
} else if (!getPropertyString("primaryColor").isEmpty())... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrimaryColor
File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
Repository: jogetworkflow/jw-community
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4560 | MEDIUM | 6.1 | jogetworkflow/jw-community | getPrimaryColor | wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java | ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("BooleanMethodIsAlwaysInverted")
private boolean patternMatches(EasyField easyField, Object val) {
if (!(easyField instanceof EasyText)) return true;
Pattern patt = ((EasyText) easyField).getPattern();
return patt == null || patt.matcher((CharSequence) val).matches();
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-1613
- Severity: MEDIUM
- CVSS Score: 4.0
Description: Fix long request (#599)
* fix: `trigger/exec-manual` async
* fix: lang
* fix: #596
Function: patternMatches
File: src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java
Repository: getre... | [
"CWE-79"
] | CVE-2023-1613 | MEDIUM | 4 | getrebuild/rebuild | patternMatches | src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java | d0de4cc35303168f44ca57712c824b5cb9525e54 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void onUserSwitchComplete(int userId) {
if (DEBUG) Log.d(TAG, String.format("onUserSwitchComplete %d", userId));
if (userId != UserHandle.USER_SYSTEM) {
UserInfo info = UserManager.get(mContext).getUserInfo(userId);
// Don't try to dismiss... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUserSwitchComplete
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | onUserSwitchComplete | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private static void userCodeDeploymentConfig(XmlGenerator gen, Config config) {
UserCodeDeploymentConfig ucdConfig = config.getUserCodeDeploymentConfig();
gen.open("user-code-deployment", "enabled", ucdConfig.isEnabled())
.node("class-cache-mode", ucdConfig.getClassCacheMode())
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: userCodeDeploymentConfig
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | userCodeDeploymentConfig | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | public static long reallocateMemory(long address, long newSize) {
return PlatformDependent0.reallocateMemory(address, newSize);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reallocateMemory
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | reallocateMemory | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | public static Class<?> findMapFallback(JavaType type) {
return _mapFallbacks.get(type.getRawClass().getName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findMapFallback
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | findMapFallback | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public void setBundleId(String val) {
this.bundleId = val;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBundleId
File: src/main/java/emissary/pickup/WorkBundle.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | setBundleId | src/main/java/emissary/pickup/WorkBundle.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public static ObjectNode parse(
final TomlFactory tomlFactory,
final IOContext ioContext,
final Reader reader
) throws IOException {
final TomlFactory factory = tomlFactory == null ? new TomlFactory() : tomlFactory;
Parser parser = new Parser(factory, ioContext,
... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-3894
- Severity: HIGH
- CVSS Score: 7.5
Description: remove toml feature
Function: parse
File: toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java
Repository: FasterXML/jackson-dataformats-text
Fixed Code:
public static ObjectNode parse(
... | [
"CWE-787"
] | CVE-2023-3894 | HIGH | 7.5 | FasterXML/jackson-dataformats-text | parse | toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java | a05e4f3485d878153747b82937536e0b4b0f0579 | 1 |
Analyze the following code function for security vulnerabilities | public Set<String> getCoreScooldTypes() {
return Collections.unmodifiableSet(CORE_TYPES);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCoreScooldTypes
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getCoreScooldTypes | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | void moveInputMethodDialogsLocked(int pos) {
ArrayList<WindowState> dialogs = mInputMethodDialogs;
// TODO(multidisplay): IMEs are only supported on the default display.
WindowList windows = getDefaultWindowListLocked();
final int N = dialogs.size();
if (DEBUG_INPUT_METHOD) Slog... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveInputMethodDialogsLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | moveInputMethodDialogsLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void setDismissKeyguardIfInsecure() {
mDismissKeyguardIfInsecure = true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDismissKeyguardIfInsecure
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | setDismissKeyguardIfInsecure | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getSliceHighlightMenuRes() {
return R.string.menu_key_location;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSliceHighlightMenuRes
File: src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21247 | HIGH | 7.8 | android | getSliceHighlightMenuRes | src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java | edd4023805bc7fa54ae31de222cde02b9012bbc4 | 0 |
Analyze the following code function for security vulnerabilities | protected void processStanza(final Stanza stanza) throws InterruptedException {
assert(stanza != null);
lastStanzaReceived = System.currentTimeMillis();
// Deliver the incoming packet to listeners.
executorService.executeBlocking(new Runnable() {
@Override
public ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processStanza
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | processStanza | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public static NativeArray jsFunction_getActiveTenantDomains(Context cx, Scriptable thisObj,
Object[] args, Function funObj)
throws APIManagementException {
try {
Set<String> tenantDomains = APIUtil.getActiveTenantDomains();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_getActiveTenantDomains
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows sec... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_getActiveTenantDomains | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | public static int defaultMaxConnectionLifeTimeInMs() {
return Integer.getInteger(ASYNC_CLIENT + "maxConnectionLifeTimeInMs", -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultMaxConnectionLifeTimeInMs
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultMaxConnectionLifeTimeInMs | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | public void updateCharacterStream(@Positive int columnIndex,
@Nullable Reader reader) throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(),
"updateCharaceterStream(int, Reader)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateCharacterStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateCharacterStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public AccessibilityNodeInfo findFocus(int focus) {
return AccessibilityInteractionClient.getInstance().findFocus(mConnectionId,
AccessibilityNodeInfo.ANY_WINDOW_ID, AccessibilityNodeInfo.ROOT_NODE_ID, focus);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findFocus
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | findFocus | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | private boolean packageHasVisibilityOverride(String key) {
return mNotificationData.getVisibilityOverride(key) == Notification.VISIBILITY_PRIVATE;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: packageHasVisibilityOverride
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | packageHasVisibilityOverride | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testSerializationAsTimestamp03Nanoseconds() throws Exception
{
Instant date = Instant.now();
String value = MAPPER.writer()
.with(SerializationFeature.WRITE_DATES_AS_TIMESTAMPS)
.with(SerializationFeature.WRITE_DATE_TIMESTAMPS_AS_NANOSECONDS)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testSerializationAsTimestamp03Nanoseconds
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding pra... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testSerializationAsTimestamp03Nanoseconds | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void injectUpdatedCustomMappings(XWikiContext context) throws XWikiException
{
Configuration config = getConfiguration();
injectInSessionFactory(config);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectUpdatedCustomMappings
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | injectUpdatedCustomMappings | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isModel(Object o) {
return o instanceof ModelObject;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isModel
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | isModel | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void stopAppFreezingScreen(IBinder token, boolean force) {
if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
"setAppFreezingScreen()")) {
throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
}
synchronize... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopAppFreezingScreen
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | stopAppFreezingScreen | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | Integer getInteger(int index, Integer defaultValue) {
final Integer val = getInteger(index);
return val == null ? defaultValue : val;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInteger
File: src/com/android/settings/network/apn/ApnEditor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40125 | HIGH | 7.8 | android | getInteger | src/com/android/settings/network/apn/ApnEditor.java | 63d464c3fa5c7b9900448fef3844790756e557eb | 0 |
Analyze the following code function for security vulnerabilities | native boolean removeBondNative(byte[] address); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeBondNative
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | removeBondNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | static void dumpResources(IndentingPrintWriter pw, Context context, String resName, int resId) {
dumpApps(pw, resName, context.getResources().getStringArray(resId));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpResources
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | dumpResources | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public Workflow parseWorkflowNative(Path workflowFile, String packedWorkflowId) throws IOException {
// Check file size limit before parsing
long fileSizeBytes = Files.size(workflowFile);
if (fileSizeBytes <= singleFileSizeLimit) {
try (InputStream in = Files.newInputStream(workflowFil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseWorkflowNative
File: src/main/java/org/commonwl/view/cwl/CWLService.java
Repository: common-workflow-language/cwlviewer
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-41110 | HIGH | 7.5 | common-workflow-language/cwlviewer | parseWorkflowNative | src/main/java/org/commonwl/view/cwl/CWLService.java | f6066f09edb70033a2ce80200e9fa9e70a5c29de | 0 |
Analyze the following code function for security vulnerabilities | public static NativeArray jsFunction_getSubscribedAPIs(Context cx,
Scriptable thisObj, Object[] args, Function funObj)
throws ScriptException, APIManagementException {
NativeArray apiArray = new NativeArray(0);
if (args != null && is... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_getSubscribedAPIs
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure c... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_getSubscribedAPIs | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | private void handleTypeAndAttributes(Node node, Map<String, Object> elementMap) {
// Set type
if (node.getLocalName() != null) {
elementMap.put("_type", node.getLocalName());
}
// Set the attributes
if (node.getAttributes() != null) {
NamedNodeMap attribu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleTypeAndAttributes
File: src/main/java/apoc/load/Xml.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000820 | HIGH | 7.5 | neo4j-contrib/neo4j-apoc-procedures | handleTypeAndAttributes | src/main/java/apoc/load/Xml.java | 45bc09c8bd7f17283e2a7e85ce3f02cb4be4fd1a | 0 |
Analyze the following code function for security vulnerabilities | public int getIsSyncableAsUser(Account account, String providerName, int userId) {
enforceCrossUserPermission(userId,
"no permission to read the sync settings for user " + userId);
mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_SETTINGS,
"no permiss... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIsSyncableAsUser
File: services/core/java/com/android/server/content/ContentService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2426 | MEDIUM | 4.3 | android | getIsSyncableAsUser | services/core/java/com/android/server/content/ContentService.java | 63363af721650e426db5b0bdfb8b2d4fe36abdb0 | 0 |
Analyze the following code function for security vulnerabilities | protected void internalGrantPermissionsOnTopic(String role, Set<AuthAction> actions) {
// This operation should be reading from zookeeper and it should be allowed without having admin privileges
validateAdminAccessForTenant(namespaceName.getTenant());
validatePoliciesReadOnlyAccess();
P... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGrantPermissionsOnTopic
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGrantPermissionsOnTopic | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public JSON getJSON() {
return json;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJSON
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getJSON | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerHttpResponse addResponseHeader(CharSequence name, CharSequence value) {
response.headers().add(name, value);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addResponseHeader
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code follow... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | addResponseHeader | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Comment createComment(String data) {
return doc.createComment(data);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createComment
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | createComment | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, String> getOptions() {
return this.options;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOptions
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | getOptions | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | public static void exportFile(FF4j ff4j, HttpServletResponse res) throws IOException {
Map<String, Feature> features = ff4j.getFeatureStore().readAll();
InputStream in = new XmlParser().exportFeatures(features);
ServletOutputStream sos = null;
try {
sos = res.getOutputStream(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportFile
File: ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java
Repository: ff4j
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | exportFile | ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 0 |
Analyze the following code function for security vulnerabilities | private String processHandleFile(Context c, Item i, String path, String filename)
{
File file = new File(path + File.separatorChar + filename);
String result = null;
System.out.println("Processing handle file: " + filename);
if (file.exists())
{
BufferedReader is... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processHandleFile
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | processHandleFile | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java | 56e76049185bbd87c994128a9d77735ad7af0199 | 0 |
Analyze the following code function for security vulnerabilities | WindowFrames getWindowFrames() {
return mWindowFrames;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWindowFrames
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getWindowFrames | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public Column<T, V> setWidthUndefined() {
checkColumnIsAttached();
if (!isWidthUndefined()) {
getState().width = -1;
getGrid().markAsDirty();
getGrid().fireColumnResizeEvent(this, false);
}
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWidthUndefined
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setWidthUndefined | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canCallPhone(String callingPackage, String message) {
// The system/default dialer can always read phone state - so that emergency calls will
// still work.
if (isPrivilegedDialerCalling(callingPackage)) {
return true;
}
// Accessing phone state is ga... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canCallPhone
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | canCallPhone | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | private void resetUnreadMessagesCount() {
lastMessageUuid = null;
hideUnreadMessagesCount();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetUnreadMessagesCount
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | resetUnreadMessagesCount | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | private boolean mutateConfigSetting(String name, String value, String prefix,
boolean makeDefault, int operation, int mode) {
enforceWritePermission(Manifest.permission.WRITE_DEVICE_CONFIG);
final String callingPackage = resolveCallingPackage();
// Perform the mutation.
sync... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mutateConfigSetting
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | mutateConfigSetting | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | private void bindIcon(boolean important) {
Drawable person = mIconFactory.getBaseIconDrawable(mShortcutInfo);
if (person == null) {
person = mContext.getDrawable(R.drawable.ic_person).mutate();
TypedArray ta = mContext.obtainStyledAttributes(new int[]{android.R.attr.colorAccent}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindIcon
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | bindIcon | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public Connection getConnection(DatabaseConfiguration databaseConfiguration, boolean forceNewConnection)
throws DatabaseServiceException {
try {
if (connection != null && !forceNewConnection) {
// logger.info("connection closed::{}", connection.isClosed());
... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2023-41886
- Severity: HIGH
- CVSS Score: 7.5
Description: Merge pull request from GHSA-qqh2-wvmv-h72m
Function: getConnection
File: extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java
Repository: OpenRefine
Fixed Code:... | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | getConnection | extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 1 |
Analyze the following code function for security vulnerabilities | public TField readFieldBegin() throws TException {
byte type = readByte();
// if it's a stop, then we can return immediately, as the struct is over.
if (type == TType.STOP) {
return TSTOP;
}
short fieldId;
// mask off the 4 MSB of the type header. it could contain a field id delta.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFieldBegin
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readFieldBegin | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | public void setContextMenu(final int res) {
this.mResContextMenu = res;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContextMenu
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | setContextMenu | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | void freezeInsetsState() {
if (mFrozenInsetsState == null) {
mFrozenInsetsState = new InsetsState(getInsetsState(), true /* copySources */);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: freezeInsetsState
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | freezeInsetsState | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private void addToAddresses(Collection<String> addresses) {
addAddressesToList(addresses, mTo);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addToAddresses
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | addToAddresses | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateDeviceIdleTempAllowlist(@Nullable int[] appids, int changingUid,
boolean adding, long durationMs, @TempAllowListType int type,
@ReasonCode int reasonCode, @Nullable String reason, int callingUid) {
synchronized (ActivityManagerService.this)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateDeviceIdleTempAllowlist
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateDeviceIdleTempAllowlist | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static Map<String, TemplateVariableGroup> getTemplateVariableGroups(
long classNameId, long classPK, String language, Locale locale)
throws Exception {
TemplateHandler templateHandler =
TemplateHandlerRegistryUtil.getTemplateHandler(classNameId);
if (templateHandler == null) {
return Collections... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTemplateVariableGroups
File: portal-impl/src/com/liferay/portal/template/TemplateContextHelper.java
Repository: samuelkong/liferay-portal
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2963 | MEDIUM | 4.3 | samuelkong/liferay-portal | getTemplateVariableGroups | portal-impl/src/com/liferay/portal/template/TemplateContextHelper.java | 5db1f7622e8e2c9a559ef0145a0f04c5854a1e8b | 0 |
Analyze the following code function for security vulnerabilities | public byte[] verifyTiedProfileChallenge(String password, boolean isPattern, long challenge,
int userId) throws RequestThrottledException {
throwIfCalledOnMainThread();
try {
VerifyCredentialResponse response =
getLockSettings().verifyTiedProfileChallenge(pass... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyTiedProfileChallenge
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | verifyTiedProfileChallenge | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | private void setSessionLock(WrappedSession wrappedSession, Lock lock) {
if (wrappedSession == null) {
throw new IllegalArgumentException(
"Can't set a lock for a null session");
}
Object currentSessionLock = wrappedSession
.getAttribute(getLockAttr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSessionLock
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | setSessionLock | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removePlugin(String projectName, String pluginName, AsyncMethodCallback resultHandler) {
unimplemented(resultHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removePlugin
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | removePlugin | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void channelActive(ChannelHandlerContext ctx) throws Exception {
ctx.read();
super.channelActive(ctx);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: channelActive
File: ratpack-core/src/main/java/ratpack/server/internal/NettyHandlerAdapter.java
Repository: ratpack
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-17513 | MEDIUM | 5 | ratpack | channelActive | ratpack-core/src/main/java/ratpack/server/internal/NettyHandlerAdapter.java | efb910d38a96494256f36675ef0e5061097dd77d | 0 |
Analyze the following code function for security vulnerabilities | protected void customizeClientBuilder(ClientBuilder clientBuilder) {
// No-op extension point
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: customizeClientBuilder
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secur... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | customizeClientBuilder | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private final List<ProviderInfo> generateApplicationProvidersLocked(ProcessRecord app) {
List<ProviderInfo> providers = null;
try {
ParceledListSlice<ProviderInfo> slice = AppGlobals.getPackageManager().
queryContentProviders(app.processName, app.uid,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateApplicationProvidersLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | generateApplicationProvidersLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void notifyLockedProfile(@UserIdInt int userId) {
try {
if (!AppGlobals.getPackageManager().isUidPrivileged(Binder.getCallingUid())) {
throw new SecurityException("Only privileged app can call notifyLockedProfile");
}
} catch (RemoteException ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyLockedProfile
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | notifyLockedProfile | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | UserHandle getUser() {
return user;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUser
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getUser | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private List<PollRequest> unmarshalRequests(Element env)
throws Exception
{
try
{
List<PollRequest> requests = new ArrayList<PollRequest>();
List<Element> requestElements = env.element("body").elements("poll");
for (Element e : requestElements)
{
requests.add(new PollReq... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshalRequests
File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
Repository: seam2/jboss-seam
The code follows secure coding practices. | [
"CWE-264",
"CWE-200"
] | CVE-2013-6447 | MEDIUM | 5 | seam2/jboss-seam | unmarshalRequests | jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java | 090aa6252affc978a96c388e3fc2c1c2688d9bb5 | 0 |
Analyze the following code function for security vulnerabilities | VerifyResult verifyJarEntryCerts(String jarName, boolean jarHasManifest,
Vector<JarEntry> entries) throws Exception {
// Contains number of entries the cert with this CertPath has signed.
Map<CertPath, Integer> jarSignCount = new HashMap<>();
int numSignableEntriesInJar = 0;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyJarEntryCerts
File: core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | verifyJarEntryCerts | core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java | 2fd1e4b769911f2c6f7f3902f7ea21568ddc2f99 | 0 |
Analyze the following code function for security vulnerabilities | private String extractDoc(JsonNode node) {
if (node != null) {
if (node.has(DOC)) {
return node.get(DOC).asText();
} else if (node.has(DESCRIPTION)) {
// This is to support older standards of cwl which use description instead of doc
return ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractDoc
File: src/main/java/org/commonwl/view/cwl/CWLService.java
Repository: common-workflow-language/cwlviewer
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-41110 | HIGH | 7.5 | common-workflow-language/cwlviewer | extractDoc | src/main/java/org/commonwl/view/cwl/CWLService.java | f6066f09edb70033a2ce80200e9fa9e70a5c29de | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean serveStaticResource(HttpServletRequest request,
HttpServletResponse response) throws IOException {
String filenameWithPath = getRequestFilename(request);
if (HandlerHelper.isPathUnsafe(filenameWithPath)) {
getLogger().info(HandlerHelper.UNSAFE_PATH_E... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2020-36321
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Add unit tests and change status code
Function: serveStaticResource
File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
Repository: vaadin/flow
Fixed Code:
@Override
public... | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | serveStaticResource | flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 1 |
Analyze the following code function for security vulnerabilities | public static final native void sendSignalQuiet(int pid, int signal); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendSignalQuiet
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | sendSignalQuiet | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | public boolean processRequest() throws WebdavException {
final String addMemberSuffix = intf.getAddMemberSuffix();
if (addMemberSuffix == null) {
return false;
}
final String reqUri = req.getRequestURI();
if (reqUri == null) {
return false;
}
final int pos = reqUri.lastIndexO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processRequest
File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
Repository: Bedework/bw-webdav
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | processRequest | src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java | 67283fb8b9609acdb1a8d2e7fefe195b4a261062 | 0 |
Analyze the following code function for security vulnerabilities | private void installNotification(NotificationId id, final Notification notification,
String packageName, int userId) {
final long token = clearCallingIdentity();
try {
INotificationManager notificationManager = mInjector.getNotificationManager();
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installNotification
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | installNotification | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String exportSPApplicationFromAppID(String applicationId, boolean exportSecrets,
String tenantDomain) throws IdentityApplicationManagementException {
ApplicationBasicInfo application = getApplicationBasicInfoByResourceId(applicationId, tenantD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportSPApplicationFromAppID
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbo... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | exportSPApplicationFromAppID | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | private void bindActions() {
// TODO: b/152050825
/*
Button home = findViewById(R.id.home);
home.setOnClickListener(mOnHomeClick);
home.setVisibility(mShortcutInfo != null
&& mShortcutManager.isRequestPinShortcutSupported()
? VISIBLE : GONE);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindActions
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | bindActions | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.