instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public static boolean containsPriviledge(AccessControlledResource.Priviledge required, Iterable<AccessControlledResource.Priviledge> privs) {
for (AccessControlledResource.Priviledge p : privs) {
if (p.equals(required)) {
return true;
}
if( containsPriviledge(... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2015-7326
- Severity: HIGH
- CVSS Score: 7.5
Description: log returning null ACL
Function: containsPriviledge
File: milton-api/src/main/java/io/milton/http/AclUtils.java
Repository: miltonio/milton2
Fixed Code:
public static boolean containsPriviledge(AccessCon... | [
"CWE-611"
] | CVE-2015-7326 | HIGH | 7.5 | miltonio/milton2 | containsPriviledge | milton-api/src/main/java/io/milton/http/AclUtils.java | b5851c1 | 1 |
Analyze the following code function for security vulnerabilities | public static OutputStream getOutputStream(String fileName) {
return getOutputStream(fileName, ExportConfig.EMPTY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOutputStream
File: core/src/main/java/apoc/util/FileUtils.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23532 | MEDIUM | 6.5 | neo4j-contrib/neo4j-apoc-procedures | getOutputStream | core/src/main/java/apoc/util/FileUtils.java | 01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522 | 0 |
Analyze the following code function for security vulnerabilities | private File[] getIncludeFiles() throws AndrolibException {
UsesFramework usesFramework = mApkInfo.usesFramework;
if (usesFramework == null) {
return null;
}
List<Integer> ids = usesFramework.ids;
if (ids == null || ids.isEmpty()) {
return null;
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIncludeFiles
File: brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java
Repository: iBotPeaches/Apktool
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-21633 | HIGH | 7.8 | iBotPeaches/Apktool | getIncludeFiles | brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java | d348c43b24a9de350ff6e5bd610545a10c1fc712 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void endTableCell(Map<String, String> parameters)
{
getXHTMLWikiPrinter().printXMLEndElement("td");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endTableCell
File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
Repository: xwiki/xwiki-rendering
The code follows secure c... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | endTableCell | xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | private void readGrantedUriPermissionsLocked() {
if (DEBUG_URI_PERMISSION) Slog.v(TAG, "readGrantedUriPermissions()");
final long now = System.currentTimeMillis();
FileInputStream fis = null;
try {
fis = mGrantFile.openRead();
final XmlPullParser in = Xml.newPul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readGrantedUriPermissionsLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | readGrantedUriPermissionsLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private Behavior createCDIBehavior(String behaviorId) {
if (version.isJsf23()) {
return CdiUtils.createBehavior(getBeanManager(), behaviorId);
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createCDIBehavior
File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | createCDIBehavior | impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | private void notifyAdapterStateChange(int newState) {
AdapterService adapterService = mAdapterService;
AdapterProperties adapterProperties = mAdapterProperties;
if ((adapterService == null) || (adapterProperties == null)) {
errorLog("notifyAdapterStateChange after cleanup:" + newStat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyAdapterStateChange
File: src/com/android/bluetooth/btservice/AdapterState.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | notifyAdapterStateChange | src/com/android/bluetooth/btservice/AdapterState.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isSystemApp(PackageParser.Package pkg) {
return (pkg.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSystemApp
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isSystemApp | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private static String toDumpString(String s) {
if (s != null) {
return s;
}
return "{null}";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDumpString
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | toDumpString | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private NotificationId getSigninRequiredNotificationId(UserAccounts accounts, Account account) {
NotificationId nId;
synchronized (accounts.signinRequiredNotificationIds) {
nId = accounts.signinRequiredNotificationIds.get(account);
if (nId == null) {
String tag = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSigninRequiredNotificationId
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getSigninRequiredNotificationId | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | default void onConnectChoiceSet(@NonNull List<WifiConfiguration> networks,
String choiceKey, int rssi) { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConnectChoiceSet
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | onConnectChoiceSet | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getPackageAskScreenCompat(String packageName) {
enforceNotIsolatedCaller("getPackageAskScreenCompat");
synchronized (this) {
return mCompatModePackages.getPackageAskCompatModeLocked(packageName);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageAskScreenCompat
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getPackageAskScreenCompat | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return String.format("Entry [key=%s, value=%s]", key, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/com/gitblit/StoredUserConfig.java
Repository: gitblit-org/gitblit
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2022-31267 | HIGH | 7.5 | gitblit-org/gitblit | toString | src/main/java/com/gitblit/StoredUserConfig.java | 9b4afad6f4be212474809533ec2c280cce86501a | 0 |
Analyze the following code function for security vulnerabilities | public void setErasedScoreItemDataIdsTypesExpected() {
this.unsetTypeExpected();
int i=1;
this.setTypeExpected(i, TypeNames.INT); // item_data_id
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setErasedScoreItemDataIdsTypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setErasedScoreItemDataIdsTypesExpected | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | private void updateMediaPackageID(MediaPackage mp, URI uri) throws IOException {
InputStream in = null;
HttpResponse response = null;
try {
if (uri.toString().startsWith("http")) {
HttpGet get = new HttpGet(uri);
response = httpClient.execute(get);
int httpStatusCode = response... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateMediaPackageID
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2020-5230 | MEDIUM | 5 | opencast | updateMediaPackageID | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java | bbb473f34ab95497d6c432c81285efb0c739f317 | 0 |
Analyze the following code function for security vulnerabilities | public void destroy() {
ServiceDestroyEvent event = new ServiceDestroyEvent(this);
serviceDestroyListeners
.forEach(listener -> listener.serviceDestroy(event));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroy
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | destroy | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean isPackageForFilter(String packageName,
PackageParser.ServiceIntentInfo info) {
return packageName.equals(info.service.owner.packageName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPackageForFilter
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isPackageForFilter | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | void sendConnectionStateChange(BluetoothDevice
device, int profile, int state, int prevState) {
// TODO(BT) permission check?
// Since this is a binder call check if Bluetooth is on still
if (getState() == BluetoothAdapter.STATE_OFF) return;
mAdapterProperties.sendConnection... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendConnectionStateChange
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | sendConnectionStateChange | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public OnGoingLogicalCondition isNotNull() {
Condition conditionLocal = new IsNotNullCondition(selector);
return getOnGoingLogicalCondition(conditionLocal);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNotNull
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-11343 | HIGH | 7.5 | xjodoin/torpedoquery | isNotNull | src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java | 3c20b874fba9cc2a78b9ace10208de1602b56c3f | 0 |
Analyze the following code function for security vulnerabilities | public int getMetricTimeInterval() {
return getIntProperty(METRIC_TIME_INTERVAL, 60);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetricTimeInterval
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getMetricTimeInterval | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
int injectBinderCallingPid() {
return getCallingPid();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectBinderCallingPid
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | injectBinderCallingPid | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public static void forward(Context launcher, Account account, Message message) {
launch(launcher, account, message, FORWARD, null, null, null, null, null /* extraValues */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forward
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | forward | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public void acknowledgeDeviceCompliant() {
throwIfParentInstance("acknowledgeDeviceCompliant");
if (mService != null) {
try {
mService.acknowledgeDeviceCompliant();
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: acknowledgeDeviceCompliant
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | acknowledgeDeviceCompliant | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getBaseType() {
return getTopParentWindow().mAttrs.type;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBaseType
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getBaseType | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public List<IssueWithParams> getWarnings() {
return mWarnings;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWarnings
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | getWarnings | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | public void setBuilder(Builder builder) {
if (mBuilder != builder) {
mBuilder = builder;
if (mBuilder != null) {
mBuilder.setStyle(this);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBuilder
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setBuilder | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public void setQuery(String query) {
this.query = query;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setQuery
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | setQuery | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUseClientMode(boolean clientMode) {
if (clientMode != this.clientMode) {
throw new UnsupportedOperationException();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseClientMode
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | setUseClientMode | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | private static Node migrateTrigger(Element triggerElement) {
List<NodeTuple> tuples = new ArrayList<>();
String classTag = getClassTag(triggerElement.getName());
List<Node> paramSupplyNodes = migrateParamSupplies(triggerElement.element("params").elements());
if (!paramSupplyNodes.isEmpty()) {
tuples.add(new... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrateTrigger
File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-538"
] | CVE-2021-21250 | MEDIUM | 4 | theonedev/onedev | migrateTrigger | server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java | 9196fd795e87dab069b4260a3590a0ea886e770f | 0 |
Analyze the following code function for security vulnerabilities | public String getParentURL(XWikiContext context) throws XWikiException
{
XWikiDocument doc = new XWikiDocument(getParentReference());
URL url = context.getURLFactory().createURL(doc.getSpace(), doc.getName(), "view", null, null, getDatabase(),
context);
return context.getURLFacto... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParentURL
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getParentURL | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | boolean isValidJWToken(String secret, String jwt) {
try {
if (secret != null && jwt != null) {
JWSVerifier verifier = new MACVerifier(secret);
SignedJWT sjwt = SignedJWT.parse(jwt);
if (sjwt.verify(verifier)) {
Date referenceTime = new Date();
JWTClaimsSet claims = sjwt.getJWTClaimsSet();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidJWToken
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | isValidJWToken | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAppSearchEnabled() {
return mShortcutUser.mService.isAppSearchEnabled();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAppSearchEnabled
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | isAppSearchEnabled | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | void makeWindowFreezingScreenIfNeededLocked(WindowState w) {
// If the screen is currently frozen or off, then keep
// it frozen/off until this window draws at its new
// orientation.
if (!okToDisplay() && mWindowsFreezingScreen != WINDOWS_FREEZING_SCREENS_TIMEOUT) {
if (DEBU... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeWindowFreezingScreenIfNeededLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | makeWindowFreezingScreenIfNeededLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public String getMacroList(XWikiContext context)
{
String macrosmapping = "";
XWiki xwiki = context.getWiki();
try {
macrosmapping = getResourceContent(MACROS_FILE);
} catch (IOException e) {
}
macrosmapping += "\r\n" + xwiki.getXWikiPreference("macros_m... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMacroList
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getMacroList | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public FileVisitResult visitFile(Path file, BasicFileAttributes attrs)
throws IOException {
String filename = file.getFileName().toString();
if(IMS_MANIFEST.equals(filename)) {
manifestFile = true;
manifestPath = file;
}
return manifestFile ? FileVisitResult.TERMINATE : FileVisitResul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visitFile
File: src/main/java/org/olat/fileresource/types/ImsQTI21Resource.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | visitFile | src/main/java/org/olat/fileresource/types/ImsQTI21Resource.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | public List<Locale> getAvailableLocales(XWikiContext xcontext)
{
String[] languages = StringUtils.split(xcontext.getWiki().getXWikiPreference("languages", xcontext), ", |");
List<Locale> locales = new ArrayList<Locale>(languages.length);
for (String language : languages) {
if (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAvailableLocales
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getAvailableLocales | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void enforcePolicyAccess(int uid, String method) {
if (PackageManager.PERMISSION_GRANTED == getContext().checkCallingPermission(
android.Manifest.permission.MANAGE_NOTIFICATIONS)) {
return;
}
boolean accessAllowed = false;
Strin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforcePolicyAccess
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | enforcePolicyAccess | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings({"unchecked"})
public <T extends Describable<T>,D extends Descriptor<T>> DescriptorExtensionList<T,D> getDescriptorList(Class<T> type) {
return descriptorLists.get(type);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDescriptorList
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getDescriptorList | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | private void setNavGraph(Bundle args, int startDestination) {
setContentView(R.layout.nav_host_fragment);
NavHostFragment navHost = (NavHostFragment) getSupportFragmentManager()
.findFragmentById(R.id.nav_host_fragment);
NavInflater inflater = navHost.getNavController().getNavInf... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNavGraph
File: PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21132 | MEDIUM | 6.8 | android | setNavGraph | PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java | 0679e4f35055729be7276536fe45fe8ec18a0453 | 0 |
Analyze the following code function for security vulnerabilities | static public void createDbFromSqlStatements(
Context context, String dbName, int dbVersion, String sqlStatements) {
SQLiteDatabase db = context.openOrCreateDatabase(dbName, 0, null);
// TODO: this is not quite safe since it assumes that all semicolons at the end of a line
// termina... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDbFromSqlStatements
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | createDbFromSqlStatements | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | private String templatePath() {
if (templatePath == null) {
String file = HgCommand.class.getResource("/hg.template").getFile();
try {
templatePath = URLDecoder.decode(new File(file).getAbsolutePath(), "UTF-8");
} catch (UnsupportedEncodingException e) {
... | Vulnerability Classification:
- CWE: CWE-77
- CVE: CVE-2022-29184
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Improve escaping of arguments when constructing Hg command calls
Function: templatePath
File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
Repository: gocd
Fixed C... | [
"CWE-77"
] | CVE-2022-29184 | MEDIUM | 6.5 | gocd | templatePath | domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java | 37d35115db2ada2190173f9413cfe1bc6c295ecb | 1 |
Analyze the following code function for security vulnerabilities | @Override
public StompServerOptions options() {
return options;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: options
File: src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java
Repository: vert-x3/vertx-stomp
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-32081 | MEDIUM | 6.5 | vert-x3/vertx-stomp | options | src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java | 0de4bc5a44ddb57e74d92c445f16456fa03f265b | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAllowedEmptyTag(String tagName) {
return "head".equals(tagName ) || policy.getAllowedEmptyTags().matches(tagName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAllowedEmptyTag
File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
Repository: nahsra/antisamy
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-28367 | MEDIUM | 4.3 | nahsra/antisamy | isAllowedEmptyTag | src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java | 0199e7e194dba5e7d7197703f43ebe22401e61ae | 0 |
Analyze the following code function for security vulnerabilities | public void doMark() {
if (timeStamp == 0) {
timeStamp = System.currentTimeMillis();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doMark
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | doMark | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | public EmissaryResponse outboundEnque(final String place, final WorkBundle path) {
final String placeUrl = KeyManipulator.getServiceHostURL(place);
final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientEnqueue.action");
final List<NameValuePair> nvps = new ArrayList<NameVal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: outboundEnque
File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | outboundEnque | src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public String getValidSpaceIdExcludingAll(Profile authUser, String space, HttpServletRequest req) {
String s = StringUtils.isBlank(space) ? getSpaceIdFromCookie(authUser, req) : space;
return isAllSpaces(s) ? DEFAULT_SPACE : s;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValidSpaceIdExcludingAll
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getValidSpaceIdExcludingAll | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public static final String trim(String str) {
if (str == null)
throw logger.nullArgumentError("String to trim");
return str.trim();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trim
File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-2582 | MEDIUM | 4 | keycloak | trim | saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java | 0cb5ba0f6e83162d221681f47b470c3042eef237 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public boolean getCrossProfileCallerIdDisabled(@NonNull ComponentName admin) {
throwIfParentInstance("getCrossProfileCallerIdDisabled");
if (mService != null) {
try {
return mService.getCrossProfileCallerIdDisabled(admin);
} catch (RemoteException ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCrossProfileCallerIdDisabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getCrossProfileCallerIdDisabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@InlineMe(
replacement = "Files.asCharSource(file, charset).readLines(callback)",
imports = "com.google.common.io.Files")
@CanIgnoreReturnValue // some processors won't return a useful result
@ParametricNullness
public
static <T extends @Nullable Object> T readLines(
File file, C... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readLines
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | readLines | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | public String displayDocument(Syntax targetSyntax, boolean restricted) throws XWikiException
{
return this.doc.displayDocument(targetSyntax, restricted, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | displayDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public FileMapper[] getFileMappers() {
return fileMappers;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileMappers
File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
Repository: codehaus-plexus/plexus-archiver
The code follows secure coding practices. | [
"CWE-22",
"CWE-61"
] | CVE-2023-37460 | CRITICAL | 9.8 | codehaus-plexus/plexus-archiver | getFileMappers | src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java | 54759839fbdf85caf8442076f001d5fd64e0dcb2 | 0 |
Analyze the following code function for security vulnerabilities | public String getPlainTitle()
{
return this.doc.getRenderedTitle(Syntax.PLAIN_1_0, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPlainTitle
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getPlainTitle | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setSafeMode(boolean safeMode) {
mSafeMode = safeMode;
performHapticFeedbackLw(null, safeMode
? HapticFeedbackConstants.SAFE_MODE_ENABLED
: HapticFeedbackConstants.SAFE_MODE_DISABLED, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSafeMode
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | setSafeMode | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ComponentName startService(IApplicationThread caller, Intent service,
String resolvedType, String callingPackage, int userId)
throws TransactionTooLargeException {
enforceNotIsolatedCaller("startService");
// Refuse possible leaked file descriptors
if... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startService
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | startService | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void release() {
synchronized (mService) {
if (mContainerState == CONTAINER_STATE_FINISHING) {
return;
}
mContainerState = CONTAINER_STATE_FINISHING;
long origId = Binder.clearCallingIdentity();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: release
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | release | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | public Set<String> getRequestIds(String scenarioDefinition) {
MsScenario msScenario = GenerateHashTreeUtil.parseScenarioDefinition(scenarioDefinition);
List<MsHTTPSamplerProxy> httpSampleFromHashTree = MsHTTPSamplerProxy.findHttpSampleFromHashTree(msScenario);
return httpSampleFromHashTree.strea... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestIds
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | getRequestIds | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | public void grantUriPermission(IApplicationThread caller, String targetPkg, Uri uri,
int mode, int userId) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantUriPermission
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | grantUriPermission | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public static long byteArrayBaseOffset() {
return BYTE_ARRAY_BASE_OFFSET;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: byteArrayBaseOffset
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | byteArrayBaseOffset | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | private static native int nativeGetSize(long obj); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeGetSize
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeGetSize | core/java/android/content/res/StringBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public void deleteAttachement(EntityReference reference) throws Exception
{
assertStatusCodes(executeDelete(AttachmentResource.class, toElements(reference)), true, STATUS_NO_CONTENT);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteAttachement
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | deleteAttachement | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setOauthScope(String scope) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).setScope(scope);
return this;
}
}
throw new RuntimeException("No OAuth2 authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOauthScope
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setOauthScope | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public DownloadOption getSelectedDownloadOption() {
if (selectedDownloadOptionLabel == null) {
return null;
}
return DownloadOption.getByLabel(selectedDownloadOptionLabel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSelectedDownloadOption
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getSelectedDownloadOption | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | private static void restApiXmlGenerator(XmlGenerator gen, NetworkConfig config) {
RestApiConfig c = config.getRestApiConfig();
if (c == null) {
return;
}
gen.open("rest-api", "enabled", c.isEnabled());
for (RestEndpointGroup group : RestEndpointGroup.values()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: restApiXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | restApiXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | private static FileSystem getFileSystem(URI uri) throws IOException {
try {
return FileSystems.getFileSystem(uri);
} catch (FileSystemNotFoundException e) {
return FileSystems.newFileSystem(uri, Collections.<String, String>emptyMap());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileSystem
File: pf4j/src/main/java/org/pf4j/util/FileUtils.java
Repository: pf4j
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-40827 | HIGH | 7.5 | pf4j | getFileSystem | pf4j/src/main/java/org/pf4j/util/FileUtils.java | ed9392069fe14c6c30d9f876710e5ad40f7ea8c1 | 0 |
Analyze the following code function for security vulnerabilities | @JsonIgnore
public String getSymmetricAlgorithmParams() {
return attributes.get(SYMMETRIC_ALGORITHM_PARAMS);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSymmetricAlgorithmParams
File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getSymmetricAlgorithmParams | base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | static public void postProcessSingleRetrievedFile(File file, ObjectNode fileRecord) {
if (!fileRecord.has("format")) {
JSONUtilities.safePut(fileRecord, "format",
ImportingManager.getFormat(
file.getName(),
JSONUtilities.getString(fileRecord, "... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postProcessSingleRetrievedFile
File: main/src/com/google/refine/importing/ImportingUtilities.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | postProcessSingleRetrievedFile | main/src/com/google/refine/importing/ImportingUtilities.java | e243e73e4064de87a913946bd320fbbe246da656 | 0 |
Analyze the following code function for security vulnerabilities | public FormValidation doCheckExcludedRegions(@QueryParameter String value) throws IOException, ServletException {
for (String region : Util.fixNull(value).trim().split("[\\r\\n]+"))
try {
Pattern.compile(region);
} catch (PatternSyntaxException e) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doCheckExcludedRegions
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | doCheckExcludedRegions | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public Collection<XarEntry> getEntries()
{
return this.entries.values();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEntries
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | getEntries | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | public int getStyle(Object nativeFont) {
if (nativeFont == null) {
return Font.STYLE_PLAIN;
}
return ((NativeFont) nativeFont).style;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStyle
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getStyle | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private void setSuspendOptimizationsNative(int reason, boolean enabled) {
if (mVerboseLoggingEnabled) {
log("setSuspendOptimizationsNative: " + reason + " " + enabled
+ " -want " + mContext.getResources().getBoolean(
R.bool.config_wifiSuspendOptimizati... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSuspendOptimizationsNative
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | setSuspendOptimizationsNative | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getLicense(Collection collection) {
String license = getMetadataFirstValue(collection, CollectionService.MD_LICENSE, Item.ANY);
if (license == null || license.trim().equals("")) {
// Fallback to site-wide default
license = licenseService.getDefaultSub... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLicense
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | getLicense | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract void setKexSeed(byte... seed); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKexSeed
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | setKexSeed | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onCancelled(Void params) {
// If we are cancelled while the task is running in the background, we may get null
// params. The finisher is expected to always be called back, so just use the baked-in
// params from the ctor in any case.
mImageData.reset();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCancelled
File: packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35676 | HIGH | 7.8 | android | onCancelled | packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java | 109e58b62dc9fedcee93983678ef9d4931e72afa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void closeContents() {
mContentsClient.onCloseWindow();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeContents
File: android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | closeContents | android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public long doCount(ISelect select) {
this.pageSizeZero = true;
this.pageSize = 0;
select.doSelect();
return this.total;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doCount
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | doCount | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void getInstance(TestContext context) {
PostgresClient c1 = PostgresClient.getInstance(vertx);
PostgresClient c2 = PostgresClient.getInstance(vertx);
context.assertEquals("public", c1.getTenantId());
context.assertEquals("public", c2.getTenantId());
context.assertEquals("raml_module_b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstance
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getInstance | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public Locale getDefaultLocale()
{
return this.doc.getDefaultLocale();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultLocale
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getDefaultLocale | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public static void closeSubsequentFS(Path path) {
if(path != null && FileSystems.getDefault() != path.getFileSystem()) {
IOUtils.closeQuietly(path.getFileSystem());
}
} | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-39180
- Severity: HIGH
- CVSS Score: 9.0
Description: OO-5549: fix the wiki import and add some unit tests
Function: closeSubsequentFS
File: src/main/java/org/olat/core/util/PathUtils.java
Repository: OpenOLAT
Fixed Code:
public static void closeSubsequentF... | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | closeSubsequentFS | src/main/java/org/olat/core/util/PathUtils.java | 699490be8e931af0ef1f135c55384db1f4232637 | 1 |
Analyze the following code function for security vulnerabilities | void syncIssues(Project project, List<IssuesDao> tapdIssues); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncIssues
File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | syncIssues | framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private static @ColorInt int getColor(@Nullable TypedArray ta, int index,
@ColorInt int defValue) {
return ta == null ? defValue : ta.getColor(index, defValue);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColor
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getColor | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public void enqueueRpc(RpcContinuation k)
{
doEnqueueRpc(() -> new RpcContinuationRpcWrapper(k));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enqueueRpc
File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | enqueueRpc | src/main/java/com/rabbitmq/client/impl/AMQChannel.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServers(List<ServerConfiguration> servers) {
this.servers = servers;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServers
File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServers | samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void requestBugReportWithDescription(@Nullable String shareTitle,
@Nullable String shareDescription, int bugreportType) {
requestBugReportWithDescription(shareTitle, shareDescription, bugreportType, /*nonce*/ 0L);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReportWithDescription
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | requestBugReportWithDescription | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isSecurityLoggingEnabled(ComponentName admin, String packageName) {
if (!mHasFeature) {
return false;
}
synchronized (getLockObject()) {
if (!isSystemUid(getCallerIdentity())) {
final CallerIdentity caller = getCallerIdentity(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSecurityLoggingEnabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isSecurityLoggingEnabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private static void addIntentExtras(String screenshotId, Intent intent, String actionType,
boolean smartActionsEnabled) {
intent
.putExtra(ScreenshotController.EXTRA_ACTION_TYPE, actionType)
.putExtra(ScreenshotController.EXTRA_ID, screenshotId)
.putEx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addIntentExtras
File: packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35676 | HIGH | 7.8 | android | addIntentExtras | packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java | 109e58b62dc9fedcee93983678ef9d4931e72afa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void registerStrongAuthTracker(IStrongAuthTracker tracker) {
checkPasswordReadPermission(UserHandle.USER_ALL);
mStrongAuth.registerStrongAuthTracker(tracker);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerStrongAuthTracker
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | registerStrongAuthTracker | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Analyze the following code function for security vulnerabilities | public WorkBundle outboundWorkSpaceTake(final String space, final String place) {
final String placeUrl = KeyManipulator.getServiceHostURL(space);
final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientSpaceTake.action");
final List<NameValuePair> nvps = new ArrayList<NameV... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: outboundWorkSpaceTake
File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | outboundWorkSpaceTake | src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermissions("topic:list")
@GetMapping("/list")
public String list(@RequestParam(defaultValue = "1") Integer pageNo, String startDate, String endDate, String
username, Model model) {
if (StringUtils.isEmpty(startDate)) startDate = null;
if (StringUtils.isEmpty(endDate)) endDa... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2022-23391
- Severity: MEDIUM
- CVSS Score: 4.3
Description: 修复了一部分页面上输入框的xss注入
https://github.com/atjiu/pybbs/issues/171
Function: list
File: src/main/java/co/yiiu/pybbs/controller/admin/TopicAdminController.java
Repository: atjiu/pybbs
Fixed Code:
@RequiresPer... | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | list | src/main/java/co/yiiu/pybbs/controller/admin/TopicAdminController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 1 |
Analyze the following code function for security vulnerabilities | public void clear()
{
executable = null;
workingDir = null;
shell.setExecutable( null );
shell.clearArguments();
arguments.removeAllElements();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clear
File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | clear | src/main/java/org/codehaus/plexus/util/cli/Commandline.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dispose() {
checkCorrectThread();
log("ServiceStateTracker dispose");
// Unregister for all events.
mCi.unregisterForAvailable(this);
mCi.unregisterForRadioStateChanged(this);
mCi.unregisterForVoiceNetworkStateChanged(this);
if (mUiccApp... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispose
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | dispose | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | private void tryKeyguardDone() {
if (DEBUG) {
Log.d(TAG, "tryKeyguardDone: pending - " + mKeyguardDonePending + ", animRan - "
+ mHideAnimationRun + " animRunning - " + mHideAnimationRunning);
}
if (!mKeyguardDonePending && mHideAnimationRun && !mHideAnimationRunn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tryKeyguardDone
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | tryKeyguardDone | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Reader getLogReader() {
return doGetLog().charStream();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLogReader
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | getLogReader | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | long getMessageId(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMessageId
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | getMessageId | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public void setName(String name) {
this.name = name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setName
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | setName | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | public static void gzipTarToOutputStream(Project project, OutputStream os) throws IOException {
GZIPOutputStream gos = new GZIPOutputStream(os);
TarArchiveOutputStream tos = new TarArchiveOutputStream(gos);
try {
ProjectManager.singleton.exportProject(project.id, tos);
} fina... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gzipTarToOutputStream
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | gzipTarToOutputStream | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | WindowState getImeLayeringTarget() {
final InsetsControlTarget target = getDisplayContent().getImeTarget(IME_TARGET_LAYERING);
return target != null ? target.getWindow() : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImeLayeringTarget
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getImeLayeringTarget | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addPortForwardingEventListener(PortForwardingEventListener listener) {
PortForwardingEventListener.validateListener(listener);
// avoid race conditions on notifications while session is being closed
if (!isOpen()) {
log.warn("addPortForwardingEventListener({... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPortForwardingEventListener
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | addPortForwardingEventListener | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onEvent(Event event, Object arg1, Object arg2)
{
loadTranslations(((WikiReadyEvent) event).getWikiId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onEvent
File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFact... | [
"CWE-74"
] | CVE-2023-29510 | HIGH | 8.8 | xwiki/xwiki-platform | onEvent | xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java | d06ff8a58480abc7f63eb1d4b8b366024d990643 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
final int prime = 31;
int result = 1;
result = prime * result + ((this.internalMessageID == null) ? 0 : this.internalMessageID.hashCode());
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | hashCode | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | public int read(long[] d, int off, int len)
throws IOException
{
return rawRead(d, off * 8, len * 8);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: src/main/java/org/xerial/snappy/SnappyInputStream.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-34455 | HIGH | 7.5 | xerial/snappy-java | read | src/main/java/org/xerial/snappy/SnappyInputStream.java | 3bf67857fcf70d9eea56eed4af7c925671e8eaea | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.