instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public Collection<String> getRenderIds() { assertNotReleased(); if (renderIds != null) { return renderIds; } renderIds = populatePhaseClientIds(PARTIAL_RENDER_PARAM); return renderIds; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderIds File: impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-17091
MEDIUM
4.3
eclipse-ee4j/mojarra
getRenderIds
impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java
a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
0
Analyze the following code function for security vulnerabilities
@RequiresPermissions("tag:edit") @GetMapping("/edit") public String edit(Integer id, Model model) { model.addAttribute("tag", tagService.selectById(id)); return "admin/tag/edit"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: edit File: src/main/java/co/yiiu/pybbs/controller/admin/TagAdminController.java Repository: atjiu/pybbs The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
edit
src/main/java/co/yiiu/pybbs/controller/admin/TagAdminController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
0
Analyze the following code function for security vulnerabilities
protected final static boolean _neitherNull(Object a, Object b) { return (a != null) && (b != null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _neitherNull File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_neitherNull
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
public IssuesWithBLOBs updateIssues(IssuesUpdateRequest issuesRequest) { PlatformIssuesUpdateRequest platformIssuesUpdateRequest = JSON.parseObject(JSON.toJSONString(issuesRequest), PlatformIssuesUpdateRequest.class); Project project = baseProjectService.getProjectById(issuesRequest.getProjectId()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateIssues File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
updateIssues
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public long getDelayUntilTime(EndPoint info) { synchronized (mAuthorities) { AuthorityInfo authority = getAuthorityLocked(info, "getDelayUntil"); if (authority == null) { return 0; } return authority.delayUntil; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDelayUntilTime File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getDelayUntilTime
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
public abstract Extension getExtensionType();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExtensionType File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/org/xwiki/skinx/internal/AbstractSxExportURLFactoryActionHandler.java Repository: xwiki/xwiki-platform The code fo...
[ "CWE-116" ]
CVE-2022-23620
MEDIUM
5.8
xwiki/xwiki-platform
getExtensionType
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/org/xwiki/skinx/internal/AbstractSxExportURLFactoryActionHandler.java
ab778254fb8f71c774e1c1239368c44fe3b6bba5
0
Analyze the following code function for security vulnerabilities
public void addItems(Context c, Collection[] mycollections, String sourceDir, String mapFile, boolean template) throws Exception { // create the mapfile File outFile = null; try { Map<String, String> skipItems = new HashMap<String, String>(); // set of items to skip ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addItems File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
addItems
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
56e76049185bbd87c994128a9d77735ad7af0199
0
Analyze the following code function for security vulnerabilities
@Override public void release() { released = true; ajaxRequest = null; renderAll = null; partialResponseWriter = null; executeIds = null; renderIds = null; evalScripts = null; ctx = null; partialRequest = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: release File: impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-17091
MEDIUM
4.3
eclipse-ee4j/mojarra
release
impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java
a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
0
Analyze the following code function for security vulnerabilities
@Override public void setUserSelectedOutgoingPhoneAccount(PhoneAccountHandle accountHandle) { synchronized (mLock) { enforceModifyPermission(); long token = Binder.clearCallingIdentity(); try { mPhoneAccountRegistrar.setUserSelecte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserSelectedOutgoingPhoneAccount File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
setUserSelectedOutgoingPhoneAccount
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
@Override public void animateExpandNotificationsPanel() { if (SPEW) Log.d(TAG, "animateExpand: mExpandedVisible=" + mExpandedVisible); if (!panelsEnabled()) { return ; } mNotificationPanel.expand(true /* animate */); if (false) postStartTracing(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: animateExpandNotificationsPanel File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
animateExpandNotificationsPanel
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private void fetchSignalingSettings() { Log.d(TAG, "fetchSignalingSettings"); int apiVersion = ApiUtils.getSignalingApiVersion(conversationUser, new int[]{ApiUtils.APIv3, 2, 1}); ncApi.getSignalingSettings(credentials, ApiUtils.getUrlForSignalingSettings(apiVersion, baseUrl)) .subsc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchSignalingSettings File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
fetchSignalingSettings
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
@Override public String getBaseContractsPath() { return META_INF_CONTRACTS_DIR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseContractsPath File: impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-6950
MEDIUM
4.3
eclipse-ee4j/mojarra
getBaseContractsPath
impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java
cefbb9447e7be560e59da2da6bd7cb93776f7741
0
Analyze the following code function for security vulnerabilities
private @NonNull Set<String> fetchOemSystemHolders(int... roleResIds) { Set<String> packageNames = new ArraySet<>(); for (int roleResId : roleResIds) { String packageName = getDefaultRoleHolderPackageName(roleResId); if (packageName != null) { packageNames.add(pa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchOemSystemHolders File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
fetchOemSystemHolders
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void handle(HttpServletRequest request, final HttpServletResponse response) throws Exception { // We're sending an XML response, so set the response content type to text/xml response.setContentType("text/xml"); ByteArrayOutputStream out = new ByteArrayOutputStream(); ...
Vulnerability Classification: - CWE: CWE-264, CWE-200 - CVE: CVE-2013-6447 - Severity: MEDIUM - CVSS Score: 5.0 Description: https://issues.jboss.org/browse/WFK2-375 enhanced fix git-svn-id: https://svn.jboss.org/repos/seam/branches/enterprise/WFK-2_1@15651 a9c07ecc-ef43-0410-a306-c911db474e88 Function: handle File:...
[ "CWE-264", "CWE-200" ]
CVE-2013-6447
MEDIUM
5
seam2/jboss-seam
handle
jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/ExecutionHandler.java
090aa6252affc978a96c388e3fc2c1c2688d9bb5
1
Analyze the following code function for security vulnerabilities
@Override public void requestLogMark(String message) { try { Log.startSession("TSI.rLM"); enforceShellOnly(Binder.getCallingUid(), "requestLogMark is for shell only"); synchronized (mLock) { long token = Binder.clearCallingIdentity(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestLogMark File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
requestLogMark
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
@Override public StaticHandler setFilesReadOnly(boolean readOnly) { this.filesReadOnly = readOnly; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFilesReadOnly File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java Repository: vert-x3/vertx-web The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-12542
HIGH
7.5
vert-x3/vertx-web
setFilesReadOnly
vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b
0
Analyze the following code function for security vulnerabilities
@NonNull public CallStyle setDeclineButtonColorHint(@ColorInt int color) { mDeclineButtonColor = color; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDeclineButtonColorHint File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setDeclineButtonColorHint
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
void dispatchNewAnimatorScaleLocked(Session session) { mH.obtainMessage(H.NEW_ANIMATOR_SCALE, session).sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchNewAnimatorScaleLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dispatchNewAnimatorScaleLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override SurfaceSession getSession() { if (mSession.mSurfaceSession != null) { return mSession.mSurfaceSession; } else { return getParent().getSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSession File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getSession
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public String getActiveDiv(){ return activeDiv; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveDiv File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
getActiveDiv
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
public static boolean isEmptyOrWhitespaceOnly(String value) { return isEmpty(value) || (value.trim().length() == 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEmptyOrWhitespaceOnly File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
isEmptyOrWhitespaceOnly
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void onRestoreInstanceState(@NonNull Bundle savedInstanceState) { super.onRestoreInstanceState(savedInstanceState); // AsyncTask boolean inProgress = savedInstanceState.getBoolean(KEY_ASYNC_TASK_IN_PROGRESS); if (inProgress) { String username = savedInst...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRestoreInstanceState File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
onRestoreInstanceState
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
public boolean ensureSearchEntityLoaded() { if (mySearchEntity == null) { Optional<Search> searchOpt = mySearchCacheSvc.fetchByUuid(myUuid); if (!searchOpt.isPresent()) { return false; } setSearchEntity(searchOpt.get()); ourLog.trace("Retrieved search with version {} and total {}", mySearchEntity...
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2021-32053 - Severity: MEDIUM - CVSS Score: 5.0 Description: Address DOS issue in History operation Function: ensureSearchEntityLoaded File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java Repository: hapifhir/hapi-f...
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
ensureSearchEntityLoaded
hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
a5e4f56e1c6f55093ff334cf698ffdeea2f33960
1
Analyze the following code function for security vulnerabilities
private void parseInitialization(final Node root) throws GameParseException { // parse territory owners final Node owner = getSingleChild("ownerInitialize", root, true); if (owner != null) { parseOwner(getChildren("territoryOwner", owner)); } // parse initial unit placement final Node unit...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseInitialization File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
parseInitialization
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
public void createBaseFileAssetFields(Structure structure) throws DotDataException, DotStateException { if (structure == null || !InodeUtils.isSet(structure.getInode())) { throw new DotStateException("Cannot create base fileasset fields on a structure that doesn't exist"); } if (structure.getStructureType() !=...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createBaseFileAssetFields File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
createBaseFileAssetFields
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
protected Context getApplicationContext() { return mApplicationContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApplicationContext File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getApplicationContext
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void addImmutableTypeDynamically(String className, boolean isReferenceable) { Class type = JVM.loadClassForName(className); if (type != null) { addImmutableType(type, isReferenceable); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addImmutableTypeDynamically File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
addImmutableTypeDynamically
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
@Override public void next(String packageName) { mSessionCb.next(packageName, Binder.getCallingPid(), Binder.getCallingUid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: next File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
next
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
boolean shouldCheckTokenVisibleRequested() { return mActivityRecord != null || mToken.asWallpaperToken() != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldCheckTokenVisibleRequested File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
shouldCheckTokenVisibleRequested
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
ContentViewDownloadDelegate getDownloadDelegate() { return mDownloadDelegate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDownloadDelegate File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getDownloadDelegate
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void select(String sql, JsonArray params, Handler<AsyncResult<ResultSet>> replyHandler) { client.getConnection(conn -> select(conn, sql, params, closeAndHandleResult(conn, replyHandler))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: select File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
select
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public boolean isUsingUnifiedPassword(ComponentName admin) { if (!mHasFeature) { return true; } Objects.requireNonNull(admin, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(admin); Preconditions.checkCallAuthorization(isDefaul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUsingUnifiedPassword File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isUsingUnifiedPassword
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public static ShortcutPackage loadFromXml(ShortcutService s, ShortcutUser shortcutUser, TypedXmlPullParser parser, boolean fromBackup) throws IOException, XmlPullParserException { final String packageName = ShortcutService.parseStringAttribute(parser, ATTR_NAME); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadFromXml File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
loadFromXml
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
private void renderInit(XWikiContext xcontext) throws Exception { RenderingContext renderingContext = Utils.getComponent(RenderingContext.class); MutableRenderingContext mutableRenderingContext = renderingContext instanceof MutableRenderingContext ? (MutableRenderingContext) renderingCon...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderInit File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
renderInit
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
@Deprecated // since 2.12 protected void _failDoubleToIntCoercion(JsonParser p, DeserializationContext ctxt, String type) throws IOException { ctxt.reportInputMismatch(handledType(), "Cannot coerce a floating-point value ('%s') into %s (enable `DeserializationFeature.ACCEPT_FLOAT_AS_INT` to ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _failDoubleToIntCoercion File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_failDoubleToIntCoercion
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@Override public boolean isNdefPushEnabled() throws RemoteException { synchronized (NfcService.this) { return mState == NfcAdapter.STATE_ON && mIsNdefPushEnabled; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNdefPushEnabled File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
isNdefPushEnabled
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
private boolean isLocationProvidersAllowedRestricted(String name, int callingUserId, int owningUserId) { // Optimization - location providers are restricted only for managed profiles. if (callingUserId == owningUserId) { return false; } if (Settings.Secure.LOCATIO...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLocationProvidersAllowedRestricted File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isLocationProvidersAllowedRestricted
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
public void getAdminData(StudyBean study, DatasetBean dataset, OdmAdminDataBean data, String odmVersion) { String dbName = CoreResources.getDBName(); this.setStudyUsersTypesExpected(); ArrayList rows = this.select(this.getStudyUsersSql(study.getId() + "")); Iterator it = rows.iterator();...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAdminData File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
getAdminData
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
@CalledByNative protected long getNativePtr() { return mNativeTabAndroid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNativePtr File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getNativePtr
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void popPageAttributes() { pageInh.remove(pageInh.size() - 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: popPageAttributes File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
popPageAttributes
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
private void instantCollapseNotificationPanel() { mNotificationPanel.instantCollapse(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: instantCollapseNotificationPanel File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
instantCollapseNotificationPanel
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void disableShortcuts(String packageName, List shortcutIds, CharSequence disabledMessage, int disabledMessageResId, @UserIdInt int userId) { verifyCaller(packageName, userId); Objects.requireNonNull(shortcutIds, "shortcutIds must be provided"); List<ShortcutInfo>...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableShortcuts File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
disableShortcuts
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void updateAuthor() { // Temporary set as author of the document the current script author (until the document is saved) XWikiContext xcontext = getXWikiContext(); getDoc().setAuthorReference(xcontext.getAuthorReference()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
updateAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public int getForegroundServiceType(ComponentName className, IBinder token) { synchronized (this) { return mServices.getForegroundServiceTypeLocked(className, token); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getForegroundServiceType File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getForegroundServiceType
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected void _reportInvalidOther(int mask, int ptr) throws JsonParseException { _inputPtr = ptr; _reportInvalidOther(mask); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _reportInvalidOther File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_reportInvalidOther
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@Override public String getHeader(String name) { return request.getHeader(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeader File: sa-token-starter/sa-token-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
getHeader
sa-token-starter/sa-token-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
@Override public void onConnectChoiceRemoved(String choiceKey) { onUserConnectChoiceRemove(choiceKey); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConnectChoiceRemoved File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
onConnectChoiceRemoved
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
static Details fromPlainPassword(String rawPassword) { return new Details(PASSWORD_ENCODER.encodePassword(rawPassword,null)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromPlainPassword File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-2064
MEDIUM
5
jenkinsci/jenkins
fromPlainPassword
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
fbf96734470caba9364f04e0b77b0bae7293a1ec
0
Analyze the following code function for security vulnerabilities
@NonNull @Override public int[] getPermissionGids(@NonNull String permissionName, @UserIdInt int userId) { return mPermissionManagerServiceImpl.getPermissionGids(permissionName, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermissionGids File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getPermissionGids
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
@Override public void connectionServiceFocusGained(Session.Info sessionInfo) throws RemoteException { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectionServiceFocusGained File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
connectionServiceFocusGained
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private final int reAddAppWindowsLocked(final DisplayContent displayContent, int index, WindowToken token) { final int NW = token.windows.size(); for (int i=0; i<NW; i++) { final WindowState win = token.windows.get(i); final DisplayCont...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reAddAppWindowsLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
reAddAppWindowsLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private void saveGroupStateAsync(int groupId) { mSaveStateHandler.post(new SaveStateRunnable(groupId)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveGroupStateAsync File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
saveGroupStateAsync
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
private void initializeUi() { final int headerResId = R.string.downloading_administrator_header; final int titleResId = R.string.setup_device_progress; initializeLayoutParams(R.layout.empty_loading_layout, headerResId); setTitle(titleResId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initializeUi File: src/com/android/managedprovisioning/provisioning/AdminIntegratedFlowPrepareActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21275
HIGH
7.8
android
initializeUi
src/com/android/managedprovisioning/provisioning/AdminIntegratedFlowPrepareActivity.java
8277a2a946e617a7ea65056e4cedeb1fecf3a5f5
0
Analyze the following code function for security vulnerabilities
protected final NullValueProvider findValueNullProvider(DeserializationContext ctxt, SettableBeanProperty prop, PropertyMetadata propMetadata) throws JsonMappingException { if (prop != null) { return _findNullProvider(ctxt, prop, propMetadata.getValueNulls(), ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findValueNullProvider File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
findValueNullProvider
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
public void onUserForeground(int userId) { synchronized (mPackagesLock) { UserInfo user = mUsers.get(userId); long now = System.currentTimeMillis(); if (user == null || user.partial) { Slog.w(LOG_TAG, "userForeground: unknown user #" + userId); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserForeground File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
onUserForeground
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
public synchronized void updateBoolean(String columnName, boolean x) throws SQLException { updateBoolean(findColumn(columnName), x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBoolean File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBoolean
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
Set<String> names();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: names File: core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
names
core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Override public void setPackageStoppedState(String packageName, boolean stopped, int userId) { if (!sUserManager.exists(userId)) return; final int uid = Binder.getCallingUid(); final int permission = mContext.checkCallingOrSelfPermission( android.Manifest.permission.CHANGE_C...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageStoppedState File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setPackageStoppedState
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private native void nativePinchBy(long nativeContentViewCoreImpl, long timeMs, float anchorX, float anchorY, float deltaScale);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativePinchBy File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativePinchBy
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public String encodeUrl(String url) { return encodeURL(url); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encodeUrl File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
encodeUrl
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
public void setStringInputSource(ThreadContext context, IRubyObject data, IRubyObject url) { source = new InputSource(); ParserContext.setUrl(context, source, url); Ruby ruby = context.getRuntime(); if (!(data instanceof RubyString)) { throw ruby.newArgumentError("must be kind_of String"); ...
Vulnerability Classification: - CWE: CWE-241 - CVE: CVE-2022-29181 - Severity: MEDIUM - CVSS Score: 6.4 Description: fix: {HTML4,XML}::SAX::{Parser,ParserContext} check arg types Previously, arguments of the wrong type might cause segfault on CRuby. Function: setStringInputSource File: ext/java/nokogiri/internals/Pa...
[ "CWE-241" ]
CVE-2022-29181
MEDIUM
6.4
sparklemotion/nokogiri
setStringInputSource
ext/java/nokogiri/internals/ParserContext.java
db05ba9a1bd4b90aa6c76742cf6102a7c7297267
1
Analyze the following code function for security vulnerabilities
@NonNull public AccountAndUser[] getRunningAccounts() { final int[] runningUserIds; try { runningUserIds = ActivityManager.getService().getRunningUserIds(); } catch (RemoteException e) { // Running in system_server; should never happen throw new RuntimeExc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRunningAccounts File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getRunningAccounts
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private static EntityReferenceResolver<String> getRelativeEntityReferenceResolver() { return Utils.getComponent(EntityReferenceResolver.TYPE_STRING, "relative"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRelativeEntityReferenceResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRelativeEntityReferenceResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS, conditional = true) public @PermissionGrantState int getPermissionGrantState(@Nullable ComponentName admin, @NonNull String packageName, @NonNull String permission) { throwIfParentInstance("getPermissionGrantState"); t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermissionGrantState File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPermissionGrantState
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo, Bundle options, int userId) throws RemoteException { Pa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityAndWait File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startActivityAndWait
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
void setMainWindowOpaque(boolean isOpaque) { final WindowState win = findMainWindow(); if (win == null) { return; } isOpaque = isOpaque & !PixelFormat.formatHasAlpha(win.getAttrs().format); win.mWinAnimator.setOpaqueLocked(isOpaque); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMainWindowOpaque File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setMainWindowOpaque
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private void trimApplications(boolean forceFullOomAdj, String oomAdjReason) { synchronized (this) { trimApplicationsLocked(forceFullOomAdj, oomAdjReason); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trimApplications File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
trimApplications
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withPathBlacklist(Collection<PathRule> blacklistedPaths) { this.blacklistedPaths = Set.copyOf(blacklistedPaths); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPathBlacklist File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withPathBlacklist
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
@Override public boolean requiresWorkspaceForPolling() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requiresWorkspaceForPolling File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
requiresWorkspaceForPolling
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
@Override protected boolean onMiddleClicked() { switch (mStatusBar.getBarState()) { case StatusBarState.KEYGUARD: if (!mDozingOnDown) { mLockscreenGestureLogger.write( MetricsEvent.ACTION_LS_HINT, 0 /* le...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onMiddleClicked File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onMiddleClicked
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private void addItemsToDeny0(final String[] items){ if (items == null){ return; } for (int i = 0; i < items.length; ++i) { String item = items[i]; this.addDenyInternal(item); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addItemsToDeny0 File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java Repository: alibaba/fastjson The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-25845
MEDIUM
6.8
alibaba/fastjson
addItemsToDeny0
src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
8f3410f81cbd437f7c459f8868445d50ad301f15
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withPath(Path executionPath) { this.executionPath = Objects.requireNonNull(executionPath); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPath File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withPath
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
@Override public String getNameUnsafe() { return worldNameRef; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNameUnsafe File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
getNameUnsafe
worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public List<BaseObject> updateXObjectsFromRequest(EntityReference classReference, String pref, XWikiContext context) throws XWikiException { DocumentReference absoluteClassReference = resolveClassReference(classReference); @SuppressWarnings("unchecked") Map<String, String[]> map = co...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateXObjectsFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
updateXObjectsFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Editable(name="User SSH Key Attribute", order=850, description="" + "Optionally specify name of the attribute inside the user LDAP entry whose values will be taken as user " + "SSH keys. SSH keys will be managed by LDAP only if this field is set") public String getUserSshKeyAttribute() { return userSshKeyAttr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserSshKeyAttribute File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java Repository: theonedev/onedev The code follows secure coding p...
[ "CWE-90" ]
CVE-2021-32651
MEDIUM
4.3
theonedev/onedev
getUserSshKeyAttribute
server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
4440f0c57e440488d7e653417b2547eaae8ad19c
0
Analyze the following code function for security vulnerabilities
@Override @Transactional(rollbackFor = Exception.class) @CacheEvict(value={CacheConstant.SYS_USERS_CACHE}, allEntries=true) public void editUser(SysUser user, String roles, String departs) { //step.1 修改用户基础信息 this.updateById(user); //step.2 修改角色 //处理用户角色 先删后加 sysUserRoleMapper.delete(new QueryWrapper<SysUs...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: editUser File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
editUser
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
protected final void parseFeatures(XmlPullParser parser) throws Exception { streamFeatures.clear(); final int initialDepth = parser.getDepth(); while (true) { int eventType = parser.next(); if (eventType == XmlPullParser.START_TAG && parser.getDepth() == initialDepth + 1...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseFeatures File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
parseFeatures
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
protected String escape(final String s) { if (s.startsWith("#")) { return StringUtil.EMPTY; } else if (s.startsWith("^") && s.endsWith("$")) { return "^" + Pattern.quote(s.substring(1, s.length() - 1)) + "$"; } else if (s.startsWith("^")) { return "^" + Patter...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escape File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java Repository: codelibs/fess The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000822
HIGH
7.5
codelibs/fess
escape
src/main/java/org/codelibs/fess/util/GsaConfigParser.java
faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7
0
Analyze the following code function for security vulnerabilities
public MetaClass getMetaclass() { return this.xwiki.getMetaclass(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetaclass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getMetaclass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
protected static Document parseDocumentImpl(InputSource inputSource) throws ParserConfigurationException, SAXException, IOException { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setNamespaceAware(isNamespaceAware); DocumentBuilder builder = factory....
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2014-125087 - Severity: MEDIUM - CVSS Score: 5.2 Description: Disable external entities by default to prevent XXE injection attacks, re #6 XML Builder classes now explicitly enable or disable 'external-general-entities' and 'external-parameter-entities' features...
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
parseDocumentImpl
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
1
Analyze the following code function for security vulnerabilities
private List<ValidationError> globalErrorsAsValidationErrors(BindingResult result) { return result.getGlobalErrors().stream() .map( error -> new ValidationError( "", error.getDefaultMessage(), convertErrorArguments(error.getArguments()))) .collect(Coll...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: globalErrorsAsValidationErrors File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
globalErrorsAsValidationErrors
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
private String formatWithZeroZoneOffset(Instant date, String offset){ return '"' + FORMATTER.format(date).replaceFirst("Z$", offset) + '"'; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatWithZeroZoneOffset File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
formatWithZeroZoneOffset
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
public Service getService() { return service; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getService File: h2/src/main/org/h2/tools/Server.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getService
h2/src/main/org/h2/tools/Server.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public static String getDiffString2(String prefix, int i, String suffix) { if(i==0) return ""; String s = Integer.toString(i); if(i>0) return prefix+"+"+s+suffix; else return prefix+s+suffix; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDiffString2 File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getDiffString2
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
private static native @Nullable String nativeGetResourceTypeName(long ptr, @AnyRes int resid);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetResourceTypeName File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetResourceTypeName
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
private Proxy getProxy() { org.ballerinalang.toml.model.Proxy proxy = TomlParserUtils.readSettings().getProxy(); if (!"".equals(proxy.getHost())) { InetSocketAddress proxyInet = new InetSocketAddress(proxy.getHost(), proxy.getPort()); if (!"".equals(proxy.getUserName()) && "".equ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProxy File: compiler/ballerina-lang/src/main/java/org/wso2/ballerinalang/compiler/packaging/converters/URIDryConverter.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
getProxy
compiler/ballerina-lang/src/main/java/org/wso2/ballerinalang/compiler/packaging/converters/URIDryConverter.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
public static int calculateTau(int index, int height) { int tau = 0; for (int i = 0; i < height; i++) { if (((index >> i) & 1) == 0) { tau = i; break; } } return tau; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: calculateTau File: core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSUtil.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-470" ]
CVE-2018-1000613
HIGH
7.5
bcgit/bc-java
calculateTau
core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSUtil.java
4092ede58da51af9a21e4825fbad0d9a3ef5a223
0
Analyze the following code function for security vulnerabilities
@CalledByNative public int getViewportSizeOffsetWidthPix() { return mViewportSizeOffsetWidthPix; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewportSizeOffsetWidthPix File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getViewportSizeOffsetWidthPix
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public List<News> newsMoreRecentThan(String date){ Query query = em.createQuery("SELECT n FROM News n WHERE n.date > :d ORDER BY date DESC"); query.setParameter("d", date); @SuppressWarnings("unchecked") List<News> news = query.getResultList(); return news; }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2014-125038 - Severity: MEDIUM - CVSS Score: 5.2 Description: data a funcionar mas sem proteger sql injection Function: newsMoreRecentThan File: Cnn-EJB/ejbModule/ejbs/NewsBean.java Repository: rfsimoes/IS_Projecto2 Fixed Code: public List<News> newsMoreRecentTh...
[ "CWE-89" ]
CVE-2014-125038
MEDIUM
5.2
rfsimoes/IS_Projecto2
newsMoreRecentThan
Cnn-EJB/ejbModule/ejbs/NewsBean.java
aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0
1
Analyze the following code function for security vulnerabilities
@Override public int doEndTag() throws JspException { RequestDataValueProcessor processor = getRequestContext().getRequestDataValueProcessor(); ServletRequest request = this.pageContext.getRequest(); if ((processor != null) && (request instanceof HttpServletRequest)) { writeHiddenFields(processor.getExtraHidd...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doEndTag File: spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-1904
MEDIUM
4.3
spring-projects/spring-framework
doEndTag
spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java
741b4b229ae032bd17175b46f98673ce0bd2d485
0
Analyze the following code function for security vulnerabilities
private String getNotificationKeyForParent(ViewParent parent) { while (parent != null) { if (parent instanceof ExpandableNotificationRow) { return ((ExpandableNotificationRow) parent).getStatusBarNotification().getKey(); } parent = parent.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNotificationKeyForParent File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getNotificationKeyForParent
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setConcurrentBuild(boolean b) throws IOException { concurrentBuild = b; save(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConcurrentBuild File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
setConcurrentBuild
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public String getExternalAttachmentURL(String filename, String action, XWikiContext context) { URL url = context.getURLFactory().createAttachmentURL(filename, getSpace(), getName(), action, null, getDatabase(), context); return url.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExternalAttachmentURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getExternalAttachmentURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public Builder setUseRawUrl(boolean useRawUrl) { this.useRawUrl = useRawUrl; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseRawUrl File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setUseRawUrl
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@Override public void crashApplicationWithType(int uid, int initialPid, String packageName, int userId, String message, boolean force, int exceptionTypeId) { crashApplicationWithTypeWithExtras(uid, initialPid, packageName, userId, message, force, exceptionTypeId, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: crashApplicationWithType File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
crashApplicationWithType
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void begin(FilterEventParameters parameters) throws FilterException { DocumentReference documentReference = this.documentEntityResolver.resolve(this.currentEntityReference, getDefaultDocumentReference()); if (this.entity == null) { this.entity = new XWikiDocument(doc...
Vulnerability Classification: - CWE: CWE-459 - CVE: CVE-2023-36468 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20594: Mark old revisions and deleted documents as restricted * Introduce a new "restricted" attribute on XWikiDocument * Mark any document that is restored from XML as restricted * Deny script rig...
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
begin
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
1
Analyze the following code function for security vulnerabilities
@UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) @RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) public long getRequiredStrongAuthTimeout(@Nullable ComponentName admin, @UserIdInt int userId) { if (mService != null) { try { retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequiredStrongAuthTimeout File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getRequiredStrongAuthTimeout
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void measure() { final int spec = MeasureSpec.makeMeasureSpec(0, MeasureSpec.UNSPECIFIED); row.measure(spec, spec); measuredRowHeight = row.getMeasuredHeight(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: measure File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
measure
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
@Override protected int doFinalInternal(byte[] output, int outputOffset, int maximumLen) throws IllegalBlockSizeException, BadPaddingException { EVP_AEAD_CTX cipherCtx = new EVP_AEAD_CTX(NativeCrypto.EVP_AEAD_CTX_init(evpAead, encodedKey, tagLen)); fin...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doFinalInternal File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
doFinalInternal
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
public JiffleRuntime getRuntimeInstance(Jiffle.RuntimeModel model) throws it.geosolutions.jaiext.jiffle.JiffleException { return createRuntimeInstance(model, getRuntimeBaseClass(model), false); }
Vulnerability Classification: - CWE: CWE-94 - CVE: CVE-2022-24816 - Severity: HIGH - CVSS Score: 7.5 Description: Validate Jiffle input variable names according to grammar, escape javadocs when including Jiffle sources in output Function: getRuntimeInstance File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolut...
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
getRuntimeInstance
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
1