instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public void setValue(String value) {
this.value = value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValue
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileParameter.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setValue | base/common/src/main/java/com/netscape/certsrv/profile/ProfileParameter.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void silenceRinger(String callingPackage) {
synchronized (mLock) {
enforcePermissionOrPrivilegedDialer(MODIFY_PHONE_STATE, callingPackage);
long token = Binder.clearCallingIdentity();
try {
Log.i(this, "Silence Rin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: silenceRinger
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | silenceRinger | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Deprecated
public void setStatus(int arg0, String arg1) {
// ignore
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStatus
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | setStatus | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @GetMapping("/{id}/vote")
public Result vote(@PathVariable Integer id) {
User user = getApiUser();
Topic topic = topicService.selectById(id);
ApiAssert.notNull(topic, "这个话题可能已经被删除了");
ApiAssert.notTrue(topic.getUserId().equals(user.getId()), "给自己话题点赞,脸皮真厚!!");
int voteCount =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: vote
File: src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java
Repository: atjiu/pybbs
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | vote | src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAsyncSupported() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAsyncSupported
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | isAsyncSupported | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | public BaseObject updateXObjectFromRequest(EntityReference classReference, XWikiContext context)
throws XWikiException
{
return updateXObjectFromRequest(classReference, "", context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateXObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | updateXObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeExitFullscreen(long nativeContentViewCoreImpl); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeExitFullscreen
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeExitFullscreen | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public TcpSlaveAgentListener getTcpSlaveAgentListener() {
return tcpSlaveAgentListener;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTcpSlaveAgentListener
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getTcpSlaveAgentListener | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | private String getMatcherResultForImg(String regex, String targetStr) {
String result = "";
Pattern pattern = Pattern.compile(regex);
Matcher matcher = pattern.matcher(targetStr);
while (matcher.find()) {
result = matcher.group(1);
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMatcherResultForImg
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getMatcherResultForImg | test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateEverything() {
updateDateTimePosition();
updateVisibilities();
setClickable(false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateEverything
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3886 | HIGH | 7.2 | android | updateEverything | packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java | 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLeashAnimationStarting(Transaction t, SurfaceControl leash) {
if (mAnimatingActivityRegistry != null) {
mAnimatingActivityRegistry.notifyStarting(this);
}
// If the animation needs to be cropped then an animation bounds layer is created as a
// ch... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLeashAnimationStarting
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | onLeashAnimationStarting | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean validUTF8(byte[] input) {
CharsetDecoder cd = Charset.availableCharsets().get("UTF-8").newDecoder();
try {
cd.decode(ByteBuffer.wrap(input));
} catch (CharacterCodingException e) {
return false;
}
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validUTF8
File: src/main/java/com/openkm/util/FormatUtil.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-40317 | MEDIUM | 5.4 | openkm/document-management-system | validUTF8 | src/main/java/com/openkm/util/FormatUtil.java | 870d518f7de349c3fa4c7b9883789fdca4590c4e | 0 |
Analyze the following code function for security vulnerabilities | private void dumpPerUserData(IndentingPrintWriter pw) {
int userCount = mUserData.size();
for (int i = 0; i < userCount; i++) {
int userId = mUserData.keyAt(i);
DevicePolicyData policy = getUserData(userId);
policy.dump(pw);
pw.println();
if (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpPerUserData
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | dumpPerUserData | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean addCrossProfileWidgetProvider(ComponentName admin, String callerPackageName,
String packageName) {
CallerIdentity caller;
if (isPermissionCheckFlagEnabled()) {
caller = getCallerIdentity(admin, callerPackageName);
} else {
caller ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCrossProfileWidgetProvider
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | addCrossProfileWidgetProvider | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | ActivityRecord findActivityLocked(Intent intent, ActivityInfo info) {
for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) {
final ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks;
for (int stackNdx = stacks.size() - 1; stackNd... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findActivityLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | findActivityLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Bean
public GithubService githubService(
Endpoint githubEndpoint, Client retrofitClient, RestAdapter.LogLevel retrofitLogLevel) {
log.info("Github service loaded");
GithubService githubClient =
new RestAdapter.Builder()
.setEndpoint(githubEndpoint)
.setConverter(new Jac... | Vulnerability Classification:
- CWE: CWE-532
- CVE: CVE-2023-39348
- Severity: MEDIUM
- CVSS Score: 5.3
Description: fix(gha): Fix github status log and add tests
Function: githubService
File: echo-notifications/src/main/groovy/com/netflix/spinnaker/echo/config/GithubConfig.java
Repository: spinnaker/echo
Fixed Code... | [
"CWE-532"
] | CVE-2023-39348 | MEDIUM | 5.3 | spinnaker/echo | githubService | echo-notifications/src/main/groovy/com/netflix/spinnaker/echo/config/GithubConfig.java | bcbc7bc89a83f79d86b5c13438c8f04e581946b2 | 1 |
Analyze the following code function for security vulnerabilities | public void setHeightMode(HeightMode heightMode) {
/**
* This method is a workaround for the fact that Vaadin re-applies
* widget dimensions (height/width) on each state change event. The
* original design was to have setHeight and setHeightByRow be equals,
* and whichever wa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHeightMode
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setHeightMode | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("/view")
public void view(@RequestParam String filename,
@RequestParam(required = false) String base,
@RequestParam(required = false) Integer tailLines,
HttpServletResponse response) throws IOException {
securityCheck(filename);
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-21234
- Severity: MEDIUM
- CVSS Score: 4.0
Description: backport directory traversal vulnerability fix
Function: view
File: lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java
Repository: lukashinsch/spring-boot-actuator-logview
Fi... | [
"CWE-22"
] | CVE-2021-21234 | MEDIUM | 4 | lukashinsch/spring-boot-actuator-logview | view | lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java | 760acbb939a8d1f7d1a7dfcd51ca848eea04e772 | 1 |
Analyze the following code function for security vulnerabilities | @SuppressJava6Requirement(reason = "Usage guarded by java version check")
private static boolean canExecuteExecutable(File file) throws IOException {
if (PlatformDependent.javaVersion() < 7) {
// Pre-JDK7, the Java API did not directly support POSIX permissions; instead of implementi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canExecuteExecutable
File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
Repository: netty
The code follows secure coding practices. | [
"CWE-378",
"CWE-379"
] | CVE-2021-21290 | LOW | 1.9 | netty | canExecuteExecutable | common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java | c735357bf29d07856ad171c6611a2e1a0e0000ec | 0 |
Analyze the following code function for security vulnerabilities | public void setNetworkAvailableOnUiThread(final AwContents awContents,
final boolean networkUp) {
getInstrumentation().runOnMainSync(new Runnable() {
@Override
public void run() {
awContents.setNetworkAvailable(networkUp);
}
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNetworkAvailableOnUiThread
File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5155 | MEDIUM | 4.3 | chromium | setNetworkAvailableOnUiThread | android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java | b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6 | 0 |
Analyze the following code function for security vulnerabilities | Handler getHandler(final String uri,
final String localName) {
SemanticModule module = this.modules.getSemanticModule( uri );
if ( module != null ) {
return module.getHandler( localName );
} else {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHandler
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | getHandler | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isCallingFromPackage(String packageName, int callingUid) {
return mInjector.binderWithCleanCallingIdentity(() -> {
try {
final int packageUid = mInjector.getPackageManager().getPackageUidAsUser(
packageName, UserHandle.getUserId(callingUid));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCallingFromPackage
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isCallingFromPackage | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public boolean canGoForward() {
return mWebContents != null && mWebContents.getNavigationController().canGoForward();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canGoForward
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | canGoForward | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void alias(String name, Class type) {
if (classAliasingMapper == null) {
throw new com.thoughtworks.xstream.InitializationException("No "
+ ClassAliasingMapper.class.getName()
+ " available");
}
classAliasingMapper.addClassAlias(name, type);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: alias
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | alias | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | private int runInstallAbandon() throws RemoteException {
final int sessionId = Integer.parseInt(nextArg());
PackageInstaller.Session session = null;
try {
session = new PackageInstaller.Session(mInstaller.openSession(sessionId));
session.abandon();
System.out... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runInstallAbandon
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | runInstallAbandon | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | public void unbindBackupAgent(ApplicationInfo appInfo) {
if (DEBUG_BACKUP) Slog.v(TAG_BACKUP, "unbindBackupAgent: " + appInfo);
if (appInfo == null) {
Slog.w(TAG, "unbind backup agent for null app");
return;
}
synchronized(this) {
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unbindBackupAgent
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | unbindBackupAgent | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | private SyndFeed getFeed()
{
return (SyndFeed) this.execution.getContext().getProperty(FEED_PROPERTY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFeed
File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
Repository: xwiki/xwiki-p... | [
"CWE-79"
] | CVE-2023-29202 | CRITICAL | 9 | xwiki/xwiki-platform | getFeed | xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java | 5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03 | 0 |
Analyze the following code function for security vulnerabilities | public String getName() {
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getName | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static NativeArray jsFunction_getSubscriptions(Context cx, Scriptable thisObj,
Object[] args, Function funObj)
throws ScriptException, APIManagementException {
NativeArray myn = new NativeArray(0);
if (args != null && args.len... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_getSubscriptions
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure co... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_getSubscriptions | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public <T> void write(String key, T payload) {
if (payload == null) {
LOG.debug("Payload was null. Skipping.");
return;
}
ClusterConfig clusterConfig = ClusterConfig.create(key, payload, nodeId.getNodeId());
dbCollection.update(DBQuery.is("type", k... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2024-24824 | HIGH | 8.8 | Graylog2/graylog2-server | write | graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java | 75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8 | 0 |
Analyze the following code function for security vulnerabilities | private Header[] applyHeaderFilters(Header[] theAllHeaders) {
if (myFilterHeaders == null || myFilterHeaders.isEmpty()) {
return theAllHeaders;
}
ArrayList<Header> retVal = new ArrayList<Header>();
for (Header next : theAllHeaders) {
if (!myFilterHeaders.contains(next.getName().toLowerCase())) {
retVa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyHeaderFilters
File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-12741 | MEDIUM | 4.3 | hapifhir/hapi-fhir | applyHeaderFilters | hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java | 8f41159eb147eeb964cad68b28eff97acac6ea9a | 0 |
Analyze the following code function for security vulnerabilities | public List<Object> updateObjectsFromRequest(String className, String prefix) throws XWikiException
{
List<BaseObject> objs = getDoc().updateObjectsFromRequest(className, prefix, getXWikiContext());
List<Object> wrapped = new ArrayList<Object>();
for (BaseObject object : objs) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateObjectsFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | updateObjectsFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder data(String data) {
return cdata(data);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: data
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | data | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private void uninstallOrDisablePackage(String packageName, @UserIdInt int userId) {
final ApplicationInfo appInfo;
try {
appInfo = mIPackageManager.getApplicationInfo(
packageName, MATCH_DIRECT_BOOT_AWARE | MATCH_DIRECT_BOOT_UNAWARE, userId);
} catch (RemoteExcept... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uninstallOrDisablePackage
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | uninstallOrDisablePackage | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private static String getLBURL(String requestUrl,
HttpServletRequest request)
{
String host = request.getHeader("host");
if (host == null) {
return requestUrl;
}
int index = requestUrl.indexOf("//");
if (index == -1) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLBURL
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | getLBURL | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | protected String getPreviousVersion(HttpServletRequest request)
{
String previousVersionParameter = request.getParameter(PREVIOUS_VERSION_PARAMETER);
if (isFromChangeRequest(request)) {
return this.fileChangeVersionManager.getFileChangeVersion(previousVersionParameter);
} else {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPreviousVersion
File: application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java
Repository: xwiki-contrib/application-changerequest
Th... | [
"CWE-522"
] | CVE-2023-49280 | MEDIUM | 6.5 | xwiki-contrib/application-changerequest | getPreviousVersion | application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java | ff0f5368ea04f0e4aa7b33821c707dc68a8c5ca8 | 0 |
Analyze the following code function for security vulnerabilities | private <T> T externGet(Supplier<T> supplier) {
try {
exitPublicInterface();
return supplier.get();
} finally {
enterPublicInterface();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: externGet
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | externGet | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | public String display(String fieldname, Object obj)
{
if (obj == null) {
return "";
}
return this.doc.display(fieldname, obj.getBaseObject(), getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: display
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | display | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public Messenger getMessenger() {
return new Messenger(getHandler());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMessenger
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getMessenger | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @UnstableApi
public ServerBuilder multipartUploadsLocation(Path path) {
requireNonNull(path, "path");
virtualHostTemplate.multipartUploadsLocation(path);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: multipartUploadsLocation
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | multipartUploadsLocation | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public AsyncHttpClientConfigBean setProxyServer(ProxyServer proxyServer) {
this.proxyServerSelector = ProxyUtils.createProxyServerSelector(proxyServer);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProxyServer
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setProxyServer | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN)
@RequiresPermission(value = MANAGE_DEVICE_POLICY_RESET_PASSWORD, conditional = true)
public boolean setResetPasswordToken(@Nullable ComponentName admin, byte[] token) {
throwIfParentInstance("setResetPasswordToken");
if (mService != nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResetPasswordToken
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setResetPasswordToken | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String getTemplate()
{
String templateReferenceAsString = "";
DocumentReference templateDocumentReference = this.doc.getTemplateDocumentReference();
if (templateDocumentReference != null) {
templateReferenceAsString = getLocalEntityReferenceSerializer().serialize(templateD... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTemplate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getTemplate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public Intent createAdminSupportIntent(@NonNull String restriction) {
throwIfParentInstance("createAdminSupportIntent");
Intent result = null;
if (mService != null) {
try {
result = mService.createAdminSupportIntent(restriction);
if (result != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createAdminSupportIntent
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | createAdminSupportIntent | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void deleteClusterRoleBinding(String namespace, TaskLogger jobLogger) {
Commandline cmd = newKubeCtl();
cmd.addArgs("delete", "clusterrolebinding", namespace);
cmd.execute(new LineConsumer() {
@Override
public void consume(String line) {
logger.debug(line);
}
}, new LineConsumer() {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteClusterRoleBinding
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
Repository: theonedev/onedev
The code follows secure cod... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | deleteClusterRoleBinding | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | void dumpSessionsLocked(PrintWriter pw, boolean dumpAll) {
pw.println("WINDOW MANAGER SESSIONS (dumpsys window sessions)");
for (int i=0; i<mSessions.size(); i++) {
Session s = mSessions.valueAt(i);
pw.print(" Session "); pw.print(s); pw.println(':');
s.dump(pw, " ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpSessionsLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | dumpSessionsLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public Marshaller getMarshaller() {
return marshaller;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMarshaller
File: integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | getMarshaller | integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java | 69be66141eee7abb1c47d46f0a6b74b079709f4b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void placeCall(Uri handle, Bundle extras, String callingPackage,
String callingFeatureId) {
try {
Log.startSession("TSI.pC", Log.getPackageAbbreviation(callingPackage));
enforceCallingPackage(callingPackage, "placeCall");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: placeCall
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | placeCall | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | private void write(OutputStream out, Object obj) throws IOException {
ObjectOutputStream objectOutputStream = new ObjectOutputStream(out);
if (shared) {
objectOutputStream.writeObject(obj);
} else {
objectOutputStream.writeUnshared(obj);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | write | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onListRebuilt() {
if (mServiceTargets != null) {
pruneServiceTargets();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onListRebuilt
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | onListRebuilt | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long getTimeMillisAndRemove(K name, long defaultValue) {
Long v = getTimeMillisAndRemove(name);
return v != null ? v : defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTimeMillisAndRemove
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | getTimeMillisAndRemove | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> using(String dialect) {
this.dialectClass = dialect;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: using
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | using | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Element toDOM(Document document) {
Element element = document.createElement("SymKeyGenerationRequest");
toDOM(document, element);
return element;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDOM
File: base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toDOM | base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void startSipProfilesAsync(
final Context context, final String sipProfileName, final boolean enableProfile) {
if (VERBOSE) log("startSipProfiles, start auto registration");
new Thread(new Runnable() {
@Override
public void run() {
startSipPro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startSipProfilesAsync
File: sip/src/com/android/services/telephony/sip/SipAccountRegistry.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | startSipProfilesAsync | sip/src/com/android/services/telephony/sip/SipAccountRegistry.java | a294ae5342410431a568126183efe86261668b5d | 0 |
Analyze the following code function for security vulnerabilities | void handleGsmAuthRequest(SimAuthRequestData requestData) {
WifiConfiguration requestingWifiConfiguration = null;
if (mTargetWifiConfiguration != null
&& mTargetWifiConfiguration.networkId
== requestData.networkId) {
requestingWifiConfiguration = mTargetWifiCo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleGsmAuthRequest
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | handleGsmAuthRequest | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public void startElement(String namespaceURI, String localName, String rawName, Attributes atts) throws SAXException {
if (rawName.startsWith("text:")) {
appendChar = true;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startElement
File: src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33950 | HIGH | 7.5 | openkm/document-management-system | startElement | src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java | ce1d82329615aea6aa9f2cc6508c1fe7891e34b5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DefaultJpaInstanceConfiguration autoCreate(boolean autoCreate) {
this.autoCreate = autoCreate;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: autoCreate
File: src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java
Repository: KrailOrg/krail-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-15018 | MEDIUM | 5.2 | KrailOrg/krail-jpa | autoCreate | src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java | c1e848665492e21ef6cc9be443205e36b9a1f6be | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isConnecting() {
IState state = getCurrentState();
return state == mL2ConnectingState || state == mL2ConnectedState
|| state == mL3ProvisioningState;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isConnecting
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | isConnecting | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private boolean similarSets(final List<String> ref, final Set<String> c2, final int matchLimit) {
boolean out = false;
int limit = matchLimit;
for (String s : ref) {
if (c2.contains(s)) {
limit--;
if (limit == 0) {
out = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: similarSets
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | similarSets | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | public boolean isProfileOwner(CallerIdentity caller) {
synchronized (getLockObject()) {
final ComponentName profileOwner = mInjector.binderWithCleanCallingIdentity(() ->
getProfileOwnerAsUser(caller.getUserId()));
// No profile owner.
if (profileOwner == n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isProfileOwner
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isProfileOwner | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Autowired
public void setoAuth2RequestService(OAuth2RequestService oAuth2RequestService) {
this.oAuth2RequestService = oAuth2RequestService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setoAuth2RequestService
File: hsweb-system/hsweb-system-oauth2-client/hsweb-system-oauth2-client-web/src/main/java/org/hswebframework/web/authorization/oauth2/controller/OAuth2ClientController.java
Repository: hs-web/h... | [
"CWE-352"
] | CVE-2018-20595 | MEDIUM | 6.8 | hs-web/hsweb-framework | setoAuth2RequestService | hsweb-system/hsweb-system-oauth2-client/hsweb-system-oauth2-client-web/src/main/java/org/hswebframework/web/authorization/oauth2/controller/OAuth2ClientController.java | 40929e9b0d336a26281a5ed2e0e721d54dd8d2f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onRecipientEntryItemClicked(int charactersTyped, int position) {
// Send analytics of characters typed and position in dropdown selected.
Analytics.getInstance().sendEvent(
"suggest_click", Integer.toString(charactersTyped), Integer.toString(position), 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRecipientEntryItemClicked
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | onRecipientEntryItemClicked | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected List<Contentlet> findPageContentlets(String HTMLPageIdentifier, String containerIdentifier, String orderby, boolean working,
long languageId) throws DotDataException, DotStateException, DotSecurityException {
StringBuilder condition = new StringBuilder();
if (working) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findPageContentlets
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | findPageContentlets | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | public String checkMandatoryFieldsforSave(DSCompositeSolution dscs) {
List<String> errorList = new ArrayList<>();
if (null == dscs.getAuthor().trim()) {
errorList.add("UserID is missing");
}
if (null == dscs.getSolutionName().trim()) {
errorList.add("Solution Name is missing");
}
if (null == dscs.get... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkMandatoryFieldsforSave
File: ds-compositionengine/src/main/java/org/acumos/designstudio/ce/controller/SolutionController.java
Repository: acumos/design-studio
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2018-25097 | MEDIUM | 4 | acumos/design-studio | checkMandatoryFieldsforSave | ds-compositionengine/src/main/java/org/acumos/designstudio/ce/controller/SolutionController.java | 0df8a5e8722188744973168648e4c74c69ce67fd | 0 |
Analyze the following code function for security vulnerabilities | @Reference(
policy = ReferencePolicy.DYNAMIC,
cardinality = ReferenceCardinality.OPTIONAL,
unbind = "unsetSchedulerService"
)
public void setSchedulerService(SchedulerService schedulerService) {
this.schedulerService = schedulerService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSchedulerService
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | setSchedulerService | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | private void collectCertificatesLI(PackageParser pp, PackageSetting ps,
PackageParser.Package pkg, File srcFile, int parseFlags)
throws PackageManagerException {
if (ps != null
&& ps.codePath.equals(srcFile)
&& ps.timeStamp == srcFile.lastModified()
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: collectCertificatesLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | collectCertificatesLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public static void copy(File from, File to) throws IOException {
checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to);
asByteSource(from).copyTo(asByteSink(to));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | copy | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | public void setDefaultServerUrl(String url) {
defaultServerUrl = url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDefaultServerUrl
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | setDefaultServerUrl | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | public Builder setReadPendingIntent(PendingIntent pendingIntent) {
mReadPendingIntent = pendingIntent;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setReadPendingIntent
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setReadPendingIntent | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private final void dumpApplicationMemoryUsageHeader(PrintWriter pw, long uptime,
long realtime, boolean isCheckinRequest, boolean isCompact) {
if (isCheckinRequest || isCompact) {
// short checkin version
pw.print("time,"); pw.print(uptime); pw.print(","); pw.println(realtime... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpApplicationMemoryUsageHeader
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | dumpApplicationMemoryUsageHeader | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTablet() {
return (getContext().getResources().getConfiguration().screenLayout
& Configuration.SCREENLAYOUT_SIZE_MASK)
>= Configuration.SCREENLAYOUT_SIZE_LARGE;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTablet
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isTablet | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void parseStyleAttribute(ApplContext ac, String input, String id,
URL url, int lineno) {
parseStyleAttribute(ac, new ByteArrayInputStream(input.getBytes()),
id, url, lineno);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseStyleAttribute
File: org/w3c/css/css/StyleSheetParser.java
Repository: w3c/css-validator
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-4070 | LOW | 3.5 | w3c/css-validator | parseStyleAttribute | org/w3c/css/css/StyleSheetParser.java | e5c09a9119167d3064db786d5f00d730b584a53b | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject put(String key, long value) throws JSONException {
put(key, Long.valueOf(value));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | put | src/main/java/org/codehaus/jettison/json/JSONObject.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public int getEndColumnNumber() {
return fEndColumnNumber;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEndColumnNumber
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | getEndColumnNumber | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | public URL getServerURL(String wikiId, XWikiContext xcontext) throws MalformedURLException
{
// In path based the base URL is the same for all wikis
if (!xcontext.isMainWiki(wikiId) && isPathBased()) {
return getServerURL(xcontext.getMainXWiki(), xcontext);
}
// If main ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServerURL
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getServerURL | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public AssetHandler cdn(final String cdn) {
this.cdn = Strings.emptyToNull(cdn);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cdn
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | cdn | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public void register() {
mRm.addOnRoleHoldersChangedListenerAsUser(mExecutor, this, UserHandle.ALL);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: register
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | register | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected void setExposeHeaders(List<String> exposedHeaders, MutableHttpResponse<?> response) {
if (corsConfiguration.isSingleHeader()) {
String headerValue = String.join(",", exposedHeaders);
if (StringUtils.isNotEmpty(headerValue)) {
response.header(ACCESS_CONTROL_EXPOS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setExposeHeaders
File: http-server/src/main/java/io/micronaut/http/server/cors/CorsFilter.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | setExposeHeaders | http-server/src/main/java/io/micronaut/http/server/cors/CorsFilter.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | public void readSetEnd() {} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readSetEnd
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readSetEnd | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | public static void copy(InputStream in, OutputStream out) throws IOException
{
copy(in, out, IO_BUFFER_SIZE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy
File: src/main/java/com/mxgraph/online/Utils.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-3398 | HIGH | 7.5 | jgraph/drawio | copy | src/main/java/com/mxgraph/online/Utils.java | 064729fec4262f9373d9fdcafda0be47cd18dd50 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public CharSequence getConversationTitle() {
return mConversationTitle;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConversationTitle
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getConversationTitle | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public static File tmpdir() {
return TMPDIR;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tmpdir
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | tmpdir | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAnimatingScreenOff() {
return mAnimatingScreenOff;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAnimatingScreenOff
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | isAnimatingScreenOff | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | public static PdfObject getPdfObjectRelease(PdfObject obj) {
PdfObject obj2 = getPdfObject(obj);
releaseLastXrefPartial(obj);
return obj2;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPdfObjectRelease
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getPdfObjectRelease | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public int getConnectTimeout() {
return connectionTimeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectTimeout
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practic... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getConnectTimeout | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private static Properties loadProperties() {
Properties result = new Properties();
if (Path.hasOsConformConfig()) {
result = loadPropertiesFromFile(Path.osConformConfig());
}
else if (Path.hasLegacyConfig()) {
result = loadPropertiesFromFile(Path.legacyConfig());
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadProperties
File: umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java
Repository: umlet
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | loadProperties | umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 0 |
Analyze the following code function for security vulnerabilities | public boolean isExpandable() {
return expand && canExpand();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isExpandable
File: varexport/src/main/java/com/indeed/util/varexport/Variable.java
Repository: indeedeng/util
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-36634 | MEDIUM | 5.4 | indeedeng/util | isExpandable | varexport/src/main/java/com/indeed/util/varexport/Variable.java | c0952a9db51a880e9544d9fac2a2218a6bfc9c63 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void grantDefaultPermissionsToDefaultDialerApp(String packageName, int userId) {
synchronized (mPackages) {
mDefaultPermissionPolicy.grantDefaultPermissionsToDefaultDialerAppLPr(
packageName, userId);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantDefaultPermissionsToDefaultDialerApp
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | grantDefaultPermissionsToDefaultDialerApp | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void moveTaskBackwards(int task) {
enforceCallingPermission(android.Manifest.permission.REORDER_TASKS,
"moveTaskBackwards()");
synchronized(this) {
if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(),
Binder.getCallingUid(), -1, -... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTaskBackwards
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | moveTaskBackwards | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private static void add(List<String> result, String s, boolean withTag) {
if (withTag == false)
s = s.replaceAll("\\</?\\w+\\>", "");
result.add(s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: add
File: src/net/sourceforge/plantuml/version/PSystemVersion.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | add | src/net/sourceforge/plantuml/version/PSystemVersion.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | public InputStream exportAll(Map<String, Feature> mapOfFeatures, Map < String, Property<?>> mapOfProperties) throws IOException {
// Create output
StringBuilder sb = new StringBuilder(XML_HEADER);
sb.append(exportFeaturesPart(mapOfFeatures));
sb.append(exportPropertiesPart(mapOfProper... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportAll
File: ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java
Repository: ff4j
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | exportAll | ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<UserHandle> getSecondaryUsers(ComponentName who) {
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuthorization(isDefaultDeviceOwner(caller));
return mInjector.binderWithCleanCa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSecondaryUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getSecondaryUsers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected void createNavigationBar() {
mNavigationBarView = NavigationBarFragment.create(mContext, (tag, fragment) -> {
mNavigationBar = (NavigationBarFragment) fragment;
if (mLightBarController != null) {
mNavigationBar.setLightBarController(mLightBarController);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNavigationBar
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | createNavigationBar | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUserControlDisabledPackages(ComponentName who, String callerPackageName,
List<String> packages) {
Objects.requireNonNull(packages, "packages is null");
CallerIdentity caller;
if (isPolicyEngineForFinanceFlagEnabled()) {
caller = getCallerIdent... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserControlDisabledPackages
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setUserControlDisabledPackages | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
try {
return toXML();
} catch (Exception e) {
throw new RuntimeException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toString | base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected DocumentBuilder initialValue() {
try {
final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setExpandEntityReferences(false);
return factory.newDocumentBuilder();
} catch (ParserConfigurationException exc) {
throw new Il... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2019-5312
- Severity: HIGH
- CVSS Score: 7.5
Description: #903 disable DOCTYPE to fix XXE Vulnerability
Function: initialValue
File: weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java
Repository: Wechat-Group/WxJava
Fixed Cod... | [
"CWE-611"
] | CVE-2019-5312 | HIGH | 7.5 | Wechat-Group/WxJava | initialValue | weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java | 8ec61d1328f50e23cd14285a950ca57a088b32b2 | 1 |
Analyze the following code function for security vulnerabilities | public void importEntitlements(Owner owner, Set<Product> products, File[] entitlements)
throws IOException, SyncDataFormatException {
EntitlementImporter importer = new EntitlementImporter(subCurator, csCurator,
sink, i18n);
Map<String, Product> productsById = new HashMap<String, Pr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: importEntitlements
File: src/main/java/org/candlepin/sync/Importer.java
Repository: candlepin
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2012-6119 | LOW | 2.1 | candlepin | importEntitlements | src/main/java/org/candlepin/sync/Importer.java | f4d93230e58b969c506b4c9778e04482a059b08c | 0 |
Analyze the following code function for security vulnerabilities | protected static byte[] toArray(ByteBuffer... payload) {
if (payload.length == 1) {
ByteBuffer buf = payload[0];
if (buf.hasArray()
&& buf.arrayOffset() == 0
&& buf.position() == 0
&& buf.array().length == buf.remaining()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toArray
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | toArray | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | public void sendCommand(String packageName, int pid, int uid, String command, Bundle args,
ResultReceiver cb) {
try {
final String reason = TAG + ":" + command;
mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(),
pid, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendCommand
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | sendCommand | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | public ByteSource asByteSource() {
return source;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asByteSource
File: android/guava/src/com/google/common/io/FileBackedOutputStream.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | asByteSource | android/guava/src/com/google/common/io/FileBackedOutputStream.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.