instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @PUT
@Path("task/{nodeId}/file")
@Operation(summary = "This attaches a Task file onto a given task element", description = "This attaches a Task file onto a given task element")
@ApiResponse(responseCode = "200", description = "The task node metadatas", content = {
@Content(mediaType = "application/json", schema ... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-41242
- Severity: HIGH
- CVSS Score: 7.9
Description: OO-5819: container can only create file in its own path
Function: attachTaskFile
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
Fixed Code:
@PUT
... | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | attachTaskFile | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 1 |
Analyze the following code function for security vulnerabilities | public default void cometLeft(Event event) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cometLeft
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | cometLeft | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | private void initVelocityTracker() {
if (mQsVelocityTracker != null) {
mQsVelocityTracker.recycle();
}
mQsVelocityTracker = VelocityTracker.obtain();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initVelocityTracker
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | initVelocityTracker | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | protected final String encodeUrl(final String url) {
if (url == null) {
return null;
}
try {
return URLEncoder.encode(url, "UTF-8");
} catch (final UnsupportedEncodingException e) {
return url;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encodeUrl
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | encodeUrl | cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | public static ConversationFragment get(Activity activity) {
FragmentManager fragmentManager = activity.getFragmentManager();
Fragment fragment = fragmentManager.findFragmentById(R.id.main_fragment);
if (fragment != null && fragment instanceof ConversationFragment) {
return (Conversat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | get | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public String getValue() {
return value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValue
File: src/gribbit/auth/Cookie.java
Repository: lukehutch/gribbit
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2014-125071 | MEDIUM | 5.2 | lukehutch/gribbit | getValue | src/gribbit/auth/Cookie.java | 620418df247aebda3dd4be1dda10fe229ea505dd | 0 |
Analyze the following code function for security vulnerabilities | private void handleIncomingSubscribe(Presence request) {
// perform Pre-Authenticated Roster Subscription, fallback to manual
try {
String jid = request.getFrom();
PreAuth preauth = (PreAuth)request.getExtension(PreAuth.ELEMENT, PreAuth.NAMESPACE);
String jid_or_token = jid;
if (preauth != null) {
j... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleIncomingSubscribe
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | handleIncomingSubscribe | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isFwdLocked() {
return (installFlags & PackageManager.INSTALL_FORWARD_LOCK) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFwdLocked
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isFwdLocked | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private void destroyRemoteViewsService(final Intent intent, Widget widget) {
final ServiceConnection conn = new ServiceConnection() {
@Override
public void onServiceConnected(ComponentName name, IBinder service) {
final IRemoteViewsFactory cb = IRemoteViewsFactory.Stub.as... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroyRemoteViewsService
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | destroyRemoteViewsService | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | private static void printDashRow(int dateColWidth, int versionColWidth, int nameColWidth, int descColWidth,
int minDescColWidth, int authorsColWidth) {
printCharacter("|-", nameColWidth, "-", true);
if (descColWidth >= minDescColWidth) {
printCharacter("-", descColWidth - author... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: printDashRow
File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java
Repository: ballerina-platform/ballerina-lang
The code follows secure coding practices. | [
"CWE-306"
] | CVE-2021-32700 | MEDIUM | 5.8 | ballerina-platform/ballerina-lang | printDashRow | cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java | 4609ffee1744ecd16aac09303b1783bf0a525816 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getPackageForIntentSender(IIntentSender pendingResult) {
if (!(pendingResult instanceof PendingIntentRecord)) {
return null;
}
try {
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
return res.key.packageName;
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageForIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getPackageForIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isFullScreen() {
return fullScreen || nativePlayer;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFullScreen
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isFullScreen | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void canEdit(Context context, Collection collection) throws SQLException, AuthorizeException {
canEdit(context, collection, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canEdit
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | canEdit | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | private boolean requestTargetProviderPermissionsReviewIfNeededLocked(ProviderInfo cpi,
ProcessRecord r, final int userId) {
if (getPackageManagerInternalLocked().isPermissionsReviewRequired(
cpi.packageName, userId)) {
final boolean callerForeground = r == null || r.setS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestTargetProviderPermissionsReviewIfNeededLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | requestTargetProviderPermissionsReviewIfNeededLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void setRestrictionsProvider(@NonNull ComponentName admin,
@Nullable ComponentName provider) {
throwIfParentInstance("setRestrictionsProvider");
if (mService != null) {
try {
mService.setRestrictionsProvider(admin, provider);
} catch (RemoteExce... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRestrictionsProvider
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setRestrictionsProvider | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean moveTaskToDockedStack(int taskId, int createMode, boolean toTop, boolean animate,
Rect initialBounds, boolean moveHomeStackFront) {
enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "moveTaskToDockedStack()");
synchronized (this) {
long ident = Binder.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTaskToDockedStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | moveTaskToDockedStack | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public int getY() { return 13; } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getY
File: src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2020-36518 | MEDIUM | 5 | FasterXML/jackson-databind | getY | src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java | 8238ab41d0350fb915797c89d46777b4496b74fd | 0 |
Analyze the following code function for security vulnerabilities | private void logTimer(String description, String sql, long startNanoTime, long endNanoTime) {
log.debug(description + " timer: " + sql + " took " + ((endNanoTime - startNanoTime) / 1000000) + " ms");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logTimer
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | logTimer | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public static Element createElement(String tag) {
return document.createElement(tag);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createElement
File: src/edu/stanford/nlp/util/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3869 | MEDIUM | 5 | stanfordnlp/CoreNLP | createElement | src/edu/stanford/nlp/util/XMLUtils.java | 5d83f1e8482ca304db8be726cad89554c88f136a | 0 |
Analyze the following code function for security vulnerabilities | private void pauseCapture() {
int len=captureBuffer.length();
if (len>0) captureBuffer.deleteCharAt(len-1);
capture=false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseCapture
File: src/main/org/hjson/HjsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | pauseCapture | src/main/org/hjson/HjsonParser.java | 00e3b1325cb6c2b80b347dbec9181fd17ce0a599 | 0 |
Analyze the following code function for security vulnerabilities | public String escapeXPath(String value)
{
return "concat('" + value.replace("'", "', \"'\", '") + "', '')";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escapeXPath
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | escapeXPath | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | protected void fillProperties(final Node node, Map<String, Comparable> properties) {
if (properties == null) {
return;
}
for (Node n : childElements(node)) {
if (n.getNodeType() == Node.TEXT_NODE || n.getNodeType() == Node.COMMENT_NODE) {
continue;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillProperties
File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | fillProperties | hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public void setOpen(boolean open) {
this.open = open;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOpen
File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | setOpen | src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | protected String toJSONString(Object object) {
ObjectMapper mapper = new ObjectMapper();
mapper.getJsonFactory().setCharacterEscapes(new OpenmrsCharacterEscapes());
try {
return mapper.writeValueAsString(object);
}
catch (IOException e) {
log.error("Failed to convert object to JSON");
throw new APIEx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toJSONString
File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java
Repository: openmrs/openmrs-core
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23612 | MEDIUM | 5 | openmrs/openmrs-core | toJSONString | web/src/main/java/org/openmrs/web/filter/StartupFilter.java | db8454bf19a092a78d53ee4dba2af628b730a6e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setLaunchContainer(@NonNull ViewGroup launchContainer) {
// No-op, launch container is always the shade.
Log.wtf(TAG, "Someone tried to change the launch container for the "
+ "ActivityLaunchAnimator, which should ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLaunchContainer
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | setLaunchContainer | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private boolean isConflictingWithVersion(XWikiContext context, XWikiDocument originalDoc, XWikiDocument modifiedDoc)
throws XWikiException
{
XWikiRequest request = context.getRequest();
// in case of force save we skip the check.
if (FORCE_SAVE_OVERRIDE.equals(request.getParameter("... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isConflictingWithVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | isConflictingWithVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java | 30c52b01559b8ef5ed1035dac7c34aaf805764d5 | 0 |
Analyze the following code function for security vulnerabilities | private static void requireNonNullElement(Object values, @Nullable Object e) {
if (e == null) {
throw new NullPointerException("values contains null: " + values);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requireNonNullElement
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | requireNonNullElement | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public int getHoldability() throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(), "getHoldability()");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHoldability
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getHoldability | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private static AtomicFile getSavedStateFile(int userId) {
File dir = Environment.getUserSystemDirectory(userId);
File settingsFile = getStateFile(userId);
if (!settingsFile.exists() && userId == UserHandle.USER_OWNER) {
if (!dir.exists()) {
dir.mkdirs();
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSavedStateFile
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | getSavedStateFile | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public void setVersion(Integer version) {
this.version = version;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVersion
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setVersion | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | int getDelegateUid() {
return mTargetUid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDelegateUid
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getDelegateUid | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void setEmailFromAddress(String theEmailFromAddress) {
myModelConfig.setEmailFromAddress(theEmailFromAddress);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEmailFromAddress
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setEmailFromAddress | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void resumeAppSwitches() {
mAmInternal.enforceCallingPermission(STOP_APP_SWITCHES, "resumeAppSwitches");
synchronized (mGlobalLock) {
mAppSwitchesState = APP_SWITCH_ALLOW;
mH.removeMessages(H.RESUME_FG_APP_SWITCH_MSG);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resumeAppSwitches
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | resumeAppSwitches | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public boolean equals(Object o) {
if(o == null) {
return false;
}
NativeFont n = ((NativeFont)o);
if(fileName != null) {
return n.fileName != null && fileName.equals(n.fileName) && n.height == height && n.weight == weight;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | equals | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onEvent(Event event, Object source, Object data)
{
if (event instanceof JobFinishedEvent) {
// An extension just been initialized (after an install or upgrade for example)
onJobFinished((JobFinishedEvent) event);
} else if (event instanceof WikiDelet... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onEvent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-36092 | HIGH | 7.5 | xwiki/xwiki-platform | onEvent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | 71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, XWikiContext context)
throws XWikiException
{
return searchDocuments(wheresql, distinctbylanguage, 0, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: searchDocuments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | searchDocuments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setApplicationHiddenSettingAsUser(String packageName, boolean hidden,
int userId) {
mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USERS, null);
PackageSetting pkgSetting;
final int uid = Binder.getCallingUid();
enforce... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApplicationHiddenSettingAsUser
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setApplicationHiddenSettingAsUser | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | void onTaskListEmptyLocked() {
detachLocked();
deleteActivityContainer(this);
mHandler.obtainMessage(CONTAINER_CALLBACK_TASK_LIST_EMPTY, this).sendToTarget();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTaskListEmptyLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | onTaskListEmptyLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | public String getRealAssetPath(String inode) {
String _inode = inode;
String path = "";
String realPath = Config.getStringProperty("ASSET_REAL_PATH", null);
if (UtilMethods.isSet(realPath) && !realPath.endsWith(java.io.File.separator))
realPath = realPath + java.io.File.sepa... | Vulnerability Classification:
- CWE: CWE-434
- CVE: CVE-2017-11466
- Severity: HIGH
- CVSS Score: 9.0
Description: #12131 fixes jenkins feedback
Function: getRealAssetPath
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
Fixed Code:
public String ... | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | getRealAssetPath | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | 150d85278c9b7738c79a25616c0d2ff690855c51 | 1 |
Analyze the following code function for security vulnerabilities | IAccountAuthenticatorCache getAccountAuthenticatorCache() {
return new AccountAuthenticatorCache(mContext);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccountAuthenticatorCache
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getAccountAuthenticatorCache | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getStatus()
{
return this.response.getStatus();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatus
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-601"
] | CVE-2022-23618 | MEDIUM | 5.8 | xwiki/xwiki-platform | getStatus | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | 5251c02080466bf9fb55288f04a37671108f8096 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void releasePersistableUriPermission(Uri uri, final int modeFlags,
@Nullable String toPackage, int userId) {
final int uid;
if (toPackage != null) {
enforceCallingPermission(android.Manifest.permission.FORCE_PERSISTABLE_URI_PERMISSIONS,
"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: releasePersistableUriPermission
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | releasePersistableUriPermission | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | protected String getTextContent(final Node node) {
if (node != null) {
final String text;
if (domLevel3) {
text = node.getTextContent();
} else {
text = getTextContentOld(node);
}
return text != null ? text.trim() : "";
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTextContent
File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | getTextContent | hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int startActivityIntentSender(IApplicationThread caller, IIntentSender target,
IBinder whitelistToken, Intent fillInIntent, String resolvedType, IBinder resultTo,
String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle bOptions)
throws Transacti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | startActivityIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void setMasterSyncAutomatically(boolean flag, int userId) {
synchronized (mAuthorities) {
Boolean auto = mMasterSyncAutomatically.get(userId);
if (auto != null && auto.equals(flag)) {
return;
}
mMasterSyncAutomatically.put(userId, flag);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMasterSyncAutomatically
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | setMasterSyncAutomatically | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAlphaGlobal() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAlphaGlobal
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isAlphaGlobal | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void executeParamConnectionException(TestContext context) throws Exception {
postgresClientConnectionThrowsException().execute("SELECT 1", new JsonArray(), context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeParamConnectionException
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | executeParamConnectionException | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getServiceProviderNameByClientId(String clientId, String clientType,
String tenantDomain) throws IdentityApplicationManagementException {
String name = null;
// invoking the listeners
Collection<ApplicationMgtListen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServiceProviderNameByClientId
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/c... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getServiceProviderNameByClientId | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | private void removeUriPermissionsForPackageLocked(
String packageName, int userHandle, boolean persistable) {
if (userHandle == UserHandle.USER_ALL && packageName == null) {
throw new IllegalArgumentException("Must narrow by either package or user");
}
boolean persistCha... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUriPermissionsForPackageLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | removeUriPermissionsForPackageLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | protected boolean getBooleanPreference(String name, @BoolRes int res) {
return getPreferences().getBoolean(name, getResources().getBoolean(res));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBooleanPreference
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | getBooleanPreference | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public void setUseLegacySearchBuilder(boolean theUseLegacySearchBuilder) {
myUseLegacySearchBuilder = theUseLegacySearchBuilder;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseLegacySearchBuilder
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setUseLegacySearchBuilder | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | public FrameHandler create(Address addr, String connectionName) throws IOException {
int portNumber = ConnectionFactory.portOrDefault(addr.getPort(), ssl);
Socket socket = null;
try {
socket = createSocket(connectionName);
configurator.configure(socket);
sock... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: src/main/java/com/rabbitmq/client/impl/SocketFrameHandlerFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | create | src/main/java/com/rabbitmq/client/impl/SocketFrameHandlerFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private static String createImageFilename(long createTime, int taskId) {
return String.valueOf(taskId) + ACTIVITY_ICON_SUFFIX + createTime +
IMAGE_EXTENSION;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createImageFilename
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | createImageFilename | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @TestOnly
public void submoduleRemove(String folderName) {
configRemoveSection("submodule." + folderName);
CommandLine gitConfig = gitWd().withArgs("config", "-f", ".gitmodules", "--remove-section", "submodule." + folderName);
runOrBomb(gitConfig);
CommandLine gitAdd = gitWd().withA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: submoduleRemove
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | submoduleRemove | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | public ObjectInputStream createObjectInputStream(Reader xmlReader) throws IOException {
return createObjectInputStream(hierarchicalStreamDriver.createReader(xmlReader));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createObjectInputStream
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | createObjectInputStream | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getTls12Enable() {
return mTls12Enable;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTls12Enable
File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3897 | MEDIUM | 4.3 | android | getTls12Enable | wifi/java/android/net/wifi/WifiEnterpriseConfig.java | 81be4e3aac55305cbb5c9d523cf5c96c66604b39 | 0 |
Analyze the following code function for security vulnerabilities | public Optional<MongoDbSession> forUser(User user) {
return sessions.getOrDefault(user.getId(), Optional.empty());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forUser
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | forUser | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | public SelectPopup getSelectPopupForTest() {
return mSelectPopup;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSelectPopupForTest
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getSelectPopupForTest | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private ProcessExecutor createProcessExecutor(File targetDir, DbProperties dbProperties) {
ConnectionUrl connectionUrlInstance = ConnectionUrl.getConnectionUrlInstance(dbProperties.url(), dbProperties.connectionProperties());
LinkedHashMap<String, String> env = new LinkedHashMap<>();
if (isNotB... | Vulnerability Classification:
- CWE: CWE-532
- CVE: CVE-2023-28630
- Severity: MEDIUM
- CVSS Score: 4.4
Description: Improve error messages on failure to launch backup process
ztexec can include env vars in the error message which we don't want in this case.
Function: createProcessExecutor
File: db-support/db-suppor... | [
"CWE-532"
] | CVE-2023-28630 | MEDIUM | 4.4 | gocd | createProcessExecutor | db-support/db-support-mysql/src/main/java/com/thoughtworks/go/server/database/mysql/MySQLBackupProcessor.java | 6545481e7b36817dd6033bf614585a8db242070d | 1 |
Analyze the following code function for security vulnerabilities | public Statement getStatement() throws SQLException {
checkClosed();
return statement;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatement
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getStatement | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPackageScreenCompatMode(String packageName, int mode) {
mActivityTaskManager.setPackageScreenCompatMode(packageName, mode);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPackageScreenCompatMode
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | setPackageScreenCompatMode | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ResolveInfo resolveService(Intent intent, String resolvedType, int flags, int userId) {
List<ResolveInfo> query = queryIntentServices(intent, resolvedType, flags, userId);
if (!sUserManager.exists(userId)) return null;
if (query != null) {
if (query.size() >= 1) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveService
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | resolveService | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | void reportCurWakefulnessUsageEventLocked() {
reportGlobalUsageEventLocked(mWakefulness == PowerManagerInternal.WAKEFULNESS_AWAKE
? UsageEvents.Event.SCREEN_INTERACTIVE
: UsageEvents.Event.SCREEN_NON_INTERACTIVE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportCurWakefulnessUsageEventLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | reportCurWakefulnessUsageEventLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | int getDisableFlags() {
return mDisableFlags;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDisableFlags
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getDisableFlags | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public void setShellCommand( String shellCommand )
{
this.shellCommand = shellCommand;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShellCommand
File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | setShellCommand | src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | public Document getDocument(String space, String fullname) throws XWikiException
{
XWikiDocument doc = this.xwiki.getDocument(space, fullname, getXWikiContext());
if (this.xwiki.getRightService().hasAccessLevel("view", getXWikiContext().getUser(), doc.getFullName(),
getXWikiContext()) ==... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Intent getHomeIntent() {
synchronized (mGlobalLock) {
return ActivityTaskManagerService.this.getHomeIntent();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHomeIntent
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getHomeIntent | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testPOSTAttachment() throws Exception
{
final String attachmentName = String.format("%s.txt", UUID.randomUUID());
final String content = "ATTACHMENT CONTENT";
String attachmentsUri = buildURIForThisPage(AttachmentsResource.class, attachmentName);
HttpClient ht... | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2023-37277
- Severity: CRITICAL
- CVSS Score: 9.6
Description: XWIKI-20135: Require a CSRF token for some request types in the REST API
* Require a CSRF token in the XWiki-Form-Token header in content types
allowed in simple requests.
* Add integration tests t... | [
"CWE-352"
] | CVE-2023-37277 | CRITICAL | 9.6 | xwiki/xwiki-platform | testPOSTAttachment | xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/AttachmentsResourceIT.java | 4c175405faa0e62437df397811c7526dfc0fbae7 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public int getMetricsCategory() {
return SettingsEnums.CHOOSE_LOCK_PATTERN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetricsCategory
File: src/com/android/settings/password/ChooseLockPattern.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getMetricsCategory | src/com/android/settings/password/ChooseLockPattern.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | public void doOpen() {
try {
SAXParser parser = SAXParserFactory.newInstance().newSAXParser();
FileInputStream input = new FileInputStream(file);
InputHandler xmlhandler = new InputHandler(handler);
parser.parse(input, xmlhandler);
input.close();
} catch (Exception e) {
log.error("Cannot open the ... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-1000548
- Severity: MEDIUM
- CVSS Score: 6.8
Description: #500 secure xml parsing; new cfg secure_xml_processing
Function: doOpen
File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
Repository: umlet
Fixed Code:
public void doOpe... | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | doOpen | umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 1 |
Analyze the following code function for security vulnerabilities | public DefaultHandler2 create(XMLStreamWriter xtw); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | create | src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasNext() {
return (count * (page + 1)) < totalCount;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasNext
File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | hasNext | src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | public static DocumentBuilderFactory getNsAwareDocumentBuilderFactory() throws ParserConfigurationException {
DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
dbf.setNamespaceAware(true);
setFeature(dbf, "http://apache.org/xml/features/disallow-doctype-decl");
return db... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-0265
- Severity: HIGH
- CVSS Score: 7.5
Description: Add helper method to XmlUtil to enable XXE protection in the SAXParserFactory and XMLInputFactory (#20407)
Function: getNsAwareDocumentBuilderFactory
File: hazelcast/src/main/java/com/hazelcast/internal/u... | [
"CWE-611"
] | CVE-2022-0265 | HIGH | 7.5 | hazelcast | getNsAwareDocumentBuilderFactory | hazelcast/src/main/java/com/hazelcast/internal/util/XmlUtil.java | 4d6b666cd0291abd618c3b95cdbb51aa4208e748 | 1 |
Analyze the following code function for security vulnerabilities | public void ok(PrintWriter out, String msg) {
out.print("<div class=\"ok\">" + msg + "</div>");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ok
File: src/main/java/com/openkm/servlet/admin/BaseServlet.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-3628 | LOW | 3.5 | openkm/document-management-system | ok | src/main/java/com/openkm/servlet/admin/BaseServlet.java | c96f2e33adab3bbf550977b1b62acaa54f86fa03 | 0 |
Analyze the following code function for security vulnerabilities | public Builder addResponseFilter(ResponseFilter responseFilter) {
responseFilters.add(responseFilter);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addResponseFilter
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | addResponseFilter | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public AutomaticZenRule getAutomaticZenRule(String id) throws RemoteException {
Preconditions.checkNotNull(id, "Id is null");
enforcePolicyAccess(Binder.getCallingUid(), "getAutomaticZenRule");
return mZenModeHelper.getAutomaticZenRule(id);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAutomaticZenRule
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | getAutomaticZenRule | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | int clientPSKKeyRequested(
String identityHint, byte[] identityBytesOut, byte[] key, PSKCallbacks pskCallbacks) {
PSKKeyManager pskKeyManager = getPSKKeyManager();
if (pskKeyManager == null) {
return 0;
}
String identity = pskCallbacks.chooseClientPSKIdentity(psk... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clientPSKKeyRequested
File: src/main/java/org/conscrypt/SSLParametersImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3840 | HIGH | 10 | android | clientPSKKeyRequested | src/main/java/org/conscrypt/SSLParametersImpl.java | 5af5e93463f4333187e7e35f3bd2b846654aa214 | 0 |
Analyze the following code function for security vulnerabilities | public void dump(PrintWriter pw, String prefix) {
pw.print(prefix); pw.print("mFocusedStack=" + mFocusedStack);
pw.print(" mLastFocusedStack="); pw.println(mLastFocusedStack);
pw.print(prefix); pw.println("mSleepTimeout=" + mSleepTimeout);
pw.print(prefix); pw.println("mCurTaskId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | dump | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | private DocumentReferenceResolver<String> getCurrentMixedDocumentReferenceResolver()
{
if (this.currentMixedDocumentReferenceResolver == null) {
this.currentMixedDocumentReferenceResolver =
Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "currentmixed");
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentMixedDocumentReferenceResolver
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getCurrentMixedDocumentReferenceResolver | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public byte[] getURLContentAsBytes(String surl, XWikiContext context) throws IOException
{
return getURLContentAsBytes(surl, getHttpTimeout(context), getHttpUserAgent(context));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLContentAsBytes
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getURLContentAsBytes | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public <T> void getById(String table, String id, Class<T> clazz,
Handler<AsyncResult<T>> replyHandler) {
getById(table, id, json -> mapper.readValue(json, clazz), replyHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getById
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getById | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final void activityResumed(IBinder token) {
final long origId = Binder.clearCallingIdentity();
synchronized(this) {
ActivityStack stack = ActivityRecord.getStackLocked(token);
if (stack != null) {
stack.activityResumedLocked(token);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityResumed
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | activityResumed | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public void detectEncoding(String[] encodings) throws IOException {
if (fDetected) {
throw new IOException("Should not detect encoding twice.");
}
fDetected = true;
int b1 = read();
if (b1 == -1) {
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: detectEncoding
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | detectEncoding | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | public boolean pollSCMChanges( TaskListener listener ) {
return poll(listener).hasChanges();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pollSCMChanges
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | pollSCMChanges | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void fillPolygon(Object graphics, int[] xPoints, int[] yPoints, int nPoints) {
((AndroidGraphics) graphics).fillPolygon(xPoints, yPoints, nPoints);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillPolygon
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | fillPolygon | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final boolean containsInt(CharSequence name, int value) {
return contains(name, String.valueOf(value));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: containsInt
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | containsInt | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getLowerThanConditionSQL(String column, Object param) {
String paramStr = getParameterSQL(param);
return column + " < " + paramStr;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLowerThanConditionSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getLowerThanConditionSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | protected Map<String, Set<AuthAction>> internalGetPermissionsOnTopic() {
// This operation should be reading from zookeeper and it should be allowed without having admin privileges
validateAdminAccessForTenant(namespaceName.getTenant());
String topicUri = topicName.toString();
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGetPermissionsOnTopic
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGetPermissionsOnTopic | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public static void setScheduled(boolean scheduled) {
CmsVersion.scheduled = scheduled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setScheduled
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-29784 | MEDIUM | 5 | sanluan/PublicCMS | setScheduled | publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java | d8d7626cf51e4968fb384e1637a3c0c9921f33e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addPackageDependency(String packageName) {
synchronized (this) {
int callingPid = Binder.getCallingPid();
if (callingPid == Process.myPid()) {
// Yeah, um, no.
return;
}
ProcessRecord proc;
syn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPackageDependency
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | addPackageDependency | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @JRubyMethod(visibility=Visibility.PRIVATE)
public IRubyObject validate_file(ThreadContext context, IRubyObject file) {
Ruby runtime = context.runtime;
XmlDomParserContext ctx = new XmlDomParserContext(runtime, RubyFixnum.newFixnum(runtime, 1L));
ctx.setInputSourceFile(context, file);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validate_file
File: ext/java/nokogiri/XmlSchema.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | validate_file | ext/java/nokogiri/XmlSchema.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | void addRenderer(Renderer<?> renderer) {
addExtension(renderer);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addRenderer
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addRenderer | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids) {
enforceNotIsolatedCaller("getProcessMemoryInfo");
Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length];
for (int i=pids.length-1; i>=0; i--) {
ProcessRecord proc;
int oomAdj;
sy... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessMemoryInfo
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getProcessMemoryInfo | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static Document stringToDocument(String xml) throws Exception {
try {
DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance();
DocumentBuilder db = dbf.newDocumentBuilder();
Document document = db.parse(new InputSource(new StringReader(xml)));
return document;
}
catch (Exception e) {
... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-16521
- Severity: HIGH
- CVSS Score: 7.5
Description: Configure xml parser to ignore xxe entities
Function: stringToDocument
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
Fi... | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | stringToDocument | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | c095610518d9d0e4fdcb915884ad10f9c5b75eb6 | 1 |
Analyze the following code function for security vulnerabilities | public synchronized void updateBytes(@Positive int columnIndex, byte @Nullable [] x) throws SQLException {
updateValue(columnIndex, x);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBytes
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateBytes | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
@Override
public List<LegacyPermission> getLegacyPermissions() {
return mPermissionManagerServiceImpl.getLegacyPermissions();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLegacyPermissions
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getLegacyPermissions | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public void endElement(final String uri,
final String localName,
final String qname) throws SAXException {
direction = -1;
final Handler handler = getHandler( uri,
localName );
if ( handler == null... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endElement
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | endElement | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void resizeTask(int taskId, Rect bounds, int resizeMode) {
enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "resizeTask()");
long ident = Binder.clearCallingIdentity();
try {
synchronized (this) {
TaskRecord task = mStackSupervisor.anyTaskForIdLoc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resizeTask
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | resizeTask | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public void setValue(String value) {
this.value = value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValue
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setValue | base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent) {
if (Intent.ACTION_USER_ADDED.equals(intent.getAction())) {
// Notify keystore that a new user was added.
final int userHandle = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0);
final Key... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | onReceive | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.