instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@PUT @Path("task/{nodeId}/file") @Operation(summary = "This attaches a Task file onto a given task element", description = "This attaches a Task file onto a given task element") @ApiResponse(responseCode = "200", description = "The task node metadatas", content = { @Content(mediaType = "application/json", schema ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-41242 - Severity: HIGH - CVSS Score: 7.9 Description: OO-5819: container can only create file in its own path Function: attachTaskFile File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT Fixed Code: @PUT ...
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
attachTaskFile
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
1
Analyze the following code function for security vulnerabilities
public default void cometLeft(Event event) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cometLeft File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
cometLeft
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
private void initVelocityTracker() { if (mQsVelocityTracker != null) { mQsVelocityTracker.recycle(); } mQsVelocityTracker = VelocityTracker.obtain(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initVelocityTracker File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
initVelocityTracker
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
protected final String encodeUrl(final String url) { if (url == null) { return null; } try { return URLEncoder.encode(url, "UTF-8"); } catch (final UnsupportedEncodingException e) { return url; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encodeUrl File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
encodeUrl
cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
public static ConversationFragment get(Activity activity) { FragmentManager fragmentManager = activity.getFragmentManager(); Fragment fragment = fragmentManager.findFragmentById(R.id.main_fragment); if (fragment != null && fragment instanceof ConversationFragment) { return (Conversat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
get
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public String getValue() { return value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValue File: src/gribbit/auth/Cookie.java Repository: lukehutch/gribbit The code follows secure coding practices.
[ "CWE-346" ]
CVE-2014-125071
MEDIUM
5.2
lukehutch/gribbit
getValue
src/gribbit/auth/Cookie.java
620418df247aebda3dd4be1dda10fe229ea505dd
0
Analyze the following code function for security vulnerabilities
private void handleIncomingSubscribe(Presence request) { // perform Pre-Authenticated Roster Subscription, fallback to manual try { String jid = request.getFrom(); PreAuth preauth = (PreAuth)request.getExtension(PreAuth.ELEMENT, PreAuth.NAMESPACE); String jid_or_token = jid; if (preauth != null) { j...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleIncomingSubscribe File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
handleIncomingSubscribe
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
protected boolean isFwdLocked() { return (installFlags & PackageManager.INSTALL_FORWARD_LOCK) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFwdLocked File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isFwdLocked
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private void destroyRemoteViewsService(final Intent intent, Widget widget) { final ServiceConnection conn = new ServiceConnection() { @Override public void onServiceConnected(ComponentName name, IBinder service) { final IRemoteViewsFactory cb = IRemoteViewsFactory.Stub.as...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroyRemoteViewsService File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
destroyRemoteViewsService
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
private static void printDashRow(int dateColWidth, int versionColWidth, int nameColWidth, int descColWidth, int minDescColWidth, int authorsColWidth) { printCharacter("|-", nameColWidth, "-", true); if (descColWidth >= minDescColWidth) { printCharacter("-", descColWidth - author...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: printDashRow File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
printDashRow
cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
@Override public String getPackageForIntentSender(IIntentSender pendingResult) { if (!(pendingResult instanceof PendingIntentRecord)) { return null; } try { PendingIntentRecord res = (PendingIntentRecord)pendingResult; return res.key.packageName; }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageForIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageForIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public boolean isFullScreen() { return fullScreen || nativePlayer; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFullScreen File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isFullScreen
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void canEdit(Context context, Collection collection) throws SQLException, AuthorizeException { canEdit(context, collection, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canEdit File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
canEdit
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private boolean requestTargetProviderPermissionsReviewIfNeededLocked(ProviderInfo cpi, ProcessRecord r, final int userId) { if (getPackageManagerInternalLocked().isPermissionsReviewRequired( cpi.packageName, userId)) { final boolean callerForeground = r == null || r.setS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestTargetProviderPermissionsReviewIfNeededLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
requestTargetProviderPermissionsReviewIfNeededLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void setRestrictionsProvider(@NonNull ComponentName admin, @Nullable ComponentName provider) { throwIfParentInstance("setRestrictionsProvider"); if (mService != null) { try { mService.setRestrictionsProvider(admin, provider); } catch (RemoteExce...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRestrictionsProvider File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setRestrictionsProvider
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean moveTaskToDockedStack(int taskId, int createMode, boolean toTop, boolean animate, Rect initialBounds, boolean moveHomeStackFront) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "moveTaskToDockedStack()"); synchronized (this) { long ident = Binder....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTaskToDockedStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
moveTaskToDockedStack
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public int getY() { return 13; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getY File: src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-36518
MEDIUM
5
FasterXML/jackson-databind
getY
src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java
8238ab41d0350fb915797c89d46777b4496b74fd
0
Analyze the following code function for security vulnerabilities
private void logTimer(String description, String sql, long startNanoTime, long endNanoTime) { log.debug(description + " timer: " + sql + " took " + ((endNanoTime - startNanoTime) / 1000000) + " ms"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logTimer File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
logTimer
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public static Element createElement(String tag) { return document.createElement(tag); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createElement File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
createElement
src/edu/stanford/nlp/util/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
private void pauseCapture() { int len=captureBuffer.length(); if (len>0) captureBuffer.deleteCharAt(len-1); capture=false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pauseCapture File: src/main/org/hjson/HjsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
pauseCapture
src/main/org/hjson/HjsonParser.java
00e3b1325cb6c2b80b347dbec9181fd17ce0a599
0
Analyze the following code function for security vulnerabilities
public String escapeXPath(String value) { return "concat('" + value.replace("'", "', \"'\", '") + "', '')"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeXPath File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
escapeXPath
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
protected void fillProperties(final Node node, Map<String, Comparable> properties) { if (properties == null) { return; } for (Node n : childElements(node)) { if (n.getNodeType() == Node.TEXT_NODE || n.getNodeType() == Node.COMMENT_NODE) { continue; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillProperties File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
fillProperties
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void setOpen(boolean open) { this.open = open; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOpen File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
setOpen
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
protected String toJSONString(Object object) { ObjectMapper mapper = new ObjectMapper(); mapper.getJsonFactory().setCharacterEscapes(new OpenmrsCharacterEscapes()); try { return mapper.writeValueAsString(object); } catch (IOException e) { log.error("Failed to convert object to JSON"); throw new APIEx...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toJSONString File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java Repository: openmrs/openmrs-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23612
MEDIUM
5
openmrs/openmrs-core
toJSONString
web/src/main/java/org/openmrs/web/filter/StartupFilter.java
db8454bf19a092a78d53ee4dba2af628b730a6e7
0
Analyze the following code function for security vulnerabilities
@Override public void setLaunchContainer(@NonNull ViewGroup launchContainer) { // No-op, launch container is always the shade. Log.wtf(TAG, "Someone tried to change the launch container for the " + "ActivityLaunchAnimator, which should ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLaunchContainer File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
setLaunchContainer
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
private boolean isConflictingWithVersion(XWikiContext context, XWikiDocument originalDoc, XWikiDocument modifiedDoc) throws XWikiException { XWikiRequest request = context.getRequest(); // in case of force save we skip the check. if (FORCE_SAVE_OVERRIDE.equals(request.getParameter("...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConflictingWithVersion File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
isConflictingWithVersion
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
30c52b01559b8ef5ed1035dac7c34aaf805764d5
0
Analyze the following code function for security vulnerabilities
private static void requireNonNullElement(Object values, @Nullable Object e) { if (e == null) { throw new NullPointerException("values contains null: " + values); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requireNonNullElement File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
requireNonNullElement
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
public int getHoldability() throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "getHoldability()"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHoldability File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getHoldability
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private static AtomicFile getSavedStateFile(int userId) { File dir = Environment.getUserSystemDirectory(userId); File settingsFile = getStateFile(userId); if (!settingsFile.exists() && userId == UserHandle.USER_OWNER) { if (!dir.exists()) { dir.mkdirs(); }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSavedStateFile File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getSavedStateFile
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public void setVersion(Integer version) { this.version = version; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVersion File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setVersion
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
int getDelegateUid() { return mTargetUid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDelegateUid File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getDelegateUid
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void setEmailFromAddress(String theEmailFromAddress) { myModelConfig.setEmailFromAddress(theEmailFromAddress); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEmailFromAddress File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setEmailFromAddress
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Override public void resumeAppSwitches() { mAmInternal.enforceCallingPermission(STOP_APP_SWITCHES, "resumeAppSwitches"); synchronized (mGlobalLock) { mAppSwitchesState = APP_SWITCH_ALLOW; mH.removeMessages(H.RESUME_FG_APP_SWITCH_MSG); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resumeAppSwitches File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
resumeAppSwitches
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public boolean equals(Object o) { if(o == null) { return false; } NativeFont n = ((NativeFont)o); if(fileName != null) { return n.fileName != null && fileName.equals(n.fileName) && n.height == height && n.weight == weight; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
equals
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void onEvent(Event event, Object source, Object data) { if (event instanceof JobFinishedEvent) { // An extension just been initialized (after an install or upgrade for example) onJobFinished((JobFinishedEvent) event); } else if (event instanceof WikiDelet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEvent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
onEvent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
@Override public List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, XWikiContext context) throws XWikiException { return searchDocuments(wheresql, distinctbylanguage, 0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
searchDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public boolean setApplicationHiddenSettingAsUser(String packageName, boolean hidden, int userId) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USERS, null); PackageSetting pkgSetting; final int uid = Binder.getCallingUid(); enforce...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApplicationHiddenSettingAsUser File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setApplicationHiddenSettingAsUser
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
void onTaskListEmptyLocked() { detachLocked(); deleteActivityContainer(this); mHandler.obtainMessage(CONTAINER_CALLBACK_TASK_LIST_EMPTY, this).sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTaskListEmptyLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
onTaskListEmptyLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public String getRealAssetPath(String inode) { String _inode = inode; String path = ""; String realPath = Config.getStringProperty("ASSET_REAL_PATH", null); if (UtilMethods.isSet(realPath) && !realPath.endsWith(java.io.File.separator)) realPath = realPath + java.io.File.sepa...
Vulnerability Classification: - CWE: CWE-434 - CVE: CVE-2017-11466 - Severity: HIGH - CVSS Score: 9.0 Description: #12131 fixes jenkins feedback Function: getRealAssetPath File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core Fixed Code: public String ...
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
getRealAssetPath
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
150d85278c9b7738c79a25616c0d2ff690855c51
1
Analyze the following code function for security vulnerabilities
IAccountAuthenticatorCache getAccountAuthenticatorCache() { return new AccountAuthenticatorCache(mContext); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountAuthenticatorCache File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAccountAuthenticatorCache
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Override public int getStatus() { return this.response.getStatus(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatus File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-601" ]
CVE-2022-23618
MEDIUM
5.8
xwiki/xwiki-platform
getStatus
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
5251c02080466bf9fb55288f04a37671108f8096
0
Analyze the following code function for security vulnerabilities
@Override public void releasePersistableUriPermission(Uri uri, final int modeFlags, @Nullable String toPackage, int userId) { final int uid; if (toPackage != null) { enforceCallingPermission(android.Manifest.permission.FORCE_PERSISTABLE_URI_PERMISSIONS, "...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: releasePersistableUriPermission File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
releasePersistableUriPermission
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
protected String getTextContent(final Node node) { if (node != null) { final String text; if (domLevel3) { text = node.getTextContent(); } else { text = getTextContentOld(node); } return text != null ? text.trim() : ""; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextContent File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
getTextContent
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public int startActivityIntentSender(IApplicationThread caller, IIntentSender target, IBinder whitelistToken, Intent fillInIntent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle bOptions) throws Transacti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startActivityIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void setMasterSyncAutomatically(boolean flag, int userId) { synchronized (mAuthorities) { Boolean auto = mMasterSyncAutomatically.get(userId); if (auto != null && auto.equals(flag)) { return; } mMasterSyncAutomatically.put(userId, flag); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMasterSyncAutomatically File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
setMasterSyncAutomatically
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAlphaGlobal() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAlphaGlobal File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isAlphaGlobal
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Test public void executeParamConnectionException(TestContext context) throws Exception { postgresClientConnectionThrowsException().execute("SELECT 1", new JsonArray(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeParamConnectionException File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
executeParamConnectionException
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public String getServiceProviderNameByClientId(String clientId, String clientType, String tenantDomain) throws IdentityApplicationManagementException { String name = null; // invoking the listeners Collection<ApplicationMgtListen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServiceProviderNameByClientId File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/c...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
getServiceProviderNameByClientId
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
private void removeUriPermissionsForPackageLocked( String packageName, int userHandle, boolean persistable) { if (userHandle == UserHandle.USER_ALL && packageName == null) { throw new IllegalArgumentException("Must narrow by either package or user"); } boolean persistCha...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUriPermissionsForPackageLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
removeUriPermissionsForPackageLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected boolean getBooleanPreference(String name, @BoolRes int res) { return getPreferences().getBoolean(name, getResources().getBoolean(res)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBooleanPreference File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
getBooleanPreference
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public void setUseLegacySearchBuilder(boolean theUseLegacySearchBuilder) { myUseLegacySearchBuilder = theUseLegacySearchBuilder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseLegacySearchBuilder File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setUseLegacySearchBuilder
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public FrameHandler create(Address addr, String connectionName) throws IOException { int portNumber = ConnectionFactory.portOrDefault(addr.getPort(), ssl); Socket socket = null; try { socket = createSocket(connectionName); configurator.configure(socket); sock...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/main/java/com/rabbitmq/client/impl/SocketFrameHandlerFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
create
src/main/java/com/rabbitmq/client/impl/SocketFrameHandlerFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
private static String createImageFilename(long createTime, int taskId) { return String.valueOf(taskId) + ACTIVITY_ICON_SUFFIX + createTime + IMAGE_EXTENSION; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createImageFilename File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
createImageFilename
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@TestOnly public void submoduleRemove(String folderName) { configRemoveSection("submodule." + folderName); CommandLine gitConfig = gitWd().withArgs("config", "-f", ".gitmodules", "--remove-section", "submodule." + folderName); runOrBomb(gitConfig); CommandLine gitAdd = gitWd().withA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: submoduleRemove File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
submoduleRemove
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public ObjectInputStream createObjectInputStream(Reader xmlReader) throws IOException { return createObjectInputStream(hierarchicalStreamDriver.createReader(xmlReader)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createObjectInputStream File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
createObjectInputStream
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
public boolean getTls12Enable() { return mTls12Enable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTls12Enable File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
getTls12Enable
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
public Optional<MongoDbSession> forUser(User user) { return sessions.getOrDefault(user.getId(), Optional.empty()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forUser File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
forUser
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
public SelectPopup getSelectPopupForTest() { return mSelectPopup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSelectPopupForTest File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getSelectPopupForTest
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private ProcessExecutor createProcessExecutor(File targetDir, DbProperties dbProperties) { ConnectionUrl connectionUrlInstance = ConnectionUrl.getConnectionUrlInstance(dbProperties.url(), dbProperties.connectionProperties()); LinkedHashMap<String, String> env = new LinkedHashMap<>(); if (isNotB...
Vulnerability Classification: - CWE: CWE-532 - CVE: CVE-2023-28630 - Severity: MEDIUM - CVSS Score: 4.4 Description: Improve error messages on failure to launch backup process ztexec can include env vars in the error message which we don't want in this case. Function: createProcessExecutor File: db-support/db-suppor...
[ "CWE-532" ]
CVE-2023-28630
MEDIUM
4.4
gocd
createProcessExecutor
db-support/db-support-mysql/src/main/java/com/thoughtworks/go/server/database/mysql/MySQLBackupProcessor.java
6545481e7b36817dd6033bf614585a8db242070d
1
Analyze the following code function for security vulnerabilities
public Statement getStatement() throws SQLException { checkClosed(); return statement; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatement File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getStatement
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public void setPackageScreenCompatMode(String packageName, int mode) { mActivityTaskManager.setPackageScreenCompatMode(packageName, mode); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageScreenCompatMode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setPackageScreenCompatMode
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public ResolveInfo resolveService(Intent intent, String resolvedType, int flags, int userId) { List<ResolveInfo> query = queryIntentServices(intent, resolvedType, flags, userId); if (!sUserManager.exists(userId)) return null; if (query != null) { if (query.size() >= 1) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveService File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
resolveService
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
void reportCurWakefulnessUsageEventLocked() { reportGlobalUsageEventLocked(mWakefulness == PowerManagerInternal.WAKEFULNESS_AWAKE ? UsageEvents.Event.SCREEN_INTERACTIVE : UsageEvents.Event.SCREEN_NON_INTERACTIVE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportCurWakefulnessUsageEventLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
reportCurWakefulnessUsageEventLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
int getDisableFlags() { return mDisableFlags; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisableFlags File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getDisableFlags
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void setShellCommand( String shellCommand ) { this.shellCommand = shellCommand; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setShellCommand File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
setShellCommand
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
public Document getDocument(String space, String fullname) throws XWikiException { XWikiDocument doc = this.xwiki.getDocument(space, fullname, getXWikiContext()); if (this.xwiki.getRightService().hasAccessLevel("view", getXWikiContext().getUser(), doc.getFullName(), getXWikiContext()) ==...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public Intent getHomeIntent() { synchronized (mGlobalLock) { return ActivityTaskManagerService.this.getHomeIntent(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHomeIntent File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getHomeIntent
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Test public void testPOSTAttachment() throws Exception { final String attachmentName = String.format("%s.txt", UUID.randomUUID()); final String content = "ATTACHMENT CONTENT"; String attachmentsUri = buildURIForThisPage(AttachmentsResource.class, attachmentName); HttpClient ht...
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2023-37277 - Severity: CRITICAL - CVSS Score: 9.6 Description: XWIKI-20135: Require a CSRF token for some request types in the REST API * Require a CSRF token in the XWiki-Form-Token header in content types allowed in simple requests. * Add integration tests t...
[ "CWE-352" ]
CVE-2023-37277
CRITICAL
9.6
xwiki/xwiki-platform
testPOSTAttachment
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/AttachmentsResourceIT.java
4c175405faa0e62437df397811c7526dfc0fbae7
1
Analyze the following code function for security vulnerabilities
@Override public int getMetricsCategory() { return SettingsEnums.CHOOSE_LOCK_PATTERN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricsCategory File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getMetricsCategory
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public void doOpen() { try { SAXParser parser = SAXParserFactory.newInstance().newSAXParser(); FileInputStream input = new FileInputStream(file); InputHandler xmlhandler = new InputHandler(handler); parser.parse(input, xmlhandler); input.close(); } catch (Exception e) { log.error("Cannot open the ...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000548 - Severity: MEDIUM - CVSS Score: 6.8 Description: #500 secure xml parsing; new cfg secure_xml_processing Function: doOpen File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java Repository: umlet Fixed Code: public void doOpe...
[ "CWE-611" ]
CVE-2018-1000548
MEDIUM
6.8
umlet
doOpen
umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
e1c4cc6ae692cc8d1c367460dbf79343e996f9bd
1
Analyze the following code function for security vulnerabilities
public DefaultHandler2 create(XMLStreamWriter xtw);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
create
src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
public boolean hasNext() { return (count * (page + 1)) < totalCount; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasNext File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
hasNext
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
public static DocumentBuilderFactory getNsAwareDocumentBuilderFactory() throws ParserConfigurationException { DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance(); dbf.setNamespaceAware(true); setFeature(dbf, "http://apache.org/xml/features/disallow-doctype-decl"); return db...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-0265 - Severity: HIGH - CVSS Score: 7.5 Description: Add helper method to XmlUtil to enable XXE protection in the SAXParserFactory and XMLInputFactory (#20407) Function: getNsAwareDocumentBuilderFactory File: hazelcast/src/main/java/com/hazelcast/internal/u...
[ "CWE-611" ]
CVE-2022-0265
HIGH
7.5
hazelcast
getNsAwareDocumentBuilderFactory
hazelcast/src/main/java/com/hazelcast/internal/util/XmlUtil.java
4d6b666cd0291abd618c3b95cdbb51aa4208e748
1
Analyze the following code function for security vulnerabilities
public void ok(PrintWriter out, String msg) { out.print("<div class=\"ok\">" + msg + "</div>"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ok File: src/main/java/com/openkm/servlet/admin/BaseServlet.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-3628
LOW
3.5
openkm/document-management-system
ok
src/main/java/com/openkm/servlet/admin/BaseServlet.java
c96f2e33adab3bbf550977b1b62acaa54f86fa03
0
Analyze the following code function for security vulnerabilities
public Builder addResponseFilter(ResponseFilter responseFilter) { responseFilters.add(responseFilter); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addResponseFilter File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
addResponseFilter
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@Override public AutomaticZenRule getAutomaticZenRule(String id) throws RemoteException { Preconditions.checkNotNull(id, "Id is null"); enforcePolicyAccess(Binder.getCallingUid(), "getAutomaticZenRule"); return mZenModeHelper.getAutomaticZenRule(id); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAutomaticZenRule File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
getAutomaticZenRule
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
int clientPSKKeyRequested( String identityHint, byte[] identityBytesOut, byte[] key, PSKCallbacks pskCallbacks) { PSKKeyManager pskKeyManager = getPSKKeyManager(); if (pskKeyManager == null) { return 0; } String identity = pskCallbacks.chooseClientPSKIdentity(psk...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clientPSKKeyRequested File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
clientPSKKeyRequested
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
public void dump(PrintWriter pw, String prefix) { pw.print(prefix); pw.print("mFocusedStack=" + mFocusedStack); pw.print(" mLastFocusedStack="); pw.println(mLastFocusedStack); pw.print(prefix); pw.println("mSleepTimeout=" + mSleepTimeout); pw.print(prefix); pw.println("mCurTaskId...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
dump
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
private DocumentReferenceResolver<String> getCurrentMixedDocumentReferenceResolver() { if (this.currentMixedDocumentReferenceResolver == null) { this.currentMixedDocumentReferenceResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "currentmixed"); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentMixedDocumentReferenceResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getCurrentMixedDocumentReferenceResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public byte[] getURLContentAsBytes(String surl, XWikiContext context) throws IOException { return getURLContentAsBytes(surl, getHttpTimeout(context), getHttpUserAgent(context)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURLContentAsBytes File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getURLContentAsBytes
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public <T> void getById(String table, String id, Class<T> clazz, Handler<AsyncResult<T>> replyHandler) { getById(table, id, json -> mapper.readValue(json, clazz), replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getById File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getById
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public final void activityResumed(IBinder token) { final long origId = Binder.clearCallingIdentity(); synchronized(this) { ActivityStack stack = ActivityRecord.getStackLocked(token); if (stack != null) { stack.activityResumedLocked(token); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityResumed File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
activityResumed
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void detectEncoding(String[] encodings) throws IOException { if (fDetected) { throw new IOException("Should not detect encoding twice."); } fDetected = true; int b1 = read(); if (b1 == -1) { return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detectEncoding File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
detectEncoding
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
public boolean pollSCMChanges( TaskListener listener ) { return poll(listener).hasChanges(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pollSCMChanges File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
pollSCMChanges
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public void fillPolygon(Object graphics, int[] xPoints, int[] yPoints, int nPoints) { ((AndroidGraphics) graphics).fillPolygon(xPoints, yPoints, nPoints); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillPolygon File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
fillPolygon
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public final boolean containsInt(CharSequence name, int value) { return contains(name, String.valueOf(value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsInt File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
containsInt
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public String getLowerThanConditionSQL(String column, Object param) { String paramStr = getParameterSQL(param); return column + " < " + paramStr; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLowerThanConditionSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getLowerThanConditionSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
protected Map<String, Set<AuthAction>> internalGetPermissionsOnTopic() { // This operation should be reading from zookeeper and it should be allowed without having admin privileges validateAdminAccessForTenant(namespaceName.getTenant()); String topicUri = topicName.toString(); try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalGetPermissionsOnTopic File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalGetPermissionsOnTopic
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public static void setScheduled(boolean scheduled) { CmsVersion.scheduled = scheduled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setScheduled File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-29784
MEDIUM
5
sanluan/PublicCMS
setScheduled
publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/constants/CmsVersion.java
d8d7626cf51e4968fb384e1637a3c0c9921f33e9
0
Analyze the following code function for security vulnerabilities
@Override public void addPackageDependency(String packageName) { synchronized (this) { int callingPid = Binder.getCallingPid(); if (callingPid == Process.myPid()) { // Yeah, um, no. return; } ProcessRecord proc; syn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPackageDependency File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
addPackageDependency
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@JRubyMethod(visibility=Visibility.PRIVATE) public IRubyObject validate_file(ThreadContext context, IRubyObject file) { Ruby runtime = context.runtime; XmlDomParserContext ctx = new XmlDomParserContext(runtime, RubyFixnum.newFixnum(runtime, 1L)); ctx.setInputSourceFile(context, file); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validate_file File: ext/java/nokogiri/XmlSchema.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-611" ]
CVE-2020-26247
MEDIUM
4
sparklemotion/nokogiri
validate_file
ext/java/nokogiri/XmlSchema.java
9c87439d9afa14a365ff13e73adc809cb2c3d97b
0
Analyze the following code function for security vulnerabilities
void addRenderer(Renderer<?> renderer) { addExtension(renderer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addRenderer File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addRenderer
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Override public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids) { enforceNotIsolatedCaller("getProcessMemoryInfo"); Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length]; for (int i=pids.length-1; i>=0; i--) { ProcessRecord proc; int oomAdj; sy...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessMemoryInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getProcessMemoryInfo
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static Document stringToDocument(String xml) throws Exception { try { DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance(); DocumentBuilder db = dbf.newDocumentBuilder(); Document document = db.parse(new InputSource(new StringReader(xml))); return document; } catch (Exception e) { ...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-16521 - Severity: HIGH - CVSS Score: 7.5 Description: Configure xml parser to ignore xxe entities Function: stringToDocument File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry Fi...
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
stringToDocument
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
c095610518d9d0e4fdcb915884ad10f9c5b75eb6
1
Analyze the following code function for security vulnerabilities
public synchronized void updateBytes(@Positive int columnIndex, byte @Nullable [] x) throws SQLException { updateValue(columnIndex, x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBytes File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBytes
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@NonNull @Override public List<LegacyPermission> getLegacyPermissions() { return mPermissionManagerServiceImpl.getLegacyPermissions(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLegacyPermissions File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getLegacyPermissions
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public void endElement(final String uri, final String localName, final String qname) throws SAXException { direction = -1; final Handler handler = getHandler( uri, localName ); if ( handler == null...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endElement File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java Repository: apache/incubator-kie-drools The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-8125
HIGH
7.5
apache/incubator-kie-drools
endElement
drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3
0
Analyze the following code function for security vulnerabilities
@Override public void resizeTask(int taskId, Rect bounds, int resizeMode) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "resizeTask()"); long ident = Binder.clearCallingIdentity(); try { synchronized (this) { TaskRecord task = mStackSupervisor.anyTaskForIdLoc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resizeTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
resizeTask
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setValue(String value) { this.value = value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setValue File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setValue
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent) { if (Intent.ACTION_USER_ADDED.equals(intent.getAction())) { // Notify keystore that a new user was added. final int userHandle = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 0); final Key...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
onReceive
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0