instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public XWikiDocument duplicate(DocumentReference newDocumentReference)
{
return cloneInternal(newDocumentReference, false, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: duplicate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | duplicate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void startBackgroundFetchService() {
LocalNotification n = new LocalNotification();
n.setId(BACKGROUND_FETCH_NOTIFICATION_ID);
cancelLocalNotification(BACKGROUND_FETCH_NOTIFICATION_ID);
// We schedule a local notification
// First callback will be at the repeat interval
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startBackgroundFetchService
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | startBackgroundFetchService | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public ProfileOutput getProfileOutput(String id) {
for (ProfileOutput output: outputs) {
if (output.getId().equals(id)) return output;
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileOutput
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getProfileOutput | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static boolean defaultAllowPoolingConnection() {
return getBoolean(ASYNC_CLIENT + "allowPoolingConnection", true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultAllowPoolingConnection
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultAllowPoolingConnection | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | private boolean replaceNamedDestination(PdfObject obj, HashMap names) {
obj = getPdfObject(obj);
int objIdx = lastXrefPartial;
releaseLastXrefPartial();
if (obj != null && obj.isDictionary()) {
PdfObject ob2 = getPdfObjectRelease(((PdfDictionary)obj).get(PdfName.DEST));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replaceNamedDestination
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | replaceNamedDestination | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | static float fixScale(float scale) {
if (scale < 0) scale = 0;
else if (scale > 20) scale = 20;
return Math.abs(scale);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fixScale
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | fixScale | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getActions() {
return actions;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActions
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getActions | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | protected String deCompress(byte[] zipBytes) {
if (zipBytes == null || zipBytes.length == 0)
return null;
GZIPInputStream gzip = null;
ByteArrayInputStream in = null;
ByteArrayOutputStream baos = null;
try {
in = new ByteArrayInputStream(zipBytes);
gzip = new GZIPInputStream(in, 16... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deCompress
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | deCompress | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | private static long getApplicationAccessTokenValidityPeriodInSeconds() {
return OAuthServerConfiguration.getInstance().getApplicationAccessTokenValidityPeriodInSeconds();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationAccessTokenValidityPeriodInSeconds
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The c... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | getApplicationAccessTokenValidityPeriodInSeconds | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | protected <T extends SQLDataSetTestBase> T setUp(T test) throws Exception {
test.testSettings = testSettings;
test.conn = conn;
return test;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUp
File: dashbuilder-backend/dashbuilder-dataset-sql/src/test/java/org/dashbuilder/dataprovider/sql/SQLTestSuite.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | setUp | dashbuilder-backend/dashbuilder-dataset-sql/src/test/java/org/dashbuilder/dataprovider/sql/SQLTestSuite.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTopActivityImmersive() {
enforceNotIsolatedCaller("startActivity");
synchronized (this) {
ActivityRecord r = getFocusedStack().topRunningActivityLocked(null);
return (r != null) ? r.immersive : false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTopActivityImmersive
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | isTopActivityImmersive | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private static String convertImageUriToFilePath(Uri imageUri, Context activity) {
Cursor cursor = null;
String[] proj = {MediaStore.Images.Media.DATA};
cursor = activity.getContentResolver().query(imageUri, proj, null, null, null);
int column_index = cursor.getColumnIndexOrThrow(MediaSto... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertImageUriToFilePath
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | convertImageUriToFilePath | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setForcedDisplayDensity(int displayId, int density) {
if (mContext.checkCallingOrSelfPermission(
android.Manifest.permission.WRITE_SECURE_SETTINGS) !=
PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Must hold permission " +
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setForcedDisplayDensity
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setForcedDisplayDensity | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
ActiveAdmin getActiveAdminOrCheckPermissionsForCallerLocked(
@Nullable ComponentName who,
int reqPolicy,
boolean parent,
Set<String> permissions) throws SecurityException {
ensureLocked();
if (parent) {
Preconditions.checkCallingU... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActiveAdminOrCheckPermissionsForCallerLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getActiveAdminOrCheckPermissionsForCallerLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public boolean isJsonMime(String mime) {
String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$";
return mime != null && (mime.matches(jsonMime) || mime.equals("*/*"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isJsonMime
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | isJsonMime | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private UploadPackageResultDto buildUploadPackageResultDto(PluginPackages pluginPackageEntity) {
UploadPackageResultDto result = new UploadPackageResultDto();
result.setId(pluginPackageEntity.getId());
result.setName(pluginPackageEntity.getName());
result.setStatus(pluginPackageEntity.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildUploadPackageResultDto
File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
Repository: WeBankPartners/wecube-platform
The code follows secure coding pr... | [
"CWE-22"
] | CVE-2021-45746 | MEDIUM | 5 | WeBankPartners/wecube-platform | buildUploadPackageResultDto | platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java | 1164dae43c505f8a0233cc049b2689d6ca6d0c37 | 0 |
Analyze the following code function for security vulnerabilities | private void destroySurfaces(boolean cleanupOnResume) {
boolean destroyedSomething = false;
// Copying to a different list as multiple children can be removed.
final ArrayList<WindowState> children = new ArrayList<>(mChildren);
for (int i = children.size() - 1; i >= 0; i--) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroySurfaces
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | destroySurfaces | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long getLastBugReportRequestTime() {
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isDefaultDeviceOwner(caller) || canManageUsers(caller));
return getUserData(UserHandle.USER_SYSTEM).mLastBugReportRequestTime;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastBugReportRequestTime
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getLastBugReportRequestTime | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected IssuesWithBLOBs insertIssues(IssuesWithBLOBs issues) {
if (StringUtils.isBlank(issues.getId())) {
issues.setId(UUID.randomUUID().toString());
}
issues.setCreateTime(System.currentTimeMillis());
issues.setUpdateTime(System.currentTimeMillis());
issues.setNum(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertIssues
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | insertIssues | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
String chooseLockAction = getActivity().getIntent().getAction();
mFingerprintManager = Utils.getFingerprintManagerOrNull(getActivity());
mDPM = (DevicePolicyManager) g... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2018-9501
- Severity: HIGH
- CVSS Score: 7.2
Description: Disable changing lock when device is not provisioned.
When the device is not yet provisioned and settings is launched:
- disable the entry point for changing device lock
- remove the search panel from s... | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | onCreate | src/com/android/settings/password/ChooseLockGeneric.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 1 |
Analyze the following code function for security vulnerabilities | @Override
protected void saveProject(Project project) throws IOException {
ProjectUtilities.save(project);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveProject
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | saveProject | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | public void copyToClipboard(final Object obj) {
if (getActivity() == null) {
return;
}
getActivity().runOnUiThread(new Runnable() {
@Override
public void run() {
int sdk = android.os.Build.VERSION.SDK_INT;
if (sdk < 11) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyToClipboard
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | copyToClipboard | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void setTrafficListener(TrafficListener trafficListener) {
this.trafficListener = trafficListener;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTrafficListener
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | setTrafficListener | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Deprecated
public String getRealLanguage()
{
String lang = getLanguage();
if (lang.equals("")) {
return getDefaultLanguage();
} else {
return lang;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRealLanguage
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRealLanguage | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public boolean readBool() throws TException {
return (readByte() == 1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readBool
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readBool | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder defaultHostname(String defaultHostname) {
defaultVirtualHostBuilder.defaultHostname(defaultHostname);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultHostname
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | defaultHostname | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M1")
public BaseObject getObject(String className, int nb)
{
return getXObject(resolveClassReference(className), nb);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public void onAllChildrenAddedToPage(final boolean postponed) {
// Empty by default.
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAllChildrenAddedToPage
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | onAllChildrenAddedToPage | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | public void renameUser(final String oldName, final String newName) throws Exception {
update();
m_writeLock.lock();
try {
// Get the old data
if (m_users.containsKey(oldName)) {
final User data = m_users.get(oldName);
if (data == ... | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2021-25931
- Severity: MEDIUM
- CVSS Score: 6.8
Description: NMS-13124: Fixed user deletion by renaming bug and CSRF privilege escalation issue
Function: renameUser
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS... | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | renameUser | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 1 |
Analyze the following code function for security vulnerabilities | public void setFooterVisible(boolean footerVisible) {
getFooter().setVisible(footerVisible);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFooterVisible
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setFooterVisible | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | void insertPage(int pageNum, PRIndirectReference ref) {
--pageNum;
if (refsn != null) {
if (pageNum >= refsn.size())
refsn.add(ref);
else
refsn.add(pageNum, ref);
}
else {
++sizep;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertPage
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | insertPage | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public String toString(int indentFactor) throws JSONException {
return toString(indentFactor, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | toString | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public void setHeader(final String iHeader) {
headers = iHeader;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHeader
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | setHeader | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void formInnerEvent(UserRequest ureq, FormItem source, FormEvent event) {
if(source == addEmailLink) {
doAddEmail(ureq);
} else if(source instanceof FormLink && source.getUserObject() instanceof IdentityWrapper) {
if(source.getName().startsWith("rm-")) {
for(Iterator<IdentityWrapper> ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: formInnerEvent
File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | formInnerEvent | src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | protected <K, V> NearCacheService<K, V> createNearCacheService(NearCacheConfiguration cfg) {
return NearCacheService.create(cfg, listenerNotifier);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNearCacheService
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | createNearCacheService | client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java | efc44b7b0a5dd4f44773808840dd9785cabcf21c | 0 |
Analyze the following code function for security vulnerabilities | private List<String> getAllRecordingIds(String path, String[] format) {
List<String> ids = new ArrayList<>();
for (String aFormat : format) {
List<File> recordings = getDirectories(path + File.separatorChar + aFormat);
for (File recording : recordings) {
if (!ids... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllRecordingIds
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | getAllRecordingIds | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void initXWiki(XWikiConfig config, XWikiContext context, XWikiEngineContext engineContext, boolean noupdate)
throws XWikiException
{
getProgress().pushLevelProgress(4, this);
try {
getProgress().startStep(this);
setDatabase(context.getMainXWik... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initXWiki
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | initXWiki | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Class<? extends XWikiForm> getFormClass()
{
return EditForm.class;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFormClass
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/EditAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2023-46242 | HIGH | 8.8 | xwiki/xwiki-platform | getFormClass | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/EditAction.java | cf8eb861998ea423c3645d2e5e974420b0e882be | 0 |
Analyze the following code function for security vulnerabilities | public static double[] uncompressDoubleArray(byte[] input)
throws IOException
{
return uncompressDoubleArray(input, 0, input.length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uncompressDoubleArray
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | uncompressDoubleArray | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isCheckClassDefErrors() {
return checkClassDefErrors;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCheckClassDefErrors
File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isCheckClassDefErrors | hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | protected String processAuthResponse(String authRes, boolean jsonResponse)
{
return "";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processAuthResponse
File: src/main/java/com/mxgraph/online/AbsAuthServlet.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-601",
"CWE-918"
] | CVE-2022-1767 | MEDIUM | 5 | jgraph/drawio | processAuthResponse | src/main/java/com/mxgraph/online/AbsAuthServlet.java | c63f3a04450f30798df47f9badbc74eb8a69fbdf | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isAccessible(DocumentReference documentReference, XWikiContext context)
{
if (!Utils.getComponent(ContextualAuthorizationManager.class).hasAccess(Right.VIEW, documentReference)) {
LOGGER.debug("[{}] The current user [{}] does not have 'view' rights on the Skin Extension documen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAccessible
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
The code follows ... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | isAccessible | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | private boolean deleteInstalledPackageLI(PackageSetting ps,
boolean deleteCodeAndResources, int flags,
int[] allUserHandles, boolean[] perUserInstalled,
PackageRemovedInfo outInfo, boolean writeSettings) {
if (outInfo != null) {
outInfo.uid = ps.appId;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteInstalledPackageLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | deleteInstalledPackageLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void saveDocument(XWikiDocument doc, String comment, XWikiContext context) throws XWikiException
{
saveDocument(doc, comment, false, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | saveDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public FilePath[] getModuleRoots(FilePath workspace, AbstractBuild build) {
if (build == null) {
return getModuleRoots(workspace);
}
// TODO: can't I get the build listener here?
TaskListener listener = new LogTaskListener(LOGGER, WARNING);
fina... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getModuleRoots
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | getModuleRoots | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | protected void addImpl(Headers<? extends K, ? extends V, ?> headers) {
if (headers instanceof DefaultHeaders) {
@SuppressWarnings("unchecked")
final DefaultHeaders<? extends K, ? extends V, T> defaultHeaders =
(DefaultHeaders<? extends K, ? extends V, T>) headers;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addImpl
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | addImpl | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | private static short getShortSafe(byte[] bytes, int offset) {
if (BIG_ENDIAN_NATIVE_ORDER) {
return (short) (bytes[offset] << 8 | (bytes[offset + 1] & 0xff));
}
return (short) (bytes[offset] & 0xff | (bytes[offset + 1] << 8));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortSafe
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | getShortSafe | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
if (!DumpUtils.checkDumpAndUsageStatsPermission(mContext, TAG, pw)) return;
dumpNoCheck(fd, pw, args);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | dump | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean removeTask(int taskId) {
return mActivityTaskManager.removeTask(taskId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeTask
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | removeTask | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject editFile() {
JSONObject array = new JSONObject();
// 读取文件信息
try {
String content = FileManagerUtils.readString(getRealFilePath());
content = FileManagerUtils.encodeContent(content);
array.put("Path", this.get.get("path"));
arra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: editFile
File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java
Repository: jflyfox/jfinal_cms
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2021-37262 | MEDIUM | 5 | jflyfox/jfinal_cms | editFile | src/main/java/com/jflyfox/modules/filemanager/FileManager.java | e7fd0fe9362464c4d2bd308318eecc89a847b116 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void add(int index, BaseObject element)
{
// Check if the index is valid
rangeCheckForAdd(index);
// Move right values
if (index < this.size) {
for (int i = this.size - 1; i >= index; --i) {
put(i + 1, get(i));
}
}... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-26470
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-19223: Improve xobject memory storage in XWikidocument
* fix List#remove implementation
* override List#clear implementation for performances
Function: add
File: xwiki-platform-core/xwiki-platform-... | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | add | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/BaseObjects.java | fdfce062642b0ac062da5cda033d25482f4600fa | 1 |
Analyze the following code function for security vulnerabilities | private static boolean isValidLink(PendingIntent pendingIntent, Intent intent) {
if (pendingIntent == null) {
Slog.w(TAG, "isValidLink(): custom description without pending intent");
return false;
}
if (!pendingIntent.isActivity()) {
Slog.w(TAG, "isValidLink()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidLink
File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | isValidLink | services/autofill/java/com/android/server/autofill/ui/SaveUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | public int getInt(String key) throws JSONException {
final Object object = this.get(key);
if(object instanceof Number) {
return ((Number)object).intValue();
}
try {
return Integer.parseInt(object.toString());
} catch (Exception e) {
throw wrong... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInt
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | getInt | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | static public boolean postProcessRetrievedFile(
File rawDataDir, File file, ObjectNode fileRecord, ArrayNode fileRecords, final Progress progress) {
String mimeType = JSONUtilities.getString(fileRecord, "declaredMimeType", null);
String contentEncoding = JSONUtilities.getString(file... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postProcessRetrievedFile
File: main/src/com/google/refine/importing/ImportingUtilities.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | postProcessRetrievedFile | main/src/com/google/refine/importing/ImportingUtilities.java | e243e73e4064de87a913946bd320fbbe246da656 | 0 |
Analyze the following code function for security vulnerabilities | void showLockTaskEscapeMessageLocked(TaskRecord task) {
if (mLockTaskModeTasks.contains(task)) {
mHandler.sendEmptyMessage(SHOW_LOCK_TASK_ESCAPE_MESSAGE_MSG);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showLockTaskEscapeMessageLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | showLockTaskEscapeMessageLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dump(PrintWriter pw, String[] args) {
pw.println("NotificationGutsManager state:");
pw.print(" mKeyToRemoveOnGutsClosed (legacy): ");
pw.println(mKeyToRemoveOnGutsClosed);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | dump | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public void disableRenderingEvents()
{
this.contentListener = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disableRenderingEvents
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java
Repository: xwiki/xwiki-platform
The code follows secure ... | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | disableRenderingEvents | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onActivityResult(int requestCode, int resultCode, Intent data) {
switch (requestCode) {
case CHOOSE_ACCOUNT_REQUEST:
if (resultCode == RESULT_CANCELED) {
setResult(resultCode);
finish();
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onActivityResult
File: src/com/android/settings/accounts/AddAccountSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-8609 | HIGH | 7.2 | android | onActivityResult | src/com/android/settings/accounts/AddAccountSettings.java | f5d3e74ecc2b973941d8adbe40c6b23094b5abb7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public OnGoingLogicalCondition notBetween(ComparableFunction<T> from, ComparableFunction<T> to) {
Condition conditionLocal = new BetweenCondition<T>(new NotSelector(selector),
Arrays.asList(selector.generateParameter(from), selector.generateParameter(to)));
return getOnGoingLogicalCondition(condition... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notBetween
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-11343 | HIGH | 7.5 | xjodoin/torpedoquery | notBetween | src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java | 3c20b874fba9cc2a78b9ace10208de1602b56c3f | 0 |
Analyze the following code function for security vulnerabilities | private boolean bindHeaderAppName(RemoteViews contentView, StandardTemplateParams p,
boolean force) {
if (p.mViewType == StandardTemplateParams.VIEW_TYPE_MINIMIZED && !force) {
// unless the force flag is set, don't show the app name in the minimized state.
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindHeaderAppName
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | bindHeaderAppName | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isEmpty(Group group) {
// the only fast check available is on epeople...
boolean hasMembers = (!group.getMembers().isEmpty());
if (hasMembers) {
return false;
} else {
// well, groups is never null...
for (Group subGroup :... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEmpty
File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | isEmpty | dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | public com.xpn.xwiki.api.Object addObjectFromRequest() throws XWikiException
{
// Call to getDoc() ensures that we are working on a clone()
com.xpn.xwiki.api.Object obj =
new com.xpn.xwiki.api.Object(getDoc().addXObjectFromRequest(getXWikiContext()), getXWikiContext());
updateAu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | addObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | void registerCallback(IBluetoothCallback cb) {
mCallbacks.register(cb);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerCallback
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | registerCallback | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public SecurityRoles getSecurityRoles() {
return securityRoles;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSecurityRoles
File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
Repository: opensearch-project/security
The code follows secure coding practices. | [
"CWE-612",
"CWE-863"
] | CVE-2022-41918 | MEDIUM | 6.3 | opensearch-project/security | getSecurityRoles | src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java | f7cc569c9d3fa5d5432c76c854eed280d45ce6f4 | 0 |
Analyze the following code function for security vulnerabilities | public NodeOwner getOwner() {
return owner;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOwner
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getOwner | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasDynamicCustomMappings()
{
return getHibernateConfiguration().hasDynamicCustomMappings();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasDynamicCustomMappings
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | hasDynamicCustomMappings | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public boolean performAccessibilityAction(int action, Bundle arguments) {
if (mAccessibilityInjector.supportsAccessibilityAction(action)) {
return mAccessibilityInjector.performAccessibilityAction(action, arguments);
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performAccessibilityAction
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | performAccessibilityAction | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Beta
public Builder setDataStoreFactory(DataStoreFactory dataStoreFactory) throws IOException {
return setCredentialDataStore(StoredCredential.getDefaultDataStore(dataStoreFactory));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDataStoreFactory
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | setDataStoreFactory | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
final boolean forceStopPackageLocked(String packageName, int appId,
boolean callerWillRestart, boolean purgeCache, boolean doit,
boolean evenPersistent, boolean uninstalling, int userId, String reason) {
int i;
if (userId == UserHandle.USER_ALL && packageN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceStopPackageLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | forceStopPackageLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void cancelLockoutReset() {
mAlarmManager.cancel(getLockoutResetIntent());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelLockoutReset
File: services/core/java/com/android/server/fingerprint/FingerprintService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | cancelLockoutReset | services/core/java/com/android/server/fingerprint/FingerprintService.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLaunchAnimationStart(boolean isExpandingFullyAbove) {
setOccluded(true /* occluded */, false /* animate */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLaunchAnimationStart
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | onLaunchAnimationStart | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | public void setVersion(String version)
{
this.version = version;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | setVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getModalTitle() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getModalTitle
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | getModalTitle | src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPasswordMinimumSymbols(ComponentName who, int length, boolean parent) {
if (!mHasFeature || notSupportedOnAutomotive("setPasswordMinimumSymbols")) {
return;
}
Objects.requireNonNull(who, "ComponentName is null");
final int userId = mInjector.userH... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPasswordMinimumSymbols
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setPasswordMinimumSymbols | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void fillNullValues(SQLiteDatabase db) {
ContentValues values = new ContentValues();
values.put(Downloads.Impl.COLUMN_CURRENT_BYTES, 0);
fillNullValuesForColumn(db, values);
values.put(Downloads.Impl.COLUMN_TOTAL_BYTES, -1);
fillNullValuesForColumn(db,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillNullValues
File: src/com/android/providers/downloads/DownloadProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-0848 | HIGH | 7.2 | android | fillNullValues | src/com/android/providers/downloads/DownloadProvider.java | bdc831357e7a116bc561d51bf2ddc85ff11c01a9 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract HttpMessage createInvalidMessage(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createInvalidMessage
File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2019-16869 | MEDIUM | 5 | netty | createInvalidMessage | codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java | 39cafcb05c99f2aa9fce7e6597664c9ed6a63a95 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setBadgeIconType(int icon) {
mN.mBadgeIcon = icon;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBadgeIconType
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setBadgeIconType | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private String objectToString(Map<String, Object> options, Object obj) {
String out = "null";
if (obj != null) {
Map<Class<?>, Object> toString = options.containsKey(Printer.OBJECT_TO_STRING)
? (Map<Class<?>, Object>) options.get(Printer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: objectToString
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | objectToString | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | public Registration addAfterNavigationListener(
AfterNavigationListener listener) {
return addListener(AfterNavigationHandler.class, listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addAfterNavigationListener
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | addAfterNavigationListener | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public static void uploadNewFile(
Context context,
Account account,
String[] localPaths,
String[] remotePaths,
String[] mimeTypes,
Integer behaviour,
Boolean createRemoteFolder,
int createdBy,
boolean requiresWifi,
boolean requiresCharging,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uploadNewFile
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | uploadNewFile | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | public static User findByEmail(String email) {
if (email == null || email.isEmpty())
return null;
String emailNormalized = WebUtils.validateAndNormalizeEmailAddr(email);
if (emailNormalized == null)
return null;
return Database.findOneById(User.class, email);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findByEmail
File: src/gribbit/auth/User.java
Repository: lukehutch/gribbit
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2014-125071 | MEDIUM | 5.2 | lukehutch/gribbit | findByEmail | src/gribbit/auth/User.java | 620418df247aebda3dd4be1dda10fe229ea505dd | 0 |
Analyze the following code function for security vulnerabilities | public List<Item> getAllItems() {
return getAllItems(Item.class);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllItems
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getAllItems | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @SneakyThrows
private void addLoginsSpecification(String tenantName) {
String specificationName = applicationProperties.getTenantLoginPropertiesName();
InputStream in = new ClassPathResource(Constants.DEFAULT_LOGINS_CONFIG_PATH).getInputStream();
String specification = IOUtils.toString(in, U... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addLoginsSpecification
File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java
Repository: xm-online/xm-uaa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15557 | HIGH | 7.5 | xm-online/xm-uaa | addLoginsSpecification | src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java | bd235434f119c67090952e08fc28abe41aea2e2c | 0 |
Analyze the following code function for security vulnerabilities | @Override
@SuppressWarnings("deprecation")
boolean check(MapConfig c1, MapConfig c2) {
if (c1 == c2) {
return true;
}
if (c1 == null || c2 == null) {
return false;
}
int maxSize1 = c1.getMaxSizeConfig().getSize()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PropertiesRequest getRequestedFields( InputStream in ) {
final Set<QName> set = new LinkedHashSet<QName>();
try {
ByteArrayOutputStream bout = new ByteArrayOutputStream();
StreamUtils.readTo( in, bout, false, true );
byte[] arr = bout.toByte... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2015-7326
- Severity: HIGH
- CVSS Score: 7.5
Description: patch XXE vulnerability
Function: getRequestedFields
File: milton-server-ce/src/main/java/io/milton/http/webdav/DefaultPropFindRequestFieldParser.java
Repository: miltonio/milton2
Fixed Code:
@Override
... | [
"CWE-611"
] | CVE-2015-7326 | HIGH | 7.5 | miltonio/milton2 | getRequestedFields | milton-server-ce/src/main/java/io/milton/http/webdav/DefaultPropFindRequestFieldParser.java | 5f81b0c48a817d4337d8b0e99ea0b4744ecd720b | 1 |
Analyze the following code function for security vulnerabilities | private boolean isEncryptionMethodZipStandard(LocalFileHeader localFileHeader) {
return localFileHeader.isEncrypted() && EncryptionMethod.ZIP_STANDARD.equals(localFileHeader.getEncryptionMethod());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEncryptionMethodZipStandard
File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | isEncryptionMethodZipStandard | src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | private void initGlobalSettingsDefaultValForWearLocked(String key, boolean val) {
initGlobalSettingsDefaultValForWearLocked(key, val ? "1" : "0");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initGlobalSettingsDefaultValForWearLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | initGlobalSettingsDefaultValForWearLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServerIndex(Integer serverIndex) {
this.serverIndex = serverIndex;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServerIndex
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServerIndex | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected void handleStartedWakingUp() {
updateFingerprintListeningState();
final int count = mCallbacks.size();
for (int i = 0; i < count; i++) {
KeyguardUpdateMonitorCallback cb = mCallbacks.get(i).get();
if (cb != null) {
cb.onStartedWakingUp();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleStartedWakingUp
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | handleStartedWakingUp | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isCompatible(Set<PermissionConfig> c1, Set<PermissionConfig> c2) {
if (c1 == c2) {
return true;
}
if (c1 == null || c2 == null || c1.size() != c2.size()) {
return false;
}
List<PermissionConfig> configs1 ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCompatible
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isCompatible | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public URI getWebhookUrl() {
return webhookUrl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWebhookUrl
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getWebhookUrl | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | public static MappedByteBuffer map(File file, MapMode mode) throws IOException {
return mapInternal(file, mode, -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: map
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | map | android/guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | void startPackageOneTimeSession(@NonNull String packageName, long timeoutMillis,
long revokeAfterKilledDelayMillis, int importanceToResetTimer,
int importanceToKeepSessionAlive) {
int uid;
try {
uid = mContext.getPackageManager().getPackageUid(packageName, 0);
... | Vulnerability Classification:
- CWE: CWE-281
- CVE: CVE-2023-21249
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Watch uid proc state instead of importance for 1-time permissions
The system process may bind to an app with the flag
BIND_FOREGROUND_SERVICE, this will put the client in the foreground
service importa... | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | startPackageOneTimeSession | services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 1 |
Analyze the following code function for security vulnerabilities | public boolean setCenter(float centerX, float centerY, boolean animate) {
final IAccessibilityServiceConnection connection =
AccessibilityInteractionClient.getInstance().getConnection(
mService.mConnectionId);
if (connection != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCenter
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | setCenter | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M2")
public BaseObject updateObjectFromRequest(String className, String prefix, XWikiContext context)
throws XWikiException
{
return updateObjectFromRequest(className, prefix, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | updateObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | private boolean checkGetAccountsPermission(String packageName, int userId) {
return isPermittedForPackage(packageName, userId, Manifest.permission.GET_ACCOUNTS,
Manifest.permission.GET_ACCOUNTS_PRIVILEGED);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkGetAccountsPermission
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | checkGetAccountsPermission | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public String getScript() {
return theScript == null ? "" : theScript;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScript
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | getScript | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void broadcastIntentToManifestReceivers(
Intent intent, UserHandle parentHandle, boolean requiresPermission) {
Objects.requireNonNull(intent);
Objects.requireNonNull(parentHandle);
Slogf.i(LOG_TAG, "Sending %s broadcast to manifest receivers."... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: broadcastIntentToManifestReceivers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | broadcastIntentToManifestReceivers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void notifyForSettingsChange(int key, String name) {
final int userId = getUserIdFromKey(key);
Uri uri = getNotificationUriFor(key, name);
mGenerationRegistry.incrementGeneration(key);
mHandler.obtainMessage(MyHandler.MSG_NOTIFY_URI_CHANGED,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyForSettingsChange
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | notifyForSettingsChange | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | public static <T> Queue<T> newMpscQueue() {
return Mpsc.newMpscQueue();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newMpscQueue
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | newMpscQueue | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.