instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
protected JsonDeserializer<?> _findCustomReferenceDeserializer(ReferenceType type, DeserializationConfig config, BeanDescription beanDesc, TypeDeserializer contentTypeDeserializer, JsonDeserializer<?> contentDeserializer) throws JsonMappingException { for (Deserializers d : ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _findCustomReferenceDeserializer File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_findCustomReferenceDeserializer
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public String getTextWithoutAutocomplete() { int autoCompleteIndex = getText().getSpanStart(mAutocompleteSpan); if (autoCompleteIndex < 0) { return getQueryText(); } else { return getQueryText().substring(0, autoCompleteIndex); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextWithoutAutocomplete File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
getTextWithoutAutocomplete
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
private void sendBroadcastUploadsAdded() { Intent start = new Intent(getUploadsAddedMessage()); // nothing else needed right now start.setPackage(getPackageName()); localBroadcastManager.sendBroadcast(start); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendBroadcastUploadsAdded File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
sendBroadcastUploadsAdded
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
public XmlGraphMLReader target(ExportConfig.NodeConfig targetConfig) { this.target = targetConfig; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: target File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
target
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
@Override public String getDestination(String function, JobDomainPeasSessionController jobDomainSC, HttpRequest request) { String destination = ""; try { if (!jobDomainSC.isAccessGranted()) { throw new JobDomainPeasException("Bad right for user {0}", jobDomainSC.getUserId()); } ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-47324 - Severity: MEDIUM - CVSS Score: 5.4 Description: Bug #13811: fixing stored XSS leading to full account takeover * making HTML sanitize processing accessible for JSTL instructions * sanitizing user notification title and contents on registering * sanit...
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getDestination
core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
1
Analyze the following code function for security vulnerabilities
public void importFromMee6(CommandEvent commandEvent) { RequestUtility.Request request = RequestUtility.Request .builder() .url("https://mee6.xyz/api/plugins/levels/leaderboard/" + commandEvent.getGuild().getId()).build(); JsonElement jsonElement = RequestUtility.request...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: importFromMee6 File: src/main/java/de/presti/ree6/commands/impl/mod/Import.java Repository: Ree6-Applications/Ree6 The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-39302
MEDIUM
5.4
Ree6-Applications/Ree6
importFromMee6
src/main/java/de/presti/ree6/commands/impl/mod/Import.java
459b5bc24f0ea27e50031f563373926e94b9aa0a
0
Analyze the following code function for security vulnerabilities
private void clearIntentFilterVerificationsLPw(int userId) { final int packageCount = mPackages.size(); for (int i = 0; i < packageCount; i++) { PackageParser.Package pkg = mPackages.valueAt(i); clearIntentFilterVerificationsLPw(pkg.packageName, userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearIntentFilterVerificationsLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clearIntentFilterVerificationsLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private static byte[] classToByteArray(Class<?> clazz) throws ClassNotFoundException { String fileName = clazz.getName(); int lastDot = fileName.lastIndexOf('.'); if (lastDot > 0) { fileName = fileName.substring(lastDot + 1); } URL classUrl = clazz.getResource(fileNam...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: classToByteArray File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
classToByteArray
common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
private static void crdtReplicationXmlGenerator(XmlGenerator gen, Config config) { CRDTReplicationConfig replicationConfig = config.getCRDTReplicationConfig(); gen.open("crdt-replication"); if (replicationConfig != null) { gen.node("replication-period-millis", replicationConfig.getRe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: crdtReplicationXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
crdtReplicationXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private int[] revokeUnusedSharedUserPermissionsLPw(SharedUserSetting su, int[] allUserIds) { // Collect all used permissions in the UID ArraySet<String> usedPermissions = new ArraySet<>(); final int packageCount = su.packages.size(); for (int i = 0; i < packageCount; i++) { P...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: revokeUnusedSharedUserPermissionsLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
revokeUnusedSharedUserPermissionsLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static <K, V> ConcurrentMap<K, V> newConcurrentHashMap( int initialCapacity, float loadFactor, int concurrencyLevel) { return new ConcurrentHashMap<K, V>(initialCapacity, loadFactor, concurrencyLevel); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newConcurrentHashMap File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
newConcurrentHashMap
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition get(final String path, final Route.OneArgHandler handler) { return appendDefinition(GET, path, handler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
get
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void updateActivityUsageStats(String packageName, int userId, int event) { if (DEBUG_SWITCH) { Slog.d(TAG_SWITCH, "updateActivityUsageStats: package=" + packageName + " event=" + event); } if (mUsageStatsService != null) { mUsageStatsService.rep...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateActivityUsageStats File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateActivityUsageStats
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static SURL create(URL url) throws MalformedURLException { if (url == null) throw new MalformedURLException("URL cannot be null"); // ::comment when __CORE__ final String credentialId = url.getUserInfo(); if (credentialId == null || credentialId.indexOf(':') > 0) // No user info at all, or a user...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
create
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public void configure(ServletContextHandler context) { context.setContextPath("/"); context.getSessionHandler().setMaxInactiveInterval(serverConfig.getSessionTimeout()); context.setInitParameter(EnvironmentLoader.ENVIRONMENT_CLASS_PARAM, DefaultWebEnvironment.class.getName()); context.addEventL...
Vulnerability Classification: - CWE: CWE-552 - CVE: CVE-2022-39208 - Severity: HIGH - CVSS Score: 7.5 Description: Fix security vulnerability issue regarding site/* access Function: configure File: server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.java Repository: theonedev/onedev Fixe...
[ "CWE-552" ]
CVE-2022-39208
HIGH
7.5
theonedev/onedev
configure
server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.java
8aa94e0daf8447cdf76d4f27bfda0a85a7ea5822
1
Analyze the following code function for security vulnerabilities
public JSONContext.Client getJSONContextClient() { return _jsonContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJSONContextClient File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
getJSONContextClient
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
@Override public BigInteger bigIntegerValueExact() { BigDecimal bd = bigDecimalValue(); if (bd.scale() <= bigIntegerScaleLimit) { return bd.toBigIntegerExact(); } throw new UnsupportedOperationException( String.format( "Scale value ...
Vulnerability Classification: - CWE: CWE-834 - CVE: CVE-2023-4043 - Severity: HIGH - CVSS Score: 7.5 Description: BigInteger scale limit counts absolute value now. Signed-off-by: Tomáš Kraus <tomas.kraus@oracle.com> Function: bigIntegerValueExact File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repos...
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
bigIntegerValueExact
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
85fe45ca2da6d7b79ec03014c928075bca01e588
1
Analyze the following code function for security vulnerabilities
private native void nativeShowInterstitialPage( long nativeContentViewCoreImpl, String url, long nativeInterstitialPageDelegateAndroid);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeShowInterstitialPage File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeShowInterstitialPage
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override public void finalizeWorkProfileProvisioning(UserHandle managedProfileUser, Account migratedAccount) { Preconditions.checkCallAuthorization( hasCallingOrSelfPermission(permission.MANAGE_PROFILE_AND_DEVICE_OWNERS)); if (!isManagedProfile(managedProfileUser.getIde...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalizeWorkProfileProvisioning File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
finalizeWorkProfileProvisioning
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void initFromRefMessage(int action) { setFieldsFromRefMessage(action); // Check if To: address and email body needs to be prefilled based on extras. // This is used for reporting rendering feedback. if (MessageHeaderView.ENABLE_REPORT_RENDERING_PROBLEM) { Intent inte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initFromRefMessage File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
initFromRefMessage
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public void moveToStart() { raiseIfKilled(); reset(); watermark = 0; fileInputsIterator = fileInputs.iterator(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveToStart File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
moveToStart
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
@Override public void close() throws IOException { if (!_closed) { _closed = true; _symbols.release(); try { _closeInput(); } finally { // as per [JACKSON-324], do in finally block // Also, internal buffer(s) can...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
close
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public static @NonNull Optional<String> readString(@NonNull File file) throws IOException { try { if (file.length() <= MAX_READ_STRING_SIZE) { final String value = new String(Files.readAllBytes(file.toPath()), StandardCharsets.UTF_8); return Op...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readString File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
readString
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
private Schema getSchema(Source source, ThreadContext context) { InputStream is; VerifierFactory factory = new com.thaiopensource.relaxng.jarv.VerifierFactoryImpl(); if (source instanceof StreamSource) { StreamSource ss = (StreamSource)source; is = ss.getInputStream(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSchema File: ext/java/nokogiri/XmlRelaxng.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-611" ]
CVE-2020-26247
MEDIUM
4
sparklemotion/nokogiri
getSchema
ext/java/nokogiri/XmlRelaxng.java
9c87439d9afa14a365ff13e73adc809cb2c3d97b
0
Analyze the following code function for security vulnerabilities
public void setOutputRoot(String argOutputRoot) { this.outputRoot = argOutputRoot; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOutputRoot File: src/main/java/emissary/pickup/WorkBundle.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
setOutputRoot
src/main/java/emissary/pickup/WorkBundle.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
@Override public void applyRestore(byte[] payload, int user) { if (DBG) Slog.d(TAG, "applyRestore u=" + user + " payload=" + (payload != null ? new String(payload, StandardCharsets.UTF_8) : null)); if (payload == null) { Slog.w(TAG, "applyRestore: no p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyRestore File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
applyRestore
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private void commitAttachments() { if (conversation.getNextEncryption() == Message.ENCRYPTION_AXOLOTL && trustKeysIfNeeded(REQUEST_TRUST_KEYS_ATTACHMENTS)) { return; } final List<Attachment> attachments = mediaPreviewAdapter.getAttachments(); final PresenceSelector.OnPresence...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: commitAttachments File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
commitAttachments
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
Call getRingingCall() { return getFirstCallWithState(CallState.RINGING); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRingingCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getRingingCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Override public User getAuthUser(HttpServletRequest request) { Session session = sessionService.getSession(request); if (session == null) { log.info("session info is null "); return null; } // get user object from session return userService.queryUser(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthUser File: dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java Repository: apache/dolphinscheduler The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-49068
HIGH
7.5
apache/dolphinscheduler
getAuthUser
dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java
359b1a7e5bb72790d2583971dc2d44a8481e3a10
0
Analyze the following code function for security vulnerabilities
@Override public void removeUser(Account user){ Driver driver = new SQLServerDriver(); String connectionUrl = "jdbc:sqlserver://n8bu1j6855.database.windows.net:1433;database=VoyagerDB;user=VoyageLogin@n8bu1j6855;password={GroupP@ssword};encrypt=true;hostNameInCertificate=*.database.windows.net;loginTimeout=30;"; ...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2014-125074 - Severity: MEDIUM - CVSS Score: 5.2 Description: fixed problems in register controller, and worked at preventing sql-injection in database access Function: removeUser File: Voyager/src/models/DatabaseAccess.java Repository: Nayshlok/Voyager Fixed Co...
[ "CWE-89" ]
CVE-2014-125074
MEDIUM
5.2
Nayshlok/Voyager
removeUser
Voyager/src/models/DatabaseAccess.java
f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae
1
Analyze the following code function for security vulnerabilities
private void doNotCache(HttpServletResponse response) { response.setHeader("Expires", "Fri, 01 Jan 1980 00:00:00 GMT"); response.setHeader("Pragma", "no-cache"); response.setHeader("Cache-Control", "no-cache, max-age=0, must-revalidate"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doNotCache File: server-core/src/main/java/io/onedev/server/git/GitFilter.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
doNotCache
server-core/src/main/java/io/onedev/server/git/GitFilter.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
@Override public void setDisablePreviewScreenshots(IBinder token, boolean disable) throws RemoteException { synchronized (this) { final ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { Slog.w(TAG, "setDisablePreviewScreenshots: Un...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDisablePreviewScreenshots File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setDisablePreviewScreenshots
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
protected boolean isSelected(final String fileName, final PlexusIoResource fileInfo) throws ArchiverException { if (fileSelectors != null) { for (FileSelector fileSelector : fileSelectors) { try { if (!fileSelector.isSelected(fileInfo)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSelected File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java Repository: codehaus-plexus/plexus-archiver The code follows secure coding practices.
[ "CWE-22", "CWE-61" ]
CVE-2023-37460
CRITICAL
9.8
codehaus-plexus/plexus-archiver
isSelected
src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
54759839fbdf85caf8442076f001d5fd64e0dcb2
0
Analyze the following code function for security vulnerabilities
public String getNamespace(String prefix) { throw new RuntimeException("getNamespace() not supported"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNamespace File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getNamespace
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public String getLog() { try(ResponseBody body = doGetLog()) { return body.string(); } catch (IOException e) { throw KubernetesClientException.launderThrowable(forOperationType("getLog"), e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLog File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
getLog
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
public void put(Env env, String path, Object request, Object... urlVariables) throws RestClientException { execute(HttpMethod.PUT, env, path, request, null, urlVariables); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java Repository: apolloconfig/apollo The code follows secure coding practices.
[ "CWE-20" ]
CVE-2020-15170
MEDIUM
6.8
apolloconfig/apollo
put
apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java
ae9ba6cfd32ed80469f162e5e3583e2477862ddf
0
Analyze the following code function for security vulnerabilities
public static boolean areActionsVisiblyDifferent(Notification first, Notification second) { Notification.Action[] firstAs = first.actions; Notification.Action[] secondAs = second.actions; if (firstAs == null && secondAs != null || firstAs != null && secondAs == null) { return true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: areActionsVisiblyDifferent File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
areActionsVisiblyDifferent
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void deleteApplication(String applicationName, String tenantDomain, String username) throws IdentityApplicationManagementException { ServiceProvider serviceProvider; // invoking the listeners Collection<ApplicationMgtListener> listeners = getApplicationMgtListen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteApplication File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
deleteApplication
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message msg) { synchronized(mLock) { if (mActiveService == null) { Log.d(TAG, "Dropping service response message; service no longer active."); return; } else if (!msg.replyTo.getBinder().equal...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: src/com/android/nfc/cardemulation/HostEmulationManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35671
MEDIUM
5.5
android
handleMessage
src/com/android/nfc/cardemulation/HostEmulationManager.java
745632835f3d97513a9c2a96e56e1dc06c4e4176
0
Analyze the following code function for security vulnerabilities
@Deprecated // since 2.12 protected void _verifyNumberForScalarCoercion(DeserializationContext ctxt, JsonParser p) throws IOException { MapperFeature feat = MapperFeature.ALLOW_COERCION_OF_SCALARS; if (!ctxt.isEnabled(feat)) { // 31-Mar-2017, tatu: Since we don't know (or this deep, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _verifyNumberForScalarCoercion File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_verifyNumberForScalarCoercion
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
protected ID checkoutClassificationValue(Field field, Cell cell) { final String val = cell.asString(); // 支持ID ID vla2id = MetadataHelper.checkSpecEntityId(val, EntityHelper.ClassificationData); if (vla2id != null) { if (ClassificationManager.instance.getName(vla2id) != null...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkoutClassificationValue File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
checkoutClassificationValue
src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
IBackupManager getIBackupManager() { return IBackupManager.Stub.asInterface( ServiceManager.getService(Context.BACKUP_SERVICE)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIBackupManager File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getIBackupManager
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public StompServer listen(Handler<AsyncResult<StompServer>> handler) { return listen(options.getPort(), options.getHost(), handler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listen File: src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java Repository: vert-x3/vertx-stomp The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-32081
MEDIUM
6.5
vert-x3/vertx-stomp
listen
src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java
0de4bc5a44ddb57e74d92c445f16456fa03f265b
0
Analyze the following code function for security vulnerabilities
protected String getETag(Resource so) { Date lastModified = new Date(); if (so != null && so.getLastModified() != null) { lastModified = so.getLastModified(); } return "W/\"" + Long.toString(lastModified.getTime()) + "\""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getETag File: core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java Repository: opencrx The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-46502
CRITICAL
9.8
opencrx
getETag
core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java
ce7a71db0bb34ecbcb0e822d40598e410a48b399
0
Analyze the following code function for security vulnerabilities
private boolean endCallInternal(String callingPackage) { // Always operate on the foreground call if one exists, otherwise get the first call in // priority order by call-state. Call call = mCallsManager.getForegroundCall(); if (call == null) { call = mCallsManager.getFirstCa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endCallInternal File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
endCallInternal
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
protected void addJobToSchedule(JobDetail job) { loadedJobs.add(job); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addJobToSchedule File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
addJobToSchedule
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
public boolean removeXObject(BaseObject object) { List<BaseObject> objects = this.xObjects.get(object.getXClassReference()); // No objects at all, nothing to remove if (objects == null) { return false; } // Sometimes the object vector is wrongly indexed, meaning t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeXObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
removeXObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void sort(boolean userOriginated) { // Set sort orders // In-memory comparator getDataCommunicator().setInMemorySorting(createSortingComparator(), false); // Back-end sort properties List<QuerySortOrder> sortProperties = new ArrayList<>(); sortOrd...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sort File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
sort
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public String getPlatform(String projectId) { Project project = baseProjectService.getProjectById(projectId); return project.getPlatform(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPlatform File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getPlatform
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public boolean isInMemoryDatabase() { synchronized (mLock) { return mConfigurationLocked.isInMemoryDb(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInMemoryDatabase File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
isInMemoryDatabase
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
private Option<org.w3c.dom.Document> loadSmilDocument(final WorkingFileRepository workingFileRepository, MediaPackage mp) { return mlist(mp.getElements()).filter(MediaPackageSupport.Filters.isSmilCatalog).headOpt() .map(new Function<MediaPackageElement, org.w3c.dom.Document>() { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadSmilDocument File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
loadSmilDocument
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void tempWhitelistUidLocked(int targetUid, long duration, String tag) { mPendingTempWhitelist.put(targetUid, new PendingTempWhitelist(targetUid, duration, tag)); setUidTempWhitelistStateLocked(targetUid, true); mUiHandler.obtainMessage(PUSH_TEMP_WHITELIST_UI_MSG).sendToTar...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempWhitelistUidLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
tempWhitelistUidLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void openGallery(final ActionListener response, int type){ if (!isGalleryTypeSupported(type)) { throw new IllegalArgumentException("Gallery type "+type+" not supported on this platform."); } if (getActivity() == null) { throw new RuntimeException("Cannot open galer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openGallery File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
openGallery
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public String getDestinationString(String transportName) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "getDestinationString"); synchronized (mTransports) { final IBackupTransport transport = mTransports.get(transportName); if (tra...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDestinationString File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
getDestinationString
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
void removeReplacedWindowIfNeeded(WindowState replacement) { for (int i = mChildren.size() - 1; i >= 0; i--) { final WindowState win = mChildren.get(i); if (win.removeReplacedWindowIfNeeded(replacement)) { return; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeReplacedWindowIfNeeded File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
removeReplacedWindowIfNeeded
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void createMonitoredItems(ServiceRequest service) throws UaException { CreateMonitoredItemsRequest request = (CreateMonitoredItemsRequest) service.getRequest(); UInteger subscriptionId = request.getSubscriptionId(); Subscription subscription = subscriptions.get(subscriptionId); T...
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2022-25897 - Severity: HIGH - CVSS Score: 7.5 Description: Allow max MonitoredItems per session to be configured via OpcUaServerConfigLimits Function: createMonitoredItems File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/...
[ "CWE-770" ]
CVE-2022-25897
HIGH
7.5
eclipse/milo
createMonitoredItems
opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java
4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5
1
Analyze the following code function for security vulnerabilities
public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessesInErrorState File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getProcessesInErrorState
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
static <T, D extends T> T instantiate(String className, Class<T> type, D defaultValue) { if (className == null) { return defaultValue; } final Logger LOGGER = Logging.getLogger(GeoTools.class); try { Class<?> kind = Class.forName(className); // step 1 ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: instantiate File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
instantiate
modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
private void updateAuthStatusIconAndText(RemoteOperationResult result) { mAuthStatusIcon = R.drawable.ic_alert; // the most common case in the switch below switch (result.getCode()) { case OK_SSL: mAuthStatusIcon = R.drawable.ic_lock_white; mAuthStatusText...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAuthStatusIconAndText File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
updateAuthStatusIconAndText
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
public static SessionManager getSessionManager(Long sessionTimeout, CacheManager cacheManager) { DefaultWebSessionManager sessionManager = new CustomSessionManager(); sessionManager.setSessionIdUrlRewritingEnabled(false); sessionManager.setDeleteInvalidSessions(true); sessionManager.setS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionManager File: backend/src/main/java/io/metersphere/commons/utils/ShiroUtils.java Repository: metersphere The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-45790
CRITICAL
9.8
metersphere
getSessionManager
backend/src/main/java/io/metersphere/commons/utils/ShiroUtils.java
5c5fd5102bceb05eb233c1d3c249edcfc665b8c2
0
Analyze the following code function for security vulnerabilities
public Map<String, Object> getTaskProfile(String id) throws IOException, InterruptedException { TaskExample e = new TaskExample(); e.createCriteria().andBareMetalIdEqualTo(id).andStatusIn(runningStatus); List<TaskWithBLOBs> tasks = taskMapper.selectByExampleWithBLOBs(e); if (tasks.isEmpt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTaskProfile File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
getTaskProfile
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
public static String makeQueryString(final HttpServletRequest request, final Map<String,Object> additions, final String[] ignores, final IgnoreType ignoreType) { if (request == null || additions == null || ignores == null || ignoreType == null) { throw new IllegalArgumentException("Cannot take null ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-0869 - Severity: MEDIUM - CVSS Score: 6.1 Description: NMS-15294: Escaping parameter names in generated query strings Function: makeQueryString File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java Repository: OpenNMS/opennms Fixed Code: public ...
[ "CWE-79" ]
CVE-2023-0869
MEDIUM
6.1
OpenNMS/opennms
makeQueryString
opennms-web-api/src/main/java/org/opennms/web/api/Util.java
66b4ba96a18b9952f25a350bbccc2a7e206238d1
1
Analyze the following code function for security vulnerabilities
private boolean hasLockscreenSecurity() { LockPatternUtils lpu = new LockPatternUtils(getActivity()); return lpu.isSecure(UserHandle.myUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasLockscreenSecurity File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
hasLockscreenSecurity
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
private AuthorityInfo createAuthorityLocked(EndPoint info, int ident, boolean doWrite) { AuthorityInfo authority; if (ident < 0) { ident = mNextAuthorityId; mNextAuthorityId++; doWrite = true; } if (Log.isLoggable(TAG, Log.VERBOSE)) { Log.v...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAuthorityLocked File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
createAuthorityLocked
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
private static List<Method> getMethodCaseInsensitive(Class<? extends Object> clazz, String methodName) { List<Method> methodList = new ArrayList<Method>(); for (Method m : clazz.getMethods()) { if (m.getName().toUpperCase().equals(methodName.toUpperCase())) { methodList.add(m); } } return meth...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMethodCaseInsensitive File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getMethodCaseInsensitive
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
@Test public void createsCountQueryForNestedReferenceCorrectly() { assertCountQuery("select a.b from A a", "select count(a.b) from A a"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createsCountQueryForNestedReferenceCorrectly File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java Repository: spring-projects/spring-data-jpa The code follows secure coding practi...
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
createsCountQueryForNestedReferenceCorrectly
src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public boolean allowAliasInStatements() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: allowAliasInStatements File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
allowAliasInStatements
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
public boolean isResizable() { return getState(false).resizable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isResizable File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
isResizable
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override boolean providesOrientation() { return mStyleFillsParent; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: providesOrientation File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
providesOrientation
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private void wrapperSearchKeyword(Map<String, Object> data, String keywords) { if (StringUtils.isNotEmpty(keywords)) { List<Object> logs = (List<Object>) data.get("rows"); if (logs != null && !logs.isEmpty()) { for (Object tLog : logs) { Map<String, Ob...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wrapperSearchKeyword File: service/src/main/java/com/zrlog/service/ArticleService.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
wrapperSearchKeyword
service/src/main/java/com/zrlog/service/ArticleService.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@Override protected void sortResults(List<ResolveInfo> results) { Collections.sort(results, mResolvePrioritySorter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sortResults File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
sortResults
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override void getAnimationPosition(Point outPosition) { // Always animate from zero because if the activity doesn't fill the task, the letterbox // will fill the remaining area that should be included in the animation. outPosition.set(0, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAnimationPosition File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getAnimationPosition
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public EmissaryResponse outboundOpenWorkSpace(final String place, final String space) { final String placeUrl = KeyManipulator.getServiceHostURL(place); final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientOpenWorkSpace.action"); final List<NameValuePair> nvps = new Array...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outboundOpenWorkSpace File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
outboundOpenWorkSpace
src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public boolean isCount() { return this.count; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCount File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
isCount
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
public Entity<?> serialize(Object obj, Map<String, Object> formParams, String contentType, boolean isBodyNullable) throws ApiException { Entity<?> entity; if (contentType.startsWith("multipart/form-data")) { MultiPart multiPart = new MultiPart(); for (Entry<String, Object> param: formParams.entrySet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serialize File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
serialize
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public XWikiDocument copyDocument(DocumentReference newDocumentReference, boolean cloneArchive, XWikiContext context) throws XWikiException { loadAttachments(context); if (cloneArchive) { loadArchive(context); } XWikiDocument newdoc = cloneInternal(newDocumentRef...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
copyDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public String getHidingToggleCaption() { return getState(false).hidingToggleCaption; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHidingToggleCaption File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getHidingToggleCaption
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override protected LookupResult doGet(Object key) { final String trimmedKey = StringUtils.trimToNull(key.toString()); if (trimmedKey == null) { LOG.debug("A blank key was supplied"); return getEmptyResult(); } LOG.debug("Beginning [{}] DNS resolution for ke...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doGet File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
doGet
graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
public void cacheContentDefinition(String systemId, CmsXmlContentDefinition contentDefinition) { String cacheKey = getCacheKeyForCurrentProject(systemId); m_cacheContentDefinitions.put(cacheKey, contentDefinition); if (LOG.isDebugEnabled()) { LOG.debug(Messages.get().getBundle().key...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cacheContentDefinition File: src/org/opencms/xml/CmsXmlEntityResolver.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3312
MEDIUM
4
alkacon/opencms-core
cacheContentDefinition
src/org/opencms/xml/CmsXmlEntityResolver.java
92e035423aa6967822d343e54392d4291648c0ee
0
Analyze the following code function for security vulnerabilities
private Comparator getComparator() { return new Comparator() { public int compare(Object o1, Object o2) { String[] arr1 = (String[]) o1; String[] arr2 = (String[]) o2; Integer i1 = new Integer(arr1[2]); Integer i2 = new Integer(arr2[2]); return i1.compareTo(i2); } }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getComparator File: src/java/talentum/escenic/plugins/authenticator/authenticators/DBAuthenticator.java Repository: Bricco/authenticator-plugin The code follows secure coding practices.
[ "CWE-89" ]
CVE-2013-10013
MEDIUM
5.2
Bricco/authenticator-plugin
getComparator
src/java/talentum/escenic/plugins/authenticator/authenticators/DBAuthenticator.java
a5456633ff75e8f13705974c7ed1ce77f3f142d5
0
Analyze the following code function for security vulnerabilities
private Map<String, String> addEnvVariables(Map<String, String> envVariables) { envVariables.put(ProjectDirConstants.HOME_REPO_ENV_KEY, tempHomeDirectory.toString()); envVariables.put(BALLERINA_STAGE_CENTRAL, "true"); return envVariables; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addEnvVariables File: tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
addEnvVariables
tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
public void setTimerInterval(String value) { if (StringUtil.isNotNull(value)) { timerInterval = Integer.parseInt(value); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTimerInterval File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding prac...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setTimerInterval
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
private void updatePreferencesOrFinish(boolean isRecreatingActivity) { Intent intent = getActivity().getIntent(); int quality = intent.getIntExtra(LockPatternUtils.PASSWORD_TYPE_KEY, -1); if (quality == -1) { // If caller didn't specify password quality, show UI and a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updatePreferencesOrFinish File: src/com/android/settings/password/ChooseLockGeneric.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
updatePreferencesOrFinish
src/com/android/settings/password/ChooseLockGeneric.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
@Override public void release() { // }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: release File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
release
src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
public void refreshLinks(XWikiContext context) throws XWikiException { try { // refreshes all Links of each doc of the wiki @SuppressWarnings("deprecation") List<String> docs = getStore().getQueryManager().getNamedQuery("getAllDocuments") .addFilter(Utils....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshLinks File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
refreshLinks
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public Object getSameNodeConstraint() { return this; // in this way, any member that wants to run with the main guy can nominate the project itself }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSameNodeConstraint File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getSameNodeConstraint
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public void setPeriodicSyncTime(int authorityId, PeriodicSync targetPeriodicSync, long when) { boolean found = false; final AuthorityInfo authorityInfo; synchronized (mAuthorities) { authorityInfo = mAuthorities.get(authorityId); for (int i = 0; i < authorityInfo.periodic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPeriodicSyncTime File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
setPeriodicSyncTime
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
public void onLoadProgressChanged(int progress) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLoadProgressChanged File: components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java Repository: chromium The code follows secure ...
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onLoadProgressChanged
components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public long freeMemory() { return Runtime.getRuntime().freeMemory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: freeMemory File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
freeMemory
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public String getCategories() { return categories; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCategories File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
getCategories
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
public SerializationConfig setClassDefinitions(Set<ClassDefinition> classDefinitions) { this.classDefinitions = classDefinitions; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClassDefinitions File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
setClassDefinitions
hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private void decrementIndexes() { this.index--; if(this.previous=='\r' || this.previous == '\n') { this.line--; this.character=this.characterPreviousLine ; } else if(this.character > 0){ this.character--; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: decrementIndexes File: src/main/java/org/json/JSONTokener.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2022-45690
HIGH
7.5
stleary/JSON-java
decrementIndexes
src/main/java/org/json/JSONTokener.java
7a124d857dc8da1165c87fa788e53359a317d0f7
0
Analyze the following code function for security vulnerabilities
void removeStartingWindowAnimation(boolean prepareAnimation) { mTransferringSplashScreenState = TRANSFER_SPLASH_SCREEN_IDLE; if (mSharedStartingData != null) { mSharedStartingData.mAssociatedTask.forAllActivities(r -> { r.mSharedStartingData = null; }); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStartingWindowAnimation File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
removeStartingWindowAnimation
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public Collection<String> getTopLevelItemNames() { List<String> names = new ArrayList<String>(); for (TopLevelItem j : items.values()) names.add(j.getName()); return names; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTopLevelItemNames File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getTopLevelItemNames
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
Collection<Field<?>> getEditorFields() { Collection<Field<?>> fields = editorFieldGroup.getFields(); assert allAttached(fields); return fields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditorFields File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getEditorFields
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public List<String> getRevisions(RevisionCriteria criteria, XWikiContext context) throws XWikiException { List<String> results = new ArrayList<String>(); Version[] revisions = getRevisions(context); XWikiRCSNodeInfo nextNodeinfo = null; XWikiRCSNodeInfo nodeinfo; for (Versi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRevisions File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRevisions
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public void onUserStopping(@NonNull TargetUser user) { Slog.i(TAG, "onStopUser " + user); mService.purgeUserData(user.getUserIdentifier()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserStopping File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
onUserStopping
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public static void readExceptionWithFileNotFoundExceptionFromParcel( Parcel reply) throws FileNotFoundException { int code = reply.readExceptionCode(); if (code == 0) return; String msg = reply.readString(); if (code == 1) { throw new FileNotFoundException(msg); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readExceptionWithFileNotFoundExceptionFromParcel File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
readExceptionWithFileNotFoundExceptionFromParcel
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
@Override public String endParsing(String content, XWikiContext context) { // Using an XML comment is pretty safe, as extensions probably wouldn't work in other type // of documents, like RTF, CSV or JSON. String hook = "<!-- " + this.getClass().getCanonicalName() + " -->"; Strin...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endParsing File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follows secure cod...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
endParsing
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams hideActions(boolean hideActions) { this.mHideActions = hideActions; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hideActions File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
hideActions
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0