instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | protected JsonDeserializer<?> _findCustomReferenceDeserializer(ReferenceType type,
DeserializationConfig config, BeanDescription beanDesc,
TypeDeserializer contentTypeDeserializer, JsonDeserializer<?> contentDeserializer)
throws JsonMappingException
{
for (Deserializers d : ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _findCustomReferenceDeserializer
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | _findCustomReferenceDeserializer | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public String getTextWithoutAutocomplete() {
int autoCompleteIndex = getText().getSpanStart(mAutocompleteSpan);
if (autoCompleteIndex < 0) {
return getQueryText();
} else {
return getQueryText().substring(0, autoCompleteIndex);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTextWithoutAutocomplete
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | getTextWithoutAutocomplete | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | private void sendBroadcastUploadsAdded() {
Intent start = new Intent(getUploadsAddedMessage());
// nothing else needed right now
start.setPackage(getPackageName());
localBroadcastManager.sendBroadcast(start);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendBroadcastUploadsAdded
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | sendBroadcastUploadsAdded | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | public XmlGraphMLReader target(ExportConfig.NodeConfig targetConfig) {
this.target = targetConfig;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: target
File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
Repository: neo4j/apoc
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-23926 | HIGH | 8.1 | neo4j/apoc | target | core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java | 3202b421b21973b2f57a43b33c88f3f6901cfd2a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getDestination(String function, JobDomainPeasSessionController jobDomainSC,
HttpRequest request) {
String destination = "";
try {
if (!jobDomainSC.isAccessGranted()) {
throw new JobDomainPeasException("Bad right for user {0}", jobDomainSC.getUserId());
}
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-47324
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Bug #13811: fixing stored XSS leading to full account takeover
* making HTML sanitize processing accessible for JSTL instructions
* sanitizing user notification title and contents on registering
* sanit... | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | getDestination | core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 1 |
Analyze the following code function for security vulnerabilities | public void importFromMee6(CommandEvent commandEvent) {
RequestUtility.Request request = RequestUtility.Request
.builder()
.url("https://mee6.xyz/api/plugins/levels/leaderboard/" + commandEvent.getGuild().getId()).build();
JsonElement jsonElement = RequestUtility.request... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: importFromMee6
File: src/main/java/de/presti/ree6/commands/impl/mod/Import.java
Repository: Ree6-Applications/Ree6
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-39302 | MEDIUM | 5.4 | Ree6-Applications/Ree6 | importFromMee6 | src/main/java/de/presti/ree6/commands/impl/mod/Import.java | 459b5bc24f0ea27e50031f563373926e94b9aa0a | 0 |
Analyze the following code function for security vulnerabilities | private void clearIntentFilterVerificationsLPw(int userId) {
final int packageCount = mPackages.size();
for (int i = 0; i < packageCount; i++) {
PackageParser.Package pkg = mPackages.valueAt(i);
clearIntentFilterVerificationsLPw(pkg.packageName, userId);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearIntentFilterVerificationsLPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | clearIntentFilterVerificationsLPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private static byte[] classToByteArray(Class<?> clazz) throws ClassNotFoundException {
String fileName = clazz.getName();
int lastDot = fileName.lastIndexOf('.');
if (lastDot > 0) {
fileName = fileName.substring(lastDot + 1);
}
URL classUrl = clazz.getResource(fileNam... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: classToByteArray
File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
Repository: netty
The code follows secure coding practices. | [
"CWE-378",
"CWE-379"
] | CVE-2021-21290 | LOW | 1.9 | netty | classToByteArray | common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java | c735357bf29d07856ad171c6611a2e1a0e0000ec | 0 |
Analyze the following code function for security vulnerabilities | private static void crdtReplicationXmlGenerator(XmlGenerator gen, Config config) {
CRDTReplicationConfig replicationConfig = config.getCRDTReplicationConfig();
gen.open("crdt-replication");
if (replicationConfig != null) {
gen.node("replication-period-millis", replicationConfig.getRe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: crdtReplicationXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | crdtReplicationXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private int[] revokeUnusedSharedUserPermissionsLPw(SharedUserSetting su, int[] allUserIds) {
// Collect all used permissions in the UID
ArraySet<String> usedPermissions = new ArraySet<>();
final int packageCount = su.packages.size();
for (int i = 0; i < packageCount; i++) {
P... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: revokeUnusedSharedUserPermissionsLPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | revokeUnusedSharedUserPermissionsLPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public static <K, V> ConcurrentMap<K, V> newConcurrentHashMap(
int initialCapacity, float loadFactor, int concurrencyLevel) {
return new ConcurrentHashMap<K, V>(initialCapacity, loadFactor, concurrencyLevel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newConcurrentHashMap
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | newConcurrentHashMap | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Definition get(final String path, final Route.OneArgHandler handler) {
return appendDefinition(GET, path, handler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | get | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public void updateActivityUsageStats(String packageName, int userId, int event) {
if (DEBUG_SWITCH) {
Slog.d(TAG_SWITCH, "updateActivityUsageStats: package="
+ packageName + " event=" + event);
}
if (mUsageStatsService != null) {
mUsageStatsService.rep... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateActivityUsageStats
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateActivityUsageStats | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static SURL create(URL url) throws MalformedURLException {
if (url == null)
throw new MalformedURLException("URL cannot be null");
// ::comment when __CORE__
final String credentialId = url.getUserInfo();
if (credentialId == null || credentialId.indexOf(':') > 0)
// No user info at all, or a user... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: src/net/sourceforge/plantuml/security/SURL.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | create | src/net/sourceforge/plantuml/security/SURL.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void configure(ServletContextHandler context) {
context.setContextPath("/");
context.getSessionHandler().setMaxInactiveInterval(serverConfig.getSessionTimeout());
context.setInitParameter(EnvironmentLoader.ENVIRONMENT_CLASS_PARAM, DefaultWebEnvironment.class.getName());
context.addEventL... | Vulnerability Classification:
- CWE: CWE-552
- CVE: CVE-2022-39208
- Severity: HIGH
- CVSS Score: 7.5
Description: Fix security vulnerability issue regarding site/* access
Function: configure
File: server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.java
Repository: theonedev/onedev
Fixe... | [
"CWE-552"
] | CVE-2022-39208 | HIGH | 7.5 | theonedev/onedev | configure | server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.java | 8aa94e0daf8447cdf76d4f27bfda0a85a7ea5822 | 1 |
Analyze the following code function for security vulnerabilities | public JSONContext.Client getJSONContextClient() {
return _jsonContext;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJSONContextClient
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | getJSONContextClient | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public BigInteger bigIntegerValueExact() {
BigDecimal bd = bigDecimalValue();
if (bd.scale() <= bigIntegerScaleLimit) {
return bd.toBigIntegerExact();
}
throw new UnsupportedOperationException(
String.format(
"Scale value ... | Vulnerability Classification:
- CWE: CWE-834
- CVE: CVE-2023-4043
- Severity: HIGH
- CVSS Score: 7.5
Description: BigInteger scale limit counts absolute value now.
Signed-off-by: Tomáš Kraus <tomas.kraus@oracle.com>
Function: bigIntegerValueExact
File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
Repos... | [
"CWE-834"
] | CVE-2023-4043 | HIGH | 7.5 | eclipse-ee4j/parsson | bigIntegerValueExact | impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java | 85fe45ca2da6d7b79ec03014c928075bca01e588 | 1 |
Analyze the following code function for security vulnerabilities | private native void nativeShowInterstitialPage(
long nativeContentViewCoreImpl, String url, long nativeInterstitialPageDelegateAndroid); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeShowInterstitialPage
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeShowInterstitialPage | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void finalizeWorkProfileProvisioning(UserHandle managedProfileUser,
Account migratedAccount) {
Preconditions.checkCallAuthorization(
hasCallingOrSelfPermission(permission.MANAGE_PROFILE_AND_DEVICE_OWNERS));
if (!isManagedProfile(managedProfileUser.getIde... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finalizeWorkProfileProvisioning
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | finalizeWorkProfileProvisioning | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void initFromRefMessage(int action) {
setFieldsFromRefMessage(action);
// Check if To: address and email body needs to be prefilled based on extras.
// This is used for reporting rendering feedback.
if (MessageHeaderView.ENABLE_REPORT_RENDERING_PROBLEM) {
Intent inte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initFromRefMessage
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | initFromRefMessage | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void moveToStart() {
raiseIfKilled();
reset();
watermark = 0;
fileInputsIterator = fileInputs.iterator();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveToStart
File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
Repository: crate
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-24565 | MEDIUM | 6.5 | crate | moveToStart | server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java | 4e857d675683095945dd524d6ba03e692c70ecd6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void close() throws IOException {
if (!_closed) {
_closed = true;
_symbols.release();
try {
_closeInput();
} finally {
// as per [JACKSON-324], do in finally block
// Also, internal buffer(s) can... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | close | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | public static @NonNull Optional<String> readString(@NonNull File file) throws IOException {
try {
if (file.length() <= MAX_READ_STRING_SIZE) {
final String value = new String(Files.readAllBytes(file.toPath()),
StandardCharsets.UTF_8);
return Op... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readString
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | readString | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | private Schema getSchema(Source source, ThreadContext context) {
InputStream is;
VerifierFactory factory = new com.thaiopensource.relaxng.jarv.VerifierFactoryImpl();
if (source instanceof StreamSource) {
StreamSource ss = (StreamSource)source;
is = ss.getInputStream();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSchema
File: ext/java/nokogiri/XmlRelaxng.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | getSchema | ext/java/nokogiri/XmlRelaxng.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | public void setOutputRoot(String argOutputRoot) {
this.outputRoot = argOutputRoot;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOutputRoot
File: src/main/java/emissary/pickup/WorkBundle.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | setOutputRoot | src/main/java/emissary/pickup/WorkBundle.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void applyRestore(byte[] payload, int user) {
if (DBG) Slog.d(TAG, "applyRestore u=" + user + " payload="
+ (payload != null ? new String(payload, StandardCharsets.UTF_8) : null));
if (payload == null) {
Slog.w(TAG, "applyRestore: no p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyRestore
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | applyRestore | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | private void commitAttachments() {
if (conversation.getNextEncryption() == Message.ENCRYPTION_AXOLOTL && trustKeysIfNeeded(REQUEST_TRUST_KEYS_ATTACHMENTS)) {
return;
}
final List<Attachment> attachments = mediaPreviewAdapter.getAttachments();
final PresenceSelector.OnPresence... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: commitAttachments
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | commitAttachments | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | Call getRingingCall() {
return getFirstCallWithState(CallState.RINGING);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRingingCall
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getRingingCall | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public User getAuthUser(HttpServletRequest request) {
Session session = sessionService.getSession(request);
if (session == null) {
log.info("session info is null ");
return null;
}
// get user object from session
return userService.queryUser(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthUser
File: dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java
Repository: apache/dolphinscheduler
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-49068 | HIGH | 7.5 | apache/dolphinscheduler | getAuthUser | dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java | 359b1a7e5bb72790d2583971dc2d44a8481e3a10 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removeUser(Account user){
Driver driver = new SQLServerDriver();
String connectionUrl = "jdbc:sqlserver://n8bu1j6855.database.windows.net:1433;database=VoyagerDB;user=VoyageLogin@n8bu1j6855;password={GroupP@ssword};encrypt=true;hostNameInCertificate=*.database.windows.net;loginTimeout=30;";
... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2014-125074
- Severity: MEDIUM
- CVSS Score: 5.2
Description: fixed problems in register controller, and worked at preventing sql-injection in database access
Function: removeUser
File: Voyager/src/models/DatabaseAccess.java
Repository: Nayshlok/Voyager
Fixed Co... | [
"CWE-89"
] | CVE-2014-125074 | MEDIUM | 5.2 | Nayshlok/Voyager | removeUser | Voyager/src/models/DatabaseAccess.java | f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae | 1 |
Analyze the following code function for security vulnerabilities | private void doNotCache(HttpServletResponse response) {
response.setHeader("Expires", "Fri, 01 Jan 1980 00:00:00 GMT");
response.setHeader("Pragma", "no-cache");
response.setHeader("Cache-Control", "no-cache, max-age=0, must-revalidate");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doNotCache
File: server-core/src/main/java/io/onedev/server/git/GitFilter.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | doNotCache | server-core/src/main/java/io/onedev/server/git/GitFilter.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setDisablePreviewScreenshots(IBinder token, boolean disable)
throws RemoteException {
synchronized (this) {
final ActivityRecord r = ActivityRecord.isInStackLocked(token);
if (r == null) {
Slog.w(TAG, "setDisablePreviewScreenshots: Un... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDisablePreviewScreenshots
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setDisablePreviewScreenshots | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isSelected(final String fileName, final PlexusIoResource fileInfo) throws ArchiverException {
if (fileSelectors != null) {
for (FileSelector fileSelector : fileSelectors) {
try {
if (!fileSelector.isSelected(fileInfo)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSelected
File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
Repository: codehaus-plexus/plexus-archiver
The code follows secure coding practices. | [
"CWE-22",
"CWE-61"
] | CVE-2023-37460 | CRITICAL | 9.8 | codehaus-plexus/plexus-archiver | isSelected | src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java | 54759839fbdf85caf8442076f001d5fd64e0dcb2 | 0 |
Analyze the following code function for security vulnerabilities | public String getNamespace(String prefix) {
throw new RuntimeException("getNamespace() not supported");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNamespace
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getNamespace | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getLog() {
try(ResponseBody body = doGetLog()) {
return body.string();
} catch (IOException e) {
throw KubernetesClientException.launderThrowable(forOperationType("getLog"), e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLog
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | getLog | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | public void put(Env env, String path, Object request, Object... urlVariables) throws RestClientException {
execute(HttpMethod.PUT, env, path, request, null, urlVariables);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java
Repository: apolloconfig/apollo
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2020-15170 | MEDIUM | 6.8 | apolloconfig/apollo | put | apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java | ae9ba6cfd32ed80469f162e5e3583e2477862ddf | 0 |
Analyze the following code function for security vulnerabilities | public static boolean areActionsVisiblyDifferent(Notification first, Notification second) {
Notification.Action[] firstAs = first.actions;
Notification.Action[] secondAs = second.actions;
if (firstAs == null && secondAs != null || firstAs != null && secondAs == null) {
return true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: areActionsVisiblyDifferent
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | areActionsVisiblyDifferent | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void deleteApplication(String applicationName, String tenantDomain, String username)
throws IdentityApplicationManagementException {
ServiceProvider serviceProvider;
// invoking the listeners
Collection<ApplicationMgtListener> listeners = getApplicationMgtListen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteApplication
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-identity-... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | deleteApplication | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handleMessage(Message msg) {
synchronized(mLock) {
if (mActiveService == null) {
Log.d(TAG, "Dropping service response message; service no longer active.");
return;
} else if (!msg.replyTo.getBinder().equal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleMessage
File: src/com/android/nfc/cardemulation/HostEmulationManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35671 | MEDIUM | 5.5 | android | handleMessage | src/com/android/nfc/cardemulation/HostEmulationManager.java | 745632835f3d97513a9c2a96e56e1dc06c4e4176 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated // since 2.12
protected void _verifyNumberForScalarCoercion(DeserializationContext ctxt, JsonParser p) throws IOException
{
MapperFeature feat = MapperFeature.ALLOW_COERCION_OF_SCALARS;
if (!ctxt.isEnabled(feat)) {
// 31-Mar-2017, tatu: Since we don't know (or this deep, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _verifyNumberForScalarCoercion
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _verifyNumberForScalarCoercion | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | protected ID checkoutClassificationValue(Field field, Cell cell) {
final String val = cell.asString();
// 支持ID
ID vla2id = MetadataHelper.checkSpecEntityId(val, EntityHelper.ClassificationData);
if (vla2id != null) {
if (ClassificationManager.instance.getName(vla2id) != null... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkoutClassificationValue
File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | checkoutClassificationValue | src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | IBackupManager getIBackupManager() {
return IBackupManager.Stub.asInterface(
ServiceManager.getService(Context.BACKUP_SERVICE));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIBackupManager
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getIBackupManager | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public StompServer listen(Handler<AsyncResult<StompServer>> handler) {
return listen(options.getPort(), options.getHost(), handler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: listen
File: src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java
Repository: vert-x3/vertx-stomp
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-32081 | MEDIUM | 6.5 | vert-x3/vertx-stomp | listen | src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java | 0de4bc5a44ddb57e74d92c445f16456fa03f265b | 0 |
Analyze the following code function for security vulnerabilities | protected String getETag(Resource so) {
Date lastModified = new Date();
if (so != null && so.getLastModified() != null) {
lastModified = so.getLastModified();
}
return "W/\"" + Long.toString(lastModified.getTime()) + "\"";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getETag
File: core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java
Repository: opencrx
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-46502 | CRITICAL | 9.8 | opencrx | getETag | core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java | ce7a71db0bb34ecbcb0e822d40598e410a48b399 | 0 |
Analyze the following code function for security vulnerabilities | private boolean endCallInternal(String callingPackage) {
// Always operate on the foreground call if one exists, otherwise get the first call in
// priority order by call-state.
Call call = mCallsManager.getForegroundCall();
if (call == null) {
call = mCallsManager.getFirstCa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endCallInternal
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | endCallInternal | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | protected void addJobToSchedule(JobDetail job) {
loadedJobs.add(job);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addJobToSchedule
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-13990 | HIGH | 7.5 | quartz-scheduler/quartz | addJobToSchedule | quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java | a1395ba118df306c7fe67c24fb0c9a95a4473140 | 0 |
Analyze the following code function for security vulnerabilities | public boolean removeXObject(BaseObject object)
{
List<BaseObject> objects = this.xObjects.get(object.getXClassReference());
// No objects at all, nothing to remove
if (objects == null) {
return false;
}
// Sometimes the object vector is wrongly indexed, meaning t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeXObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | removeXObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private void sort(boolean userOriginated) {
// Set sort orders
// In-memory comparator
getDataCommunicator().setInMemorySorting(createSortingComparator(),
false);
// Back-end sort properties
List<QuerySortOrder> sortProperties = new ArrayList<>();
sortOrd... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sort
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | sort | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public String getPlatform(String projectId) {
Project project = baseProjectService.getProjectById(projectId);
return project.getPlatform();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPlatform
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getPlatform | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isInMemoryDatabase() {
synchronized (mLock) {
return mConfigurationLocked.isInMemoryDb();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInMemoryDatabase
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | isInMemoryDatabase | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | private Option<org.w3c.dom.Document> loadSmilDocument(final WorkingFileRepository workingFileRepository,
MediaPackage mp) {
return mlist(mp.getElements()).filter(MediaPackageSupport.Filters.isSmilCatalog).headOpt()
.map(new Function<MediaPackageElement, org.w3c.dom.Document>() {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadSmilDocument
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | loadSmilDocument | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
void tempWhitelistUidLocked(int targetUid, long duration, String tag) {
mPendingTempWhitelist.put(targetUid, new PendingTempWhitelist(targetUid, duration, tag));
setUidTempWhitelistStateLocked(targetUid, true);
mUiHandler.obtainMessage(PUSH_TEMP_WHITELIST_UI_MSG).sendToTar... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tempWhitelistUidLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | tempWhitelistUidLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void openGallery(final ActionListener response, int type){
if (!isGalleryTypeSupported(type)) {
throw new IllegalArgumentException("Gallery type "+type+" not supported on this platform.");
}
if (getActivity() == null) {
throw new RuntimeException("Cannot open galer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openGallery
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | openGallery | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public String getDestinationString(String transportName) {
mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
"getDestinationString");
synchronized (mTransports) {
final IBackupTransport transport = mTransports.get(transportName);
if (tra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDestinationString
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | getDestinationString | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | void removeReplacedWindowIfNeeded(WindowState replacement) {
for (int i = mChildren.size() - 1; i >= 0; i--) {
final WindowState win = mChildren.get(i);
if (win.removeReplacedWindowIfNeeded(replacement)) {
return;
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeReplacedWindowIfNeeded
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | removeReplacedWindowIfNeeded | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void createMonitoredItems(ServiceRequest service) throws UaException {
CreateMonitoredItemsRequest request = (CreateMonitoredItemsRequest) service.getRequest();
UInteger subscriptionId = request.getSubscriptionId();
Subscription subscription = subscriptions.get(subscriptionId);
T... | Vulnerability Classification:
- CWE: CWE-770
- CVE: CVE-2022-25897
- Severity: HIGH
- CVSS Score: 7.5
Description: Allow max MonitoredItems per session to be configured via OpcUaServerConfigLimits
Function: createMonitoredItems
File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/... | [
"CWE-770"
] | CVE-2022-25897 | HIGH | 7.5 | eclipse/milo | createMonitoredItems | opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java | 4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5 | 1 |
Analyze the following code function for security vulnerabilities | public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState()
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessesInErrorState
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getProcessesInErrorState | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | static <T, D extends T> T instantiate(String className, Class<T> type, D defaultValue) {
if (className == null) {
return defaultValue;
}
final Logger LOGGER = Logging.getLogger(GeoTools.class);
try {
Class<?> kind = Class.forName(className);
// step 1 ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: instantiate
File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
Repository: geotools
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2022-24818 | HIGH | 7.5 | geotools | instantiate | modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java | 4f70fa3234391dd0cda883a20ab0ec75688cba49 | 0 |
Analyze the following code function for security vulnerabilities | private void updateAuthStatusIconAndText(RemoteOperationResult result) {
mAuthStatusIcon = R.drawable.ic_alert; // the most common case in the switch below
switch (result.getCode()) {
case OK_SSL:
mAuthStatusIcon = R.drawable.ic_lock_white;
mAuthStatusText... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAuthStatusIconAndText
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | updateAuthStatusIconAndText | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | public static SessionManager getSessionManager(Long sessionTimeout, CacheManager cacheManager) {
DefaultWebSessionManager sessionManager = new CustomSessionManager();
sessionManager.setSessionIdUrlRewritingEnabled(false);
sessionManager.setDeleteInvalidSessions(true);
sessionManager.setS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSessionManager
File: backend/src/main/java/io/metersphere/commons/utils/ShiroUtils.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-45790 | CRITICAL | 9.8 | metersphere | getSessionManager | backend/src/main/java/io/metersphere/commons/utils/ShiroUtils.java | 5c5fd5102bceb05eb233c1d3c249edcfc665b8c2 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Object> getTaskProfile(String id) throws IOException, InterruptedException {
TaskExample e = new TaskExample();
e.createCriteria().andBareMetalIdEqualTo(id).andStatusIn(runningStatus);
List<TaskWithBLOBs> tasks = taskMapper.selectByExampleWithBLOBs(e);
if (tasks.isEmpt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTaskProfile
File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java
Repository: fit2cloud/rackshift
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-42405 | CRITICAL | 9.8 | fit2cloud/rackshift | getTaskProfile | rackshift-server/src/main/java/io/rackshift/service/TaskService.java | 305aea3b20d36591d519f7d04e0a25be05a51e93 | 0 |
Analyze the following code function for security vulnerabilities | public static String makeQueryString(final HttpServletRequest request, final Map<String,Object> additions, final String[] ignores, final IgnoreType ignoreType) {
if (request == null || additions == null || ignores == null || ignoreType == null) {
throw new IllegalArgumentException("Cannot take null ... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-0869
- Severity: MEDIUM
- CVSS Score: 6.1
Description: NMS-15294: Escaping parameter names in generated query strings
Function: makeQueryString
File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java
Repository: OpenNMS/opennms
Fixed Code:
public ... | [
"CWE-79"
] | CVE-2023-0869 | MEDIUM | 6.1 | OpenNMS/opennms | makeQueryString | opennms-web-api/src/main/java/org/opennms/web/api/Util.java | 66b4ba96a18b9952f25a350bbccc2a7e206238d1 | 1 |
Analyze the following code function for security vulnerabilities | private boolean hasLockscreenSecurity() {
LockPatternUtils lpu = new LockPatternUtils(getActivity());
return lpu.isSecure(UserHandle.myUserId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasLockscreenSecurity
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | hasLockscreenSecurity | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | private AuthorityInfo createAuthorityLocked(EndPoint info, int ident, boolean doWrite) {
AuthorityInfo authority;
if (ident < 0) {
ident = mNextAuthorityId;
mNextAuthorityId++;
doWrite = true;
}
if (Log.isLoggable(TAG, Log.VERBOSE)) {
Log.v... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createAuthorityLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | createAuthorityLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | private static List<Method> getMethodCaseInsensitive(Class<? extends Object> clazz, String methodName) {
List<Method> methodList = new ArrayList<Method>();
for (Method m : clazz.getMethods()) {
if (m.getName().toUpperCase().equals(methodName.toUpperCase())) {
methodList.add(m);
}
}
return meth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMethodCaseInsensitive
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | getMethodCaseInsensitive | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | 9dcd304688e65c31cac5532fe501b9816ed975ae | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void createsCountQueryForNestedReferenceCorrectly() {
assertCountQuery("select a.b from A a", "select count(a.b) from A a");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createsCountQueryForNestedReferenceCorrectly
File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practi... | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | createsCountQueryForNestedReferenceCorrectly | src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | public boolean allowAliasInStatements() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: allowAliasInStatements
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | allowAliasInStatements | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public boolean isResizable() {
return getState(false).resizable;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isResizable
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | isResizable | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean providesOrientation() {
return mStyleFillsParent;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: providesOrientation
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | providesOrientation | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private void wrapperSearchKeyword(Map<String, Object> data, String keywords) {
if (StringUtils.isNotEmpty(keywords)) {
List<Object> logs = (List<Object>) data.get("rows");
if (logs != null && !logs.isEmpty()) {
for (Object tLog : logs) {
Map<String, Ob... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wrapperSearchKeyword
File: service/src/main/java/com/zrlog/service/ArticleService.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | wrapperSearchKeyword | service/src/main/java/com/zrlog/service/ArticleService.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void sortResults(List<ResolveInfo> results) {
Collections.sort(results, mResolvePrioritySorter);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sortResults
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | sortResults | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
void getAnimationPosition(Point outPosition) {
// Always animate from zero because if the activity doesn't fill the task, the letterbox
// will fill the remaining area that should be included in the animation.
outPosition.set(0, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAnimationPosition
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getAnimationPosition | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public EmissaryResponse outboundOpenWorkSpace(final String place, final String space) {
final String placeUrl = KeyManipulator.getServiceHostURL(place);
final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientOpenWorkSpace.action");
final List<NameValuePair> nvps = new Array... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: outboundOpenWorkSpace
File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | outboundOpenWorkSpace | src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isCount() {
return this.count;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCount
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | isCount | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | public Entity<?> serialize(Object obj, Map<String, Object> formParams, String contentType, boolean isBodyNullable) throws ApiException {
Entity<?> entity;
if (contentType.startsWith("multipart/form-data")) {
MultiPart multiPart = new MultiPart();
for (Entry<String, Object> param: formParams.entrySet... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serialize
File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | serialize | samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public XWikiDocument copyDocument(DocumentReference newDocumentReference, boolean cloneArchive, XWikiContext context)
throws XWikiException
{
loadAttachments(context);
if (cloneArchive) {
loadArchive(context);
}
XWikiDocument newdoc = cloneInternal(newDocumentRef... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | copyDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public String getHidingToggleCaption() {
return getState(false).hidingToggleCaption;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHidingToggleCaption
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getHidingToggleCaption | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected LookupResult doGet(Object key) {
final String trimmedKey = StringUtils.trimToNull(key.toString());
if (trimmedKey == null) {
LOG.debug("A blank key was supplied");
return getEmptyResult();
}
LOG.debug("Beginning [{}] DNS resolution for ke... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doGet
File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2023-41045 | MEDIUM | 5.3 | Graylog2/graylog2-server | doGet | graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java | 466af814523cffae9fbc7e77bab7472988f03c3e | 0 |
Analyze the following code function for security vulnerabilities | public void cacheContentDefinition(String systemId, CmsXmlContentDefinition contentDefinition) {
String cacheKey = getCacheKeyForCurrentProject(systemId);
m_cacheContentDefinitions.put(cacheKey, contentDefinition);
if (LOG.isDebugEnabled()) {
LOG.debug(Messages.get().getBundle().key... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cacheContentDefinition
File: src/org/opencms/xml/CmsXmlEntityResolver.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3312 | MEDIUM | 4 | alkacon/opencms-core | cacheContentDefinition | src/org/opencms/xml/CmsXmlEntityResolver.java | 92e035423aa6967822d343e54392d4291648c0ee | 0 |
Analyze the following code function for security vulnerabilities | private Comparator getComparator() {
return new Comparator() {
public int compare(Object o1, Object o2) {
String[] arr1 = (String[]) o1;
String[] arr2 = (String[]) o2;
Integer i1 = new Integer(arr1[2]);
Integer i2 = new Integer(arr2[2]);
return i1.compareTo(i2);
}
};
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getComparator
File: src/java/talentum/escenic/plugins/authenticator/authenticators/DBAuthenticator.java
Repository: Bricco/authenticator-plugin
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2013-10013 | MEDIUM | 5.2 | Bricco/authenticator-plugin | getComparator | src/java/talentum/escenic/plugins/authenticator/authenticators/DBAuthenticator.java | a5456633ff75e8f13705974c7ed1ce77f3f142d5 | 0 |
Analyze the following code function for security vulnerabilities | private Map<String, String> addEnvVariables(Map<String, String> envVariables) {
envVariables.put(ProjectDirConstants.HOME_REPO_ENV_KEY, tempHomeDirectory.toString());
envVariables.put(BALLERINA_STAGE_CENTRAL, "true");
return envVariables;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addEnvVariables
File: tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java
Repository: ballerina-platform/ballerina-lang
The code follows secure coding practices. | [
"CWE-306"
] | CVE-2021-32700 | MEDIUM | 5.8 | ballerina-platform/ballerina-lang | addEnvVariables | tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java | 4609ffee1744ecd16aac09303b1783bf0a525816 | 0 |
Analyze the following code function for security vulnerabilities | public void setTimerInterval(String value) {
if (StringUtil.isNotNull(value)) {
timerInterval = Integer.parseInt(value);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTimerInterval
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding prac... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | setTimerInterval | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | private void updatePreferencesOrFinish(boolean isRecreatingActivity) {
Intent intent = getActivity().getIntent();
int quality = intent.getIntExtra(LockPatternUtils.PASSWORD_TYPE_KEY, -1);
if (quality == -1) {
// If caller didn't specify password quality, show UI and a... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePreferencesOrFinish
File: src/com/android/settings/password/ChooseLockGeneric.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | updatePreferencesOrFinish | src/com/android/settings/password/ChooseLockGeneric.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void release() {
//
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: release
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | release | src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | public void refreshLinks(XWikiContext context) throws XWikiException
{
try {
// refreshes all Links of each doc of the wiki
@SuppressWarnings("deprecation")
List<String> docs = getStore().getQueryManager().getNamedQuery("getAllDocuments")
.addFilter(Utils.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refreshLinks
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | refreshLinks | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public Object getSameNodeConstraint() {
return this; // in this way, any member that wants to run with the main guy can nominate the project itself
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSameNodeConstraint
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getSameNodeConstraint | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public void setPeriodicSyncTime(int authorityId, PeriodicSync targetPeriodicSync, long when) {
boolean found = false;
final AuthorityInfo authorityInfo;
synchronized (mAuthorities) {
authorityInfo = mAuthorities.get(authorityId);
for (int i = 0; i < authorityInfo.periodic... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPeriodicSyncTime
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | setPeriodicSyncTime | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public void onLoadProgressChanged(int progress) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLoadProgressChanged
File: components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java
Repository: chromium
The code follows secure ... | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | onLoadProgressChanged | components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public long freeMemory()
{
return Runtime.getRuntime().freeMemory();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: freeMemory
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | freeMemory | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public String getCategories() {
return categories;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCategories
File: src/main/java/cn/luischen/model/ContentDomain.java
Repository: WinterChenS/my-site
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29638 | MEDIUM | 5.4 | WinterChenS/my-site | getCategories | src/main/java/cn/luischen/model/ContentDomain.java | d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed | 0 |
Analyze the following code function for security vulnerabilities | public SerializationConfig setClassDefinitions(Set<ClassDefinition> classDefinitions) {
this.classDefinitions = classDefinitions;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClassDefinitions
File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | setClassDefinitions | hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void decrementIndexes() {
this.index--;
if(this.previous=='\r' || this.previous == '\n') {
this.line--;
this.character=this.characterPreviousLine ;
} else if(this.character > 0){
this.character--;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decrementIndexes
File: src/main/java/org/json/JSONTokener.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2022-45690 | HIGH | 7.5 | stleary/JSON-java | decrementIndexes | src/main/java/org/json/JSONTokener.java | 7a124d857dc8da1165c87fa788e53359a317d0f7 | 0 |
Analyze the following code function for security vulnerabilities | void removeStartingWindowAnimation(boolean prepareAnimation) {
mTransferringSplashScreenState = TRANSFER_SPLASH_SCREEN_IDLE;
if (mSharedStartingData != null) {
mSharedStartingData.mAssociatedTask.forAllActivities(r -> {
r.mSharedStartingData = null;
});
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeStartingWindowAnimation
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | removeStartingWindowAnimation | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public Collection<String> getTopLevelItemNames() {
List<String> names = new ArrayList<String>();
for (TopLevelItem j : items.values())
names.add(j.getName());
return names;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTopLevelItemNames
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getTopLevelItemNames | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | Collection<Field<?>> getEditorFields() {
Collection<Field<?>> fields = editorFieldGroup.getFields();
assert allAttached(fields);
return fields;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEditorFields
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getEditorFields | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public List<String> getRevisions(RevisionCriteria criteria, XWikiContext context) throws XWikiException
{
List<String> results = new ArrayList<String>();
Version[] revisions = getRevisions(context);
XWikiRCSNodeInfo nextNodeinfo = null;
XWikiRCSNodeInfo nodeinfo;
for (Versi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevisions
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRevisions | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onUserStopping(@NonNull TargetUser user) {
Slog.i(TAG, "onStopUser " + user);
mService.purgeUserData(user.getUserIdentifier());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUserStopping
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | onUserStopping | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public static void readExceptionWithFileNotFoundExceptionFromParcel(
Parcel reply) throws FileNotFoundException {
int code = reply.readExceptionCode();
if (code == 0) return;
String msg = reply.readString();
if (code == 1) {
throw new FileNotFoundException(msg);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readExceptionWithFileNotFoundExceptionFromParcel
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | readExceptionWithFileNotFoundExceptionFromParcel | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String endParsing(String content, XWikiContext context)
{
// Using an XML comment is pretty safe, as extensions probably wouldn't work in other type
// of documents, like RTF, CSV or JSON.
String hook = "<!-- " + this.getClass().getCanonicalName() + " -->";
Strin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endParsing
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
The code follows secure cod... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | endParsing | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | final StandardTemplateParams hideActions(boolean hideActions) {
this.mHideActions = hideActions;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hideActions
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | hideActions | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.