instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public int getInstallLocation() {
return android.provider.Settings.Global.getInt(mContext.getContentResolver(),
android.provider.Settings.Global.DEFAULT_INSTALL_LOCATION,
PackageHelper.APP_INSTALL_AUTO);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstallLocation
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getInstallLocation | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public float[] getAnimationScales() {
return new float[] { mWindowAnimationScaleSetting, mTransitionAnimationScaleSetting,
mAnimatorDurationScaleSetting };
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAnimationScales
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | getAnimationScales | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Column(name = "menu", nullable = false)
public boolean isMenu() {
return this.menu;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMenu
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2018-18927 | LOW | 3.5 | sanluan/PublicCMS | isMenu | publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java | 2b411dc2821c69539138aaf7632b938b659a58fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean providesPatternDao() {
return providePatternDao;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: providesPatternDao
File: src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java
Repository: KrailOrg/krail-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-15018 | MEDIUM | 5.2 | KrailOrg/krail-jpa | providesPatternDao | src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java | c1e848665492e21ef6cc9be443205e36b9a1f6be | 0 |
Analyze the following code function for security vulnerabilities | public static File createTempFile(String ext) throws IOException {
return File.createTempFile("okm", "." + ext);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createTempFile
File: src/main/java/com/openkm/util/FileUtils.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-377"
] | CVE-2022-3969 | MEDIUM | 5.5 | openkm/document-management-system | createTempFile | src/main/java/com/openkm/util/FileUtils.java | c069e4d73ab8864345c25119d8459495f45453e1 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public WearableExtender setHintShowBackgroundOnly(boolean hintShowBackgroundOnly) {
setFlag(FLAG_HINT_SHOW_BACKGROUND_ONLY, hintShowBackgroundOnly);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHintShowBackgroundOnly
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setHintShowBackgroundOnly | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private boolean bindHeaderTextSecondary(RemoteViews contentView, StandardTemplateParams p,
boolean hasTextToLeft) {
if (p.mHideSubText) {
return false;
}
if (!TextUtils.isEmpty(p.headerTextSecondary)) {
contentView.setTextViewText(R.id.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindHeaderTextSecondary
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | bindHeaderTextSecondary | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean canBeAnimationTarget() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canBeAnimationTarget
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | canBeAnimationTarget | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public static void extractRelativeResource(Class<?> c, String path, File dest) throws
FileNotFoundException, IOException {
InputStream in = c.getResourceAsStream(path);
OutputStream out = new FileOutputStream(dest);
byte[] buf = new byte[1024];
int len = in.read(buf);
while... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractRelativeResource
File: src/main/java/org/lemsml/jlems/io/util/JUtil.java
Repository: LEMS/jLEMS
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4583 | HIGH | 8.8 | LEMS/jLEMS | extractRelativeResource | src/main/java/org/lemsml/jlems/io/util/JUtil.java | 8c224637d7d561076364a9e3c2c375daeaf463dc | 0 |
Analyze the following code function for security vulnerabilities | private void setTimeFromNITZString (String nitz, long nitzReceiveTime) {
// "yy/mm/dd,hh:mm:ss(+/-)tz"
// tz is in number of quarter-hours
long start = SystemClock.elapsedRealtime();
if (DBG) {log("NITZ: " + nitz + "," + nitzReceiveTime +
" start=" + start + " de... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2016-3831
- Severity: MEDIUM
- CVSS Score: 5.0
Description: backport security fix: avoid set NITZ time to 2038
Bug: 29083635
Change-Id: I21c5f4147d8146f92b7e33f0967a179ae644a263
Function: setTimeFromNITZString
File: src/java/com/android/internal/telephony/gsm/G... | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | setTimeFromNITZString | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 1 |
Analyze the following code function for security vulnerabilities | @Test
public void createsCountQueryForDistinctQueries() throws Exception {
assertCountQuery("select distinct u from User u where u.foo = ?",
"select count(distinct u) from User u where u.foo = ?");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createsCountQueryForDistinctQueries
File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | createsCountQueryForDistinctQueries | src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addBTEItems(Context c, List<Collection> mycollections,
String sourceDir, String mapFile, boolean template, String inputType, String workingDir) throws Exception
{
//Determine the folder where BTE will output the results
String outputFolder = null;
if (workingDir ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addBTEItems
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | addBTEItems | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<String> searchDocuments(String wheresql, int nb, int start) throws XWikiException
{
return this.xwiki.getStore().searchDocumentsNames(wheresql, nb, start, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: searchDocuments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | searchDocuments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject saveFile() {
JSONObject array = new JSONObject();
try {
String content = this.get.get("content");
content = FileManagerUtils.decodeContent(content);
// before bakup
bakupFile(new File(getRealFilePath()));
FileManagerUtils.w... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveFile
File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java
Repository: jflyfox/jfinal_cms
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2021-37262 | MEDIUM | 5 | jflyfox/jfinal_cms | saveFile | src/main/java/com/jflyfox/modules/filemanager/FileManager.java | e7fd0fe9362464c4d2bd308318eecc89a847b116 | 0 |
Analyze the following code function for security vulnerabilities | public static String generatePageId(String pageName) {
try {
String encoded = new String(Base64.encodeBase64(pageName.getBytes("utf-8")), "us-ascii");
encoded = encoded.replace('/', '_'); //base64 can contain "/" so we have to replace them
return encoded;
} catch (UnsupportedEncodingException e) {
throw... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generatePageId
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | generatePageId | src/main/java/org/olat/modules/wiki/WikiManager.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void invoke(Request request, Response response) throws IOException, ServletException {
String characterEncoding = getCharacterEncoding();
if (characterEncoding != null) {
request.setCharacterEncoding(characterEncoding);
}
// Look for unauthorized status
... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2015-3158
- Severity: MEDIUM
- CVSS Score: 4.0
Description: [PLINK-708] - Checking if user is authorized right after authentication.
Function: invoke
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPV... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | invoke | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 1 |
Analyze the following code function for security vulnerabilities | public void writeRecords(final Object iRecords, final String iFetchPlan, String iFormat, final String accept) throws IOException {
writeRecords(iRecords, iFetchPlan, iFormat, accept, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeRecords
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | writeRecords | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | public static String getCurrentDescriptorByNameUrl() {
return Descriptor.getCurrentDescriptorByNameUrl();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentDescriptorByNameUrl
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getCurrentDescriptorByNameUrl | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | public static int[] uncompressIntArray(byte[] input, int offset, int length)
throws IOException
{
int uncompressedLength = Snappy.uncompressedLength(input, offset, length);
int[] result = new int[uncompressedLength / 4];
impl.rawUncompress(input, offset, length, result, 0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uncompressIntArray
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | uncompressIntArray | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getModalTitle() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getModalTitle
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | getModalTitle | src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | public static Set<String> getAccessibleProperties(Class cls)
{
/** @todo This is a hack to get the "real" class - find out if there is
an API method in CGLIB that can be used instead */
if (cls.getName().contains("EnhancerByCGLIB"))
cls = cls.getSuperclass();
if (!accessibleProperties... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccessibleProperties
File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/InterfaceGenerator.java
Repository: seam2/jboss-seam
The code follows secure coding practices. | [
"CWE-264",
"CWE-200"
] | CVE-2013-6447 | MEDIUM | 5 | seam2/jboss-seam | getAccessibleProperties | jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/InterfaceGenerator.java | 090aa6252affc978a96c388e3fc2c1c2688d9bb5 | 0 |
Analyze the following code function for security vulnerabilities | public void removeContentProviderExternal(String name, IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContentProviderExternal
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | removeContentProviderExternal | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | protected Padding getPadding() {
return padding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPadding
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | getPadding | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | private void handleFinancedDeviceKioskRoleChange() {
if (!isPolicyEngineForFinanceFlagEnabled()) {
return;
}
Slog.i(LOG_TAG, "Handling action " + ACTION_DEVICE_FINANCING_STATE_CHANGED);
Intent intent = new Intent(ACTION_DEVICE_FINANCING_STATE_CHANGED);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleFinancedDeviceKioskRoleChange
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | handleFinancedDeviceKioskRoleChange | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private String[] toStringArray(Iterable iterable)
{
List<String> args = new ArrayList<String>();
for (Object obj : iterable) {
args.add(String.valueOf(obj));
}
return args.toArray(new String[args.size()]);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toStringArray
File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-query/src/main/java/org/xwiki/query/solr/internal/SolrQueryExecutor.java
Repository: xwiki/xwiki-platf... | [
"CWE-285"
] | CVE-2023-48241 | HIGH | 7.5 | xwiki/xwiki-platform | toStringArray | xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-query/src/main/java/org/xwiki/query/solr/internal/SolrQueryExecutor.java | 93b8ec702d7075f0f5794bb05dfb651382596764 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLowMemory() {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLowMemory
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onLowMemory | Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private Properties loadFromStream(InputStream stream) {
Properties properties = new Properties();
try {
properties.load(stream);
} catch (IOException e) {
throw new HotRodClientException("Issues configuring from client hotrod-client.properties", e);
}
return properties;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadFromStream
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | loadFromStream | client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java | efc44b7b0a5dd4f44773808840dd9785cabcf21c | 0 |
Analyze the following code function for security vulnerabilities | public int getRequestedPasswordMinimumSymbols(int userId) {
return getDevicePolicyManager().getPasswordMinimumSymbols(null, userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestedPasswordMinimumSymbols
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | getRequestedPasswordMinimumSymbols | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | public void onPageFinished(WebView view, String url) {
parent.fireWebEvent("onLoad", new ActionEvent(url));
super.onPageFinished(view, url);
setShouldCalcPreferredSize(true);
dismissProgress();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPageFinished
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onPageFinished | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private static int handleVmArgs(JavaConfig javaConfig) {
if (javaConfig.getLaunchProperties() == null) {
System.out.println("Launch properties file was not specified!");
return EXIT_FAILURE;
}
System.out.println(javaConfig.getLaunchProperties().getVmArgs());
return EXIT_SUCCESS;
} | Vulnerability Classification:
- CWE: CWE-77
- CVE: CVE-2023-22671
- Severity: CRITICAL
- CVSS Score: 9.8
Description: GP-2987: No longer using eval in launch.sh
Function: handleVmArgs
File: GhidraBuild/LaunchSupport/src/main/java/LaunchSupport.java
Repository: NationalSecurityAgency/ghidra
Fixed Code:
private static... | [
"CWE-77"
] | CVE-2023-22671 | CRITICAL | 9.8 | NationalSecurityAgency/ghidra | handleVmArgs | GhidraBuild/LaunchSupport/src/main/java/LaunchSupport.java | 1640b544c3d99b5ce8a89d9ca4b540da22be3a0e | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean equals(Object o) {
return o instanceof DefaultHttpHeaders
&& headers.equals(((DefaultHttpHeaders) o).headers, CASE_SENSITIVE_HASHER);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | equals | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | Right getLikeRight(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLikeRight
File: xwiki-platform-core/xwiki-platform-like/xwiki-platform-like-api/src/main/java/org/xwiki/like/LikeManager.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2023-35152 | HIGH | 8.8 | xwiki/xwiki-platform | getLikeRight | xwiki-platform-core/xwiki-platform-like/xwiki-platform-like-api/src/main/java/org/xwiki/like/LikeManager.java | 0993a7ab3c102f9ac37ffe361a83a3dc302c0e45 | 0 |
Analyze the following code function for security vulnerabilities | protected Lock getSessionLock(WrappedSession wrappedSession) {
Object lock = wrappedSession.getAttribute(getLockAttributeName());
if (lock instanceof ReentrantLock) {
return (ReentrantLock) lock;
}
if (lock == null) {
return null;
}
throw new Ru... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSessionLock
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | getSessionLock | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | Transformer getTransformer() throws TransformerConfigurationException {
if (transformer == null) {
transformer = TransformerFactory.newInstance().newTransformer();
transformer.setOutputProperty(OutputKeys.INDENT, "yes");
transformer.setOutputProperty("{http://xml.apache.org/x... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2020-36640
- Severity: MEDIUM
- CVSS Score: 4.9
Description: fix(vulnerabilities): fix XXE attacks vulnerabilities and other code smell (#17)
* Access to external entities and network access should always be
disable to avoid XXS attacks vulnerabilities.
* Log ... | [
"CWE-611"
] | CVE-2020-36640 | MEDIUM | 4.9 | bonitasoft/bonita-connector-webservice | getTransformer | src/main/java/org/bonitasoft/connectors/ws/SecureWSConnector.java | a12ad691c05af19e9061d7949b6b828ce48815d5 | 1 |
Analyze the following code function for security vulnerabilities | public char next(char c) throws JSONException {
char n = this.next();
if (n != c) {
if(n > 0) {
throw this.syntaxError("Expected '" + c + "' and instead saw '" +
n + "'");
}
throw this.syntaxError("Expected '" + c + "' and inste... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: next
File: src/main/java/org/json/JSONTokener.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2022-45690 | HIGH | 7.5 | stleary/JSON-java | next | src/main/java/org/json/JSONTokener.java | 7a124d857dc8da1165c87fa788e53359a317d0f7 | 0 |
Analyze the following code function for security vulnerabilities | public String getRealm() {
// Assumption that issuer contains realm name
return token.getIssuer().substring(token.getIssuer().lastIndexOf('/') + 1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRealm
File: core/src/main/java/org/keycloak/KeycloakSecurityContext.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2020-1714 | MEDIUM | 6.5 | keycloak | getRealm | core/src/main/java/org/keycloak/KeycloakSecurityContext.java | d5483d884de797e2ef6e69f92085bc10bf87e864 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean prepareSync() {
if (!super.prepareSync()) {
return false;
}
// In the WindowContainer implementation we immediately mark ready
// since a generic WindowContainer only needs to wait for its
// children to finish and is immediately ready from its o... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: prepareSync
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | prepareSync | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public void run() {
try {
for (; ; ) {
byte[] buf = new byte[8192];
int l = out.read(buf);
InputStreamReader r = new InputStreamReader(new ByteArrayInputStream(buf, 0, l));
StringBuilder sb = new StringBuilder();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: run
File: hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java
Repository: hawtio
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2014-0120 | MEDIUM | 6.8 | hawtio | run | hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java | b4e23e002639c274a2f687ada980118512f06113 | 0 |
Analyze the following code function for security vulnerabilities | public List<DeletedAttachment> getDeletedAttachments(String docName)
{
try {
List<com.xpn.xwiki.doc.DeletedAttachment> attachments =
this.xwiki.getDeletedAttachments(docName, this.context);
if (attachments == null || attachments.isEmpty()) {
attachment... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeletedAttachments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getDeletedAttachments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public boolean isInInlineEditMode()
{
String currentURL = getDriver().getCurrentUrl();
// Keep checking the deprecated inline action for backward compatibility.
return currentURL.contains("editor=inline") || currentURL.contains("/inline/");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInInlineEditMode
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | isInInlineEditMode | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isLast() throws SQLException {
checkClosed();
if (onInsertRow) {
return false;
}
List<Tuple> rows = castNonNull(this.rows, "rows");
final int rows_size = rows.size();
if (rows_size == 0) {
return false; // No rows.
}
if (currentRow != (rows_size ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLast
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | isLast | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<ActivityManager.AppTask> getAppTasks(String pkgName, int uid) {
ArrayList<ActivityManager.AppTask> tasks = new ArrayList<>();
List<IBinder> appTasks = ActivityTaskManagerService.this.getAppTasks(pkgName, uid);
int numAppTasks = appTasks.size();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppTasks
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getAppTasks | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getFeature(final String key) throws SAXNotRecognizedException {
if (!getRecognizedFeatures().contains(key)) throw new SAXNotRecognizedException(key);
return features.get(key) == Boolean.TRUE;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFeature
File: src/java/org/orbeon/oxf/xml/xerces/XercesSAXParserFactoryImpl.java
Repository: orbeon/orbeon-forms
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2010-3260 | MEDIUM | 6.4 | orbeon/orbeon-forms | getFeature | src/java/org/orbeon/oxf/xml/xerces/XercesSAXParserFactoryImpl.java | aba6681660f65af7f1676434da68c10298c30200 | 0 |
Analyze the following code function for security vulnerabilities | private ObjectNode getNestedOptions(ImportingJob job, TreeImportingParserBase parser) {
ObjectNode options = parser.createParserUIInitializationData(
job, new LinkedList<>(), "text/json");
ArrayNode path = ParsingUtilities.mapper.createArrayNode();
path.add("results");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNestedOptions
File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | getNestedOptions | main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java | 79994e86da1a3eecc62723f4ba90f14a63ad0e72 | 0 |
Analyze the following code function for security vulnerabilities | public void requestPinShortcut(Context context, ShortcutInfo shortcutInfo) {
ShortcutManager sm = context.getSystemService(ShortcutManager.class);
sm.requestPinShortcut(shortcutInfo, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestPinShortcut
File: src/com/android/settings/notification/NotificationBackend.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35667 | HIGH | 7.8 | android | requestPinShortcut | src/com/android/settings/notification/NotificationBackend.java | d8355ac47e068ad20c6a7b1602e72f0585ec0085 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTaskResizeable(int taskId, boolean resizeable) {
synchronized (this) {
TaskRecord task = mStackSupervisor.anyTaskForIdLocked(taskId, false);
if (task == null) {
Slog.w(TAG, "setTaskResizeable: taskId=" + taskId + " not found");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTaskResizeable
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | setTaskResizeable | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public void scheduleLocalNotification(LocalNotification notif, long firstTime, int repeat) {
final Intent notificationIntent = new Intent(getContext(), LocalNotificationPublisher.class);
notificationIntent.setAction(getContext().getApplicationInfo().packageName + "." + notif.getId());
notificat... | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2022-4903
- Severity: MEDIUM
- CVSS Score: 5.1
Description: Fixed #3583 Pending Intent vulnerability
Function: scheduleLocalNotification
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
Fixed Code... | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | scheduleLocalNotification | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 1 |
Analyze the following code function for security vulnerabilities | public String getSkinPreference(String prefname, XWikiContext context)
{
return getSkinPreference(prefname, "", context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSkinPreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getSkinPreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | List<PlatformStatusDTO> getTransitions(String issueKey); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTransitions
File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getTransitions | framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setBufferSize(int arg0) {
// ignore
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBufferSize
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | setBufferSize | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onCreate() {
/*
* We use the cache dir as a temporary directory (since Android doesn't give us one) so
* on startup we'll clean up any .tmp files from the last run.
*/
final File[] files = getContext().getCacheDir().listFiles();
if (files ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: provider_src/com/android/email/provider/AttachmentProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3918 | MEDIUM | 4.3 | android | onCreate | provider_src/com/android/email/provider/AttachmentProvider.java | 6b2b0bd7c771c698f11d7be89c2c57c8722c7454 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void saveTransNull(TestContext context) {
postgresClient = createFoo(context);
AsyncResult<SQLConnection> trans = null;
setRootLevel(Level.FATAL);
postgresClient.save(trans, FOO, xPojo, context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveTransNull
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | saveTransNull | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public SerializationConfig setEnableCompression(boolean enableCompression) {
this.enableCompression = enableCompression;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEnableCompression
File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | setEnableCompression | hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void initFromSpinner(Bundle bundle, int action) {
if (action == EDIT_DRAFT && mDraft.draftType == UIProvider.DraftType.COMPOSE) {
action = COMPOSE;
}
mFromSpinner.initialize(action, mAccount, mAccounts, mRefMessage);
if (bundle != null) {
if (bundle.conta... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initFromSpinner
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | initFromSpinner | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public boolean killPids(int[] pids, String pReason, boolean secure) {
if (Binder.getCallingUid() != SYSTEM_UID) {
throw new SecurityException("killPids only available to the system");
}
String reason = (pReason == null) ? "Unknown" : pReason;
// XXX Note: don't acquire main a... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: killPids
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | killPids | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | List<DemandDTO> getDemandList(String projectId); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDemandList
File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getDemandList | framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public void windowsChanged(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: windowsChanged
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | windowsChanged | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public <T> List<T> search(String sql, int nb, int start, XWikiContext context) throws XWikiException
{
return getStore().search(sql, nb, start, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: search
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | search | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | protected UriBuilder getUriBuilder(Class<?> resource)
{
return UriBuilder.fromUri(getBaseURL()).path(resource);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUriBuilder
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getUriBuilder | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | void requestPssAllProcsLocked(long now, boolean always, boolean memLowered) {
if (!always) {
if (now < (mLastFullPssTime +
(memLowered ? mConstants.FULL_PSS_LOWERED_INTERVAL
: mConstants.FULL_PSS_MIN_INTERVAL))) {
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestPssAllProcsLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | requestPssAllProcsLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void notifyChange(Uri uri, IContentObserver observer,
boolean observerWantsSelfNotifications, boolean syncToNetwork) {
notifyChange(uri, observer, observerWantsSelfNotifications, syncToNetwork,
UserHandle.getCallingUserId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyChange
File: services/core/java/com/android/server/content/ContentService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2426 | MEDIUM | 4.3 | android | notifyChange | services/core/java/com/android/server/content/ContentService.java | 63363af721650e426db5b0bdfb8b2d4fe36abdb0 | 0 |
Analyze the following code function for security vulnerabilities | public void setMinTimeFrameUnits(TimeFrameUnits minTimeFrameUnits) {
this.minTimeFrameUnits = minTimeFrameUnits;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMinTimeFrameUnits
File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
Repository: openmrs/openmrs-module-appointmentscheduling
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4727 | MEDIUM | 6.1 | openmrs/openmrs-module-appointmentscheduling | setMinTimeFrameUnits | api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java | 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8 | 0 |
Analyze the following code function for security vulnerabilities | public String getString(String path, Map<String, ?> queryParams) throws Exception
{
return getString(getBaseURL(), path, queryParams);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getString
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getString | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onCreate() {
// TODO Auto-generated method stub
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java
Repository: hgzojer/vocabletrainer
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2017-20181 | MEDIUM | 4.3 | hgzojer/vocabletrainer | onCreate | src/at/hgz/vocabletrainer/VocableTrainerProvider.java | accf6838078f8eb105cfc7865aba5c705fb68426 | 0 |
Analyze the following code function for security vulnerabilities | void requestTraversal() {
synchronized (mWindowMap) {
requestTraversalLocked();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestTraversal
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | requestTraversal | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onActivityResult(int requestCode, int resultCode, @Nullable Intent data) {
super.onActivityResult(requestCode, resultCode, data);
if (requestCode == REQUEST_CODE_QR_SCAN) {
if (data == null) {
return;
}
String result = dat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onActivityResult
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | onActivityResult | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M2")
public BaseObject addObjectFromRequest(String className, String prefix, XWikiContext context) throws XWikiException
{
return addObjectFromRequest(className, prefix, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | addObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | private boolean extractSearchParamsR5CapabilityStatement(IBaseResource theConformance, String resourceName, TreeSet<String> includes, TreeSet<String> theRevIncludes, TreeSet<String> sortParams,
boolean haveSearchParams, List<List<String>> queryIncludes) {
org.hl7.fhir.r5.model.CapabilityStatement conformance = (or... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractSearchParamsR5CapabilityStatement
File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-24301 | MEDIUM | 4.3 | hapifhir/hapi-fhir | extractSearchParamsR5CapabilityStatement | hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java | adb3734fcbbf9a9165445e9ee5eef168dbcaedaf | 0 |
Analyze the following code function for security vulnerabilities | public IdStrategyEnum getResourceServerIdStrategy() {
return myResourceServerIdStrategy;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResourceServerIdStrategy
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | getResourceServerIdStrategy | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onHostCardEmulationDeactivated() {
if (mCardEmulationManager != null) {
mCardEmulationManager.onHostCardEmulationDeactivated();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onHostCardEmulationDeactivated
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | onHostCardEmulationDeactivated | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | public static final void setStartTimes(long elapsedRealtime, long uptimeMillis) {
sStartElapsedRealtime = elapsedRealtime;
sStartUptimeMillis = uptimeMillis;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStartTimes
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | setStartTimes | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | private void maybeWarnAboutDependencies(
Class<? extends Component> componentClass, List<String> jsDeps) {
if (warnedAboutDeps.add(componentClass)) {
for (String jsDep : jsDeps) {
if (bundledImports != null && !bundledImports.contains(jsDep)) {
getLogg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeWarnAboutDependencies
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | maybeWarnAboutDependencies | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | private String getDevicePolicyManagementRoleHolderPackageName(Context context) {
RoleManager roleManager = context.getSystemService(RoleManager.class);
List<String> roleHolders =
roleManager.getRoleHolders(RoleManager.ROLE_DEVICE_POLICY_MANAGEMENT);
if (roleHolders.isEmpty()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDevicePolicyManagementRoleHolderPackageName
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getDevicePolicyManagementRoleHolderPackageName | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void init(Object obj) {
ViewContext context = (ViewContext) obj;
this.request = context.getRequest();
ctx = context.getVelocityContext();
this.hostWebAPI = WebAPILocator.getHostWebAPI();
} | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2012-1826
- Severity: MEDIUM
- CVSS Score: 6.0
Description: #261
Function: init
File: src/com/dotmarketing/viewtools/XsltTool.java
Repository: dotCMS/core
Fixed Code:
public void init(Object obj) {
if(!Config.getBooleanProperty("ENABLE_SCRIPTING", false)){
... | [
"CWE-264"
] | CVE-2012-1826 | MEDIUM | 6 | dotCMS/core | init | src/com/dotmarketing/viewtools/XsltTool.java | b6b15c45fd550db7f1103e6aeab8780465855c29 | 1 |
Analyze the following code function for security vulnerabilities | private void setModelConfig() {
String modelConfigStr = prop.getProperty(MODEL_CONFIG, null);
Type type = new TypeToken<Map<String, Map<String, JsonObject>>>() {}.getType();
if (modelConfigStr != null) {
this.modelConfig = JsonUtils.GSON.fromJson(modelConfigStr, type);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setModelConfig
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | setModelConfig | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | private boolean yieldIfContendedHelper(boolean throwIfUnsafe, long sleepAfterYieldDelay) {
acquireReference();
try {
return getThreadSession().yieldTransaction(sleepAfterYieldDelay, throwIfUnsafe, null);
} finally {
releaseReference();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: yieldIfContendedHelper
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | yieldIfContendedHelper | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | static String guessBetterFormat(ImportingJob job, String bestFormat) {
ObjectNode retrievalRecord = job.getRetrievalRecord();
return retrievalRecord != null ? guessBetterFormat(job, retrievalRecord, bestFormat) : bestFormat;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: guessBetterFormat
File: main/src/com/google/refine/importing/ImportingUtilities.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | guessBetterFormat | main/src/com/google/refine/importing/ImportingUtilities.java | e243e73e4064de87a913946bd320fbbe246da656 | 0 |
Analyze the following code function for security vulnerabilities | ActivityOptions takeOptions() {
if (DEBUG_TRANSITION) Slog.i(TAG, "Taking options for " + this + " callers="
+ Debug.getCallers(6));
if (mPendingOptions == null) return null;
final ActivityOptions opts = mPendingOptions;
mPendingOptions = null;
// Strip sensitive ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: takeOptions
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | takeOptions | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void refreshDetails() {
Set<Object> visibleItemIds = new HashSet<Object>(
itemIdToDetailsComponent.keySet());
for (Object itemId : visibleItemIds) {
destroyDetails(itemId);
createDetails(itemId);
refreshRow(itemId);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refreshDetails
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | refreshDetails | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public ArrayList<Pair<AuthorityInfo, SyncStatusInfo>> getCopyOfAllAuthoritiesWithSyncStatus() {
synchronized (mAuthorities) {
ArrayList<Pair<AuthorityInfo, SyncStatusInfo>> infos =
new ArrayList<Pair<AuthorityInfo, SyncStatusInfo>>(mAuthorities.size());
for (int i = 0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCopyOfAllAuthoritiesWithSyncStatus
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | getCopyOfAllAuthoritiesWithSyncStatus | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public static void createParentDir(File f, String eMsg) throws IOException {
File parent = f.getParentFile();
if (!parent.isDirectory() && !parent.mkdirs()) {
throw new IOException("Cant create directory " + (eMsg == null ? parent : eMsg));
}
} | Vulnerability Classification:
- CWE: CWE-345, CWE-94, CWE-22
- CVE: CVE-2019-10182
- Severity: MEDIUM
- CVSS Score: 5.8
Description: Fixed bug when relative path (..) could leak up (even out of cache) - CVE-2019-10182
* netx/net/sourceforge/jnlp/cache/CacheUtil.java: if path or query contains .. is saved to cache via... | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | createParentDir | core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java | 2ab070cdac087bd208f64fa8138bb709f8d7680c | 1 |
Analyze the following code function for security vulnerabilities | public static boolean hasShortcutsPermission(Context context) {
try {
return context.getSystemService(LauncherApps.class).hasShortcutHostPermission();
} catch (SecurityException | IllegalStateException e) {
Log.e(TAG, "Failed to make shortcut manager call", e);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasShortcutsPermission
File: src/com/android/launcher3/util/PackageManagerHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-40097 | HIGH | 7.8 | android | hasShortcutsPermission | src/com/android/launcher3/util/PackageManagerHelper.java | 6c9a41117d5a9365cf34e770bbb00138f6bf997e | 0 |
Analyze the following code function for security vulnerabilities | public void start(final String... args) {
try {
start(args, null);
} catch (Throwable x) {
stop();
String msg = "An error occurred while starting the application:";
if (throwBootstrapException) {
throw new Err(Status.SERVICE_UNAVAILABLE, msg, x);
} else {
logger(thi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: start
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | start | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SyncNotedAppOp startProxyOperation(@NonNull IBinder clientId, int code,
@NonNull AttributionSource attributionSource, boolean startIfModeDefault,
boolean shouldCollectAsyncNotedOp, String message, boolean shouldCollectMessage,
boolean skipProxyOpe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startProxyOperation
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | startProxyOperation | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private TelephonyManager getTelephonyManager(int subId) {
return ((TelephonyManager) mContext.getSystemService(Context.TELEPHONY_SERVICE))
.createForSubscriptionId(subId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTelephonyManager
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | getTelephonyManager | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | void setQuotedExecutableEnabled( boolean quotedExecutableEnabled )
{
this.quotedExecutableEnabled = quotedExecutableEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setQuotedExecutableEnabled
File: src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java
Repository: apache/maven-shared-utils
The code follows secure coding practices. | [
"CWE-116"
] | CVE-2022-29599 | HIGH | 7.5 | apache/maven-shared-utils | setQuotedExecutableEnabled | src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java | 2735facbbbc2e13546328cb02dbb401b3776eea3 | 0 |
Analyze the following code function for security vulnerabilities | boolean isImeLayeringTarget() {
return getDisplayContent().getImeTarget(IME_TARGET_LAYERING) == this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isImeLayeringTarget
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isImeLayeringTarget | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @GET
@Path("{configClass}")
@ApiOperation(value = "Get configuration settings from database")
@Timed
@RequiresPermissions(RestPermissions.CLUSTER_CONFIG_ENTRY_READ)
public Object read(@ApiParam(name = "configClass", value = "The name of the cluster configuration class", required = true)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/ClusterConfigResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2024-24824 | HIGH | 8.8 | Graylog2/graylog2-server | read | graylog2-server/src/main/java/org/graylog2/rest/resources/system/ClusterConfigResource.java | 75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getRotation() {
return mRotation;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRotation
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | getRotation | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @CLIResolver
public Computer getComputer(@Argument(required=true,metaVar="NAME",usage="Node name") String name) {
if(name.equals("(master)"))
name = "";
for (Computer c : computers.values()) {
if(c.getName().equals(name))
return c;
}
return nu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getComputer
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getComputer | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public WorkflowInstance ingest(MediaPackage mp) throws IngestException {
try {
return ingest(mp, null, null, null);
} catch (NotFoundException e) {
throw new IngestException(e);
} catch (UnauthorizedException e) {
throw new IllegalStateException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ingest
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | ingest | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startActivity(Intent intent) {
if (resolveActivity(intent) == null) {
if (sDebug) {
Slog.d(TAG, "Can not startActivity for save UI with intent=" + intent);
}
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivity
File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | startActivity | services/autofill/java/com/android/server/autofill/ui/SaveUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | public SVNNodeKind checkRepositoryPath(AbstractProject context, SVNURL repoURL) throws SVNException {
SVNRepository repository = null;
try {
repository = getRepository(context,repoURL);
repository.testConnection();
long rev = repository.getLatest... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkRepositoryPath
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | checkRepositoryPath | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | private ConsumerBrokerExchange getConsumerBrokerExchange(ConsumerId id) {
ConsumerBrokerExchange result = consumerExchanges.get(id);
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConsumerBrokerExchange
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | getConsumerBrokerExchange | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | public void switchTab(String tabHandle)
{
getDriver().switchTo().window(tabHandle);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchTab
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | switchTab | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isFingerprintDisabled(int userId) {
final DevicePolicyManager dpm =
(DevicePolicyManager) mContext.getSystemService(Context.DEVICE_POLICY_SERVICE);
return dpm != null && (dpm.getKeyguardDisabledFeatures(null, userId)
& DevicePolicyManager.KEYGUARD_DISA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFingerprintDisabled
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | isFingerprintDisabled | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final String xml, final boolean validate) {
final StringReader sr = new StringReader(xml);
final InputSource is = new InputSource(sr);
try {
return unmarshal(clazz, is, null, validate, false);
} finally {
IOUtils... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | public static List<PageDecorator> getPageDecorators() {
// this method may be called to render start up errors, at which point Hudson doesn't exist yet. see HUDSON-3608
if(Jenkins.getInstance()==null) return Collections.emptyList();
return PageDecorator.all();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageDecorators
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getPageDecorators | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void error(final int errorCode, Conversation object) {
runOnUiThread(() -> replaceToast(getString(errorCode)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: error
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | error | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | protected void setPropertySet(PropertySet<T> propertySet) {
Objects.requireNonNull(propertySet, "propertySet cannot be null");
this.propertySet = propertySet;
if (editor instanceof Extension) {
removeExtension((Extension) editor);
}
editor = createEditor();
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPropertySet
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setPropertySet | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.