instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public boolean absolute(int index) throws SQLException { checkScrollable(); // index is 1-based, but internally we use 0-based indices int internalIndex; if (index == 0) { beforeFirst(); return false; } final int rows_size = rows.size(); // if index<0, count from ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: absolute File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
absolute
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public boolean isThrowable() { return Throwable.class.isAssignableFrom(_class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isThrowable File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
isThrowable
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setOnlyAlertOnce(boolean onlyAlertOnce) { setFlag(FLAG_ONLY_ALERT_ONCE, onlyAlertOnce); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOnlyAlertOnce File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setOnlyAlertOnce
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private String getAttribute(StartElement element, QName qname) { Attribute attribute = element.getAttributeByName(qname); return attribute != null ? attribute.getValue() : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttribute File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
getAttribute
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
boolean hasStartingWindow() { if (startingDisplayed || mStartingData != null) { return true; } for (int i = mChildren.size() - 1; i >= 0; i--) { if (getChildAt(i).mAttrs.type == TYPE_APPLICATION_STARTING) { return true; } } retu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasStartingWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
hasStartingWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
boolean isWinVisibleLw() { return (mActivityRecord == null || mActivityRecord.mVisibleRequested || mActivityRecord.isAnimating(TRANSITION | PARENTS)) && isVisible(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWinVisibleLw File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isWinVisibleLw
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public int checkUidPermission(String permName, int uid) { final int userId = UserHandle.getUserId(uid); if (!sUserManager.exists(userId)) { return PackageManager.PERMISSION_DENIED; } synchronized (mPackages) { Object obj = mSettings.getUserIdLPr(Us...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkUidPermission File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
checkUidPermission
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override protected void onResume() { NewsReaderListFragment newsReaderListFragment = getSlidingListFragment(); if (newsReaderListFragment != null) { newsReaderListFragment.reloadAdapter(); newsReaderListFragment.bindUserInfoToUI(); } invalidateOptionsMenu(); super.onResume(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onResume File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onResume
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { try { return toJSON(); } catch (Exception e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfos.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toString
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfos.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public ActionForward unspecified(ActionMapping rMapping, ActionForm form, HttpServletRequest request, HttpServletResponse response) throws Exception { ActionErrors errors = new ActionErrors(); //Email parameters HttpSession session = request.getSession(); Host currentHost = h...
Vulnerability Classification: - CWE: CWE-254, CWE-264 - CVE: CVE-2016-8600 - Severity: MEDIUM - CVSS Score: 5.0 Description: #9330: Remove attribute after getting the info from session Function: unspecified File: src/com/dotmarketing/cms/webforms/action/SubmitWebFormAction.java Repository: dotCMS/core Fixed Code: @S...
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
unspecified
src/com/dotmarketing/cms/webforms/action/SubmitWebFormAction.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
1
Analyze the following code function for security vulnerabilities
@Override boolean check(CardinalityEstimatorConfig c1, CardinalityEstimatorConfig c2) { if (c1 == c2) { return true; } if (c1 == null || c2 == null) { return false; } return nullSafeEqual(c1.getName(), c2.getName()) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public EntityReference getRelativeParentReference() { return this.parentReference; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRelativeParentReference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRelativeParentReference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void removeLockedTaskLocked(final TaskRecord task) { if (!mLockTaskModeTasks.remove(task)) { return; } if (DEBUG_LOCKTASK) Slog.w(TAG_LOCKTASK, "removeLockedTaskLocked: removed " + task); if (mLockTaskModeTasks.isEmpty()) { // Last one. if (DEBUG_LOCKT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeLockedTaskLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
removeLockedTaskLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public static void populateAccountSpinner(Context context, List<String> accounts, Spinner spinner) { if (accounts.size() > 0) { ArrayAdapter<String> adapter = new ArrayAdapter<>(context, R.layout.simple_list_item, accounts); adapter.setDropDownViewResource(R.layout.simple_list_item); spinner.setAdapter(adapt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populateAccountSpinner File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
populateAccountSpinner
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
void updateDemandHyperLink(EditTestCaseRequest request, Project project, String type);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateDemandHyperLink File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
updateDemandHyperLink
framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withAllowedLocalPorts(Set<Integer> allowedLocalPorts) { this.allowedLocalPorts = Objects.requireNonNull(allowedLocalPorts); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withAllowedLocalPorts File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withAllowedLocalPorts
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
public void openQs() { cancelQsAnimation(); if (mQsExpansionEnabled) { setQsExpansion(mQsMaxExpansionHeight); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openQs File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
openQs
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public VaadinSession findVaadinSession(VaadinRequest request) throws ServiceException, SessionExpiredException { VaadinSession vaadinSession = findOrCreateVaadinSession(request); if (vaadinSession == null) { return null; } VaadinSession.setCurrent(vaadinSession);...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findVaadinSession File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
findVaadinSession
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
@Deprecated public <T> ApiResponse<T> invokeAPI(String path, String method, List<Pair> queryParams, Object body, Map<String, String> headerParams, Map<String, String> cookieParams, Map<String, Object> formParams, String accept, String contentType, String[] authNames, GenericType<T> returnType, boolean isBodyNullable)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeAPI File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding pra...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
invokeAPI
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mLock") private ArraySet<String> getUsedBitmapFilesLocked() { final ArraySet<String> usedFiles = new ArraySet<>(1); forEachShortcut(si -> { if (si.getBitmapPath() != null) { usedFiles.add(getFileName(si.getBitmapPath())); } }); retu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUsedBitmapFilesLocked File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
getUsedBitmapFilesLocked
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
public String getId() { return id; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getId File: core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarElement.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getId
core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarElement.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public boolean isAllowComment() { return !Constants.getBooleanByFromWebSite("disable_comment_status"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowComment File: service/src/main/java/com/zrlog/service/CommentService.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
isAllowComment
service/src/main/java/com/zrlog/service/CommentService.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
@Override public Element toDOM(Document document) { Element infoElement = document.createElement("Info"); toDOM(document, infoElement); if (name != null) { Element nameElement = document.createElement("Name"); nameElement.appendChild(document.createTextNode(name));...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDOM File: base/common/src/main/java/org/dogtagpki/common/Info.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toDOM
base/common/src/main/java/org/dogtagpki/common/Info.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void error(final CSSParseException exception) throws CSSException { errorDetected_ = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: error File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
error
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
public void setPremiumSmsPermission(String packageName, int permission) { mUsageMonitor.setPremiumSmsPermission(packageName, permission); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPremiumSmsPermission File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
setPremiumSmsPermission
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("deprecation") public Credential createAndStoreCredential(TokenResponse response, String userId) throws IOException { Credential credential = newCredential(userId).setFromTokenResponse(response); if (credentialStore != null) { credentialStore.store(userId, credential); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAndStoreCredential File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
createAndStoreCredential
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
public static String getRealIp(HttpServletRequest request) { //bae env if (ZrLogUtil.isBae() && request.getHeader("clientip") != null) { return request.getHeader("clientip"); } String ip = request.getHeader("X-forwarded-for"); if (ip == null || ip.length() == 0 || "un...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2020-21316 - Severity: MEDIUM - CVSS Score: 4.3 Description: Fix #55,#56 xxs inject Function: getRealIp File: common/src/main/java/com/zrlog/web/util/WebTools.java Repository: 94fzb/zrlog Fixed Code: public static String getRealIp(HttpServletRequest request) { ...
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
getRealIp
common/src/main/java/com/zrlog/web/util/WebTools.java
b921c1ae03b8290f438657803eee05226755c941
1
Analyze the following code function for security vulnerabilities
@Override public void endTableRow(Map<String, String> parameters) { getXHTMLWikiPrinter().printXMLEndElement("tr"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endTableRow File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure co...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
endTableRow
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public boolean isJsonMime(String mime) { String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$"; return mime != null && (mime.matches(jsonMime) || mime.equals("*/*")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isJsonMime File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
isJsonMime
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@SystemApi public int getLaunchTaskId() { return mLaunchTaskId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchTaskId File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getLaunchTaskId
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
void clearApplicationDataSynchronous(String packageName) { // Don't wipe packages marked allowClearUserData=false try { PackageInfo info = mPackageManager.getPackageInfo(packageName, 0); if ((info.applicationInfo.flags & ApplicationInfo.FLAG_ALLOW_CLEAR_USER_DATA) == 0) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearApplicationDataSynchronous File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
clearApplicationDataSynchronous
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
public static String[] getPendingPush(String type, Context a) { InputStream i = null; try { i = a.openFileInput("CN1$AndroidPendingNotifications"); if (i == null) { return null; } DataInputStream is = new DataInputStream(i); int...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPendingPush File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getPendingPush
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void registerAppTransitionListener(AppTransitionListener listener) { synchronized (mWindowMap) { mAppTransition.registerListenerLocked(listener); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerAppTransitionListener File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
registerAppTransitionListener
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void deleteById(String sessionId) { MapSession mapSession = (MapSession) cache.get(sessionId).get(); if (mapSession != null) { applicationEventPublisher.emitSessionDeletedEvent(mapSession); cache.evict(sessionId); } }
Vulnerability Classification: - CWE: CWE-384 - CVE: CVE-2019-10158 - Severity: HIGH - CVSS Score: 7.5 Description: ISPN-10224 Fix session fixation protection Function: deleteById File: spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java Repository:...
[ "CWE-384" ]
CVE-2019-10158
HIGH
7.5
infinispan
deleteById
spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java
f3efef8de7fec4108dd5ab725cea6ae09f14815d
1
Analyze the following code function for security vulnerabilities
@Override public boolean isInline() { return this.configuration.isInline(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInline File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java Reposi...
[ "CWE-284" ]
CVE-2023-26471
HIGH
8.8
xwiki/xwiki-platform
isInline
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java
00532d9f1404287cf3ec3a05056640d809516006
0
Analyze the following code function for security vulnerabilities
private void getPeersForCall() { Log.d(TAG, "getPeersForCall"); int apiVersion = ApiUtils.getCallApiVersion(conversationUser, new int[]{ApiUtils.APIv4, 1}); ncApi.getPeersForCall( credentials, ApiUtils.getUrlForCall( apiVersion, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPeersForCall File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
getPeersForCall
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
private void updateForTapOrPress(int type, float xPix, float yPix) { if (type != GestureEventType.SINGLE_TAP_CONFIRMED && type != GestureEventType.SINGLE_TAP_UP && type != GestureEventType.LONG_PRESS && type != GestureEventType.LONG_TAP) { return; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateForTapOrPress File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
updateForTapOrPress
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private boolean mayProceed(String studyOid) throws Exception { return mayProceed(studyOid, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mayProceed File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
mayProceed
web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
@Override public File getSourceFile() { return sourceFile; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSourceFile File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java Repository: codehaus-plexus/plexus-archiver The code follows secure coding practices.
[ "CWE-22", "CWE-61" ]
CVE-2023-37460
CRITICAL
9.8
codehaus-plexus/plexus-archiver
getSourceFile
src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
54759839fbdf85caf8442076f001d5fd64e0dcb2
0
Analyze the following code function for security vulnerabilities
private WifiLinkLayerStats updateLinkLayerStatsRssiDataStallScoreReport() { // Get Info and continue polling long txBytes = mFacade.getTotalTxBytes() - mFacade.getMobileTxBytes(); long rxBytes = mFacade.getTotalRxBytes() - mFacade.getMobileRxBytes(); WifiLinkLayerStats st...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLinkLayerStatsRssiDataStallScoreReport File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
updateLinkLayerStatsRssiDataStallScoreReport
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public boolean onPreferenceTreeClick(Preference preference) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPreferenceTreeClick File: src/com/android/settings/SettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
onPreferenceTreeClick
src/com/android/settings/SettingsActivity.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
protected List<HostAddress> populateHostAddresses() { List<HostAddress> failedAddresses = new LinkedList<>(); // N.B.: Important to use config.serviceName and not AbstractXMPPConnection.serviceName if (config.host != null) { hostAddresses = new ArrayList<HostAddress>(1); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populateHostAddresses File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
populateHostAddresses
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public List<KBTemplate> findByGroupId(long groupId, int start, int end, OrderByComparator<KBTemplate> orderByComparator, boolean retrieveFromCache) { boolean pagination = true; FinderPath finderPath = null; Object[] finderArgs = null; if ((start == QueryUtil.ALL_POS) && (end == QueryUtil.ALL_POS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByGroupId File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The co...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByGroupId
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public final <T extends Item> T getItem(String pathName, ItemGroup context, Class<T> type) { Item r = getItem(pathName, context); if (type.isInstance(r)) return type.cast(r); return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getItem File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getItem
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public boolean validate(@NonNull JwtClaims claims, @Nullable HttpRequest<?> request) { Optional<String> claimIssuerOptional = parseIssuerClaim(claims); if (!claimIssuerOptional.isPresent()) { return false; } String iss = claimIssuerOptional.get(); Optio...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validate File: security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java Repository: micronaut-projects/micronaut-security The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-36820
MEDIUM
6.5
micronaut-projects/micronaut-security
validate
security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java
9728b925221a0d87798ccf250657a3c214b7e980
0
Analyze the following code function for security vulnerabilities
public void setRemoteAddr(String remoteAddr) { this.remoteAddr = remoteAddr; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRemoteAddr File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setRemoteAddr
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void sendStanzaWithResponseCallback(Stanza stanza, StanzaFilter replyFilter, StanzaListener callback) throws NotConnectedException, InterruptedException { sendStanzaWithResponseCallback(stanza, replyFilter, callback, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendStanzaWithResponseCallback File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendStanzaWithResponseCallback
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public String getFormId() { return "form"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFormId File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
getFormId
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
public @UserOperationResult int logoutUser(@NonNull ComponentName admin) { throwIfParentInstance("logoutUser"); try { return mService.logoutUser(admin); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logoutUser File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
logoutUser
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
String chooseClientPSKIdentity(PSKKeyManager keyManager, String identityHint);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: chooseClientPSKIdentity File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
chooseClientPSKIdentity
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
public void doSimulateOutOfMemory() throws IOException { checkPermission(ADMINISTER); System.out.println("Creating artificial OutOfMemoryError situation"); List<Object> args = new ArrayList<Object>(); while (true) args.add(new byte[1024*1024]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doSimulateOutOfMemory File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
doSimulateOutOfMemory
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public boolean deleteSettingLocked(int type, int userId, String name, boolean forceNotify) { final int key = makeKey(type, userId); SettingsState settingsState = peekSettingsStateLocked(key); final boolean success = settingsState.deleteSettingLocked(name); if (forceNoti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteSettingLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
deleteSettingLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
public static String getServerID(String idTypeString) { if (idTypeString == null) { return null; } int len = idTypeString.length(); String id = null; if (len >= SAMLConstants.SERVER_ID_LENGTH) { id = idTypeString.substring((len - SAMLConstants.SERVER_ID_LE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServerID File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
getServerID
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
@Override public void setStringProperty(String name, String value) throws JMSException { this.setObjectProperty(name, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStringProperty File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
setStringProperty
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
private Intent getDefaultCantAddAccountIntent(int errorCode) { Intent cantAddAccount = new Intent(mContext, CantAddAccountActivity.class); cantAddAccount.putExtra(CantAddAccountActivity.EXTRA_ERROR_CODE, errorCode); cantAddAccount.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); return cantAddAc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultCantAddAccountIntent File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getDefaultCantAddAccountIntent
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public ObjectOutputStream createObjectOutputStream(OutputStream out) throws IOException { return createObjectOutputStream(hierarchicalStreamDriver.createWriter(out), "object-stream"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createObjectOutputStream File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
createObjectOutputStream
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private static int validateValueChar(CharSequence seq, int state, char character) { /* * State: * 0: Previous character was neither CR nor LF * 1: The previous character was CR * 2: The previous character was LF */ if ((character &...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateValueChar File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
validateValueChar
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
private static String generateXml(String encrypt, String signature, String timestamp, String nonce) { String format = "<xml>\n" + "<Encrypt><![CDATA[%1$s]]></Encrypt>\n" + "<MsgSignature><![CDATA[%2$s]]></MsgSignature>\n" + "<TimeStamp>%3$s</TimeStamp>\n" + "<Nonce><!...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateXml File: weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java Repository: Wechat-Group/WxJava The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20318
HIGH
7.5
Wechat-Group/WxJava
generateXml
weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java
6272639f02e397fed40828a2d0da66c30264bc0e
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder2 attribute(String name, String value) { super.attributeImpl(name, value); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attribute File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
attribute
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
@Override public void dumpDebugInner(ProtoOutputStream proto) { final long token = proto.start(MOVE); dumpPointProto(mFrom, proto, FROM); dumpPointProto(mTo, proto, TO); proto.write(DURATION_MS, mDuration); proto.end(token); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpDebugInner File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
dumpDebugInner
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public String getBaseSystemId() { return fCurrentEntity != null ? fCurrentEntity.baseSystemId : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseSystemId File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
getBaseSystemId
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
private void initNoisyReceiver() { //Handles headphones coming unplugged. cannot be done through a manifest receiver IntentFilter filter = new IntentFilter(AudioManager.ACTION_AUDIO_BECOMING_NOISY); registerReceiver(mNoisyReceiver, filter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initNoisyReceiver File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
initNoisyReceiver
Ports/Android/src/com/codename1/media/BackgroundAudioService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public static boolean prepareHelpMenuItem(final Activity activity, MenuItem helpMenuItem, String helpUriString, String backupContext) { if (TextUtils.isEmpty(helpUriString)) { // The help url string is empty or null, so set the help menu item to be invisible. helpMenuItem.set...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3889 - Severity: HIGH - CVSS Score: 7.2 Description: Pre-setup restrictions - Prevent external tiles from system apps - Disable help Bug: 29194585 Change-Id: I92da498110db49f7a523d6f775f191c4b52a4ad6 Function: prepareHelpMenuItem File: packages/Setting...
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
prepareHelpMenuItem
packages/SettingsLib/src/com/android/settingslib/HelpUtils.java
e206f02d46ae5e38c74d138b51f6e1637e261abe
1
Analyze the following code function for security vulnerabilities
public static String unzip(File zipfile, String destDir) throws IOException { // 2 // does the zip file exist and can we write to the temp directory if (!zipfile.canRead()) { log.error("Zip file '" + zipfile.getAbsolutePath() + "' does not exist, or is not readable."); ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-31195 - Severity: HIGH - CVSS Score: 7.2 Description: [DS-4131] Better path handling in ItemImport zips Function: unzip File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java Repository: DSpace Fixed Code: public static String unzip(File z...
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
unzip
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
56e76049185bbd87c994128a9d77735ad7af0199
1
Analyze the following code function for security vulnerabilities
private boolean isSame(VFSItem currentTarget, File uploadedFile) { if(currentTarget instanceof LocalImpl) { LocalImpl local = (LocalImpl)currentTarget; File currentFile = local.getBasefile(); if(currentFile.length() == uploadedFile.length()) { try { return org.apache.commons.io.FileUtils.contentEqua...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSame File: src/main/java/org/olat/course/assessment/bulk/DataStepForm.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
isSame
src/main/java/org/olat/course/assessment/bulk/DataStepForm.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
@Override public boolean containsKey(Object key) { return xObjects.containsKey(key); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsKey File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
containsKey
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public MetaClass getMetaclass() { if (this.metaclass == null) { this.metaclass = MetaClass.getMetaClass(); } return this.metaclass; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetaclass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getMetaclass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private boolean isResourceType(Node node) { Node parseType = node.getAttributes().getNamedItemNS(XMP.NS_RDF, "parseType"); return parseType != null && "Resource".equals(parseType.getNodeValue()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isResourceType File: imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java Repository: haraldk/TwelveMonkeys The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-23792
HIGH
7.5
haraldk/TwelveMonkeys
isResourceType
imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java
da4efe98bf09e1cce91b7633cb251958a200fc80
0
Analyze the following code function for security vulnerabilities
protected String toDisplayError(String theErrorMsg, Exception theException) { return theErrorMsg; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDisplayError File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-24301
MEDIUM
4.3
hapifhir/hapi-fhir
toDisplayError
hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java
adb3734fcbbf9a9165445e9ee5eef168dbcaedaf
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setCursorFactory(@Nullable CursorFactory cursorFactory) { mCursorFactory = cursorFactory; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCursorFactory File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
setCursorFactory
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
protected void fireNodeAdded(final DomChangeEvent event) { DomNode toInform = this; while (toInform != null) { final List<DomChangeListener> listeners = toInform.safeGetDomListeners(); if (listeners != null) { for (final DomChangeListener listener : listeners) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fireNodeAdded File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
fireNodeAdded
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private static void sendHttpErrorResponse(ChannelHandlerContext ctx, HttpRequest req, FullHttpResponse res) { // Generate an error page if response getStatus code is not OK (200). if (res.status().code() != 200) { ByteBuf buf = Unpooled.copiedBuffer(res.status().toString(), CharsetUtil.UTF_8...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendHttpErrorResponse File: src/gribbit/request/HttpRequestHandler.java Repository: lukehutch/gribbit The code follows secure coding practices.
[ "CWE-346" ]
CVE-2014-125071
MEDIUM
5.2
lukehutch/gribbit
sendHttpErrorResponse
src/gribbit/request/HttpRequestHandler.java
620418df247aebda3dd4be1dda10fe229ea505dd
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(android.Manifest.permission.MANAGE_ROLE_HOLDERS) public boolean shouldAllowBypassingDevicePolicyManagementRoleQualification() { if (mService != null) { try { return mService.shouldAllowBypassingDevicePolicyManagementRoleQualification(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldAllowBypassingDevicePolicyManagementRoleQualification File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
shouldAllowBypassingDevicePolicyManagementRoleQualification
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public int read(short[] d) throws IOException { return read(d, 0, d.length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: src/main/java/org/xerial/snappy/SnappyInputStream.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-34455
HIGH
7.5
xerial/snappy-java
read
src/main/java/org/xerial/snappy/SnappyInputStream.java
3bf67857fcf70d9eea56eed4af7c925671e8eaea
0
Analyze the following code function for security vulnerabilities
public void setSubjectEventFormDataTypesExpected(String odmVersion) { if(odmVersion.equalsIgnoreCase("occlinical_data"))odmVersion="oc1.3"; if ("1.2".equals(odmVersion) || "1.3".equals(odmVersion)) { setSubjectEventFormDataTypesExpected(); } else if ("oc1.2".equals(odmVersion) || "oc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSubjectEventFormDataTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setSubjectEventFormDataTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private boolean calculateHiddenStatus(SpaceReference spaceReference, String documentToIngore, Session session) { // If there is at least one visible document then the space is visible StringBuilder builder = new StringBuilder("(hidden = false OR hidden IS NULL)"); Map<String, ?> parameters;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: calculateHiddenStatus File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
calculateHiddenStatus
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
public boolean isAnySimPinSecure() { for (int i = 0; i < mLastSimStates.size(); i++) { final int key = mLastSimStates.keyAt(i); if (KeyguardUpdateMonitor.isSimPinSecure(mLastSimStates.get(key))) { return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAnySimPinSecure File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
isAnySimPinSecure
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
void disposeInputChannel() { if (mDeadWindowEventReceiver != null) { mDeadWindowEventReceiver.dispose(); mDeadWindowEventReceiver = null; } if (mInputChannelToken != null) { // Unregister server channel first otherwise it complains about broken channel. ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disposeInputChannel File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
disposeInputChannel
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void ensureAllShortcutsVisibleToLauncher(@NonNull List<ShortcutInfo> shortcuts) { for (ShortcutInfo shortcut : shortcuts) { if (shortcut.isExcludedFromSurfaces(ShortcutInfo.SURFACE_LAUNCHER)) { throw new IllegalArgumentException("Shortcut ID=" + shortcut.getId() ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureAllShortcutsVisibleToLauncher File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
ensureAllShortcutsVisibleToLauncher
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
@Override public void scheduleApplicationInfoChanged(List<String> packageNames, int userId) { enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION, "scheduleApplicationInfoChanged()"); synchronized (this) { final long origId = Binder.clearCallingIden...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleApplicationInfoChanged File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
scheduleApplicationInfoChanged
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void getProcessStatesFromPids(/*in*/ int[] pids, /*out*/ int[] states) { mActivityManagerService.getProcessStatesForPIDs(/*in*/ pids, /*out*/ states); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessStatesFromPids File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
getProcessStatesFromPids
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
void updateLastFrames() { mWindowFrames.mLastFrame.set(mWindowFrames.mFrame); mWindowFrames.mLastRelFrame.set(mWindowFrames.mRelFrame); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLastFrames File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
updateLastFrames
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void grantUriPermissionUncheckedFromIntentLocked(NeededUriGrants needed, UriPermissionOwner owner) { if (needed != null) { for (int i=0; i<needed.size(); i++) { GrantUri grantUri = needed.get(i); grantUriPermissionUncheckedLocked(nee...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantUriPermissionUncheckedFromIntentLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
grantUriPermissionUncheckedFromIntentLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("rawtypes") private void setGattProfileServiceState(Class[] services, int state) { if (state != BluetoothAdapter.STATE_ON && state != BluetoothAdapter.STATE_OFF) { Log.w(TAG,"setGattProfileServiceState(): invalid state...Leaving..."); return; } int ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setGattProfileServiceState File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
setGattProfileServiceState
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public AMQCommand rpc(Method m, int timeout) throws IOException, ShutdownSignalException, TimeoutException { return privateRpc(m, timeout); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rpc File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
rpc
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public boolean hasMinorEdit(XWikiContext context) { String bl = getXWikiPreference("minoredit", "", context); if ("1".equals(bl)) { return true; } if ("0".equals(bl)) { return false; } return "1".equals(getConfiguration().getProperty("xwiki.m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasMinorEdit File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
hasMinorEdit
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public void setSurface(Surface surface, int width, int height, int density) { super.setSurface(surface, width, height, density); synchronized (mService) { final long origId = Binder.clearCallingIdentity(); try { setSurfaceLoc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSurface File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
setSurface
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public X509Certificate getClientCertificate() { return mClientCertificate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientCertificate File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
getClientCertificate
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
@Override public int getCurrentUserId() { return mUserController.getCurrentUserId(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentUserId File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getCurrentUserId
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void setFocus(int action) { if (action == EDIT_DRAFT) { int type = mDraft.draftType; switch (type) { case UIProvider.DraftType.COMPOSE: case UIProvider.DraftType.FORWARD: action = COMPOSE; break; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocus File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
setFocus
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
private void performCorsPreflightCheck(HttpExchange pExchange) { Headers requestHeaders = pExchange.getRequestHeaders(); Map<String,String> respHeaders = requestHandler.handleCorsPreflightRequest(requestHeaders.getFirst("Origin"), ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performCorsPreflightCheck File: agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java Repository: jolokia The code follows secure coding practices.
[ "CWE-352" ]
CVE-2014-0168
MEDIUM
6.8
jolokia
performCorsPreflightCheck
agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java
2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public String getDatabase() { return getDocumentReference().getWikiReference().getName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDatabase File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getDatabase
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public Response processRemoveDestination(DestinationInfo info) throws Exception { TransportConnectionState cs = lookupConnectionState(info.getConnectionId()); broker.removeDestinationInfo(cs.getContext(), info); if (info.getDestination().isTemporary()) { cs.removeTempDe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processRemoveDestination File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processRemoveDestination
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override public void save( ImageReference imageReference, Path outputPath, Consumer<Long> writtenByteCountListener) throws InterruptedException, IOException { Process dockerProcess = docker("save", imageReference.toString()); try (InputStream stdout = new BufferedInputStream(dockerProcess.getInp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java Repository: GoogleContainerTools/jib The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-25914
CRITICAL
9.8
GoogleContainerTools/jib
save
jib-core/src/main/java/com/google/cloud/tools/jib/docker/CliDockerClient.java
67fa40bc2c484da0546333914ea07a89fe44eaaf
0
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private int getAggregatedPasswordComplexityLocked(@UserIdInt int userHandle, boolean deviceWideOnly) { ensureLocked(); final List<ActiveAdmin> admins; if (deviceWideOnly) { admins = getActiveAdminsForUserAndItsManagedProfilesLocked(userHa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAggregatedPasswordComplexityLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getAggregatedPasswordComplexityLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public ApiClient setAccessToken(String accessToken) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setAccessToken(accessToken); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAccessToken File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setAccessToken
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Nullable public AnrController getAnrController(ApplicationInfo info) { if (info == null || info.packageName == null) { return null; } final ArrayList<AnrController> controllers; synchronized (mGlobalLock) { controllers = new ArrayList<>(mAnrController); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAnrController File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getAnrController
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public MaterialConfigs convertToConfigs() { MaterialConfigs configs = new MaterialConfigs(); for (Material material : this) { configs.add(material.config()); } return configs; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToConfigs File: domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
convertToConfigs
domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationAsArrayDisabled() throws Exception { Duration exp = Duration.ofSeconds(13498L, 8374); try { READER.readValue("[\"" + exp.toString() + "\"]"); fail("expected JsonMappingException"); } catch (JsonMappingException e) { // OK } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationAsArrayDisabled File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practic...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationAsArrayDisabled
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
private int getUidForPackage(String packageName, int userId) { PackageInfo pkgInfo = null; final long identity = Binder.clearCallingIdentity(); try { pkgInfo = mPackageManager.getPackageInfo(packageName, 0, userId); } catch (RemoteException re) { // Shouldn't hap...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidForPackage File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getUidForPackage
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0