instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public boolean launchAssistIntent(Intent intent, int requestType, String hint, int userHandle, Bundle args) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); intent.writeToParcel(data...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchAssistIntent File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
launchAssistIntent
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public void flush() { synchronized (builder) { try { body = new String(builder.toString().getBytes(StandardCharsets.UTF_8)); boolean includeEndTag = isIncludePageEndTag(body); if (includeEndTag && response.getContentType().contains("text/...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-16643 - Severity: LOW - CVSS Score: 3.5 Description: Upgrade jar version & fix #54 Signed-off-by: xiaochun <xchun90@163.com> Function: flush File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java Repository: 94fzb/zrlog Fixed Code: @O...
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
flush
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
4a91c83af669e31a22297c14f089d8911d353fa1
1
Analyze the following code function for security vulnerabilities
public void dispose() { mContext.getContentResolver().unregisterContentObserver(mSettingsObserver); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispose File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
dispose
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
public static byte[] rawCompress(Object data, int byteSize) throws IOException { byte[] buf = new byte[Snappy.maxCompressedLength(byteSize)]; int compressedByteSize = impl.rawCompress(data, 0, byteSize, buf, 0); byte[] result = new byte[compressedByteSize]; System.arrayco...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rawCompress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
rawCompress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
protected CoercionAction _checkFromStringCoercion(DeserializationContext ctxt, String value, LogicalType logicalType, Class<?> rawTargetType) throws IOException { // 18-Dec-2020, tatu: Formats without strong typing (XML, CSV, Properties at // least) should allow from-String "c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _checkFromStringCoercion File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_checkFromStringCoercion
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
private String[] _getUsersWithRole(final String roleid) throws IOException { final List<String> usersWithRole = new ArrayList<String>(); for (final User user : m_users.values()) { if (_userHasRole(user, roleid)) { usersWithRole.add(user.getUserId()); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _getUsersWithRole File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
_getUsersWithRole
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
@Override public OptionalDouble getValue() { ModelNode result = readAttributeValue(address, attributeName); if (result.isDefined()) { try { return OptionalDouble.of(result.asDouble()); } catch (Exception e) { LOGGER.unableToConvertAttribute(att...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValue File: metrics/src/main/java/org/wildfly/extension/metrics/WildFlyMetric.java Repository: wildfly The code follows secure coding practices.
[ "CWE-200" ]
CVE-2021-3503
MEDIUM
4
wildfly
getValue
metrics/src/main/java/org/wildfly/extension/metrics/WildFlyMetric.java
a48db605577d941b5ae3e899a1187303e138ca74
0
Analyze the following code function for security vulnerabilities
void updateUserConfigurationLocked() { final Configuration configuration = new Configuration(getGlobalConfiguration()); final int currentUserId = mUserController.getCurrentUserId(); Settings.System.adjustConfigurationForUser(mContext.getContentResolver(), configuration, currentUs...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUserConfigurationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
updateUserConfigurationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override protected void dump(FileDescriptor fd, PrintWriter printWriter, String[] args) { if (!DumpUtils.checkDumpPermission(mContext, LOG_TAG, printWriter)) return; try (IndentingPrintWriter pw = new IndentingPrintWriter(printWriter, " ")) { pw.println("Current Device Policy Manager ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
dump
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public String serializeReference(EntityReference reference) { return referenceSerializer.serialize(reference); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serializeReference File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
serializeReference
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private String getRequiredVerifierLPr() { final Intent verification = new Intent(Intent.ACTION_PACKAGE_NEEDS_VERIFICATION); final List<ResolveInfo> receivers = queryIntentReceivers(verification, PACKAGE_MIME_TYPE, PackageManager.GET_DISABLED_COMPONENTS, 0 /* TODO: Which userId? */); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequiredVerifierLPr File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getRequiredVerifierLPr
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private void removeAccount(Account account, @UserIdInt int sourceUserId) { final AccountManager accountManager = mContext.createContextAsUser( UserHandle.of(sourceUserId), /* flags= */ 0) .getSystemService(AccountManager.class); try { final Bundle resu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeAccount File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
removeAccount
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void testTools() throws Exception { if (config.memory || config.cipher != null) { return; } deleteDb(getTestName()); Connection conn = getConnection(getTestName()); conn.createStatement().execute( "create table test(id int) as select 1"); ...
Vulnerability Classification: - CWE: CWE-312 - CVE: CVE-2022-45868 - Severity: HIGH - CVSS Score: 7.8 Description: Disallow plain webAdminPassword values to force usage of hashes Function: testTools File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database Fixed Code: private void testTools() throws E...
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
testTools
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
1
Analyze the following code function for security vulnerabilities
private JWT decode(String encodedJWT, Header header, String[] parts, Verifier verifier) { int index = encodedJWT.lastIndexOf("."); // The message comprises the first two segments of the entire JWT, the signature is the last segment. byte[] message = encodedJWT.substring(0, index).getBytes(StandardCharsets.U...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2018-1000125 - Severity: HIGH - CVSS Score: 7.5 Description: Fixes Issue #2, bug exists that allows a JWT to be decoded even when no signature is provided. Function: decode File: src/main/java/org/primeframework/jwt/JWTDecoder.java Repository: FusionAuth/fusionau...
[ "CWE-20" ]
CVE-2018-1000125
HIGH
7.5
FusionAuth/fusionauth-jwt
decode
src/main/java/org/primeframework/jwt/JWTDecoder.java
0d94dcef0133d699f21d217e922564adbb83a227
1
Analyze the following code function for security vulnerabilities
private static final boolean writeProcessOomListToProto(ProtoOutputStream proto, long fieldId, ActivityManagerService service, List<ProcessRecord> origList, boolean inclDetails, String dumpPackage) { ArrayList<Pair<ProcessRecord, Integer>> list = sortProcessOomList(origList, dumpPackage)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeProcessOomListToProto File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
writeProcessOomListToProto
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void setLogPrefix(String logPrefix) { this.logPrefix = logPrefix; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLogPrefix File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3878
HIGH
7.5
stanfordnlp/CoreNLP
setLogPrefix
src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
e5bbe135a02a74b952396751ed3015e8b8252e99
0
Analyze the following code function for security vulnerabilities
@Override public List<String> getPermittedInputMethods(ComponentName who, boolean calledOnParentInstance) { if (!mHasFeature) { return null; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermittedInputMethods File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPermittedInputMethods
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public Map<String, Authentication> getAuthentications() { return authentications; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthentications File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getAuthentications
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected void hideToast() { if (mToast != null) { mToast.cancel(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hideToast File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
hideToast
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
static void registerSmackProviders() { ProviderManager pm = ProviderManager.getInstance(); // add IQ handling pm.addIQProvider("query","http://jabber.org/protocol/disco#info", new DiscoverInfoProvider()); pm.addIQProvider("query","http://jabber.org/protocol/disco#items", new DiscoverItemsProvider()); // add d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerSmackProviders File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
registerSmackProviders
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
private void migrateLegacySettingsLocked(SettingsState settingsState, SQLiteDatabase database, String table) { SQLiteQueryBuilder queryBuilder = new SQLiteQueryBuilder(); queryBuilder.setTables(table); Cursor cursor = queryBuilder.query(database, LEGACY_SQL_COLUMNS, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateLegacySettingsLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
migrateLegacySettingsLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public void editorMoved(EditorMoveEvent e);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: editorMoved File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
editorMoved
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public Connection newConnection(ExecutorService executor, List<Address> addrs) throws IOException, TimeoutException { return newConnection(executor, addrs, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newConnection File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
newConnection
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public static LicenseInfo retrieveNamed(final String key) { if (key.length() > 99 && key.matches("^[0-9a-z]+$")) { try { final String sig = SignatureUtils.toHexString(PLSSignature.signature()); return PLSSignature.retrieveNamed(sig, key, true); } catch (Exception e) { // Logme.error(e); Log.info...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retrieveNamed File: src/net/sourceforge/plantuml/version/LicenseInfo.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
retrieveNamed
src/net/sourceforge/plantuml/version/LicenseInfo.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void addRole(String role) { roles.add(role); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addRole File: base/common/src/main/java/com/netscape/certsrv/account/Account.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
addRole
base/common/src/main/java/com/netscape/certsrv/account/Account.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private int getUidForVerifier(VerifierInfo verifierInfo) { synchronized (mPackages) { final PackageParser.Package pkg = mPackages.get(verifierInfo.packageName); if (pkg == null) { return -1; } else if (pkg.mSignatures.length != 1) { Slog.i(TAG,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidForVerifier File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getUidForVerifier
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public ServiceRegistry getServiceRegistry() { return serviceRegistry; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServiceRegistry File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
getServiceRegistry
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
static void splashScreenAttachedLocked(IBinder token) { final ActivityRecord r = ActivityRecord.forTokenLocked(token); if (r == null) { Slog.w(TAG, "splashScreenTransferredLocked cannot find activity"); return; } r.onSplashScreenAttachComplete(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: splashScreenAttachedLocked File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
splashScreenAttachedLocked
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
void resolveActivity(ActivityTaskSupervisor supervisor) { if (realCallingPid == Request.DEFAULT_REAL_CALLING_PID) { realCallingPid = Binder.getCallingPid(); } if (realCallingUid == Request.DEFAULT_REAL_CALLING_UID) { realCallingUid = Binder.getCallingU...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveActivity File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
resolveActivity
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
private void skipReceiverLocked(BroadcastRecord r) { logBroadcastReceiverDiscardLocked(r); finishReceiverLocked(r, r.resultCode, r.resultData, r.resultExtras, r.resultAbort, false); scheduleBroadcastsLocked(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: skipReceiverLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
skipReceiverLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public static String encodeXMLChar(char ch) { switch (ch) { case '&': return "&amp;"; case '\"': return "&quot;"; case '\'': return "&#39;"; case '<': return "&lt;"; case '>': ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encodeXMLChar File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java Repository: dbeaver The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3836
MEDIUM
4.3
dbeaver
encodeXMLChar
bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
4debf8f25184b7283681ed3fb5e9e887d9d4fe22
0
Analyze the following code function for security vulnerabilities
public void saveUser(final String name, final User details) throws Exception { update(); m_writeLock.lock(); try { _writeUser(name, details); } finally { m_writeLock.unlock(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveUser File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
saveUser
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
private boolean hasAccountsOnAnyUser() { long callingIdentity = Binder.clearCallingIdentity(); try { for (UserInfo user : mUserManagerInternal.getUsers(/* excludeDying= */ true)) { AccountManager am = mContext.createContextAsUser( UserHandle.of...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasAccountsOnAnyUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
hasAccountsOnAnyUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public int delByBareMetalId(String id) { TaskExample e = new TaskExample(); e.createCriteria().andBareMetalIdEqualTo(id); if (taskMapper.selectByExample(e).stream().filter(t -> t.getStatus().equalsIgnoreCase(ServiceConstants.TaskStatusEnum.running.name())).findFirst().isPresent()) tr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delByBareMetalId File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
delByBareMetalId
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
public void exchangeComplete(final HttpServerExchange exchange) { if (!exchange.isUpgrade() && exchange.isPersistent()) { startRequest(); ConduitStreamSourceChannel channel = ((AjpServerConnection) exchange.getConnection()).getChannel().getSourceChannel(); channel.getReadSett...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exchangeComplete File: core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-252" ]
CVE-2022-1319
HIGH
7.5
undertow-io/undertow
exchangeComplete
core/src/main/java/io/undertow/server/protocol/ajp/AjpReadListener.java
1443a1a2bbb8e32e56788109d8285db250d55c8b
0
Analyze the following code function for security vulnerabilities
public String getAttachmentRevisionURL(String filename, String revision, String querystring, XWikiContext context) { // Attachment file name cannot be empty if (StringUtils.isEmpty(filename)) { return null; } return context.getWiki().getAttachmentRevisionURL(new Attachme...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentRevisionURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getAttachmentRevisionURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public AMQCommand transformReply(AMQCommand command) { return command; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: transformReply File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
transformReply
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public void setTaskDescription(IBinder token, ActivityManager.TaskDescription values) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTaskDescription File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
setTaskDescription
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private static XmlSaxParserContext newInstance(final Ruby runtime, final RubyClass klazz) { return (XmlSaxParserContext) NokogiriService.XML_SAXPARSER_CONTEXT_ALLOCATOR.allocate(runtime, klazz); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: ext/java/nokogiri/XmlSaxParserContext.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-241" ]
CVE-2022-29181
MEDIUM
6.4
sparklemotion/nokogiri
newInstance
ext/java/nokogiri/XmlSaxParserContext.java
db05ba9a1bd4b90aa6c76742cf6102a7c7297267
0
Analyze the following code function for security vulnerabilities
public boolean isAllowMdmExpansion() { return myModelConfig.isAllowMdmExpansion(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowMdmExpansion File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isAllowMdmExpansion
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
private static List<Route> alternative(final Set<Route.Definition> routeDefs, final String verb, final String uri) { List<Route> routes = new LinkedList<>(); Set<String> verbs = Sets.newHashSet(Route.METHODS); verbs.remove(verb); for (String alt : verbs) { findRoutes(routeDefs, alt, uri, Med...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: alternative File: jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-15477
MEDIUM
4.3
jooby-project/jooby
alternative
jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java
34856a738829d8fedca4ed27bd6ff413af87186f
0
Analyze the following code function for security vulnerabilities
public CopyBuildTask outFolder(Getter<File> out) { outputType = FOLDER; outputFile = out; // It's better to just do diffs on the source // if (inputType == FOLDER) { // orChangeNoticer((new ChecksumChangeNoticer()).sourceDestFile(inputFile, out)); // } orGetterChangeNoticer(out); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outFolder File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
outFolder
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
private NotificationCompat.Builder createNotificationBuilder() { NotificationCompat.Builder notificationBuilder = new NotificationCompat.Builder(getContext()); notificationBuilder.setSmallIcon(R.drawable.notification_icon).setAutoCancel(true); notificationBuilder.setColor(ThemeColorUtils.primary...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNotificationBuilder File: src/main/java/com/owncloud/android/syncadapter/FileSyncAdapter.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
createNotificationBuilder
src/main/java/com/owncloud/android/syncadapter/FileSyncAdapter.java
27559efb79d45782e000b762860658d49e9c35e9
0
Analyze the following code function for security vulnerabilities
public abstract int getEllipsisCount(int line);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEllipsisCount File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getEllipsisCount
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
private void setSurfaceIfReadyLocked() { if (DEBUG_STACK) Slog.v(TAG_STACK, "setSurfaceIfReadyLocked: mDrawn=" + mDrawn + " mContainerState=" + mContainerState + " mSurface=" + mSurface); if (mDrawn && mSurface != null && mContainerState == CONTAINER_STATE_NO_SURFACE) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSurfaceIfReadyLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
setSurfaceIfReadyLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
private static boolean isCompatible(PermissionPolicyConfig c1, PermissionPolicyConfig c2) { return c1 == c2 || !(c1 == null || c2 == null) && nullSafeEqual(c1.getProperties(), c2.getProperties()) && nullSafeEqual(c1.getClassName(), c2.getClassName()) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCompatible File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
isCompatible
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public int selectAnimationLw(WindowState win, int transit) { if (PRINT_ANIM) Log.i(TAG, "selectAnimation in " + win + ": transit=" + transit); if (win == mStatusBar) { boolean isKeyguard = (win.getAttrs().privateFlags & PRIVATE_FLAG_KEYGUARD) != 0; if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectAnimationLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
selectAnimationLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public void characters(final char[] ch, final int start, final int length) throws SAXException { content.append(ch, start, length); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000651 - Severity: HIGH - CVSS Score: 7.5 Description: gh-813 Turn on secure processing feature for XML parsers etc Function: characters File: stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java Repository: gchq/stroom Fixed Code: @Override ...
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
characters
stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
1
Analyze the following code function for security vulnerabilities
public void setId(long id) { this.id = id; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setId File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setId
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public String deleteBackupConfig(Request req, Response res) throws IOException { // to throw a NFE, if none is available fetchEntityFromConfig(); goConfigService.updateConfig(new DeleteBackupConfigCommand(), currentUsername()); return renderMessage(res, 200, EntityType.BackupConfig.del...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteBackupConfig File: api/api-backup-config-v1/src/main/java/com/thoughtworks/go/apiv1/backupconfig/BackupConfigControllerV1.java Repository: gocd The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25924
HIGH
9.3
gocd
deleteBackupConfig
api/api-backup-config-v1/src/main/java/com/thoughtworks/go/apiv1/backupconfig/BackupConfigControllerV1.java
7d0baab0d361c377af84994f95ba76c280048548
0
Analyze the following code function for security vulnerabilities
public ObjectOutputStream createObjectOutputStream(final HierarchicalStreamWriter writer, final String rootNodeName) throws IOException { return createObjectOutputStream(writer, rootNodeName, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createObjectOutputStream File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
createObjectOutputStream
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private void doHandle(final Request req, final Response rsp, final Asset asset) throws Throwable { // handle etag if (this.etag) { String etag = asset.etag(); boolean ifnm = req.header("If-None-Match").toOptional() .map(etag::equals) .orElse(false); if (ifnm) { rsp...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-7647 - Severity: MEDIUM - CVSS Score: 5.0 Description: asset: path traversal fix #1639 Function: doHandle File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby Fixed Code: private void doHandle(final Request req, fin...
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
doHandle
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
1
Analyze the following code function for security vulnerabilities
public static void testValidity(Object o) throws JSONException { if (o instanceof Number && !numberIsFinite((Number) o)) { throw new JSONException("JSON does not allow non-finite numbers."); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testValidity File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
testValidity
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
static Config fileConfig(final String fname) { // TODO: sanitization of arguments File dir = new File(System.getProperty("user.dir")); // TODO: sanitization of arguments File froot = new File(dir, fname); if (froot.exists()) { return ConfigFactory.parseFile(froot); } else { // TODO: ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fileConfig File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
fileConfig
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
private boolean isSecondaryInternet() { return mClientModeManager.getRole() == ROLE_CLIENT_SECONDARY_LONG_LIVED && mClientModeManager.isSecondaryInternet(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecondaryInternet File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
isSecondaryInternet
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public TtyExecErrorable<String, OutputStream, PipedInputStream, ExecWatch> writingOutput(OutputStream out) { return new PodOperationsImpl(getContext().withOut(out)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writingOutput File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
writingOutput
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
public String parameterToString(Object param) { if (param == null) { return ""; } else if (param instanceof Date) { return formatDate((Date) param); } else if (param instanceof OffsetDateTime) { return formatOffsetDateTime((OffsetDateTime) param); } else if (param instanceof Collection...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parameterToString File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure cod...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
parameterToString
samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public void setBundleandDeferCallback(BundleAndDeferCallback bundleAndDeferCallback) { this.bundleAndDeferCallback = bundleAndDeferCallback; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBundleandDeferCallback File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
setBundleandDeferCallback
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
private static boolean isValidFatFilenameChar(char c) { if ((0x00 <= c && c <= 0x1f)) { return false; } switch (c) { case '"': case '*': case '/': case ':': case '<': case '>': case '?': c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidFatFilenameChar File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
isValidFatFilenameChar
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public static boolean isDataFlavorAvailable(@Nonnull final Clipboard clipboard, @Nonnull final DataFlavor flavor) { boolean result = false; try { result = clipboard.isDataFlavorAvailable(flavor); } catch (final IllegalStateException ex) { LOGGER.warn("Can't get access to clipboard : "+ ex.getMes...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000542 - Severity: MEDIUM - CVSS Score: 6.8 Description: #45 activated FEATURE_SECURE_PROCESSING for XML parsing Function: isDataFlavorAvailable File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java Reposit...
[ "CWE-611" ]
CVE-2018-1000542
MEDIUM
6.8
raydac/netbeans-mmd-plugin
isDataFlavorAvailable
mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
9fba652bf06e649186b8f9e612d60e9cc15097e9
1
Analyze the following code function for security vulnerabilities
protected String getHomeLink(Map<String, Object> data) { String home_page_link = data.get("context_path").toString() + "/home"; if (!getPropertyString("homeUrl").isEmpty()) { home_page_link = getPropertyString("homeUrl"); } return "<li class=\"\"><a class=\"btn\" href=\"" + h...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHomeLink File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
getHomeLink
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
public List<PanelShareOutDTO> queryTargets(String panelId) { String username = AuthUtils.getUser().getUsername(); List<PanelShareOutDTO> targets = extPanelShareMapper.queryTargets(panelId, username); if (CollectionUtils.isEmpty(targets)) return new ArrayList<>(); return targe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryTargets File: backend/src/main/java/io/dataease/service/panel/ShareService.java Repository: dataease The code follows secure coding practices.
[ "CWE-639" ]
CVE-2023-32310
HIGH
8.1
dataease
queryTargets
backend/src/main/java/io/dataease/service/panel/ShareService.java
72f428e87b5395c03d2f94ef6185fc247ddbc8dc
0
Analyze the following code function for security vulnerabilities
private static Logger getLogger() { return LoggerFactory.getLogger(StaticFileServer.class.getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogger File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
getLogger
flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
6ae6460ca4f3a9b50bd46fbf49c807fe67718307
0
Analyze the following code function for security vulnerabilities
@Override public void showWaitingForDebugger(IApplicationThread who, boolean waiting) { synchronized (this) { ProcessRecord app = who != null ? getRecordForAppLocked(who) : null; if (app == null) return; Message msg = Message.obtain(); msg.wha...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showWaitingForDebugger File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
showWaitingForDebugger
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public static void fireConfigurationChanged() { final ChangeEvent event = new ChangeEvent(GeoTools.class); final Object[] listeners = LISTENERS.getListenerList(); for (int i = 0; i < listeners.length; i += 2) { if (listeners[i] == ChangeListener.class) { ((ChangeListe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fireConfigurationChanged File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
fireConfigurationChanged
modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override public String getFailedOutput() { return failedOutput; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFailedOutput File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-172" ]
CVE-2021-33604
LOW
1.2
vaadin/flow
getFailedOutput
vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc
0
Analyze the following code function for security vulnerabilities
public boolean requestedShowSurfaceBehindKeyguard() { return mSurfaceBehindRemoteAnimationRequested; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestedShowSurfaceBehindKeyguard File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
requestedShowSurfaceBehindKeyguard
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@Override public X509Certificate[] getAcceptedIssuers() { return (acceptedIssuers != null) ? acceptedIssuers.clone() : acceptedIssuers(rootKeyStore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAcceptedIssuers File: src/platform/java/org/conscrypt/TrustManagerImpl.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-345" ]
CVE-2016-0818
MEDIUM
4.3
android
getAcceptedIssuers
src/platform/java/org/conscrypt/TrustManagerImpl.java
c4ab1b959280413fb11bf4fd7f6b4c2ba38bd779
0
Analyze the following code function for security vulnerabilities
void blockNativeFocus(boolean block) { if (layoutWrapper != null) { layoutWrapper.setDescendantFocusability(block ? ViewGroup.FOCUS_BLOCK_DESCENDANTS : ViewGroup.FOCUS_AFTER_DESCENDANTS); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: blockNativeFocus File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
blockNativeFocus
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
protected String parametersAsQueryString(String resource, XWikiContext context) { Map<String, Object> parameters = getParametersForResource(resource, context); StringBuilder query = new StringBuilder(); for (Entry<String, Object> parameter : parameters.entrySet()) { // Skip the p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parametersAsQueryString File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follo...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
parametersAsQueryString
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@Override public boolean isUnattendedManagedKiosk() { if (!mHasFeature) { return false; } Preconditions.checkCallAuthorization(canManageUsers(getCallerIdentity()) || hasCallingOrSelfPermission(MANAGE_PROFILE_AND_DEVICE_OWNERS)); return mInjector.binderWit...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUnattendedManagedKiosk File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isUnattendedManagedKiosk
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected void afterSuccessfulLogin(final boolean resumed) throws NotConnectedException, InterruptedException { // Indicate that we're now authenticated. this.authenticated = true; // If debugging is enabled, change the the debug window title to include the // name we are now logged-in ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: afterSuccessfulLogin File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
afterSuccessfulLogin
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public List<Entry<String, String>> entries() { if (isEmpty()) { return Collections.emptyList(); } List<Entry<String, String>> entriesConverted = new ArrayList<Entry<String, String>>( headers.size()); for (Entry<String, String> entry : this) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: entries File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
entries
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
@Override public Directory read(final ImageInputStream input) throws IOException { Validate.notNull(input, "input"); DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setNamespaceAware(true); try { // TODO: Consider parsing using SAX? ...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2021-23792 - Severity: HIGH - CVSS Score: 7.5 Description: Avoid fetching external resources in XMPReader. Function: read File: imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java Repository: haraldk/TwelveMonkeys Fixed ...
[ "CWE-611" ]
CVE-2021-23792
HIGH
7.5
haraldk/TwelveMonkeys
read
imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java
da4efe98bf09e1cce91b7633cb251958a200fc80
1
Analyze the following code function for security vulnerabilities
@Deprecated public BaseObject updateObjectFromRequest(String className, XWikiContext context) throws XWikiException { return updateObjectFromRequest(className, "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateObjectFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
updateObjectFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public static void filterContent(String[] values, String customXssString) { String[] xssArr = XSS_STR.split("\\|"); for (String value : values) { if (value == null || "".equals(value)) { return; } // 统一转为小写 value = value.toLowerCase(); //SQL注入检测存在绕过风险 https://gitee.com/jeecg/jeecg-boot/issues/I4N...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2022-45206 - Severity: CRITICAL - CVSS Score: 9.8 Description: sql注入检查更加严格,修复/sys/duplicate/check存在sql注入漏洞 #4129 Function: filterContent File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java Repository: jeecgboot/jeecg-boot Fixed C...
[ "CWE-89" ]
CVE-2022-45206
CRITICAL
9.8
jeecgboot/jeecg-boot
filterContent
jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java
f18ced524c9ec13e876bfb74785a1b112cc8b6bb
1
Analyze the following code function for security vulnerabilities
private boolean validPropertyValueType(Object value) { return (value instanceof String || value instanceof Boolean || value instanceof Byte || value instanceof Short || value instanceof Integer || value instanceof Long || value instan...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validPropertyValueType File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
validPropertyValueType
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
public List<ServerConfiguration> getServers() { return servers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServers File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getServers
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void maybeMakeSpaceHidden(SpaceReference spaceReference, String modifiedDocument, Session session) { XWikiSpace space = loadXWikiSpace(spaceReference, session); // The space is supposed to exist if (space == null) { this.logger.warn( "Space [{}] does not ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeMakeSpaceHidden File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
maybeMakeSpaceHidden
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private boolean isCurrentThreadWhitelisted() { var trustScope = configuration != null ? configuration.threadTrustScope() : TrustScope.MINIMAL; if (trustScope == TrustScope.ALL_THREADS) return true; var currentThread = Thread.currentThread(); var name = externGet(currentThread::getName); /* * NOTE: the o...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCurrentThreadWhitelisted File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
isCurrentThreadWhitelisted
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public Stream<UserSessionModel> loadUserSessionsStream(Integer firstResult, Integer maxResults, boolean offline, String lastUserSessionId) { String offlineStr = offlineToString(offline); TypedQuery<PersistentUserSessionEntity> query = paginateQ...
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2023-6563 - Severity: HIGH - CVSS Score: 7.7 Description: Fix performance issues with many offline sessions Fixes: #13340 Function: loadUserSessionsStream File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java Reposit...
[ "CWE-770" ]
CVE-2023-6563
HIGH
7.7
keycloak
loadUserSessionsStream
model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
11eb952e1df7cbb95b1e2c101dfd4839a2375695
1
Analyze the following code function for security vulnerabilities
public ViewsTabBar getViewsTabBar() { return viewsTabBar; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewsTabBar File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getViewsTabBar
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public void registerProcessObserver(IProcessObserver observer) { enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER, "registerProcessObserver()"); mProcessList.registerProcessObserver(observer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerProcessObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
registerProcessObserver
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override void resetDragResizingChangeReported() { mDragResizingChangeReported = false; super.resetDragResizingChangeReported(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetDragResizingChangeReported File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
resetDragResizingChangeReported
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void gotoPage(String space, String page, String action) { gotoPage(space, page, action, ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
gotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private boolean isFileOk() { // ::comment when __CORE__ if (SecurityUtils.getSecurityProfile() == SecurityProfile.SANDBOX) // In SANDBOX, we cannot read any files return false; // In any case SFile should not access the security folders // (the files must be handled internally) try { if (isDenied())...
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-3431 - Severity: MEDIUM - CVSS Score: 5.3 Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead https://github.com/plantuml/plantuml-server/issues/232 Function: isFileOk File: src/net/sourceforge/plantuml/security/SFile.java R...
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
isFileOk
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
1
Analyze the following code function for security vulnerabilities
@Override public void grantDefaultPermissionsToEnabledCarrierApps(String[] packageNames, int userId) { enforceSystemOrPhoneCaller("grantPermissionsToEnabledCarrierApps"); synchronized (mPackages) { final long identity = Binder.clearCallingIdentity(); try { mDe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantDefaultPermissionsToEnabledCarrierApps File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
grantDefaultPermissionsToEnabledCarrierApps
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public boolean setChecked(boolean isChecked) { mWifiManager.setScanAlwaysAvailable(isChecked); // Returning true means the underlying setting is updated. return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setChecked File: src/com/android/settings/location/WifiScanningMainSwitchPreferenceController.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21247
HIGH
7.8
android
setChecked
src/com/android/settings/location/WifiScanningMainSwitchPreferenceController.java
edd4023805bc7fa54ae31de222cde02b9012bbc4
0
Analyze the following code function for security vulnerabilities
void scheduleIdleTimeoutLocked(ActivityRecord next) { if (DEBUG_IDLE) Slog.d(TAG_IDLE, "scheduleIdleTimeoutLocked: Callers=" + Debug.getCallers(4)); Message msg = mHandler.obtainMessage(IDLE_TIMEOUT_MSG, next); mHandler.sendMessageDelayed(msg, IDLE_TIMEOUT); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleIdleTimeoutLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
scheduleIdleTimeoutLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override public Long getLastModified() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastModified File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
getLastModified
src/main/java/org/olat/core/commons/modules/bc/commands/CmdDownloadZip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
@Test public void selectSingleParam(TestContext context) { postgresClient = createNumbers(context, 51, 52, 53); postgresClient.selectSingle("SELECT i FROM numbers WHERE i IN (?, ?, ?) ORDER BY i", new JsonArray().add(51).add(53).add(55), context.asyncAssertSuccess(select -> { context...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectSingleParam File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
selectSingleParam
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Column(name = "content", nullable = false, length = 65535) public String getContent() { return this.content; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContent File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogOperate.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getContent
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogOperate.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@ApiOperation(value = "Delete the CompositeSolution") @RequestMapping(value = "/deleteCompositeSolution", method = RequestMethod.POST) @ResponseBody public String deleteCompositeSolution(@RequestParam(value = "userid", required = true) String userId, @RequestParam(value = "solutionid", required = true) String sol...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2018-25097 - Severity: MEDIUM - CVSS Score: 4.0 Description: Senitization for CSS Vulnerability Issue-Id : ACUMOS-1650 Description : Senitization for CSS Vulnerability - Design Studio Change-Id: If8fd4b9b06f884219d93881f7922421870de8e3d Signed-off-by: Ramanaiah ...
[ "CWE-79" ]
CVE-2018-25097
MEDIUM
4
acumos/design-studio
deleteCompositeSolution
ds-compositionengine/src/main/java/org/acumos/designstudio/ce/controller/SolutionController.java
0df8a5e8722188744973168648e4c74c69ce67fd
1
Analyze the following code function for security vulnerabilities
public void addServletMapping(String servletName, String urlPattern) { if (log.isDebugEnabled()) { log.debug("Process servletName=" + servletName + ", urlPattern=" + urlPattern); } if (servletName == null) { return; } if (servletName...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addServletMapping File: src/share/org/apache/struts/action/ActionServlet.java Repository: kawasima/struts1-forever The code follows secure coding practices.
[ "CWE-Other", "CWE-20" ]
CVE-2016-1181
MEDIUM
6.8
kawasima/struts1-forever
addServletMapping
src/share/org/apache/struts/action/ActionServlet.java
eda3a79907ed8fcb0387a0496d0cb14332f250e8
0
Analyze the following code function for security vulnerabilities
public static boolean isBreakpointAvailable(final int id, final FileDownloadModel model, final String path, final Boolean outputStreamSupportSeek) { boolean result = false; do { if (path == null)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBreakpointAvailable File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
isBreakpointAvailable
library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
public ServerBuilder disableServerHeader() { enableServerHeader = false; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableServerHeader File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
disableServerHeader
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
private VelocityEvaluator getVelocityEvaluator() { if (this.velocityEvaluator == null) { this.velocityEvaluator = Utils.getComponent(VelocityEvaluator.class); } return this.velocityEvaluator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVelocityEvaluator File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getVelocityEvaluator
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public ClientConfig getClientConfig() { return clientConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientConfig File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getClientConfig
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private boolean isVisibleToCaller(PhoneAccount account) { if (account == null) { return false; } // If this PhoneAccount has CAPABILITY_MULTI_USER, it should be visible to all users and // all profiles. Only Telephony and SIP accounts should have this capability. if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isVisibleToCaller File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
isVisibleToCaller
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
XmlGenerator open(String name, Object... attributes) { appendOpenNode(xml, name, attributes); openNodes.addLast(name); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: open File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
open
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0