instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private void removeComponent(Object item) {
Component component = activeComponents.remove(item);
if (component != null) {
getGrid().removeExtensionComponent(component);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeComponent
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | removeComponent | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public static File buildNonUniqueFile(File parent, String mimeType, String displayName) {
final String[] parts = splitFileName(mimeType, displayName);
return buildFile(parent, parts[0], parts[1]);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildNonUniqueFile
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | buildNonUniqueFile | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | public Builder setProxyServerSelector(ProxyServerSelector proxyServerSelector) {
this.proxyServerSelector = proxyServerSelector;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProxyServerSelector
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setProxyServerSelector | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public boolean copyDocument(String docname, String targetdocname, String wikilocale) throws XWikiException
{
return this.copyDocument(docname, targetdocname, null, null, wikilocale, false, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | copyDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | void postWindowRemoveStartingWindowCleanup(WindowState win) {
// TODO: Something smells about the code below...Is there a better way?
if (mStartingWindow == win) {
ProtoLog.v(WM_DEBUG_STARTING_WINDOW, "Notify removed startingWindow %s", win);
removeStartingWindow();
} els... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postWindowRemoveStartingWindowCleanup
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | postWindowRemoveStartingWindowCleanup | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public String getName() {
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
Repository: opensearch-project/security
The code follows secure coding practices. | [
"CWE-612",
"CWE-863"
] | CVE-2022-41918 | MEDIUM | 6.3 | opensearch-project/security | getName | src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java | f7cc569c9d3fa5d5432c76c854eed280d45ce6f4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startLockTaskMode(IBinder token) {
synchronized (this) {
final ActivityRecord r = ActivityRecord.forTokenLocked(token);
if (r == null) {
return;
}
final TaskRecord task = r.task;
if (task != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startLockTaskMode
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | startLockTaskMode | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | private Collection<Principal> getAllGroupsForUser(
ISessionManager sessionManager, String username)
throws RepositoryLoginException, RepositoryException {
ArrayList<Principal> listGroups = new ArrayList<Principal>();
ISession session = sessionManager.getSession(docbase);
try {
String query... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllGroupsForUser
File: projects/dctm-core/source/java/com/google/enterprise/connector/dctm/DctmAuthenticationManager.java
Repository: AnantLabs/google-enterprise-connector-dctm
The code follows secure coding practi... | [
"CWE-89"
] | CVE-2014-125083 | MEDIUM | 5.2 | AnantLabs/google-enterprise-connector-dctm | getAllGroupsForUser | projects/dctm-core/source/java/com/google/enterprise/connector/dctm/DctmAuthenticationManager.java | 6fba04f18ab7764002a1da308e7cd9712b501cb7 | 0 |
Analyze the following code function for security vulnerabilities | final Object getLockObject() {
if (ENABLE_LOCK_GUARD) {
final long start = mStatLogger.getTime();
LockGuard.guard(LockGuard.INDEX_DPMS);
mStatLogger.logDurationStat(Stats.LOCK_GUARD_GUARD, start);
}
return mLockDoNoUseDirectly;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLockObject
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getLockObject | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "11.8RC1")
public MergeResult merge(XWikiDocument previousDocument, XWikiDocument newDocument,
MergeConfiguration configuration, XWikiContext context)
{
MergeManager mergeManager = Utils.getComponent(MergeManager.class);
MergeDocumentResult mergeDocumentResult =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: merge
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | merge | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public float getSecondaryHorizontal(int offset, boolean clamped) {
boolean trailing = primaryIsTrailingPrevious(offset);
return getHorizontal(offset, !trailing, clamped);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSecondaryHorizontal
File: core/java/android/text/Layout.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9452 | MEDIUM | 4.3 | android | getSecondaryHorizontal | core/java/android/text/Layout.java | 3b6f84b77c30ec0bab5147b0cffc192c86ba2634 | 0 |
Analyze the following code function for security vulnerabilities | public static void composeMailto(Context context, Account account, Uri mailto) {
final Intent intent = new Intent(Intent.ACTION_VIEW, mailto);
intent.setPackage(context.getPackageName());
intent.putExtra(EXTRA_FROM_EMAIL_TASK, true);
intent.putExtra(Utils.EXTRA_ACCOUNT, account);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: composeMailto
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | composeMailto | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public static ClickHouseNode of(URI uri, ClickHouseNode template) {
String host = ClickHouseChecker.nonNull(uri, "URI").getHost();
String scheme = ClickHouseChecker.nonEmpty(uri.getScheme(), "Protocol");
if (template == null) {
template = DEFAULT;
}
if (ClickHouseChec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: of
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | of | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | public static final native void setThreadPriority(int tid, int priority)
throws IllegalArgumentException, SecurityException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setThreadPriority
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | setThreadPriority | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | public static Materials multipleMaterials() {
Materials materials = new Materials();
materials.add(svnMaterial("http://svnurl"));
materials.add(hgMaterial("http://hgurl", "hgdir"));
materials.add(dependencyMaterial("cruise", "dev"));
return materials;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: multipleMaterials
File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | multipleMaterials | domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public abstract int containedTypeCount(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: containedTypeCount
File: src/main/java/com/fasterxml/jackson/databind/JavaType.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | containedTypeCount | src/main/java/com/fasterxml/jackson/databind/JavaType.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean onlyHasDefaultChannel(String pkg, int uid) {
try {
return sINM.onlyHasDefaultChannel(pkg, uid);
} catch (Exception e) {
Log.w(TAG, "Error calling NoMan", e);
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onlyHasDefaultChannel
File: src/com/android/settings/notification/NotificationBackend.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35667 | HIGH | 7.8 | android | onlyHasDefaultChannel | src/com/android/settings/notification/NotificationBackend.java | d8355ac47e068ad20c6a7b1602e72f0585ec0085 | 0 |
Analyze the following code function for security vulnerabilities | NeededUriGrants checkGrantUriPermissionFromIntentLocked(int callingUid,
String targetPkg, Intent intent, int mode, NeededUriGrants needed, int targetUserId) {
if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION,
"Checking URI perm to data=" + (intent != null ? intent.getData() : null... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkGrantUriPermissionFromIntentLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | checkGrantUriPermissionFromIntentLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate33(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
if (file.getName().startsWith("Projects.xml")) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element: dom.getRootElement().elements()) {
for (Element branchProtectionElement: e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate33
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate33 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | public ClientConfig getClientConfig() {
return clientConfig;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientConfig
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getClientConfig | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected void commentImpl(String comment) {
xmlNode.appendChild(getDocument().createComment(comment));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: commentImpl
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | commentImpl | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | protected synchronized TransportConnectionState unregisterConnectionState(ConnectionId connectionId) {
return connectionStateRegister.unregisterConnectionState(connectionId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterConnectionState
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | unregisterConnectionState | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getNonDecorDisplayHeight(int fullWidth, int fullHeight, int rotation) {
if (mHasNavigationBar) {
// For a basic navigation bar, when we are in portrait mode we place
// the navigation bar to the bottom.
if (!mNavigationBarCanMove || fullWidth < fullHe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNonDecorDisplayHeight
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | getNonDecorDisplayHeight | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermissions("user:list")
@GetMapping("/list")
public String list(@RequestParam(defaultValue = "1") Integer pageNo, String username, Model model) {
// username= SecurityUtil.sanitizeInput(username);
IPage<User> iPage = userService.selectAll(pageNo, username);
model.addAttribute("p... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2022-23391
- Severity: MEDIUM
- CVSS Score: 4.3
Description: 修复了一部分页面上输入框的xss注入
https://github.com/atjiu/pybbs/issues/171
Function: list
File: src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
Repository: atjiu/pybbs
Fixed Code:
@RequiresPerm... | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | list | src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 1 |
Analyze the following code function for security vulnerabilities | public void gotoPage(List<String> spaces, String page, String action, String queryString)
{
gotoPage(getURL(spaces, page, action, queryString));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gotoPage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | gotoPage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | void setLoaders(@NonNull List<ResourcesLoader> newLoaders) {
Objects.requireNonNull(newLoaders, "newLoaders");
final ArrayList<ApkAssets> apkAssets = new ArrayList<>();
for (int i = 0; i < mApkAssets.length; i++) {
// Filter out the previous loader apk assets.
if (!mApkA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLoaders
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | setLoaders | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public String getSkinPreference(String preference)
{
return this.xwiki.getSkinPreference(preference, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSkinPreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getSkinPreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | static boolean isPrimitiveType(char typecode) {
return !(typecode == '[' || typecode == 'L');
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPrimitiveType
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | isPrimitiveType | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public void setSocketConfigurator(SocketConfigurator socketConfigurator) {
this.socketConf = socketConfigurator;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSocketConfigurator
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | setSocketConfigurator | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | boolean shouldUseAppThemeSnapshot() {
return !mEnableRecentsScreenshot || forAllWindows(WindowState::isSecureLocked,
true /* topToBottom */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldUseAppThemeSnapshot
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | shouldUseAppThemeSnapshot | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onTextContextMenuItem(int id) {
if (id == android.R.id.paste) {
ClipboardManager clipboard = (ClipboardManager) getContext()
.getSystemService(Context.CLIPBOARD_SERVICE);
ClipData clipData = clipboard.getPrimaryClip();
if (clip... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTextContextMenuItem
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | onTextContextMenuItem | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
private ShortcutUser loadUserLocked(@UserIdInt int userId) {
try (ResilientAtomicFile file = getUserFile(userId)) {
FileInputStream in = null;
try {
if (DEBUG || DEBUG_REBOOT) {
Slog.d(TAG, "Loading from " + file);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadUserLocked
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | loadUserLocked | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public void cleanup(boolean closeall) {
int size = fCurrentEntityStack.size();
if (size > 0) {
// current entity is not the original, so close it
if (fCurrentEntity != null) {
fCurrentEntity.closeQuietly();
}
// close remaining streams
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanup
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | cleanup | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | private void enforceDebuggable(ApplicationInfo info) {
if (!Build.IS_DEBUGGABLE && (info.flags & ApplicationInfo.FLAG_DEBUGGABLE) == 0) {
throw new SecurityException("Process not debuggable: " + info.packageName);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceDebuggable
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | enforceDebuggable | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String nextFieldName() throws IOException
{
if (_parsingContext.inObject() && _currToken != JsonToken.FIELD_NAME) {
_numTypesValid = NR_UNKNOWN;
if (_tokenIncomplete) {
_skipIncomplete();
}
_tokenInputTotal = _currInputProc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nextFieldName
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | nextFieldName | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | void writeBroadcastsToProtoLocked(ProtoOutputStream proto) {
if (mRegisteredReceivers.size() > 0) {
Iterator it = mRegisteredReceivers.values().iterator();
while (it.hasNext()) {
ReceiverList r = (ReceiverList)it.next();
r.dumpDebug(proto, ActivityManagerS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeBroadcastsToProtoLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | writeBroadcastsToProtoLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void migrate21(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
if (file.getName().startsWith("Projects.xml")) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element: dom.getRootElement().elements()) {
for (Element branchProtectionElement: e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate21
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate21 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object forward(String path) {
try {
HttpServletResponse response = (HttpServletResponse)SaManager.getSaTokenContextOrSecond().getResponse().getSource();
request.getRequestDispatcher(path).forward(request, response);
return null;
} catch (ServletException | IOException e) {
throw new Sa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forward
File: sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | forward | sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | @Transactional
@Override
public void save(Project project) {
save(project, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | save | server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<DocumentReference> searchDocumentReferences(String wheresql, int nb, int start, XWikiContext context)
throws XWikiException
{
return searchDocumentReferences(wheresql, nb, start, "", context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: searchDocumentReferences
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | searchDocumentReferences | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | private void updateLeftAffordanceIcon() {
IconState state = mLeftButton.getIcon();
mLeftAffordanceView.setVisibility(!mDozing && state.isVisible ? View.VISIBLE : View.GONE);
mLeftAffordanceView.setImageDrawable(state.drawable, state.tint);
mLeftAffordanceView.setContentDescription(state.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateLeftAffordanceIcon
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | updateLeftAffordanceIcon | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
@Deprecated
public BubbleMetadata.Builder createShortcutBubble(@NonNull String shortcutId) {
if (!TextUtils.isEmpty(shortcutId)) {
// If shortcut id is set, we don't use these if they were previously set.
mPendingIntent = null;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createShortcutBubble
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | createShortcutBubble | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setDeviceIdleWhitelist(int[] allAppids, int[] exceptIdleAppids) {
synchronized (ActivityManagerService.this) {
mDeviceIdleWhitelist = allAppids;
mDeviceIdleExceptIdleWhitelist = exceptIdleAppids;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDeviceIdleWhitelist
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setDeviceIdleWhitelist | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isDrawFinishedLw() {
return mHasSurface && !mDestroying &&
(mWinAnimator.mDrawState == COMMIT_DRAW_PENDING
|| mWinAnimator.mDrawState == READY_TO_SHOW
|| mWinAnimator.mDrawState == HAS_DRAWN);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDrawFinishedLw
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isDrawFinishedLw | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public boolean doesFileExistAndMatchContentsWithEtcPristine(String file) {
final java.nio.file.Path etcPath = ensureFileIsAllowed(file);
final java.nio.file.Path etcPristinePath = etcPristineFolder.resolve(file);
if (!Files.exists(etcPristinePath)) {
return false;
}
... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-40315
- Severity: HIGH
- CVSS Score: 8.0
Description: NMS-15702: Only members of ROLE_ADMIN can view/edit users.xml
Function: doesFileExistAndMatchContentsWithEtcPristine
File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestServic... | [
"CWE-Other"
] | CVE-2023-40315 | HIGH | 8 | OpenNMS/opennms | doesFileExistAndMatchContentsWithEtcPristine | opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java | 201301e067329ababa3c0671ded5c4c43347d4a8 | 1 |
Analyze the following code function for security vulnerabilities | public static ActivityOptions makeTaskLaunchBehind() {
final ActivityOptions opts = new ActivityOptions();
opts.mAnimationType = ANIM_LAUNCH_TASK_BEHIND;
return opts;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeTaskLaunchBehind
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | makeTaskLaunchBehind | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public void setConnectionRecoveryTriggeringCondition(Predicate<ShutdownSignalException> connectionRecoveryTriggeringCondition) {
this.connectionRecoveryTriggeringCondition = connectionRecoveryTriggeringCondition;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConnectionRecoveryTriggeringCondition
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | setConnectionRecoveryTriggeringCondition | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | boolean performShowLocked() {
if (!showToCurrentUser()) {
if (DEBUG_VISIBILITY) Slog.w(TAG, "hiding " + this + ", belonging to " + mOwnerUid);
clearPolicyVisibilityFlag(VISIBLE_FOR_USER);
return false;
}
logPerformShow("performShow on ");
final int d... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performShowLocked
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | performShowLocked | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int stringWidth(Object nativeFont, String str) {
float w = (nativeFont == null ? this.defaultFont
: (Paint) ((NativeFont) nativeFont).font).measureText(str);
if (w - (int) w > 0) {
return (int) (w + 1);
}
return (int) w;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stringWidth
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | stringWidth | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void navigationStateChanged(int flags) {
if ((flags & INVALIDATE_TYPE_TITLE) != 0) {
for (TabObserver observer : mObservers) observer.onTitleUpdated(Tab.this);
}
if ((flags & INVALIDATE_TYPE_URL) != 0) {
for (TabObserver observ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: navigationStateChanged
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | navigationStateChanged | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void updateObject(
int columnIndex, @Nullable Object x, int scale) throws SQLException {
this.updateObject(columnIndex, x);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateObject
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateObject | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private boolean maybeMigrateSettingsForRenamedAuthorities() {
boolean writeNeeded = false;
ArrayList<AuthorityInfo> authoritiesToRemove = new ArrayList<AuthorityInfo>();
final int N = mAuthorities.size();
for (int i = 0; i < N; i++) {
AuthorityInfo authority = mAuthorities.v... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeMigrateSettingsForRenamedAuthorities
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | maybeMigrateSettingsForRenamedAuthorities | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public static Set<String> getSupportedClientKeyTypes(byte[] clientCertificateTypes) {
Set<String> result = new HashSet<String>(clientCertificateTypes.length);
for (byte keyTypeCode : clientCertificateTypes) {
String keyType = getClientKeyType(keyTypeCode);
if (keyType == null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSupportedClientKeyTypes
File: src/main/java/org/conscrypt/SSLParametersImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3840 | HIGH | 10 | android | getSupportedClientKeyTypes | src/main/java/org/conscrypt/SSLParametersImpl.java | 5af5e93463f4333187e7e35f3bd2b846654aa214 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isOperatorConsideredNonRoaming(ServiceState s) {
String operatorNumeric = s.getOperatorNumeric();
String[] numericArray = mPhone.getContext().getResources().getStringArray(
com.android.internal.R.array.config_operatorConsideredNonRoaming);
if (numericArray.le... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOperatorConsideredNonRoaming
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | isOperatorConsideredNonRoaming | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | private void writeStructure(Element design, DesignContext designContext) {
if (getColumns().isEmpty()) {
return;
}
Element tableElement = design.appendElement("table");
Element colGroup = tableElement.appendElement("colgroup");
getColumns().forEach(column -> column
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeStructure
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | writeStructure | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public Jooby port(final int port) {
this.port = port;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: port
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | port | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | void updateCpuStatsNow() {
synchronized (mProcessCpuTracker) {
mProcessCpuMutexFree.set(false);
final long now = SystemClock.uptimeMillis();
boolean haveNewCpuStats = false;
if (MONITOR_CPU_USAGE &&
mLastCpuTime.get() < (now-MONITOR_CPU_MIN_TI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateCpuStatsNow
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | updateCpuStatsNow | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setVrThread(int tid) {
enforceSystemHasVrFeature();
synchronized (mGlobalLock) {
final int pid = Binder.getCallingPid();
final WindowProcessController wpc = mProcessMap.getProcess(pid);
mVrController.setVrThreadLocked(tid, pid, wpc);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVrThread
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | setVrThread | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public void add(final String key, final Object object) {
propertyValues.computeIfAbsent(key, k -> new ArrayList<>()).add(object);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: add
File: stroom-core-server/src/main/java/stroom/importexport/server/Config.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | add | stroom-core-server/src/main/java/stroom/importexport/server/Config.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final void finishHeavyWeightApp() {
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
!= PackageManager.PERMISSION_GRANTED) {
String msg = "Permission Denial: finishHeavyWeightApp() from pid="
+ Binder.getCallingPid()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishHeavyWeightApp
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | finishHeavyWeightApp | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void deleteByPojoDeleteFails(TestContext context) throws FieldException {
postgresClientQueryFails().delete(FOO, new SimplePojo(), context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteByPojoDeleteFails
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | deleteByPojoDeleteFails | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isScrimSrcModeEnabled() {
return mScrimSrcModeEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isScrimSrcModeEnabled
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | isScrimSrcModeEnabled | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("javadoc")
public void onAttachedToWindow() {
setAccessibilityState(mAccessibilityManager.isEnabled());
ScreenOrientationListener.getInstance().addObserver(this, mContext);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAttachedToWindow
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | onAttachedToWindow | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull public String getEnrollmentSpecificId() {
throwIfParentInstance("getEnrollmentSpecificId");
if (mService == null) {
return "";
}
try {
return mService.getEnrollmentSpecificId(mContext.getPackageName());
} catch (RemoteException re) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEnrollmentSpecificId
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getEnrollmentSpecificId | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected IBillingSupport createBillingSupport() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createBillingSupport
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | createBillingSupport | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onServerCertificateAvailable(
int depth,
byte[] subjectBytes,
byte[] certHashBytes,
byte[] certBytes) {
synchronized (mLock) {
// OpenSSL default maximum depth is 100.
if (depth < 0 || depth > 100) {
... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-21242
- Severity: CRITICAL
- CVSS Score: 9.8
Description: [TOFU] Validate full cert chains before displaying dialog
When a full chain including a Root CA is provided by the server,
perform a full validation of the chain before displaying the
TOFU dialog.
... | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | onServerCertificateAvailable | service/java/com/android/server/wifi/SupplicantStaNetworkCallbackAidlImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 1 |
Analyze the following code function for security vulnerabilities | void updateOrientationListenerLp() {
if (!mOrientationListener.canDetectOrientation()) {
// If sensor is turned off or nonexistent for some reason
return;
}
//Could have been invoked due to screen turning on or off or
//change of the currently visible window's ori... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateOrientationListenerLp
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | updateOrientationListenerLp | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void setAccessibilityState(boolean state) {
if (!state) {
setInjectedAccessibility(false);
mNativeAccessibilityAllowed = false;
mTouchExplorationEnabled = false;
} else {
boolean useScriptInjection = isDeviceAccessibilityScriptInjectionEnabled();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAccessibilityState
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | setAccessibilityState | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public Date parseDate(String str) {
try {
return dateFormat.parse(str);
} catch (java.text.ParseException e) {
throw new RuntimeException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseDate
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | parseDate | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | void bindPaymentServiceLocked(int userId, ComponentName service) {
unbindPaymentServiceLocked();
Log.d(TAG, "Binding to payment service " + service + " for userid:" + userId);
Intent intent = new Intent(HostApduService.SERVICE_INTERFACE);
intent.setComponent(service);
if (mConte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindPaymentServiceLocked
File: src/com/android/nfc/cardemulation/HostEmulationManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35671 | MEDIUM | 5.5 | android | bindPaymentServiceLocked | src/com/android/nfc/cardemulation/HostEmulationManager.java | 745632835f3d97513a9c2a96e56e1dc06c4e4176 | 0 |
Analyze the following code function for security vulnerabilities | private static String getAppRoleName(String applicationName) {
return ApplicationConstants.APPLICATION_DOMAIN + UserCoreConstants.DOMAIN_SEPARATOR + applicationName;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppRoleName
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-identity-fra... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getAppRoleName | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final int startActivityAsUser(IApplicationThread caller, String callingPackage,
Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode,
int startFlags, ProfilerInfo profilerInfo, Bundle options, int userId) {
enforceNotIsolatedCaller(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAsUser
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | startActivityAsUser | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setResetPasswordToken(ComponentName admin, byte[] token) {
if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) {
return false;
}
if (token == null || token.length < 32) {
throw new IllegalArgumentException("token must be at least 32-... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResetPasswordToken
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setResetPasswordToken | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | final StandardTemplateParams reset() {
mViewType = VIEW_TYPE_UNSPECIFIED;
mHeaderless = false;
mHideAppName = false;
mHideTitle = false;
mHideSubText = false;
mHideTime = false;
mHideActions = false;
mHideProgress = false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reset
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | reset | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private void clearLightsLocked() {
// light
mLights.clear();
updateLightsLocked();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearLightsLocked
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | clearLightsLocked | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public void gotoPage(String space, String page, String action, String queryString)
{
gotoPage(Collections.singletonList(space), page, action, queryString);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gotoPage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | gotoPage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public <V> Column<T, V> addColumn(ValueProvider<T, V> valueProvider,
AbstractRenderer<? super T, ? super V> renderer) {
return addColumn(valueProvider, ValueProvider.identity(), renderer);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addColumn
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addColumn | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public void setDebugApp(
String packageName, boolean waitForDebugger, boolean persistent)
throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeString(packageName);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDebugApp
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | setDebugApp | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public void setDistinct(boolean distinct) {
mDistinct = distinct;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDistinct
File: core/java/android/database/sqlite/SQLiteQueryBuilder.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | setDistinct | core/java/android/database/sqlite/SQLiteQueryBuilder.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | private void parseAlliances(final Element root) throws GameParseException {
final AllianceTracker allianceTracker = data.getAllianceTracker();
final Collection<PlayerId> players = data.getPlayerList().getPlayers();
for (final Element current : getChildren("alliance", root)) {
final PlayerId p1 = getPl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseAlliances
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parseAlliances | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void executePOSTDuplicates() throws Exception {
final DataPoints[] datapoints = new DataPoints[1];
datapoints[0] = new MockDataPoints().getMock();
when(query_result.runAsync()).thenReturn(
Deferred.fromResult(datapoints));
final HttpQuery query = NettyMocks.postQuery(tsdb,"/api/q... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executePOSTDuplicates
File: test/tsd/TestQueryRpc.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | executePOSTDuplicates | test/tsd/TestQueryRpc.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | ArrayList<ActivityRecord> getDumpActivitiesLocked(String name) {
return mFocusedStack.getDumpActivitiesLocked(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDumpActivitiesLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | getDumpActivitiesLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected KBTemplate removeImpl(KBTemplate kbTemplate) {
kbTemplate = toUnwrappedModel(kbTemplate);
Session session = null;
try {
session = openSession();
if (!session.contains(kbTemplate)) {
kbTemplate = (KBTemplate)session.get(KBTemplateImpl.class,
kbTemplate.getPrimaryKeyObj());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeImpl
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
Repository: brianchandotcom/liferay-portal
The code ... | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | removeImpl | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 0 |
Analyze the following code function for security vulnerabilities | @DeleteMapping("{id}")
public Result delete(@PathVariable Integer id) {
User user = getApiUser();
Topic topic = topicService.selectById(id);
ApiAssert.isTrue(topic.getUserId().equals(user.getId()), "谁给你的权限删除别人的话题的?");
topicService.delete(topic);
return success();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: delete
File: src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java
Repository: atjiu/pybbs
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | delete | src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 0 |
Analyze the following code function for security vulnerabilities | public File downloadFileFromResponse(Response response) throws ApiException {
try {
File file = prepareDownloadFile(response);
Files.copy(response.readEntity(InputStream.class), file.toPath(), StandardCopyOption.REPLACE_EXISTING);
return file;
} catch (IOException e) {
throw new ApiExcep... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: downloadFileFromResponse
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | downloadFileFromResponse | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
long getProtoFieldId() {
return ACTIVITY;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProtoFieldId
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getProtoFieldId | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public String check(Method method, HttpServletRequest request) {
if (request.getUserPrincipal() != null) {
return verifyAuthenticatedUser(method, request);
} else {
return verifyAnonymousUser(method, request);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31406 | LOW | 1.9 | vaadin/flow | check | fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java | 3fe644cab2cffa5b86316dbe71b11df1083861a9 | 0 |
Analyze the following code function for security vulnerabilities | final void dumpGraphicsHardwareUsage(FileDescriptor fd,
PrintWriter pw, String[] args) {
ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, false, args);
if (procs == null) {
pw.println("No process found for: " + args[0]);
return;
}
long uptime ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpGraphicsHardwareUsage
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | dumpGraphicsHardwareUsage | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage,
@Nullable String callingFeatureId, Intent intent, String resolvedType, IBinder resultTo,
String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo,
Bundle bOptions, int userId) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAndWait
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | startActivityAndWait | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public XmlGraphMLReader source(ExportConfig.NodeConfig sourceConfig) {
this.source = sourceConfig;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: source
File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
Repository: neo4j/apoc
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-23926 | HIGH | 8.1 | neo4j/apoc | source | core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java | 3202b421b21973b2f57a43b33c88f3f6901cfd2a | 0 |
Analyze the following code function for security vulnerabilities | boolean injectIsSafeModeEnabled() {
final long token = injectClearCallingIdentity();
try {
return IWindowManager.Stub
.asInterface(ServiceManager.getService(Context.WINDOW_SERVICE))
.isSafeModeEnabled();
} catch (RemoteException e) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectIsSafeModeEnabled
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | injectIsSafeModeEnabled | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void logd(String s) {
Log.d(getTag(), s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logd
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | logd | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DataSource createNewDataSource(Map<String, ?> params) throws IOException {
String refName = (String) JNDI_REFNAME.lookUp(params);
try {
return (DataSource) GeoTools.getInitialContext().lookup(refName);
} catch (Exception e) {
throw new DataSourceExcep... | Vulnerability Classification:
- CWE: CWE-917
- CVE: CVE-2022-24818
- Severity: HIGH
- CVSS Score: 7.5
Description: [GEOT-7115] Streamline JNDI lookups
Function: createNewDataSource
File: modules/library/jdbc/src/main/java/org/geotools/data/jdbc/datasource/JNDIDataSourceFactory.java
Repository: geotools
Fixed Code:
@... | [
"CWE-917"
] | CVE-2022-24818 | HIGH | 7.5 | geotools | createNewDataSource | modules/library/jdbc/src/main/java/org/geotools/data/jdbc/datasource/JNDIDataSourceFactory.java | 4f70fa3234391dd0cda883a20ab0ec75688cba49 | 1 |
Analyze the following code function for security vulnerabilities | @Deprecated
public int createNewObject(String className, XWikiContext context) throws XWikiException
{
return createXObject(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()),
context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNewObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | createNewObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | void stopAssociationLocked(int sourceUid, String sourceProcess, int targetUid,
ComponentName targetComponent) {
if (!mTrackingAssociations) {
return;
}
ArrayMap<ComponentName, SparseArray<ArrayMap<String, Association>>> components
= mAssociations.get(targe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopAssociationLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | stopAssociationLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void completeStage(final Stage stage, final JobResult jobResult) {
final StageResult stageResult = completeAllJobs(stage, jobResult);
updateResultInTransaction(stage, stageResult);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: completeStage
File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | completeStage | server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | private void checkIfSomeAreApproved() {
if (!isVoiceOnlyCall) {
if (cameraEnumerator.getDeviceNames().length == 0) {
binding.cameraButton.setVisibility(View.GONE);
}
if (cameraEnumerator.getDeviceNames().length > 1) {
binding.switchSelfVideoBu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkIfSomeAreApproved
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | checkIfSomeAreApproved | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
final PackageInfo getPackageInfoWithSignatures(String packageName, @UserIdInt int userId) {
return getPackageInfo(packageName, userId, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageInfoWithSignatures
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getPackageInfoWithSignatures | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private byte[] hexToByteArray(String digits) {
final int bytes = digits.length() / 2;
if (2*bytes != digits.length()) {
throw new IllegalArgumentException("Hex string must have an even number of digits");
}
byte[] result = new byte[bytes];
for (int i = 0; i < digits.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hexToByteArray
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | hexToByteArray | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private List<DeletedDocument> wrapDeletedDocuments(XWikiDeletedDocument[] deletedDocuments)
{
if (deletedDocuments == null || deletedDocuments.length == 0) {
return Collections.emptyList();
}
List<DeletedDocument> result = new ArrayList<>(deletedDocuments.length);
for (X... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wrapDeletedDocuments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | wrapDeletedDocuments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.