instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public final boolean replaceOrderedBroadcastLocked(BroadcastRecord r) {
for (int i = mOrderedBroadcasts.size() - 1; i > 0; i--) {
if (r.intent.filterEquals(mOrderedBroadcasts.get(i).intent)) {
if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
"***** DROPPING ORDERED ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replaceOrderedBroadcastLocked
File: services/core/java/com/android/server/am/BroadcastQueue.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | replaceOrderedBroadcastLocked | services/core/java/com/android/server/am/BroadcastQueue.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public boolean isLegacyLockPatternEnabled(int userId) {
// Note: this value should default to {@code true} to avoid any reset that might result.
// We must use a special key to read this value, since it will by default return the value
// based on the new logic.
return ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLegacyLockPatternEnabled
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | isLegacyLockPatternEnabled | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | protected TabChromeWebContentsDelegateAndroid createWebContentsDelegate() {
return new TabChromeWebContentsDelegateAndroid();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createWebContentsDelegate
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | createWebContentsDelegate | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void setMaximumExpansionSize(int theMaximumExpansionSize) {
Validate.isTrue(theMaximumExpansionSize > 0, "theMaximumExpansionSize must be > 0");
myMaximumExpansionSize = theMaximumExpansionSize;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaximumExpansionSize
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setMaximumExpansionSize | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | public static void openBrowser(String url) throws Exception {
try {
String osName = StringUtils.toLowerEnglish(
Utils.getProperty("os.name", "linux"));
Runtime rt = Runtime.getRuntime();
String browser = Utils.getProperty(SysProperties.H2_BROWSER, null);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openBrowser
File: h2/src/main/org/h2/tools/Server.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | openBrowser | h2/src/main/org/h2/tools/Server.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isUrlOk() {
// ::comment when __CORE__
if (SecurityUtils.getSecurityProfile() == SecurityProfile.SANDBOX)
// In SANDBOX, we cannot read any URL
return false;
if (SecurityUtils.getSecurityProfile() == SecurityProfile.LEGACY)
return true;
if (SecurityUtils.getSecurityProfile() == Securi... | Vulnerability Classification:
- CWE: CWE-284
- CVE: CVE-2023-3431
- Severity: MEDIUM
- CVSS Score: 5.3
Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead
https://github.com/plantuml/plantuml-server/issues/232
Function: isUrlOk
File: src/net/sourceforge/plantuml/security/SURL.java
Rep... | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | isUrlOk | src/net/sourceforge/plantuml/security/SURL.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 1 |
Analyze the following code function for security vulnerabilities | @Override
public OnGoingLogicalCondition gt(ComparableFunction<T> value) {
Condition conditionLocal = new GtCondition<T>(selector, selector.generateParameter(value));
return getOnGoingLogicalCondition(conditionLocal);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gt
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2019-11343 | HIGH | 7.5 | xjodoin/torpedoquery | gt | src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java | 3c20b874fba9cc2a78b9ace10208de1602b56c3f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ApplicationBasicInfo[] getPaginatedApplicationBasicInfo(String tenantDomain, String username, int
pageNumber, String filter) throws IdentityApplicationManagementException {
ApplicationBasicInfo[] applicationBasicInfoArray;
try {
startTenantFlow(tenantDomain... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPaginatedApplicationBasicInfo
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/c... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getPaginatedApplicationBasicInfo | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @MediumTest
@Test
public void testSendCallEventNull() throws Exception {
IdPair ids = startAndMakeActiveIncomingCall("650-555-1212",
mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA);
assertEquals(Call.STATE_ACTIVE, mInCallServiceFixtureX.getCall(ids.mCallId).getSta... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testSendCallEventNull
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | testSendCallEventNull | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public static ClassLoader getSystemClassLoader() {
return PlatformDependent0.getSystemClassLoader();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemClassLoader
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | getSystemClassLoader | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onActivityResult(int requestCode, int resultCode, Intent intent) {
if (resultCode == RESULT_OK) {
if (xmppConnectionServiceBound) {
this.mPostponedActivityResult = null;
if (requestCode == REQUEST_CREATE_CONFERENCE) {
Account account = extractAccount(intent);
final String n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onActivityResult
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onActivityResult | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public static AdapterState make(AdapterService service, AdapterProperties adapterProperties) {
Log.d(TAG, "make() - Creating AdapterState");
AdapterState as = new AdapterState(service, adapterProperties);
as.start();
return as;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: make
File: src/com/android/bluetooth/btservice/AdapterState.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | make | src/com/android/bluetooth/btservice/AdapterState.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void showLowBatteryWarning(boolean playSound) {
Slog.i(TAG,
"show low battery warning: level=" + mBatteryLevel
+ " [" + mBucket + "] playSound=" + playSound);
mPlaySound = playSound;
mWarning = true;
updateNotification();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showLowBatteryWarning
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | showLowBatteryWarning | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | public long optLong(int index) {
return optLong(index, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optLong
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | optLong | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void sendError(int i, String s) throws IOException
{
this.response.sendError(i, s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendError
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-601"
] | CVE-2022-23618 | MEDIUM | 5.8 | xwiki/xwiki-platform | sendError | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | 5251c02080466bf9fb55288f04a37671108f8096 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public void testSimpleViaObjectMapper()
throws IOException
{
ObjectMapper mapper = new ObjectMapper();
// also need tree mapper to construct tree to serialize
ObjectNode n = mapper.getNodeFactory().objectNode();
n.put("number", 15);
... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2020-36518
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix #3473 (re-implementation of #2816 for 2.14)
Function: testSimpleViaObjectMapper
File: src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java
Repository: FasterXML/jackson-datab... | [
"CWE-787"
] | CVE-2020-36518 | MEDIUM | 5 | FasterXML/jackson-databind | testSimpleViaObjectMapper | src/test/java/com/fasterxml/jackson/databind/ser/TestTreeSerialization.java | 8238ab41d0350fb915797c89d46777b4496b74fd | 1 |
Analyze the following code function for security vulnerabilities | private void updateFontScaleIfNeeded(@UserIdInt int userId) {
final float scaleFactor = Settings.System.getFloatForUser(mContext.getContentResolver(),
FONT_SCALE, 1.0f, userId);
synchronized (this) {
if (getGlobalConfiguration().fontScale == scaleFactor) {
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateFontScaleIfNeeded
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | updateFontScaleIfNeeded | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Order(1)
@Test
void deleteApplication()
{
// Check the the applications live table lists the created application.
ApplicationsLiveTableElement appsLiveTable = appWithinMinutesHomePage.getAppsLiveTable();
assertTrue(appsLiveTable.hasColumn("Actions"));
appsLiveTable.filterApp... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteApplication
File: xwiki-platform-core/xwiki-platform-appwithinminutes/xwiki-platform-appwithinminutes-test/xwiki-platform-appwithinminutes-test-docker/src/test/it/org/xwiki/appwithinminutes/test/ui/AppsLiveTableI... | [
"CWE-79"
] | CVE-2023-29515 | MEDIUM | 5.4 | xwiki/xwiki-platform | deleteApplication | xwiki-platform-core/xwiki-platform-appwithinminutes/xwiki-platform-appwithinminutes-test/xwiki-platform-appwithinminutes-test-docker/src/test/it/org/xwiki/appwithinminutes/test/ui/AppsLiveTableIT.java | e73b890623efa604adc484ad82f37e31596fe1a6 | 0 |
Analyze the following code function for security vulnerabilities | public Point getAppTaskThumbnailSize() throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppTaskThumbnailSize
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getAppTaskThumbnailSize | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean startAsUser(Activity activity, Bundle options, UserHandle user) {
throw new RuntimeException("ChooserTargets should be started as caller.");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startAsUser
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | startAsUser | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 0 |
Analyze the following code function for security vulnerabilities | public void unregisterForSubscriptionInfoReady(Handler h) {
mCdmaForSubscriptionInfoReadyRegistrants.remove(h);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterForSubscriptionInfoReady
File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | unregisterForSubscriptionInfoReady | src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | public void setCreateDate(Date createDate) {
this.createDate = createDate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCreateDate
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogUpload.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | setCreateDate | publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogUpload.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | protected final boolean _isIntNumber(String text)
{
final int len = text.length();
if (len > 0) {
char c = text.charAt(0);
// skip leading sign (plus not allowed for strict JSON numbers but...)
int i;
if (c == '-' || c == '+') {
if (le... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _isIntNumber
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _isIntNumber | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | protected HtmlTree.Converter<Spanned> getSpanConverter() {
return new HtmlUtils.SpannedConverter();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpanConverter
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | getSpanConverter | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public IPage<SysUserSysDepartModel> queryUserByOrgCode(String orgCode, SysUser userParams, IPage page) {
List<SysUserSysDepartModel> list = baseMapper.getUserByOrgCode(page, orgCode, userParams);
Integer total = baseMapper.getUserByOrgCodeTotal(orgCode, userParams);
IPage<SysUserSysDepartModel> result... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryUserByOrgCode
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45208 | MEDIUM | 4.3 | jeecgboot/jeecg-boot | queryUserByOrgCode | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java | 51e2227bfe54f5d67b09411ee9a336750164e73d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CharSequence getShortSupportMessageForUser(@NonNull ComponentName who, int userHandle) {
if (!mHasFeature) {
return null;
}
Objects.requireNonNull(who, "ComponentName is null");
Preconditions.checkCallAuthorization(isSystemUid(getCallerIdentity()),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortSupportMessageForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getShortSupportMessageForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private String getStringValue(Node node)
{
String value = node.getNodeValue();
if (node.hasChildNodes())
{
Node first = node.getFirstChild();
if (first.getNodeType() == Node.TEXT_NODE)
{
return first.getNodeValue();
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStringValue
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | getStringValue | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java | 56e76049185bbd87c994128a9d77735ad7af0199 | 0 |
Analyze the following code function for security vulnerabilities | private void addOrReparentStartingActivity(@NonNull Task task, String reason) {
TaskFragment newParent = task;
if (mInTaskFragment != null) {
// TODO(b/234351413): remove remaining embedded Task logic.
// mInTaskFragment is created and added to the leaf task by task fragment orga... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addOrReparentStartingActivity
File: services/core/java/com/android/server/wm/ActivityStarter.java
Repository: android
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-21269 | HIGH | 7.8 | android | addOrReparentStartingActivity | services/core/java/com/android/server/wm/ActivityStarter.java | 70ec64dc5a2a816d6aa324190a726a85fd749b30 | 0 |
Analyze the following code function for security vulnerabilities | public static String buildValidFatFilename(String name) {
if (TextUtils.isEmpty(name) || ".".equals(name) || "..".equals(name)) {
return "(invalid)";
}
final StringBuilder res = new StringBuilder(name.length());
for (int i = 0; i < name.length(); i++) {
final char... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildValidFatFilename
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | buildValidFatFilename | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public GateKeeperResponse[] newArray(int size) {
return new GateKeeperResponse[size];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newArray
File: core/java/android/service/gatekeeper/GateKeeperResponse.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-0806 | HIGH | 9.3 | android | newArray | core/java/android/service/gatekeeper/GateKeeperResponse.java | b87c968e5a41a1a09166199bf54eee12608f3900 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int delete(Uri uri, String selection,
String[] selectionArgs) {
int match = sURLMatcher.match(uri);
if (LOCAL_LOGV) {
Log.v(TAG, "Delete uri=" + uri + ", match=" + match);
}
String table, extraSelection = null;
boolean notify = false;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: delete
File: src/com/android/providers/telephony/MmsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-3914 | HIGH | 9.3 | android | delete | src/com/android/providers/telephony/MmsProvider.java | 3a3a5d145d380deef2d5b7c3150864cd04be397f | 0 |
Analyze the following code function for security vulnerabilities | public URI toUri(String schemePrefix) {
StringBuilder builder = new StringBuilder();
String db = getDatabase().orElse(null);
for (Entry<String, String> entry : options.entrySet()) {
if (ClickHouseClientOption.DATABASE.getKey().equals(entry.getKey())) {
db = entry.getV... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toUri
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | toUri | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | @POST
@Path("survey")
@Operation(summary = "Attaches an survey building block", description = "Attaches an survey building block")
@ApiResponse(responseCode = "200", description = "The course node metadatas", content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachSurveyPost
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | attachSurveyPost | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTime(int time) {
if(nativeVideo != null){
nativeVideo.seekTo(time);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTime
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setTime | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<String> getParamNames(){
Set<String> names = request.getQueryParams().keySet();
return new ArrayList<>(names);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParamNames
File: sa-token-starter/sa-token-reactor-spring-boot3-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | getParamNames | sa-token-starter/sa-token-reactor-spring-boot3-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setCssErrorClass(String cssErrorClass) {
throw new UnsupportedOperationException("The 'cssErrorClass' attribute is not supported for forms");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCssErrorClass
File: spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-1904 | MEDIUM | 4.3 | spring-projects/spring-framework | setCssErrorClass | spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java | 741b4b229ae032bd17175b46f98673ce0bd2d485 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<BatchUpload> getImportsAvailable(EPerson eperson)
throws Exception
{
File uploadDir = new File(getImportUploadableDirectory(eperson));
if (!uploadDir.exists() || !uploadDir.isDirectory())
{
return null;
}
Map<String, BatchUpl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImportsAvailable
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | getImportsAvailable | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | protected void handleUnknownProperty(JsonParser p, DeserializationContext ctxt,
Object instanceOrClass, String propName)
throws IOException
{
if (instanceOrClass == null) {
instanceOrClass = handledType();
}
// Maybe we have configured handler(s) to take care ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleUnknownProperty
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | handleUnknownProperty | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setVoiceInteractionPackagesProvider(PackagesProvider provider) {
synchronized (mPackages) {
mDefaultPermissionPolicy.setVoiceInteractionPackagesProviderLPw(provider);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVoiceInteractionPackagesProvider
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setVoiceInteractionPackagesProvider | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private static @NonNull Iterator<String> buildUniqueNameIterator(@NonNull File parent,
@NonNull String name) {
if (isDcim(parent)) {
final Matcher dcfStrict = PATTERN_DCF_STRICT.matcher(name);
if (dcfStrict.matches()) {
// Generate names like "IMG_1001"
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildUniqueNameIterator
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | buildUniqueNameIterator | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | private ProcessRecord findProcessLocked(String process, int userId, String callName) {
userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(),
userId, true, ALLOW_FULL_ONLY, callName, null);
ProcessRecord proc = null;
try {
int pid = Integer.parseI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findProcessLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | findProcessLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void removeColumn(Object propertyId)
throws IllegalArgumentException {
if (!columns.keySet().contains(propertyId)) {
throw new IllegalArgumentException(
"There is no column for given property id " + propertyId);
}
List<Column> removed = new Arr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeColumn
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | removeColumn | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private int getWikiPort(WikiDescriptor wikiDescriptor, XWikiContext context)
{
// Try wiki descriptor
int port = wikiDescriptor.getPort();
if (port != -1) {
return port;
}
// Try main wiki
try {
port = getWikiDescriptorManager().getMainWikiDes... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWikiPort
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getWikiPort | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private int jjMoveStringLiteralDfa5_2(long old0, long active0)
{
if (((active0 &= old0)) == 0L)
return jjStartNfa_2(3, old0);
try { curChar = input_stream.readChar(); }
catch(java.io.IOException e) {
jjStopStringLiteralDfa_2(4, active0);
return 5;
}
switch(curChar)
{
case 110:
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jjMoveStringLiteralDfa5_2
File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
Repository: jakartaee/expression-language
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2021-28170 | MEDIUM | 5 | jakartaee/expression-language | jjMoveStringLiteralDfa5_2 | impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java | b6a3943ac5fba71cbc6719f092e319caa747855b | 0 |
Analyze the following code function for security vulnerabilities | public void unblockConversation(final Blockable conversation) {
activity.xmppConnectionService.sendUnblockRequest(conversation);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unblockConversation
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | unblockConversation | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public void setAuthzAcl(String authzAcl) {
this.authzAcl = authzAcl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAuthzAcl
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setAuthzAcl | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public long getLongValue(String fieldName)
{
BaseObject object = getFirstObject(fieldName, null);
if (object == null) {
return 0;
} else {
return object.getLongValue(fieldName);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLongValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getLongValue | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void remove(Structure st) {
String inode = st.getInode();
String structureName = st.getName();
cache.remove(primaryGroup + inode,primaryGroup);
cache.remove(primaryGroup + structureName,primaryGroup);
clearURLMasterPattern();
removeStructuresByType(st.getStructureT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: remove
File: src/com/dotmarketing/cache/ContentTypeCacheImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | remove | src/com/dotmarketing/cache/ContentTypeCacheImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @LargeTest
@Test
public void testSingleIncomingCallLocalDisconnect() throws Exception {
IdPair ids = startAndMakeActiveIncomingCall("650-555-1212",
mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA);
mInCallServiceFixtureX.mInCallAdapter.disconnectCall(ids.mCallId);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testSingleIncomingCallLocalDisconnect
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | testSingleIncomingCallLocalDisconnect | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasPermission(Permission permission) {
return Jenkins.getInstance().hasPermission(permission);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasPermission
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | hasPermission | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | public List<SyncInfo> getCurrentSyncsAsUser(int userId) {
enforceCrossUserPermission(userId,
"no permission to read the sync settings for user " + userId);
mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_STATS,
"no permission to read the sync stats")... | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2016-2426
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Redact Account info from getCurrentSyncs
BUG:26094635
If the caller to ContentResolver#getCurrentSyncs does not hold the
GET_ACCOUNTS permission, return a SyncInfo object that does not
contain any Accou... | [
"CWE-200"
] | CVE-2016-2426 | MEDIUM | 4.3 | android | getCurrentSyncsAsUser | services/core/java/com/android/server/content/ContentService.java | 63363af721650e426db5b0bdfb8b2d4fe36abdb0 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void onResume() {
getmGoogleApiClient(); // This should initialize it if it isn't already.
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onResume
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onResume | Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public String[] getIsimPcscf() throws RemoteException {
PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(getDefaultSubscription());
return phoneSubInfoProxy.getIsimPcscf();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIsimPcscf
File: src/java/com/android/internal/telephony/PhoneSubInfoController.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-0831 | MEDIUM | 4.3 | android | getIsimPcscf | src/java/com/android/internal/telephony/PhoneSubInfoController.java | 79eecef63f3ea99688333c19e22813f54d4a31b1 | 0 |
Analyze the following code function for security vulnerabilities | static boolean isExternalizable(Class<?> cl) {
return EXTERNALIZABLE.isAssignableFrom(cl);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isExternalizable
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | isExternalizable | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | private MutableHttpResponse errorResultToResponse(Object result) {
MutableHttpResponse<?> response;
if (result == null) {
response = io.micronaut.http.HttpResponse.serverError();
} else if (result instanceof io.micronaut.http.HttpResponse) {
response = (MutableHttpRespons... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: errorResultToResponse
File: http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | errorResultToResponse | http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | public final String getScopesAsString() {
return Joiner.on(' ').join(scopes);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScopesAsString
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | getScopesAsString | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(USE_FINGERPRINT)
public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel,
int flags, @NonNull AuthenticationCallback callback, Handler handler, int userId) {
if (callback == null) {
throw new IllegalArgumentException("Must suppl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: authenticate
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | authenticate | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getRequestNormalisedPath() {
return context.normalizedPath();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestNormalisedPath
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | getRequestNormalisedPath | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | private V fromByte(K name, byte value) {
try {
return valueConverter.convertByte(value);
} catch (IllegalArgumentException e) {
throw new IllegalArgumentException("Failed to convert byte value for header '" + name + '\'', e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fromByte
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | fromByte | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | public Channel getChannel() {
return channel;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getChannel
File: src/main/java/org/elasticsearch/transport/netty/NettyTransportChannel.java
Repository: elastic/elasticsearch
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2015-5377 | HIGH | 7.5 | elastic/elasticsearch | getChannel | src/main/java/org/elasticsearch/transport/netty/NettyTransportChannel.java | bf3052d14c874aead7da8855c5fcadf5428a43f2 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean hasIncludes() {
ensureSearchEntityLoaded();
return !mySearchEntity.getIncludes().isEmpty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasIncludes
File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | hasIncludes | hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java | a5e4f56e1c6f55093ff334cf698ffdeea2f33960 | 0 |
Analyze the following code function for security vulnerabilities | public void passStage(Stage stage) {
completeStage(stage, JobResult.Passed);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: passStage
File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | passStage | server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@NonNull
@RequiresPermission(permission.MANAGE_PROFILE_AND_DEVICE_OWNERS)
public DevicePolicyState getDevicePolicyState() {
if (mService != null) {
try {
return mService.getDevicePolicyState();
} catch (RemoteException e) {
throw e.r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDevicePolicyState
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getDevicePolicyState | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private static OneConstructor newConstructor() {
return new OneConstructor();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newConstructor
File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-21249 | MEDIUM | 6.5 | theonedev/onedev | newConstructor | server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java | d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66 | 0 |
Analyze the following code function for security vulnerabilities | private boolean makeAppCrashingLocked(ProcessRecord app,
String shortMsg, String longMsg, String stackTrace) {
app.crashing = true;
app.crashingReport = generateProcessError(app,
ActivityManager.ProcessErrorStateInfo.CRASHED, null, shortMsg, longMsg, stackTrace);
star... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeAppCrashingLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | makeAppCrashingLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void initializeAutoRedirection(EntityReference source, AttachmentReference destination,
XWikiDocument sourceDocument)
throws XWikiException
{
int idx = sourceDocument.createXObject(RedirectAttachmentClassDocumentInitializer.REFERENCE,
this.xcontextProvider.get());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeAutoRedirection
File: xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-api/src/main/java/org/xwiki/attachment/internal/refactoring/job/MoveAttachmentJob.java
Repository: xwiki/xwiki-pla... | [
"CWE-862"
] | CVE-2023-37910 | HIGH | 8.1 | xwiki/xwiki-platform | initializeAutoRedirection | xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-api/src/main/java/org/xwiki/attachment/internal/refactoring/job/MoveAttachmentJob.java | d7720219d60d7201c696c3196c9d4a86d0881325 | 0 |
Analyze the following code function for security vulnerabilities | private static String ignoreScheme(String url) {
if (url.startsWith("http://")) {
return url.substring("http:".length());
} else if (url.startsWith("https://")) {
return url.substring("https:".length());
}
return url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ignoreScheme
File: web/src/main/java/com/zrlog/web/interceptor/TemplateHelper.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21316 | MEDIUM | 4.3 | 94fzb/zrlog | ignoreScheme | web/src/main/java/com/zrlog/web/interceptor/TemplateHelper.java | b921c1ae03b8290f438657803eee05226755c941 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
protected Account[] getAccountsFromCache(UserAccounts userAccounts, String accountType,
int callingUid, @Nullable String callingPackage, boolean includeManagedNotVisible) {
Preconditions.checkState(!Thread.holdsLock(userAccounts.cacheLock),
"Method should not be called w... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccountsFromCache
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getAccountsFromCache | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | private File createTemporaryFolderIn(File parentFolder) throws IOException {
File createdFolder = null;
for (int i = 0; i < TEMP_DIR_ATTEMPTS; ++i) {
// Use createTempFile to get a suitable folder name.
String suffix = ".tmp";
File tmpFile = File.createTempFile(TMP_PR... | Vulnerability Classification:
- CWE: CWE-732
- CVE: CVE-2020-15250
- Severity: LOW
- CVSS Score: 1.9
Description: Merge pull request from GHSA-269g-pwp5-87pp
When running on Java 7 or later, temporary directories are now created
Using Java’s NIO API which restricts permissions to owner-only by
default.
Function: cre... | [
"CWE-732"
] | CVE-2020-15250 | LOW | 1.9 | junit-team/junit4 | createTemporaryFolderIn | src/main/java/org/junit/rules/TemporaryFolder.java | 610155b8c22138329f0723eec22521627dbc52ae | 1 |
Analyze the following code function for security vulnerabilities | <T> List<T> search(String userSearchFilter, Object[] filterArgs, Mapper<T> mapper, int maxResult); | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2022-24832
- Severity: MEDIUM
- CVSS Score: 4.9
Description: Escape/encode values when building search filters.
Function: search
File: src/main/java/cd/go/authentication/ldap/LdapClient.java
Repository: gocd/gocd-ldap-authentication-plugin
Fixed Code:
<T> List<T... | [
"CWE-74"
] | CVE-2022-24832 | MEDIUM | 4.9 | gocd/gocd-ldap-authentication-plugin | search | src/main/java/cd/go/authentication/ldap/LdapClient.java | 87fa7dac5d899b3960ab48e151881da4793cfcc3 | 1 |
Analyze the following code function for security vulnerabilities | public final void error(final SAXParseException e) throws SAXException {
LOGGER.debug("XML error: {}", e.getLocalizedMessage());
super.error(e);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: error
File: core/src/main/java/org/mapfish/print/map/style/SLDParserPlugin.java
Repository: mapfish/mapfish-print
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-15232 | MEDIUM | 6.4 | mapfish/mapfish-print | error | core/src/main/java/org/mapfish/print/map/style/SLDParserPlugin.java | e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Bundle getEnforcingAdminAndUserDetails(int userId, String restriction) {
Preconditions.checkCallAuthorization(isSystemUid(getCallerIdentity()));
return getEnforcingAdminAndUserDetailsInternal(userId, restriction);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEnforcingAdminAndUserDetails
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getEnforcingAdminAndUserDetails | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean check(SerializerConfig c1, SerializerConfig c2) {
return c1 == c2 || !(c1 == null || c2 == null)
&& nullSafeEqual(c1.getClassName(), c2.getClassName())
&& nullSafeEqual(c1.getTypeClass(), c2.getTypeClass())
&& nullSafeEqua... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void cancel(String accountName, String remotePath, @Nullable ResultCode resultCode) {
Pair<UploadFileOperation, String> removeResult = mPendingUploads.remove(accountName, remotePath);
UploadFileOperation upload = removeResult.first;
if (upload == null && mCurrentUpload != nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancel
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | cancel | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isHandleWidgetEvents() {
return getState(false).handleWidgetEvents;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isHandleWidgetEvents
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | isHandleWidgetEvents | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public void finishVoiceTask(IVoiceInteractionSession session) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishVoiceTask
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | finishVoiceTask | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public void subscribeToNotifications(String email, String channelId) {
if (!StringUtils.isBlank(email) && !StringUtils.isBlank(channelId)) {
Sysprop s = pc.read(channelId);
if (s == null || !s.hasProperty("emails")) {
s = new Sysprop(channelId);
s.addProperty("emails", ne... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: subscribeToNotifications
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | subscribeToNotifications | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAppStartModeDisabled(int uid, String packageName) {
synchronized (this) {
return getAppStartModeLocked(uid, packageName, 0, -1, false, true, false)
== ActivityManager.APP_START_MODE_DISABLED;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAppStartModeDisabled
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | isAppStartModeDisabled | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | protected String logPrefix(ModelMap theModel) {
return "[server=" + theModel.get("serverId") + "] - ";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logPrefix
File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-24301 | MEDIUM | 4.3 | hapifhir/hapi-fhir | logPrefix | hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java | adb3734fcbbf9a9165445e9ee5eef168dbcaedaf | 0 |
Analyze the following code function for security vulnerabilities | ProcessExecutor createProcessExecutor(File targetDir, DbProperties dbProperties) {
Properties connectionProperties = dbProperties.connectionProperties();
Properties pgProperties = Driver.parseURL(dbProperties.url(), connectionProperties);
ArrayList<String> argv = new ArrayList<>();
Link... | Vulnerability Classification:
- CWE: CWE-532
- CVE: CVE-2023-28630
- Severity: MEDIUM
- CVSS Score: 4.4
Description: Improve error messages on failure to launch backup process
ztexec can include env vars in the error message which we don't want in this case.
Function: createProcessExecutor
File: db-support/db-suppor... | [
"CWE-532"
] | CVE-2023-28630 | MEDIUM | 4.4 | gocd | createProcessExecutor | db-support/db-support-postgresql/src/main/java/com/thoughtworks/go/server/database/pg/PostgresqlBackupProcessor.java | 6545481e7b36817dd6033bf614585a8db242070d | 1 |
Analyze the following code function for security vulnerabilities | public void setDate(Date date)
{
if ((date != null) && (!date.equals(this.updateDate))) {
setMetaDataDirty(true);
}
// Make sure we drop milliseconds for consistency with the database
if (date != null) {
date.setTime((date.getTime() / 1000) * 1000);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setDate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setPermittedInputMethods(ComponentName who, String callerPackageName,
List<String> packageList, boolean calledOnParentInstance) {
if (!mHasFeature) {
return false;
}
CallerIdentity caller;
if (isPolicyEngineForFinanceFlagEnabled()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPermittedInputMethods
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setPermittedInputMethods | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | boolean windowsAreFocusable() {
return windowsAreFocusable(false /* fromUserTouch */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: windowsAreFocusable
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | windowsAreFocusable | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private static byte[] readFrom(File src) throws IOException {
long srcsize = src.length();
if (srcsize > Integer.MAX_VALUE) {
throw new IllegalArgumentException(
"File too big to be loaded in memory");
}
RandomAccessFile accessFile = new RandomAccessFile(s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFrom
File: codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java
Repository: netty
The code follows secure coding practices. | [
"CWE-378",
"CWE-379"
] | CVE-2021-21290 | LOW | 1.9 | netty | readFrom | codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java | c735357bf29d07856ad171c6611a2e1a0e0000ec | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Component newTopbarTitle(String componentId) {
return new Label(componentId, "Branding");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newTopbarTitle
File: server-core/src/main/java/io/onedev/server/web/page/admin/brandingsetting/BrandingSettingPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2022-39208 | HIGH | 7.5 | theonedev/onedev | newTopbarTitle | server-core/src/main/java/io/onedev/server/web/page/admin/brandingsetting/BrandingSettingPage.java | 8aa94e0daf8447cdf76d4f27bfda0a85a7ea5822 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void init(Fragment fragment) {
if (fragment instanceof SplitLayoutListener) {
((SplitLayoutListener) fragment).setSplitLayoutSupported(mIsTwoPaneLayout);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | init | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | native boolean setAdapterPropertyNative(int type); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAdapterPropertyNative
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | setAdapterPropertyNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isStrict302Handling() {
return strict302Handling;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isStrict302Handling
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | isStrict302Handling | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("ResultOfMethodCallIgnored")
@Inject(at = @At("TAIL"), method = "loadServerPack(Ljava/io/File;Lnet/minecraft/resource/ResourcePackSource;)Ljava/util/concurrent/CompletableFuture;")
public void loadServerPack(File file, ResourcePackSource packSource, CallbackInfoReturnable<CompletableFuture<Voi... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2024-22779
- Severity: CRITICAL
- CVSS Score: 9.8
Description: - bumped version to 1.0.3
- fixed vulnerability allowing servers to add files into arbitrary folders (unlikely but possible)
Function: loadServerPack
File: src/main/java/com/kihron/serverrpexposer/mix... | [
"CWE-22"
] | CVE-2024-22779 | CRITICAL | 9.8 | Kihron/ServerRPExposer | loadServerPack | src/main/java/com/kihron/serverrpexposer/mixins/ServerResourcePackProviderMixin.java | 8f7b829df633f59e828d677f736c53652d6f1b8f | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
StringWriter buf = new StringWriter();
buf.write("type ="+type+"\n");
buf.write("pattern dir = "+patternDir.getAbsolutePath());
if (type == RUNTYPE.testinfo) {
buf.write("info file = "+info);
if (info != null)
buf.write(", path =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3878 | HIGH | 7.5 | stanfordnlp/CoreNLP | toString | src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java | e5bbe135a02a74b952396751ed3015e8b8252e99 | 0 |
Analyze the following code function for security vulnerabilities | public ParcelFileDescriptor openContentUri(Uri uri) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(OPEN_CONTENT_URI_TRANSACTION, data, reply, 0);
reply.readExcepti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openContentUri
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | openContentUri | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @EJB(beanInterface = BackendLocal.class,
mappedName = "java:global/engine/bll/Backend!org.ovirt.engine.core.common.interfaces.BackendLocal")
public void setBackend(BackendLocal backend) {
this.backend = backend;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBackend
File: frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java
Repository: oVirt/ovirt-engine
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2024-0822 | HIGH | 7.5 | oVirt/ovirt-engine | setBackend | frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java | 036f617316f6d7077cd213eb613eb4816e33d1fc | 0 |
Analyze the following code function for security vulnerabilities | public String getShortRefererText(String referer, int length)
{
try {
return this.xwiki.getRefererText(referer, getXWikiContext()).substring(0, length);
} catch (Exception e) {
return this.xwiki.getRefererText(referer, getXWikiContext());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortRefererText
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getShortRefererText | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAnimatingBetweenKeyguardAndSurfaceBehind() {
return mSurfaceBehindRemoteAnimationRunning;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAnimatingBetweenKeyguardAndSurfaceBehind
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | isAnimatingBetweenKeyguardAndSurfaceBehind | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public static Message findLatestIncomingMessage(
List<Message> messages) {
for (int i = messages.size() - 1; i >= 0; i--) {
Message m = messages.get(i);
// Incoming messages have a non-empty sender.
if (m.mSender != null && !T... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findLatestIncomingMessage
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | findLatestIncomingMessage | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | void setCredential(String credential, String savedCredential, int userId)
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCredential
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | setCredential | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean interceptTouchEvent(MotionEvent event) {
if (DEBUG_GESTURES) {
if (event.getActionMasked() != MotionEvent.ACTION_MOVE) {
EventLog.writeEvent(EventLogTags.SYSUI_STATUSBAR_TOUCH,
event.getActionMasked(), (int) event.getX(), (int) event.getY(),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: interceptTouchEvent
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | interceptTouchEvent | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private Item addItem(Context c, Collection[] mycollections, String path,
String itemname, PrintWriter mapOut, boolean template) throws Exception
{
String mapOutputString = null;
System.out.println("Adding item from directory " + itemname);
// create workspace item
Item ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addItem
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | addItem | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java | 56e76049185bbd87c994128a9d77735ad7af0199 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract void doGet(HttpServletRequest httpRequest, HttpServletResponse httpResponse)
throws IOException, ServletException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doGet
File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java
Repository: openmrs/openmrs-core
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23612 | MEDIUM | 5 | openmrs/openmrs-core | doGet | web/src/main/java/org/openmrs/web/filter/StartupFilter.java | db8454bf19a092a78d53ee4dba2af628b730a6e7 | 0 |
Analyze the following code function for security vulnerabilities | protected void lockSession(WrappedSession wrappedSession) {
Lock lock = getSessionLock(wrappedSession);
if (lock == null) {
/*
* No lock found in the session attribute. Ensure only one lock is
* created and used by everybody by doing double checked locking.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lockSession
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | lockSession | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.