instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private String getUserResourceKey(boolean cacheable, boolean session, String mime) { StringBuffer pathBuffer = new StringBuffer(UserResource.class.getName()); pathBuffer.append(cacheable ? "/c" : "/n"); pathBuffer.append(session ? "/s" : "/n"); if (null != mime) { pathBuffer.append('/').append(mime.hashCo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserResourceKey File: framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java Repository: nuxeo/richfaces-3.3 The code follows secure coding practices.
[ "CWE-502" ]
CVE-2013-4521
HIGH
7.5
nuxeo/richfaces-3.3
getUserResourceKey
framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java
6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec
0
Analyze the following code function for security vulnerabilities
public boolean hasPermissionForActivity(Intent intent, String srcPackage) { ResolveInfo target = mPm.resolveActivity(intent, 0); if (target == null) { // Not a valid target return false; } if (TextUtils.isEmpty(target.activityInfo.permission)) { // No ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-35682 - Severity: HIGH - CVSS Score: 7.8 Description: Fix permission issue in legacy shortcut When building legacy shortcut, Launcher calls PackageManager#resolveActivity to retrieve necessary permission to launch the intent. However, when the source app...
[ "CWE-Other" ]
CVE-2023-35682
HIGH
7.8
android
hasPermissionForActivity
src/com/android/launcher3/util/PackageManagerHelper.java
09f8b0e52e45a0b39bab457534ba2e5ae91ffad0
1
Analyze the following code function for security vulnerabilities
@Override public void makePackageIdle(String packageName, int userId) { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: makePackageIdle() from pid=" + Binder.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makePackageIdle File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
makePackageIdle
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public void uninstallPackageWithActiveAdmins(final String packageName) { Preconditions.checkArgument(!TextUtils.isEmpty(packageName)); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( hasCallingOrSelfPermission(permission.MAN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uninstallPackageWithActiveAdmins File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
uninstallPackageWithActiveAdmins
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected void handleTestCaseIssues(IssuesUpdateRequest issuesRequest) { issuesService.handleTestCaseIssues(issuesRequest); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleTestCaseIssues File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
handleTestCaseIssues
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@Override public Object createImage(byte[] bytes, int offset, int len) { BitmapFactory.Options opts = new BitmapFactory.Options(); opts.inPreferredConfig = Bitmap.Config.ARGB_8888; try { BitmapFactory.Options.class.getField("inPurgeable").set(opts, true); } catch (Excepti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createImage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createImage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public boolean contains(CharSequence name) { return headers.contains(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: contains File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
contains
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
void getSurfaceTouchableRegion(Region region, WindowManager.LayoutParams attrs) { final boolean modal = attrs.isModal(); if (modal) { if (mActivityRecord != null) { // Limit the outer touch to the activity root task region. updateRegionForModalActivityWindow(r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSurfaceTouchableRegion File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getSurfaceTouchableRegion
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private native void nativeResetGestureDetection(long nativeContentViewCoreImpl);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeResetGestureDetection File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeResetGestureDetection
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
protected void disableCertificateValidation(ClientBuilder clientBuilder) throws KeyManagementException, NoSuchAlgorithmException { TrustManager[] trustAllCerts = new X509TrustManager[] { new X509TrustManager() { @Override public X509Certificate[] getAcceptedIssuers() { return null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableCertificateValidation File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
disableCertificateValidation
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void maybeValidateXml(File file) { if (!file.getName().endsWith(".xml")) { return; } final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setValidating(false); factory.setNamespaceAware(true); try { factory...
Vulnerability Classification: - CWE: CWE-91 - CVE: CVE-2023-40612 - Severity: HIGH - CVSS Score: 8.0 Description: NMS-15704: Added tests Function: maybeValidateXml File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java Repository: OpenNMS/opennms Fixed Code: void maybeValidateXml(...
[ "CWE-91" ]
CVE-2023-40612
HIGH
8
OpenNMS/opennms
maybeValidateXml
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
726328874812cfb5d0a28c5a76b3925e531928b7
1
Analyze the following code function for security vulnerabilities
protected void initializeContainerComponent(XWikiContext context) throws ServletException { // Initialize the Container fields (request, response, session). // Note that this is a bridge between the old core and the component architecture. // In the new component architecture we use ThreadLo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initializeContainerComponent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
initializeContainerComponent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
public String dialogButtonRowStart() { return dialogButtonRow(HTML_START); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dialogButtonRowStart File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
dialogButtonRowStart
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
protected void refreshRow(Object itemId) { getParentGrid().datasourceExtension.updateRowData(itemId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshRow File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
refreshRow
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private int fractionCountWithoutTrailingZeros() { return Math.max(-scale, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fractionCountWithoutTrailingZeros File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
fractionCountWithoutTrailingZeros
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
public @CheckForNull <T extends Item> T getItemByFullName(String fullName, Class<T> type) { StringTokenizer tokens = new StringTokenizer(fullName,"/"); ItemGroup parent = this; if(!tokens.hasMoreTokens()) return null; // for example, empty full name. while(true) { Item i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getItemByFullName File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getItemByFullName
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
private int getEncryptionStatus() { if (mInjector.storageManagerIsFileBasedEncryptionEnabled()) { return DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE_PER_USER; } else { return DevicePolicyManager.ENCRYPTION_STATUS_UNSUPPORTED; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEncryptionStatus File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getEncryptionStatus
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
void logLockScreen(String msg) { if (DEBUG_LOCKSCREEN) Slog.d(TAG, Debug.getCallers(2) + ":" + msg + " mLockScreenShown=" + lockScreenShownToString() + " mWakefulness=" + PowerManagerInternal.wakefulnessToString(mWakefulness) + " mSleeping=" + mSleeping); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logLockScreen File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
logLockScreen
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public int listAllTrash(ApiScenarioBatchRequest request) { return extApiScenarioMapper.selectTrash(request.getProjectId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listAllTrash File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
listAllTrash
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
@Test public void testPostRequestParsWithMaliciousRequest() throws WebdavException { assertTrue(requestPars.processXml()); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-20000 - Severity: MEDIUM - CVSS Score: 5.0 Description: format: follow the repo code style, and welcome mvnvm props to manage maven versions Function: testPostRequestParsWithMaliciousRequest File: src/test/java/org/bedework/webdav/servlet/common/TestSecureX...
[ "CWE-611" ]
CVE-2018-20000
MEDIUM
5
Bedework/bw-webdav
testPostRequestParsWithMaliciousRequest
src/test/java/org/bedework/webdav/servlet/common/TestSecureXmlTypes.java
0ce2007b3515a23b5f287ef521300bcb1f748edc
1
Analyze the following code function for security vulnerabilities
@Override public String getGreaterOrEqualsConditionSQL(String column, Object param) { String paramStr = getParameterSQL(param); return column + " >= " + paramStr; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGreaterOrEqualsConditionSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practi...
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getGreaterOrEqualsConditionSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
@Override public String getRobotNames() { return "tested.robots.ConstructorHttpAttack,sample.Target"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRobotNames File: robocode.tests/src/test/java/net/sf/robocode/test/robots/TestConstructorHttpAttack.java Repository: robo-code/robocode The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10648
HIGH
7.5
robo-code/robocode
getRobotNames
robocode.tests/src/test/java/net/sf/robocode/test/robots/TestConstructorHttpAttack.java
836c84635e982e74f2f2771b2c8640c3a34221bd
0
Analyze the following code function for security vulnerabilities
private String primaryPluginStatus() { List<Map> externalPlugins = (List<Map>) primaryServerCommunicationService.getLatestPluginsStatus().get("external"); return externalPlugins.stream().map(map -> format("%s=%s", map.get("name"), map.get("md5"))).collect(Collectors.joining(", ")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: primaryPluginStatus File: server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java Repository: gocd The code follows secure coding practices.
[ "CWE-200" ]
CVE-2021-43287
MEDIUM
5
gocd
primaryPluginStatus
server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java
41abc210ac4e8cfa184483c9ff1c0cc04fb3511c
0
Analyze the following code function for security vulnerabilities
public void configureProcessor(NettyRequestSender requestSender, AtomicBoolean closed) { final Processor httpProcessor = newHttpProcessor(config, nettyProviderConfig, requestSender, this, closed); wsProcessor = newWsProcessor(config, nettyProviderConfig, requestSender, this, closed); plainBoot...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configureProcessor File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
configureProcessor
providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@Override public int read(byte[] b, int off, int len) throws IOException { return cipherInputStream.read(b, off, len); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: src/main/java/net/lingala/zip4j/io/inputstream/DecompressedInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
read
src/main/java/net/lingala/zip4j/io/inputstream/DecompressedInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<DictModel> queryTableDictItemsByCodeAndFilter(@Param("table") String table,@Param("text") String text,@Param("code") String code,@Param("filterSql") String filterSql);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryTableDictItemsByCodeAndFilter File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45207
CRITICAL
9.8
jeecgboot/jeecg-boot
queryTableDictItemsByCodeAndFilter
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java
8632a835c23f558dfee3584d7658cc6a13ccec6f
0
Analyze the following code function for security vulnerabilities
public boolean exists(EntityReference reference) throws Exception { GetMethod getMethod = executeGet(reference); getMethod.releaseConnection(); return getMethod.getStatusCode() == Status.OK.getStatusCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exists File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
exists
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M2") public List getListValue(String className, String fieldName) { return getListValue(resolveClassReference(className), fieldName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getListValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getListValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_WIFI, conditional = true) @Nullable public WifiSsidPolicy getWifiSsidPolicy() { throwIfParentInstance("getWifiSsidPolicy"); if (mService == null) { return null; } try { return mService.getWifiSsidPolicy(mCon...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWifiSsidPolicy File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getWifiSsidPolicy
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setHeaders(HttpExchange pExchange) { String origin = requestHandler.extractCorsOrigin(pExchange.getRequestHeaders().getFirst("Origin")); Headers headers = pExchange.getResponseHeaders(); if (origin != null) { headers.set("Access-Control-Allow-Origin",origin); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHeaders File: agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java Repository: jolokia The code follows secure coding practices.
[ "CWE-352" ]
CVE-2014-0168
MEDIUM
6.8
jolokia
setHeaders
agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java
2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364
0
Analyze the following code function for security vulnerabilities
private void setMediaPlaybackState(int state) { PlaybackStateCompat.Builder playbackstateBuilder = new PlaybackStateCompat.Builder(); if( state == PlaybackStateCompat.STATE_PLAYING ) { playbackstateBuilder.setActions(PlaybackStateCompat.ACTION_PLAY_PAUSE | PlaybackStateCompat.ACTION_PAUSE | ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMediaPlaybackState File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setMediaPlaybackState
Ports/Android/src/com/codename1/media/BackgroundAudioService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public MessagingStyle setGroupConversation(boolean isGroupConversation) { mIsGroupConversation = isGroupConversation; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setGroupConversation File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setGroupConversation
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private String getLocalKey() { if (this.localKeyCache == null) { this.localKeyCache = LocalUidStringEntityReferenceSerializer.INSTANCE.serialize(getDocumentReferenceWithLocale()); } return this.localKeyCache; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalKey File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getLocalKey
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void init() { Jiffle.refCount++ ; // TODO - CollectionFactory imageParams = new HashMap<String, Jiffle.ImageRole>(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
init
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
public static void recoverAbusiveSortOrder(@NonNull Bundle queryArgs) { final String origSortOrder = queryArgs.getString(QUERY_ARG_SQL_SORT_ORDER); final String origLimit = queryArgs.getString(QUERY_ARG_SQL_LIMIT); final int index = (origSortOrder != null) ? origSortOrder.toUppe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recoverAbusiveSortOrder File: src/com/android/providers/media/util/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-35683
MEDIUM
5.5
android
recoverAbusiveSortOrder
src/com/android/providers/media/util/DatabaseUtils.java
23d156ed1bed6d2c2b325f0be540d0afca510c49
0
Analyze the following code function for security vulnerabilities
static boolean equalsn(byte a1[], byte a2[]) { int length = a2.length; for (int k = 0; k < length; ++k) { if (a1[k] != a2[k]) return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equalsn File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
equalsn
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public final void removeService(PackageParser.Service s) { mServices.remove(s.getComponentName()); if (DEBUG_SHOW_INFO) { Log.v(TAG, " " + (s.info.nonLocalizedLabel != null ? s.info.nonLocalizedLabel : s.info.name) + ":"); Log.v(TAG, " ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeService File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
removeService
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public String path() { return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: path File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
path
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
private String noParameters(String uri) { final int pos = uri.indexOf("?"); if (pos > 0) { uri = uri.substring(0, pos); } if (uri.equals("/")) { uri = ""; } return uri; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noParameters File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java Repository: Bedework/bw-webdav The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20000
MEDIUM
5
Bedework/bw-webdav
noParameters
src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
67283fb8b9609acdb1a8d2e7fefe195b4a261062
0
Analyze the following code function for security vulnerabilities
public static String issueJwt(String subject, Long period, List<String> roles){ String id = UUID.randomUUID().toString(); String issuer = "sureness-token-server"; return issueJwt(id, subject, issuer, period, roles, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: issueJwt File: core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java Repository: dromara/sureness The code follows secure coding practices.
[ "CWE-798" ]
CVE-2023-31581
CRITICAL
9.8
dromara/sureness
issueJwt
core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java
4f5fefaf673168d74820020a191fab2904629742
0
Analyze the following code function for security vulnerabilities
protected void setVerticalPanelTranslation(float translation) { mNotificationStackScroller.setTranslationX(translation); mQsFrame.setTranslationX(translation); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVerticalPanelTranslation File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setVerticalPanelTranslation
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationAsFloat01() throws Exception { Duration value = READER.with(DeserializationFeature.READ_DATE_TIMESTAMPS_AS_NANOSECONDS) .readValue("60.0"); assertNotNull("The value should not be null.", value); Duration exp = Duration.ofSeconds(60L, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationAsFloat01 File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationAsFloat01
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
@Override public void onFastForward() { super.onFastForward(); RemoteControlCallback.fastForward(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFastForward File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onFastForward
Ports/Android/src/com/codename1/media/BackgroundAudioService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public boolean isAllowUnsafe() { return allowUnsafe; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowUnsafe File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
isAllowUnsafe
hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private void maybePauseDeviceWideLoggingLocked() { if (!areAllUsersAffiliatedWithDeviceLocked()) { if (mOwners.hasDeviceOwner()) { Slogf.i(LOG_TAG, "There are unaffiliated users, network logging will be " + "paused if enabled....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybePauseDeviceWideLoggingLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
maybePauseDeviceWideLoggingLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String tag() { if (getPara(0) != null) { String tag = convertRequestParam(getPara(0)); setPageInfo(Constants.getArticleUri() + "tag/" + getPara(0) + "-", new Log().findByTag(getParaToInt(1, 1), getDefaultRows(), tag), getParaToInt(1, 1)); setAttr("tipsType", I18nUtil....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tag File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
tag
web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
public int getXObjectSize(EntityReference classReference) { return getXObjectSize(resolveClassReference(classReference)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXObjectSize File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getXObjectSize
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return "SimData{state=" + simState + ",slotId=" + slotId + ",subId=" + subId + "}"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
toString
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public String getHeaderCaption() throws IllegalStateException { checkColumnIsAttached(); return state.headerCaption; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaderCaption File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getHeaderCaption
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Override public int subWindowTypeToLayerLw(int type) { switch (type) { case TYPE_APPLICATION_PANEL: case TYPE_APPLICATION_ATTACHED_DIALOG: return APPLICATION_PANEL_SUBLAYER; case TYPE_APPLICATION_MEDIA: return APPLICATION_MEDIA_SUBLAYER; case TYPE_APP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: subWindowTypeToLayerLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
subWindowTypeToLayerLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public void onOffHostAidSelected() { Log.d(TAG, "notifyOffHostAidSelected"); synchronized (mLock) { if (mState != STATE_XFER || mActiveService == null) { // Don't bother telling, we're not bound to any service yet } else { sendDeactivateToActiveSer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onOffHostAidSelected File: src/com/android/nfc/cardemulation/HostEmulationManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35671
MEDIUM
5.5
android
onOffHostAidSelected
src/com/android/nfc/cardemulation/HostEmulationManager.java
745632835f3d97513a9c2a96e56e1dc06c4e4176
0
Analyze the following code function for security vulnerabilities
public boolean isComplianceAcknowledgementRequired() { throwIfParentInstance("isComplianceAcknowledgementRequired"); if (mService != null) { try { return mService.isComplianceAcknowledgementRequired(); } catch (RemoteException re) { throw re.rethro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isComplianceAcknowledgementRequired File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isComplianceAcknowledgementRequired
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void beginLink(ResourceReference reference, boolean freestanding, Map<String, String> parameters) { // Ensure the link renderer is using the latest printer since the original printer used could have been // superseded by another one in the printer stack. this.linkRendere...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginLink File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure codi...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
beginLink
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public static void assertStatuses(int actualCode, int... expectedCodes) { if (!ArrayUtils.contains(expectedCodes, actualCode)) { fail(String.format("Unexpected code [%s], was expecting one of [%s]", actualCode, Arrays.toString(expectedCodes))); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assertStatuses File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
assertStatuses
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") static boolean isInitialized(MessageOrBuilder message) { // Check that all required fields are present. for (final Descriptors.FieldDescriptor field : message.getDescriptorForType().getFields()) { if (field.isRequired()) { if (!message.hasField(field)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInitialized File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
isInitialized
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
private void _setToDoubleFast(double n) { isApproximate = true; origDouble = n; origDelta = 0; // NOTE: Unlike ICU4C, doubles are always IEEE 754 doubles. long ieeeBits = Double.doubleToLongBits(n); int exponent = (int) ((ieeeBits & 0x7ff0000000000000L) >> 52) - 0x3ff; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _setToDoubleFast File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
_setToDoubleFast
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
@SuppressLint("NullableCollection") @RequiresPermission(value = MANAGE_DEVICE_POLICY_SECURITY_LOGGING, conditional = true) public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs( @Nullable ComponentName admin) { throwIfParentInstance("retrievePreRebootSecurityLogs"); try ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retrievePreRebootSecurityLogs File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
retrievePreRebootSecurityLogs
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static String getEncodePath(String path, String queryString) { String url = path; try { if (CommonUtils.notEmpty(queryString)) { url += "?" + queryString; } url = URLEncoder.encode(url, Constants.DEFAULT_CHARSET_NAME); } catch (Unsupport...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEncodePath File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getEncodePath
publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
private static void cardinalityEstimatorXmlGenerator(XmlGenerator gen, Config config) { for (CardinalityEstimatorConfig ex : config.getCardinalityEstimatorConfigs().values()) { MergePolicyConfig mergePolicyConfig = ex.getMergePolicyConfig(); gen.open("cardinality-estimator", "name", ex....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cardinalityEstimatorXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
cardinalityEstimatorXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mPm.mLock") public void checkExistingBetterPackages(ArrayMap<String, File> expectingBetterPackages, List<String> stubSystemApps, int systemScanFlags, int systemParseFlags) { for (int i = 0; i < expectingBetterPackages.size(); i++) { final String packageName = expectingBet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkExistingBetterPackages File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
checkExistingBetterPackages
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
public @NonNull DevicePolicyManager getParentProfileInstance(@NonNull ComponentName admin) { throwIfParentInstance("getParentProfileInstance"); try { if (!mService.isManagedProfile(admin)) { throw new SecurityException("The current user does not have a parent profile."); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParentProfileInstance File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getParentProfileInstance
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean finishActivityAffinity(IBinder token) { synchronized(this) { final long origId = Binder.clearCallingIdentity(); try { ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishActivityAffinity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
finishActivityAffinity
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void start(boolean pLazy) { Restrictor restrictor = createRestrictor(); backendManager = new BackendManager(configuration, logHandler, restrictor, pLazy); requestHandler = new HttpRequestHandler(configuration, backendManager, logHandler); if (listenForDiscoveryMcRequests(configura...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: start File: agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java Repository: jolokia The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-1000129
MEDIUM
4.3
jolokia
start
agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java
5895d5c137c335e6b473e9dcb9baf748851bbc5f
0
Analyze the following code function for security vulnerabilities
public boolean isQuotedArgumentsEnabled() { return quotedArgumentsEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isQuotedArgumentsEnabled File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
isQuotedArgumentsEnabled
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
@Override public void createWiki(String wikiName, XWikiContext inputxcontext) throws XWikiException { XWikiContext context = getExecutionXContext(inputxcontext, false); boolean bTransaction = true; String database = context.getWikiId(); AtomicReference<Statement> stmt = new Atom...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createWiki File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
createWiki
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public boolean onConsoleMessage(ConsoleMessage consoleMessage) { com.codename1.io.Log.p("["+consoleMessage.messageLevel()+"] "+consoleMessage.message()+" On line "+consoleMessage.lineNumber()+" of "+consoleMessage.sourceId()); return true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConsoleMessage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onConsoleMessage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void registerEncoder(Encoder encoder) { EncoderRegistry encoderRegistry = embeddedCache.getAdvancedCache().getComponentRegistry() .getGlobalComponentRegistry().getComponent(EncoderRegistry.class); encoderRegistry.registerEncoder(encoder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerEncoder File: integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
registerEncoder
integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java
69be66141eee7abb1c47d46f0a6b74b079709f4b
0
Analyze the following code function for security vulnerabilities
@Deprecated public DeletedDocument getDeletedDocument(String fullname, String locale, String index) throws XWikiException { return getDeletedDocument(index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeletedDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getDeletedDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private String innerQueryProvider( Set<String> uids, Set<String> userOrgUnitPaths, User currentUser ) { Stream<String> queryParts = Stream.of( getInnerQuerySql(), getUidsFilter( uids ) ); if ( nonSuperUser( currentUser ) ) { queryParts = Stream.concat( qu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: innerQueryProvider File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java Repository: dhis2/dhis2-core The code follows secure coding...
[ "CWE-89" ]
CVE-2022-24848
MEDIUM
6.5
dhis2/dhis2-core
innerQueryProvider
dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java
ef04483a9b177d62e48dcf4e498b302a11f95e7d
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDefaultOrientationForced() { return mForceDefaultOrientation; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDefaultOrientationForced File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
isDefaultOrientationForced
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public static long findContentLength(final int id, FileDownloadConnection connection) { long contentLength = convertContentLengthString( connection.getResponseHeaderField("Content-Length")); final String transferEncoding = connection.getResponseHeaderField("Transfer-Encoding"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findContentLength File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
findContentLength
library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
public String getPrlVersion() { return mPrlVersion; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPrlVersion File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
getPrlVersion
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private void installPermission(Invocation ai) { String template = null; if (!ZrLogConfig.isInstalled()) { ai.invoke(); if (ai.getReturnValue() != null) { template = ai.getReturnValue(); } } else { ai.getController().getRequest().set...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installPermission File: web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
installPermission
web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
@Override public Policy[] newArray(int size) { return new Policy[size]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newArray File: framework/java/android/net/wifi/hotspot2/pps/Policy.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21240
MEDIUM
5.5
android
newArray
framework/java/android/net/wifi/hotspot2/pps/Policy.java
69119d1d3102e27b6473c785125696881bce9563
0
Analyze the following code function for security vulnerabilities
public Object fromXML(Reader xml, Object root) { return unmarshal(hierarchicalStreamDriver.createReader(xml), root); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromXML File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
fromXML
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
public abstract BaseXMLBuilder attr(String name, String value);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attr File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
attr
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public static Bundle nonNull(@Nullable Bundle in) { return in != null ? in : new Bundle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nonNull File: services/core/java/com/android/server/pm/UserRestrictionsUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
nonNull
services/core/java/com/android/server/pm/UserRestrictionsUtils.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
private boolean shouldStartActivity() { return mVisibleRequested && (isState(STOPPED) || isState(STOPPING)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldStartActivity File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
shouldStartActivity
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public static String formatXMLContent(String content) throws TransformerFactoryConfigurationError, TransformerException { Transformer transformer = TransformerFactory.newInstance().newTransformer(); transformer.setOutputProperty(OutputKeys.INDENT, "yes"); transformer.setOutputPropert...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatXMLContent File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java Repository: xwiki/xwiki-commons The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-24898
MEDIUM
4
xwiki/xwiki-commons
formatXMLContent
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
947e8921ebd95462d5a7928f397dd1b64f77c7d5
0
Analyze the following code function for security vulnerabilities
private ApplicationParams getApplicationParams(Document androidManifest, Document appStrings) { Element manifest = (Element) androidManifest.getElementsByTagName("manifest").item(0); Element usesSdk = (Element) androidManifest.getElementsByTagName("uses-sdk").item(0); Element application = (Element) androidManife...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApplicationParams File: jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java Repository: skylot/jadx The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-0219
MEDIUM
4.3
skylot/jadx
getApplicationParams
jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java
d22db30166e7cb369d72be41382bb63ac8b81c52
0
Analyze the following code function for security vulnerabilities
@Override public void setProcessLimit(int max) { enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT, "setProcessLimit()"); synchronized (this) { mProcessLimit = max < 0 ? ProcessList.MAX_CACHED_APPS : max; mProcessLimitOverride = max; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProcessLimit File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
setProcessLimit
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public InputConnection onCreateInputConnection(EditorInfo outAttrs) { mInputConnection.setTarget(super.onCreateInputConnection(outAttrs)); return mInputConnection; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateInputConnection File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onCreateInputConnection
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
private String trimLeadingSlash(String s) { if (s.charAt(0) == '/') { return s.substring(1); } else { return s; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trimLeadingSlash File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
trimLeadingSlash
impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public static String getParameter(HttpServletRequest request, String name, String defaultValue) { String value = request.getParameter(name); if (value == null || value.isEmpty() && defaultValue != null && !defaultValue.isEmpty()) { return defaultValue; } return value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParameter File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-0869
MEDIUM
6.1
OpenNMS/opennms
getParameter
opennms-web-api/src/main/java/org/opennms/web/api/Util.java
66b4ba96a18b9952f25a350bbccc2a7e206238d1
0
Analyze the following code function for security vulnerabilities
public Object opt(int index) { return (index < 0 || index >= length()) ? null : this.myArrayList.get(index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: opt File: src/main/java/org/codehaus/jettison/json/JSONArray.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
opt
src/main/java/org/codehaus/jettison/json/JSONArray.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public String setDoublePageModeAction(boolean doublePageMode) throws IndexUnreachableException, DAOException { if (viewManager == null) { return ""; } try { // Adapt URL page range when switching between single and double page modes if (viewManager.isDoublePag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDoublePageModeAction File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
setDoublePageModeAction
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
private static Join<?, ?> getOrCreateJoin(From<?, ?> from, String attribute) { for (Join<?, ?> join : from.getJoins()) { boolean sameName = join.getAttribute().getName().equals(attribute); if (sameName && join.getJoinType().equals(JoinType.LEFT)) { return join; } } return from.join(attribute, Joi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrCreateJoin File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
getOrCreateJoin
src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public Builder setV4SignatureFile(File v4SignatureFile) { mV4SignatureFile = v4SignatureFile; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setV4SignatureFile File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
setV4SignatureFile
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
@Override public String[] saveSelfRegisteredUser(Object user) { throw new UnsupportedOperationException(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveSelfRegisteredUser File: portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java Repository: ManyDesigns/Portofino The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-29451
MEDIUM
6.4
ManyDesigns/Portofino
saveSelfRegisteredUser
portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java
8c754a0ad234555e813dcbf9e57d637f9f23d8fb
0
Analyze the following code function for security vulnerabilities
private String createTmpDir() { try { File tmp = File.createTempFile("fileresourcemanager", null); tmp.delete(); tmp.mkdir(); String workDir = tmp.getAbsolutePath(); return workDir; } catch (IOException e) { throw log.errorCreateWorkDir(e); } }
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2018-25068 - Severity: MEDIUM - CVSS Score: 6.5 Description: Feature #4100 Fix critical Vulnerability "File.createTempFile" should not be used to create a directory Function: createTmpDir File: globalpomutils-fileresources/src/main/java/com/anrisoftware/globalp...
[ "CWE-668" ]
CVE-2018-25068
MEDIUM
6.5
devent/globalpom-utils
createTmpDir
globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java
77a820bac2f68e662ce261ecb050c643bd7ee560
1
Analyze the following code function for security vulnerabilities
boolean isVisibleByPolicy() { return (mPolicyVisibility & POLICY_VISIBILITY_ALL) == POLICY_VISIBILITY_ALL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isVisibleByPolicy File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isVisibleByPolicy
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private ModelNode readAttributeValue(PathAddress address, String attributeName) { final ModelNode readAttributeOp = new ModelNode(); readAttributeOp.get(OP).set(READ_ATTRIBUTE_OPERATION); readAttributeOp.get(OP_ADDR).set(address.toModelNode()); readAttributeOp.get(ModelDescriptionConstan...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2021-3503 - Severity: MEDIUM - CVSS Score: 4.0 Description: [WFLY-11933] Return properly configured ModelNode when RBAC is enabled Return empty ModelNode for attributes restricted by RBAC so that isDefined() answers correctly (h/t jmesnil) Function: readAttribu...
[ "CWE-200" ]
CVE-2021-3503
MEDIUM
4
wildfly
readAttributeValue
metrics/src/main/java/org/wildfly/extension/metrics/WildFlyMetric.java
a48db605577d941b5ae3e899a1187303e138ca74
1
Analyze the following code function for security vulnerabilities
void setNegativeButton(Button button) { mNegativeButton = button; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNegativeButton File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
setNegativeButton
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
public String evaluateAmwFunction(AmwFunctionEntity function, AmwTemplateModel model, AmwModelPreprocessExceptionHandler amwModelPreprocessExceptionHandler) throws IOException, TemplateException { Configuration cfg = getConfiguration(amwModelPreprocessExceptionHandler); StringTemplateLoader loader = new...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: evaluateAmwFunction File: AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java Repository: liimaorg/liima The code follows secure coding practices...
[ "CWE-917" ]
CVE-2023-26092
CRITICAL
9.8
liimaorg/liima
evaluateAmwFunction
AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java
78ba2e198c615dc8858e56eee3290989f0362686
0
Analyze the following code function for security vulnerabilities
@Override public ServerBuilder serviceUnder(String pathPrefix, HttpService service) { virtualHostTemplate.serviceUnder(pathPrefix, service); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serviceUnder File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
serviceUnder
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
@JsonProperty(FIELD_CACHE_TTL_OVERRIDE) public abstract Builder cacheTTLOverride(Long cacheTTLOverride);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cacheTTLOverride File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
cacheTTLOverride
graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
public static void copy(File src, File dst) throws IOException { InputStream in = new FileInputStream(src); try { OutputStream out = new FileOutputStream(dst); try { // Transfer bytes from in to out byte[] buf = new byte[8096]; int ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
copy
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void animateCollapsePanels(int flags, boolean force) { animateCollapsePanels(flags, force, false /* delayed */, 1.0f /* speedUpFactor */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: animateCollapsePanels File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
animateCollapsePanels
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public String selectHeaderAccept(String[] accepts) { if (accepts.length == 0) { return null; } for (String accept : accepts) { if (isJsonMime(accept)) { return accept; } } return StringUtil.join(accepts, ","); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectHeaderAccept File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practice...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
selectHeaderAccept
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void marshal(Object graph, Result result, MimeContainer mimeContainer) throws XmlMappingException { try { Marshaller marshaller = createMarshaller(); if (this.mtomEnabled && mimeContainer != null) { marshaller.setAttachmentMarshaller(new Jaxb2AttachmentMarshaller(mimeContainer)); } i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshal File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
marshal
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0