instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private String getUserResourceKey(boolean cacheable, boolean session,
String mime) {
StringBuffer pathBuffer = new StringBuffer(UserResource.class.getName());
pathBuffer.append(cacheable ? "/c" : "/n");
pathBuffer.append(session ? "/s" : "/n");
if (null != mime) {
pathBuffer.append('/').append(mime.hashCo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserResourceKey
File: framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java
Repository: nuxeo/richfaces-3.3
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2013-4521 | HIGH | 7.5 | nuxeo/richfaces-3.3 | getUserResourceKey | framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java | 6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasPermissionForActivity(Intent intent, String srcPackage) {
ResolveInfo target = mPm.resolveActivity(intent, 0);
if (target == null) {
// Not a valid target
return false;
}
if (TextUtils.isEmpty(target.activityInfo.permission)) {
// No ... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-35682
- Severity: HIGH
- CVSS Score: 7.8
Description: Fix permission issue in legacy shortcut
When building legacy shortcut, Launcher calls
PackageManager#resolveActivity to retrieve necessary permission to
launch the intent.
However, when the source app... | [
"CWE-Other"
] | CVE-2023-35682 | HIGH | 7.8 | android | hasPermissionForActivity | src/com/android/launcher3/util/PackageManagerHelper.java | 09f8b0e52e45a0b39bab457534ba2e5ae91ffad0 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void makePackageIdle(String packageName, int userId) {
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
!= PackageManager.PERMISSION_GRANTED) {
String msg = "Permission Denial: makePackageIdle() from pid="
+ Binder.g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makePackageIdle
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | makePackageIdle | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void uninstallPackageWithActiveAdmins(final String packageName) {
Preconditions.checkArgument(!TextUtils.isEmpty(packageName));
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
hasCallingOrSelfPermission(permission.MAN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uninstallPackageWithActiveAdmins
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | uninstallPackageWithActiveAdmins | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected void handleTestCaseIssues(IssuesUpdateRequest issuesRequest) {
issuesService.handleTestCaseIssues(issuesRequest);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleTestCaseIssues
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | handleTestCaseIssues | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object createImage(byte[] bytes, int offset, int len) {
BitmapFactory.Options opts = new BitmapFactory.Options();
opts.inPreferredConfig = Bitmap.Config.ARGB_8888;
try {
BitmapFactory.Options.class.getField("inPurgeable").set(opts, true);
} catch (Excepti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createImage
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | createImage | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean contains(CharSequence name) {
return headers.contains(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: contains
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | contains | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | void getSurfaceTouchableRegion(Region region, WindowManager.LayoutParams attrs) {
final boolean modal = attrs.isModal();
if (modal) {
if (mActivityRecord != null) {
// Limit the outer touch to the activity root task region.
updateRegionForModalActivityWindow(r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSurfaceTouchableRegion
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getSurfaceTouchableRegion | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeResetGestureDetection(long nativeContentViewCoreImpl); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeResetGestureDetection
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeResetGestureDetection | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | protected void disableCertificateValidation(ClientBuilder clientBuilder) throws KeyManagementException, NoSuchAlgorithmException {
TrustManager[] trustAllCerts = new X509TrustManager[] {
new X509TrustManager() {
@Override
public X509Certificate[] getAcceptedIssuers() {
return null;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disableCertificateValidation
File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | disableCertificateValidation | samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void maybeValidateXml(File file) {
if (!file.getName().endsWith(".xml")) {
return;
}
final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setValidating(false);
factory.setNamespaceAware(true);
try {
factory... | Vulnerability Classification:
- CWE: CWE-91
- CVE: CVE-2023-40612
- Severity: HIGH
- CVSS Score: 8.0
Description: NMS-15704: Added tests
Function: maybeValidateXml
File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
Repository: OpenNMS/opennms
Fixed Code:
void maybeValidateXml(... | [
"CWE-91"
] | CVE-2023-40612 | HIGH | 8 | OpenNMS/opennms | maybeValidateXml | opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java | 726328874812cfb5d0a28c5a76b3925e531928b7 | 1 |
Analyze the following code function for security vulnerabilities | protected void initializeContainerComponent(XWikiContext context) throws ServletException
{
// Initialize the Container fields (request, response, session).
// Note that this is a bridge between the old core and the component architecture.
// In the new component architecture we use ThreadLo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeContainerComponent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | initializeContainerComponent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java | b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554 | 0 |
Analyze the following code function for security vulnerabilities | public String dialogButtonRowStart() {
return dialogButtonRow(HTML_START);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogButtonRowStart
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogButtonRowStart | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | protected void refreshRow(Object itemId) {
getParentGrid().datasourceExtension.updateRowData(itemId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refreshRow
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | refreshRow | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private int fractionCountWithoutTrailingZeros() {
return Math.max(-scale, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fractionCountWithoutTrailingZeros
File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
Repository: unicode-org/icu
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2018-18928 | HIGH | 7.5 | unicode-org/icu | fractionCountWithoutTrailingZeros | icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java | 53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | 0 |
Analyze the following code function for security vulnerabilities | public @CheckForNull <T extends Item> T getItemByFullName(String fullName, Class<T> type) {
StringTokenizer tokens = new StringTokenizer(fullName,"/");
ItemGroup parent = this;
if(!tokens.hasMoreTokens()) return null; // for example, empty full name.
while(true) {
Item i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getItemByFullName
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getItemByFullName | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | private int getEncryptionStatus() {
if (mInjector.storageManagerIsFileBasedEncryptionEnabled()) {
return DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE_PER_USER;
} else {
return DevicePolicyManager.ENCRYPTION_STATUS_UNSUPPORTED;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEncryptionStatus
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getEncryptionStatus | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | void logLockScreen(String msg) {
if (DEBUG_LOCKSCREEN) Slog.d(TAG, Debug.getCallers(2) + ":" + msg
+ " mLockScreenShown=" + lockScreenShownToString() + " mWakefulness="
+ PowerManagerInternal.wakefulnessToString(mWakefulness)
+ " mSleeping=" + mSleeping);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logLockScreen
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | logLockScreen | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public int listAllTrash(ApiScenarioBatchRequest request) {
return extApiScenarioMapper.selectTrash(request.getProjectId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: listAllTrash
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | listAllTrash | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testPostRequestParsWithMaliciousRequest() throws WebdavException {
assertTrue(requestPars.processXml());
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-20000
- Severity: MEDIUM
- CVSS Score: 5.0
Description: format: follow the repo code style, and welcome mvnvm props to manage maven versions
Function: testPostRequestParsWithMaliciousRequest
File: src/test/java/org/bedework/webdav/servlet/common/TestSecureX... | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | testPostRequestParsWithMaliciousRequest | src/test/java/org/bedework/webdav/servlet/common/TestSecureXmlTypes.java | 0ce2007b3515a23b5f287ef521300bcb1f748edc | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String getGreaterOrEqualsConditionSQL(String column, Object param) {
String paramStr = getParameterSQL(param);
return column + " >= " + paramStr;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGreaterOrEqualsConditionSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practi... | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getGreaterOrEqualsConditionSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getRobotNames() {
return "tested.robots.ConstructorHttpAttack,sample.Target";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRobotNames
File: robocode.tests/src/test/java/net/sf/robocode/test/robots/TestConstructorHttpAttack.java
Repository: robo-code/robocode
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2019-10648 | HIGH | 7.5 | robo-code/robocode | getRobotNames | robocode.tests/src/test/java/net/sf/robocode/test/robots/TestConstructorHttpAttack.java | 836c84635e982e74f2f2771b2c8640c3a34221bd | 0 |
Analyze the following code function for security vulnerabilities | private String primaryPluginStatus() {
List<Map> externalPlugins = (List<Map>) primaryServerCommunicationService.getLatestPluginsStatus().get("external");
return externalPlugins.stream().map(map -> format("%s=%s", map.get("name"), map.get("md5"))).collect(Collectors.joining(", "));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: primaryPluginStatus
File: server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2021-43287 | MEDIUM | 5 | gocd | primaryPluginStatus | server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java | 41abc210ac4e8cfa184483c9ff1c0cc04fb3511c | 0 |
Analyze the following code function for security vulnerabilities | public void configureProcessor(NettyRequestSender requestSender, AtomicBoolean closed) {
final Processor httpProcessor = newHttpProcessor(config, nettyProviderConfig, requestSender, this, closed);
wsProcessor = newWsProcessor(config, nettyProviderConfig, requestSender, this, closed);
plainBoot... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: configureProcessor
File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | configureProcessor | providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int read(byte[] b, int off, int len) throws IOException {
return cipherInputStream.read(b, off, len);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: src/main/java/net/lingala/zip4j/io/inputstream/DecompressedInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | read | src/main/java/net/lingala/zip4j/io/inputstream/DecompressedInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<DictModel> queryTableDictItemsByCodeAndFilter(@Param("table") String table,@Param("text") String text,@Param("code") String code,@Param("filterSql") String filterSql); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryTableDictItemsByCodeAndFilter
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45207 | CRITICAL | 9.8 | jeecgboot/jeecg-boot | queryTableDictItemsByCodeAndFilter | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java | 8632a835c23f558dfee3584d7658cc6a13ccec6f | 0 |
Analyze the following code function for security vulnerabilities | public boolean exists(EntityReference reference) throws Exception
{
GetMethod getMethod = executeGet(reference);
getMethod.releaseConnection();
return getMethod.getStatusCode() == Status.OK.getStatusCode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exists
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | exists | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M2")
public List getListValue(String className, String fieldName)
{
return getListValue(resolveClassReference(className), fieldName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getListValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getListValue | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_WIFI, conditional = true)
@Nullable
public WifiSsidPolicy getWifiSsidPolicy() {
throwIfParentInstance("getWifiSsidPolicy");
if (mService == null) {
return null;
}
try {
return mService.getWifiSsidPolicy(mCon... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWifiSsidPolicy
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getWifiSsidPolicy | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void setHeaders(HttpExchange pExchange) {
String origin = requestHandler.extractCorsOrigin(pExchange.getRequestHeaders().getFirst("Origin"));
Headers headers = pExchange.getResponseHeaders();
if (origin != null) {
headers.set("Access-Control-Allow-Origin",origin);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHeaders
File: agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java
Repository: jolokia
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2014-0168 | MEDIUM | 6.8 | jolokia | setHeaders | agent/jvm/src/main/java/org/jolokia/jvmagent/JolokiaHttpHandler.java | 2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364 | 0 |
Analyze the following code function for security vulnerabilities | private void setMediaPlaybackState(int state) {
PlaybackStateCompat.Builder playbackstateBuilder = new PlaybackStateCompat.Builder();
if( state == PlaybackStateCompat.STATE_PLAYING ) {
playbackstateBuilder.setActions(PlaybackStateCompat.ACTION_PLAY_PAUSE | PlaybackStateCompat.ACTION_PAUSE | ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMediaPlaybackState
File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setMediaPlaybackState | Ports/Android/src/com/codename1/media/BackgroundAudioService.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public MessagingStyle setGroupConversation(boolean isGroupConversation) {
mIsGroupConversation = isGroupConversation;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setGroupConversation
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setGroupConversation | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private String getLocalKey()
{
if (this.localKeyCache == null) {
this.localKeyCache =
LocalUidStringEntityReferenceSerializer.INSTANCE.serialize(getDocumentReferenceWithLocale());
}
return this.localKeyCache;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalKey
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getLocalKey | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private void init() {
Jiffle.refCount++ ;
// TODO - CollectionFactory
imageParams = new HashMap<String, Jiffle.ImageRole>();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | init | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | public static void recoverAbusiveSortOrder(@NonNull Bundle queryArgs) {
final String origSortOrder = queryArgs.getString(QUERY_ARG_SQL_SORT_ORDER);
final String origLimit = queryArgs.getString(QUERY_ARG_SQL_LIMIT);
final int index = (origSortOrder != null)
? origSortOrder.toUppe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recoverAbusiveSortOrder
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | recoverAbusiveSortOrder | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | static boolean equalsn(byte a1[], byte a2[]) {
int length = a2.length;
for (int k = 0; k < length; ++k) {
if (a1[k] != a2[k])
return false;
}
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equalsn
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | equalsn | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public final void removeService(PackageParser.Service s) {
mServices.remove(s.getComponentName());
if (DEBUG_SHOW_INFO) {
Log.v(TAG, " " + (s.info.nonLocalizedLabel != null
? s.info.nonLocalizedLabel : s.info.name) + ":");
Log.v(TAG, " ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeService
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | removeService | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String path() {
return path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: path
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | path | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | private String noParameters(String uri) {
final int pos = uri.indexOf("?");
if (pos > 0) {
uri = uri.substring(0, pos);
}
if (uri.equals("/")) {
uri = "";
}
return uri;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noParameters
File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
Repository: Bedework/bw-webdav
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | noParameters | src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java | 67283fb8b9609acdb1a8d2e7fefe195b4a261062 | 0 |
Analyze the following code function for security vulnerabilities | public static String issueJwt(String subject, Long period, List<String> roles){
String id = UUID.randomUUID().toString();
String issuer = "sureness-token-server";
return issueJwt(id, subject, issuer, period,
roles, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: issueJwt
File: core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java
Repository: dromara/sureness
The code follows secure coding practices. | [
"CWE-798"
] | CVE-2023-31581 | CRITICAL | 9.8 | dromara/sureness | issueJwt | core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java | 4f5fefaf673168d74820020a191fab2904629742 | 0 |
Analyze the following code function for security vulnerabilities | protected void setVerticalPanelTranslation(float translation) {
mNotificationStackScroller.setTranslationX(translation);
mQsFrame.setTranslationX(translation);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVerticalPanelTranslation
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setVerticalPanelTranslation | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationAsFloat01() throws Exception
{
Duration value = READER.with(DeserializationFeature.READ_DATE_TIMESTAMPS_AS_NANOSECONDS)
.readValue("60.0");
assertNotNull("The value should not be null.", value);
Duration exp = Duration.ofSeconds(60L, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDeserializationAsFloat01
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationAsFloat01 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onFastForward() {
super.onFastForward();
RemoteControlCallback.fastForward();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFastForward
File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onFastForward | Ports/Android/src/com/codename1/media/BackgroundAudioService.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAllowUnsafe() {
return allowUnsafe;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAllowUnsafe
File: hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isAllowUnsafe | hazelcast/src/main/java/com/hazelcast/config/SerializationConfig.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("getLockObject()")
private void maybePauseDeviceWideLoggingLocked() {
if (!areAllUsersAffiliatedWithDeviceLocked()) {
if (mOwners.hasDeviceOwner()) {
Slogf.i(LOG_TAG, "There are unaffiliated users, network logging will be "
+ "paused if enabled.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybePauseDeviceWideLoggingLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | maybePauseDeviceWideLoggingLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String tag() {
if (getPara(0) != null) {
String tag = convertRequestParam(getPara(0));
setPageInfo(Constants.getArticleUri() + "tag/" + getPara(0) + "-", new Log().findByTag(getParaToInt(1, 1), getDefaultRows(), tag), getParaToInt(1, 1));
setAttr("tipsType", I18nUtil.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tag
File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21316 | MEDIUM | 4.3 | 94fzb/zrlog | tag | web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java | b921c1ae03b8290f438657803eee05226755c941 | 0 |
Analyze the following code function for security vulnerabilities | public int getXObjectSize(EntityReference classReference)
{
return getXObjectSize(resolveClassReference(classReference));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXObjectSize
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getXObjectSize | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return "SimData{state=" + simState + ",slotId=" + slotId + ",subId=" + subId + "}";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | toString | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public String getHeaderCaption() throws IllegalStateException {
checkColumnIsAttached();
return state.headerCaption;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHeaderCaption
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getHeaderCaption | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int subWindowTypeToLayerLw(int type) {
switch (type) {
case TYPE_APPLICATION_PANEL:
case TYPE_APPLICATION_ATTACHED_DIALOG:
return APPLICATION_PANEL_SUBLAYER;
case TYPE_APPLICATION_MEDIA:
return APPLICATION_MEDIA_SUBLAYER;
case TYPE_APP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: subWindowTypeToLayerLw
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | subWindowTypeToLayerLw | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void onOffHostAidSelected() {
Log.d(TAG, "notifyOffHostAidSelected");
synchronized (mLock) {
if (mState != STATE_XFER || mActiveService == null) {
// Don't bother telling, we're not bound to any service yet
} else {
sendDeactivateToActiveSer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onOffHostAidSelected
File: src/com/android/nfc/cardemulation/HostEmulationManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35671 | MEDIUM | 5.5 | android | onOffHostAidSelected | src/com/android/nfc/cardemulation/HostEmulationManager.java | 745632835f3d97513a9c2a96e56e1dc06c4e4176 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isComplianceAcknowledgementRequired() {
throwIfParentInstance("isComplianceAcknowledgementRequired");
if (mService != null) {
try {
return mService.isComplianceAcknowledgementRequired();
} catch (RemoteException re) {
throw re.rethro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isComplianceAcknowledgementRequired
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isComplianceAcknowledgementRequired | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void beginLink(ResourceReference reference, boolean freestanding, Map<String, String> parameters)
{
// Ensure the link renderer is using the latest printer since the original printer used could have been
// superseded by another one in the printer stack.
this.linkRendere... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: beginLink
File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
Repository: xwiki/xwiki-rendering
The code follows secure codi... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | beginLink | xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | public static void assertStatuses(int actualCode, int... expectedCodes)
{
if (!ArrayUtils.contains(expectedCodes, actualCode)) {
fail(String.format("Unexpected code [%s], was expecting one of [%s]",
actualCode, Arrays.toString(expectedCodes)));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: assertStatuses
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | assertStatuses | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
static boolean isInitialized(MessageOrBuilder message) {
// Check that all required fields are present.
for (final Descriptors.FieldDescriptor field : message.getDescriptorForType().getFields()) {
if (field.isRequired()) {
if (!message.hasField(field)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInitialized
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | isInitialized | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | private void _setToDoubleFast(double n) {
isApproximate = true;
origDouble = n;
origDelta = 0;
// NOTE: Unlike ICU4C, doubles are always IEEE 754 doubles.
long ieeeBits = Double.doubleToLongBits(n);
int exponent = (int) ((ieeeBits & 0x7ff0000000000000L) >> 52) - 0x3ff;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _setToDoubleFast
File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
Repository: unicode-org/icu
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2018-18928 | HIGH | 7.5 | unicode-org/icu | _setToDoubleFast | icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java | 53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressLint("NullableCollection")
@RequiresPermission(value = MANAGE_DEVICE_POLICY_SECURITY_LOGGING, conditional = true)
public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs(
@Nullable ComponentName admin) {
throwIfParentInstance("retrievePreRebootSecurityLogs");
try ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: retrievePreRebootSecurityLogs
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | retrievePreRebootSecurityLogs | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static String getEncodePath(String path, String queryString) {
String url = path;
try {
if (CommonUtils.notEmpty(queryString)) {
url += "?" + queryString;
}
url = URLEncoder.encode(url, Constants.DEFAULT_CHARSET_NAME);
} catch (Unsupport... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEncodePath
File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | getEncodePath | publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | private static void cardinalityEstimatorXmlGenerator(XmlGenerator gen, Config config) {
for (CardinalityEstimatorConfig ex : config.getCardinalityEstimatorConfigs().values()) {
MergePolicyConfig mergePolicyConfig = ex.getMergePolicyConfig();
gen.open("cardinality-estimator", "name", ex.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cardinalityEstimatorXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | cardinalityEstimatorXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mPm.mLock")
public void checkExistingBetterPackages(ArrayMap<String, File> expectingBetterPackages,
List<String> stubSystemApps, int systemScanFlags, int systemParseFlags) {
for (int i = 0; i < expectingBetterPackages.size(); i++) {
final String packageName = expectingBet... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkExistingBetterPackages
File: services/core/java/com/android/server/pm/InstallPackageHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21257 | HIGH | 7.8 | android | checkExistingBetterPackages | services/core/java/com/android/server/pm/InstallPackageHelper.java | 1aec7feaf07e6d4568ca75d18158445dbeac10f6 | 0 |
Analyze the following code function for security vulnerabilities | public @NonNull DevicePolicyManager getParentProfileInstance(@NonNull ComponentName admin) {
throwIfParentInstance("getParentProfileInstance");
try {
if (!mService.isManagedProfile(admin)) {
throw new SecurityException("The current user does not have a parent profile.");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParentProfileInstance
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getParentProfileInstance | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean finishActivityAffinity(IBinder token) {
synchronized(this) {
final long origId = Binder.clearCallingIdentity();
try {
ActivityRecord r = ActivityRecord.isInStackLocked(token);
if (r == null) {
return false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishActivityAffinity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | finishActivityAffinity | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void start(boolean pLazy) {
Restrictor restrictor = createRestrictor();
backendManager = new BackendManager(configuration, logHandler, restrictor, pLazy);
requestHandler = new HttpRequestHandler(configuration, backendManager, logHandler);
if (listenForDiscoveryMcRequests(configura... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: start
File: agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java
Repository: jolokia
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2018-1000129 | MEDIUM | 4.3 | jolokia | start | agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java | 5895d5c137c335e6b473e9dcb9baf748851bbc5f | 0 |
Analyze the following code function for security vulnerabilities | public boolean isQuotedArgumentsEnabled()
{
return quotedArgumentsEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isQuotedArgumentsEnabled
File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | isQuotedArgumentsEnabled | src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void createWiki(String wikiName, XWikiContext inputxcontext) throws XWikiException
{
XWikiContext context = getExecutionXContext(inputxcontext, false);
boolean bTransaction = true;
String database = context.getWikiId();
AtomicReference<Statement> stmt = new Atom... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createWiki
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | createWiki | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onConsoleMessage(ConsoleMessage consoleMessage) {
com.codename1.io.Log.p("["+consoleMessage.messageLevel()+"] "+consoleMessage.message()+" On line "+consoleMessage.lineNumber()+" of "+consoleMessage.sourceId());
return true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConsoleMessage
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onConsoleMessage | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void registerEncoder(Encoder encoder) {
EncoderRegistry encoderRegistry = embeddedCache.getAdvancedCache().getComponentRegistry()
.getGlobalComponentRegistry().getComponent(EncoderRegistry.class);
encoderRegistry.registerEncoder(encoder);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerEncoder
File: integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | registerEncoder | integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java | 69be66141eee7abb1c47d46f0a6b74b079709f4b | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public DeletedDocument getDeletedDocument(String fullname, String locale, String index) throws XWikiException
{
return getDeletedDocument(index);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeletedDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getDeletedDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private String innerQueryProvider( Set<String> uids, Set<String> userOrgUnitPaths, User currentUser )
{
Stream<String> queryParts = Stream.of(
getInnerQuerySql(),
getUidsFilter( uids ) );
if ( nonSuperUser( currentUser ) )
{
queryParts = Stream.concat( qu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: innerQueryProvider
File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java
Repository: dhis2/dhis2-core
The code follows secure coding... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | innerQueryProvider | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java | ef04483a9b177d62e48dcf4e498b302a11f95e7d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isDefaultOrientationForced() {
return mForceDefaultOrientation;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDefaultOrientationForced
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | isDefaultOrientationForced | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public static long findContentLength(final int id, FileDownloadConnection connection) {
long contentLength = convertContentLengthString(
connection.getResponseHeaderField("Content-Length"));
final String transferEncoding = connection.getResponseHeaderField("Transfer-Encoding");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findContentLength
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | findContentLength | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | public String getPrlVersion() {
return mPrlVersion;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrlVersion
File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | getPrlVersion | src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | private void installPermission(Invocation ai) {
String template = null;
if (!ZrLogConfig.isInstalled()) {
ai.invoke();
if (ai.getReturnValue() != null) {
template = ai.getReturnValue();
}
} else {
ai.getController().getRequest().set... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installPermission
File: web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21316 | MEDIUM | 4.3 | 94fzb/zrlog | installPermission | web/src/main/java/com/zrlog/web/interceptor/VisitorInterceptor.java | b921c1ae03b8290f438657803eee05226755c941 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Policy[] newArray(int size) {
return new Policy[size];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newArray
File: framework/java/android/net/wifi/hotspot2/pps/Policy.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21240 | MEDIUM | 5.5 | android | newArray | framework/java/android/net/wifi/hotspot2/pps/Policy.java | 69119d1d3102e27b6473c785125696881bce9563 | 0 |
Analyze the following code function for security vulnerabilities | public Object fromXML(Reader xml, Object root) {
return unmarshal(hierarchicalStreamDriver.createReader(xml), root);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fromXML
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | fromXML | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder attr(String name, String value); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attr
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | attr | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | public static Bundle nonNull(@Nullable Bundle in) {
return in != null ? in : new Bundle();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nonNull
File: services/core/java/com/android/server/pm/UserRestrictionsUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | nonNull | services/core/java/com/android/server/pm/UserRestrictionsUtils.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private boolean shouldStartActivity() {
return mVisibleRequested && (isState(STOPPED) || isState(STOPPING));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldStartActivity
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | shouldStartActivity | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public static String formatXMLContent(String content) throws TransformerFactoryConfigurationError,
TransformerException
{
Transformer transformer = TransformerFactory.newInstance().newTransformer();
transformer.setOutputProperty(OutputKeys.INDENT, "yes");
transformer.setOutputPropert... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: formatXMLContent
File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
Repository: xwiki/xwiki-commons
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-24898 | MEDIUM | 4 | xwiki/xwiki-commons | formatXMLContent | xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java | 947e8921ebd95462d5a7928f397dd1b64f77c7d5 | 0 |
Analyze the following code function for security vulnerabilities | private ApplicationParams getApplicationParams(Document androidManifest, Document appStrings) {
Element manifest = (Element) androidManifest.getElementsByTagName("manifest").item(0);
Element usesSdk = (Element) androidManifest.getElementsByTagName("uses-sdk").item(0);
Element application = (Element) androidManife... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationParams
File: jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java
Repository: skylot/jadx
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-0219 | MEDIUM | 4.3 | skylot/jadx | getApplicationParams | jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java | d22db30166e7cb369d72be41382bb63ac8b81c52 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setProcessLimit(int max) {
enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
"setProcessLimit()");
synchronized (this) {
mProcessLimit = max < 0 ? ProcessList.MAX_CACHED_APPS : max;
mProcessLimitOverride = max;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProcessLimit
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | setProcessLimit | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public InputConnection onCreateInputConnection(EditorInfo outAttrs) {
mInputConnection.setTarget(super.onCreateInputConnection(outAttrs));
return mInputConnection;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreateInputConnection
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | onCreateInputConnection | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | private String trimLeadingSlash(String s) {
if (s.charAt(0) == '/') {
return s.substring(1);
} else {
return s;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimLeadingSlash
File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | trimLeadingSlash | impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | public static String getParameter(HttpServletRequest request, String name, String defaultValue) {
String value = request.getParameter(name);
if (value == null || value.isEmpty() && defaultValue != null && !defaultValue.isEmpty()) {
return defaultValue;
}
return value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParameter
File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-0869 | MEDIUM | 6.1 | OpenNMS/opennms | getParameter | opennms-web-api/src/main/java/org/opennms/web/api/Util.java | 66b4ba96a18b9952f25a350bbccc2a7e206238d1 | 0 |
Analyze the following code function for security vulnerabilities | public Object opt(int index) {
return (index < 0 || index >= length()) ?
null : this.myArrayList.get(index);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: opt
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | opt | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public String setDoublePageModeAction(boolean doublePageMode) throws IndexUnreachableException, DAOException {
if (viewManager == null) {
return "";
}
try {
// Adapt URL page range when switching between single and double page modes
if (viewManager.isDoublePag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDoublePageModeAction
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | setDoublePageModeAction | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | private static Join<?, ?> getOrCreateJoin(From<?, ?> from, String attribute) {
for (Join<?, ?> join : from.getJoins()) {
boolean sameName = join.getAttribute().getName().equals(attribute);
if (sameName && join.getJoinType().equals(JoinType.LEFT)) {
return join;
}
}
return from.join(attribute, Joi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOrCreateJoin
File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | getOrCreateJoin | src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | public Builder setV4SignatureFile(File v4SignatureFile) {
mV4SignatureFile = v4SignatureFile;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setV4SignatureFile
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | setV4SignatureFile | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String[] saveSelfRegisteredUser(Object user) {
throw new UnsupportedOperationException();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveSelfRegisteredUser
File: portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java
Repository: ManyDesigns/Portofino
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-29451 | MEDIUM | 6.4 | ManyDesigns/Portofino | saveSelfRegisteredUser | portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java | 8c754a0ad234555e813dcbf9e57d637f9f23d8fb | 0 |
Analyze the following code function for security vulnerabilities | private String createTmpDir() {
try {
File tmp = File.createTempFile("fileresourcemanager", null);
tmp.delete();
tmp.mkdir();
String workDir = tmp.getAbsolutePath();
return workDir;
} catch (IOException e) {
throw log.errorCreateWorkDir(e);
}
} | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2018-25068
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Feature #4100 Fix critical Vulnerability
"File.createTempFile" should not be used to create a directory
Function: createTmpDir
File: globalpomutils-fileresources/src/main/java/com/anrisoftware/globalp... | [
"CWE-668"
] | CVE-2018-25068 | MEDIUM | 6.5 | devent/globalpom-utils | createTmpDir | globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java | 77a820bac2f68e662ce261ecb050c643bd7ee560 | 1 |
Analyze the following code function for security vulnerabilities | boolean isVisibleByPolicy() {
return (mPolicyVisibility & POLICY_VISIBILITY_ALL) == POLICY_VISIBILITY_ALL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isVisibleByPolicy
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isVisibleByPolicy | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private ModelNode readAttributeValue(PathAddress address, String attributeName) {
final ModelNode readAttributeOp = new ModelNode();
readAttributeOp.get(OP).set(READ_ATTRIBUTE_OPERATION);
readAttributeOp.get(OP_ADDR).set(address.toModelNode());
readAttributeOp.get(ModelDescriptionConstan... | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2021-3503
- Severity: MEDIUM
- CVSS Score: 4.0
Description: [WFLY-11933] Return properly configured ModelNode when RBAC is enabled
Return empty ModelNode for attributes restricted by RBAC so that isDefined() answers correctly
(h/t jmesnil)
Function: readAttribu... | [
"CWE-200"
] | CVE-2021-3503 | MEDIUM | 4 | wildfly | readAttributeValue | metrics/src/main/java/org/wildfly/extension/metrics/WildFlyMetric.java | a48db605577d941b5ae3e899a1187303e138ca74 | 1 |
Analyze the following code function for security vulnerabilities | void setNegativeButton(Button button) {
mNegativeButton = button;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNegativeButton
File: src/java/com/android/internal/telephony/SMSDispatcher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3858 | HIGH | 9.3 | android | setNegativeButton | src/java/com/android/internal/telephony/SMSDispatcher.java | df31d37d285dde9911b699837c351aed2320b586 | 0 |
Analyze the following code function for security vulnerabilities | public String evaluateAmwFunction(AmwFunctionEntity function, AmwTemplateModel model, AmwModelPreprocessExceptionHandler amwModelPreprocessExceptionHandler) throws IOException, TemplateException {
Configuration cfg = getConfiguration(amwModelPreprocessExceptionHandler);
StringTemplateLoader loader = new... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: evaluateAmwFunction
File: AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java
Repository: liimaorg/liima
The code follows secure coding practices... | [
"CWE-917"
] | CVE-2023-26092 | CRITICAL | 9.8 | liimaorg/liima | evaluateAmwFunction | AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java | 78ba2e198c615dc8858e56eee3290989f0362686 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder serviceUnder(String pathPrefix, HttpService service) {
virtualHostTemplate.serviceUnder(pathPrefix, service);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serviceUnder
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | serviceUnder | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | @JsonProperty(FIELD_CACHE_TTL_OVERRIDE)
public abstract Builder cacheTTLOverride(Long cacheTTLOverride); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cacheTTLOverride
File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2023-41045 | MEDIUM | 5.3 | Graylog2/graylog2-server | cacheTTLOverride | graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java | 466af814523cffae9fbc7e77bab7472988f03c3e | 0 |
Analyze the following code function for security vulnerabilities | public static void copy(File src, File dst) throws IOException {
InputStream in = new FileInputStream(src);
try {
OutputStream out = new FileOutputStream(dst);
try {
// Transfer bytes from in to out
byte[] buf = new byte[8096];
int ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | copy | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void animateCollapsePanels(int flags, boolean force) {
animateCollapsePanels(flags, force, false /* delayed */, 1.0f /* speedUpFactor */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: animateCollapsePanels
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | animateCollapsePanels | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public String selectHeaderAccept(String[] accepts) {
if (accepts.length == 0) {
return null;
}
for (String accept : accepts) {
if (isJsonMime(accept)) {
return accept;
}
}
return StringUtil.join(accepts, ",");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selectHeaderAccept
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practice... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | selectHeaderAccept | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void marshal(Object graph, Result result, MimeContainer mimeContainer) throws XmlMappingException {
try {
Marshaller marshaller = createMarshaller();
if (this.mtomEnabled && mimeContainer != null) {
marshaller.setAttachmentMarshaller(new Jaxb2AttachmentMarshaller(mimeContainer));
}
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: marshal
File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-4152 | MEDIUM | 6.8 | spring-projects/spring-framework | marshal | spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java | 2843b7d2ee12e3f9c458f6f816befd21b402e3b9 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.