instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | void go() {
if (lastRi != curRi) {
ActivityInfo ai = ris.get(curRi).activityInfo;
ComponentName comp = new ComponentName(ai.packageName, ai.name);
intent.setComponent(comp);
doneReceivers.add(comp);
lastRi = curRi;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: go
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | go | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public String getUserErrorMessage() {
return userErrorMessage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserErrorMessage
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getUserErrorMessage | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isIgnoredSpaceForNotifications(Profile profile, String space) {
return profile != null && !profile.getFavspaces().isEmpty() && !profile.getFavspaces().contains(getSpaceId(space));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isIgnoredSpaceForNotifications
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | isIgnoredSpaceForNotifications | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private Map<JobKey, List<MutableTrigger>> buildTriggersByFQJobNameMap(List<MutableTrigger> triggers) {
Map<JobKey, List<MutableTrigger>> triggersByFQJobName = new HashMap<JobKey, List<MutableTrigger>>();
for(MutableTrigger trigger: triggers) {
List<MutableTrigger> triggersO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildTriggersByFQJobNameMap
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-13990 | HIGH | 7.5 | quartz-scheduler/quartz | buildTriggersByFQJobNameMap | quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java | a1395ba118df306c7fe67c24fb0c9a95a4473140 | 0 |
Analyze the following code function for security vulnerabilities | private native boolean startDiscoveryNative(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDiscoveryNative
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | startDiscoveryNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | final StandardTemplateParams promotedPicture(Icon promotedPicture) {
this.mPromotedPicture = promotedPicture;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: promotedPicture
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | promotedPicture | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public int getLaunchedFromUid(IBinder activityToken) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLaunchedFromUid
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getLaunchedFromUid | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public String getOrderBy() {
return orderBy;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOrderBy
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | getOrderBy | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | @Get("regex:/projects/(?<projectName>[^/]+)/repos/(?<repoName>[^/]+)/contents(?<path>(|/.*))$")
public CompletableFuture<?> getFiles(
ServiceRequestContext ctx,
@Param String path, @Param @Default("-1") String revision,
Repository repository,
@RequestConverter(WatchRe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFiles
File: server/src/main/java/com/linecorp/centraldogma/server/internal/api/ContentServiceV1.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | getFiles | server/src/main/java/com/linecorp/centraldogma/server/internal/api/ContentServiceV1.java | 6a395aed73f0b009cf8174a3ebf3ed826521c11d | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
private List<String> getDelegatedShellPermissionsInternal() {
synchronized (mLock) {
if (mCheckPermissionDelegate == null) {
return Collections.EMPTY_LIST;
}
return mCheckPermissionDelegate.getDelegatedPermissionNames();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDelegatedShellPermissionsInternal
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getDelegatedShellPermissionsInternal | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DescriptorImpl getDescriptor() {
return (DescriptorImpl)super.getDescriptor();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDescriptor
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | getDescriptor | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public void setMessage(String message) {
this.message = parser.parseExpression(message, ParserContext.TEMPLATE_EXPRESSION);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMessage
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DingTalkNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setMessage | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DingTalkNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isJsonMime(String mime) {
String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$";
return mime != null && (mime.matches(jsonMime) || mime.equals("*/*"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isJsonMime
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | isJsonMime | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected AMQConnection createConnection(ConnectionParams params, FrameHandler frameHandler, MetricsCollector metricsCollector) {
return new AMQConnection(params, frameHandler, metricsCollector);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConnection
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | createConnection | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isContextual() {
return mIsContextual;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isContextual
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isContextual | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private boolean canReadPrivilegedPhoneState(String callingPackage, String message) {
// The system/default dialer can always read phone state - so that emergency calls will
// still work.
if (isPrivilegedDialerCalling(callingPackage)) {
return true;
}
mContext.enforc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canReadPrivilegedPhoneState
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | canReadPrivilegedPhoneState | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | private void parseMathExpression(Element e, boolean inRightOfPrevious, XmlSerializer serializer) throws Exception
{
final List<Element> elements = XmlUtils.getElements(e);
final Element input = XmlUtils.getElement(elements, "input");
final Element result = XmlUtils.getElement(elements, "resu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseMathExpression
File: app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java
Repository: mkulesh/microMathematics
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000821 | HIGH | 7.5 | mkulesh/microMathematics | parseMathExpression | app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java | 5c05ac8de16c569ff0a1816f20be235090d3dd9d | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public void forceUpdateUserSetupComplete(@UserIdInt int userId) {
try {
mService.forceUpdateUserSetupComplete(userId);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceUpdateUserSetupComplete
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | forceUpdateUserSetupComplete | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void restoreMinimizedApplication() {
if (getActivity() != null) {
Intent i = new Intent(getActivity(), getActivity().getClass());
i.setAction(Intent.ACTION_MAIN);
i.addCategory(Intent.CATEGORY_LAUNCHER);
getContext().startActivity(i);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: restoreMinimizedApplication
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | restoreMinimizedApplication | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public <T extends NodeFeature> Optional<T> getFeatureIfInitialized(
Class<T> featureType) {
if (features == null) {
return Optional.empty();
}
int featureIndex = getFeatureIndex(featureType);
if (features instanceof NodeFeature) {
if (featureIndex == ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFeatureIfInitialized
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getFeatureIfInitialized | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public void setNotAfter(String notAfter) {
this.notAfter = notAfter;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNotAfter
File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setNotAfter | base/common/src/main/java/com/netscape/certsrv/cert/CertData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object deriveTrueTypeFont(Object font, float size, int weight) {
NativeFont fnt = (NativeFont)font;
CodenameOneTextPaint paint = (CodenameOneTextPaint)fnt.font;
paint.setAntiAlias(true);
Typeface type = paint.getTypeface();
int fontstyle = Typeface.NORMAL;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deriveTrueTypeFont
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | deriveTrueTypeFont | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static String getParent(final String path) {
int length = path.length(), firstInPath = 0;
if (File.separatorChar == '\\' && length > 2 && path.charAt(1) == ':') {
firstInPath = 2;
}
int index = path.lastIndexOf(File.separatorChar);
if (index == -1 && firstInPat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParent
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | getParent | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | public boolean checkAccess(String docname, String right)
{
try {
DocumentReference docReference = getCurrentMixedDocumentReferenceResolver().resolve(docname);
XWikiDocument doc = getXWikiContext().getWiki().getDocument(docReference, this.context);
return getXWikiContext()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAccess
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | checkAccess | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getLockTaskModeState() {
synchronized (this) {
return mLockTaskController.getLockTaskModeState();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLockTaskModeState
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getLockTaskModeState | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public User getUser(final String name) throws IOException {
update();
m_readLock.lock();
try {
return _getUser(name);
} finally {
m_readLock.unlock();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUser
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | getUser | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isFile(String fileName) {
return SupportedProtocols.from(fileName) == SupportedProtocols.file;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFile
File: core/src/main/java/apoc/util/FileUtils.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23532 | MEDIUM | 6.5 | neo4j-contrib/neo4j-apoc-procedures | isFile | core/src/main/java/apoc/util/FileUtils.java | 01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522 | 0 |
Analyze the following code function for security vulnerabilities | private void writeBitmapLocked(UserInfo info, Bitmap bitmap) {
try {
File dir = new File(mUsersDir, Integer.toString(info.id));
File file = new File(dir, USER_PHOTO_FILENAME);
File tmp = new File(dir, USER_PHOTO_FILENAME_TMP);
if (!dir.exists()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeBitmapLocked
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | writeBitmapLocked | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | private void validateSPTemplateExists(String oldTemplateName, SpTemplate spTemplate, String tenantDomain)
throws IdentityApplicationManagementException {
if (!oldTemplateName.equals(spTemplate.getName())) {
validateSPTemplateExists(spTemplate, tenantDomain);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateSPTemplateExists
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-id... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | validateSPTemplateExists | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | public boolean startBinderTracking() throws RemoteException {
// TODO: hijacking SET_ACTIVITY_WATCHER, but should be changed to its own
// permission (same as profileControl).
if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
!= PackageManager.PERMISSIO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startBinderTracking
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | startBinderTracking | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public boolean isDarkModeEnabled() {
return CONF.darkModeEnabled();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDarkModeEnabled
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | isDarkModeEnabled | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeInit(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeInit
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeInit | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public static Path expandIfZip(Path filePath) throws IOException {
if (!isZipFile(filePath)) {
return filePath;
}
FileTime pluginZipDate = Files.getLastModifiedTime(filePath);
String fileName = filePath.getFileName().toString();
String directoryName = fileName.substr... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2023-40827
- Severity: HIGH
- CVSS Score: 7.5
Description: Add security checks to prevent directory traversal when decompressing
Function: expandIfZip
File: pf4j/src/main/java/org/pf4j/util/FileUtils.java
Repository: pf4j
Fixed Code:
public static Path expandIfZ... | [
"CWE-22"
] | CVE-2023-40827 | HIGH | 7.5 | pf4j | expandIfZip | pf4j/src/main/java/org/pf4j/util/FileUtils.java | ed9392069fe14c6c30d9f876710e5ad40f7ea8c1 | 1 |
Analyze the following code function for security vulnerabilities | @Override public long contentLength() throws IOException {
return delegate.contentLength();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: contentLength
File: retrofit/src/main/java/retrofit2/RequestBuilder.java
Repository: square/retrofit
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-1000850 | MEDIUM | 6.4 | square/retrofit | contentLength | retrofit/src/main/java/retrofit2/RequestBuilder.java | b9a7f6ad72073ddd40254c0058710e87a073047d | 0 |
Analyze the following code function for security vulnerabilities | public boolean isEphemeralUser(@NonNull ComponentName admin) {
throwIfParentInstance("isEphemeralUser");
try {
return mService.isEphemeralUser(admin);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEphemeralUser
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isEphemeralUser | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private boolean canReadPhoneNumbers(String callingPackage, String callingFeatureId,
String message) {
boolean targetSdkPreR = false;
int uid = Binder.getCallingUid();
try {
ApplicationInfo applicationInfo = mPackageManager.getApplicationInfoAsUser(
cal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canReadPhoneNumbers
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | canReadPhoneNumbers | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | private void writeStatusLocked() {
if (Log.isLoggable(TAG_FILE, Log.VERBOSE)) {
Log.v(TAG_FILE, "Writing new " + mStatusFile.getBaseFile());
}
// The file is being written, so we don't need to have a scheduled
// write until the next change.
removeMessages(MSG_WRITE_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeStatusLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | writeStatusLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public GetMethod executeGet(Object resourceURI, EntityReference reference) throws Exception
{
return executeGet(resourceURI, toElements(reference));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeGet
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | executeGet | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void scheduleBroadcastsLocked() {
if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Schedule broadcasts ["
+ mQueueName + "]: current="
+ mBroadcastsScheduled);
if (mBroadcastsScheduled) {
return;
}
mHandler.sendMessage(mHandler.obtainMessage... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleBroadcastsLocked
File: services/core/java/com/android/server/am/BroadcastQueue.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | scheduleBroadcastsLocked | services/core/java/com/android/server/am/BroadcastQueue.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isManageable() {
return manageable;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isManageable
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | isManageable | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | public static File getConvertedMarkedFile(final Context context) {
return new File(context.getFilesDir().getAbsolutePath() + File.separator
+ INTERNAL_DOCUMENT_NAME, OLD_FILE_CONVERTED_FILE_NAME);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConvertedMarkedFile
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | getConvertedMarkedFile | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | public String getContent() {
return content;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContent
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | getContent | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | protected String getFilePath(String path) {
String contextPath = this.get.get("contextPath");
// 根目录
if (StrUtils.isEmpty(contextPath)) {
return path;
}
if (path.startsWith(contextPath)) {
path = path.replaceFirst(contextPath, "");
}
retur... | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2021-37262
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix unsafe `replaceFirst` call
Function: getFilePath
File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java
Repository: jflyfox/jfinal_cms
Fixed Code:
protected String getFilePath(String ... | [
"CWE-74"
] | CVE-2021-37262 | MEDIUM | 5 | jflyfox/jfinal_cms | getFilePath | src/main/java/com/jflyfox/modules/filemanager/FileManager.java | e7fd0fe9362464c4d2bd308318eecc89a847b116 | 1 |
Analyze the following code function for security vulnerabilities | public String getSchemaDropCommand() {
return this.dbDropSchemaCommand;
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2019-15558
- Severity: HIGH
- CVSS Score: 7.5
Description: fix sql injection
Function: getSchemaDropCommand
File: xm-commons-migration-db/src/main/java/com/icthh/xm/commons/migration/db/tenant/DropSchemaResolver.java
Repository: xm-online/xm-commons
Fixed Code:
... | [
"CWE-89"
] | CVE-2019-15558 | HIGH | 7.5 | xm-online/xm-commons | getSchemaDropCommand | xm-commons-migration-db/src/main/java/com/icthh/xm/commons/migration/db/tenant/DropSchemaResolver.java | de96e9c4339e37ab1172e3a4e16ee2b7dfe74a70 | 1 |
Analyze the following code function for security vulnerabilities | public void send(final int iCode, final String iReason, final String iContentType, final Object iContent, final String iHeaders)
throws IOException {
if (sendStarted)
// AVOID TO SEND RESPONSE TWICE
{
return;
}
sendStarted = true;
// final String content;
// final String content... | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2015-2912
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Fixed issue #4824 about disabling JSONP support
Function: send
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orien... | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | send | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | f11dbced94cb587f445cb99db08735c023921053 | 1 |
Analyze the following code function for security vulnerabilities | boolean isSleepingLocked() {
return mSleeping;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSleepingLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | isSleepingLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Definition get(final String path, final Route.Handler handler) {
return appendDefinition(GET, path, handler);
} | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2020-7647
- Severity: MEDIUM
- CVSS Score: 5.0
Description: asset: path traversal fix #1639
Function: get
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
Fixed Code:
@Override
public Route.Definition get(final String path, final ... | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | get | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 1 |
Analyze the following code function for security vulnerabilities | public static AllUserSessions create(MongoDBSessionService sessionService) {
return new AllUserSessions(sessionService.loadAll());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | create | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object setUserData(final String key, final Object data, final UserDataHandler handler) {
if (userData_ == null) {
userData_ = new HashMap<>();
}
return userData_.put(key, data);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserData
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | setUserData | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | public final void activitySlept(IBinder token) {
if (localLOGV) Slog.v(TAG, "Activity slept: token=" + token);
final long origId = Binder.clearCallingIdentity();
synchronized (this) {
final ActivityRecord r = ActivityRecord.isInStackLocked(token);
if (r != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activitySlept
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | activitySlept | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private boolean deleteConfigSetting(String name) {
if (DEBUG) {
Slog.v(LOG_TAG, "deleteConfigSetting(" + name + ")");
}
return mutateConfigSetting(name, null, null, false,
MUTATION_OPERATION_DELETE, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteConfigSetting
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | deleteConfigSetting | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testSerializationAsString02() throws Exception
{
Instant date = Instant.ofEpochSecond(123456789L, 183917322);
String value = MAPPER.writer()
.without(SerializationFeature.WRITE_DATES_AS_TIMESTAMPS)
.writeValueAsString(date);
assertEquals(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testSerializationAsString02
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testSerializationAsString02 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | private void sendMenuSelection(int menuId, boolean helpRequired) {
ByteArrayOutputStream buf = new ByteArrayOutputStream();
// tag
int tag = BerTlv.BER_MENU_SELECTION_TAG;
buf.write(tag);
// length
buf.write(0x00); // place holder
// device identities
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendMenuSelection
File: src/java/com/android/internal/telephony/cat/CatService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3843 | HIGH | 9.3 | android | sendMenuSelection | src/java/com/android/internal/telephony/cat/CatService.java | b48581401259439dc5ef6dcf8b0f303e4cbefbe9 | 0 |
Analyze the following code function for security vulnerabilities | public void addConstraint(PolicyConstraintValue constraint) {
constraints.add(constraint);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addConstraint
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | addConstraint | base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @PostMapping(value = "/exposed")
@Loggable
@Transactional
@Operation(description = "Send exposed keys to server - includes a fix for the fact that GAEN doesn't give access to the current day's exposed key")
@ApiResponses(value = {
@ApiResponse(responseCode = "200", description = "The exposed keys have been store... | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2020-26230
- Severity: LOW
- CVSS Score: 2.6
Description: [MAPR] Setted responses retention time on fake requests
Function: addExposed
File: dpppt-backend-sdk/dpppt-backend-sdk-ws/src/main/java/org/dpppt/backend/sdk/ws/controller/GaenController.java
Repository: ... | [
"CWE-200"
] | CVE-2020-26230 | LOW | 2.6 | RadarCOVID/radar-covid-backend-dp3t-server | addExposed | dpppt-backend-sdk/dpppt-backend-sdk-ws/src/main/java/org/dpppt/backend/sdk/ws/controller/GaenController.java | c37f81636250892670750e3989139fd76d4beffe | 1 |
Analyze the following code function for security vulnerabilities | public DefaultJpaInstanceConfiguration user(String user) {
put(PersistenceUnitProperties.JDBC_USER, user);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: user
File: src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java
Repository: KrailOrg/krail-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-15018 | MEDIUM | 5.2 | KrailOrg/krail-jpa | user | src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java | c1e848665492e21ef6cc9be443205e36b9a1f6be | 0 |
Analyze the following code function for security vulnerabilities | public String getCurrentContentSyntaxId(XWikiContext context)
{
String syntaxId = getCurrentContentSyntaxIdInternal(context);
if (syntaxId == null) {
throw new RuntimeException("Cannot get the current syntax since there's no current document set");
}
return syntaxId;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentContentSyntaxId
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getCurrentContentSyntaxId | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
final Float getFloatAndRemove(CharSequence name) {
final String v = getAndRemove(name);
return toFloat(v);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFloatAndRemove
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | getFloatAndRemove | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @SysUISingleton
@Provides
static NotificationPanelLogger provideNotificationPanelLogger() {
return new NotificationPanelLoggerImpl();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: provideNotificationPanelLogger
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | provideNotificationPanelLogger | packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public int getSecurityLevel() {
if (mNativeTabAndroid == 0) return ToolbarModelSecurityLevel.NONE;
return nativeGetSecurityLevel(mNativeTabAndroid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSecurityLevel
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getSecurityLevel | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
public @Nullable ComponentName getProfileOwnerAsUser(final int userId) {
if (mService != null) {
try {
return mService.getProfileOwnerAsUser(userId);
} catch (RemoteException re) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileOwnerAsUser
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getProfileOwnerAsUser | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void getByIdsNotFound(TestContext context) {
Async async = context.async();
createFoo(context).getByIdAsString(FOO, randomUuidArray(), res -> {
assertSuccess(context, res);
context.assertTrue(res.result().isEmpty());
async.complete();
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getByIdsNotFound
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getByIdsNotFound | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void setMaxClockSkew(final int maxClockSkew) {
this.maxClockSkew = maxClockSkew;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaxClockSkew
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | setMaxClockSkew | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | private void applyAnnotations(FacesContext ctx, String rendererType, UIComponent c) {
if (c != null && ctx != null) {
associate.getAnnotationManager().applyComponentAnnotations(ctx, c);
if (rendererType != null) {
RenderKit rk = ctx.getRenderKit();
Render... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyAnnotations
File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | applyAnnotations | impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | ActivityRecord getHomeActivityForUser(int userId) {
final ArrayList<TaskRecord> tasks = mHomeStack.getAllTasks();
for (int taskNdx = tasks.size() - 1; taskNdx >= 0; --taskNdx) {
final TaskRecord task = tasks.get(taskNdx);
if (task.isHomeTask()) {
final ArrayList<A... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHomeActivityForUser
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | getHomeActivityForUser | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | boolean show(boolean doAnimation, boolean requestAnim) {
if (isLegacyPolicyVisibility() && mLegacyPolicyVisibilityAfterAnim) {
// Already showing.
return false;
}
if (!showToCurrentUser()) {
return false;
}
if (!mAppOpVisibility) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: show
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | show | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | Encoder getEncoder() {
return encoder;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEncoder
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getEncoder | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | @Pure
private long readLongValue(byte[] bytes, int oid, long minVal, long maxVal, String targetType)
throws PSQLException {
long val;
// currently implemented binary encoded fields
switch (oid) {
case Oid.INT2:
val = ByteConverter.int2(bytes, 0);
break;
case Oid.INT4:
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readLongValue
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | readLongValue | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getUserHasTrust(int userId) {
return !isTrustDisabled(userId) && mUserHasTrust.get(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserHasTrust
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | getUserHasTrust | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public static String concatenateWhere(String a, String b) {
if (TextUtils.isEmpty(a)) {
return b;
}
if (TextUtils.isEmpty(b)) {
return a;
}
return "(" + a + ") AND (" + b + ")";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: concatenateWhere
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | concatenateWhere | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | private void processProfileStateChanged(BluetoothDevice device, int profileId, int newState, int prevState) {
if (((profileId == BluetoothProfile.A2DP) ||(profileId == BluetoothProfile.HEADSET)) &&
(newState == BluetoothProfile.STATE_CONNECTED)){
debugLog( "Profile connected. Schedule m... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processProfileStateChanged
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | processProfileStateChanged | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private void initToolbarData(Element elt) {
ToolbarData toolbar = file.getOptions().getToolbarData();
for (Element sub_elt : XmlIterator.forChildElements(elt)) {
if (sub_elt.getTagName().equals("sep")) {
toolbar.addSeparator();
} else if (sub_elt.getTagName().equals("tool")) {
Tool tool;
tr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initToolbarData
File: src/com/cburch/logisim/file/XmlReader.java
Repository: logisim-evolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000889 | MEDIUM | 6.8 | logisim-evolution | initToolbarData | src/com/cburch/logisim/file/XmlReader.java | 90aee8f8ceef463884cc400af4f6d1f109fb0972 | 0 |
Analyze the following code function for security vulnerabilities | public void initActiveScan() {
logger.info("init active scan module");
activeScanButton.addActionListener(e -> {
try {
refreshOutput();
xrayCmd.setModule("webscan");
xrayCmd.setConfig(String.format("%s", configPath));
xrayCmd.se... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initActiveScan
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | initActiveScan | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 0 |
Analyze the following code function for security vulnerabilities | private SettingsState getGlobalSettingsLocked() {
return getSettingsLocked(SETTINGS_TYPE_GLOBAL, UserHandle.USER_SYSTEM);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalSettingsLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | getGlobalSettingsLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private boolean removeDisabledHints(ManagedServiceInfo info, int hints) {
boolean removed = false;
for (int i = mListenersDisablingEffects.size() - 1; i >= 0; --i) {
final int hint = mListenersDisablingEffects.keyAt(i);
final ArraySet<ManagedServiceInfo> listeners =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeDisabledHints
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | removeDisabledHints | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public String getNumericPage(final String userID) throws IOException {
return getContactServiceProvider(userID, ContactType.numericPage.toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNumericPage
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | getNumericPage | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | protected String getItemDataMaxLengths(String crfVersionIds) {
return "select item_id, max(length(value)) as max_length from item_data where item_id in ("
+ " select distinct ifm.item_id from item_form_metadata ifm where ifm.crf_version_id in (" + crfVersionIds
+ ")) and length(value) > ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getItemDataMaxLengths
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | getItemDataMaxLengths | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | public BluetoothDevice getRemoteDevice() {
return mDevice;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRemoteDevice
File: core/java/android/bluetooth/BluetoothSocket.java
Repository: Genymobile/f2ut_platform_frameworks_base
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-9908 | LOW | 3.3 | Genymobile/f2ut_platform_frameworks_base | getRemoteDevice | core/java/android/bluetooth/BluetoothSocket.java | f24cec326f5f65c693544fb0b92c37f633bacda2 | 0 |
Analyze the following code function for security vulnerabilities | private boolean checkKeyIntentParceledCorrectly(Bundle bundle) {
Parcel p = Parcel.obtain();
p.writeBundle(bundle);
p.setDataPosition(0);
Bundle simulateBundle = p.readBundle();
p.recycle();
Intent intent = bundle.getParcelable(AccountManager.KEY_I... | Vulnerability Classification:
- CWE: CWE-Other, CWE-502
- CVE: CVE-2023-45777
- Severity: HIGH
- CVSS Score: 7.8
Description: Update AccountManagerService checkKeyIntentParceledCorrectly.
Bug: 265798288
Test: manual
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8476b140eed0235df4e8f0... | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | checkKeyIntentParceledCorrectly | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 1 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked") // cross your fingers
public <A> Optional<Http.MultipartFormData.FilePart<A>> file() {
return Optional.ofNullable((Http.MultipartFormData.FilePart<A>) file);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: file
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | file | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | public void destroy() {
act.runOnUiThread(new Runnable() {
public void run() {
web.destroy();
}
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroy
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | destroy | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void establish() {
if (MORE_DEBUG) Slog.i(TAG, "Initiating bind of OBB service on " + this);
Intent obbIntent = new Intent().setComponent(new ComponentName(
"com.android.sharedstoragebackup",
"com.android.sharedstoragebackup.ObbBackupService"));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: establish
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | establish | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void close() throws IOException {
if (DBG) Log.d(TAG, "close() in, this: " + this + ", channel: " + mPort + ", state: " + mSocketState);
if(mSocketState == SocketState.CLOSED)
return;
else
{
synchronized(this)
{
if... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: core/java/android/bluetooth/BluetoothSocket.java
Repository: Genymobile/f2ut_platform_frameworks_base
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-9908 | LOW | 3.3 | Genymobile/f2ut_platform_frameworks_base | close | core/java/android/bluetooth/BluetoothSocket.java | f24cec326f5f65c693544fb0b92c37f633bacda2 | 0 |
Analyze the following code function for security vulnerabilities | private Drawable getProfileBadgeDrawable() {
if (mContext.getUserId() == UserHandle.USER_SYSTEM) {
// This user can never be a badged profile,
// and also includes USER_ALL system notifications.
return null;
}
// Note: This assumes that... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileBadgeDrawable
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getProfileBadgeDrawable | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAlive() {
return mNativeContentViewCore != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAlive
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | isAlive | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void refresh(T data) {
Objects.requireNonNull(data,
"DataCommunicator can not refresh null object");
Object id = getDataProvider().getId(data);
// ActiveDataHandler has always the latest data through KeyMapper.
Map<Object, T> activeData = getActiveDataHandler().ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refresh
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | refresh | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void statusBarVisibilityChanged(int visibility) {
if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Caller does not hold permission "
+ androi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: statusBarVisibilityChanged
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | statusBarVisibilityChanged | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | private long insertInternal(ContentValues values, boolean allowReplace) {
// Start a transaction even though we don't really need one.
// This is to help maintain compatibility with applications that
// access InsertHelper from multiple threads even though they never should have.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertInternal
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | insertInternal | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | protected void setGoMaterialVariables(EnvironmentVariableContext environmentVariableContext) {
setVariableWithName(environmentVariableContext, this.getUrlArgument().withoutCredentials(), GO_MATERIAL_URL);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setGoMaterialVariables
File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | setGoMaterialVariables | domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | public int getPackageUid() {
return mPackageUid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageUid
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | getPackageUid | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | private boolean cleanUp(String volumeUuid) {
final File codeFile = new File(Environment.getDataAppDirectory(volumeUuid),
move.dataAppName);
Slog.d(TAG, "Cleaning up " + move.packageName + " on " + volumeUuid);
synchronized (mInstallLock) {
// Clean... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanUp
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | cleanUp | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | protected CompletableFuture<Optional<Integer>> internalGetMaxSubscriptionsPerTopic() {
return getTopicPoliciesAsyncWithRetry(topicName)
.thenApply(op -> op.map(TopicPolicies::getMaxSubscriptionsPerTopic));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGetMaxSubscriptionsPerTopic
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGetMaxSubscriptionsPerTopic | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | private void forceStopPackageLocked(final String packageName, int uid, String reason) {
forceStopPackageLocked(packageName, UserHandle.getAppId(uid), false,
false, true, false, false, UserHandle.getUserId(uid), reason);
Intent intent = new Intent(Intent.ACTION_PACKAGE_RESTARTED,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceStopPackageLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | forceStopPackageLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void sendNetworkChangeBroadcastWithCurrentState() {
// copy into local variables to force lambda to capture by value and not reference, since
// mNetworkAgentState is mutable and can change
final DetailedState networkAgentState = mNetworkAgentState;
if (mVerboseLoggingEnabled) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendNetworkChangeBroadcastWithCurrentState
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | sendNetworkChangeBroadcastWithCurrentState | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public String getWeb()
{
return getSpace();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWeb
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getWeb | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public TailPrettyLoggable<String, LogWatch> sinceSeconds(int sinceSeconds) {
return new PodOperationsImpl(getContext().withSinceSeconds(sinceSeconds));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sinceSeconds
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | sinceSeconds | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | protected SerializableComparator<T> createSortingComparator() {
/*
* thenComparing is defined to return a serializable comparator as long
* as both original comparators are also serializable
*/
BinaryOperator<SerializableComparator<T>> operator = (comparator1,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createSortingComparator
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | createSortingComparator | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public <T> @Nullable T getObject(String columnLabel, Class<T> type) throws SQLException {
return getObject(findColumn(columnLabel), type);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getObject
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getObject | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN)
public boolean resetPassword(String password, int flags) {
throwIfParentInstance("resetPassword");
if (mService != null) {
try {
return mService.resetPassword(password, flags);
} catch... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetPassword
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | resetPassword | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | void enforceMaxActivityShortcuts(int numShortcuts) {
if (numShortcuts > mMaxShortcuts) {
throw new IllegalArgumentException("Max number of dynamic shortcuts exceeded");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceMaxActivityShortcuts
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | enforceMaxActivityShortcuts | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.