instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public void updateImportData(List<IssuesUpdateRequest> issues) {
issues.parallelStream().forEach(issue -> {
updateIssues(issue);
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateImportData
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | updateImportData | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | void startBluetoothDisable() {
mAdapterStateMachine.sendMessage(mAdapterStateMachine.obtainMessage(AdapterState.BEGIN_DISABLE));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startBluetoothDisable
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | startBluetoothDisable | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private void verifyStatesInner() {
synchronized (mLock) {
forEachLoadedUserLocked(u -> u.forAllPackageItems(ShortcutPackageItem::verifyStates));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyStatesInner
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | verifyStatesInner | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | protected Set<Entry<String, Object>> entrySet() {
return this.map.entrySet();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: entrySet
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | entrySet | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Class<?> loadClass(String name, boolean resolve) throws ClassNotFoundException {
Class<?> loadedClass = findLoadedClass(name);
if (null == loadedClass) {
try {
loadedClass = findClass(name);
} catch (ClassNotFoundException ex) {
loadedClass = super.loadClass(name, resolve);
}
... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-41967
- Severity: HIGH
- CVSS Score: 7.5
Description: fix: CVE-2022-41967
Dragonfly v0.3.0-SNAPSHOT fails to properly configure the
DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when
parsing maven-metadata.xml files provided by externa... | [
"CWE-611"
] | CVE-2022-41967 | HIGH | 7.5 | HyperaDev/Dragonfly | loadClass | src/main/java/dev/hypera/dragonfly/loading/DragonflyClassLoader.java | 9661375e1135127ca6cdb5712e978bec33cc06b3 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void cacheShortcuts(int launcherUserId,
@NonNull String callingPackage, @NonNull String packageName,
@NonNull List<String> shortcutIds, int userId, int cacheFlags) {
updateCachedShortcutsInternal(launcherUserId, callingPackage, packageName, shortcutId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cacheShortcuts
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | cacheShortcuts | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onAppFreezeTimeout() {
Slog.w(TAG_WM, "Force clearing freeze: " + this);
stopFreezingScreen(true, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAppFreezeTimeout
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | onAppFreezeTimeout | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void parseStyleElement(ApplContext ac, Reader reader,
String title, String media,
URL url, int lineno) {
boolean doneref = false;
style.setWarningLevel(ac.getWarningLevel());
if (Util.onDebug) {
System.err.pri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseStyleElement
File: org/w3c/css/css/StyleSheetParser.java
Repository: w3c/css-validator
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-4070 | LOW | 3.5 | w3c/css-validator | parseStyleElement | org/w3c/css/css/StyleSheetParser.java | e5c09a9119167d3064db786d5f00d730b584a53b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent) {
if (!mPhone.mIsTheCurrentActivePhone) {
Rlog.e(LOG_TAG, "Received Intent " + intent +
" while being destroyed. Ignoring.");
return;
}
if (intent.getActio... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | onReceive | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | public void initListenUtil() {
listenUtilButton.addActionListener(e -> {
String t;
if (LANG == CHINESE) {
t = "监听端口工具";
} else {
t = "Listener";
}
JFrame frame = new JFrame(t);
frame.setContentPane(new Listen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initListenUtil
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | initListenUtil | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 0 |
Analyze the following code function for security vulnerabilities | public String generateNewEmailValidationTok() {
emailValidationTok = new Token(TokenType.EMAIL_VERIF, 1);
emailValidated = false;
save();
return emailValidationTok.token;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateNewEmailValidationTok
File: src/gribbit/auth/User.java
Repository: lukehutch/gribbit
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2014-125071 | MEDIUM | 5.2 | lukehutch/gribbit | generateNewEmailValidationTok | src/gribbit/auth/User.java | 620418df247aebda3dd4be1dda10fe229ea505dd | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
protected final B self() {
return (B) this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: self
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | self | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | public static @NonNull ActivityOptions makeCustomAnimation(@NonNull Context context,
int enterResId, int exitResId, int backgroundColor) {
return makeCustomAnimation(context, enterResId, exitResId, backgroundColor, null, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeCustomAnimation
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | makeCustomAnimation | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public String getRenderedContent(String text, String syntaxId, XWikiContext context)
{
return getRenderedContent(text, syntaxId, getOutputSyntax().toIdString(), context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRenderedContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder decorator(
Route route, Function<? super HttpService, ? extends HttpService> decorator) {
virtualHostTemplate.decorator(route, decorator);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decorator
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | decorator | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
doPost(request, response);
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2014-125075
- Severity: MEDIUM
- CVSS Score: 5.2
Description: Added validation for contact adding and changed use of prepared statements to avoid SQL injection.
Function: doGet
File: src/Error.java
Repository: ChrisMcMStone/gmail-servlet
Fixed Code:
protected vo... | [
"CWE-89"
] | CVE-2014-125075 | MEDIUM | 5.2 | ChrisMcMStone/gmail-servlet | doGet | src/Error.java | 5d72753c2e95bb373aa86824939397dc25f679ea | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void onAccessibilityStateChanged(boolean enabled) {
setAccessibilityState(enabled);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAccessibilityStateChanged
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | onAccessibilityStateChanged | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | void enforcePermissionCapLocked(PermissionInfo info, BasePermission tree) {
// We calculate the max size of permissions defined by this uid and throw
// if that plus the size of 'info' would exceed our stated maximum.
if (tree.uid != Process.SYSTEM_UID) {
final int curTreeSize = calc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforcePermissionCapLocked
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | enforcePermissionCapLocked | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return myHashMap.hashCode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | hashCode | src/main/java/org/codehaus/jettison/json/JSONObject.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public String getCheckUrl(String fieldName) {
String method = checkMethods.get(fieldName);
if(method==null) {
method = calcCheckUrl(fieldName);
checkMethods.put(fieldName,method);
}
if (method.equals(NONE)) // == would do, but it makes IDE flag a warning
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCheckUrl
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getCheckUrl | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isSettingRestrictedForUser(String name, int userId,
String value, int callerUid) {
final long oldId = Binder.clearCallingIdentity();
try {
return (name != null
&& mUserManager.isSettingRestrictedForUser(name, userId, value, callerUid));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSettingRestrictedForUser
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | isSettingRestrictedForUser | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Produces(MediaType.APPLICATION_JSON)
@RequestMapping(value = "/api/v1/forms/migrate/preview", method = RequestMethod.POST)
public @ResponseBody ReportLog runPreview(HttpServletRequest request, HttpServletResponse response) throws Exception {
TransferObject transferObject = getUIComponents(request);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runPreview
File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | runPreview | web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void selectStream(TestContext context) {
createNumbers(context, 15, 16, 17)
.selectStream("SELECT i FROM numbers WHERE i IN (15, 17, 19) ORDER BY i", context.asyncAssertSuccess(select -> {
intsAsString(select, context.asyncAssertSuccess(string -> {
context.assertEquals("15, 17", str... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selectStream
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | selectStream | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private Class<? extends JiffleRuntime> getRuntimeBaseClass(RuntimeModel model) {
Class<? extends JiffleRuntime> baseClass = null;
switch (model) {
case DIRECT:
baseClass = it.geosolutions.jaiext.jiffle.JiffleProperties.DEFAULT_DIRECT_BASE_CLASS;
break;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRuntimeBaseClass
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | getRuntimeBaseClass | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | public PicketLinkType getConfiguration() {
return this.picketLinkConfiguration;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfiguration
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding prac... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | getConfiguration | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | public boolean isCurrentLocalUserPage(XWikiContext context)
{
final DocumentReference userRef = context.getUserReference();
return userRef != null && userRef.equals(this.getDocumentReference());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCurrentLocalUserPage
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | isCurrentLocalUserPage | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setupClientDefaults(ClientRepresentation clientRep, ClientModel newClient) {
SamlRepresentationAttributes rep = new SamlRepresentationAttributes(clientRep.getAttributes());
SamlClient client = new SamlClient(newClient);
if (clientRep.isStandardFlowEnabled() == null) new... | Vulnerability Classification:
- CWE: CWE-287
- CVE: CVE-2021-3827
- Severity: MEDIUM
- CVSS Score: 6.8
Description: KEYCLOAK-19177 Disable ECP flow by default for all Saml clients; ecp flow creates only transient users sessions
Function: setupClientDefaults
File: services/src/main/java/org/keycloak/protocol/saml/Saml... | [
"CWE-287"
] | CVE-2021-3827 | MEDIUM | 6.8 | keycloak | setupClientDefaults | services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java | 44000caaf5051d7f218d1ad79573bd3d175cad0d | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void removeUser(int userId) {
synchronized (mGlobalLock) {
mRootWindowContainer.removeUser(userId);
mPackageConfigPersister.removeUser(userId);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUser
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | removeUser | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | protected final String getProxyCallbackUrl() {
return this.proxyCallbackUrl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProxyCallbackUrl
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | getProxyCallbackUrl | cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | X509Certificate getUserCertificate() {
return mUserCert;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserCertificate
File: src/com/android/certinstaller/CredentialHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2422 | HIGH | 9.3 | android | getUserCertificate | src/com/android/certinstaller/CredentialHelper.java | 70dde9870e9450e10418a32206ac1bb30f036b2c | 0 |
Analyze the following code function for security vulnerabilities | boolean isDockedResizing() {
return (mDragResizing && getResizeMode() == DRAG_RESIZE_MODE_DOCKED_DIVIDER)
|| (isChildWindow() && getParentWindow().isDockedResizing());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDockedResizing
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isDockedResizing | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected List<String> getTablesToDropConstraints() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTablesToDropConstraints
File: dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-17542 | LOW | 3.5 | dotCMS/core | getTablesToDropConstraints | dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java | 782c342b660d359a71e190c8b5110bc651736591 | 0 |
Analyze the following code function for security vulnerabilities | void removePackageLI(PackageSetting ps, boolean chatty) {
if (DEBUG_INSTALL) {
if (chatty)
Log.d(TAG, "Removing package " + ps.name);
}
// writer
synchronized (mPackages) {
mPackages.remove(ps.name);
final PackageParser.Package pkg = p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removePackageLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | removePackageLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getApplicationProtocol() {
synchronized (OpenSslEngine.this) {
return applicationProtocol;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationProtocol
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | getApplicationProtocol | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | protected void populateMap(HierarchicalStreamReader reader, UnmarshallingContext context,
Map map, Map target) {
SingleValueConverter keyConverter = null;
SingleValueConverter valueConverter = null;
if (keyAsAttribute) {
keyConverter = getSingleValueConverter(keyType, "key");... | Vulnerability Classification:
- CWE: CWE-400
- CVE: CVE-2021-43859
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Describe and fix CVE-2021-43859.
Function: populateMap
File: xstream/src/java/com/thoughtworks/xstream/converters/extended/NamedMapConverter.java
Repository: x-stream/xstream
Fixed Code:
protected voi... | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | populateMap | xstream/src/java/com/thoughtworks/xstream/converters/extended/NamedMapConverter.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 1 |
Analyze the following code function for security vulnerabilities | SipProfile getProfile() {
return mProfile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfile
File: sip/src/com/android/services/telephony/sip/SipAccountRegistry.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | getProfile | sip/src/com/android/services/telephony/sip/SipAccountRegistry.java | a294ae5342410431a568126183efe86261668b5d | 0 |
Analyze the following code function for security vulnerabilities | private ByteBuffer loadFileFromZip(
final File zip,
final File file
) {
if (zip.exists()) {
try {
return ZipFileSystemUtil
.loadBinaryFileFromZip(zip, file)
.getValue();
}
catc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadFileFromZip
File: src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java
Repository: jlangch/venice
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-36007 | LOW | 3.3 | jlangch/venice | loadFileFromZip | src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java | c942c73136333bc493050910f171a48e6f575b23 | 0 |
Analyze the following code function for security vulnerabilities | int indexOfKey(int key) {
return mPidMap.indexOfKey(key);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: indexOfKey
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | indexOfKey | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public String show(Request req, Response res) throws IOException {
BackupConfig backupConfig = doFetchEntityFromConfig();
if (backupConfig == null) {
backupConfig = new BackupConfig();
}
return writerForTopLevelObject(req, res, jsonWriter(backupConfig));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: show
File: api/api-backup-config-v1/src/main/java/com/thoughtworks/go/apiv1/backupconfig/BackupConfigControllerV1.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25924 | HIGH | 9.3 | gocd | show | api/api-backup-config-v1/src/main/java/com/thoughtworks/go/apiv1/backupconfig/BackupConfigControllerV1.java | 7d0baab0d361c377af84994f95ba76c280048548 | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public void setResourceResolutionLoggingEnabled(boolean enabled) {
synchronized (this) {
ensureValidLocked();
nativeSetResourceResolutionLoggingEnabled(mObject, enabled);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResourceResolutionLoggingEnabled
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | setResourceResolutionLoggingEnabled | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | private int calculateHints() {
int hints = 0;
for (int i = mListenersDisablingEffects.size() - 1; i >= 0; --i) {
int hint = mListenersDisablingEffects.keyAt(i);
ArraySet<ManagedServiceInfo> serviceInfoList = mListenersDisablingEffects.valueAt(i);
if (!serviceInfoList... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: calculateHints
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | calculateHints | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Deprecated
public boolean isPermissionEnforced(String permission) {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPermissionEnforced
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isPermissionEnforced | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private String getCanonicalDocumentName(String documentName)
{
@SuppressWarnings("unchecked")
EntityReferenceResolver<String> resolver = Utils.getComponent(EntityReferenceResolver.TYPE_STRING, "current");
@SuppressWarnings("unchecked")
EntityReferenceSerializer<String> serializer = U... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-29206
- Severity: MEDIUM
- CVSS Score: 5.4
Description: XWIKI-9119: Refactoring of SkinExtensionPlugin
* Provide some tests
Function: getCanonicalDocumentName
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xw... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | getCanonicalDocumentName | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isNativePlayerMode() {
return nativePlayer;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNativePlayerMode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isNativePlayerMode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private OldRendering getOldRendering()
{
if (this.oldRenderingProvider == null) {
this.oldRenderingProvider = Utils.getComponent(OldRendering.TYPE_PROVIDER);
}
return this.oldRenderingProvider.get();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOldRendering
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getOldRendering | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public static Collection<LogMessage> parseLog(File flog, int begin, int end, String str) throws IOException {
// log.debug("parseLog({}, {}, {}, {})", new Object[] { flog, begin, end, str });
ArrayList<LogMessage> al = new ArrayList<LogMessage>();
int i = 0;
if (begin < 0 || end < 0) {
int maxLines = 0;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseLog
File: src/main/java/com/openkm/util/FormatUtil.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-40317 | MEDIUM | 5.4 | openkm/document-management-system | parseLog | src/main/java/com/openkm/util/FormatUtil.java | 870d518f7de349c3fa4c7b9883789fdca4590c4e | 0 |
Analyze the following code function for security vulnerabilities | public void enableHostnameVerification() {
enableHostnameVerificationForNio();
enableHostnameVerificationForBlockingIo();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enableHostnameVerification
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | enableHostnameVerification | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void configure(String folder) {
Assert.notNull(folder, "'folder' must not be null");
if (!staticResourcesSet) {
try {
ClassPathResource resource = new ClassPathResource(folder);
if (configureJarCase(folder, resource)) {
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2016-9177
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix for #700 - Arbitrary File Read Vulnerability
Function: configure
File: src/main/java/spark/staticfiles/StaticFilesConfiguration.java
Repository: perwendel/spark
Fixed Code:
public synchronized void ... | [
"CWE-22"
] | CVE-2016-9177 | MEDIUM | 5 | perwendel/spark | configure | src/main/java/spark/staticfiles/StaticFilesConfiguration.java | 26b57d0596ee73c14c558463943ef0857e53b91f | 1 |
Analyze the following code function for security vulnerabilities | public void setContainerDataSource(Container.Indexed container) {
defaultContainer = false;
internalSetContainerDataSource(container);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContainerDataSource
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setContainerDataSource | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private PendingIntent createPendingIntent(@NonNull Intent intent, @NonNull Notification notification, @NonNull User user) {
intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
return PendingIntent.getActivity(context, notification.getNotificationId(),
putExtrasToInte... | Vulnerability Classification:
- CWE: CWE-732
- CVE: CVE-2022-24886
- Severity: LOW
- CVSS Score: 2.1
Description: Make more PendingIntents immutable
This should be all of them. Picked up by lint.
Signed-off-by: Álvaro Brey Vilas <alvaro.brey@nextcloud.com>
Function: createPendingIntent
File: src/main/java/com/nextc... | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | createPendingIntent | src/main/java/com/nextcloud/client/integrations/deck/DeckApiImpl.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 1 |
Analyze the following code function for security vulnerabilities | private static String getKeyNameFromMethod(Method method) {
final int ignoreDepth = getAnnotationDepth(method, JSONPropertyIgnore.class);
if (ignoreDepth > 0) {
final int forcedNameDepth = getAnnotationDepth(method, JSONPropertyName.class);
if (forcedNameDepth < 0 || ignoreDepth ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getKeyNameFromMethod
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | getKeyNameFromMethod | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | @Override public int read(byte[] buffer, int byteOffset, int byteCount) throws IOException {
Arrays.checkOffsetAndCount(buffer.length, byteOffset, byteCount);
if (byteCount == 0) {
return 0;
}
checkReadPrimitiveTypes();
return primitiveData.read(buffer, byteOffset, by... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: luni/src/main/java/java/io/ObjectInputStream.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | read | luni/src/main/java/java/io/ObjectInputStream.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public void initTargetUrlConfig() {
urlButton.addActionListener(e -> {
urlFileField.setText(null);
rawFileField.setText(null);
String url = urlField.getText();
logger.info(String.format("target url: %s", url));
xrayCmd.setInputPrefix("--url");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initTargetUrlConfig
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | initTargetUrlConfig | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onMenuItemActionExpand(MenuItem item) {
mSearchEditText.post(() -> {
updateSearchViewHint();
mSearchEditText.requestFocus();
if (oneShotKeyboardSuppress.compareAndSet(true, false)) {
return;
}
InputMethodManager imm = (InputMethodManager) getSystemService(Context.I... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onMenuItemActionExpand
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onMenuItemActionExpand | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void copyTransform(Object src, Object dest) {
CN1Matrix4f t1 = (CN1Matrix4f) src;
CN1Matrix4f t2 = (CN1Matrix4f) dest;
t2.setData(t1.getData());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyTransform
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | copyTransform | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | boolean factoryReset() {
enforceCallingOrSelfPermission(BLUETOOTH_PRIVILEGED, "Need BLUETOOTH permission");
return factoryResetNative();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: factoryReset
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | factoryReset | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onStart() {
publishBinderService(Context.ACTIVITY_TASK_SERVICE, mService);
mService.start();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStart
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | onStart | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("/services/public/category/{store}/{language}")
@ResponseBody
public List<ReadableCategory> getCategories(@PathVariable final String language, @PathVariable final String store, Model model, HttpServletRequest request, HttpServletResponse response) throws Exception {
Map<String,Language> langs = l... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCategories
File: sm-shop/src/main/java/com/salesmanager/shop/store/controller/category/ShoppingCategoryController.java
Repository: shopizer-ecommerce/shopizer
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-33561 | LOW | 3.5 | shopizer-ecommerce/shopizer | getCategories | sm-shop/src/main/java/com/salesmanager/shop/store/controller/category/ShoppingCategoryController.java | 197f8c78c8f673b957e41ca2c823afc654c19271 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAffiliatedUser() {
throwIfParentInstance("isAffiliatedUser");
try {
return mService.isCallingUserAffiliated();
} catch (RemoteException e) {
throw e.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAffiliatedUser
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isAffiliatedUser | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void stopDozing() {
if (mDozingRequested) {
mDozingRequested = false;
DozeLog.traceDozing(mContext, mDozing);
updateDozing();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopDozing
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | stopDozing | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public final Object readObject() throws OptionalDataException,
ClassNotFoundException, IOException {
return readObject(false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readObject
File: luni/src/main/java/java/io/ObjectInputStream.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | readObject | luni/src/main/java/java/io/ObjectInputStream.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> setCount(boolean count) {
this.count = count;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCount
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | setCount | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | private ProcessRecord findAppProcess(IBinder app, String reason) {
if (app == null) {
return null;
}
synchronized (mProcLock) {
return mProcessList.findAppProcessLOSP(app, reason);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findAppProcess
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | findAppProcess | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onChosenLockSaveFinished(boolean wasSecureBefore, Intent resultData) {
getActivity().setResult(RESULT_FINISHED, resultData);
if (mChosenPassword != null) {
mChosenPassword.zeroize();
}
if (mCurrentCredential != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onChosenLockSaveFinished
File: src/com/android/settings/password/ChooseLockPassword.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | onChosenLockSaveFinished | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | private final int _nextChunkedByte() throws IOException {
int inPtr = _inputPtr;
// NOTE: _chunkEnd less than or equal to _inputEnd
if (inPtr >= _chunkEnd) {
return _nextChunkedByte2();
}
int ch = _inputBuffer[inPtr];
_inputPtr = inPtr+1;
retu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _nextChunkedByte
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _nextChunkedByte | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setSubText(CharSequence text) {
mN.extras.putCharSequence(EXTRA_SUB_TEXT, safeCharSequence(text));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSubText
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setSubText | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private static ArrayList<ComponentName> readLastDonePreBootReceivers() {
ArrayList<ComponentName> lastDoneReceivers = new ArrayList<ComponentName>();
File file = getCalledPreBootReceiversFile();
FileInputStream fis = null;
try {
fis = new FileInputStream(file);
Da... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readLastDonePreBootReceivers
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | readLastDonePreBootReceivers | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public Registration addSessionDestroyListener(
SessionDestroyListener listener) {
return Registration.addAndRemove(sessionDestroyListeners, listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addSessionDestroyListener
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | addSessionDestroyListener | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ParceledListSlice<ActivityManager.RecentTaskInfo> getRecentTasks(int maxNum, int flags,
int userId) {
return mActivityTaskManager.getRecentTasks(maxNum, flags, userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRecentTasks
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getRecentTasks | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | protected long getMaxBinaryBufferSize() {
return session.getMaxBinaryMessageBufferSize();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxBinaryBufferSize
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | getMaxBinaryBufferSize | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | public Page<Object[]> processList(Page<Object[]> page, String category) {
/*
* 保存两个对象,一个是ProcessDefinition(流程定义),一个是Deployment(流程部署)
*/
ProcessDefinitionQuery processDefinitionQuery = repositoryService.createProcessDefinitionQuery()
.latestVersion().active().orderByProcessDefinitionKey().asc();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processList
File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
Repository: thinkgem/jeesite
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-34601 | CRITICAL | 9.8 | thinkgem/jeesite | processList | src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java | 30750011b49f7c8d45d0f3ab13ed3a1a422655bb | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
Point getMinDimensions() {
final ActivityInfo.WindowLayout windowLayout = info.windowLayout;
if (windowLayout == null) {
return null;
}
return new Point(windowLayout.minWidth, windowLayout.minHeight);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMinDimensions
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getMinDimensions | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, String> getMap(String key)
{
List<String> list = getProperty(key, List.class);
Map<String, String> mapping;
if (list != null && !list.isEmpty()) {
mapping = new HashMap<>(list.size());
for (String listItem : list) {
int index = li... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMap
File: oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java
Repository: xwiki-contrib/oidc
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39387 | HIGH | 7.5 | xwiki-contrib/oidc | getMap | oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java | 0247af1417925b9734ab106ad7cd934ee870ac89 | 0 |
Analyze the following code function for security vulnerabilities | public void setAttributeList(AttributeList list) {
attributes.clear();
for (Attribute attribute : list.attrs) {
attributes.put(attribute.name, attribute.value);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAttributeList
File: base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setAttributeList | base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public String getDefaultCustomFields(String projectId) {
IssueTemplateDao template = trackIssueTemplateService.getTemplate(projectId);
List<CustomFieldDao> customFields = trackCustomFieldTemplateService.getCustomFieldByTemplateId(template.getId());
return getCustomFieldsValuesString(customFields... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultCustomFields
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getDefaultCustomFields | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void updateInt(String columnName, int x) throws SQLException {
updateInt(findColumn(columnName), x);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateInt
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateInt | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | protected void copyAttrsFromParentChannel(Channel parent, Channel child)
{
AttributeKey[] attributesToCopy = {
SourceAddressChannelHandler.ATTR_LOCAL_ADDRESS,
SourceAddressChannelHandler.ATTR_LOCAL_INET_ADDR,
SourceAddressChannelHandler.ATTR_SOURCE_ADDRESS,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyAttrsFromParentChannel
File: zuul-core/src/main/java/com/netflix/zuul/netty/server/http2/Http2StreamInitializer.java
Repository: Netflix/zuul
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-21295 | LOW | 2.6 | Netflix/zuul | copyAttrsFromParentChannel | zuul-core/src/main/java/com/netflix/zuul/netty/server/http2/Http2StreamInitializer.java | 033d3c2de354e249f6d775bde8b67b0997888958 | 0 |
Analyze the following code function for security vulnerabilities | public void rOpen() throws SQLException {
db = dbHelper.getReadableDatabase();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rOpen
File: app/src/main/java/com/dimtion/shaarlier/TagsSource.java
Repository: dimtion/Shaarlier
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2015-10076 | MEDIUM | 5.2 | dimtion/Shaarlier | rOpen | app/src/main/java/com/dimtion/shaarlier/TagsSource.java | 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e | 0 |
Analyze the following code function for security vulnerabilities | public boolean isKeyPairGrantedToWifiAuth(@NonNull String alias) {
throwIfParentInstance("isKeyPairGrantedToWifiAuth");
try {
return mService.isKeyPairGrantedToWifiAuth(mContext.getPackageName(), alias);
} catch (RemoteException e) {
e.rethrowFromSystemServer();
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyPairGrantedToWifiAuth
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isKeyPairGrantedToWifiAuth | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private Job startCreateJob(EntityReference entityReference, EditForm editForm) throws XWikiException
{
if (StringUtils.isBlank(editForm.getTemplate())) {
// No template specified, nothing more to do.
return null;
}
// If a template is set in the request, then this is... | Vulnerability Classification:
- CWE: CWE-862
- CVE: CVE-2022-23617
- Severity: MEDIUM
- CVSS Score: 4.0
Description: XWIKI-18430: Page content is revealed to users that don't have rights if used as a template for the creation of another page
Function: startCreateJob
File: xwiki-platform-core/xwiki-platform-oldcore/sr... | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | startCreateJob | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java | 30c52b01559b8ef5ed1035dac7c34aaf805764d5 | 1 |
Analyze the following code function for security vulnerabilities | protected void receiveDirect(Message message) {
if (_logger.isDebugEnabled()) {
_logger.debug("Received direct message {}", message);
}
Map<String, Object> data = message.getDataAsMap();
Boolean presence = (Boolean)data.get(SetiPresence.PRESENCE_FIELD);
if (presence !... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: receiveDirect
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | receiveDirect | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onPolicyChanged() {
if (mNetworkAgent == null) {
return;
}
// Update the NetworkAgent's NetworkCapabilities which will merge the current
// capabilities with VcnManagementService's underlying Network policy.
Log.i(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPolicyChanged
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | onPolicyChanged | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private void dumpSettings(Cursor cursor, PrintWriter pw) {
if (cursor == null || !cursor.moveToFirst()) {
return;
}
final int idColumnIdx = cursor.getColumnIndex(Settings.NameValueTable._ID);
final int nameColumnIdx = cursor.getColumnIndex(Settings.NameValueTable.NAME);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpSettings
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | dumpSettings | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private int displayPackageFilePath(String pckg) {
try {
PackageInfo info = mPm.getPackageInfo(pckg, 0, 0);
if (info != null && info.applicationInfo != null) {
System.out.print("package:");
System.out.println(info.applicationInfo.sourceDir);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayPackageFilePath
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | displayPackageFilePath | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | private String fixIncorrectWebjarPath(String requestFilename) {
return INCORRECT_WEBJAR_PATH_REGEX.matcher(requestFilename)
.replaceAll("/webjars/");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fixIncorrectWebjarPath
File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | fixIncorrectWebjarPath | flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
static Intent updateActionIntent(Account account, Uri messageUri, int action, Intent intent) {
intent.putExtra(EXTRA_FROM_EMAIL_TASK, true);
intent.putExtra(EXTRA_ACTION, action);
intent.putExtra(Utils.EXTRA_ACCOUNT, account);
intent.putExtra(EXTRA_IN_REFERENCE_TO_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateActionIntent
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | updateActionIntent | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public <E> List<E> getListeners(Class<E> handler) {
List<E> registeredListeners = (List<E>) listeners
.computeIfAbsent(handler, key -> new ArrayList<>());
return Collections
.unmodifiableList(new ArrayList<>(registeredListeners));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getListeners
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getListeners | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void endProcessing() {
try {
super.endProcessing();
} catch (final LoggedException e) {
throw e;
} catch (final Throwable e) {
throw ProcessException.wrap(e);
} finally {
// Return the parser factory to the pool if we h... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endProcessing
File: stroom-pipeline/src/main/java/stroom/pipeline/server/parser/XMLFragmentParser.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | endProcessing | stroom-pipeline/src/main/java/stroom/pipeline/server/parser/XMLFragmentParser.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | private void cleanupDisabledPackageTasksLocked(String packageName, Set<String> filterByClasses,
int userId) {
for (int i = mRecentTasks.size() - 1; i >= 0; i--) {
TaskRecord tr = mRecentTasks.get(i);
if (userId != UserHandle.USER_ALL && tr.userId != userId) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanupDisabledPackageTasksLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | cleanupDisabledPackageTasksLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setInputFilter(IInputFilter filter) {
mInputManager.setInputFilter(filter);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setInputFilter
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setInputFilter | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | void enforceNotIsolatedOrSdkSandboxCaller(String caller) {
enforceNotIsolatedCaller(caller);
if (Process.isSdkSandboxUid(Binder.getCallingUid())) {
throw new SecurityException("SDK sandbox process not allowed to call " + caller);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceNotIsolatedOrSdkSandboxCaller
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | enforceNotIsolatedOrSdkSandboxCaller | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static void jsFunction_addAccessAllowDomains(Context cx, Scriptable thisObj,
Object[] args, Function funObj) throws APIManagementException {
String oAuthConsumerKey = args[0].toString();
NativeArray accessAllowDomainsArr = (NativeArray) args... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_addAccessAllowDomains
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secu... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_addAccessAllowDomains | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | static void escapeJson(final String s, final StringBuilder buf) {
final int length = s.length();
int extra = 0;
// First count how many extra chars we'll need, if any.
for (int i = 0; i < length; i++) {
final char c = s.charAt(i);
switch (c) {
case '"':
case '\\':
cas... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escapeJson
File: src/tsd/HttpQuery.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | escapeJson | src/tsd/HttpQuery.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | public String getPackageAuthor()
{
return this.packageAuthor;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageAuthor
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | getPackageAuthor | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | private static final native long nativeGetStringBlock(long obj); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeGetStringBlock
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeGetStringBlock | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public static long executeInsert(@NonNull SQLiteDatabase db, @NonNull String sql,
@Nullable Object[] bindArgs) throws SQLException {
Trace.beginSection("executeInsert");
try (SQLiteStatement st = db.compileStatement(sql)) {
bindArgs(st, bindArgs);
return st.executeIns... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeInsert
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | executeInsert | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | private String getArrayName(final List<Element> prevElements, int args) throws Exception
{
ArrayList<Element> elements = new ArrayList<>(prevElements.size());
elements.addAll(prevElements);
if (args > 1)
{
final StringWriter writer = new StringWriter();
final... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getArrayName
File: app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java
Repository: mkulesh/microMathematics
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000821 | HIGH | 7.5 | mkulesh/microMathematics | getArrayName | app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java | 5c05ac8de16c569ff0a1816f20be235090d3dd9d | 0 |
Analyze the following code function for security vulnerabilities | private Syntax getOutputSyntax()
{
return getRenderingContext().getTargetSyntax();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOutputSyntax
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getOutputSyntax | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void shutDown() throws Exception {
eventBus.unregister(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shutDown
File: graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | shutDown | graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | public DocumentReference getCreatorReference()
{
return this.doc.getCreatorReference();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCreatorReference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getCreatorReference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.