instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public short getShort(@Positive int columnIndex) throws SQLException {
connection.getLogger().log(Level.FINEST, " getShort columnIndex: {0}", columnIndex);
byte[] value = getRawValue(columnIndex);
if (value == null) {
return 0; // SQL NULL
}
if (isBinary(columnIndex)) {
int... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShort
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getShort | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | void grantUriPermissionUncheckedLocked(int targetUid, String targetPkg, GrantUri grantUri,
final int modeFlags, UriPermissionOwner owner) {
if (!Intent.isAccessUriMode(modeFlags)) {
return;
}
// So here we are: the caller has the assumed permission
// to the uri,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantUriPermissionUncheckedLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | grantUriPermissionUncheckedLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@Nullable
public String getApplicationRestrictionsManagingPackage(
@NonNull ComponentName admin) {
throwIfParentInstance("getApplicationRestrictionsManagingPackage");
if (mService != null) {
try {
return mService.getApplicationRestrictionsManag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationRestrictionsManagingPackage
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getApplicationRestrictionsManagingPackage | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected PostMethod executePost(String uri, InputStream content, String mediaType, int... expectedCodes)
throws Exception
{
return executePost(uri, content, mediaType, true, expectedCodes);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executePost
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | executePost | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public String getFullPathName() {
if (file != null) {
return file.getAbsolutePath();
}
return "";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFullPathName
File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
Repository: umlet
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | getFullPathName | umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 0 |
Analyze the following code function for security vulnerabilities | protected File doPostResumable(HttpServletRequest request)
throws FileSizeLimitExceededException, IOException, ServletException
{
File completedFile = null;
FileUploadRequest wrapper = null;
if (ConfigurationManager.getProperty("upload.temp.dir") != null)
{
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doPostResumable
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31194 | HIGH | 7.2 | DSpace | doPostResumable | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java | d1dd7d23329ef055069759df15cfa200c8e3 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Object> toMap() {
Map<String, Object> results = new HashMap<String, Object>();
for (Entry<String, Object> entry : this.entrySet()) {
Object value;
if (entry.getValue() == null || NULL.equals(entry.getValue())) {
value = null;
} else ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toMap
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | toMap | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | protected synchronized TransportConnectionState lookupConnectionState(ConsumerId id) {
return connectionStateRegister.lookupConnectionState(id);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lookupConnectionState
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | lookupConnectionState | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | private CompletableFuture<Void> updatePartitionInOtherCluster(int numPartitions, Set<String> clusters) {
List<CompletableFuture<Void>> results = new ArrayList<>(clusters.size() - 1);
clusters.forEach(cluster -> {
if (cluster.equals(pulsar().getConfig().getClusterName())) {
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePartitionInOtherCluster
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | updatePartitionInOtherCluster | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public static void loadModelToDocument(Configuration c) throws Exception {
if (!c.isFromFile()) {
String newOntologyPath = c.getTmpFile().getAbsolutePath() + File.separator + "Ontology";
downloadOntology(c.getOntologyURI(), newOntologyPath);
c.setFromFile(true);
c.setOntologyPath(newOntologyPath);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadModelToDocument
File: src/main/java/widoco/WidocoUtils.java
Repository: dgarijo/Widoco
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4772 | HIGH | 7.8 | dgarijo/Widoco | loadModelToDocument | src/main/java/widoco/WidocoUtils.java | f2279b76827f32190adfa9bd5229b7d5a147fa92 | 0 |
Analyze the following code function for security vulnerabilities | protected void notifyHeadsUpScreenOff() {
maybeEscalateHeadsUp();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyHeadsUpScreenOff
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | notifyHeadsUpScreenOff | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasWebComponentConfigurations() {
WebComponentConfigurationRegistry registry = WebComponentConfigurationRegistry
.getInstance(getContext());
return registry.hasConfigurations();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasWebComponentConfigurations
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | hasWebComponentConfigurations | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void error(final int errorCode, Conversation object) {
runOnUiThread(() -> replaceToast(getString(errorCode)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: error
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | error | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public int addWorkUnit(WorkUnit workUnit) {
workUnitList.add(workUnit);
return size();
} | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2021-32634
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Merge pull request from GHSA-m5qf-gfmp-7638
* Remove unsafe serialization from PayloadUtil
* This code will likely be removed wholesale, but this change
should be used as a departure point for futur... | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | addWorkUnit | src/main/java/emissary/pickup/WorkBundle.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 1 |
Analyze the following code function for security vulnerabilities | public String[] getPersonalAppsForSuspension(@UserIdInt int userId) {
return PersonalAppsSuspensionHelper.forUser(mContext, userId)
.getPersonalAppsForSuspension();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPersonalAppsForSuspension
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getPersonalAppsForSuspension | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isWriteable(Class<?> type, Type genericType,
Annotation[] annotations,
MediaType mediaType) {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isWriteable
File: submarine-server/server-core/src/main/java/org/apache/submarine/server/rest/provider/YamlEntityProvider.java
Repository: apache/submarine
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-46302 | CRITICAL | 9.8 | apache/submarine | isWriteable | submarine-server/server-core/src/main/java/org/apache/submarine/server/rest/provider/YamlEntityProvider.java | ed5ad3b824ba388259e0d1ea137d7fca5f0c288e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void removeFileLocal(String name) {
//noinspection ResultOfMethodCallIgnored
new File(generatePath(name)).delete();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeFileLocal
File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java
Repository: iBotPeaches/Apktool
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-21633 | HIGH | 7.8 | iBotPeaches/Apktool | removeFileLocal | brut.j.dir/src/main/java/brut/directory/FileDirectory.java | d348c43b24a9de350ff6e5bd610545a10c1fc712 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onViewStateRestored(@Nullable Bundle savedInstanceState) {
super.onViewStateRestored(savedInstanceState);
fillUI(savedInstanceState == null);
setCarrierCustomizedConfigToUi();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onViewStateRestored
File: src/com/android/settings/network/apn/ApnEditor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40125 | HIGH | 7.8 | android | onViewStateRestored | src/com/android/settings/network/apn/ApnEditor.java | 63d464c3fa5c7b9900448fef3844790756e557eb | 0 |
Analyze the following code function for security vulnerabilities | void updatePreviousProcess(ActivityRecord stoppedActivity) {
if (stoppedActivity.app != null && mTopApp != null
// Don't replace the previous process if the stopped one is the top, e.g. sleeping.
&& stoppedActivity.app != mTopApp
// The stopped activity must have ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePreviousProcess
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | updatePreviousProcess | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | protected void dumpFilterLabel(PrintWriter out, String prefix, Object label, int count) {
PackageParser.Provider provider = (PackageParser.Provider)label;
out.print(prefix); out.print(
Integer.toHexString(System.identityHashCode(provider)));
out.print(' ')... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpFilterLabel
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | dumpFilterLabel | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getVersion() {
return "6.0.0";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersion
File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
Repository: jogetworkflow/jw-community
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4560 | MEDIUM | 6.1 | jogetworkflow/jw-community | getVersion | wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java | ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b | 0 |
Analyze the following code function for security vulnerabilities | protected JsonObject getDataObject(T data) {
JsonObject dataObject = Json.createObject();
for (DataGenerator<T> generator : generators) {
generator.generateData(data, dataObject);
}
return dataObject;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDataObject
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | getDataObject | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | public void cleanupExpiredRecentFailureReasons() {
long timeoutDuration = mContext.getResources().getInteger(
R.integer.config_wifiRecentFailureReasonExpirationMinutes) * 60 * 1000;
for (WifiConfiguration config : getInternalConfiguredNetworks()) {
if (config.recentFailure.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanupExpiredRecentFailureReasons
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | cleanupExpiredRecentFailureReasons | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | byte[] toAmqpByteArray() throws IOException, JMSException {
ByteArrayOutputStream bout = new ByteArrayOutputStream(DEFAULT_MESSAGE_BODY_SIZE);
//invoke write body
this.writeAmqpBody(bout);
//flush and return
bout.flush();
return bout.toByteArray();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toAmqpByteArray
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | toAmqpByteArray | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | public void broadcastAssociatedBssidEvent(String iface, String bssid) {
sendMessage(iface, ASSOCIATED_BSSID_EVENT, 0, 0, bssid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: broadcastAssociatedBssidEvent
File: service/java/com/android/server/wifi/WifiMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | broadcastAssociatedBssidEvent | service/java/com/android/server/wifi/WifiMonitor.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private static void pnCounterXmlGenerator(XmlGenerator gen, Config config) {
for (PNCounterConfig counterConfig : config.getPNCounterConfigs().values()) {
gen.open("pn-counter", "name", counterConfig.getName())
.node("replica-count", counterConfig.getReplicaCount())
.no... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pnCounterXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | pnCounterXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("getLockObject()")
private void updateMaximumTimeToLockLocked(@UserIdInt int userId) {
// Update the profile's timeout
if (isManagedProfile(userId)) {
updateProfileLockTimeoutLocked(userId);
}
mInjector.binderWithCleanCallingIdentity(() -> {
// Upd... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateMaximumTimeToLockLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | updateMaximumTimeToLockLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public boolean copyDocument(String docname, String sourceWiki, String targetWiki, String wikilocale)
throws XWikiException
{
return this.copyDocument(docname, docname, sourceWiki, targetWiki, wikilocale, true, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | copyDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | protected void displayErrorDialog(final int errorCode) {
runOnUiThread(() -> {
Builder builder = new Builder(XmppActivity.this);
builder.setIconAttribute(android.R.attr.alertDialogIcon);
builder.setTitle(getString(R.string.error));
builder.setMessage(errorCode);
builder.setNeutralButton(R.string.accept... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayErrorDialog
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | displayErrorDialog | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | private String getWarNameAndBackup() {
String warName;
String contextPath = JFinal.me().getServletContext().getContextPath();
if ("/".equals(contextPath) || "".equals(contextPath)) {
warName = "/ROOT.war";
} else {
warName = contextPath + ".war";
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWarNameAndBackup
File: web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | getWarNameAndBackup | web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getShortDescription() {
return Messages.CreateJobCommand_ShortDescription();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortDescription
File: core/src/main/java/hudson/cli/CreateJobCommand.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2014-2059 | MEDIUM | 6.5 | jenkinsci/jenkins | getShortDescription | core/src/main/java/hudson/cli/CreateJobCommand.java | ad38d8480f20ce3cbf8fec3e2003bc83efda4f7d | 0 |
Analyze the following code function for security vulnerabilities | private String getOwnerCondition( CurrentUserGroupInfo currentUserGroupInfo )
{
return String.join( " or ",
jsonbFunction( EXTRACT_PATH_TEXT, "owner" ) + " = " + withQuotes( currentUserGroupInfo.getUserUID() ),
jsonbFunction( EXTRACT_PATH_TEXT, "owner" ) + " is null" );
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2022-24848
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Merge pull request from GHSA-52vp-f7hj-cj92
Function: getOwnerCondition
File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/ProgramOrganisationUnitAssociationsQueryBuild... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | getOwnerCondition | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/ProgramOrganisationUnitAssociationsQueryBuilder.java | 3b245d04a58b78f0dc9bae8559f36ee4ca36dfac | 1 |
Analyze the following code function for security vulnerabilities | static int getFreePort() {
try (ServerSocket s = new ServerSocket(0)) {
s.setReuseAddress(true);
return s.getLocalPort();
} catch (IOException e) {
throw new IllegalStateException(
"Unable to find a free port for running webpack", e);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFreePort
File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-172"
] | CVE-2021-33604 | LOW | 1.2 | vaadin/flow | getFreePort | vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java | 2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc | 0 |
Analyze the following code function for security vulnerabilities | public void setResourceRetriever(final ResourceRetriever resourceRetriever) {
this.resourceRetriever = resourceRetriever;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResourceRetriever
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | setResourceRetriever | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public byte[] decrypt(final byte[] input) throws CryptoException, EncodingException
{
final CiphertextHeader header = CiphertextHeader.decode(input);
if (header.getKeyName() == null) {
throw new CryptoException("Ciphertext header does not contain required key");
}
return process(head... | Vulnerability Classification:
- CWE: CWE-770
- CVE: CVE-2020-7226
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Define new ciphertext header format.
New format does not allocate any memory until HMAC check passes, which
guards against untrusted input. All encryption components have been
updated to use the new hea... | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | decrypt | src/main/java/org/cryptacular/bean/AbstractCipherBean.java | 8c6c7528f1e24c6b71f3e36db0cb8a697256ce25 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public AsyncResource<Media> createBackgroundMediaAsync(final String uri) {
final AsyncResource<Media> out = new AsyncResource<Media>();
new Thread(new Runnable() {
public void run() {
try {
out.complete(createBackgroundMedia(uri));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createBackgroundMediaAsync
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | createBackgroundMediaAsync | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | protected void createUserSwitcher() {
mKeyguardUserSwitcher = new KeyguardUserSwitcher(mContext,
(ViewStub) mStatusBarWindow.findViewById(R.id.keyguard_user_switcher),
mKeyguardStatusBar, mNotificationPanel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createUserSwitcher
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | createUserSwitcher | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | protected void sendRawPdu(SmsTracker tracker) {
HashMap map = tracker.mData;
byte pdu[] = (byte[]) map.get("pdu");
if (mSmsSendDisabled) {
Rlog.e(TAG, "Device does not support sending sms.");
tracker.onFailed(mContext, RESULT_ERROR_NO_SERVICE, 0/*errorCode*/);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendRawPdu
File: src/java/com/android/internal/telephony/SMSDispatcher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3858 | HIGH | 9.3 | android | sendRawPdu | src/java/com/android/internal/telephony/SMSDispatcher.java | df31d37d285dde9911b699837c351aed2320b586 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public CallStyle setIsVideo(boolean isVideo) {
mIsVideo = isVideo;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setIsVideo
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setIsVideo | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public AssetHandler maxAge(final Duration maxAge) {
return maxAge(maxAge.getSeconds());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maxAge
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | maxAge | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Policy getNotificationPolicy(String pkg) {
enforcePolicyAccess(pkg, "getNotificationPolicy");
final long identity = Binder.clearCallingIdentity();
try {
return mZenModeHelper.getNotificationPolicy();
} finally {
Bin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNotificationPolicy
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | getNotificationPolicy | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public String getBadges() {
return badges;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBadges
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getBadges | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public boolean isValid() {
return manifestFile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValid
File: src/main/java/org/olat/fileresource/types/ScormCPFileResource.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | isValid | src/main/java/org/olat/fileresource/types/ScormCPFileResource.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isUsbDataSignalingEnabled(String packageName) {
final CallerIdentity caller = getCallerIdentity(packageName);
synchronized (getLockObject()) {
// If the caller is an admin, return the policy set by itself. Otherwise
// return the device-wide policy.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUsbDataSignalingEnabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isUsbDataSignalingEnabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void setPreferenceSummary(ScreenLockType lock, @StringRes int summary) {
Preference preference = findPreference(lock.preferenceKey);
if (preference != null) {
preference.setSummary(summary);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPreferenceSummary
File: src/com/android/settings/password/ChooseLockGeneric.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | setPreferenceSummary | src/com/android/settings/password/ChooseLockGeneric.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean checkType(IInterface service) {
return service instanceof INotificationListener;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkType
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | checkType | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("javadoc")
public int computeHorizontalScrollExtent() {
return mRenderCoordinates.getLastFrameViewportWidthPixInt();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: computeHorizontalScrollExtent
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | computeHorizontalScrollExtent | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void closeClientTwice(TestContext context) {
PostgresClient c = PostgresClient.getInstance(vertx);
context.assertNotNull(c.getClient(), "getClient()");
c.closeClient(context.asyncAssertSuccess());
context.assertNull(c.getClient(), "getClient()");
c.closeClient(context.asyncAssertSucce... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeClientTwice
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | closeClientTwice | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | protected void disassociateConversationContext(HttpServletRequest request) {
try {
httpConversationContext().dissociate(request);
} catch (Exception e) {
ServletLogger.LOG.unableToDissociateContext(httpConversationContext(), request);
ServletLogger.LOG.catchingDebug(e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disassociateConversationContext
File: impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java
Repository: weld/core
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2014-8122 | MEDIUM | 4.3 | weld/core | disassociateConversationContext | impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java | 8e413202fa1af08c09c580f444e4fd16874f9c65 | 0 |
Analyze the following code function for security vulnerabilities | private void handleXmlEvent(Deque<Map<String, Object>> stack, XMLStreamReader reader, boolean simpleMode) throws XMLStreamException {
Map<String, Object> elementMap;
switch (reader.getEventType()) {
case START_DOCUMENT:
case END_DOCUMENT:
// intentionally empty
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleXmlEvent
File: src/main/java/apoc/load/Xml.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000820 | HIGH | 7.5 | neo4j-contrib/neo4j-apoc-procedures | handleXmlEvent | src/main/java/apoc/load/Xml.java | 45bc09c8bd7f17283e2a7e85ce3f02cb4be4fd1a | 0 |
Analyze the following code function for security vulnerabilities | boolean getDrawnStateEvaluated() {
return mDrawnStateEvaluated;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDrawnStateEvaluated
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getDrawnStateEvaluated | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public static String getSubmissionParameters(Context context,
HttpServletRequest request) throws SQLException, ServletException
{
SubmissionInfo si = getSubmissionInfo(context, request);
SubmissionStepConfig step = getCurrentStepConfig(request, si);
String info = "";
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSubmissionParameters
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31194 | HIGH | 7.2 | DSpace | getSubmissionParameters | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java | d1dd7d23329ef055069759df15cfa200c8e3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long longValue() {
return bigDecimalValue().longValue();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: longValue
File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
Repository: eclipse-ee4j/parsson
The code follows secure coding practices. | [
"CWE-834"
] | CVE-2023-4043 | HIGH | 7.5 | eclipse-ee4j/parsson | longValue | impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java | 84764ffbe3d0376da242b27a9a526138d0dfb8e6 | 0 |
Analyze the following code function for security vulnerabilities | public void onStartingToHide() {
if (mCurrentSecurityMode != SecurityMode.None) {
getCurrentSecurityController().onStartingToHide();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStartingToHide
File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21245 | HIGH | 7.8 | android | onStartingToHide | packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java | a33159e8cb297b9eee6fa5c63c0e343d05fad622 | 0 |
Analyze the following code function for security vulnerabilities | public void printStackTraceToStream(Throwable t, Writer o) {
PrintWriter p = new PrintWriter(o);
t.printStackTrace(p);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: printStackTraceToStream
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | printStackTraceToStream | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void updateSingleQuote(TestContext context) {
createFoo(context)
.update(FOO, singleQuotePojo, randomUuid(), context.asyncAssertSuccess());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSingleQuote
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | updateSingleQuote | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void handleLeftButton() {
if (mUiStage.leftMode == LeftButtonMode.Retry) {
if (mChosenPattern != null) {
mChosenPattern.zeroize();
mChosenPattern = null;
}
mLockPatternView.clearPattern();
updateSt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleLeftButton
File: src/com/android/settings/password/ChooseLockPattern.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | handleLeftButton | src/com/android/settings/password/ChooseLockPattern.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DispatcherType getDispatcherType() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDispatcherType
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getDispatcherType | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@RequiresPermission(android.Manifest.permission.MANAGE_USERS)
public boolean isDeviceProvisioned() {
try {
return mService.isDeviceProvisioned();
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDeviceProvisioned
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isDeviceProvisioned | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static ProfileDataInfo fromXML(String xml) throws Exception {
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
DocumentBuilder builder = factory.newDocumentBuilder();
Document document = builder.parse(new InputSource(new StringReader(xml)));
Element profileP... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-2414
- Severity: HIGH
- CVSS Score: 7.5
Description: Disable access to external entities when parsing XML
This reduces the vulnerability of XML parsers to XXE (XML external
entity) injection.
The best way to prevent XXE is to stop using XML altogether, whi... | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | fromXML | base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 1 |
Analyze the following code function for security vulnerabilities | private boolean isReadOnlyLocked() {
return (mConfigurationLocked.openFlags & OPEN_READ_MASK) == OPEN_READONLY;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isReadOnlyLocked
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | isReadOnlyLocked | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | public static WikiManager getInstance() {
return instance;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstance
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | getInstance | src/main/java/org/olat/modules/wiki/WikiManager.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | public String getRealAssetPath(String inode, String fileName, String ext) {
String _inode = inode;
String path = "";
String realPath = Config.getStringProperty("ASSET_REAL_PATH");
if (UtilMethods.isSet(realPath) && !realPath.endsWith(java.io.File.separator))
realPath = realP... | Vulnerability Classification:
- CWE: CWE-434
- CVE: CVE-2017-11466
- Severity: HIGH
- CVSS Score: 9.0
Description: #12131 fixes arbitrary upload
Function: getRealAssetPath
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
Fixed Code:
public String ... | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | getRealAssetPath | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | 208798c6aa9ca70f90740c8a8924e481283109ce | 1 |
Analyze the following code function for security vulnerabilities | boolean super_onKeyUp(int keyCode, KeyEvent event); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: super_onKeyUp
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | super_onKeyUp | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | void handleJavaScriptResult(String jsonResult); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleJavaScriptResult
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | handleJavaScriptResult | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean removeTask(int taskId) {
enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS, "removeTask()");
synchronized (this) {
final long ident = Binder.clearCallingIdentity();
try {
return removeTaskByIdLocked(taskId, true, REMOVE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeTask
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | removeTask | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private List<Identity> getInvalidToAddressesFromTextBoxList() {
List<Identity> invalidTos = new ArrayList<>();
// the toValues are either usernames (from autocompletion, thus OLAT
// users) or email-addresses (external)
if (FolderConfig.getSendDocumentToExtern()) {
for (IdentityWrapper toValue : toValues) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInvalidToAddressesFromTextBoxList
File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | getInvalidToAddressesFromTextBoxList | src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | private boolean _userHasRole(final User user, final String roleid) throws IOException {
if (roleid == null) throw new NullPointerException("roleid is null");
return m_groupManager.userHasRole(user.getUserId(), roleid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _userHasRole
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | _userHasRole | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | public static void initPushContent(String message, String image, String messageType, String category, Context context) {
com.codename1.push.PushContent.reset();
int iMessageType = 1;
try {iMessageType = Integer.parseInt(messageType);}catch(Throwable t){}
String actionId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initPushContent
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | initPushContent | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public int checkPermission(String permission, int pid, int uid)
throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeString(permission);
data.writeInt(pid);
dat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkPermission
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | checkPermission | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private static @ColorInt int flattenAlpha(@ColorInt int color, @ColorInt int background) {
return Color.alpha(color) == 0xff ? color
: ContrastColorUtil.compositeColors(color, background);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flattenAlpha
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | flattenAlpha | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
private void update(int len) throws IOException {
if (memory != null && (memory.getCount() + len > fileThreshold)) {
File temp = File.createTempFile("FileBackedOutputStream", null, parentDirectory);
if (resetOnFinalize) {
// Finalizers are not guaranteed to be called on syst... | Vulnerability Classification:
- CWE: CWE-552
- CVE: CVE-2023-2976
- Severity: HIGH
- CVSS Score: 7.1
Description: Restrict permissions when creating temporary files and directories, or fail if that's not possible.
(Also, check that the provided `fileThreshold` is non-negative.)
- Fixes https://github.com/google/guav... | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | update | android/guava/src/com/google/common/io/FileBackedOutputStream.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 1 |
Analyze the following code function for security vulnerabilities | public void readFromForm(EditForm eform, XWikiContext context) throws XWikiException
{
readDocMetaFromForm(eform, context);
readTranslationMetaFromForm(eform, context);
// We add the new objects that have been submitted in the form, before filling them with their values.
Map<String,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFromForm
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | readFromForm | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private static synchronized void clearAdapterService() {
sAdapterService = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearAdapterService
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | clearAdapterService | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private static void jetConfig(XmlGenerator gen, Config config) {
JetConfig jetConfig = config.getJetConfig();
EdgeConfig edgeConfig = jetConfig.getDefaultEdgeConfig();
gen.open("jet", "enabled", jetConfig.isEnabled(), "resource-upload-enabled", jetConfig.isResourceUploadEnabled())
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jetConfig
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | jetConfig | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | public void goToLockedShade(View expandView) {
int userId = mCurrentUserId;
ExpandableNotificationRow row = null;
if (expandView instanceof ExpandableNotificationRow) {
row = (ExpandableNotificationRow) expandView;
row.setUserExpanded(true /* userExpanded */, true /* allo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: goToLockedShade
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | goToLockedShade | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void clearPackagePersistentPreferredActivities(ComponentName who, String packageName) {
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuthorization(isProfileOwner(caller)
|| ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearPackagePersistentPreferredActivities
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | clearPackagePersistentPreferredActivities | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean supportsVariableSizeKey() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: supportsVariableSizeKey
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | supportsVariableSizeKey | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return "LFolder [base="+getBasefile()+"] ";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | toString | src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java | 336d5ce80681be61a0bbf4f73d2af5d1ff67e93a | 0 |
Analyze the following code function for security vulnerabilities | public Object query(JSONPointer jsonPointer) {
return jsonPointer.queryFrom(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: query
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | query | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | public void sendError(int sc, String msg) throws IOException {
if (isIncluding()) {
Logger.log(Logger.ERROR, Launcher.RESOURCES, "IncludeResponse.Error",
new String[] { "" + sc, msg });
return;
}
Logger.log(Logger.DEBUG, Launcher.RESOURCES,
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2011-4344
- Severity: LOW
- CVSS Score: 2.6
Description: escape error messages which are supposed be plain text and not markup
Function: sendError
File: src/java/winstone/WinstoneResponse.java
Repository: jenkinsci/winstone
Fixed Code:
public void sendError(int ... | [
"CWE-79"
] | CVE-2011-4344 | LOW | 2.6 | jenkinsci/winstone | sendError | src/java/winstone/WinstoneResponse.java | 410ed3001d51c689cf59085b7417466caa2ded7b | 1 |
Analyze the following code function for security vulnerabilities | public StanzaListener getInterceptor() {
return packetInterceptor;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInterceptor
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | getInterceptor | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public LocalDateTime expireAt(String token) {
long time = JWT.decode(token).getExpiresAt().getTime();
return Instant.ofEpochMilli(time)
.atZone(ZoneId.systemDefault())
.toLocalDateTime();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: expireAt
File: core/src/main/java/com/databasir/core/infrastructure/jwt/JwtTokens.java
Repository: vran-dev/databasir
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2022-24861 | MEDIUM | 6.5 | vran-dev/databasir | expireAt | core/src/main/java/com/databasir/core/infrastructure/jwt/JwtTokens.java | ca22a8fef7a31c0235b0b2951260a7819b89993b | 0 |
Analyze the following code function for security vulnerabilities | public String createStaticFile(SysSite site, String fullTemplatePath, String filePath, Integer pageIndex,
Map<String, Object> metadataMap, Map<String, Object> model) throws IOException, TemplateException {
if (CommonUtils.notEmpty(filePath)) {
if (null == model) {
model =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createStaticFile
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2020-20914 | CRITICAL | 9.8 | sanluan/PublicCMS | createStaticFile | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java | bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae | 0 |
Analyze the following code function for security vulnerabilities | public @ColorInt int getBackgroundColor() {
return mBackgroundColor;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBackgroundColor
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getBackgroundColor | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean startHomeOnAllDisplays(int userId, String reason) {
synchronized (mGlobalLock) {
return mRootWindowContainer.startHomeOnAllDisplays(userId, reason);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startHomeOnAllDisplays
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | startHomeOnAllDisplays | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | private static String getFirstValidRedirectUri(Collection<String> validRedirects) {
final String redirectUri = validRedirects.stream().findFirst().orElse(null);
return (redirectUri != null) ? validateRedirectUriWildcard(redirectUri) : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstValidRedirectUri
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | getFirstValidRedirectUri | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 0 |
Analyze the following code function for security vulnerabilities | public static @NonNull ArrayMap<String, Object> getValues(@NonNull ContentValues values) {
final ArrayMap<String, Object> res = new ArrayMap<>();
for (String key : values.keySet()) {
res.put(key, values.get(key));
}
return res;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValues
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | getValues | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void notifyNetworkPolicyRulesUpdated(int uid, long procStateSeq) {
if (DEBUG_NETWORK) {
Slog.d(TAG_NETWORK, "Got update from NPMS for uid: "
+ uid + " seq: " + procStateSeq);
}
UidRecord record;
synchronized... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyNetworkPolicyRulesUpdated
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | notifyNetworkPolicyRulesUpdated | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public RevCommit getCommit() {
if (resolvedRevision != null)
return getProject().getRevCommit(resolvedRevision, true);
else
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCommit
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | getCommit | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | private void pushUserRestrictions(int originatingUserId) {
final Bundle global;
final RestrictionsSet local = new RestrictionsSet();
final boolean isDeviceOwner;
synchronized (getLockObject()) {
isDeviceOwner = mOwners.isDeviceOwnerUserId(originatingUserId);
if (i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pushUserRestrictions
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | pushUserRestrictions | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public Component getActiveModalComponent() {
if (hasModalComponent()) {
return modalComponentStack.peek();
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActiveModalComponent
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getActiveModalComponent | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Editable(order=400, description="Specify login information for docker registries if necessary")
public List<RegistryLogin> getRegistryLogins() {
return registryLogins;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRegistryLogins
File: server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java
Repository: theonedev/onedev
The code follows secure codi... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | getRegistryLogins | server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
UByte getAccessLevel() throws UaException {
Object value = getValue(accessLevelValue);
if (value instanceof UByte) {
return (UByte) value;
} else {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccessLevel
File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java
Repository: eclipse/milo
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2022-25897 | HIGH | 7.5 | eclipse/milo | getAccessLevel | opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java | 4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5 | 0 |
Analyze the following code function for security vulnerabilities | public static String dumpCurrentRowToString(Cursor cursor) {
StringBuilder sb = new StringBuilder();
dumpCurrentRow(cursor, sb);
return sb.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpCurrentRowToString
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | dumpCurrentRowToString | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
final int prime = 31;
int result = super.hashCode();
result = prime * result + ((inputs == null) ? 0 : inputs.hashCode());
result = prime * result + ((outputs == null) ? 0 : outputs.hashCode());
result = prime * result + ((profileId == null) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | hashCode | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | void updateHasAboveClientLocked() {
hasAboveClient = false;
for (int i=connections.size()-1; i>=0; i--) {
ConnectionRecord cr = connections.valueAt(i);
if ((cr.flags&Context.BIND_ABOVE_CLIENT) != 0) {
hasAboveClient = true;
break;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateHasAboveClientLocked
File: services/core/java/com/android/server/am/ProcessRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | updateHasAboveClientLocked | services/core/java/com/android/server/am/ProcessRecord.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setStrings(@NonNull List<DevicePolicyStringResource> strings) {
Preconditions.checkCallAuthorization(hasCallingOrSelfPermission(
android.Manifest.permission.UPDATE_DEVICE_MANAGEMENT_RESOURCES));
Objects.requireNonNull(strings, "strings must be provided.");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStrings
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setStrings | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public boolean switchUser(@NonNull ComponentName admin, @Nullable UserHandle userHandle) {
throwIfParentInstance("switchUser");
try {
return mService.switchUser(admin, userHandle);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchUser
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | switchUser | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String getHelpFile(final String fieldName) {
return getHelpFile(getKlass(),fieldName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHelpFile
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getHelpFile | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.