instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @ManagedAttribute("Whether the binary extension is enabled")
public boolean isBinaryExtensionEnabled() {
return _binaryExtensionEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBinaryExtensionEnabled
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | isBinaryExtensionEnabled | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | protected Optional<List<String>> parseClaimList(JwtClaims claims, String claimName) {
Optional<Object> objectOptional = parseClaim(claims, claimName);
if (!objectOptional.isPresent()) {
return Optional.empty();
}
Object obj = objectOptional.get();
List<String> result ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseClaimList
File: security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java
Repository: micronaut-projects/micronaut-security
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-36820 | MEDIUM | 6.5 | micronaut-projects/micronaut-security | parseClaimList | security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java | 9728b925221a0d87798ccf250657a3c214b7e980 | 0 |
Analyze the following code function for security vulnerabilities | public void disable() throws IOException {
makeDisabled(true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disable
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | disable | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private void maybeShowEncryptionNotifications() {
final List<UserInfo> users = mUserManager.getUsers();
for (int i = 0; i < users.size(); i++) {
UserInfo user = users.get(i);
UserHandle userHandle = user.getUserHandle();
if (!mUserManager.isUserUnlockingOrUnlocked(use... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeShowEncryptionNotifications
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | maybeShowEncryptionNotifications | services/core/java/com/android/server/LockSettingsService.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public InsetsControlTarget getImeControlTarget() {
return getDisplayContent().getImeHostOrFallback(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImeControlTarget
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getImeControlTarget | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean addAccountExplicitly(
Account account, String password, Bundle extras, String opPackageName) {
return addAccountExplicitlyWithVisibility(
account, password, extras, /* packageToVisibility= */ null, opPackageName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addAccountExplicitly
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | addAccountExplicitly | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public String getThreadGroup(ThreadInfo ti) {
return map.get(ti.getThreadId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThreadGroup
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getThreadGroup | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | public Stream<String> getViewResources(FacesContext facesContext, String path, int maxDepth, ResourceVisitOption... options) {
return faceletWebappResourceHelper.getViewResources(facesContext, path, maxDepth, options);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getViewResources
File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | getViewResources | impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | public String getBasePath() {
return basePath;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBasePath
File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getBasePath | samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public StaticHandler setEnableRangeSupport(boolean enableRangeSupport) {
this.rangeSupport = enableRangeSupport;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEnableRangeSupport
File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
Repository: vert-x3/vertx-web
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-12542 | HIGH | 7.5 | vert-x3/vertx-web | setEnableRangeSupport | vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java | 57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b | 0 |
Analyze the following code function for security vulnerabilities | private boolean flingExpandsQs(float vel) {
if (isFalseTouch()) {
return false;
}
if (Math.abs(vel) < mFlingAnimationUtils.getMinVelocityPxPerSecond()) {
return getQsExpansionFraction() > 0.5f;
} else {
return vel > 0;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flingExpandsQs
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | flingExpandsQs | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean showWallpaper() {
if (!isVisibleRequested()
// in multi-window mode, wallpaper is always visible at the back and not tied to
// the app (there is no wallpaper target).
|| inMultiWindowMode()) {
return false;
}
retu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showWallpaper
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | showWallpaper | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getErrorMessage() {
return errorMessage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getErrorMessage
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
Repository: theonedev/onedev
The code follows secure coding pract... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | getErrorMessage | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Bitstream setLogo(Context context, Collection collection, InputStream is)
throws AuthorizeException, IOException, SQLException {
// Check authorisation
// authorized to remove the logo when DELETE rights
// authorized when canEdit
if (!((is == null) && author... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLogo
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | setLogo | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | public static Concept getConcept(String id, String errorMessageIfNotFound) throws IllegalArgumentException {
Concept c = null;
try {
c = getConcept(id);
}
catch (Exception ex) {
throw new IllegalArgumentException(errorMessageIfNotFound, ex);
}
if (c == null)
throw new IllegalArgumentException(erro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConcept
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | getConcept | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | 9dcd304688e65c31cac5532fe501b9816ed975ae | 0 |
Analyze the following code function for security vulnerabilities | public static void composeWithExtraValues(Context launcher, Account account,
String subject, final ContentValues extraValues) {
launch(launcher, account, null, COMPOSE, null, null, null, subject, extraValues);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: composeWithExtraValues
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | composeWithExtraValues | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | CauseAction getBuildCause(StaplerRequest req) {
Cause cause;
if (authToken != null && authToken.getToken() != null && req.getParameter("token") != null) {
// Optional additional cause text when starting via token
String causeText = req.getParameter("cause");
cause = n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBuildCause
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getBuildCause | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canWriteCredentialManagerPolicy(CallerIdentity caller) {
return (isProfileOwner(caller) && isManagedProfile(caller.getUserId()))
|| isDefaultDeviceOwner(caller)
|| hasCallingOrSelfPermission(MANAGE_PROFILE_AND_DEVICE_OWNERS);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canWriteCredentialManagerPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | canWriteCredentialManagerPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean finishActivityAffinity(IBinder token) {
synchronized(this) {
final long origId = Binder.clearCallingIdentity();
try {
ActivityRecord r = ActivityRecord.isInStackLocked(token);
ActivityRecord rootR = r.task.getRootActivity();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishActivityAffinity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | finishActivityAffinity | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | protected void updateTransientActions() {
transientActions = createTransientActions();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateTransientActions
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | updateTransientActions | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private static void clearDirectory(IMediaContainerService mcs, File[] paths) {
for (File path : paths) {
try {
mcs.clearDirectory(path.getAbsolutePath());
} catch (RemoteException e) {
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearDirectory
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | clearDirectory | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | protected void disableCertificateValidation(ClientBuilder clientBuilder) throws KeyManagementException, NoSuchAlgorithmException {
TrustManager[] trustAllCerts = new X509TrustManager[] {
new X509TrustManager() {
@Override
public X509Certificate[] getAcceptedIssuers() {
return null;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disableCertificateValidation
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | disableCertificateValidation | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void run() {
while (!stopNow) {
try {
SortedProperties sp = new SortedProperties();
if (Files.exists(file)) {
InputStream in = Files.newInputStream(file);
sp.load(in);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: run
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | run | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | boolean hasProcess() {
return app != null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasProcess
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | hasProcess | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override // since 2.8
public int getText(Writer writer) throws IOException
{
if (_tokenIncomplete) {
_finishToken();
}
JsonToken t = _currToken;
if (t == JsonToken.VALUE_STRING) {
return _textBuffer.contentsToWriter(writer);
}
if (t == Jso... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getText
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | getText | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | public String nextText() throws XmlPullParserException,IOException {
if(getEventType() != START_TAG) {
throw new XmlPullParserException(
getPositionDescription()
+ ": parser must be on START_TAG to read next text", this, null);
}
int e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nextText
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nextText | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | protected void writeDesign(Element tableSectionElement,
DesignContext designContext) {
for (ROWTYPE row : rows) {
row.writeDesign(tableSectionElement.appendElement("tr"),
designContext);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeDesign
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | writeDesign | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private boolean processSanityChecksLocked(ProcessRecord process) {
if (process == null || process.thread == null) {
return false;
}
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
if (!isDebuggable) {
if ((process.info.flags&Appli... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processSanityChecksLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | processSanityChecksLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void resetRuntimePermissions() {
mContext.enforceCallingOrSelfPermission(
android.Manifest.permission.REVOKE_RUNTIME_PERMISSIONS,
"revokeRuntimePermission");
int callingUid = Binder.getCallingUid();
if (callingUid != Process.SYSTEM_UID && cal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetRuntimePermissions
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | resetRuntimePermissions | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private void modifyTargetIntent(Intent in) {
final String action = in.getAction();
if (Intent.ACTION_SEND.equals(action) ||
Intent.ACTION_SEND_MULTIPLE.equals(action)) {
in.addFlags(Intent.FLAG_ACTIVITY_NEW_DOCUMENT |
Intent.FLAG_ACTIVITY_MULTIPLE_TASK);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: modifyTargetIntent
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | modifyTargetIntent | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 0 |
Analyze the following code function for security vulnerabilities | public void updateSessionParameters(long timeoutMillis, long revokeAfterKilledDelayMillis) {
synchronized (mInnerLock) {
mTimeout = Math.min(mTimeout, timeoutMillis);
mRevokeAfterKilledDelay = Math.min(mRevokeAfterKilledDelay,
revokeAfterKilledDelayMil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSessionParameters
File: services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21254 | HIGH | 7.8 | android | updateSessionParameters | services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java | fa539c85503dc63bfb53c76b6f12b3549f14a709 | 0 |
Analyze the following code function for security vulnerabilities | public static MimeHeaders getMimeHeaders(HttpServletRequest req) {
MimeHeaders headers = new MimeHeaders();
if(req == null) {
debug.message("SAMLUtils.getMimeHeaders: null input");
return headers;
}
Enumeration enumerator = req.getHeaderNames();
w... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMimeHeaders
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | getMimeHeaders | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isCallerChooserActivity() {
// TODO(b/228975502): Migrate this check to a proper permission or role check
final int callingUid = injectBinderCallingUid();
ComponentName systemChooser = injectChooserActivity();
if (systemChooser == null) {
return false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCallerChooserActivity
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40092 | MEDIUM | 5.5 | android | isCallerChooserActivity | services/core/java/com/android/server/pm/ShortcutService.java | a5e55363e69b3c84d3f4011c7b428edb1a25752c | 0 |
Analyze the following code function for security vulnerabilities | default <T extends DataModel> void update(UUID jobId, String key, T model) {
throw new UnsupportedOperationException();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: update
File: portability-spi-cloud/src/main/java/org/datatransferproject/spi/cloud/storage/TemporaryPerJobDataStore.java
Repository: google/data-transfer-project
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-22572 | LOW | 2.1 | google/data-transfer-project | update | portability-spi-cloud/src/main/java/org/datatransferproject/spi/cloud/storage/TemporaryPerJobDataStore.java | 013edb6c2d5a4e472988ea29a7cb5b1fdaf9c635 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public T setObject(K name, Iterable<?> values) {
validateName(nameValidator, false, name);
int h = hashingStrategy.hashCode(name);
int i = index(h);
remove0(h, i, name);
for (Object v: values) {
if (v == null) {
break;
}
... | Vulnerability Classification:
- CWE: CWE-436, CWE-113
- CVE: CVE-2022-41915
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Merge pull request from GHSA-hh82-3pmq-7frp
Motivation:
The setObject methods that took arrays and iterators as arguments provided a way to bypass value validation.
Modification:
Add the miss... | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | setObject | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 1 |
Analyze the following code function for security vulnerabilities | public ModelAndView commitUserRegisterUser() {
String username = "";
String password = "";
String confirmPassword = "";
String email = "";
String confirmEmail = "";
String avatarPath = "";
try{
username = this.getValue(request.getPart("username"));
password = this.getValue(request.getPart("password"... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2014-125074
- Severity: MEDIUM
- CVSS Score: 5.2
Description: fixed problems in register controller, and worked at preventing sql-injection in database access
Function: commitUserRegisterUser
File: Voyager/src/Controllers/RegisterController.java
Repository: Naysh... | [
"CWE-89"
] | CVE-2014-125074 | MEDIUM | 5.2 | Nayshlok/Voyager | commitUserRegisterUser | Voyager/src/Controllers/RegisterController.java | f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae | 1 |
Analyze the following code function for security vulnerabilities | private boolean isAdminTestOnlyLocked(ComponentName who, int userHandle) {
final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
return (admin != null) && admin.testOnlyAdmin;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAdminTestOnlyLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isAdminTestOnlyLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public static String getDatabaseUrl(DatabaseConfiguration dbConfig) {
return "jdbc:" + dbConfig.getDatabaseType().toLowerCase() + ":" + dbConfig.getDatabaseName();
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2023-41886
- Severity: HIGH
- CVSS Score: 7.5
Description: Merge pull request from GHSA-qqh2-wvmv-h72m
Function: getDatabaseUrl
File: extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java
Repository: OpenRefine
Fixed Co... | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | getDatabaseUrl | extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 1 |
Analyze the following code function for security vulnerabilities | public ApiClient setDebugging(boolean debugging) {
this.debugging = debugging;
// Rebuild HTTP Client according to the new "debugging" value.
this.httpClient = buildHttpClient();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDebugging
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding ... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setDebugging | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public static final long getStartElapsedRealtime() {
return sStartElapsedRealtime;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStartElapsedRealtime
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | getStartElapsedRealtime | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | public Future<Void> accessSession(VaadinSession session,
Runnable runnable) {
FutureAccess future = new FutureAccess(session, runnable);
session.getPendingAccessQueue().add(future);
ensureAccessQueuePurged(session);
return future;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: accessSession
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | accessSession | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | @Reference
public void setMediaInspectionService(MediaInspectionService mediaInspectionService) {
this.mediaInspectionService = mediaInspectionService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMediaInspectionService
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | setMediaInspectionService | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | private void saveAndCloseNotificationMenu(NotificationInfo info,
ExpandableNotificationRow row, NotificationGuts guts, View done) {
guts.resetFalsingCheck();
int[] rowLocation = new int[2];
int[] doneLocation = new int[2];
row.getLocationOnScreen(rowLocation);
done.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveAndCloseNotificationMenu
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | saveAndCloseNotificationMenu | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private void addComponent(Object item, Component component) {
if (activeComponents.containsKey(item)) {
if (activeComponents.get(item).equals(component)) {
// Reusing old component
return;
}
removeComponent(item);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addComponent
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addComponent | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | boolean getSSL() {
return ssl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSSL
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getSSL | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | public Integer getCid() {
return cid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCid
File: src/main/java/cn/luischen/model/ContentDomain.java
Repository: WinterChenS/my-site
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29638 | MEDIUM | 5.4 | WinterChenS/my-site | getCid | src/main/java/cn/luischen/model/ContentDomain.java | d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed | 0 |
Analyze the following code function for security vulnerabilities | private void writeGrantedUriPermissions() {
if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION, "writeGrantedUriPermissions()");
final long startTime = SystemClock.uptimeMillis();
// Snapshot permissions so we can persist without lock
ArrayList<UriPermission.Snapshot> persist = Lists.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeGrantedUriPermissions
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | writeGrantedUriPermissions | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public boolean navigateUpTo(IBinder token, Intent target, int resultCode, Intent resultData)
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: navigateUpTo
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | navigateUpTo | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | protected SmsTracker getSmsTracker(HashMap<String, Object> data, PendingIntent sentIntent,
PendingIntent deliveryIntent, String format, AtomicInteger unsentPartCount,
AtomicBoolean anyPartFailed, Uri messageUri, SmsHeader smsHeader,
boolean isExpectMore, String fullMessageText, boole... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSmsTracker
File: src/java/com/android/internal/telephony/SMSDispatcher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3858 | HIGH | 9.3 | android | getSmsTracker | src/java/com/android/internal/telephony/SMSDispatcher.java | df31d37d285dde9911b699837c351aed2320b586 | 0 |
Analyze the following code function for security vulnerabilities | public static Obs createObs(FormField formField, Object value, Date datetime, String accessionNumber) {
Concept concept = formField.getField().getConcept();
if (concept == null)
throw new FormEntryException("Can't create an Obs for a formField that doesn't represent a Concept");
return createObs(concept, value... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createObs
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | createObs | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | 9dcd304688e65c31cac5532fe501b9816ed975ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void validateName(CharSequence name) {
if (name == null || name.length() == 0) {
throw new IllegalArgumentException("empty headers are not allowed [" + name + "]");
}
if (name instanceof AsciiString) {
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateName
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | validateName | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | protected void customParseResponse(final String response, final Assertion assertion)
throws TicketValidationException {
// nothing to do
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: customParseResponse
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | customParseResponse | cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | void setWillReplaceChildWindows() {
ProtoLog.d(WM_DEBUG_ADD_REMOVE, "Marking app token %s"
+ " with replacing child windows.", this);
for (int i = mChildren.size() - 1; i >= 0; i--) {
final WindowState w = mChildren.get(i);
w.setWillReplaceChildWindows();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWillReplaceChildWindows
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setWillReplaceChildWindows | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private ServiceProvider unmarshalSP(SpFileContent spFileContent, String tenantDomain)
throws IdentityApplicationManagementException {
if (StringUtils.isEmpty(spFileContent.getContent())) {
throw new IdentityApplicationManagementException(String.format("Empty Service Provider configurati... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2021-42646
- Severity: MEDIUM
- CVSS Score: 6.4
Description: Fix formatting issues
Function: unmarshalSP
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementService... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | unmarshalSP | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | 9dcda46c7661222562f4f62ed300680446725b2f | 1 |
Analyze the following code function for security vulnerabilities | protected boolean isGroupContextWiki(OLATResourceable ores) {
return ores.getResourceableTypeName().equals(OresHelper.calculateTypeName(BusinessGroup.class));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isGroupContextWiki
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | isGroupContextWiki | src/main/java/org/olat/modules/wiki/WikiManager.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | private static String getEntryDigestAttributeName(DigestAlgorithm digestAlgorithm) {
switch (digestAlgorithm) {
case SHA1:
return "SHA1-Digest";
case SHA256:
return "SHA-256-Digest";
default:
throw new IllegalArgumentException(
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEntryDigestAttributeName
File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | getEntryDigestAttributeName | src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java | 41d882324288085fd32ae0bb70dc85f5fd0e2be7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SurfaceControl getAnimationLeashParent() {
// For transitions in the root pinned task (menu activity) we just let them occur as a child
// of the root pinned task.
// All normal app transitions take place in an animation layer which is below the root
// pinned task b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAnimationLeashParent
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getAnimationLeashParent | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | boolean isExternalizable() {
resolveProperties();
return isExternalizable;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isExternalizable
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | isExternalizable | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setActiveAdmin(
ComponentName adminReceiver, boolean refreshing, int userHandle) {
if (!mHasFeature) {
return;
}
Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId");
final CallerIdentity caller = getCallerIdentity();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setActiveAdmin
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setActiveAdmin | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static String stringForQuery(SQLiteStatement prog, String[] selectionArgs) {
prog.bindAllArgsAsStrings(selectionArgs);
return prog.simpleQueryForString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stringForQuery
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | stringForQuery | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | private void readDescriptorInfos(Element infos)
{
this.packageExtensionId = getElementText(infos, XarModel.ELEMENT_INFOS_EXTENSIONID, true);
this.packageVersion = getElementText(infos, XarModel.ELEMENT_INFOS_VERSION, false);
this.packageName = getElementText(infos, XarModel.ELEMENT_INFOS_NAM... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readDescriptorInfos
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | readDescriptorInfos | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected String resolveSessionKexProposal(String hostKeyTypes) throws IOException {
String proposal = super.resolveSessionKexProposal(hostKeyTypes);
// see https://tools.ietf.org/html/rfc8308
KexExtensionHandler extHandler = getKexExtensionHandler();
if ((extHandler == nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveSessionKexProposal
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | resolveSessionKexProposal | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids) {
enforceNotIsolatedCaller("getProcessMemoryInfo");
Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length];
for (int i=pids.length-1; i>=0; i--) {
ProcessRecord proc;
int oomAdj;
sy... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessMemoryInfo
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getProcessMemoryInfo | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void sendAllJSON(HttpExchange pExchange, ParsedUri pParsedUri, JSONAware pJson) throws IOException {
OutputStream out = null;
try {
Headers headers = pExchange.getResponseHeaders();
if (pJson != null) {
headers.set("Content-Type", getMimeType(pParsedUri) +... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2018-1000129
- Severity: MEDIUM
- CVSS Score: 4.3
Description: fix: Verify a given 'mimeType' and/or 'callback' request parameter
So that only fixed values are possible, in order to avoid XSS attack
vectors.
Function: sendAllJSON
File: agent/jvm/src/main/java/or... | [
"CWE-79"
] | CVE-2018-1000129 | MEDIUM | 4.3 | jolokia | sendAllJSON | agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java | 5895d5c137c335e6b473e9dcb9baf748851bbc5f | 1 |
Analyze the following code function for security vulnerabilities | private void validateIconURI(@NonNull final ShortcutInfo si) {
final int callingUid = injectBinderCallingUid();
final Icon icon = si.getIcon();
if (icon == null) {
// There's no icon in this shortcut, nothing to validate here.
return;
}
int iconType = icon... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateIconURI
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40092 | MEDIUM | 5.5 | android | validateIconURI | services/core/java/com/android/server/pm/ShortcutService.java | a5e55363e69b3c84d3f4011c7b428edb1a25752c | 0 |
Analyze the following code function for security vulnerabilities | public String toString() {
return getSafeName() + "=" + getSafeValue();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: varexport/src/main/java/com/indeed/util/varexport/Variable.java
Repository: indeedeng/util
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-36634 | MEDIUM | 5.4 | indeedeng/util | toString | varexport/src/main/java/com/indeed/util/varexport/Variable.java | c0952a9db51a880e9544d9fac2a2218a6bfc9c63 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isNumberType(Type type) {
return type == FieldType.INT || type == FieldType.SMALL_INT || type == FieldType.LONG
|| type == FieldType.DOUBLE || type == FieldType.DECIMAL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNumberType
File: src/main/java/com/rebuild/core/service/query/AdvFilterParser.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | isNumberType | src/main/java/com/rebuild/core/service/query/AdvFilterParser.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | final void status(int statusCode) {
status(HttpStatus.valueOf(statusCode));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: status
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | status | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public IBinder getBinderForSetQueue() throws RemoteException {
return new ParcelableListBinder<QueueItem>((list) -> {
synchronized (mLock) {
mQueue = list;
}
mHandler.post(MessageHandler.MSG_UPDATE_QUEUE);
});
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBinderForSetQueue
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | getBinderForSetQueue | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | private boolean userHasIncompatibleAccounts(int id) {
AccountManager am = mContext.createContextAsUser(UserHandle.of(id), /* flags= */ 0)
.getSystemService(AccountManager.class);
Account[] accounts = am.getAccounts();
for (Account account : accounts) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: userHasIncompatibleAccounts
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | userHasIncompatibleAccounts | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getOrder() {
return POSITION;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOrder
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | getOrder | runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | static int getSerializedSize(Message message, Map<FieldDescriptor, Object> fields) {
int size = 0;
final boolean isMessageSet =
message.getDescriptorForType().getOptions().getMessageSetWireFormat();
for (final Map.Entry<Descriptors.FieldDescriptor, Object> entry : fields.entrySet()) {
final D... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSerializedSize
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | getSerializedSize | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | public void downloadTOCAction() throws IOException, PresentationException, IndexUnreachableException, DAOException, ViewerConfigurationException {
try {
String fileNameRaw = getToc().getTocElements().get(0).getLabel();
String fileName = fileNameRaw + ".pdf";
FacesContext fc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: downloadTOCAction
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | downloadTOCAction | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServletContext getServletContext() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServletContext
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getServletContext | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | protected void openDetailsForContact() {
int position = contact_context_id;
Contact contact = (Contact) contacts.get(position);
switchToContactDetails(contact);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openDetailsForContact
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | openDetailsForContact | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder r(String name) {
return reference(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: r
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | r | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isEncrypted() {
return encrypted;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEncrypted
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | isEncrypted | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public static Document parseDocument(String fileName)
throws XMLException {
return parseDocument(new java.io.File(fileName));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseDocument
File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
Repository: dbeaver
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3836 | MEDIUM | 4.3 | dbeaver | parseDocument | bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java | 4debf8f25184b7283681ed3fb5e9e887d9d4fe22 | 0 |
Analyze the following code function for security vulnerabilities | public File getRoot() {
if (folder == null) {
throw new IllegalStateException(
"the temporary folder has not yet been created");
}
return folder;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRoot
File: src/main/java/org/junit/rules/TemporaryFolder.java
Repository: junit-team/junit4
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-15250 | LOW | 1.9 | junit-team/junit4 | getRoot | src/main/java/org/junit/rules/TemporaryFolder.java | 610155b8c22138329f0723eec22521627dbc52ae | 0 |
Analyze the following code function for security vulnerabilities | public Float optFloatObject(String key, Float defaultValue) {
Number val = this.optNumber(key);
if (val == null) {
return defaultValue;
}
final Float floatValue = val.floatValue();
// if (Float.isNaN(floatValue) || Float.isInfinite(floatValue)) {
// return def... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optFloatObject
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | optFloatObject | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | public AssetHandler maxAge(final long maxAge) {
this.maxAge = maxAge;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maxAge
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | maxAge | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void seekTo(String packageName, long pos) {
mSessionCb.seekTo(packageName, Binder.getCallingPid(), Binder.getCallingUid(), pos);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: seekTo
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | seekTo | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isTempAllowlistedForFgsWhileInUse(int uid) {
return mFgsWhileInUseTempAllowList.isAllowed(uid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTempAllowlistedForFgsWhileInUse
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | isTempAllowlistedForFgsWhileInUse | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean canAdminGrantSensorsPermissionsForUser(int userId) {
if (!mHasFeature) {
return false;
}
return mPolicyCache.canAdminGrantSensorsPermissionsForUser(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canAdminGrantSensorsPermissionsForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | canAdminGrantSensorsPermissionsForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public Version getRCSVersion()
{
return this.doc.getRCSVersion();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRCSVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getRCSVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public static void writeToFile(File tgtFile, List<SsurgeonPattern> patterns) {
try {
Document domDoc = createPatternXMLDoc(patterns);
if (domDoc != null) {
Transformer tformer = TransformerFactory.newInstance().newTransformer();
tformer.setOutputProperty(OutputKeys.INDENT, "yes");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeToFile
File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3878 | HIGH | 7.5 | stanfordnlp/CoreNLP | writeToFile | src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java | e5bbe135a02a74b952396751ed3015e8b8252e99 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isActivePasswordSufficientForDeviceRequirement() {
if (!mHasFeature) {
return true;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(isProfileOwner(caller));
final int profileUserId = caller.getUse... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isActivePasswordSufficientForDeviceRequirement
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isActivePasswordSufficientForDeviceRequirement | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected void inviteToConversation(Conversation conversation) {
startActivityForResult(ChooseContactActivity.create(this,conversation), REQUEST_INVITE_TO_CONVERSATION);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inviteToConversation
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | inviteToConversation | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return getClass().getSimpleName() + "[propertyId:"
+ grid.getPropertyIdByColumnId(state.id) + "]";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | toString | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | private int getFrpManagementAgentUidOrThrow() {
int uid = getFrpManagementAgentUid();
if (uid == -1) {
throw new UnsupportedOperationException(
"The persistent data block service is not supported on this device");
}
return uid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFrpManagementAgentUidOrThrow
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getFrpManagementAgentUidOrThrow | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SaServletFilter setBeforeAuth(SaFilterAuthStrategy beforeAuth) {
this.beforeAuth = beforeAuth;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBeforeAuth
File: sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | setBeforeAuth | sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void closeAllClients(TestContext context) {
PostgresClient c = PostgresClient.getInstance(vertx);
context.assertNotNull(c.getClient(), "getClient()");
PostgresClient.closeAllClients();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeAllClients
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | closeAllClients | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private DeviceAdminInfo findAdmin(final ComponentName adminName, final int userHandle,
boolean throwForMissingPermission) {
final ActivityInfo ai = mInjector.binderWithCleanCallingIdentity(() -> {
try {
return mIPackageManager.getReceiverInfo(adminName,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findAdmin
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | findAdmin | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public List<News> newsMoreRecentThan(String date, String region){
Query query = em.createQuery("SELECT n FROM News n WHERE n.region LIKE :r AND n.date > :d ORDER BY date DESC");
query.setParameter("r", region);
query.setParameter("d", date);
@SuppressWarnings("unchecked")
List<News> news = q... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2014-125038
- Severity: MEDIUM
- CVSS Score: 5.2
Description: data a funcionar mas sem proteger sql injection
Function: newsMoreRecentThan
File: Cnn-EJB/ejbModule/ejbs/NewsBean.java
Repository: rfsimoes/IS_Projecto2
Fixed Code:
public List<News> newsMoreRecentTh... | [
"CWE-89"
] | CVE-2014-125038 | MEDIUM | 5.2 | rfsimoes/IS_Projecto2 | newsMoreRecentThan | Cnn-EJB/ejbModule/ejbs/NewsBean.java | aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0 | 1 |
Analyze the following code function for security vulnerabilities | private static HashMap<String, Integer> getAuthenticatorTypeAndUIDForUser(
IAccountAuthenticatorCache authCache,
int userId) {
HashMap<String, Integer> knownAuth = new LinkedHashMap<>();
for (RegisteredServicesCache.ServiceInfo<AuthenticatorDescription> service : authCache
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthenticatorTypeAndUIDForUser
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getAuthenticatorTypeAndUIDForUser | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public Claims getClaims(String token) throws AuthenticationException {
try {
String[] split_string = token.split("\\.");
String base64EncodedBody = split_string[1];
Base64 base64Url = new Base64(true);
String body = new String(base64Url.decode(base64EncodedBody))... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClaims
File: utility/src/main/java/eu/nimble/utility/validation/ValidationUtil.java
Repository: nimble-platform/common
The code follows secure coding practices. | [
"CWE-290"
] | CVE-2021-32631 | MEDIUM | 4 | nimble-platform/common | getClaims | utility/src/main/java/eu/nimble/utility/validation/ValidationUtil.java | a59ad46733912a5580530e39cac0e6ebc83cc563 | 0 |
Analyze the following code function for security vulnerabilities | @Temporal(TemporalType.TIMESTAMP)
@Column(name = "update_date", length = 19)
public Date getUpdateDate() {
return this.updateDate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUpdateDate
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | getUpdateDate | publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | public Object getObject(String classname, String key, String value, boolean failover)
{
try {
BaseObject obj = this.getDoc().getObject(classname, key, value, failover);
if (obj == null) {
return null;
} else {
return newObjectApi(obj, getXW... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isCertUnderestimated() {
return Boolean.valueOf(JNLPRuntime.getConfiguration().getProperty(ConfigurationConstants.KEY_SECURITY_ITW_IGNORECERTISSUES))
&& !JNLPRuntime.isSecurityEnabled();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCertUnderestimated
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | isCertUnderestimated | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | public int getUnreadMessageCount() {
return mUnreadMessageCount;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUnreadMessageCount
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getUnreadMessageCount | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.