instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@ManagedAttribute("Whether the binary extension is enabled") public boolean isBinaryExtensionEnabled() { return _binaryExtensionEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBinaryExtensionEnabled File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
isBinaryExtensionEnabled
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
protected Optional<List<String>> parseClaimList(JwtClaims claims, String claimName) { Optional<Object> objectOptional = parseClaim(claims, claimName); if (!objectOptional.isPresent()) { return Optional.empty(); } Object obj = objectOptional.get(); List<String> result ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseClaimList File: security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java Repository: micronaut-projects/micronaut-security The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-36820
MEDIUM
6.5
micronaut-projects/micronaut-security
parseClaimList
security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java
9728b925221a0d87798ccf250657a3c214b7e980
0
Analyze the following code function for security vulnerabilities
public void disable() throws IOException { makeDisabled(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disable File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
disable
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
private void maybeShowEncryptionNotifications() { final List<UserInfo> users = mUserManager.getUsers(); for (int i = 0; i < users.size(); i++) { UserInfo user = users.get(i); UserHandle userHandle = user.getUserHandle(); if (!mUserManager.isUserUnlockingOrUnlocked(use...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeShowEncryptionNotifications File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
maybeShowEncryptionNotifications
services/core/java/com/android/server/LockSettingsService.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Override public InsetsControlTarget getImeControlTarget() { return getDisplayContent().getImeHostOrFallback(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImeControlTarget File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getImeControlTarget
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public boolean addAccountExplicitly( Account account, String password, Bundle extras, String opPackageName) { return addAccountExplicitlyWithVisibility( account, password, extras, /* packageToVisibility= */ null, opPackageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAccountExplicitly File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
addAccountExplicitly
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public String getThreadGroup(ThreadInfo ti) { return map.get(ti.getThreadId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThreadGroup File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getThreadGroup
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public Stream<String> getViewResources(FacesContext facesContext, String path, int maxDepth, ResourceVisitOption... options) { return faceletWebappResourceHelper.getViewResources(facesContext, path, maxDepth, options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewResources File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getViewResources
impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public String getBasePath() { return basePath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBasePath File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getBasePath
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public StaticHandler setEnableRangeSupport(boolean enableRangeSupport) { this.rangeSupport = enableRangeSupport; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEnableRangeSupport File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java Repository: vert-x3/vertx-web The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-12542
HIGH
7.5
vert-x3/vertx-web
setEnableRangeSupport
vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b
0
Analyze the following code function for security vulnerabilities
private boolean flingExpandsQs(float vel) { if (isFalseTouch()) { return false; } if (Math.abs(vel) < mFlingAnimationUtils.getMinVelocityPxPerSecond()) { return getQsExpansionFraction() > 0.5f; } else { return vel > 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flingExpandsQs File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
flingExpandsQs
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override boolean showWallpaper() { if (!isVisibleRequested() // in multi-window mode, wallpaper is always visible at the back and not tied to // the app (there is no wallpaper target). || inMultiWindowMode()) { return false; } retu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showWallpaper File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
showWallpaper
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Nullable public String getErrorMessage() { return errorMessage; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getErrorMessage File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding pract...
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
getErrorMessage
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
@Override public Bitstream setLogo(Context context, Collection collection, InputStream is) throws AuthorizeException, IOException, SQLException { // Check authorisation // authorized to remove the logo when DELETE rights // authorized when canEdit if (!((is == null) && author...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLogo File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
setLogo
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
public static Concept getConcept(String id, String errorMessageIfNotFound) throws IllegalArgumentException { Concept c = null; try { c = getConcept(id); } catch (Exception ex) { throw new IllegalArgumentException(errorMessageIfNotFound, ex); } if (c == null) throw new IllegalArgumentException(erro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConcept File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getConcept
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
public static void composeWithExtraValues(Context launcher, Account account, String subject, final ContentValues extraValues) { launch(launcher, account, null, COMPOSE, null, null, null, subject, extraValues); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: composeWithExtraValues File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
composeWithExtraValues
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
CauseAction getBuildCause(StaplerRequest req) { Cause cause; if (authToken != null && authToken.getToken() != null && req.getParameter("token") != null) { // Optional additional cause text when starting via token String causeText = req.getParameter("cause"); cause = n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBuildCause File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getBuildCause
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
private boolean canWriteCredentialManagerPolicy(CallerIdentity caller) { return (isProfileOwner(caller) && isManagedProfile(caller.getUserId())) || isDefaultDeviceOwner(caller) || hasCallingOrSelfPermission(MANAGE_PROFILE_AND_DEVICE_OWNERS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canWriteCredentialManagerPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
canWriteCredentialManagerPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean finishActivityAffinity(IBinder token) { synchronized(this) { final long origId = Binder.clearCallingIdentity(); try { ActivityRecord r = ActivityRecord.isInStackLocked(token); ActivityRecord rootR = r.task.getRootActivity(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishActivityAffinity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
finishActivityAffinity
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected void updateTransientActions() { transientActions = createTransientActions(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTransientActions File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
updateTransientActions
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
private static void clearDirectory(IMediaContainerService mcs, File[] paths) { for (File path : paths) { try { mcs.clearDirectory(path.getAbsolutePath()); } catch (RemoteException e) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearDirectory File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clearDirectory
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
protected void disableCertificateValidation(ClientBuilder clientBuilder) throws KeyManagementException, NoSuchAlgorithmException { TrustManager[] trustAllCerts = new X509TrustManager[] { new X509TrustManager() { @Override public X509Certificate[] getAcceptedIssuers() { return null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableCertificateValidation File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
disableCertificateValidation
samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void run() { while (!stopNow) { try { SortedProperties sp = new SortedProperties(); if (Files.exists(file)) { InputStream in = Files.newInputStream(file); sp.load(in); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
run
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
boolean hasProcess() { return app != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasProcess File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
hasProcess
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override // since 2.8 public int getText(Writer writer) throws IOException { if (_tokenIncomplete) { _finishToken(); } JsonToken t = _currToken; if (t == JsonToken.VALUE_STRING) { return _textBuffer.contentsToWriter(writer); } if (t == Jso...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getText File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
getText
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public String nextText() throws XmlPullParserException,IOException { if(getEventType() != START_TAG) { throw new XmlPullParserException( getPositionDescription() + ": parser must be on START_TAG to read next text", this, null); } int e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nextText File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nextText
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
protected void writeDesign(Element tableSectionElement, DesignContext designContext) { for (ROWTYPE row : rows) { row.writeDesign(tableSectionElement.appendElement("tr"), designContext); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeDesign File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
writeDesign
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private boolean processSanityChecksLocked(ProcessRecord process) { if (process == null || process.thread == null) { return false; } boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0")); if (!isDebuggable) { if ((process.info.flags&Appli...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processSanityChecksLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
processSanityChecksLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void resetRuntimePermissions() { mContext.enforceCallingOrSelfPermission( android.Manifest.permission.REVOKE_RUNTIME_PERMISSIONS, "revokeRuntimePermission"); int callingUid = Binder.getCallingUid(); if (callingUid != Process.SYSTEM_UID && cal...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetRuntimePermissions File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
resetRuntimePermissions
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private void modifyTargetIntent(Intent in) { final String action = in.getAction(); if (Intent.ACTION_SEND.equals(action) || Intent.ACTION_SEND_MULTIPLE.equals(action)) { in.addFlags(Intent.FLAG_ACTIVITY_NEW_DOCUMENT | Intent.FLAG_ACTIVITY_MULTIPLE_TASK); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: modifyTargetIntent File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
modifyTargetIntent
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
public void updateSessionParameters(long timeoutMillis, long revokeAfterKilledDelayMillis) { synchronized (mInnerLock) { mTimeout = Math.min(mTimeout, timeoutMillis); mRevokeAfterKilledDelay = Math.min(mRevokeAfterKilledDelay, revokeAfterKilledDelayMil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSessionParameters File: services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21254
HIGH
7.8
android
updateSessionParameters
services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java
fa539c85503dc63bfb53c76b6f12b3549f14a709
0
Analyze the following code function for security vulnerabilities
public static MimeHeaders getMimeHeaders(HttpServletRequest req) { MimeHeaders headers = new MimeHeaders(); if(req == null) { debug.message("SAMLUtils.getMimeHeaders: null input"); return headers; } Enumeration enumerator = req.getHeaderNames(); w...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMimeHeaders File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
getMimeHeaders
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
private boolean isCallerChooserActivity() { // TODO(b/228975502): Migrate this check to a proper permission or role check final int callingUid = injectBinderCallingUid(); ComponentName systemChooser = injectChooserActivity(); if (systemChooser == null) { return false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCallerChooserActivity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
isCallerChooserActivity
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0
Analyze the following code function for security vulnerabilities
default <T extends DataModel> void update(UUID jobId, String key, T model) { throw new UnsupportedOperationException(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: portability-spi-cloud/src/main/java/org/datatransferproject/spi/cloud/storage/TemporaryPerJobDataStore.java Repository: google/data-transfer-project The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-22572
LOW
2.1
google/data-transfer-project
update
portability-spi-cloud/src/main/java/org/datatransferproject/spi/cloud/storage/TemporaryPerJobDataStore.java
013edb6c2d5a4e472988ea29a7cb5b1fdaf9c635
0
Analyze the following code function for security vulnerabilities
@Override public T setObject(K name, Iterable<?> values) { validateName(nameValidator, false, name); int h = hashingStrategy.hashCode(name); int i = index(h); remove0(h, i, name); for (Object v: values) { if (v == null) { break; } ...
Vulnerability Classification: - CWE: CWE-436, CWE-113 - CVE: CVE-2022-41915 - Severity: MEDIUM - CVSS Score: 6.5 Description: Merge pull request from GHSA-hh82-3pmq-7frp Motivation: The setObject methods that took arrays and iterators as arguments provided a way to bypass value validation. Modification: Add the miss...
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
setObject
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
1
Analyze the following code function for security vulnerabilities
public ModelAndView commitUserRegisterUser() { String username = ""; String password = ""; String confirmPassword = ""; String email = ""; String confirmEmail = ""; String avatarPath = ""; try{ username = this.getValue(request.getPart("username")); password = this.getValue(request.getPart("password"...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2014-125074 - Severity: MEDIUM - CVSS Score: 5.2 Description: fixed problems in register controller, and worked at preventing sql-injection in database access Function: commitUserRegisterUser File: Voyager/src/Controllers/RegisterController.java Repository: Naysh...
[ "CWE-89" ]
CVE-2014-125074
MEDIUM
5.2
Nayshlok/Voyager
commitUserRegisterUser
Voyager/src/Controllers/RegisterController.java
f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae
1
Analyze the following code function for security vulnerabilities
private boolean isAdminTestOnlyLocked(ComponentName who, int userHandle) { final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); return (admin != null) && admin.testOnlyAdmin; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAdminTestOnlyLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isAdminTestOnlyLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public static String getDatabaseUrl(DatabaseConfiguration dbConfig) { return "jdbc:" + dbConfig.getDatabaseType().toLowerCase() + ":" + dbConfig.getDatabaseName(); }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2023-41886 - Severity: HIGH - CVSS Score: 7.5 Description: Merge pull request from GHSA-qqh2-wvmv-h72m Function: getDatabaseUrl File: extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java Repository: OpenRefine Fixed Co...
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
getDatabaseUrl
extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
1
Analyze the following code function for security vulnerabilities
public ApiClient setDebugging(boolean debugging) { this.debugging = debugging; // Rebuild HTTP Client according to the new "debugging" value. this.httpClient = buildHttpClient(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDebugging File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding ...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setDebugging
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public static final long getStartElapsedRealtime() { return sStartElapsedRealtime; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStartElapsedRealtime File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
getStartElapsedRealtime
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public Future<Void> accessSession(VaadinSession session, Runnable runnable) { FutureAccess future = new FutureAccess(session, runnable); session.getPendingAccessQueue().add(future); ensureAccessQueuePurged(session); return future; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: accessSession File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
accessSession
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
@Reference public void setMediaInspectionService(MediaInspectionService mediaInspectionService) { this.mediaInspectionService = mediaInspectionService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMediaInspectionService File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
setMediaInspectionService
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
private void saveAndCloseNotificationMenu(NotificationInfo info, ExpandableNotificationRow row, NotificationGuts guts, View done) { guts.resetFalsingCheck(); int[] rowLocation = new int[2]; int[] doneLocation = new int[2]; row.getLocationOnScreen(rowLocation); done.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAndCloseNotificationMenu File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
saveAndCloseNotificationMenu
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private void addComponent(Object item, Component component) { if (activeComponents.containsKey(item)) { if (activeComponents.get(item).equals(component)) { // Reusing old component return; } removeComponent(item); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addComponent File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addComponent
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
boolean getSSL() { return ssl; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSSL File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getSSL
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public Integer getCid() { return cid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCid File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
getCid
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
private void writeGrantedUriPermissions() { if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION, "writeGrantedUriPermissions()"); final long startTime = SystemClock.uptimeMillis(); // Snapshot permissions so we can persist without lock ArrayList<UriPermission.Snapshot> persist = Lists....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeGrantedUriPermissions File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
writeGrantedUriPermissions
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public boolean navigateUpTo(IBinder token, Intent target, int resultCode, Intent resultData) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: navigateUpTo File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
navigateUpTo
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
protected SmsTracker getSmsTracker(HashMap<String, Object> data, PendingIntent sentIntent, PendingIntent deliveryIntent, String format, AtomicInteger unsentPartCount, AtomicBoolean anyPartFailed, Uri messageUri, SmsHeader smsHeader, boolean isExpectMore, String fullMessageText, boole...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSmsTracker File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
getSmsTracker
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
public static Obs createObs(FormField formField, Object value, Date datetime, String accessionNumber) { Concept concept = formField.getField().getConcept(); if (concept == null) throw new FormEntryException("Can't create an Obs for a formField that doesn't represent a Concept"); return createObs(concept, value...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createObs File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
createObs
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
@Override public void validateName(CharSequence name) { if (name == null || name.length() == 0) { throw new IllegalArgumentException("empty headers are not allowed [" + name + "]"); } if (name instanceof AsciiString) { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateName File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
validateName
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
protected void customParseResponse(final String response, final Assertion assertion) throws TicketValidationException { // nothing to do }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: customParseResponse File: cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
customParseResponse
cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
void setWillReplaceChildWindows() { ProtoLog.d(WM_DEBUG_ADD_REMOVE, "Marking app token %s" + " with replacing child windows.", this); for (int i = mChildren.size() - 1; i >= 0; i--) { final WindowState w = mChildren.get(i); w.setWillReplaceChildWindows(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWillReplaceChildWindows File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setWillReplaceChildWindows
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private ServiceProvider unmarshalSP(SpFileContent spFileContent, String tenantDomain) throws IdentityApplicationManagementException { if (StringUtils.isEmpty(spFileContent.getContent())) { throw new IdentityApplicationManagementException(String.format("Empty Service Provider configurati...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2021-42646 - Severity: MEDIUM - CVSS Score: 6.4 Description: Fix formatting issues Function: unmarshalSP File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementService...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
unmarshalSP
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
9dcda46c7661222562f4f62ed300680446725b2f
1
Analyze the following code function for security vulnerabilities
protected boolean isGroupContextWiki(OLATResourceable ores) { return ores.getResourceableTypeName().equals(OresHelper.calculateTypeName(BusinessGroup.class)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isGroupContextWiki File: src/main/java/org/olat/modules/wiki/WikiManager.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
isGroupContextWiki
src/main/java/org/olat/modules/wiki/WikiManager.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
private static String getEntryDigestAttributeName(DigestAlgorithm digestAlgorithm) { switch (digestAlgorithm) { case SHA1: return "SHA1-Digest"; case SHA256: return "SHA-256-Digest"; default: throw new IllegalArgumentException( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEntryDigestAttributeName File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getEntryDigestAttributeName
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
@Override public SurfaceControl getAnimationLeashParent() { // For transitions in the root pinned task (menu activity) we just let them occur as a child // of the root pinned task. // All normal app transitions take place in an animation layer which is below the root // pinned task b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAnimationLeashParent File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getAnimationLeashParent
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
boolean isExternalizable() { resolveProperties(); return isExternalizable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isExternalizable File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
isExternalizable
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public void setActiveAdmin( ComponentName adminReceiver, boolean refreshing, int userHandle) { if (!mHasFeature) { return; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setActiveAdmin File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setActiveAdmin
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static String stringForQuery(SQLiteStatement prog, String[] selectionArgs) { prog.bindAllArgsAsStrings(selectionArgs); return prog.simpleQueryForString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stringForQuery File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
stringForQuery
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
private void readDescriptorInfos(Element infos) { this.packageExtensionId = getElementText(infos, XarModel.ELEMENT_INFOS_EXTENSIONID, true); this.packageVersion = getElementText(infos, XarModel.ELEMENT_INFOS_VERSION, false); this.packageName = getElementText(infos, XarModel.ELEMENT_INFOS_NAM...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readDescriptorInfos File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
readDescriptorInfos
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
@Override protected String resolveSessionKexProposal(String hostKeyTypes) throws IOException { String proposal = super.resolveSessionKexProposal(hostKeyTypes); // see https://tools.ietf.org/html/rfc8308 KexExtensionHandler extHandler = getKexExtensionHandler(); if ((extHandler == nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveSessionKexProposal File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
resolveSessionKexProposal
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
@Override public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids) { enforceNotIsolatedCaller("getProcessMemoryInfo"); Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length]; for (int i=pids.length-1; i>=0; i--) { ProcessRecord proc; int oomAdj; sy...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessMemoryInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
getProcessMemoryInfo
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private void sendAllJSON(HttpExchange pExchange, ParsedUri pParsedUri, JSONAware pJson) throws IOException { OutputStream out = null; try { Headers headers = pExchange.getResponseHeaders(); if (pJson != null) { headers.set("Content-Type", getMimeType(pParsedUri) +...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2018-1000129 - Severity: MEDIUM - CVSS Score: 4.3 Description: fix: Verify a given 'mimeType' and/or 'callback' request parameter So that only fixed values are possible, in order to avoid XSS attack vectors. Function: sendAllJSON File: agent/jvm/src/main/java/or...
[ "CWE-79" ]
CVE-2018-1000129
MEDIUM
4.3
jolokia
sendAllJSON
agent/jvm/src/main/java/org/jolokia/jvmagent/handler/JolokiaHttpHandler.java
5895d5c137c335e6b473e9dcb9baf748851bbc5f
1
Analyze the following code function for security vulnerabilities
private void validateIconURI(@NonNull final ShortcutInfo si) { final int callingUid = injectBinderCallingUid(); final Icon icon = si.getIcon(); if (icon == null) { // There's no icon in this shortcut, nothing to validate here. return; } int iconType = icon...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateIconURI File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
validateIconURI
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0
Analyze the following code function for security vulnerabilities
public String toString() { return getSafeName() + "=" + getSafeValue(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: varexport/src/main/java/com/indeed/util/varexport/Variable.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
toString
varexport/src/main/java/com/indeed/util/varexport/Variable.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
private boolean isNumberType(Type type) { return type == FieldType.INT || type == FieldType.SMALL_INT || type == FieldType.LONG || type == FieldType.DOUBLE || type == FieldType.DECIMAL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNumberType File: src/main/java/com/rebuild/core/service/query/AdvFilterParser.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
isNumberType
src/main/java/com/rebuild/core/service/query/AdvFilterParser.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
final void status(int statusCode) { status(HttpStatus.valueOf(statusCode)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: status File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
status
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public IBinder getBinderForSetQueue() throws RemoteException { return new ParcelableListBinder<QueueItem>((list) -> { synchronized (mLock) { mQueue = list; } mHandler.post(MessageHandler.MSG_UPDATE_QUEUE); }); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBinderForSetQueue File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
getBinderForSetQueue
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
private boolean userHasIncompatibleAccounts(int id) { AccountManager am = mContext.createContextAsUser(UserHandle.of(id), /* flags= */ 0) .getSystemService(AccountManager.class); Account[] accounts = am.getAccounts(); for (Account account : accounts) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userHasIncompatibleAccounts File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
userHasIncompatibleAccounts
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int getOrder() { return POSITION; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrder File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getOrder
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
static int getSerializedSize(Message message, Map<FieldDescriptor, Object> fields) { int size = 0; final boolean isMessageSet = message.getDescriptorForType().getOptions().getMessageSetWireFormat(); for (final Map.Entry<Descriptors.FieldDescriptor, Object> entry : fields.entrySet()) { final D...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSerializedSize File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
getSerializedSize
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
public void downloadTOCAction() throws IOException, PresentationException, IndexUnreachableException, DAOException, ViewerConfigurationException { try { String fileNameRaw = getToc().getTocElements().get(0).getLabel(); String fileName = fileNameRaw + ".pdf"; FacesContext fc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: downloadTOCAction File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
downloadTOCAction
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
@Override public ServletContext getServletContext() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServletContext File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getServletContext
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
protected void openDetailsForContact() { int position = contact_context_id; Contact contact = (Contact) contacts.get(position); switchToContactDetails(contact); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openDetailsForContact File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
openDetailsForContact
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder r(String name) { return reference(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: r File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
r
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public boolean isEncrypted() { return encrypted; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEncrypted File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
isEncrypted
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public static Document parseDocument(String fileName) throws XMLException { return parseDocument(new java.io.File(fileName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDocument File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java Repository: dbeaver The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3836
MEDIUM
4.3
dbeaver
parseDocument
bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
4debf8f25184b7283681ed3fb5e9e887d9d4fe22
0
Analyze the following code function for security vulnerabilities
public File getRoot() { if (folder == null) { throw new IllegalStateException( "the temporary folder has not yet been created"); } return folder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRoot File: src/main/java/org/junit/rules/TemporaryFolder.java Repository: junit-team/junit4 The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-15250
LOW
1.9
junit-team/junit4
getRoot
src/main/java/org/junit/rules/TemporaryFolder.java
610155b8c22138329f0723eec22521627dbc52ae
0
Analyze the following code function for security vulnerabilities
public Float optFloatObject(String key, Float defaultValue) { Number val = this.optNumber(key); if (val == null) { return defaultValue; } final Float floatValue = val.floatValue(); // if (Float.isNaN(floatValue) || Float.isInfinite(floatValue)) { // return def...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optFloatObject File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optFloatObject
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public AssetHandler maxAge(final long maxAge) { this.maxAge = maxAge; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maxAge File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
maxAge
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public void seekTo(String packageName, long pos) { mSessionCb.seekTo(packageName, Binder.getCallingPid(), Binder.getCallingUid(), pos); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: seekTo File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
seekTo
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
@Override public boolean isTempAllowlistedForFgsWhileInUse(int uid) { return mFgsWhileInUseTempAllowList.isAllowed(uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTempAllowlistedForFgsWhileInUse File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
isTempAllowlistedForFgsWhileInUse
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public boolean canAdminGrantSensorsPermissionsForUser(int userId) { if (!mHasFeature) { return false; } return mPolicyCache.canAdminGrantSensorsPermissionsForUser(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canAdminGrantSensorsPermissionsForUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
canAdminGrantSensorsPermissionsForUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public Version getRCSVersion() { return this.doc.getRCSVersion(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRCSVersion File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getRCSVersion
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public static void writeToFile(File tgtFile, List<SsurgeonPattern> patterns) { try { Document domDoc = createPatternXMLDoc(patterns); if (domDoc != null) { Transformer tformer = TransformerFactory.newInstance().newTransformer(); tformer.setOutputProperty(OutputKeys.INDENT, "yes"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeToFile File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3878
HIGH
7.5
stanfordnlp/CoreNLP
writeToFile
src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
e5bbe135a02a74b952396751ed3015e8b8252e99
0
Analyze the following code function for security vulnerabilities
@Override public boolean isActivePasswordSufficientForDeviceRequirement() { if (!mHasFeature) { return true; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(isProfileOwner(caller)); final int profileUserId = caller.getUse...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isActivePasswordSufficientForDeviceRequirement File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isActivePasswordSufficientForDeviceRequirement
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void inviteToConversation(Conversation conversation) { startActivityForResult(ChooseContactActivity.create(this,conversation), REQUEST_INVITE_TO_CONVERSATION); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inviteToConversation File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
inviteToConversation
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return getClass().getSimpleName() + "[propertyId:" + grid.getPropertyIdByColumnId(state.id) + "]"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
toString
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private int getFrpManagementAgentUidOrThrow() { int uid = getFrpManagementAgentUid(); if (uid == -1) { throw new UnsupportedOperationException( "The persistent data block service is not supported on this device"); } return uid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFrpManagementAgentUidOrThrow File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getFrpManagementAgentUidOrThrow
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public SaServletFilter setBeforeAuth(SaFilterAuthStrategy beforeAuth) { this.beforeAuth = beforeAuth; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBeforeAuth File: sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
setBeforeAuth
sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
@Test public void closeAllClients(TestContext context) { PostgresClient c = PostgresClient.getInstance(vertx); context.assertNotNull(c.getClient(), "getClient()"); PostgresClient.closeAllClients(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeAllClients File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
closeAllClients
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private DeviceAdminInfo findAdmin(final ComponentName adminName, final int userHandle, boolean throwForMissingPermission) { final ActivityInfo ai = mInjector.binderWithCleanCallingIdentity(() -> { try { return mIPackageManager.getReceiverInfo(adminName, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAdmin File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
findAdmin
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public List<News> newsMoreRecentThan(String date, String region){ Query query = em.createQuery("SELECT n FROM News n WHERE n.region LIKE :r AND n.date > :d ORDER BY date DESC"); query.setParameter("r", region); query.setParameter("d", date); @SuppressWarnings("unchecked") List<News> news = q...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2014-125038 - Severity: MEDIUM - CVSS Score: 5.2 Description: data a funcionar mas sem proteger sql injection Function: newsMoreRecentThan File: Cnn-EJB/ejbModule/ejbs/NewsBean.java Repository: rfsimoes/IS_Projecto2 Fixed Code: public List<News> newsMoreRecentTh...
[ "CWE-89" ]
CVE-2014-125038
MEDIUM
5.2
rfsimoes/IS_Projecto2
newsMoreRecentThan
Cnn-EJB/ejbModule/ejbs/NewsBean.java
aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0
1
Analyze the following code function for security vulnerabilities
private static HashMap<String, Integer> getAuthenticatorTypeAndUIDForUser( IAccountAuthenticatorCache authCache, int userId) { HashMap<String, Integer> knownAuth = new LinkedHashMap<>(); for (RegisteredServicesCache.ServiceInfo<AuthenticatorDescription> service : authCache ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthenticatorTypeAndUIDForUser File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAuthenticatorTypeAndUIDForUser
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public Claims getClaims(String token) throws AuthenticationException { try { String[] split_string = token.split("\\."); String base64EncodedBody = split_string[1]; Base64 base64Url = new Base64(true); String body = new String(base64Url.decode(base64EncodedBody))...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClaims File: utility/src/main/java/eu/nimble/utility/validation/ValidationUtil.java Repository: nimble-platform/common The code follows secure coding practices.
[ "CWE-290" ]
CVE-2021-32631
MEDIUM
4
nimble-platform/common
getClaims
utility/src/main/java/eu/nimble/utility/validation/ValidationUtil.java
a59ad46733912a5580530e39cac0e6ebc83cc563
0
Analyze the following code function for security vulnerabilities
@Temporal(TemporalType.TIMESTAMP) @Column(name = "update_date", length = 19) public Date getUpdateDate() { return this.updateDate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUpdateDate File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getUpdateDate
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
public Object getObject(String classname, String key, String value, boolean failover) { try { BaseObject obj = this.getDoc().getObject(classname, key, value, failover); if (obj == null) { return null; } else { return newObjectApi(obj, getXW...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public static boolean isCertUnderestimated() { return Boolean.valueOf(JNLPRuntime.getConfiguration().getProperty(ConfigurationConstants.KEY_SECURITY_ITW_IGNORECERTISSUES)) && !JNLPRuntime.isSecurityEnabled(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCertUnderestimated File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
isCertUnderestimated
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
public int getUnreadMessageCount() { return mUnreadMessageCount; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUnreadMessageCount File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getUnreadMessageCount
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0