instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public ApiScenarioDTO getDto(String id) {
ApiScenarioRequest request = new ApiScenarioRequest();
request.setId(id);
List<ApiScenarioDTO> list = extApiScenarioMapper.list(request);
if (CollectionUtils.isNotEmpty(list)) {
return list.get(0);
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDto
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | getDto | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | private static String translateQuerySortBy(String sortBy, String originalQuery) {
if(sortBy == null)
return null;
List<RegExMatch> matches = RegEX.find(originalQuery, "structureName:([^\\s)]+)");
List<com.dotmarketing.portlets.structure.model.Field> fields = null;
Str... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: translateQuerySortBy
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | translateQuerySortBy | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void readFromTemplate(String template, XWikiContext context) throws XWikiException
{
// Keep the same behavior for backward compatibility
DocumentReference templateDocumentReference = null;
if (StringUtils.isNotEmpty(template)) {
templateDocumentReference =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFromTemplate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | readFromTemplate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private static void updateFlippingStrategy(Feature fp, String strategy, String strategyParams) {
if (null != strategy && !strategy.isEmpty()) {
try {
Class<?> strategyClass = Class.forName(strategy);
FlippingStrategy fstrategy = (FlippingStrategy) strategyCla... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-44262
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fix: Validate FlippingStrategy in various parsers (#624)
Function: updateFlippingStrategy
File: ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java
Repository: ff4j
Fixed Code:
pri... | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | updateFlippingStrategy | ff4j-web/src/main/java/org/ff4j/web/embedded/ConsoleOperations.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public ServerHttpResponse addCloseHandler(Runnable onClose) {
this.response.closeHandler(new Handler<Void>() {
@Override
public void handle(Void v) {
onClose.run();
}
});
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCloseHandler
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code follows ... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | addCloseHandler | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | public static void specialFilterContentForOnlineReport(String value) {
String specialXssStr = " exec | insert | delete | update | drop | chr | mid | master | truncate | char | declare |user()";
String[] xssArr = specialXssStr.split("\\|");
if (value == null || "".equals(value)) {
return;
}
// 统一转为小写
valu... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2022-45206
- Severity: CRITICAL
- CVSS Score: 9.8
Description: sql注入检查更加严格,修复/sys/duplicate/check存在sql注入漏洞 #4129
Function: specialFilterContentForOnlineReport
File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java
Repository: jeecgbo... | [
"CWE-89"
] | CVE-2022-45206 | CRITICAL | 9.8 | jeecgboot/jeecg-boot | specialFilterContentForOnlineReport | jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java | f18ced524c9ec13e876bfb74785a1b112cc8b6bb | 1 |
Analyze the following code function for security vulnerabilities | boolean dumpBinderProxiesCounts(PrintWriter pw, SparseIntArray counts, String header) {
if(counts != null) {
pw.println(header);
for (int i = 0; i < counts.size(); i++) {
final int uid = counts.keyAt(i);
final int binderCount = counts.valueAt(i);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpBinderProxiesCounts
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | dumpBinderProxiesCounts | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onRemoteOperationFinish(RemoteOperation operation, RemoteOperationResult result) {
if (operation instanceof GetServerInfoOperation) {
if (operation.hashCode() == mWaitingForOpId) {
onGetServerInfoFinish(result);
} // else nothing ; only the las... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRemoteOperationFinish
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | onRemoteOperationFinish | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public DhcpResultsParcelable syncGetDhcpResultsParcelable() {
synchronized (mDhcpResultsParcelableLock) {
return mDhcpResultsParcelable;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncGetDhcpResultsParcelable
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | syncGetDhcpResultsParcelable | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isSmEnabled() {
return smEnabledSyncPoint.wasSuccessful();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSmEnabled
File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | isSmEnabled | smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
public boolean isAutojoinEnabled() {
return mIsAutojoinEnabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAutojoinEnabled
File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | isAutojoinEnabled | framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | public void pokeDrawLock(Session session, IBinder token) {
synchronized (mWindowMap) {
WindowState window = windowForClientLocked(session, token, false);
if (window != null) {
window.pokeDrawLockLw(mDrawLockTimeoutMillis);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pokeDrawLock
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | pokeDrawLock | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @TestOnly
public void submoduleAdd(String repoUrl, String submoduleNameToPutInGitSubmodules, String folder) {
String[] addSubmoduleWithSameNameArgs = new String[]{"submodule", "add", repoUrl, folder};
String[] changeSubmoduleNameInGitModules = new String[]{"config", "--file", ".gitmodules", "--renam... | Vulnerability Classification:
- CWE: CWE-77
- CVE: CVE-2021-43286
- Severity: MEDIUM
- CVSS Score: 6.5
Description: #000 - Validate URLs provided
- Disallow URLs which are obviously not URLs.
Function: submoduleAdd
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
... | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | submoduleAdd | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 1 |
Analyze the following code function for security vulnerabilities | @Before
public void setup() throws WebdavException {
when(request.getContentType()).thenReturn("application/xml");
requestPars = new PostRequestPars(request, webdavNsIntf, UUID.randomUUID().toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setup
File: src/test/java/org/bedework/webdav/servlet/common/TestPostRequestPars.java
Repository: Bedework/bw-webdav
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | setup | src/test/java/org/bedework/webdav/servlet/common/TestPostRequestPars.java | 67283fb8b9609acdb1a8d2e7fefe195b4a261062 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setPassword(String password) {
for (Authentication auth : authentications.values()) {
if (auth instanceof HttpBasicAuth) {
((HttpBasicAuth) auth).setPassword(password);
return this;
}
}
throw new RuntimeException("No HTTP basic authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPassword
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding pr... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setPassword | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void startTrackingAppOpsChange(@NonNull String packageName, int uid) {
// The package is already registered.
if (mAppOpsChangedListenerPerApp.containsKey(packageName)) return;
AppOpsChangedListener appOpsChangedListener = new AppOpsChangedListener(packageName, uid);
mAppOps.start... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startTrackingAppOpsChange
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | startTrackingAppOpsChange | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | private String classname(String name) {
if (name.equals(Jooby.class.getName()) || name.equals("org.jooby.Kooby")) {
return SourceProvider.INSTANCE.get()
.map(StackTraceElement::getClassName)
.orElse(name);
}
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: classname
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | classname | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | protected void answerJSON(XWikiContext context, int status, Map<String, String> answer) throws XWikiException
{
ObjectMapper mapper = new ObjectMapper();
try {
String jsonAnswerAsString = mapper.writeValueAsString(answer);
context.getResponse().setContentType("application/js... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: answerJSON
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-29208 | HIGH | 7.5 | xwiki/xwiki-platform | answerJSON | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java | d9e947559077e947315bf700c5703dfc7dd8a8d7 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void executeNSU() throws Exception {
final DeferredGroupException dge = mock(DeferredGroupException.class);
when(dge.getCause()).thenReturn(new NoSuchUniqueName("foo", "metrics"));
when(query_result.configureFromQuery((TSQuery)any(), anyInt()))
.thenReturn(Deferred.fromError(dge));
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-25827
- Severity: MEDIUM
- CVSS Score: 6.1
Description: Fix for #2269 and #2267 XSS vulnerability.
Escaping the user supplied input when outputing the HTML for the old BadRequest
HTML handlers should help. Thanks to the reporters.
Fixes CVE-2018-13003.
Funct... | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | executeNSU | test/tsd/TestQueryRpc.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 1 |
Analyze the following code function for security vulnerabilities | public abstract InputStream getThemeResourceAsStream(UI ui,
String themeName, String resource) throws IOException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThemeResourceAsStream
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | getThemeResourceAsStream | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | private void doFileRetrieve(HttpSession session, HttpServletRequest request,
HttpServletResponse response) throws IOException {
try {
String userId = null;
// if we want front end access, this validation would need to be altered
if(UtilMethods.isSet(session.getAttribute("USER_ID"))) {
userId = (Stri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doFileRetrieve
File: dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | doFileRetrieve | dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java | ab2bb2e00b841d131b8734227f9106e3ac31bb99 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void closeSystemDialogs(String reason) {
mAtmInternal.closeSystemDialogs(reason);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeSystemDialogs
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | closeSystemDialogs | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void fatalError(SAXParseException ex) throws SAXParseException {
throw new SAXParseException(makeBetterErrorString("Fatal Error", ex),
ex.getPublicId(), ex.getSystemId(), ex.getLineNumber(), ex.getColumnNumber());
// throw new RuntimeException(makeBetterErrorString("Fatal ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fatalError
File: src/edu/stanford/nlp/util/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-0239 | HIGH | 7.5 | stanfordnlp/CoreNLP | fatalError | src/edu/stanford/nlp/util/XMLUtils.java | 1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd | 0 |
Analyze the following code function for security vulnerabilities | protected synchronized void deployWatch(File warDir, final File deployTarDir, String virtualHost) {
server.setHost(virtualHost);
final HashSet<String> apps = new HashSet<String>();
warDir.listFiles(new FileFilter() {
public boolean accept(File file) {
if (file.isDirectory() == false) {
String name = fil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deployWatch
File: 1.x/src/rogatkin/web/WarRoller.java
Repository: drogatkin/TJWS2
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4594 | CRITICAL | 9.8 | drogatkin/TJWS2 | deployWatch | 1.x/src/rogatkin/web/WarRoller.java | 1bac15c496ec54efe21ad7fab4e17633778582fc | 0 |
Analyze the following code function for security vulnerabilities | private void reuseExistingPort(int port) {
getLogger().info("Reusing webpack-dev-server running at {}:{}",
WEBPACK_HOST, port);
// Save running port for next usage
saveRunningDevServerPort();
watchDog.set(null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reuseExistingPort
File: flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | reuseExistingPort | flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | void validateName(K name); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateName
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | validateName | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | private int jjMoveStringLiteralDfa0_1()
{
switch(curChar)
{
case 33:
jjmatchedKind = 39;
return jjMoveStringLiteralDfa1_1(0x2000000000L);
case 37:
return jjStopAtPos(0, 53);
case 38:
return jjMoveStringLiteralDfa1_1(0x20000000000L);
case 40:
ret... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jjMoveStringLiteralDfa0_1
File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
Repository: jakartaee/expression-language
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2021-28170 | MEDIUM | 5 | jakartaee/expression-language | jjMoveStringLiteralDfa0_1 | impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java | b6a3943ac5fba71cbc6719f092e319caa747855b | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_SECURITY_LOGGING, conditional = true)
public void setSecurityLoggingEnabled(@Nullable ComponentName admin, boolean enabled) {
throwIfParentInstance("setSecurityLoggingEnabled");
try {
mService.setSecurityLoggingEnabled(admin, mContext.getP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSecurityLoggingEnabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setSecurityLoggingEnabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private static HandshakeStatus pendingStatus(int pendingStatus) {
// Depending on if there is something left in the BIO we need to WRAP or UNWRAP
return pendingStatus > 0 ? NEED_WRAP : NEED_UNWRAP;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pendingStatus
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | pendingStatus | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | public void removeFromTree() {
if (getOwner() instanceof StateTree) {
ComponentUtil.setData(((StateTree) getOwner()).getUI(),
ReplacedViaPreserveOnRefresh.class, REPLACED_MARKER);
}
visitNodeTree(StateNode::reset);
setParent(null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeFromTree
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | removeFromTree | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public String getURLToLogout()
{
return getURL("XWiki", "XWikiLogin", "logout");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLToLogout
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getURLToLogout | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void index(short siteId, Serializable[] ids) {
dao.index(siteId, ids);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: index
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | index | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | private void handlePendingSystemServerWtfs(
final LinkedList<Pair<String, ApplicationErrorReport.CrashInfo>> list) {
ProcessRecord proc;
synchronized (mPidsSelfLocked) {
proc = mPidsSelfLocked.get(MY_PID);
}
for (Pair<String, ApplicationErrorReport.CrashInfo> p = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handlePendingSystemServerWtfs
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | handlePendingSystemServerWtfs | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public InternetResource createUserResource(boolean cacheable,
boolean session, String mime) throws FacesException {
String path = getUserResourceKey(cacheable, session, mime);
InternetResource userResource;
try {
userResource = getResource(path);
} catch (ResourceNotFoundException e) {
userResource = n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createUserResource
File: framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java
Repository: nuxeo/richfaces-3.3
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2013-4521 | HIGH | 7.5 | nuxeo/richfaces-3.3 | createUserResource | framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java | 6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isPackageAllowedToAccessCalendarForUser(String packageName,
int userHandle) {
if (!mHasFeature) {
return false;
}
Preconditions.checkStringNotEmpty(packageName, "Package name is null or empty");
Preconditions.checkArgumentNonnegative(u... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPackageAllowedToAccessCalendarForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isPackageAllowedToAccessCalendarForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected String processHandleFile(Context c, Item i, String path, String filename)
{
File file = new File(path + File.separatorChar + filename);
String result = null;
System.out.println("Processing handle file: " + filename);
if (file.exists())
{
BufferedReader ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processHandleFile
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | processHandleFile | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | protected void setWaitingForResult(boolean waitingForResult) {
this.waitingForResult = waitingForResult;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWaitingForResult
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setWaitingForResult | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | static byte[] generateApkVerity(String apkPath, ByteBufferFactory bufferFactory)
throws IOException, SignatureNotFoundException, SecurityException, DigestException,
NoSuchAlgorithmException {
try (RandomAccessFile apk = new RandomAccessFile(apkPath, "r")) {
SignatureIn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateApkVerity
File: core/java/android/util/apk/ApkSignatureSchemeV2Verifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | generateApkVerity | core/java/android/util/apk/ApkSignatureSchemeV2Verifier.java | 84df68840b6f2407146e722ebd95a7d8bc6e3529 | 0 |
Analyze the following code function for security vulnerabilities | protected AlgorithmParameterSpec localEngineGetParameterSpec(Class paramSpec)
throws InvalidParameterSpecException
{
if (paramSpec == AlgorithmParameterSpec.class || GcmSpecUtil.isGcmSpec(paramSpec))
{
if (GcmSpecUtil.gcmSpecExists())
{
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: localEngineGetParameterSpec
File: prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2016-1000339 | MEDIUM | 5 | bcgit/bc-java | localEngineGetParameterSpec | prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java | 413b42f4d770456508585c830cfcde95f9b0e93b | 0 |
Analyze the following code function for security vulnerabilities | private void startKeyguardExitAnimation(@WindowManager.TransitionOldType int transit,
long startTime, long fadeoutDuration,
RemoteAnimationTarget[] apps, RemoteAnimationTarget[] wallpapers,
RemoteAnimationTarget[] nonApps, IRemoteAnimationFinishedCallback finishedCallback) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startKeyguardExitAnimation
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | startKeyguardExitAnimation | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Long getTimeMillis(CharSequence name) {
return headers.getTimeMillis(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTimeMillis
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | getTimeMillis | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | public void continuePendingReload() {
if (mNativeContentViewCore != 0) nativeContinuePendingReload(mNativeContentViewCore);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: continuePendingReload
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | continuePendingReload | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void unlockOrientation() {
if (getActivity() == null) {
return;
}
getActivity().setRequestedOrientation(ActivityInfo.SCREEN_ORIENTATION_SENSOR);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unlockOrientation
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | unlockOrientation | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | protected void loadMetadata(Context c, Item myitem, String path)
throws SQLException, IOException, ParserConfigurationException,
SAXException, TransformerException, AuthorizeException
{
// Load the dublin core metadata
loadDublinCore(c, myitem, path + "dublin_core.xml");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadMetadata
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | loadMetadata | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | @Beta
public static void createParentDirs(File file) throws IOException {
checkNotNull(file);
File parent = file.getCanonicalFile().getParentFile();
if (parent == null) {
/*
* The given directory is a filesystem root. All zero of its ancestors exist. This doesn't
* mean that the root i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createParentDirs
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-8908 | LOW | 2.1 | google/guava | createParentDirs | guava/src/com/google/common/io/Files.java | fec0dbc4634006a6162cfd4d0d09c962073ddf40 | 0 |
Analyze the following code function for security vulnerabilities | private ArrayList<File> getAllRecordingsFor(String recordId) {
String[] format = getPlaybackFormats(publishedDir);
ArrayList<File> ids = new ArrayList<File>();
for (int i = 0; i < format.length; i++) {
List<File> recordings = getDirectories(publishedDir + File.separatorChar + format... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllRecordingsFor
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | getAllRecordingsFor | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | boolean validateAssociationAllowedLocked(String pkg1, int uid1, String pkg2, int uid2) {
ensureAllowedAssociations();
// Interactions with the system uid are always allowed, since that is the core system
// that everyone needs to be able to interact with. Also allow reflexive associations
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateAssociationAllowedLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | validateAssociationAllowedLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private HttpServletRequest wrapMultipartRequest(HttpServletRequest request)
throws ServletException, FileSizeLimitExceededException
{
HttpServletRequest wrappedRequest;
try
{
// if not already wrapped
if (!Class.forName("org.dspace.app.webui.util.FileUplo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wrapMultipartRequest
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31194 | HIGH | 7.2 | DSpace | wrapMultipartRequest | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java | d1dd7d23329ef055069759df15cfa200c8e3 | 0 |
Analyze the following code function for security vulnerabilities | private RemoteViews applyStandardTemplateWithActions(int layoutId,
StandardTemplateParams p, TemplateBindResult result) {
RemoteViews big = applyStandardTemplate(layoutId, p, result);
resetStandardTemplateWithActions(big);
bindSnoozeAction(big, p);
// col... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyStandardTemplateWithActions
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | applyStandardTemplateWithActions | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private static void maybePruneOldTraces(File tracesDir) {
final File[] files = tracesDir.listFiles();
if (files == null) return;
final int max = SystemProperties.getInt("tombstoned.max_anr_count", 64);
final long now = System.currentTimeMillis();
try {
Arrays.sort(fi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybePruneOldTraces
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | maybePruneOldTraces | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | boolean isValidArgs(int args)
{
return termType == UserFunctions.FunctionType.IDENTITY || terms.length == args;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidArgs
File: app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java
Repository: mkulesh/microMathematics
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000821 | HIGH | 7.5 | mkulesh/microMathematics | isValidArgs | app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java | 5c05ac8de16c569ff0a1816f20be235090d3dd9d | 0 |
Analyze the following code function for security vulnerabilities | @GetMapping("/logout")
public String logout(HttpSession session) {
User user = getUser();
if (user != null) {
// 清除redis里的缓存
userService.delRedisUser(user);
// 清除session里的用户信息
session.removeAttribute("_user");
// 清除cookie里的用户token
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logout
File: src/main/java/co/yiiu/pybbs/controller/front/IndexController.java
Repository: atjiu/pybbs
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-23391 | MEDIUM | 4.3 | atjiu/pybbs | logout | src/main/java/co/yiiu/pybbs/controller/front/IndexController.java | 7d83b97d19f5fed9f29f72e654ef3c2818021b4d | 0 |
Analyze the following code function for security vulnerabilities | public int writeData(ByteBuffer[] srcs, int offset, int length) {
debug("JSSEngine: writeData()");
// This is the tough end of reading/writing. There's two potential
// places buffering could occur:
//
// - Inside the NSS library (unclear if this happens).
// - write_bu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeData
File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
Repository: dogtagpki/jss
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-4213 | HIGH | 7.5 | dogtagpki/jss | writeData | src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java | 5922560a78d0dee61af8a33cc9cfbf4cfa291448 | 0 |
Analyze the following code function for security vulnerabilities | public static String[] getResourceList(Class<?> base, String pckgname, String ext) {
String path = absPath(base, pckgname);
ArrayList<String> als = new ArrayList<String>();
try {
ClassLoader cld = Thread.currentThread().getContextClassLoader();
URL resource = cld.getResource(path);
File dir = new... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResourceList
File: src/main/java/org/lemsml/jlems/io/util/JUtil.java
Repository: LEMS/jLEMS
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4583 | HIGH | 8.8 | LEMS/jLEMS | getResourceList | src/main/java/org/lemsml/jlems/io/util/JUtil.java | 8c224637d7d561076364a9e3c2c375daeaf463dc | 0 |
Analyze the following code function for security vulnerabilities | private BaseObjectReference getBaseObjectReference(ObjectReference objectReference)
{
if (objectReference instanceof BaseObjectReference) {
return (BaseObjectReference) objectReference;
} else {
return new BaseObjectReference(objectReference);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBaseObjectReference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getBaseObjectReference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public abstract T createComponentSessionController(MainSessionController mainSessionCtrl,
ComponentContext componentContext); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createComponentSessionController
File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | createComponentSessionController | core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | private void writeAccountInfoLocked() {
if (Log.isLoggable(TAG_FILE, Log.VERBOSE)) {
Log.v(TAG_FILE, "Writing new " + mAccountInfoFile.getBaseFile());
}
FileOutputStream fos = null;
try {
fos = mAccountInfoFile.startWrite();
XmlSerializer out = new Fa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeAccountInfoLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | writeAccountInfoLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | @CalledByNative
public long getNativeContentViewCore() {
return mNativeContentViewCore;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNativeContentViewCore
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getNativeContentViewCore | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void showRecentApps() {
mPolicy.showRecentApps();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showRecentApps
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | showRecentApps | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public BaseObject getFirstObject(String fieldname, XWikiContext context)
{
Collection<List<BaseObject>> objectscoll = getXObjects().values();
if (objectscoll == null) {
return null;
}
for (List<BaseObject> objects : objectscoll) {
for (BaseObject obj : object... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getFirstObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final InputStream stream) {
try (final Reader reader = new InputStreamReader(stream)) {
return unmarshal(clazz, reader, VALIDATE_IF_POSSIBLE);
} catch (final IOException e) {
throw EXCEPTION_TRANSLATOR.translate("reading stream"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onPerform(CommandEvent commandEvent) {
if (!commandEvent.getGuild().getSelfMember().hasPermission(Permission.MANAGE_WEBHOOKS)) {
Main.getInstance().getCommandManager().sendMessage("I need the permission `Manage Webhooks` to use this command!", commandEvent.getChannel(), com... | Vulnerability Classification:
- CWE: CWE-863
- CVE: CVE-2022-39302
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Removed News-Channel.
Fixed Cross-Server Channel Exploit.
Fixed Temporal-Voice setup.
Function: onPerform
File: src/main/java/de/presti/ree6/commands/impl/community/InstagramNotifier.java
Repository: R... | [
"CWE-863"
] | CVE-2022-39302 | MEDIUM | 5.4 | Ree6-Applications/Ree6 | onPerform | src/main/java/de/presti/ree6/commands/impl/community/InstagramNotifier.java | 459b5bc24f0ea27e50031f563373926e94b9aa0a | 1 |
Analyze the following code function for security vulnerabilities | public void applyToView(@NonNull RemoteViews views, @IdRes int viewId,
float extraMarginDp) {
final float marginEndDp = getDpValue() + extraMarginDp;
if (viewId == R.id.notification_header) {
views.setFloat(R.id.notification_header,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyToView
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | applyToView | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Bean(name = "myPersistenceDataSourceDstu1", destroyMethod = "close")
public DataSource dataSource() {
BasicDataSource retVal = new BasicDataSource();
if (CommonConfig.isLocalTestMode()) {
retVal.setUrl("jdbc:derby:memory:fhirtest_dstu2;create=true");
} else {
retVal.setDriver(new org.postgresql.Driver());... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dataSource
File: hapi-fhir-jpaserver-uhnfhirtest/src/main/java/ca/uhn/fhirtest/config/TestDstu2Config.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | dataSource | hapi-fhir-jpaserver-uhnfhirtest/src/main/java/ca/uhn/fhirtest/config/TestDstu2Config.java | a5e4f56e1c6f55093ff334cf698ffdeea2f33960 | 0 |
Analyze the following code function for security vulnerabilities | public SparseArray<ArraySet<String>> getSystemPermissions() {
return mSystemPermissions;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemPermissions
File: services/core/java/com/android/server/SystemConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | getSystemPermissions | services/core/java/com/android/server/SystemConfig.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isNewConnectionInProgress(@NonNull String disconnectingSsid) {
String targetSsid = getConnectingSsidInternal();
// If network is removed while connecting, targetSsid can be null.
if (targetSsid == null) {
return false;
}
// When connecting to another n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNewConnectionInProgress
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | isNewConnectionInProgress | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public ImageTile getImageTile() {
return m_imageTile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImageTile
File: src-gwt/org/opencms/ade/galleries/client/ui/CmsResultItemWidget.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-31544 | MEDIUM | 5.4 | alkacon/opencms-core | getImageTile | src-gwt/org/opencms/ade/galleries/client/ui/CmsResultItemWidget.java | 21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e | 0 |
Analyze the following code function for security vulnerabilities | public void sendQueryRemoteConnectionServices() throws Exception {
mRemoteConnectionServices.clear();
for (IConnectionServiceAdapter a : mConnectionServiceAdapters) {
a.queryRemoteConnectionServices(new RemoteServiceCallback.Stub() {
@Override
public void onEr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendQueryRemoteConnectionServices
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | sendQueryRemoteConnectionServices | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public boolean shouldWriteUTFAsGetBytes() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldWriteUTFAsGetBytes
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | shouldWriteUTFAsGetBytes | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Enum read(ObjectDataInput in) throws IOException {
String clazzName = in.readUTF();
Class clazz;
try {
clazz = ClassLoaderUtil.loadClass(in.getClassLoader(), clazzName);
} catch (ClassNotFoundException e) {
throw ne... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | read | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public String getNoPrefixResourceUri() {
return noPrefixResourceUri;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNoPrefixResourceUri
File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
Repository: Bedework/bw-webdav
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | getNoPrefixResourceUri | src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java | 67283fb8b9609acdb1a8d2e7fefe195b4a261062 | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder importXMLBuilder(BaseXMLBuilder builder); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: importXMLBuilder
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | importXMLBuilder | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void tenantSeparation(TestContext context) {
String tenant = "tenantSeparation";
String tenant2 = "tenantSeparation2";
PostgresClient c1 = createA(context, tenant);
PostgresClient c2 = createA(context, tenant2);
fillA(context, c1, tenant, 5);
fillA(context, c2, tenant2, 8);
//... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tenantSeparation
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | tenantSeparation | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public String parseTemplate(String template, XWikiContext context)
{
String result = "";
try {
result = evaluateTemplate(template, context);
} catch (Exception e) {
LOGGER.debug("Exception while parsing template [{}] from /templates/", template, e);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseTemplate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | parseTemplate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mNonPersistentUsersLock")
@NonNull
ShortcutNonPersistentUser getNonPersistentUserLocked(@UserIdInt int userId) {
ShortcutNonPersistentUser ret = mShortcutNonPersistentUsers.get(userId);
if (ret == null) {
ret = new ShortcutNonPersistentUser(this, userId);
mSho... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNonPersistentUserLocked
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getNonPersistentUserLocked | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void deleteXWikiCollection(BaseCollection object, XWikiContext inputxcontext, boolean bTransaction,
boolean evict) throws XWikiException
{
if (object == null) {
return;
}
XWikiContext context = getExecutionXContext(inputxcontext, true);
tr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteXWikiCollection
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | deleteXWikiCollection | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | public void setClientTransportFactories(List<ClientTransport.Factory> factories) {
_transportFactories.clear();
_transportFactories.addAll(factories);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClientTransportFactories
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | setClientTransportFactories | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int onStartCommand(Intent intent, int flags, int startId) {
MediaButtonReceiver.handleIntent(mMediaSessionCompat, intent);
return super.onStartCommand(intent, flags, startId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStartCommand
File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onStartCommand | Ports/Android/src/com/codename1/media/BackgroundAudioService.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public boolean showEvenIfUnstableOption(@CheckForNull Class<? extends AbstractProject<?,?>> jobType) {
// UGLY: for promotion process, this option doesn't make sense.
return jobType == null || !jobType.getName().contains("PromotionProcess");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showEvenIfUnstableOption
File: core/src/main/java/hudson/tasks/BuildTrigger.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | showEvenIfUnstableOption | core/src/main/java/hudson/tasks/BuildTrigger.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @GET
@Path("threads")
@Operation(summary = "Get threads", description = "Retrieves the threads in the forum.")
@ApiResponse(responseCode = "200", description = "Request was successful.",
content = {
@Content(mediaType = "application/json", array = @ArraySchema(schema = @Schema(implementation = MessageVO.class... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThreads
File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | getThreads | src/main/java/org/olat/modules/fo/restapi/ForumWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | WindowState getReplacingWindow() {
if (mAnimatingExit && mWillReplaceWindow && mAnimateReplacingWindow) {
return this;
}
for (int i = mChildren.size() - 1; i >= 0; i--) {
final WindowState c = mChildren.get(i);
final WindowState replacing = c.getReplacingWindo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getReplacingWindow
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getReplacingWindow | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPasswordMinimumNumeric(ComponentName who, int length, boolean parent) {
if (!mHasFeature || notSupportedOnAutomotive("setPasswordMinimumNumeric")) {
return;
}
Objects.requireNonNull(who, "ComponentName is null");
final int userId = mInjector.userH... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPasswordMinimumNumeric
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setPasswordMinimumNumeric | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | Version fetchLastVersion(boolean ckPreview) throws IOException, ParseException {
String versionUrl;
if (ckPreview) {
versionUrl = Constants.ZRLOG_RESOURCE_DOWNLOAD_URL + "/preview/last.version.json";
} else {
versionUrl = Constants.ZRLOG_RESOURCE_DOWNLOAD_URL + "/release/... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fetchLastVersion
File: web/src/main/java/com/zrlog/web/plugin/UpdateVersionTimerTask.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | fetchLastVersion | web/src/main/java/com/zrlog/web/plugin/UpdateVersionTimerTask.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | public ComponentName getActivityClassForToken(IBinder token)
throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
mRemote.transact(GET_ACTIVITY_CLA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActivityClassForToken
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getActivityClassForToken | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private String getUriSegment(Uri uri, int index) {
if (uri != null) {
if (index == 0) {
return uri.getAuthority();
} else {
return uri.getPathSegments().get(index - 1);
}
} else {
return null;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUriSegment
File: services/core/java/com/android/server/content/ContentService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2426 | MEDIUM | 4.3 | android | getUriSegment | services/core/java/com/android/server/content/ContentService.java | 63363af721650e426db5b0bdfb8b2d4fe36abdb0 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void registerHandler(String iface, int what, Handler handler) {
SparseArray<Set<Handler>> ifaceHandlers = mHandlerMap.get(iface);
if (ifaceHandlers == null) {
ifaceHandlers = new SparseArray<>();
mHandlerMap.put(iface, ifaceHandlers);
}
Set<Han... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerHandler
File: service/java/com/android/server/wifi/WifiMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | registerHandler | service/java/com/android/server/wifi/WifiMonitor.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | List<Modification> findRecentModifications(int count) {
// Currently impossible to check modifications on a remote repository.
InMemoryStreamConsumer consumer = inMemoryConsumer();
bombUnless(pull(consumer), "Failed to run hg pull command: " + consumer.getAllOutput());
CommandLine hg = h... | Vulnerability Classification:
- CWE: CWE-77
- CVE: CVE-2022-29184
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Improve escaping of arguments when constructing Hg command calls
Function: findRecentModifications
File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
Repository: go... | [
"CWE-77"
] | CVE-2022-29184 | MEDIUM | 6.5 | gocd | findRecentModifications | domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java | 37d35115db2ada2190173f9413cfe1bc6c295ecb | 1 |
Analyze the following code function for security vulnerabilities | Pair<String, String> getDeviceOwnerRemoteBugreportUriAndHash() {
synchronized (getLockObject()) {
final String uri = mOwners.getDeviceOwnerRemoteBugreportUri();
return uri == null ? null
: new Pair<>(uri, mOwners.getDeviceOwnerRemoteBugreportHash());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerRemoteBugreportUriAndHash
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getDeviceOwnerRemoteBugreportUriAndHash | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Pure
private @Nullable Number getNumeric(
int columnIndex, int scale, boolean allowNaN) throws SQLException {
byte[] value = getRawValue(columnIndex);
if (value == null) {
return null;
}
if (isBinary(columnIndex)) {
int sqlType = getSQLType(columnIndex);
if (sqlType != Types.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNumeric
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getNumeric | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private static String renderString(String translationKey, Object[] parameters)
{
String word;
if (parameters.length == 0) {
word = translationKey;
} else {
String parametersString = Arrays.stream(parameters)
.map(String::valueOf)
.colle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: renderString
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-page/src/main/java/org/xwiki/test/page/LocalizationSetup.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2023-29213 | HIGH | 8.8 | xwiki/xwiki-platform | renderString | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-page/src/main/java/org/xwiki/test/page/LocalizationSetup.java | 49fdfd633ddfa346c522d2fe71754dc72c9496ca | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addIntHeader(String arg0, int arg1) {
// ignore
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addIntHeader
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | addIntHeader | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @JsonProperty
public String getName() {
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileAttribute.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getName | base/common/src/main/java/com/netscape/certsrv/profile/ProfileAttribute.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public String toXML() throws Exception {
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
DocumentBuilder builder = factory.newDocumentBuilder();
Document document = builder.newDocument();
Element element = toDOM(document);
document.appendChild(element);
... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-2414
- Severity: HIGH
- CVSS Score: 7.5
Description: Disable access to external entities when parsing XML
This reduces the vulnerability of XML parsers to XXE (XML external
entity) injection.
The best way to prevent XXE is to stop using XML altogether, whi... | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toXML | base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 1 |
Analyze the following code function for security vulnerabilities | public void setValidNotAfterFrom(String validNotAfterFrom) {
this.validNotAfterFrom = validNotAfterFrom;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValidNotAfterFrom
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setValidNotAfterFrom | base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void setValidator(Validator validator) {
this.validator = validator;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValidator
File: ext/java/nokogiri/XmlSchema.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | setValidator | ext/java/nokogiri/XmlSchema.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | public SSLContext getSSLContext() {
return sslContext;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSSLContext
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | getSSLContext | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public int getActivePasswordQuality(int userId) {
int quality = getKeyguardStoredPasswordQuality(userId);
if (isLockPasswordEnabled(quality, userId)) {
// Quality is a password and a password exists. Return the quality.
return quality;
}
if (isLockPatternEnabled... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActivePasswordQuality
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | getActivePasswordQuality | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Long> getQueueSizePerType()
{
return this.taskManager.getQueueSizePerType(this.xcontextProvider.get().getWikiId());
} | Vulnerability Classification:
- CWE: CWE-94
- CVE: CVE-2023-35150
- Severity: HIGH
- CVSS Score: 8.0
Description: XWIKI-20285: Improve escaping of the Invitation Application
- Introduce an internal role (DefaultXARExtensionIndex) to know if a document is provided by an extension
- Split index-api to index-api/index-d... | [
"CWE-94"
] | CVE-2023-35150 | HIGH | 8 | xwiki/xwiki-platform | getQueueSizePerType | xwiki-platform-core/xwiki-platform-index/xwiki-platform-index-api/src/main/java/org/xwiki/index/TaskConsumerScriptService.java | b65220a4d86b8888791c3b643074ebca5c089a3a | 1 |
Analyze the following code function for security vulnerabilities | private static boolean isScreenshotsDirNonHidden(@NonNull String[] relativePath,
@NonNull String name) {
if (name.equalsIgnoreCase(Environment.DIRECTORY_SCREENSHOTS)) {
return (relativePath.length == 1 &&
(TextUtils.isEmpty(relativePath[0]) || isDefaultDirectoryName(relat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isScreenshotsDirNonHidden
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | isScreenshotsDirNonHidden | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | public static String getProjectListString(List<Project> projects) {
return Items.toNameList(projects);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProjectListString
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getProjectListString | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.