instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public static Structure getStructureByVelocityVarName(String varName) { if(varName ==null) return new Structure(); Structure structure = null; String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'"; List<Structure> list = InodeFactory.getInodesOfClassBy...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2016-2355 - Severity: HIGH - CVSS Score: 7.5 Description: fixes #8848 Function: getStructureByVelocityVarName File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core Fixed Code: @SuppressWarnings("unchecked") public...
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructureByVelocityVarName
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
1
Analyze the following code function for security vulnerabilities
private String convertServiceName(String packageName, String serviceName) { if (TextUtils.isEmpty(serviceName)) { return null; } final String fullName; if (serviceName.startsWith(".")) { // Relative to the app package. Prepend the app package name. fu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertServiceName File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
convertServiceName
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
private static String fromTimeMillis(long value) { return StringValueConverter.INSTANCE.convertTimeMillis(value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromTimeMillis File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
fromTimeMillis
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override protected void initComponent() { if(android.os.Build.VERSION.SDK_INT == 21 && web.getLayerType() != layerType){ act.runOnUiThread(new Runnable() { @Override public void run() { web.setLayerType(layerType, null)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initComponent File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
initComponent
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public Registration addSelectionListener(SelectionListener<T> listener) throws UnsupportedOperationException { return getSelectionModel().addSelectionListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addSelectionListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addSelectionListener
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public ApiClient addDefaultHeader(String key, String value) { defaultHeaderMap.put(key, value); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDefaultHeader File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
addDefaultHeader
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setSamlHandlerChainClass(String samlHandlerChainClass) { logger .warn("Option 'samlHandlerChainClass' is deprecated and should not be used. This configuration is now set in picketlink.xml."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSamlHandlerChainClass File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure cod...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setSamlHandlerChainClass
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private void internalPrintln(Map<String, Object> options, Object object) { if (object == null) { return; } long start = new Date().getTime(); if (options.containsKey(Printer.EXCLUDE)) { List<String> colOut = optionList(Printer.EX...
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-50572 - Severity: MEDIUM - CVSS Score: 5.5 Description: GroovyEngine.execute cause an OOM exception, fixes #909 Function: internalPrintln File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 Fixed Code: @SuppressW...
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
internalPrintln
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
1
Analyze the following code function for security vulnerabilities
@GET @Path("async-writer-on-worker-thread") public AsyncWriterData asyncWriterOnWorkerThread() { return new AsyncWriterData(false, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: asyncWriterOnWorkerThread File: server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java Repository: resteasy The code follows secure coding practices.
[ "CWE-378" ]
CVE-2023-0482
MEDIUM
5.5
resteasy
asyncWriterOnWorkerThread
server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java
807d7456f2137cde8ef7c316707211bf4e542d56
0
Analyze the following code function for security vulnerabilities
private void addKeysToMap(String className) { try { Class z = Class.forName(className); // All the keys must exist in the en_US XML files first. The other // languages may have subsets but no unique keys. If this is a // problem // refactoring will nee...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addKeysToMap File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
addKeysToMap
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
private void updateApnDataToDatabase(Uri uri, ContentValues values) { ThreadUtils.postOnBackgroundThread(() -> { if (uri.equals(mCarrierUri)) { // Add a new apn to the database final Uri newUri = getContentResolver().insert(mCarrierUri, values); if (ne...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApnDataToDatabase File: src/com/android/settings/network/apn/ApnEditor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40125
HIGH
7.8
android
updateApnDataToDatabase
src/com/android/settings/network/apn/ApnEditor.java
63d464c3fa5c7b9900448fef3844790756e557eb
0
Analyze the following code function for security vulnerabilities
void handshakeFinished() throws SSLException { synchronized (OpenSslEngine.this) { if (!isDestroyed()) { id = SSL.getSessionId(ssl); cipher = toJavaCipherSuite(SSL.getCipherForSSL(ssl)); protocol = SSL.getVersion(ssl); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handshakeFinished File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
handshakeFinished
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public Configuration getConfiguration() { return configuration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfiguration File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
getConfiguration
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
efc44b7b0a5dd4f44773808840dd9785cabcf21c
0
Analyze the following code function for security vulnerabilities
public String getDeviceOwnerInfo() { return getString(LOCK_SCREEN_DEVICE_OWNER_INFO, UserHandle.USER_SYSTEM); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceOwnerInfo File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getDeviceOwnerInfo
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
private static String escape(String str) { StringBuilder sb = new StringBuilder(); for (char c : str.toCharArray()) { switch (c) { case '(': case ')': case '\\': sb.append('\\'); // intended fall-through default: sb.append(c); } } r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escape File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
escape
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private static String toLuceneDate(Date date) { try { SimpleDateFormat df = new SimpleDateFormat("yyyyMMddHHmmss"); String returnValue = df.format(date); return returnValue; } catch (Exception ex) { Logger.error(ESContentFactoryImpl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toLuceneDate File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
toLuceneDate
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void tempAllowlistForPendingIntentLocked(int callerPid, int callerUid, int targetUid, long duration, int type, @ReasonCode int reasonCode, String reason) { if (DEBUG_ALLOWLISTS) { Slog.d(TAG, "tempAllowlistForPendingIntentLocked(" + callerPid + ", " + callerUid + "...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempAllowlistForPendingIntentLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
tempAllowlistForPendingIntentLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public char getFileSystemSeparator() { return File.separatorChar; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileSystemSeparator File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getFileSystemSeparator
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private static CharacterStyle getColor(String color, boolean foreground) { int c = 0xff000000; if (!TextUtils.isEmpty(color)) { if (color.startsWith("@")) { Resources res = Resources.getSystem(); String name = color.substring(1); int colorRes ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColor File: core/java/android/content/res/StringBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getColor
core/java/android/content/res/StringBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public void setManagedProfileContactsAccessPolicy(PackagePolicy policy) { if (!mHasFeature) { return; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization((isProfileOwner(caller) && isManagedProfile(caller.get...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManagedProfileContactsAccessPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setManagedProfileContactsAccessPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String getEmail() { XWikiDocument userDoc; try { userDoc = getXWikiContext().getWiki().getDocument(this.user.getUser(), getXWikiContext()); BaseObject obj = userDoc.getObject("XWiki.XWikiUsers"); return obj.getStringValue("email"); } catch (Exceptio...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEmail File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-41929
MEDIUM
4.9
xwiki/xwiki-platform
getEmail
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
0
Analyze the following code function for security vulnerabilities
protected LocallyAvailableResource entryAt(File file) { return entryAt(RelativePathUtil.relativePath(baseDir, file)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: entryAt File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java Repository: gradle The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35946
MEDIUM
5.5
gradle
entryAt
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
0
Analyze the following code function for security vulnerabilities
private void sendPreface() { Http2PrefaceStreamSinkChannel preface = new Http2PrefaceStreamSinkChannel(this); flushChannelIgnoreFailure(preface); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendPreface File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
sendPreface
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
@Override public <T> T extractPayload(Object payload, Class<T> type) { try { return objectMapper.convertValue(payload, type); } catch (IllegalArgumentException e) { LOG.error("Error while deserializing payload", e); return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPayload File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
extractPayload
graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasManagedProfileContactsAccess(int userId, String packageName) { Preconditions.checkArgumentNonnegative(userId, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasCrossUsersPermission(caller, userId)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasManagedProfileContactsAccess File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
hasManagedProfileContactsAccess
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setupBackgroundLocationRequest(LocationRequest req) { Display d = Display.getInstance(); String priorityStr = d.getProperty("android.backgroundLocation.priority", "PRIORITY_BALANCED_POWER_ACCURACY"); String fastestIntervalStr = d.getProperty("android.backgroundLocation.fastestInterv...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setupBackgroundLocationRequest File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setupBackgroundLocationRequest
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public List<RequestFilter> getRequestFilters() { return Collections.unmodifiableList(requestFilters); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestFilters File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
getRequestFilters
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public void requestBugReport(int bugreportType) { String service = null; switch (bugreportType) { case ActivityManager.BUGREPORT_OPTION_FULL: service = "bugreport"; break; case ActivityManager.BUGREPORT_OPTION_INTERACTIVE: service =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private native void nativeDestroyWebContents(long nativeTabAndroid, boolean deleteNative);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeDestroyWebContents File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeDestroyWebContents
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public XWikiAttachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName) { XWikiContext context = this.contextProvider.get(); XWikiAttachment result = null; try { Part part = context.getRequest().getPart(fieldName); if (part != null) { ...
Vulnerability Classification: - CWE: CWE-749 - CVE: CVE-2023-26478 - Severity: HIGH - CVSS Score: 8.1 Description: XWIKI-20180: TemporaryAttachmentsScriptService#uploadTemporaryAttachment return an XWikiAttachment instance Function: uploadTemporaryAttachment File: xwiki-platform-core/xwiki-platform-store/xwiki-platfo...
[ "CWE-749" ]
CVE-2023-26478
HIGH
8.1
xwiki/xwiki-platform
uploadTemporaryAttachment
xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java
3c73c59e39b6436b1074d8834cf276916010014d
1
Analyze the following code function for security vulnerabilities
@Override public void startProcess(String processName, ApplicationInfo info, boolean knownToBeDead, boolean isTop, String hostingType, ComponentName hostingName) { try { if (Trace.isTagEnabled(Trace.TRACE_TAG_ACTIVITY_MANAGER)) { Trace.traceBegin(T...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startProcess File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startProcess
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private static byte[] generateSignatureFile( List<Integer> apkSignatureSchemeIds, DigestAlgorithm manifestDigestAlgorithm, String createdBy, OutputManifestFile manifest) throws NoSuchAlgorithmException { Manifest sf = new Manifest(); Attributes mainAttrs =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateSignatureFile File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
generateSignatureFile
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
private Token getTokenInSession(String tokenId, HttpServletRequest request, boolean pop) { Token token = null; HttpSession session = request.getSession(false); if (session != null) { token = getToken(tokenId, session, pop); } if (token == null) { String sessionId = request.getHeader(User...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTokenInSession File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getTokenInSession
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@POST @Path("externalpage") @Operation(summary = "Update an external page building block", description = "Update an external page building block") @ApiResponse(responseCode = "200", description = "The course node metadatas", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = Co...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachExternalPagePost File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
attachExternalPagePost
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
private void writeError(PollError error, OutputStream out) throws IOException { out.write(ERROR_TAG_OPEN_START); out.write(error.getCode().getBytes()); out.write(ERROR_TAG_OPEN_END); out.write(error.getMessage().getBytes()); out.write(ERROR_TAG_CLOSE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeError File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java Repository: seam2/jboss-seam The code follows secure coding practices.
[ "CWE-264", "CWE-200" ]
CVE-2013-6447
MEDIUM
5
seam2/jboss-seam
writeError
jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
090aa6252affc978a96c388e3fc2c1c2688d9bb5
0
Analyze the following code function for security vulnerabilities
@Override public void onCreate() { super.onCreate(); debugLog("onCreate()"); mBinder = new AdapterServiceBinder(this); mAdapterProperties = new AdapterProperties(this); mAdapterStateMachine = AdapterState.make(this, mAdapterProperties); mJniCallbacks = new JniCallba...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
onCreate
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public void updateShowImeWithHardKeyboard() { synchronized (mWindowMap) { final boolean showImeWithHardKeyboard = Settings.Secure.getIntForUser( mContext.getContentResolver(), Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0, mCurrentUserId) == 1; if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateShowImeWithHardKeyboard File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
updateShowImeWithHardKeyboard
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void done() { final int processing_time = processingTimeMillis(); httplatency.add(processing_time); logInfo("HTTP " + request().getUri() + " done in " + processing_time + "ms"); deferred.callback(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: done File: src/tsd/HttpQuery.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
done
src/tsd/HttpQuery.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public boolean getHintDisplayActionInline() { return (mFlags & FLAG_HINT_DISPLAY_INLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHintDisplayActionInline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getHintDisplayActionInline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformRotation(Object nativeTransform, float angle, float x, float y, float z) { CN1Matrix4f m = (CN1Matrix4f)nativeTransform; m.reset(); m.rotate(angle, x, y, z); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformRotation File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformRotation
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private List<String> removeInvalidPkgsForMeteredDataRestriction( int userId, List<String> pkgNames) { final Set<String> activeAdmins = getActiveAdminPackagesLocked(userId); final List<String> excludedPkgs = new ArrayList<>(); for (int i = pkgNames.size() - 1; i >= 0; --i) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeInvalidPkgsForMeteredDataRestriction File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
removeInvalidPkgsForMeteredDataRestriction
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void positionTaskInStack(int taskId, int stackId, int position) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "positionTaskInStack()"); if (stackId == HOME_STACK_ID) { throw new IllegalArgumentException( "positionTaskInStack: Attempt to change th...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: positionTaskInStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
positionTaskInStack
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
protected String getPrefixFromQualifiedName(String qualifiedName) { int colonPos = qualifiedName.indexOf(':'); if (colonPos > 0) { return qualifiedName.substring(0, colonPos); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPrefixFromQualifiedName File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
getPrefixFromQualifiedName
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public List<PeriodicSync> getPeriodicSyncs(EndPoint info) { synchronized (mAuthorities) { AuthorityInfo authorityInfo = getAuthorityLocked(info, "getPeriodicSyncs"); ArrayList<PeriodicSync> syncs = new ArrayList<PeriodicSync>(); if (authorityInfo != null) { fo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPeriodicSyncs File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getPeriodicSyncs
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
private static native long nativeAssetSeek(long assetPtr, long offset, int whence);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeAssetSeek File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeAssetSeek
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException { return ClassLoaderUtil.loadClass(classLoader, desc.getName()); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2016-10750 - Severity: MEDIUM - CVSS Score: 6.8 Description: Add basic protection against untrusted deserialization. Function: resolveClass File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast Fixed Code: @Override protected...
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
resolveClass
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
1
Analyze the following code function for security vulnerabilities
@Override public void createConference( PhoneAccountHandle connectionManagerPhoneAccount, String id, ConnectionRequest request, boolean isIncoming, boolean isUnknown, Session.Info sessionInfo) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createConference File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
createConference
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void grantEphemeralAccessLocked(int userId, Intent intent, int targetAppId, int ephemeralAppId) { getPackageManagerInternalLocked(). grantEphemeralAccess(userId, intent, targetAppId, ephemeralAppId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantEphemeralAccessLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
grantEphemeralAccessLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public int optInt(String key) { return optInt(key, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optInt File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optInt
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public boolean copyWiki(File sourceDirectory, File targetDirectory) { try { Path path = sourceDirectory.toPath(); Path destDir = targetDirectory.toPath(); Files.walkFileTree(path, new CopyVisitor(path, destDir)); return true; } catch (IOException e) { log.error("", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyWiki File: src/main/java/org/olat/modules/wiki/WikiManager.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
copyWiki
src/main/java/org/olat/modules/wiki/WikiManager.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
protected IssuesWithBLOBs insertIssues(IssuesUpdateRequest issuesRequest) { IssuesWithBLOBs issues = new IssuesWithBLOBs(); BeanUtils.copyBean(issues, issuesRequest); issues.setId(issuesRequest.getId()); issues.setPlatformId(issuesRequest.getPlatformId()); issues.setCreateTime(Sy...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: insertIssues File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
insertIssues
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void dispose(@Nullable Disposable disposable) { if (disposable != null && !disposable.isDisposed()) { disposable.dispose(); } else if (disposable == null) { if (signalingDisposable != null && !signalingDisposable.isDisposed()) { signalingDisposable.dispose...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispose File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
dispose
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
private boolean addProviderLocked(ResolveInfo ri) { if ((ri.activityInfo.applicationInfo.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) { return false; } if (!ri.activityInfo.isEnabled()) { return false; } ComponentName componentName = new Componen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addProviderLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
addProviderLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public int getTextLength() throws IOException { if (_currToken != null) { // null only before/after document if (_tokenIncomplete) { _finishToken(); } if (_currToken == JsonToken.VALUE_STRING) { return _textBuffer.size(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextLength File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
getTextLength
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@Override boolean forAllWindows(ToBooleanFunction<WindowState> callback, boolean traverseTopToBottom) { if (mChildren.isEmpty()) { // The window has no children so we just return it. return applyInOrderWithImeWindows(callback, traverseTopToBottom); } if (traverseTopT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forAllWindows File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
forAllWindows
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private void updateBasePath() { if (serverIndex != null) { setBasePath(servers.get(serverIndex).URL(serverVariables)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBasePath File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure codin...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateBasePath
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public boolean isBuiltinSoundAvailable(String soundIdentifier) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBuiltinSoundAvailable File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isBuiltinSoundAvailable
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated // since 2.12 protected Object _coerceNullToken(DeserializationContext ctxt, boolean isPrimitive) throws JsonMappingException { if (isPrimitive) { _verifyNullForPrimitive(ctxt); } return getNullValue(ctxt); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _coerceNullToken File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_coerceNullToken
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) { Map < String, Property<?>> result = new HashMap<>(); if (null != properties) { properties.forEach(property -> { // Initiate with name and value ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2022-44262 - Severity: CRITICAL - CVSS Score: 9.8 Description: fix: Add assignable check to PropertiesParser, YamlParser and XmlParser (#624) Function: parseProperties File: ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java Repository: ff4j ...
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
parseProperties
ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java
e915c026aef46b502934cb05a825ea2ea15eb9e6
1
Analyze the following code function for security vulnerabilities
private boolean isCallerChooserActivity() { // TODO(b/228975502): Migrate this check to a proper permission or role check final int callingUid = injectBinderCallingUid(); ComponentName systemChooser = injectChooserActivity(); if (systemChooser == null) { return false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCallerChooserActivity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
isCallerChooserActivity
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public boolean isOverWriteExistingData() { return overWriteExistingData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOverWriteExistingData File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
isOverWriteExistingData
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
@Override public String buildMetadataResponse(MetaData metaData) throws SAMLException { EntityDescriptorType root = new EntityDescriptorType(); root.setID("_" + metaData.id); root.setEntityID(metaData.entityId); if (metaData.idp != null) { IDPSSODescriptorType idp = new IDPSSODescriptorType(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildMetadataResponse File: src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java Repository: FusionAuth/fusionauth-samlv2 The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-27736
MEDIUM
4
FusionAuth/fusionauth-samlv2
buildMetadataResponse
src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
c66fb689d50010662f705d5b585c6388ce555dbd
0
Analyze the following code function for security vulnerabilities
@Override public void onFinishedClosing() { mSelectedAction = -1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFinishedClosing File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
onFinishedClosing
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
@Override protected <RemoteInterfaceType, RemoteCallResponseType, FinalResponseType> NodeResponse<FinalResponseType> doNodeApiCall( String nodeId, Class<RemoteInterfaceType> interfaceClass, Function<RemoteInterfaceType, Call<RemoteCallResponseType>> remoteInterfaceFunction, Funct...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doNodeApiCall File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
doNodeApiCall
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
@Override public long forceNetworkLogs() { Preconditions.checkCallAuthorization(isAdb(getCallerIdentity()) || hasCallingOrSelfPermission(permission.FORCE_DEVICE_POLICY_MANAGER_LOGS), "Caller must be shell or hold FORCE_DEVICE_POLICY_MANAGER_LOGS to call " ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forceNetworkLogs File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
forceNetworkLogs
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void startDelegateShellPermissionIdentity(int delegateUid, @Nullable String[] permissions) { if (UserHandle.getCallingAppId() != Process.SHELL_UID && UserHandle.getCallingAppId() != Process.ROOT_UID) { throw new SecurityException("Only the shell can d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startDelegateShellPermissionIdentity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startDelegateShellPermissionIdentity
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public AutoCompletionCandidates doAutoCompleteAssignedLabelString(@QueryParameter String value) { AutoCompletionCandidates c = new AutoCompletionCandidates(); Set<Label> labels = Jenkins.getInstance().getLabels(); List<String> queries = new AutoCompleteSeeder(value).getSeeds(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doAutoCompleteAssignedLabelString File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
doAutoCompleteAssignedLabelString
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public void killApplication(String pkg, int appId, int userId, String reason) { if (pkg == null) { return; } // Make sure the uid is valid. if (appId < 0) { Slog.w(TAG, "Invalid appid specified for pkg : " + pkg); return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: killApplication File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
killApplication
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
ObjectStreamField[] getLoadFields() { return loadFields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLoadFields File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
getLoadFields
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice<ApplicationInfo> getInstalledApplications(int flags, int userId) { if (!sUserManager.exists(userId)) return null; final boolean listUninstalled = (flags & PackageManager.GET_UNINSTALLED_PACKAGES) != 0; // writer synchronized (mPackages) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstalledApplications File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getInstalledApplications
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public String getSerialFrom() { return serialFrom; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSerialFrom File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getSerialFrom
base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void testWrongParameters() { assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createPgServer("-pgPort 8182")); assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createTcpServer("-tcpPort 8182")); assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createWe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testWrongParameters File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
testWrongParameters
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private List<EnforcingUser> getEnforcingUsers(Set<EnforcingAdmin> admins) { List<EnforcingUser> enforcingUsers = new ArrayList(); ComponentName deviceOwner = mOwners.getDeviceOwnerComponent(); for (EnforcingAdmin admin : admins) { if (deviceOwner != null ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEnforcingUsers File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getEnforcingUsers
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@MediumTest @Test public void testDropCdmaEnhancedPrivacyVoiceCall() throws Exception { mConnectionServiceFixtureA.mConnectionServiceDelegate.mProperties = Connection.PROPERTY_HAS_CDMA_VOICE_PRIVACY; IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212", mPh...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDropCdmaEnhancedPrivacyVoiceCall File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testDropCdmaEnhancedPrivacyVoiceCall
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public boolean isNearMeFeatureEnabled() { return CONF.postsNearMeEnabled(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNearMeFeatureEnabled File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isNearMeFeatureEnabled
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public void addOnShowModeChangedListener(@NonNull OnShowModeChangedListener listener) { addOnShowModeChangedListener(listener, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addOnShowModeChangedListener File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
addOnShowModeChangedListener
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
@Override public InternationalString getDescriptionText(final String code) throws FactoryException { IdentifiedObject identifiedObject = createObject(code); final Identifier identifier = identifiedObject.getName(); if (identifier instanceof GenericName) { return ((GenericName) id...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDescriptionText File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getDescriptionText
modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override public void deleteMediaPackage(String mediaPackageId, Date deletionDate) throws SearchServiceDatabaseException, NotFoundException { EntityManager em = null; EntityTransaction tx = null; try { em = emf.createEntityManager(); tx = em.getTransaction(); tx.begin(); SearchE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteMediaPackage File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
deleteMediaPackage
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
protected final void destroyContentViewCore(boolean deleteNativeWebContents) { if (mContentViewCore == null) return; destroyContentViewCoreInternal(mContentViewCore); if (mInfoBarContainer != null && mInfoBarContainer.getParent() != null) { mInfoBarContainer.removeFromParentView();...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroyContentViewCore File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
destroyContentViewCore
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override protected void dumpFilter(PrintWriter out, String prefix, PackageParser.ProviderIntentInfo filter) { out.print(prefix); out.print( Integer.toHexString(System.identityHashCode(filter.provider))); out.print(' '); filter....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpFilter File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
dumpFilter
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static HtmlForm getHtmlFormFromUiResource(ResourceFactory resourceFactory, FormService formService, HtmlFormEntryService htmlFormEntryService, String providerAndPath, Encounter encounter) throws IOException { int ind = providerAndPath.indexOf(':'); String provider = providerAndPath.substring(0, ind)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHtmlFormFromUiResource File: api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java Repository: openmrs/openmrs-module-htmlformentryui The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-4284
MEDIUM
6.1
openmrs/openmrs-module-htmlformentryui
getHtmlFormFromUiResource
api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java
811990972ea07649ae33c4b56c61c3b520895f07
0
Analyze the following code function for security vulnerabilities
public DisplayContent getDisplayContentLocked(final int displayId) { DisplayContent displayContent = mDisplayContents.get(displayId); if (displayContent == null) { final Display display = mDisplayManager.getDisplay(displayId); if (display != null) { displayContent...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisplayContentLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getDisplayContentLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public ApiClient setTempFolderPath(String tempFolderPath) { this.tempFolderPath = tempFolderPath; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTempFolderPath File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setTempFolderPath
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public int copySpaceBetweenWikis(String space, String sourceWiki, String targetWiki, String locale, boolean clean, XWikiContext context) throws XWikiException { String db = context.getWikiId(); int nb = 0; // Workaround for XWIKI-3915: Do not use XWikiStoreInterface#searchDocumentNam...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copySpaceBetweenWikis File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
copySpaceBetweenWikis
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
List<SysUserDepVo> getDepNamesByUserIds(@Param("userIds")List<String> userIds);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDepNamesByUserIds File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getDepNamesByUserIds
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public void setStudyEventAndFormMetaOC1_3TypesExpected() { this.unsetTypeExpected(); int i=1; this.setTypeExpected(i, TypeNames.INT);// definition_order ++i; this.setTypeExpected(i, TypeNames.INT); // crf_order ++i; this.setTypeExpected(i, TypeNames.INT); // edc.c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStudyEventAndFormMetaOC1_3TypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setStudyEventAndFormMetaOC1_3TypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public static Path getDeployedPath(Path path) throws IOException { return DEPLOYED_BASE_PATH.get().resolve(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeployedPath File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
getDeployedPath
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
public String getRenderedContent(String text, String sourceSyntaxId, String targetSyntaxId, XWikiContext context) { return getRenderedContent(text, sourceSyntaxId, targetSyntaxId, false, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void setUseDarkTextColors(boolean useDarkColors) { if (mUseDarkColors != null && mUseDarkColors.booleanValue() == useDarkColors) return; mUseDarkColors = useDarkColors; if (mUseDarkColors) { setTextColor(mDarkDefaultTextColor); setHighlightColor(mDarkHighlightColo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseDarkTextColors File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
setUseDarkTextColors
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting int injectBinderCallingUid() { return getCallingUid(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectBinderCallingUid File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectBinderCallingUid
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public List<SyncInfo> getCurrentSyncsCopy(int userId, boolean canAccessAccounts) { synchronized (mAuthorities) { final List<SyncInfo> syncs = getCurrentSyncsLocked(userId); final List<SyncInfo> syncsCopy = new ArrayList<SyncInfo>(); for (SyncInfo sync : syncs) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentSyncsCopy File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getCurrentSyncsCopy
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
@Override public void write(String string, int offset, int length) { builder.append(string, offset, length); tryFlush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
write
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public UserProperty newInstance(User user) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-2064
MEDIUM
5
jenkinsci/jenkins
newInstance
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
fbf96734470caba9364f04e0b77b0bae7293a1ec
0
Analyze the following code function for security vulnerabilities
private boolean getBooleanCarrierConfig(String key) { PersistableBundle b = PhoneGlobals.getInstance() .getCarrierConfigForSubId(mPhone.getSubId()); if (b == null) { b = PhoneGlobals.getInstance().getCarrierConfig(); } return b.getBoolean(key); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBooleanCarrierConfig File: src/com/android/phone/settings/VoicemailSettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
getBooleanCarrierConfig
src/com/android/phone/settings/VoicemailSettingsActivity.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
public void setCommentTitle(String commentTitle){ this.commentTitle = commentTitle; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCommentTitle File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setCommentTitle
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
@Override @BeforeMethod public void setUp(){ super.setUp(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUp File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
setUp
main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
79994e86da1a3eecc62723f4ba90f14a63ad0e72
0
Analyze the following code function for security vulnerabilities
protected String _finishTextToken(int ch) throws IOException { _tokenIncomplete = false; final int type = ((ch >> 5) & 0x7); ch &= 0x1F; // sanity check if (type != CBORConstants.MAJOR_TYPE_TEXT) { // should never happen so _throwInternal(); }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _finishTextToken File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_finishTextToken
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public void update(String table, Object entity, CQLWrapper filter, boolean returnUpdatedIds, Handler<AsyncResult<UpdateResult>> replyHandler) { String where = ""; if(filter != null){ where = filter.toString(); } update(table, entity, DEFAULT_JSONB_FIELD_NAME, where, returnUpdatedIds, replyHandle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
update
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@DimenRes public int getDesiredHeightResId() { return mDesiredHeightResId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDesiredHeightResId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getDesiredHeightResId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void onStart() { super.onStart(); if (this.reInitRequiredOnStart && this.conversation != null) { final Bundle extras = pendingExtras.pop(); reInit(this.conversation, extras != null); if (extras != null) { processExtras(extras); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStart File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onStart
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0