instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public static Structure getStructureByVelocityVarName(String varName)
{
if(varName ==null) return new Structure();
Structure structure = null;
String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'";
List<Structure> list = InodeFactory.getInodesOfClassBy... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2016-2355
- Severity: HIGH
- CVSS Score: 7.5
Description: fixes #8848
Function: getStructureByVelocityVarName
File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
Repository: dotCMS/core
Fixed Code:
@SuppressWarnings("unchecked")
public... | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | getStructureByVelocityVarName | src/com/dotmarketing/portlets/structure/factories/StructureFactory.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 1 |
Analyze the following code function for security vulnerabilities | private String convertServiceName(String packageName, String serviceName) {
if (TextUtils.isEmpty(serviceName)) {
return null;
}
final String fullName;
if (serviceName.startsWith(".")) {
// Relative to the app package. Prepend the app package name.
fu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertServiceName
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | convertServiceName | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 0 |
Analyze the following code function for security vulnerabilities | private static String fromTimeMillis(long value) {
return StringValueConverter.INSTANCE.convertTimeMillis(value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fromTimeMillis
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | fromTimeMillis | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void initComponent() {
if(android.os.Build.VERSION.SDK_INT == 21 && web.getLayerType() != layerType){
act.runOnUiThread(new Runnable() {
@Override
public void run() {
web.setLayerType(layerType, null)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initComponent
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | initComponent | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public Registration addSelectionListener(SelectionListener<T> listener)
throws UnsupportedOperationException {
return getSelectionModel().addSelectionListener(listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addSelectionListener
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addSelectionListener | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient addDefaultHeader(String key, String value) {
defaultHeaderMap.put(key, value);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addDefaultHeader
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | addDefaultHeader | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setSamlHandlerChainClass(String samlHandlerChainClass) {
logger
.warn("Option 'samlHandlerChainClass' is deprecated and should not be used. This configuration is now set in picketlink.xml.");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSamlHandlerChainClass
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure cod... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | setSamlHandlerChainClass | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private void internalPrintln(Map<String, Object> options, Object object) {
if (object == null) {
return;
}
long start = new Date().getTime();
if (options.containsKey(Printer.EXCLUDE)) {
List<String> colOut = optionList(Printer.EX... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-50572
- Severity: MEDIUM
- CVSS Score: 5.5
Description: GroovyEngine.execute cause an OOM exception, fixes #909
Function: internalPrintln
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
Fixed Code:
@SuppressW... | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | internalPrintln | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 1 |
Analyze the following code function for security vulnerabilities | @GET
@Path("async-writer-on-worker-thread")
public AsyncWriterData asyncWriterOnWorkerThread() {
return new AsyncWriterData(false, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asyncWriterOnWorkerThread
File: server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java
Repository: resteasy
The code follows secure coding practices. | [
"CWE-378"
] | CVE-2023-0482 | MEDIUM | 5.5 | resteasy | asyncWriterOnWorkerThread | server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java | 807d7456f2137cde8ef7c316707211bf4e542d56 | 0 |
Analyze the following code function for security vulnerabilities | private void addKeysToMap(String className) {
try {
Class z = Class.forName(className);
// All the keys must exist in the en_US XML files first. The other
// languages may have subsets but no unique keys. If this is a
// problem
// refactoring will nee... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addKeysToMap
File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
Repository: spacewalkproject/spacewalk
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2016-3079 | MEDIUM | 4.3 | spacewalkproject/spacewalk | addKeysToMap | java/code/src/com/redhat/rhn/common/localization/LocalizationService.java | 7b9ff9ad | 0 |
Analyze the following code function for security vulnerabilities | private void updateApnDataToDatabase(Uri uri, ContentValues values) {
ThreadUtils.postOnBackgroundThread(() -> {
if (uri.equals(mCarrierUri)) {
// Add a new apn to the database
final Uri newUri = getContentResolver().insert(mCarrierUri, values);
if (ne... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateApnDataToDatabase
File: src/com/android/settings/network/apn/ApnEditor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40125 | HIGH | 7.8 | android | updateApnDataToDatabase | src/com/android/settings/network/apn/ApnEditor.java | 63d464c3fa5c7b9900448fef3844790756e557eb | 0 |
Analyze the following code function for security vulnerabilities | void handshakeFinished() throws SSLException {
synchronized (OpenSslEngine.this) {
if (!isDestroyed()) {
id = SSL.getSessionId(ssl);
cipher = toJavaCipherSuite(SSL.getCipherForSSL(ssl));
protocol = SSL.getVersion(ssl);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handshakeFinished
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | handshakeFinished | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Configuration getConfiguration() {
return configuration;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfiguration
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | getConfiguration | client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java | efc44b7b0a5dd4f44773808840dd9785cabcf21c | 0 |
Analyze the following code function for security vulnerabilities | public String getDeviceOwnerInfo() {
return getString(LOCK_SCREEN_DEVICE_OWNER_INFO, UserHandle.USER_SYSTEM);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerInfo
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | getDeviceOwnerInfo | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | private static String escape(String str) {
StringBuilder sb = new StringBuilder();
for (char c : str.toCharArray()) {
switch (c) {
case '(':
case ')':
case '\\':
sb.append('\\');
// intended fall-through
default:
sb.append(c);
}
}
r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escape
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | escape | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private static String toLuceneDate(Date date) {
try {
SimpleDateFormat df = new SimpleDateFormat("yyyyMMddHHmmss");
String returnValue = df.format(date);
return returnValue;
} catch (Exception ex) {
Logger.error(ESContentFactoryImpl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toLuceneDate
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | toLuceneDate | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
void tempAllowlistForPendingIntentLocked(int callerPid, int callerUid, int targetUid,
long duration, int type, @ReasonCode int reasonCode, String reason) {
if (DEBUG_ALLOWLISTS) {
Slog.d(TAG, "tempAllowlistForPendingIntentLocked(" + callerPid + ", " + callerUid + "... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tempAllowlistForPendingIntentLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | tempAllowlistForPendingIntentLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public char getFileSystemSeparator() {
return File.separatorChar;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileSystemSeparator
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getFileSystemSeparator | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private static CharacterStyle getColor(String color, boolean foreground) {
int c = 0xff000000;
if (!TextUtils.isEmpty(color)) {
if (color.startsWith("@")) {
Resources res = Resources.getSystem();
String name = color.substring(1);
int colorRes ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColor
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getColor | core/java/android/content/res/StringBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setManagedProfileContactsAccessPolicy(PackagePolicy policy) {
if (!mHasFeature) {
return;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization((isProfileOwner(caller)
&& isManagedProfile(caller.get... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setManagedProfileContactsAccessPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setManagedProfileContactsAccessPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String getEmail()
{
XWikiDocument userDoc;
try {
userDoc = getXWikiContext().getWiki().getDocument(this.user.getUser(), getXWikiContext());
BaseObject obj = userDoc.getObject("XWiki.XWikiUsers");
return obj.getStringValue("email");
} catch (Exceptio... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEmail
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-41929 | MEDIUM | 4.9 | xwiki/xwiki-platform | getEmail | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java | 0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd | 0 |
Analyze the following code function for security vulnerabilities | protected LocallyAvailableResource entryAt(File file) {
return entryAt(RelativePathUtil.relativePath(baseDir, file));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: entryAt
File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
Repository: gradle
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35946 | MEDIUM | 5.5 | gradle | entryAt | subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java | 859eae2b2acf751ae7db3c9ffefe275aa5da0d5d | 0 |
Analyze the following code function for security vulnerabilities | private void sendPreface() {
Http2PrefaceStreamSinkChannel preface = new Http2PrefaceStreamSinkChannel(this);
flushChannelIgnoreFailure(preface);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendPreface
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | sendPreface | core/src/main/java/io/undertow/protocols/http2/Http2Channel.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public <T> T extractPayload(Object payload, Class<T> type) {
try {
return objectMapper.convertValue(payload, type);
} catch (IllegalArgumentException e) {
LOG.error("Error while deserializing payload", e);
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractPayload
File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2024-24824 | HIGH | 8.8 | Graylog2/graylog2-server | extractPayload | graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java | 75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasManagedProfileContactsAccess(int userId, String packageName) {
Preconditions.checkArgumentNonnegative(userId, "Invalid userId");
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(hasCrossUsersPermission(caller, userId));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasManagedProfileContactsAccess
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | hasManagedProfileContactsAccess | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void setupBackgroundLocationRequest(LocationRequest req) {
Display d = Display.getInstance();
String priorityStr = d.getProperty("android.backgroundLocation.priority", "PRIORITY_BALANCED_POWER_ACCURACY");
String fastestIntervalStr = d.getProperty("android.backgroundLocation.fastestInterv... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setupBackgroundLocationRequest
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setupBackgroundLocationRequest | Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public List<RequestFilter> getRequestFilters() {
return Collections.unmodifiableList(requestFilters);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestFilters
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | getRequestFilters | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public void requestBugReport(int bugreportType) {
String service = null;
switch (bugreportType) {
case ActivityManager.BUGREPORT_OPTION_FULL:
service = "bugreport";
break;
case ActivityManager.BUGREPORT_OPTION_INTERACTIVE:
service =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReport
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | requestBugReport | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeDestroyWebContents(long nativeTabAndroid, boolean deleteNative); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeDestroyWebContents
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeDestroyWebContents | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public XWikiAttachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName)
{
XWikiContext context = this.contextProvider.get();
XWikiAttachment result = null;
try {
Part part = context.getRequest().getPart(fieldName);
if (part != null) {
... | Vulnerability Classification:
- CWE: CWE-749
- CVE: CVE-2023-26478
- Severity: HIGH
- CVSS Score: 8.1
Description: XWIKI-20180: TemporaryAttachmentsScriptService#uploadTemporaryAttachment return an XWikiAttachment instance
Function: uploadTemporaryAttachment
File: xwiki-platform-core/xwiki-platform-store/xwiki-platfo... | [
"CWE-749"
] | CVE-2023-26478 | HIGH | 8.1 | xwiki/xwiki-platform | uploadTemporaryAttachment | xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java | 3c73c59e39b6436b1074d8834cf276916010014d | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void startProcess(String processName, ApplicationInfo info, boolean knownToBeDead,
boolean isTop, String hostingType, ComponentName hostingName) {
try {
if (Trace.isTagEnabled(Trace.TRACE_TAG_ACTIVITY_MANAGER)) {
Trace.traceBegin(T... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startProcess
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | startProcess | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private static byte[] generateSignatureFile(
List<Integer> apkSignatureSchemeIds,
DigestAlgorithm manifestDigestAlgorithm,
String createdBy,
OutputManifestFile manifest) throws NoSuchAlgorithmException {
Manifest sf = new Manifest();
Attributes mainAttrs =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateSignatureFile
File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | generateSignatureFile | src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java | 41d882324288085fd32ae0bb70dc85f5fd0e2be7 | 0 |
Analyze the following code function for security vulnerabilities | private Token getTokenInSession(String tokenId, HttpServletRequest request, boolean pop) {
Token token = null;
HttpSession session = request.getSession(false);
if (session != null) {
token = getToken(tokenId, session, pop);
}
if (token == null) {
String sessionId = request.getHeader(User... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTokenInSession
File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | getTokenInSession | core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | @POST
@Path("externalpage")
@Operation(summary = "Update an external page building block", description = "Update an external page building block")
@ApiResponse(responseCode = "200", description = "The course node metadatas", content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = Co... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachExternalPagePost
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | attachExternalPagePost | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | private void writeError(PollError error, OutputStream out)
throws IOException
{
out.write(ERROR_TAG_OPEN_START);
out.write(error.getCode().getBytes());
out.write(ERROR_TAG_OPEN_END);
out.write(error.getMessage().getBytes());
out.write(ERROR_TAG_CLOSE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeError
File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
Repository: seam2/jboss-seam
The code follows secure coding practices. | [
"CWE-264",
"CWE-200"
] | CVE-2013-6447 | MEDIUM | 5 | seam2/jboss-seam | writeError | jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java | 090aa6252affc978a96c388e3fc2c1c2688d9bb5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCreate() {
super.onCreate();
debugLog("onCreate()");
mBinder = new AdapterServiceBinder(this);
mAdapterProperties = new AdapterProperties(this);
mAdapterStateMachine = AdapterState.make(this, mAdapterProperties);
mJniCallbacks = new JniCallba... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | onCreate | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public void updateShowImeWithHardKeyboard() {
synchronized (mWindowMap) {
final boolean showImeWithHardKeyboard = Settings.Secure.getIntForUser(
mContext.getContentResolver(), Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0,
mCurrentUserId) == 1;
if... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateShowImeWithHardKeyboard
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | updateShowImeWithHardKeyboard | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void done() {
final int processing_time = processingTimeMillis();
httplatency.add(processing_time);
logInfo("HTTP " + request().getUri() + " done in " + processing_time + "ms");
deferred.callback(null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: done
File: src/tsd/HttpQuery.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | done | src/tsd/HttpQuery.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getHintDisplayActionInline() {
return (mFlags & FLAG_HINT_DISPLAY_INLINE) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHintDisplayActionInline
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getHintDisplayActionInline | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTransformRotation(Object nativeTransform, float angle, float x, float y, float z) {
CN1Matrix4f m = (CN1Matrix4f)nativeTransform;
m.reset();
m.rotate(angle, x, y, z);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTransformRotation
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setTransformRotation | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private List<String> removeInvalidPkgsForMeteredDataRestriction(
int userId, List<String> pkgNames) {
final Set<String> activeAdmins = getActiveAdminPackagesLocked(userId);
final List<String> excludedPkgs = new ArrayList<>();
for (int i = pkgNames.size() - 1; i >= 0; --i) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeInvalidPkgsForMeteredDataRestriction
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | removeInvalidPkgsForMeteredDataRestriction | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void positionTaskInStack(int taskId, int stackId, int position) {
enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "positionTaskInStack()");
if (stackId == HOME_STACK_ID) {
throw new IllegalArgumentException(
"positionTaskInStack: Attempt to change th... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: positionTaskInStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | positionTaskInStack | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | protected String getPrefixFromQualifiedName(String qualifiedName) {
int colonPos = qualifiedName.indexOf(':');
if (colonPos > 0) {
return qualifiedName.substring(0, colonPos);
} else {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrefixFromQualifiedName
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | getPrefixFromQualifiedName | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | public List<PeriodicSync> getPeriodicSyncs(EndPoint info) {
synchronized (mAuthorities) {
AuthorityInfo authorityInfo = getAuthorityLocked(info, "getPeriodicSyncs");
ArrayList<PeriodicSync> syncs = new ArrayList<PeriodicSync>();
if (authorityInfo != null) {
fo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPeriodicSyncs
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | getPeriodicSyncs | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | private static native long nativeAssetSeek(long assetPtr, long offset, int whence); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeAssetSeek
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeAssetSeek | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException {
return ClassLoaderUtil.loadClass(classLoader, desc.getName());
} | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2016-10750
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Add basic protection against untrusted deserialization.
Function: resolveClass
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
Fixed Code:
@Override
protected... | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | resolveClass | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void createConference(
PhoneAccountHandle connectionManagerPhoneAccount,
String id,
ConnectionRequest request,
boolean isIncoming,
boolean isUnknown,
Session.Info sessionInfo) { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConference
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | createConference | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | void grantEphemeralAccessLocked(int userId, Intent intent,
int targetAppId, int ephemeralAppId) {
getPackageManagerInternalLocked().
grantEphemeralAccess(userId, intent, targetAppId, ephemeralAppId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantEphemeralAccessLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | grantEphemeralAccessLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public int optInt(String key) {
return optInt(key, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optInt
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | optInt | src/main/java/org/codehaus/jettison/json/JSONObject.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean copyWiki(File sourceDirectory, File targetDirectory) {
try {
Path path = sourceDirectory.toPath();
Path destDir = targetDirectory.toPath();
Files.walkFileTree(path, new CopyVisitor(path, destDir));
return true;
} catch (IOException e) {
log.error("", e);
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyWiki
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | copyWiki | src/main/java/org/olat/modules/wiki/WikiManager.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | protected IssuesWithBLOBs insertIssues(IssuesUpdateRequest issuesRequest) {
IssuesWithBLOBs issues = new IssuesWithBLOBs();
BeanUtils.copyBean(issues, issuesRequest);
issues.setId(issuesRequest.getId());
issues.setPlatformId(issuesRequest.getPlatformId());
issues.setCreateTime(Sy... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertIssues
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | insertIssues | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private void dispose(@Nullable Disposable disposable) {
if (disposable != null && !disposable.isDisposed()) {
disposable.dispose();
} else if (disposable == null) {
if (signalingDisposable != null && !signalingDisposable.isDisposed()) {
signalingDisposable.dispose... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispose
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | dispose | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | private boolean addProviderLocked(ResolveInfo ri) {
if ((ri.activityInfo.applicationInfo.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) {
return false;
}
if (!ri.activityInfo.isEnabled()) {
return false;
}
ComponentName componentName = new Componen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addProviderLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | addProviderLocked | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getTextLength() throws IOException
{
if (_currToken != null) { // null only before/after document
if (_tokenIncomplete) {
_finishToken();
}
if (_currToken == JsonToken.VALUE_STRING) {
return _textBuffer.size(); ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTextLength
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | getTextLength | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean forAllWindows(ToBooleanFunction<WindowState> callback, boolean traverseTopToBottom) {
if (mChildren.isEmpty()) {
// The window has no children so we just return it.
return applyInOrderWithImeWindows(callback, traverseTopToBottom);
}
if (traverseTopT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forAllWindows
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | forAllWindows | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private void updateBasePath() {
if (serverIndex != null) {
setBasePath(servers.get(serverIndex).URL(serverVariables));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBasePath
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure codin... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | updateBasePath | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public boolean isBuiltinSoundAvailable(String soundIdentifier) {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBuiltinSoundAvailable
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isBuiltinSoundAvailable | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated // since 2.12
protected Object _coerceNullToken(DeserializationContext ctxt, boolean isPrimitive) throws JsonMappingException
{
if (isPrimitive) {
_verifyNullForPrimitive(ctxt);
}
return getNullValue(ctxt);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _coerceNullToken
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _coerceNullToken | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) {
Map < String, Property<?>> result = new HashMap<>();
if (null != properties) {
properties.forEach(property -> {
// Initiate with name and value
... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-44262
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fix: Add assignable check to PropertiesParser, YamlParser and XmlParser (#624)
Function: parseProperties
File: ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java
Repository: ff4j
... | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | parseProperties | ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java | e915c026aef46b502934cb05a825ea2ea15eb9e6 | 1 |
Analyze the following code function for security vulnerabilities | private boolean isCallerChooserActivity() {
// TODO(b/228975502): Migrate this check to a proper permission or role check
final int callingUid = injectBinderCallingUid();
ComponentName systemChooser = injectChooserActivity();
if (systemChooser == null) {
return false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCallerChooserActivity
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | isCallerChooserActivity | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isOverWriteExistingData() {
return overWriteExistingData;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOverWriteExistingData
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-13990 | HIGH | 7.5 | quartz-scheduler/quartz | isOverWriteExistingData | quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java | a1395ba118df306c7fe67c24fb0c9a95a4473140 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String buildMetadataResponse(MetaData metaData) throws SAMLException {
EntityDescriptorType root = new EntityDescriptorType();
root.setID("_" + metaData.id);
root.setEntityID(metaData.entityId);
if (metaData.idp != null) {
IDPSSODescriptorType idp = new IDPSSODescriptorType();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildMetadataResponse
File: src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
Repository: FusionAuth/fusionauth-samlv2
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-27736 | MEDIUM | 4 | FusionAuth/fusionauth-samlv2 | buildMetadataResponse | src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java | c66fb689d50010662f705d5b585c6388ce555dbd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onFinishedClosing() {
mSelectedAction = -1;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFinishedClosing
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | onFinishedClosing | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected <RemoteInterfaceType, RemoteCallResponseType, FinalResponseType> NodeResponse<FinalResponseType> doNodeApiCall(
String nodeId, Class<RemoteInterfaceType> interfaceClass, Function<RemoteInterfaceType,
Call<RemoteCallResponseType>> remoteInterfaceFunction, Funct... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doNodeApiCall
File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-41044 | LOW | 3.8 | Graylog2/graylog2-server | doNodeApiCall | graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java | 02b8792e6f4b829f0c1d87fcbf2d58b73458b938 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long forceNetworkLogs() {
Preconditions.checkCallAuthorization(isAdb(getCallerIdentity())
|| hasCallingOrSelfPermission(permission.FORCE_DEVICE_POLICY_MANAGER_LOGS),
"Caller must be shell or hold FORCE_DEVICE_POLICY_MANAGER_LOGS to call "
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceNetworkLogs
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | forceNetworkLogs | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startDelegateShellPermissionIdentity(int delegateUid,
@Nullable String[] permissions) {
if (UserHandle.getCallingAppId() != Process.SHELL_UID
&& UserHandle.getCallingAppId() != Process.ROOT_UID) {
throw new SecurityException("Only the shell can d... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDelegateShellPermissionIdentity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | startDelegateShellPermissionIdentity | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public AutoCompletionCandidates doAutoCompleteAssignedLabelString(@QueryParameter String value) {
AutoCompletionCandidates c = new AutoCompletionCandidates();
Set<Label> labels = Jenkins.getInstance().getLabels();
List<String> queries = new AutoCompleteSeeder(value).getSeeds();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doAutoCompleteAssignedLabelString
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | doAutoCompleteAssignedLabelString | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void killApplication(String pkg, int appId, int userId, String reason) {
if (pkg == null) {
return;
}
// Make sure the uid is valid.
if (appId < 0) {
Slog.w(TAG, "Invalid appid specified for pkg : " + pkg);
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: killApplication
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | killApplication | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | ObjectStreamField[] getLoadFields() {
return loadFields;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLoadFields
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | getLoadFields | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ParceledListSlice<ApplicationInfo> getInstalledApplications(int flags, int userId) {
if (!sUserManager.exists(userId)) return null;
final boolean listUninstalled = (flags & PackageManager.GET_UNINSTALLED_PACKAGES) != 0;
// writer
synchronized (mPackages) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstalledApplications
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getInstalledApplications | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String getSerialFrom() {
return serialFrom;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSerialFrom
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getSerialFrom | base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void testWrongParameters() {
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createPgServer("-pgPort 8182"));
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createTcpServer("-tcpPort 8182"));
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createWe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testWrongParameters
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | testWrongParameters | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private List<EnforcingUser> getEnforcingUsers(Set<EnforcingAdmin> admins) {
List<EnforcingUser> enforcingUsers = new ArrayList();
ComponentName deviceOwner = mOwners.getDeviceOwnerComponent();
for (EnforcingAdmin admin : admins) {
if (deviceOwner != null
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEnforcingUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getEnforcingUsers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @MediumTest
@Test
public void testDropCdmaEnhancedPrivacyVoiceCall() throws Exception {
mConnectionServiceFixtureA.mConnectionServiceDelegate.mProperties =
Connection.PROPERTY_HAS_CDMA_VOICE_PRIVACY;
IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212",
mPh... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDropCdmaEnhancedPrivacyVoiceCall
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | testDropCdmaEnhancedPrivacyVoiceCall | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isNearMeFeatureEnabled() {
return CONF.postsNearMeEnabled();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNearMeFeatureEnabled
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | isNearMeFeatureEnabled | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public void addOnShowModeChangedListener(@NonNull OnShowModeChangedListener listener) {
addOnShowModeChangedListener(listener, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addOnShowModeChangedListener
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | addOnShowModeChangedListener | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public InternationalString getDescriptionText(final String code) throws FactoryException {
IdentifiedObject identifiedObject = createObject(code);
final Identifier identifier = identifiedObject.getName();
if (identifier instanceof GenericName) {
return ((GenericName) id... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDescriptionText
File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
Repository: geotools
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2022-24818 | HIGH | 7.5 | geotools | getDescriptionText | modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java | 4f70fa3234391dd0cda883a20ab0ec75688cba49 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void deleteMediaPackage(String mediaPackageId, Date deletionDate) throws SearchServiceDatabaseException,
NotFoundException {
EntityManager em = null;
EntityTransaction tx = null;
try {
em = emf.createEntityManager();
tx = em.getTransaction();
tx.begin();
SearchE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteMediaPackage
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-21318 | MEDIUM | 5.5 | opencast | deleteMediaPackage | modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java | b18c6a7f81f08ed14884592a6c14c9ab611ad450 | 0 |
Analyze the following code function for security vulnerabilities | protected final void destroyContentViewCore(boolean deleteNativeWebContents) {
if (mContentViewCore == null) return;
destroyContentViewCoreInternal(mContentViewCore);
if (mInfoBarContainer != null && mInfoBarContainer.getParent() != null) {
mInfoBarContainer.removeFromParentView();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroyContentViewCore
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | destroyContentViewCore | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void dumpFilter(PrintWriter out, String prefix,
PackageParser.ProviderIntentInfo filter) {
out.print(prefix);
out.print(
Integer.toHexString(System.identityHashCode(filter.provider)));
out.print(' ');
filter.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpFilter
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | dumpFilter | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public static HtmlForm getHtmlFormFromUiResource(ResourceFactory resourceFactory, FormService formService,
HtmlFormEntryService htmlFormEntryService, String providerAndPath, Encounter encounter) throws IOException {
int ind = providerAndPath.indexOf(':');
String provider = providerAndPath.substring(0, ind)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHtmlFormFromUiResource
File: api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java
Repository: openmrs/openmrs-module-htmlformentryui
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-4284 | MEDIUM | 6.1 | openmrs/openmrs-module-htmlformentryui | getHtmlFormFromUiResource | api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java | 811990972ea07649ae33c4b56c61c3b520895f07 | 0 |
Analyze the following code function for security vulnerabilities | public DisplayContent getDisplayContentLocked(final int displayId) {
DisplayContent displayContent = mDisplayContents.get(displayId);
if (displayContent == null) {
final Display display = mDisplayManager.getDisplay(displayId);
if (display != null) {
displayContent... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDisplayContentLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | getDisplayContentLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setTempFolderPath(String tempFolderPath) {
this.tempFolderPath = tempFolderPath;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTempFolderPath
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setTempFolderPath | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public int copySpaceBetweenWikis(String space, String sourceWiki, String targetWiki, String locale, boolean clean,
XWikiContext context) throws XWikiException
{
String db = context.getWikiId();
int nb = 0;
// Workaround for XWIKI-3915: Do not use XWikiStoreInterface#searchDocumentNam... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copySpaceBetweenWikis
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | copySpaceBetweenWikis | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | List<SysUserDepVo> getDepNamesByUserIds(@Param("userIds")List<String> userIds); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDepNamesByUserIds
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45208 | MEDIUM | 4.3 | jeecgboot/jeecg-boot | getDepNamesByUserIds | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java | 51e2227bfe54f5d67b09411ee9a336750164e73d | 0 |
Analyze the following code function for security vulnerabilities | public void setStudyEventAndFormMetaOC1_3TypesExpected() {
this.unsetTypeExpected();
int i=1;
this.setTypeExpected(i, TypeNames.INT);// definition_order
++i;
this.setTypeExpected(i, TypeNames.INT); // crf_order
++i;
this.setTypeExpected(i, TypeNames.INT); // edc.c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStudyEventAndFormMetaOC1_3TypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setStudyEventAndFormMetaOC1_3TypesExpected | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | public static Path getDeployedPath(Path path) throws IOException {
return DEPLOYED_BASE_PATH.get().resolve(path);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeployedPath
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-18212 | MEDIUM | 4 | eclipse/lemminx | getDeployedPath | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java | e37c399aa266be1b7a43061d4afc43dc230410d2 | 0 |
Analyze the following code function for security vulnerabilities | public String getRenderedContent(String text, String sourceSyntaxId, String targetSyntaxId, XWikiContext context)
{
return getRenderedContent(text, sourceSyntaxId, targetSyntaxId, false, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRenderedContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void setUseDarkTextColors(boolean useDarkColors) {
if (mUseDarkColors != null && mUseDarkColors.booleanValue() == useDarkColors) return;
mUseDarkColors = useDarkColors;
if (mUseDarkColors) {
setTextColor(mDarkDefaultTextColor);
setHighlightColor(mDarkHighlightColo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseDarkTextColors
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | setUseDarkTextColors | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
int injectBinderCallingUid() {
return getCallingUid();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectBinderCallingUid
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | injectBinderCallingUid | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public List<SyncInfo> getCurrentSyncsCopy(int userId, boolean canAccessAccounts) {
synchronized (mAuthorities) {
final List<SyncInfo> syncs = getCurrentSyncsLocked(userId);
final List<SyncInfo> syncsCopy = new ArrayList<SyncInfo>();
for (SyncInfo sync : syncs) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentSyncsCopy
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | getCurrentSyncsCopy | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void write(String string, int offset, int length) {
builder.append(string, offset, length);
tryFlush();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | write | web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | public UserProperty newInstance(User user) {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newInstance
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | newInstance | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | private boolean getBooleanCarrierConfig(String key) {
PersistableBundle b = PhoneGlobals.getInstance()
.getCarrierConfigForSubId(mPhone.getSubId());
if (b == null) {
b = PhoneGlobals.getInstance().getCarrierConfig();
}
return b.getBoolean(key);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBooleanCarrierConfig
File: src/com/android/phone/settings/VoicemailSettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | getBooleanCarrierConfig | src/com/android/phone/settings/VoicemailSettingsActivity.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | public void setCommentTitle(String commentTitle){
this.commentTitle = commentTitle;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCommentTitle
File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-254",
"CWE-264"
] | CVE-2016-8600 | MEDIUM | 5 | dotCMS/core | setCommentTitle | src/com/dotmarketing/cms/comment/struts/CommentsForm.java | cb84b130065c9eed1d1df9e4770ffa5d4bd30569 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@BeforeMethod
public void setUp(){
super.setUp();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUp
File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | setUp | main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java | 79994e86da1a3eecc62723f4ba90f14a63ad0e72 | 0 |
Analyze the following code function for security vulnerabilities | protected String _finishTextToken(int ch) throws IOException
{
_tokenIncomplete = false;
final int type = ((ch >> 5) & 0x7);
ch &= 0x1F;
// sanity check
if (type != CBORConstants.MAJOR_TYPE_TEXT) {
// should never happen so
_throwInternal();
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _finishTextToken
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _finishTextToken | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | public void update(String table, Object entity, CQLWrapper filter, boolean returnUpdatedIds, Handler<AsyncResult<UpdateResult>> replyHandler)
{
String where = "";
if(filter != null){
where = filter.toString();
}
update(table, entity, DEFAULT_JSONB_FIELD_NAME, where, returnUpdatedIds, replyHandle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: update
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | update | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @DimenRes
public int getDesiredHeightResId() {
return mDesiredHeightResId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDesiredHeightResId
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getDesiredHeightResId | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onStart() {
super.onStart();
if (this.reInitRequiredOnStart && this.conversation != null) {
final Bundle extras = pendingExtras.pop();
reInit(this.conversation, extras != null);
if (extras != null) {
processExtras(extras);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStart
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onStart | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.