instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private String getCompileSourceRoot() {
final Object sourceFolderObject =
configOptions == null ? null : configOptions
.get(CodegenConstants.SOURCE_FOLDER);
final String sourceFolder;
if (sourceFolderObject != null) {
sourceFolder = sourceFolde... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCompileSourceRoot
File: modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2021-21429 | LOW | 2.1 | OpenAPITools/openapi-generator | getCompileSourceRoot | modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java | 6445ea6511a6ddab64c86ae263937dc90650c98c | 0 |
Analyze the following code function for security vulnerabilities | protected Object createMessage(InstanceEvent event, Instance instance) {
Map<String, Object> messageJson = new HashMap<>();
messageJson.put("username", username);
if (icon != null) {
messageJson.put("icon_emoji", ":" + icon + ":");
}
if (channel != null) {
messageJson.put("channel", channel);
}
Map... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createMessage
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | createMessage | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("getLockObject()")
private List<ActiveAdmin> getActiveAdminsForUserAndItsManagedProfilesLocked(int userHandle,
Predicate<UserInfo> shouldIncludeProfileAdmins) {
ArrayList<ActiveAdmin> admins = new ArrayList<>();
mInjector.binderWithCleanCallingIdentity(() -> {
for ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActiveAdminsForUserAndItsManagedProfilesLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getActiveAdminsForUserAndItsManagedProfilesLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public void setSubjectDN(String subjectDN) {
this.subjectDN = subjectDN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSubjectDN
File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setSubjectDN | base/common/src/main/java/com/netscape/certsrv/cert/CertData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | final void appDiedLocked(ProcessRecord app, int pid, IApplicationThread thread) {
// First check if this ProcessRecord is actually active for the pid.
synchronized (mPidsSelfLocked) {
ProcessRecord curProc = mPidsSelfLocked.get(pid);
if (curProc != app) {
Slog.w(T... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: appDiedLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | appDiedLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void startQRScanner() {
Intent intent = new Intent(this, QrCodeActivity.class);
startActivityForResult(intent, REQUEST_CODE_QR_SCAN);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startQRScanner
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | startQRScanner | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void close() {
closeReader();
reset();
killed = BatchIterator.CLOSED;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
Repository: crate
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-24565 | MEDIUM | 6.5 | crate | close | server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java | 4e857d675683095945dd524d6ba03e692c70ecd6 | 0 |
Analyze the following code function for security vulnerabilities | public com.xpn.xwiki.api.Object addObjectFromRequest(String className, String prefix) throws XWikiException
{
com.xpn.xwiki.api.Object obj = new com.xpn.xwiki.api.Object(
getDoc().addObjectFromRequest(className, prefix, getXWikiContext()), getXWikiContext());
updateAuthor();
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | addObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@RequiresPermission(android.Manifest.permission.NOTIFY_PENDING_SYSTEM_UPDATE)
public void notifyPendingSystemUpdate(long updateReceivedTime, boolean isSecurityPatch) {
throwIfParentInstance("notifyPendingSystemUpdate");
if (mService != null) {
try {
mServic... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyPendingSystemUpdate
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | notifyPendingSystemUpdate | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void getDiffs(String projectName, String repositoryName, Revision from, Revision to,
String pathPattern, AsyncMethodCallback resultHandler) {
handle(projectManager.get(projectName).repos().get(repositoryName)
.diff(convert(from), conver... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDiffs
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | getDiffs | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | private static Optional<RpcDecoder> getDecoder(JsonValue value,
Class<?> type) {
return DECODERS.stream()
.filter(decoder -> decoder.isApplicable(value, type))
.findFirst();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDecoder
File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25500 | MEDIUM | 4.3 | vaadin/flow | getDecoder | flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java | 1fa4976902a117455bf2f98b191f8c80692b53c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isActiveProfileOwner(int uid) {
return isProfileOwner(new CallerIdentity(uid, null, null));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isActiveProfileOwner
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isActiveProfileOwner | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public static String formatObject(Object value) {
if (value != null) {
if (value instanceof Object[]) {
return ArrayUtils.toString(value);
} else {
return value.toString();
}
} else {
return "NULL";
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: formatObject
File: src/main/java/com/openkm/util/FormatUtil.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-40317 | MEDIUM | 5.4 | openkm/document-management-system | formatObject | src/main/java/com/openkm/util/FormatUtil.java | 870d518f7de349c3fa4c7b9883789fdca4590c4e | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(USE_FINGERPRINT)
public void authenticate(@Nullable CryptoObject crypto, @Nullable CancellationSignal cancel,
int flags, @NonNull AuthenticationCallback callback, @Nullable Handler handler) {
authenticate(crypto, cancel, flags, callback, handler, UserHandle.myUserId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: authenticate
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | authenticate | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public static String getFileFlag(String uri) {
if (JFinal.me().getConstants().getDevMode()) {
return new File(PathKit.getWebRootPath() + uri).lastModified() + "";
}
return cacheFileMap.get(uri);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileFlag
File: web/src/main/java/com/zrlog/web/cache/CacheService.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | getFileFlag | web/src/main/java/com/zrlog/web/cache/CacheService.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | protected B decoderEnforceMaxConsecutiveEmptyDataFrames(int maxConsecutiveEmptyFrames) {
enforceNonCodecConstraints("maxConsecutiveEmptyFrames");
this.maxConsecutiveEmptyFrames = checkPositiveOrZero(
maxConsecutiveEmptyFrames, "maxConsecutiveEmptyFrames");
return self();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decoderEnforceMaxConsecutiveEmptyDataFrames
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | decoderEnforceMaxConsecutiveEmptyDataFrames | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTouchDisabled(boolean disabled) {
super.setTouchDisabled(disabled);
if (disabled && mAffordanceHelper.isSwipingInProgress() && !mIsLaunchTransitionRunning) {
mAffordanceHelper.resetImmediately();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTouchDisabled
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setTouchDisabled | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | boolean onSetAppExiting(boolean animateExit) {
final DisplayContent displayContent = getDisplayContent();
boolean changed = false;
if (!animateExit) {
// Hide the window permanently if no window exist animation is performed, so we can
// avoid the window surface becoming... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSetAppExiting
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | onSetAppExiting | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | boolean switchUserLocked(int userId, UserState uss) {
mUserStackInFront.put(mCurrentUser, mFocusedStack.getStackId());
final int restoreStackId = mUserStackInFront.get(userId, HOME_STACK_ID);
mCurrentUser = userId;
mStartingUsers.add(uss);
for (int displayNdx = mActivityDisplays... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchUserLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | switchUserLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | protected final static double _parseDouble(final String numStr) throws NumberFormatException
{
return _parseDouble(numStr, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _parseDouble
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _parseDouble | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setVisibility(int visibility) {
super.setVisibility(visibility);
if (visibility == VISIBLE) {
setClickable(true);
setFocusable(true);
} else {
setClickable(false);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVisibility
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | setVisibility | chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | public static String getDiffString2(int i) {
if(i==0) return "";
String s = Integer.toString(i);
if(i>0) return "+"+s;
else return s;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDiffString2
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getDiffString2 | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | public String getURLToLoginAs(final String username, final String password)
{
return getURLToLoginAndGotoPage(username, password, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLToLoginAs
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getURLToLoginAs | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void setCssClass(String cssClass) {
_cssClass = cssClass;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCssClass
File: util-taglib/src/com/liferay/taglib/ui/HeaderTag.java
Repository: brianchandotcom/liferay-portal
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | setCssClass | util-taglib/src/com/liferay/taglib/ui/HeaderTag.java | bd92daa70ab77a40eff0eb18e8e91f3e095694e1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public T readFrom(Class<T> type, Type genericType, Annotation[] annotations,
MediaType mediaType,
MultivaluedMap<String, String> httpHeaders, InputStream entityStream)
throws WebApplicationException {
Yaml yaml = new Yaml();
T t = yaml.loadAs(toString(entityStream), type);
retu... | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2023-46302
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fix unsafe deserialization via SnakeYaml in YamlEntityProvider
Function: readFrom
File: submarine-server/server-core/src/main/java/org/apache/submarine/server/rest/provider/YamlEntityProvider.java
Re... | [
"CWE-502"
] | CVE-2023-46302 | CRITICAL | 9.8 | apache/submarine | readFrom | submarine-server/server-core/src/main/java/org/apache/submarine/server/rest/provider/YamlEntityProvider.java | 88e59027e644e81014ca5b5ae5a21de12ae8ca37 | 1 |
Analyze the following code function for security vulnerabilities | public static String sanitizeSortBy(String parameter){
if(!UtilMethods.isSet(parameter)){//check if is not null
return "";
}
String testParam=parameter.replaceAll(" asc", "").replaceAll(" desc", "").replaceAll("-", "").toLowerCase();
if(ORDERBY_WHITELIST.contains(testParam)){
return parameter;
}... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2016-2355
- Severity: HIGH
- CVSS Score: 7.5
Description: fixes #8848
Function: sanitizeSortBy
File: src/com/dotmarketing/common/util/SQLUtil.java
Repository: dotCMS/core
Fixed Code:
public static String sanitizeSortBy(String parameter){
if(!UtilMethods.... | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | sanitizeSortBy | src/com/dotmarketing/common/util/SQLUtil.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 1 |
Analyze the following code function for security vulnerabilities | public static String getTargetFilePath(String path, boolean pathAsDirectory, String filename) {
if (path == null) {
return null;
}
if (pathAsDirectory) {
if (filename == null) {
return null;
}
return FileDownloadUtils.generateFile... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTargetFilePath
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | getTargetFilePath | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public <T> T deserialize(Response response, GenericType<T> returnType) throws ApiException {
if (response == null || returnType == null) {
return null;
}
if ("byte[]".equals(returnType.toString())) {
// Handle binary response (byte array).
return (T) respo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deserialize
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | deserialize | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public void setHtml(String html) {
removeComponentIfPresent();
cellState.html = html;
cellState.type = GridStaticCellType.HTML;
row.section.markAsDirty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHtml
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setHtml | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public User getUser(String id) {
return User.get(id);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUser
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | getUser | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | public void setProfileName(String profileName) {
this.profileName = profileName;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProfileName
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setProfileName | base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public InputStream openStream() throws IOException {
return openInputStream();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openStream
File: guava/src/com/google/common/io/FileBackedOutputStream.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | openStream | guava/src/com/google/common/io/FileBackedOutputStream.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | public String getWorkflowStore() {
return workflowStore;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWorkflowStore
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getWorkflowStore | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | public boolean moveFile (Contentlet fileAssetCont, Folder parent, User user, boolean respectFrontendRoles) throws DotStateException, DotDataException, DotSecurityException {
return moveFile( fileAssetCont, parent, null, user, respectFrontendRoles );
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveFile
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | moveFile | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | ab2bb2e00b841d131b8734227f9106e3ac31bb99 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void testAuth() {
zentaoClient.login();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testAuth
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | testAuth | test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public String getOriginalName() {
return originalName;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOriginalName
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getOriginalName | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private void initHttpUtil() {
httpUtilButton.addActionListener(e -> {
String t;
if (LANG == CHINESE) {
t = "Http工具";
} else {
t = "Repeater";
}
JFrame frame = new JFrame(t);
frame.setContentPane(new HttpUtilF... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initHttpUtil
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | initHttpUtil | src/main/java/com/chaitin/xray/form/MainForm.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage
public static ActivityOptions makeMultiThumbFutureAspectScaleAnimation(Context context,
Handler handler, IAppTransitionAnimationSpecsFuture specsFuture,
OnAnimationStartedListener listener, boolean scaleUp) {
ActivityOptions opts = new ActivityOptions();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeMultiThumbFutureAspectScaleAnimation
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | makeMultiThumbFutureAspectScaleAnimation | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onServiceChanged(AuthenticatorDescription desc, int userId, boolean removed) {
UserInfo user = getUserManager().getUserInfo(userId);
if (user == null) {
Log.w(TAG, "onServiceChanged: ignore removed user " + userId);
return;
}
validateAcco... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onServiceChanged
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | onServiceChanged | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@CloseDBIfOpened
public boolean forceRun() {
try {
return !new DotDatabaseMetaData().tableExists(
DbConnectionFactory.getConnection(), "content_type_workflow_action_mapping");
} catch (SQLException e) {
return Boolean.FALSE;
}
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2020-17542
- Severity: LOW
- CVSS Score: 3.5
Description: #16890 renaming the content_type_workflow_action_mapping to workflow_action_mappings
Function: forceRun
File: dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionM... | [
"CWE-79"
] | CVE-2020-17542 | LOW | 3.5 | dotCMS/core | forceRun | dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java | 782c342b660d359a71e190c8b5110bc651736591 | 1 |
Analyze the following code function for security vulnerabilities | public int getTargetSdk() {
return mSplitPermissionInfoParcelable.getTargetSdk();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTargetSdk
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getTargetSdk | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public void addObject(EntityReference reference, String className, Map<String, ?> properties)
{
gotoPage(reference, "objectadd", toQueryParameters(className, null, properties));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObject
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | addObject | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public String getKey() {
return key;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getKey
File: xmppserver/src/main/java/org/jivesoftware/admin/servlet/SystemCacheDetailsServlet.java
Repository: igniterealtime/Openfire
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-20363 | MEDIUM | 4.3 | igniterealtime/Openfire | getKey | xmppserver/src/main/java/org/jivesoftware/admin/servlet/SystemCacheDetailsServlet.java | b6f758241f3fdd57b48c527a695512f33e26eb74 | 0 |
Analyze the following code function for security vulnerabilities | public int stopUser(int userid, IStopUserCallback callback) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeInt(userid);
data.writeStrongInterface(callback);
mRemote.t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopUser
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | stopUser | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
ActiveAdmin getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked(int userId) {
ensureLocked();
ActiveAdmin admin = getDeviceOwnerAdminLocked();
if (admin == null) {
admin = getProfileOwnerOfOrganizationOwnedDeviceLocked(userId);
}
return admin;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices... | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | void deferWindowLayout() {
if (!mWindowManager.mWindowPlacerLocked.isLayoutDeferred()) {
// Reset the reasons at the first entrance because we only care about the changes in the
// deferred scope.
mLayoutReasons = 0;
}
mWindowManager.mWindowPlacerLocked.defer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deferWindowLayout
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | deferWindowLayout | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getClient() {
return client;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClient
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getClient | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onViewCreated(View view, Bundle savedInstanceState) {
super.onViewCreated(view, savedInstanceState);
mLayout = (GlifLayout) view;
// Make the password container consume the optical insets so the edit text is aligned
// with the sides of the... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onViewCreated
File: src/com/android/settings/password/ChooseLockPassword.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | onViewCreated | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | private void fillInProcMemInfo(ProcessRecord app,
ActivityManager.RunningAppProcessInfo outInfo) {
outInfo.pid = app.pid;
outInfo.uid = app.info.uid;
if (mHeavyWeightProcess == app) {
outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_CANT_SAVE_STATE;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillInProcMemInfo
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | fillInProcMemInfo | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void removeWindowChangeListener(WindowChangeListener listener) {
synchronized(mWindowMap) {
mWindowChangeListeners.remove(listener);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeWindowChangeListener
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | removeWindowChangeListener | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void next(String packageName, int pid, int uid) {
try {
final String reason = TAG + ":next";
mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(),
pid, uid, packageName, reason);
mCb.onNext(packageName, pid, uid);... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: next
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | next | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | private void showDialogIfForeground(int id) {
if (mForeground) {
showDialog(id);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showDialogIfForeground
File: src/com/android/phone/settings/VoicemailSettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | showDialogIfForeground | src/com/android/phone/settings/VoicemailSettingsActivity.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isNetworkNotOnWifiType() {
final ConnectivityManager manager = (ConnectivityManager) FileDownloadHelper.getAppContext()
.
getSystemService(Context.CONNECTIVITY_SERVICE);
if (manager == null) {
FileDownloadLog.w(FileDownloadUtils.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNetworkNotOnWifiType
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | isNetworkNotOnWifiType | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | boolean moveInputMethodWindowsIfNeededLocked(boolean needAssignLayers) {
final WindowState imWin = mInputMethodWindow;
final int DN = mInputMethodDialogs.size();
if (imWin == null && DN == 0) {
return false;
}
// TODO(multidisplay): IMEs are only supported on the def... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveInputMethodWindowsIfNeededLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | moveInputMethodWindowsIfNeededLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void setRequestType(String requestType) {
this.requestType = requestType;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRequestType
File: base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setRequestType | base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void cancelPendingPowerKeyAction() {
if (!mPowerKeyHandled) {
mPowerKeyHandled = true;
mHandler.removeMessages(MSG_POWER_LONG_PRESS);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelPendingPowerKeyAction
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | cancelPendingPowerKeyAction | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void setSystemMessagesProvider(
SystemMessagesProvider systemMessagesProvider) {
if (systemMessagesProvider == null) {
throw new IllegalArgumentException(
"SystemMessagesProvider can not be null.");
}
this.systemMessagesProvider = systemMessages... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSystemMessagesProvider
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | setSystemMessagesProvider | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | public void startConversationContext(HttpServletRequest request) {
associateConversationContext(request);
activateConversationContext(request);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startConversationContext
File: impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java
Repository: weld/core
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2014-8122 | MEDIUM | 4.3 | weld/core | startConversationContext | impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java | 8e413202fa1af08c09c580f444e4fd16874f9c65 | 0 |
Analyze the following code function for security vulnerabilities | private void expandPip() {
// Do not notify menu visibility when hiding the menu, the controller will do this when it
// handles the message
hideMenu(mController::onPipExpand, false /* notifyMenuVisibility */, true /* resize */,
ANIM_TYPE_HIDE);
mPipUiEventLogger.log(
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: expandPip
File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40123 | MEDIUM | 5.5 | android | expandPip | libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java | 7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isNewAuthenticationPathNeeded(long globalIndex, int xmssHeight, int layer)
{
if (globalIndex == 0)
{
return false;
}
return ((globalIndex + 1) % (long)Math.pow((1 << xmssHeight), layer) == 0) ? true : false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNewAuthenticationPathNeeded
File: core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSUtil.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-470"
] | CVE-2018-1000613 | HIGH | 7.5 | bcgit/bc-java | isNewAuthenticationPathNeeded | core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSUtil.java | 4092ede58da51af9a21e4825fbad0d9a3ef5a223 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isBreakpointAvailable(final int id, final FileDownloadModel model) {
return isBreakpointAvailable(id, model, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBreakpointAvailable
File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | isBreakpointAvailable | library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | public void execute(AsyncResult<SQLConnection> conn, String sql, Handler<AsyncResult<UpdateResult>> replyHandler){
try {
SQLConnection sqlConnection = conn.result();
sqlConnection.update(sql, query -> {
if (query.failed()) {
replyHandler.handle(Future.failedFuture(query.cause()));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: execute
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | execute | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | protected Collection<String> loadAuthorizationInfo(Serializable principal) {
return Collections.emptySet();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadAuthorizationInfo
File: portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java
Repository: ManyDesigns/Portofino
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-29451 | MEDIUM | 6.4 | ManyDesigns/Portofino | loadAuthorizationInfo | portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java | 8c754a0ad234555e813dcbf9e57d637f9f23d8fb | 0 |
Analyze the following code function for security vulnerabilities | public List<Delta> getRenderedContentDiff(XWikiDocument fromDoc, XWikiDocument toDoc, XWikiContext context)
throws XWikiException, DifferentiationFailedException
{
String originalContent = fromDoc.getRenderedContent(context);
String newContent = toDoc.getRenderedContent(context);
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContentDiff
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRenderedContentDiff | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected IInterface asInterface(IBinder binder) {
return INotificationListener.Stub.asInterface(binder);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asInterface
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | asInterface | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public String getSkin()
{
return this.xwiki.getSkin(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSkin
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getSkin | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public int giveOtp() {
return this.otp;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: giveOtp
File: src/com/bijay/onlinevotingsystem/controller/VoterLoginController.java
Repository: bijaythapaa/OnlineVotingSystem
The code follows secure coding practices. | [
"CWE-916"
] | CVE-2021-21253 | MEDIUM | 5 | bijaythapaa/OnlineVotingSystem | giveOtp | src/com/bijay/onlinevotingsystem/controller/VoterLoginController.java | 0181cb0272857696c8eb3e44fcf6cb014ff90f09 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void requestRemoteBugReport(long nonce) {
requestBugReportWithDescription(null, null, BugreportParams.BUGREPORT_MODE_REMOTE, nonce);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestRemoteBugReport
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | requestRemoteBugReport | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public State getSimState(int subId) {
if (mSimDatas.containsKey(subId)) {
return mSimDatas.get(subId).simState;
} else {
return State.UNKNOWN;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSimState
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | getSimState | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | private final int reAddWindowLocked(int index, WindowState win) {
final WindowList windows = win.getWindowList();
// Adding child windows relies on mChildWindows being ordered by mSubLayer.
final int NCW = win.mChildWindows.size();
boolean winAdded = false;
for (int j=0; j<NCW; j... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reAddWindowLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | reAddWindowLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | private File getFileWithExtension(JFileChooser fileChooser) {
String extension = "." + fileextensions.get(fileChooser.getFileFilter());
String filename = fileChooser.getSelectedFile().getAbsolutePath();
if (!filename.endsWith(extension)) {
filename += extension;
}
File selectedFileWithExt = new File(filena... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileWithExtension
File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
Repository: umlet
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | getFileWithExtension | umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 0 |
Analyze the following code function for security vulnerabilities | public @NotNull SshdConfigBuilder withHostKey(@NotNull String hostKey) {
sshdConfig += "HostKey /etc/ssh/" + Paths.get(hostKey).getFileName() + "\n";
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withHostKey
File: src/itest/java/com/hierynomus/sshj/SshdContainer.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | withHostKey | src/itest/java/com/hierynomus/sshj/SshdContainer.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | private boolean requestTargetProviderPermissionsReviewIfNeededLocked(ProviderInfo cpi,
ProcessRecord r, final int userId) {
if (getPackageManagerInternalLocked().isPermissionsReviewRequired(
cpi.packageName, userId)) {
final boolean callerForeground = r == null || r.setS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestTargetProviderPermissionsReviewIfNeededLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | requestTargetProviderPermissionsReviewIfNeededLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public String getEnableEnvVarsConfig() {
return prop.getProperty(ENABLE_ENVVARS_CONFIG, "false");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEnableEnvVarsConfig
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getEnableEnvVarsConfig | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getApplicationEnabledSetting(String packageName, int userId) {
if (!sUserManager.exists(userId)) return COMPONENT_ENABLED_STATE_DISABLED;
int uid = Binder.getCallingUid();
enforceCrossUserPermission(uid, userId, false, false, "get enabled");
// reader
syn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationEnabledSetting
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getApplicationEnabledSetting | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder decorator(
String pathPattern, DecoratingHttpServiceFunction decoratingHttpServiceFunction) {
virtualHostTemplate.decorator(pathPattern, decoratingHttpServiceFunction);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decorator
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | decorator | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isValidateHeaders() {
return validateHeaders != null ? validateHeaders : true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidateHeaders
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | isValidateHeaders | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | private void saveDownloadedFile() {
OCFile file = mStorageManager.getFileById(mCurrentDownload.getFile().getFileId());
if (file == null) {
// try to get file via path, needed for overwriting existing files on conflict dialog
file = mStorageManager.getFileByDecryptedRemotePath(mC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveDownloadedFile
File: src/main/java/com/owncloud/android/files/services/FileDownloader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | saveDownloadedFile | src/main/java/com/owncloud/android/files/services/FileDownloader.java | 27559efb79d45782e000b762860658d49e9c35e9 | 0 |
Analyze the following code function for security vulnerabilities | private String loadEmailTemplate(String name) {
return loadResource("emails/" + name + ".html");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadEmailTemplate
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | loadEmailTemplate | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Transactional(rollbackFor = Exception.class)
public boolean updateNullPhoneEmail() {
userMapper.updateNullByEmptyString("email");
userMapper.updateNullByEmptyString("phone");
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNullPhoneEmail
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45208 | MEDIUM | 4.3 | jeecgboot/jeecg-boot | updateNullPhoneEmail | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java | 51e2227bfe54f5d67b09411ee9a336750164e73d | 0 |
Analyze the following code function for security vulnerabilities | void pokeMenu() {
cancelDelayedHide();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pokeMenu
File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40123 | MEDIUM | 5.5 | android | pokeMenu | libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java | 7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public T setTimeMillis(K name, long value) {
return set(name, fromTimeMillis(name, value));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTimeMillis
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | setTimeMillis | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | @Reference
public void setSeriesService(SeriesService seriesService) {
this.seriesService = seriesService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSeriesService
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | setSeriesService | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | public List<ResolveInfo> queryIntentForPackage(Intent intent, String resolvedType,
int flags, ArrayList<PackageParser.Service> packageServices, int userId) {
if (!sUserManager.exists(userId)) return null;
if (packageServices == null) {
return null;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryIntentForPackage
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryIntentForPackage | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String dialogButtonsClose(String closeAttribute) {
return dialogButtons(new int[] {BUTTON_CLOSE}, new String[] {closeAttribute});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogButtonsClose
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogButtonsClose | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | protected int getProfileParentId(int userHandle) {
return mInjector.binderWithCleanCallingIdentity(() -> {
UserInfo parentUser = mUserManager.getProfileParent(userHandle);
return parentUser != null ? parentUser.id : userHandle;
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileParentId
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getProfileParentId | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void setDocumentReferenceInternal(DocumentReference reference)
{
this.documentReference = intern(reference);
setMetaDataDirty(true);
// Clean various caches
this.keyCache = null;
this.localKeyCache = null;
this.parentReferenceCache = null;
this.docu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDocumentReferenceInternal
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setDocumentReferenceInternal | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isVerifiedUsingV4Scheme() {
return mVerifiedUsingV4Scheme;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isVerifiedUsingV4Scheme
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | isVerifiedUsingV4Scheme | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | public static boolean zip(List<VFSItem> vfsFiles, VFSLeaf target, VFSItemFilter filter, boolean withMetadata) {
boolean success = true;
String zname = target.getName();
if (target instanceof LocalImpl) {
zname = ((LocalImpl)target).getBasefile().getAbsolutePath();
}
try(OutputStream out = target.getOut... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: zip
File: src/main/java/org/olat/core/util/ZipUtil.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | zip | src/main/java/org/olat/core/util/ZipUtil.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | protected void storeSession(VaadinSession session,
WrappedSession wrappedSession) {
assert VaadinSession.hasLock(this, wrappedSession);
writeToHttpSession(wrappedSession, session);
session.refreshTransients(wrappedSession, this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: storeSession
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | storeSession | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onSupportActionModeFinished(ActionMode mode) {
super.onSupportActionModeFinished(mode);
ViewUtils.setStatusBarColor(this, R.color.primary_dark_color);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSupportActionModeFinished
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | onSupportActionModeFinished | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | void setOpenGlTraceApp(ApplicationInfo app, String processName) {
synchronized (this) {
boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0"));
if (!isDebuggable) {
if ((app.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) {
throw ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOpenGlTraceApp
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | setOpenGlTraceApp | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public <K, V> RemoteCache<K, V> getCache(String cacheName, boolean forceReturnValue) {
return createRemoteCache(cacheName, forceReturnValue);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCache
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | getCache | client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java | efc44b7b0a5dd4f44773808840dd9785cabcf21c | 0 |
Analyze the following code function for security vulnerabilities | public static void setIsEmbedded(boolean embed){
embeddedMode = embed;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setIsEmbedded
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | setIsEmbedded | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | protected CoercionAction _findCoercionFromEmptyString(DeserializationContext ctxt) {
return ctxt.findCoercionAction(logicalType(), handledType(),
CoercionInputShape.EmptyString);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _findCoercionFromEmptyString
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _findCoercionFromEmptyString | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | public static Version getNextVersion(Version version, boolean minorEdit)
{
if (version == null) {
return new Version("1.1");
}
if (minorEdit) {
return version.next();
} else {
return version.getBranchPoint().next().newBranch(1);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNextVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getNextVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public ProfileInput getInput(String name) {
return getInputByName(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInput
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getInput | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public PluginManager getPluginManager() {
return pluginManager;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPluginManager
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getPluginManager | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @JsonIgnore
public String getKeyAlgorithm() {
return attributes.get(KEY_ALGORITHM);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getKeyAlgorithm
File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getKeyAlgorithm | base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isCommitted()
{
return this.response.isCommitted();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCommitted
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-601"
] | CVE-2022-23618 | MEDIUM | 5.8 | xwiki/xwiki-platform | isCommitted | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | 5251c02080466bf9fb55288f04a37671108f8096 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.