instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void handle(String target, HttpServletRequest request, HttpServletResponse response, boolean[] isHandled) { //便于Wappalyzer读取 response.addHeader("X-ZrLog", BlogBuildInfoUtil.getVersion()); boolean isPluginPath = false; for (String path : pluginHandlerPaths) { ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-16643 - Severity: LOW - CVSS Score: 3.5 Description: Upgrade jar version & fix #54 Signed-off-by: xiaochun <xchun90@163.com> Function: handle File: web/src/main/java/com/zrlog/web/handler/PluginHandler.java Repository: 94fzb/zrlog Fixed Code: @Override ...
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
handle
web/src/main/java/com/zrlog/web/handler/PluginHandler.java
4a91c83af669e31a22297c14f089d8911d353fa1
1
Analyze the following code function for security vulnerabilities
@Override public VerifyCredentialResponse verifyPassword(String password, long challenge, int userId) throws RemoteException { return doVerifyPassword(password, true, challenge, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyPassword File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
verifyPassword
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
@Override public void listPluginOperations(String projectName, AsyncMethodCallback resultHandler) { unimplemented(resultHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listPluginOperations File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java Repository: line/centraldogma The code follows secure coding practices.
[ "CWE-862" ]
CVE-2021-38388
MEDIUM
6.5
line/centraldogma
listPluginOperations
server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd
0
Analyze the following code function for security vulnerabilities
public Integer getCountSearchResultsUpTo() { return myCountSearchResultsUpTo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCountSearchResultsUpTo File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getCountSearchResultsUpTo
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@RequirePOST public void doCancelQueue( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { checkPermission(ABORT); Jenkins.getInstance().getQueue().cancel(this); rsp.forwardToPreviousPage(req); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doCancelQueue File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
doCancelQueue
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public static String getDefaultSaveRootPath() { if (!TextUtils.isEmpty(defaultSaveRootPath)) { return defaultSaveRootPath; } if (FileDownloadHelper.getAppContext().getExternalCacheDir() == null) { return Environment.getDownloadCacheDirectory().getAbsolutePath(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultSaveRootPath File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
getDefaultSaveRootPath
library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
private static int getChunkSize(String hex) { hex = hex.trim(); for (int i = 0; i < hex.length(); i ++) { char c = hex.charAt(i); if (c == ';' || Character.isWhitespace(c) || Character.isISOControl(c)) { hex = hex.substring(0, i); break; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChunkSize File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2019-16869
MEDIUM
5
netty
getChunkSize
codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
39cafcb05c99f2aa9fce7e6597664c9ed6a63a95
0
Analyze the following code function for security vulnerabilities
public void requestSync(Account account, String authority, Bundle extras) { ContentResolver.validateSyncExtrasBundle(extras); int userId = UserHandle.getCallingUserId(); int uId = Binder.getCallingUid(); // This makes it so that future permission checks will be in the context of this ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestSync File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
requestSync
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting @Nullable static String extractTopLevelDir(String[] relativePathSegments, String crossUserRoot) { if (relativePathSegments == null) return null; final String topLevelDir = relativePathSegments.length > 0 ? relativePathSegments[0] : null; if (crossUserRoot != null && c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractTopLevelDir File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
extractTopLevelDir
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public void addQueryStringEntry(StringBuilder builder, String key, String value) { builder.append(escapeURL(key)); if (value != null) { builder.append('='); builder.append(escapeURL(value)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addQueryStringEntry File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
addQueryStringEntry
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public void ensureAccessQueuePurged(VaadinSession session) { /* * If no thread is currently holding the lock, pending changes for UIs * with automatic push would not be processed and pushed until the next * time there is a request or someone does an explicit push call. * ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureAccessQueuePurged File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
ensureAccessQueuePurged
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
public boolean getLaunchedFromBubble() { return mLaunchedFromBubble; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchedFromBubble File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getLaunchedFromBubble
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public List<PendingJavaScriptInvocation> dumpPendingJavaScriptInvocations() { pendingTitleUpdateCanceler = null; if (pendingJsInvocations.isEmpty()) { return Collections.emptyList(); } List<PendingJavaScriptInvocation> currentList = getPendingJavaScriptInvocations() ...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2023-25499 - Severity: MEDIUM - CVSS Score: 6.5 Description: Cleanup, and refactoring, in Element, StateNode, UIInternals classes + mvn formatter. Function: dumpPendingJavaScriptInvocations File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInt...
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
dumpPendingJavaScriptInvocations
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
1
Analyze the following code function for security vulnerabilities
@Override public Response processAddProducer(ProducerInfo info) throws Exception { SessionId sessionId = info.getProducerId().getParentId(); ConnectionId connectionId = sessionId.getParentId(); TransportConnectionState cs = lookupConnectionState(connectionId); if (cs == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAddProducer File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processAddProducer
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
public float getTransitionAnimationScaleLocked() { return mAnimationsDisabled ? 0 : mTransitionAnimationScaleSetting; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTransitionAnimationScaleLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getTransitionAnimationScaleLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public IBinder onBind(Intent intent) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBind File: Ports/Android/src/com/codename1/impl/android/PushNotificationService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onBind
Ports/Android/src/com/codename1/impl/android/PushNotificationService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void dumpCheckin(PrintWriter pw, boolean clear) { synchronized (mLock) { try { final JSONArray users = new JSONArray(); for (int i = 0; i < mUsers.size(); i++) { users.put(mUsers.valueAt(i).dumpCheckin(clear)); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpCheckin File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
dumpCheckin
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private ActiveAdmin getAdminWithMinimumFailedPasswordsForWipeLocked( int userHandle, boolean parent) { int count = 0; ActiveAdmin strictestAdmin = null; // Return the strictest policy across all participating admins. List<ActiveAdmin> admins = getActiveAdminsForLockscreenPol...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAdminWithMinimumFailedPasswordsForWipeLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAdminWithMinimumFailedPasswordsForWipeLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void onUserRemoved(int userId) { synchronized (ActivityManagerService.this) { ActivityManagerService.this.onUserStoppedLocked(userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserRemoved File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
onUserRemoved
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public Integer optIntegerObject(String key) { return this.optIntegerObject(key, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optIntegerObject File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optIntegerObject
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public void switchToAccount(Account account) { switchToAccount(account, false, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: switchToAccount File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
switchToAccount
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public boolean isNativePage() { return mNativePage != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNativePage File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
isNativePage
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void showNotifyPublic() { super.showNotify(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showNotifyPublic File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
showNotifyPublic
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<BaseObject> addObjectsFromRequest(String className, XWikiContext context) throws XWikiException { return addObjectsFromRequest(className, "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObjectsFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addObjectsFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public void disableQueue() { enabledQueue = false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableQueue File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
disableQueue
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public static byte[] fixUTF8(byte[] input) { byte[] fixed = new byte[input.length]; for (int i = 0; i < input.length; i++) { if (input[i] == 0x00) { fixed[i] = 0x20; } else { fixed[i] = input[i]; } } return fixed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fixUTF8 File: src/main/java/com/openkm/util/FormatUtil.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-40317
MEDIUM
5.4
openkm/document-management-system
fixUTF8
src/main/java/com/openkm/util/FormatUtil.java
870d518f7de349c3fa4c7b9883789fdca4590c4e
0
Analyze the following code function for security vulnerabilities
protected EntityReferenceSerializer<String> getLocalSerializer() { if (this.localSerializer == null) { this.localSerializer = Utils.getComponent(EntityReferenceSerializer.TYPE_STRING, "local"); } return this.localSerializer; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalSerializer File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
getLocalSerializer
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
public static <T> T unmarshal(String data, String marshallingFormat, Class<T> unmarshalType) { if (data == null || data.isEmpty()) { return null; } MarshallingFormat format = getFormat(marshallingFormat); Marshaller marshaller = null; switch (format) { ca...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unmarshal File: kie-server-parent/kie-server-controller/kie-server-controller-rest/src/main/java/org/kie/server/controller/rest/ControllerUtils.java Repository: kiegroup/droolsjbpm-integration The code follows secure ...
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
unmarshal
kie-server-parent/kie-server-controller/kie-server-controller-rest/src/main/java/org/kie/server/controller/rest/ControllerUtils.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
0
Analyze the following code function for security vulnerabilities
private @NonNull List<Notification.Action> getNonContextualActions() { if (mActions == null) return Collections.emptyList(); List<Notification.Action> standardActions = new ArrayList<>(); for (Notification.Action action : mActions) { if (!action.isContextual()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNonContextualActions File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getNonContextualActions
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void readStructEnd() throws TException { // consume the last field we read off the wire. lastFieldId_ = lastField_.pop(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readStructEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readStructEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public static String keyToString(int key) { return "Key[user=" + getUserIdFromKey(key) + ";type=" + settingTypeToString(getTypeFromKey(key)) + "]"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: keyToString File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
keyToString
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
@Override public final K getKey() { return key; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKey File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
getKey
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
public int cloneWithNoCheckout(ConsoleOutputStreamConsumer outputStreamConsumer, String url) { CommandLine gitClone = cloneCommand(). when(!hasRefSpec(), git -> git.withArgs("--branch", branch)). withArg("--no-checkout"). withArg(new UrlArgument(url)). ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cloneWithNoCheckout File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
cloneWithNoCheckout
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
@Override @Deprecated public void removeListener(ItemClickListener listener) { removeItemClickListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
removeListener
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
void setRequestedVisibilities(InsetsVisibilities visibilities) { mRequestedVisibilities.set(visibilities); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRequestedVisibilities File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
setRequestedVisibilities
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public Job getWikiInitializerJob(String wikiId) { return this.initializedWikis.get(wikiId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWikiInitializerJob File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getWikiInitializerJob
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public String getAllele() { return allele; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllele File: src/main/java/object/Variant.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
getAllele
src/main/java/object/Variant.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
@Nullable final String getAndRemove(CharSequence name) { requireNonNull(name, "name"); final int h = AsciiString.hashCode(name); return remove0(h, index(h), name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAndRemove File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
getAndRemove
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public int getLockTaskModeState() { return getLockTaskController().getLockTaskModeState(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockTaskModeState File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getLockTaskModeState
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public static void emailErrorMessage(EPerson eperson, String error) throws MessagingException { log.warn("An error occurred during item import, the user will be notified. " + error); try { Locale supportedLocale = I18nUtil.getEPersonLocale(eperson); Email ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: emailErrorMessage File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
emailErrorMessage
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
56e76049185bbd87c994128a9d77735ad7af0199
0
Analyze the following code function for security vulnerabilities
public ZentaoConfig getConfig() { return getConfig(key, ZentaoConfig.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfig File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getConfig
test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@Override public @RestrictionLevel int getRestrictionLevel(int uid) { return mAppRestrictionController.getRestrictionLevel(uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRestrictionLevel File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getRestrictionLevel
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected void handleServiceAccept(String serviceName, Buffer buffer) throws Exception { if (log.isDebugEnabled()) { log.debug("handleServiceAccept({}) SSH_MSG_SERVICE_ACCEPT service={}", this, serviceName); } KexState state = kexState.get(); if (!validateServiceKexState(stat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleServiceAccept File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
handleServiceAccept
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
private void patternInProgress() { mHeaderText.setText(R.string.lockpattern_recording_inprogress); if (mDefaultHeaderColorList != null) { mHeaderText.setTextColor(mDefaultHeaderColorList); } mFooterText.setText(""); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: patternInProgress File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
patternInProgress
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public String getXMPPAddress(final User user) throws IOException { update(); m_readLock.lock(); try { return _getXMPPAddress(user); } finally { m_readLock.unlock(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXMPPAddress File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
getXMPPAddress
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
@Override public void inputDispatchingResumed(int pid) { final ProcessRecord proc; synchronized (mPidsSelfLocked) { proc = mPidsSelfLocked.get(pid); } if (proc != null) { mAppErrors.handleDismissAnrDialogs(proc); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inputDispatchingResumed File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
inputDispatchingResumed
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public IBinder getLaunchCookie() { return mLaunchCookie; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchCookie File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getLaunchCookie
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public static List<Map.Entry<Integer, List<String>>> getExecSqlList(String sqlVersion, String basePath) { List<Map.Entry<Integer, List<String>>> sqlList = new ArrayList<>(); Integer version = 0; try { version = Integer.valueOf(sqlVersion); } catch (Exception e) { ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-16643 - Severity: LOW - CVSS Score: 3.5 Description: Upgrade jar version & fix #54 Signed-off-by: xiaochun <xchun90@163.com> Function: getExecSqlList File: common/src/main/java/com/zrlog/util/ZrLogUtil.java Repository: 94fzb/zrlog Fixed Code: public static...
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getExecSqlList
common/src/main/java/com/zrlog/util/ZrLogUtil.java
4a91c83af669e31a22297c14f089d8911d353fa1
1
Analyze the following code function for security vulnerabilities
private void generateEntries(Block parentBlock, SyndFeed feed, RssMacroParameters parameters) throws MacroExecutionException { int maxElements = parameters.getCount(); int count = 0; for (Object item : feed.getEntries()) { ++count; if (count > maxElements) { ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29202 - Severity: CRITICAL - CVSS Score: 9.0 Description: XWIKI-19671: Filter the feed's content in the RSS macro Function: generateEntries File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/...
[ "CWE-79" ]
CVE-2023-29202
CRITICAL
9
xwiki/xwiki-platform
generateEntries
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03
1
Analyze the following code function for security vulnerabilities
private boolean isEmptyValue(String value) { // See XWIKI-10853: Some static lists in XWiki.XWikiPreferences have the "---" value return StringUtils.isEmpty(value) || "---".equals(value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEmptyValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
isEmptyValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
public static URL getRequestURL(XWikiRequest request) throws XWikiException { try { StringBuffer requestURL = request.getRequestURL(); String qs = request.getQueryString(); if ((qs != null) && (!qs.equals(""))) { return new URL(requestURL.toString() + "?" ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getRequestURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public static SVNClientManager createSvnClientManager(AbstractProject context) { return createClientManager(context).getCore(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createSvnClientManager File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
createSvnClientManager
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public boolean isDisabled() { return disabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDisabled File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
isDisabled
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
ActivityTaskManagerInternal getActivityTaskManagerInternal() { return LocalServices.getService(ActivityTaskManagerInternal.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActivityTaskManagerInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getActivityTaskManagerInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setSAXHandlerFactory(final SAXHandlerFactory factory) { this.handlerfac = factory == null ? DEFAULTSAXHANDLERFAC : factory; engine = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSAXHandlerFactory File: core/src/java/org/jdom2/input/SAXBuilder.java Repository: hunterhacker/jdom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33813
MEDIUM
5
hunterhacker/jdom
setSAXHandlerFactory
core/src/java/org/jdom2/input/SAXBuilder.java
bd3ab78370098491911d7fe9d7a43b97144a234e
0
Analyze the following code function for security vulnerabilities
IPackageManager getIPackageManager() { return AppGlobals.getPackageManager(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIPackageManager File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getIPackageManager
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public boolean isLaunchTransitionRunning() { return mIsLaunchTransitionRunning; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLaunchTransitionRunning File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isLaunchTransitionRunning
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void adjustConfigurationLw(Configuration config, int keyboardPresence, int navigationPresence) { mHaveBuiltInKeyboard = (keyboardPresence & PRESENCE_INTERNAL) != 0; readConfigurationDependentBehaviors(); readLidState(); applyLidSwitchState(); if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: adjustConfigurationLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
adjustConfigurationLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
private void getUniqueLinkedEntityReferences(BaseObject xobject, Map<EntityType, Set<ResourceType>> entityTypes, Set<EntityReference> references, XWikiContext xcontext) { if (xobject == null) { return; } BaseClass xclass = xobject.getXClass(xcontext); for (Objec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUniqueLinkedEntityReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getUniqueLinkedEntityReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public void keyguardGone() { Trace.beginSection("KeyguardViewMediator.mViewMediatorCallback#keyguardGone"); if (DEBUG) Log.d(TAG, "keyguardGone"); mKeyguardViewControllerLazy.get().setKeyguardGoingAwayState(false); mKeyguardDisplayManager.hide(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: keyguardGone File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
keyguardGone
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@Override public void onCommitted(@Nullable AjaxRequestTarget target, RefUpdated refUpdated, @Nullable String position) { Project project = getProject(); if (state.blobIdent.revision == null) { state.blobIdent.revision = "master"; resolvedRevision = refUpdated.getNewCommitId(); project.setDefaultBranch("m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCommitted File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
onCommitted
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
private List<AnnotatedMethod> _findPotentialFactories(JavaType type, Class<?> primaryMixIn) { List<Method> candidates = null; // First find all potentially relevant static methods for (Method m : ClassUtil.getClassMethods(type.getRawClass())) { if (!Modifier.isStatic(m.getModifi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _findPotentialFactories File: src/main/java/com/fasterxml/jackson/databind/introspect/AnnotatedCreatorCollector.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_findPotentialFactories
src/main/java/com/fasterxml/jackson/databind/introspect/AnnotatedCreatorCollector.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@Override @Transactional public void deleteProgram( Program program ) { programStore.delete( program ); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteProgram File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java Repository: dhis2/dhis2-core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24848
MEDIUM
6.5
dhis2/dhis2-core
deleteProgram
dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java
ef04483a9b177d62e48dcf4e498b302a11f95e7d
0
Analyze the following code function for security vulnerabilities
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) public void reportFailedBiometricAttempt(int userHandle) { if (mService != null) { try { mService.reportFailedBiometricAttempt(userHandle); } catch (RemoteException e) { throw e.rethrowFromSys...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportFailedBiometricAttempt File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
reportFailedBiometricAttempt
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void run() { try { switch (mAction) { case ACTION_FAVORITE: mChannelToUpdate.setImportantConversation(true); if (mChannelToUpdate.isImportantConversation()) { mChannelToUp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
run
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
@Override public Account login(String username, String password){ Account account = null; Driver driver = new SQLServerDriver(); String connectionUrl = "jdbc:sqlserver://n8bu1j6855.database.windows.net:1433;database=VoyagerDB;user=VoyageLogin@n8bu1j6855;password={GroupP@ssword};encrypt=true;hostNameInCertificate...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2014-125074 - Severity: MEDIUM - CVSS Score: 5.2 Description: fixed problems in register controller, and worked at preventing sql-injection in database access Function: login File: Voyager/src/models/DatabaseAccess.java Repository: Nayshlok/Voyager Fixed Code: @...
[ "CWE-89" ]
CVE-2014-125074
MEDIUM
5.2
Nayshlok/Voyager
login
Voyager/src/models/DatabaseAccess.java
f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae
1
Analyze the following code function for security vulnerabilities
private int executeSql(String sql, Object[] bindArgs) throws SQLException { acquireReference(); try { final int statementType = DatabaseUtils.getSqlStatementType(sql); if (statementType == DatabaseUtils.STATEMENT_ATTACH) { boolean disableWal = false; ...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2018-9493 - Severity: LOW - CVSS Score: 2.1 Description: DO NOT MERGE. Extend SQLiteQueryBuilder for update and delete. Developers often accept selection clauses from untrusted code, and SQLiteQueryBuilder already supports a "strict" mode to help catch SQL inject...
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
executeSql
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
1
Analyze the following code function for security vulnerabilities
@GetMapping("/edit") public String edit(ModelMap mmap) { SysUser user = getSysUser(); mmap.put("user", userService.selectUserById(user.getUserId())); return prefix + "/edit"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: edit File: ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java Repository: yangzongzhuan/RuoYi The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-32065
LOW
3.5
yangzongzhuan/RuoYi
edit
ruoyi-admin/src/main/java/com/ruoyi/web/controller/system/SysProfileController.java
d8b2a9a905fb750fa60e2400238cf4750a77c5e6
0
Analyze the following code function for security vulnerabilities
private void cleanupDisabledPackageComponentsLocked( String packageName, int userId, boolean killProcess, String[] changedClasses) { Set<String> disabledClasses = null; boolean packageDisabled = false; IPackageManager pm = AppGlobals.getPackageManager(); if (changedClasses ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanupDisabledPackageComponentsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
cleanupDisabledPackageComponentsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void handleExceptionDuringRequest(VaadinRequest request, VaadinResponse response, VaadinSession vaadinSession, Throwable t) throws ServiceException { if (vaadinSession != null) { vaadinSession.lock(); } try { ErrorHandler errorHandler = Err...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleExceptionDuringRequest File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
handleExceptionDuringRequest
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_CAMERA, conditional = true) public void setCameraDisabled(@Nullable ComponentName admin, boolean disabled) { if (mService != null) { try { mService.setCameraDisabled(admin, mContext.getPackageName(), disabled, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCameraDisabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setCameraDisabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void registerListener(final INotificationListener listener, final ComponentName component, final int userid) { enforceSystemOrSystemUI("INotificationManager.registerListener"); mListeners.registerService(listener, component, userid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerListener File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
registerListener
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public String[] getModels() { return models; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getModels File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getModels
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
public @Nullable Object getObject(String s, @Nullable Map<String, Class<?>> map) throws SQLException { return getObjectImpl(s, map); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObject File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getObject
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public Jooby renderer(final Renderer renderer) { this.bag.add(requireNonNull(renderer, "A renderer is required.")); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderer File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
renderer
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public String generateId() { return "id"+iota++; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateId File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
generateId
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public static Response getResponse(byte [] bytes) { Response temp = null; if (bytes == null) { return null; } try { temp = Response.parseXML(new ByteArrayInputStream(bytes)); } catch (SAMLException se) { debug.error("getResponse : " , se); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResponse File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
getResponse
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
public Long optLongObject(String key, Long defaultValue) { final Number val = this.optNumber(key, null); if (val == null) { return defaultValue; } return val.longValue(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optLongObject File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optLongObject
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
private final String _findDecodedFromSymbols(final int len) throws IOException { if ((_inputEnd - _inputPtr) < len) { _loadToHaveAtLeast(len); } // First: maybe we already have this name decoded? if (len < 5) { int inPtr = _inputPtr; final byte[] i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _findDecodedFromSymbols File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_findDecodedFromSymbols
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
protected void selectPresenceToAttachFile(final int attachmentChoice) { final Account account = conversation.getAccount(); final PresenceSelector.OnPresenceSelected callback = () -> { Intent intent = new Intent(); boolean chooser = false; switch (attachmentChoice) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectPresenceToAttachFile File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
selectPresenceToAttachFile
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
private static boolean validateBitSet(BitSet bitSet, int validValuesLength) { if (bitSet == null) return false; BitSet clonedBitset = (BitSet) bitSet.clone(); clonedBitset.clear(0, validValuesLength); return clonedBitset.isEmpty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateBitSet File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
validateBitSet
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
@Override public void dump(FileDescriptor fd, PrintWriter pw, String[] args) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, "Permission Denial: can't dump from from pid=" + Binder.get...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
dump
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
void dumpBroadcastStatsLocked(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean dumpAll, String dumpPackage) { if (mCurBroadcastStats == null) { return; } pw.println("ACTIVITY MANAGER BROADCAST STATS STATE (dumpsys activity broadcast-stats)"); f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpBroadcastStatsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dumpBroadcastStatsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void sendEnrollResult(Fingerprint fp, int remaining) { if (mEnrollmentCallback != null) { mEnrollmentCallback.onEnrollmentProgress(remaining); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendEnrollResult File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
sendEnrollResult
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private void sendServiceRequest(String serviceName) throws TransportException { log.debug("Sending SSH_MSG_SERVICE_REQUEST for {}", serviceName); write(new SSHPacket(Message.SERVICE_REQUEST).putString(serviceName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendServiceRequest File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
sendServiceRequest
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
public static boolean isMultipleInstancesAdmin(HttpServletRequest request) { return (Config.SYSTEM_MULTIPLE_INSTANCES || Config.CLOUD_MODE) && request.getRemoteUser().equals(Config.ADMIN_USER) || !(Config.SYSTEM_MULTIPLE_INSTANCES || Config.CLOUD_MODE) && request.isUserInRole(Config.DEFAULT_ADMIN_ROLE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMultipleInstancesAdmin File: src/main/java/com/openkm/servlet/admin/BaseServlet.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-3628
LOW
3.5
openkm/document-management-system
isMultipleInstancesAdmin
src/main/java/com/openkm/servlet/admin/BaseServlet.java
c96f2e33adab3bbf550977b1b62acaa54f86fa03
0
Analyze the following code function for security vulnerabilities
public String getVersion() { return prop.getProperty(VERSION); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVersion File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getVersion
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
@Transactional @Override public void deleteBranch(Project project, String branchName) { onDeleteBranch(project, branchName); String refName = GitUtils.branch2ref(branchName); ObjectId commitId = project.getObjectId(refName, true); try { project.git().branchDelete().setForce(true).setBranchNames(bran...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteBranch File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
deleteBranch
server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting File injectSystemDataPath() { return Environment.getDataSystemDirectory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectSystemDataPath File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectSystemDataPath
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public void delete(String id) { IssuesWithBLOBs issuesWithBLOBs = issuesMapper.selectByPrimaryKey(id); List platforms = new ArrayList<>(); platforms.add(issuesWithBLOBs.getPlatform()); String projectId = issuesWithBLOBs.getProjectId(); Project project = baseProjectService.getProj...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
delete
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void dumpActivityStarterLocked(PrintWriter pw, String dumpPackage) { pw.println("ACTIVITY MANAGER STARTER (dumpsys activity starter)"); mActivityStartController.dump(pw, "", dumpPackage); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpActivityStarterLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dumpActivityStarterLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public boolean setAllowBubbles(String pkg, int uid, int preference) { try { sINM.setBubblesAllowed(pkg, uid, preference); return true; } catch (Exception e) { Log.w(TAG, "Error calling NoMan", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowBubbles File: src/com/android/settings/notification/NotificationBackend.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
setAllowBubbles
src/com/android/settings/notification/NotificationBackend.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
@Override boolean isSyncFinished() { if (!super.isSyncFinished()) return false; if (!isVisibleRequested()) return true; // Wait for attach. That is the earliest time where we know if there will be an associated // display rotation. If we don't wait, the starting-window can finishDraw...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSyncFinished File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isSyncFinished
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@SafeVarargs public static ActivityOptions makeSceneTransitionAnimation(Activity activity, Pair<View, String>... sharedElements) { ActivityOptions opts = new ActivityOptions(); ExitTransitionCoordinator exit = makeSceneTransitionAnimation( new ActivityExitTransitionCallba...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeSceneTransitionAnimation File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
makeSceneTransitionAnimation
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
private void parseAttributesForKnownElements(Map<String, List<Entry>> subdirs, Node desc) { // NOTE: NamedNodeMap does not have any particular order... NamedNodeMap attributes = desc.getAttributes(); for (Node attr : asIterable(attributes)) { if (!XMP.ELEMENTS.contains(attr.getNames...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2021-23792 - Severity: HIGH - CVSS Score: 7.5 Description: Avoid fetching external resources in XMPReader. Function: parseAttributesForKnownElements File: imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java Repository: ha...
[ "CWE-611" ]
CVE-2021-23792
HIGH
7.5
haraldk/TwelveMonkeys
parseAttributesForKnownElements
imageio/imageio-metadata/src/main/java/com/twelvemonkeys/imageio/metadata/xmp/XMPReader.java
da4efe98bf09e1cce91b7633cb251958a200fc80
1
Analyze the following code function for security vulnerabilities
public Rectangle getPageSize(int index) { return getPageSize(pageRefs.getPageNRelease(index)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPageSize File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
getPageSize
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public void runGlobalSessionTermination() { final GlobalTerminationRevisionConfig globalTerminationRevisionConfig = clusterConfigService.getOrDefault( GlobalTerminationRevisionConfig.class, GlobalTerminationRevisionConfig.initial() ); if (!globalTerminationRevisi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runGlobalSessionTermination File: graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
runGlobalSessionTermination
graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
public static boolean isIkvmDotNet() { return IS_IVKVM_DOT_NET; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isIkvmDotNet File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
isIkvmDotNet
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
protected Client buildHttpClient() { // use the default client config if not yet initialized if (clientConfig == null) { clientConfig = getDefaultClientConfig(); } ClientBuilder clientBuilder = ClientBuilder.newBuilder(); customizeClientBuilder(clientBuilder); clientBuilder = clientBuil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildHttpClient File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
buildHttpClient
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public boolean shouldBeSaved() { return mPressedApply; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldBeSaved File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
shouldBeSaved
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0