instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public void handleMessage(Message message) {
switch (message.what) {
case MSG_NOTIFY_UPDATE_APP_WIDGET: {
SomeArgs args = (SomeArgs) message.obj;
Host host = (Host) args.arg1;
IAppWidgetHost callbacks = (IAppWidget... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleMessage
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | handleMessage | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | static private void createProjectSynchronously(
final ImportingJob job,
final String format,
final ObjectNode optionObj,
final List<Exception> exceptions,
final Format record,
final Project project
) {
ProjectMetadata pm = createProjectMetadata(optionObj);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createProjectSynchronously
File: main/src/com/google/refine/importing/ImportingUtilities.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | createProjectSynchronously | main/src/com/google/refine/importing/ImportingUtilities.java | e243e73e4064de87a913946bd320fbbe246da656 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasDeviceOwner() {
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isDefaultDeviceOwner(caller) || canManageUsers(caller) || isFinancedDeviceOwner(
caller) || hasCallingOrSelfPermission(
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasDeviceOwner
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | hasDeviceOwner | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dismissInvalidChargerWarning() {
dismissInvalidChargerNotification();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dismissInvalidChargerWarning
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | dismissInvalidChargerWarning | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | private Optional<LogFile> buildLogFile(String id, String fileName) {
try {
final Path filePath = Path.of(fileName);
final long size = Files.size(filePath);
final FileTime lastModifiedTime = Files.getLastModifiedTime(filePath);
return Optional.of(new LogFile(id, fi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildLogFile
File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-41044 | LOW | 3.8 | Graylog2/graylog2-server | buildLogFile | graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java | 02b8792e6f4b829f0c1d87fcbf2d58b73458b938 | 0 |
Analyze the following code function for security vulnerabilities | private boolean removeDisallowedEmpty(Node node){
String tagName = node.getNodeName();
if (!isAllowedEmptyTag(tagName)) {
/*
* Wasn't in the list of allowed elements, so we'll nuke it.
*/
addError(ErrorMessageUtil.ERROR_TAG_EMPTY, new Object[]{HTMLEntityEn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeDisallowedEmpty
File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
Repository: nahsra/antisamy
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-28367 | MEDIUM | 4.3 | nahsra/antisamy | removeDisallowedEmpty | src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java | 0199e7e194dba5e7d7197703f43ebe22401e61ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int stop(boolean initiatedByClient) {
IFingerprintDaemon daemon = getFingerprintDaemon();
if (daemon == null) {
Slog.w(TAG, "stopAuthentication: no fingeprintd!");
return ERROR_ESRCH;
}
try {
final int result = daemon.cancelAuthent... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stop
File: services/core/java/com/android/server/fingerprint/AuthenticationClient.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | stop | services/core/java/com/android/server/fingerprint/AuthenticationClient.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public Document parseDocument(Reader reader) throws InvalidSyntaxException {
ParserEnvironment parserEnvironment = ParserEnvironment.newParserEnvironment()
.document(reader)
.build();
return parseDocumentImpl(parserEnvironment);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseDocument
File: src/main/java/graphql/parser/Parser.java
Repository: graphql-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-28867 | HIGH | 7.5 | graphql-java | parseDocument | src/main/java/graphql/parser/Parser.java | 8a1c884c81c0b656db201cfd95881feb0f430a55 | 0 |
Analyze the following code function for security vulnerabilities | @Editable(order=600, description=
"This filter is used to determine the LDAP entry for current user. " +
"For example: <i>(&(uid={0})(objectclass=person))</i>. In this example, " +
"<i>{0}</i> represents login name of current user.")
@NotEmpty
public String getUserSearchFilter() {
return userS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserSearchFilter
File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
Repository: theonedev/onedev
The code follows secure coding prac... | [
"CWE-90"
] | CVE-2021-32651 | MEDIUM | 4.3 | theonedev/onedev | getUserSearchFilter | server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java | 4440f0c57e440488d7e653417b2547eaae8ad19c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<PackageInfo> getPreferredPackages(int flags) {
return new ArrayList<PackageInfo>();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPreferredPackages
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getPreferredPackages | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public Builder addClusterPerms(Collection<String> clusterPerms) {
if (clusterPerms != null) {
this.clusterPerms.addAll(clusterPerms);
}
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addClusterPerms
File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
Repository: opensearch-project/security
The code follows secure coding practices. | [
"CWE-612",
"CWE-863"
] | CVE-2022-41918 | MEDIUM | 6.3 | opensearch-project/security | addClusterPerms | src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java | f7cc569c9d3fa5d5432c76c854eed280d45ce6f4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<PlatformStatusDTO> getTransitions(String issueKey) {
List<PlatformStatusDTO> platformStatusDTOS = new ArrayList<>();
for (ZentaoIssuePlatformStatus status : ZentaoIssuePlatformStatus.values()) {
PlatformStatusDTO platformStatusDTO = new PlatformStatusDTO();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTransitions
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getTransitions | test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasOptions(String[] arguments, String... options) {
for (String argument: arguments) {
for (String option: options) {
if (option.startsWith("--")) {
if (argument.startsWith(option + "=") || argument.equals(option))
return true;
} else if (option.startsWith("-")) {
if (argume... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasOptions
File: server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java
Repository: theonedev/onedev
The code follows secure coding prac... | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | hasOptions | server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | private boolean exitPublicInterface() {
return recursionBreak.get().getAndDecrement() > 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exitPublicInterface
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | exitPublicInterface | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | public static void setConfigFilePath(String path){
configPath = path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConfigFilePath
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | setConfigFilePath | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private int computeCompatSmallestWidth(boolean rotated, DisplayMetrics dm, int dw, int dh) {
// TODO: Multidisplay: for now only use with default display.
mTmpDisplayMetrics.setTo(dm);
final DisplayMetrics tmpDm = mTmpDisplayMetrics;
final int unrotDw, unrotDh;
if (rotated) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: computeCompatSmallestWidth
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | computeCompatSmallestWidth | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | private Set<String> getInstantAppAccessibleSettings(int settingsType) {
switch (settingsType) {
case SETTINGS_TYPE_GLOBAL:
return Settings.Global.INSTANT_APP_SETTINGS;
case SETTINGS_TYPE_SECURE:
return Settings.Secure.INSTANT_APP_SETTINGS;
case... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstantAppAccessibleSettings
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getInstantAppAccessibleSettings | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public List<DocumentReference> getChildrenReferences(XWikiContext context) throws XWikiException
{
return getChildrenReferences(0, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getChildrenReferences
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getChildrenReferences | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public ArtemisSecurityConfigurationBuilder withPackageWhitelist(Collection<PackageRule> packageWhitelist) {
whitelistedPackages = Set.copyOf(packageWhitelist);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withPackageWhitelist
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-501",
"CWE-653"
] | CVE-2024-23682 | HIGH | 8.2 | ls1intum/Ares | withPackageWhitelist | src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java | 4c146ff85a0fa6022087fb0cffa6b8021d51101f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Experiment read(K8sClient api) {
try {
XGBoostJob xgBoostJob = api.getXGBoostJobClient()
.get(getMetadata().getNamespace(), getMetadata().getName())
.throwsApiException().getObject();
if (LOG.isDebugEnabled()) {
LOG.debug("Get XGBoostJob resource: \n{}", Ya... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: read
File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
Repository: apache/submarine
The code follows secure coding practices... | [
"CWE-502"
] | CVE-2023-46302 | CRITICAL | 9.8 | apache/submarine | read | submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java | ed5ad3b824ba388259e0d1ea137d7fca5f0c288e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onConfigurationChanged(@NonNull Configuration newConfig) {
super.onConfigurationChanged(newConfig);
if (drawerToggle != null) {
drawerToggle.onConfigurationChanged(newConfig);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConfigurationChanged
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
The code follows secure coding practices. | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | onConfigurationChanged | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate98(File dataDir, Stack<Integer> versions) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate98
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate98 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException {
File cacheDir = getContext().getCacheDir();
File privateFile = new File(cacheDir, uri.getLastPathSegment());
return ParcelFileDescriptor.open(privateFile, ParcelFileDescriptor.MODE_READ_ONLY);
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2017-20181
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Bugfix Path Traversal Vulnerability - see https://support.google.com/faqs/answer/7496913
Function: openFile
File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java
Repository: hgzojer/vocabletrainer... | [
"CWE-22"
] | CVE-2017-20181 | MEDIUM | 4.3 | hgzojer/vocabletrainer | openFile | src/at/hgz/vocabletrainer/VocableTrainerProvider.java | accf6838078f8eb105cfc7865aba5c705fb68426 | 1 |
Analyze the following code function for security vulnerabilities | @Exported(visibility=3)
public int getUpstreamBuild() {
return upstreamBuild;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUpstreamBuild
File: core/src/main/java/hudson/model/Cause.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2067 | LOW | 3.5 | jenkinsci/jenkins | getUpstreamBuild | core/src/main/java/hudson/model/Cause.java | 5d57c855f3147bfc5e7fda9252317b428a700014 | 0 |
Analyze the following code function for security vulnerabilities | public AsyncHttpClientConfigBean setConnectionTimeOutInMs(int connectionTimeOutInMs) {
this.connectionTimeOutInMs = connectionTimeOutInMs;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConnectionTimeOutInMs
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setConnectionTimeOutInMs | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public Cursor queryWithFactory(CursorFactory cursorFactory,
boolean distinct, String table, String[] columns,
String selection, String[] selectionArgs, String groupBy,
String having, String orderBy, String limit, CancellationSignal cancellationSignal) {
acquireReference();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryWithFactory
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | queryWithFactory | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void loadDirs() {
loadAll();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadDirs
File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java
Repository: iBotPeaches/Apktool
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-21633 | HIGH | 7.8 | iBotPeaches/Apktool | loadDirs | brut.j.dir/src/main/java/brut/directory/FileDirectory.java | d348c43b24a9de350ff6e5bd610545a10c1fc712 | 0 |
Analyze the following code function for security vulnerabilities | public String getPackageVersion()
{
return this.packageVersion;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageVersion
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | getPackageVersion | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | public <V> Column<T, V> addColumn(ValueProvider<T, V> valueProvider,
ValueProvider<V, String> presentationProvider) {
return addColumn(valueProvider, presentationProvider,
new TextRenderer());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addColumn
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addColumn | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Object> getApiKeys() {
return Collections.unmodifiableMap(API_KEYS);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApiKeys
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getApiKeys | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public AsyncHttpClientConfigBean setProxyServerSelector(ProxyServerSelector proxyServerSelector) {
this.proxyServerSelector = proxyServerSelector;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProxyServerSelector
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setProxyServerSelector | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getPackageUid(String packageName, int flags) {
try {
return mActivityManagerService.mContext.getPackageManager()
.getPackageUid(packageName, flags);
} catch (NameNotFoundException nnfe) {
return -1;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageUid
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getPackageUid | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Collection delete(final String path1, final String path2,
final Route.OneArgHandler handler) {
return new Route.Collection(
new Route.Definition[]{delete(path1, handler), delete(path2, handler)});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: delete
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | delete | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public <E extends Enum<E>> E optEnum(Class<E> clazz, String key, E defaultValue) {
try {
Object val = this.opt(key);
if (NULL.equals(val)) {
return defaultValue;
}
if (clazz.isAssignableFrom(val.getClass())) {
// we just checked it!... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optEnum
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | optEnum | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void requestBugReport(@BugreportParams.BugreportMode int bugreportType) {
requestBugReportWithDescription(null, null, bugreportType, 0L);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReport
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | requestBugReport | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unused")
@CalledByNative
private void onScrollUpdateGestureConsumed() {
mZoomControlsDelegate.invokeZoomPicker();
for (mGestureStateListenersIterator.rewind();
mGestureStateListenersIterator.hasNext();) {
mGestureStateListenersIterator.next().onScro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onScrollUpdateGestureConsumed
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | onScrollUpdateGestureConsumed | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public void denyTypesByRegExp(Pattern[] regexps) {
denyPermission(new RegExpTypePermission(regexps));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: denyTypesByRegExp
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | denyTypesByRegExp | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | private void amendToList(Map<String, Object> map, String key, Object value) {
final Object element = map.get(key);
if (element == null) {
map.put(key, value);
} else {
if (element instanceof List) {
((List) element).add(value);
} else {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: amendToList
File: src/main/java/apoc/load/Xml.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000820 | HIGH | 7.5 | neo4j-contrib/neo4j-apoc-procedures | amendToList | src/main/java/apoc/load/Xml.java | 45bc09c8bd7f17283e2a7e85ce3f02cb4be4fd1a | 0 |
Analyze the following code function for security vulnerabilities | private void renderEditPage(RequestEvent event, FeatureModel featureModel) throws IOException {
List<CSRFToken> tokens = new ArrayList<>();
for (CSRFTokenProvider provider : Services.get(CSRFTokenProvider.class)) {
CSRFToken token = provider.getToken(event.getRequest());
if (toke... | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2020-28191
- Severity: HIGH
- CVSS Score: 8.8
Description: Added CSRF protection to the togglz console via a CSRF token passed between the server and the clinet. This remediates the vulnerabilty CVE-2020-28191 by blocking CSRF attacks as the attcker will not be a... | [
"CWE-352"
] | CVE-2020-28191 | HIGH | 8.8 | togglz | renderEditPage | console/src/main/java/org/togglz/console/handlers/edit/EditPageHandler.java | ed66e3f584de954297ebaf98ea4a235286784707 | 1 |
Analyze the following code function for security vulnerabilities | public static void marshal(final Object obj, final Writer writer) {
final Marshaller jaxbMarshaller = getMarshallerFor(obj, null);
try {
jaxbMarshaller.marshal(obj, writer);
} catch (final JAXBException e) {
throw EXCEPTION_TRANSLATOR.translate("marshalling " + obj.getCla... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: marshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | marshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | protected Mapper getMapper() {
return this.mapper;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMapper
File: xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | getMapper | xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | protected String findLibrary(String lib) {
String syslib = System.mapLibraryName(lib);
File libFile = nativeLibraryStorage.findLibrary(syslib);
if (libFile != null) {
return libFile.toString();
}
String result = super.findLibrary(lib);
if (result != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findLibrary
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | findLibrary | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removeCall(String callId, Session.Info sessionInfo) {
Log.startSession(sessionInfo, LogUtils.Sessions.CSW_REMOVE_CALL, mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
log... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeCall
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | removeCall | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | void startFreezingScreen(int overrideOriginalDisplayRotation) {
if (mTransitionController.isShellTransitionsEnabled()) {
return;
}
ProtoLog.i(WM_DEBUG_ORIENTATION,
"Set freezing of %s: visible=%b freezing=%b visibleRequested=%b. %s",
token, isVisible()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startFreezingScreen
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | startFreezingScreen | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @IgnoreJRERequirement
public static boolean isMustangOrAbove() {
try {
System.console();
return true;
} catch(LinkageError e) {
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMustangOrAbove
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | isMustangOrAbove | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | private void saveNitzTimeZone(String zoneId) {
mSavedTimeZone = zoneId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveNitzTimeZone
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | saveNitzTimeZone | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | private String getProcessContent(String uuid, Repository repository) {
try {
Asset<String> processAsset = repository.loadAsset(uuid);
return processAsset.getAssetContent();
} catch (Exception e) {
// we dont want to barf..just log that error happened
_log... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessContent
File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
Repository: kiegroup/jbpm-designer
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2017-7545 | MEDIUM | 4 | kiegroup/jbpm-designer | getProcessContent | jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java | a143f3b92a6a5a527d929d68c02a0c5d914ab81d | 0 |
Analyze the following code function for security vulnerabilities | public void activitySlept(IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activitySlept
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | activitySlept | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public javax.xml.rpc.Service createService(QName serviceName)
throws ServiceException {
return new Service(serviceName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createService
File: axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java
Repository: apache/axis-axis1-java
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-51441 | HIGH | 7.2 | apache/axis-axis1-java | createService | axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java | 685c309febc64aa393b2d64a05f90e7eb9f73e06 | 0 |
Analyze the following code function for security vulnerabilities | private void blockNumberWithAnswer(String phoneNumber, Answer answer) throws Exception {
when(getBlockedNumberProvider().call(
any(),
anyString(),
eq(BlockedNumberContract.SystemContract.METHOD_SHOULD_SYSTEM_BLOCK_NUMBER),
eq(phoneNumber),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: blockNumberWithAnswer
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | blockNumberWithAnswer | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | void attachToDisplayLocked(ActivityDisplay activityDisplay) {
if (DEBUG_STACK) Slog.d(TAG_STACK, "attachToDisplayLocked: " + this
+ " to display=" + activityDisplay);
mActivityDisplay = activityDisplay;
mStack.mDisplayId = activityDisplay.mDisplayId;
m... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachToDisplayLocked
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | attachToDisplayLocked | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | void fillClientWindowFramesAndConfiguration(ClientWindowFrames outFrames,
MergedConfiguration outMergedConfiguration, boolean useLatestConfig,
boolean relayoutVisible) {
outFrames.frame.set(mWindowFrames.mCompatFrame);
outFrames.displayFrame.set(mWindowFrames.mDisplayFrame);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillClientWindowFramesAndConfiguration
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | fillClientWindowFramesAndConfiguration | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addMember(Context context, Group group, EPerson e) {
if (isDirectMember(group, e)) {
return;
}
group.addMember(e);
e.getGroups().add(group);
context.addEvent(
new Event(Event.ADD, Constants.GROUP, group.getID(), Constants.EPERSON,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addMember
File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | addMember | dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | private void addPackageHoldingPermissions(ArrayList<PackageInfo> list, PackageSetting ps,
String[] permissions, boolean[] tmp, int flags, int userId) {
int numMatch = 0;
final PermissionsState permissionsState = ps.getPermissionsState();
for (int i=0; i<permissions.length; i++) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPackageHoldingPermissions
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | addPackageHoldingPermissions | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<InstrumentationInfo> queryInstrumentation(String targetPackage,
int flags) {
ArrayList<InstrumentationInfo> finalList =
new ArrayList<InstrumentationInfo>();
// reader
synchronized (mPackages) {
final Iterator<PackageParser.Instrumen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryInstrumentation
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryInstrumentation | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private long convertToKB(double size)
{
return (long) Math.ceil(size / 1024);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertToKB
File: src/main/java/cloudsync/connector/LocalFilesystemConnector.java
Repository: HolgerHees/cloudsync
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4773 | LOW | 3.3 | HolgerHees/cloudsync | convertToKB | src/main/java/cloudsync/connector/LocalFilesystemConnector.java | 3ad796833398af257c28e0ebeade68518e0e612a | 0 |
Analyze the following code function for security vulnerabilities | void loadOwners() {
synchronized (getLockObject()) {
mOwners.load();
setDeviceOwnershipSystemPropertyLocked();
if (mOwners.hasDeviceOwner()) {
setGlobalSettingDeviceOwnerType(
mOwners.getDeviceOwnerType(mOwners.getDeviceOwnerPackageName... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadOwners
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | loadOwners | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void setOverscanLocked(DisplayContent displayContent,
int left, int top, int right, int bottom) {
final DisplayInfo displayInfo = displayContent.getDisplayInfo();
synchronized (displayContent.mDisplaySizeLock) {
displayInfo.overscanLeft = left;
displayInfo.ove... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOverscanLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setOverscanLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wContr, Translator trans) {
this.translator = trans;
FileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainerPath());
VFSContainer currentContainer = folderComponent.getCurrentContain... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-41152
- Severity: MEDIUM
- CVSS Score: 4.0
Description: OO-5696: validate file selections against current container
Function: execute
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
Repository: OpenOLAT
Fixed Code:
@Override
pub... | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | execute | src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 1 |
Analyze the following code function for security vulnerabilities | private void handleEvict(URL podUrl, String namespace, String name) throws ExecutionException, InterruptedException, IOException {
Eviction eviction = new EvictionBuilder()
.withNewMetadata()
.withName(name)
.withNamespace(namespace)
.endMetadata()
.withDeleteOptions(new DeleteOptions(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleEvict
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | handleEvict | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | private void handleSuccessfulIpConfiguration() {
mLastSignalLevel = -1; // Force update of signal strength
WifiConfiguration c = getConnectedWifiConfigurationInternal();
if (c != null) {
// Reset IP failure tracking
c.getNetworkSelectionStatus().clearDisableReasonCounter(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleSuccessfulIpConfiguration
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | handleSuccessfulIpConfiguration | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private void initGlobalSettingsDefaultValForWearLocked(String key, long val) {
initGlobalSettingsDefaultValForWearLocked(key, String.valueOf(val));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initGlobalSettingsDefaultValForWearLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | initGlobalSettingsDefaultValForWearLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | protected void untar(File destDir, InputStream inputStream) throws IOException {
TarArchiveInputStream tin = new TarArchiveInputStream(inputStream);
TarArchiveEntry tarEntry = null;
while ((tarEntry = tin.getNextTarEntry()) != null) {
File destEntry = new File(destDir, tarEntry.getN... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2023-37476
- Severity: HIGH
- CVSS Score: 7.8
Description: Merge pull request from GHSA-m88m-crr9-jvqq
* Fix zip slip vulnerability in project import command
* Add zip-slip.tar test resource
Function: untar
File: main/src/com/google/refine/io/FileProjectManager... | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | untar | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 1 |
Analyze the following code function for security vulnerabilities | public boolean isAppSuspended(String packageName, UserHandle user) {
ApplicationInfo info = getApplicationInfo(packageName, user, 0);
return info != null && isAppSuspended(info);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAppSuspended
File: src/com/android/launcher3/util/PackageManagerHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-40097 | HIGH | 7.8 | android | isAppSuspended | src/com/android/launcher3/util/PackageManagerHelper.java | 6c9a41117d5a9365cf34e770bbb00138f6bf997e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void readAmqpBody(byte[] barr) {
throw new UnsupportedOperationException();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readAmqpBody
File: src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | readAmqpBody | src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void configRoute(Routes routes) {
routes.add("/", ArticleController.class);
routes.add(INSTALL_ROUTER_PATH, InstallController.class);
// 后台管理者
routes.add(new AdminRoutes());
currentRoutes = routes;
initRoute();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: configRoute
File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | configRoute | web/src/main/java/com/zrlog/web/config/ZrLogConfig.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | public void footer(PrintWriter out) {
out.println("</body>");
out.println("</html>");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: footer
File: src/main/java/com/openkm/servlet/admin/BaseServlet.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-3628 | LOW | 3.5 | openkm/document-management-system | footer | src/main/java/com/openkm/servlet/admin/BaseServlet.java | c96f2e33adab3bbf550977b1b62acaa54f86fa03 | 0 |
Analyze the following code function for security vulnerabilities | public int getManagedUserId(@UserIdInt int callingUserId) {
if (VERBOSE_LOG) Slogf.v(LOG_TAG, "getManagedUserId: callingUserId=%d", callingUserId);
for (UserInfo ui : mUserManager.getProfiles(callingUserId)) {
if (ui.id == callingUserId || !ui.isManagedProfile()) {
continue;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getManagedUserId
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getManagedUserId | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void setOCFormDataAuditsTypesExpected() {
this.unsetTypeExpected();
int i = 1;
this.setTypeExpected(i, TypeNames.INT); // event_crf_id
++i;
this.setTypeExpected(i, TypeNames.INT); // audit_id
++i;
this.setTypeExpected(i, TypeNames.STRING); // name
+... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOCFormDataAuditsTypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setOCFormDataAuditsTypesExpected | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAvailableOffline() {
return (mFlags & FLAG_AVAILABLE_OFFLINE) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAvailableOffline
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isAvailableOffline | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public void setEligibleForLegacyPermissionPrompt(boolean eligible) {
mIsEligibleForLegacyPermissionPrompt = eligible;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEligibleForLegacyPermissionPrompt
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | setEligibleForLegacyPermissionPrompt | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public abstract StringBuilder getGenericSignature(StringBuilder sb); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGenericSignature
File: src/main/java/com/fasterxml/jackson/databind/JavaType.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | getGenericSignature | src/main/java/com/fasterxml/jackson/databind/JavaType.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public static List<Descriptor<AuthorizationStrategy>> getAuthorizationStrategyDescriptors() {
return AuthorizationStrategy.all();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthorizationStrategyDescriptors
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getAuthorizationStrategyDescriptors | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removeStartingWindow(IBinder appToken, View window) {
if (DEBUG_STARTING_WINDOW) Slog.v(TAG, "Removing starting window for " + appToken + ": "
+ window + " Callers=" + Debug.getCallers(4));
if (window != null) {
WindowManager wm = (WindowManager)mCo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeStartingWindow
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | removeStartingWindow | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Definition sse(final String path, final Sse.Handler1 handler) {
return appendDefinition(GET, path, handler).consumes(MediaType.sse);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sse
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | sse | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | native boolean enableNative(); | Vulnerability Classification:
- CWE: CWE-362, CWE-20
- CVE: CVE-2016-3760
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Add guest mode functionality (3/3)
Add a flag to enable() to start Bluetooth in restricted
mode. In restricted mode, all devices that are paired during
restricted mode are deleted upon leaving r... | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | enableNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 1 |
Analyze the following code function for security vulnerabilities | @JsonIgnore
public File getWorkspaceDir() {
return _workspaceDir;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWorkspaceDir
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | getWorkspaceDir | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | private String getAttribute(Element element, String attributeName)
{
Attr attrribute = element.getAttributeNode(attributeName);
return attrribute != null ? attrribute.getValue() : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttribute
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | getAttribute | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | public boolean profileControl(String process, int userId, boolean start,
ProfilerInfo profilerInfo, int profileType) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeSt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: profileControl
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | profileControl | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void displayPreference(PreferenceScreen screen) {
super.displayPreference(screen);
MainSwitchPreference pref = screen.findPreference(getPreferenceKey());
pref.addOnSwitchChangeListener(this);
pref.updateStatus(isChecked());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayPreference
File: src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21247 | HIGH | 7.8 | android | displayPreference | src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java | edd4023805bc7fa54ae31de222cde02b9012bbc4 | 0 |
Analyze the following code function for security vulnerabilities | void setOomAdjObserver(int uid, OomAdjObserver observer) {
synchronized (this) {
mCurOomAdjUid = uid;
mCurOomAdjObserver = observer;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOomAdjObserver
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setOomAdjObserver | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("{username}/permissions")
@RequiresPermissions(RestPermissions.USERS_PERMISSIONSEDIT)
@ApiOperation("Update a user's permission set.")
@ApiResponses({
@ApiResponse(code = 400, message = "Missing or invalid permission data.")
})
@AuditEvent(type ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: editPermissions
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | editPermissions | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | public void copyIncludedFilesFromJarTrimmingBasePath(File jar,
String jarDirectoryToCopyFrom, File outputDirectory,
String... wildcardPathInclusions) {
requireFileExistence(jar);
if (!Objects.requireNonNull(outputDirectory).isDirectory()) {
throw new IllegalArgumentE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyIncludedFilesFromJarTrimmingBasePath
File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-379"
] | CVE-2021-31411 | MEDIUM | 4.6 | vaadin/flow | copyIncludedFilesFromJarTrimmingBasePath | flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java | 82cea56045b8430f7a26f037c01486b1feffa51d | 0 |
Analyze the following code function for security vulnerabilities | public StrongAuthTracker getStrongAuthTracker() {
return mStrongAuthTracker;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStrongAuthTracker
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | getStrongAuthTracker | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode()
{
return (int) Util.getHash(getLocalKey());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | hashCode | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void setKeyURL(String keyURL) {
this.keyURL = keyURL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyURL
File: base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setKeyURL | base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void getAuthTokenLabel(IAccountManagerResponse response, final String accountType,
final String authTokenType)
throws RemoteException {
Preconditions.checkArgument(accountType != null, "accountType cannot be null");
Preconditions.checkAr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthTokenLabel
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getAuthTokenLabel | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public Label getAssignedLabel() {
if(canRoam)
return null;
if(assignedNode==null)
return Jenkins.getInstance().getSelfLabel();
return Jenkins.getInstance().getLabel(assignedNode);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAssignedLabel
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getAssignedLabel | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | protected void internalSkipMessages(String subName, int numMessages, boolean authoritative) {
if (topicName.isGlobal()) {
validateGlobalNamespaceOwnership(namespaceName);
}
PartitionedTopicMetadata partitionMetadata = getPartitionedTopicMetadata(topicName,
authoritati... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalSkipMessages
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalSkipMessages | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public void setStatusFromConfig() {
// TODO: only call this when carbons changed, not on every presence change
CarbonManager.getInstanceFor(mXMPPConnection).sendCarbonsEnabled(mConfig.messageCarbons);
Presence presence = new Presence(Presence.Type.available);
Mode mode = Mode.valueOf(mConfig.getPresenceMode().... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStatusFromConfig
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | setStatusFromConfig | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | public void setTitlePrinted(boolean enabled) {
mTitlePrinted = enabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTitlePrinted
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setTitlePrinted | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public List<ApiScenrioExportJmx> exportJmx(ApiScenarioBatchRequest request) {
List<ApiScenarioWithBLOBs> apiScenarioWithBLOBs = getExportResult(request);
// 生成jmx
List<ApiScenrioExportJmx> resList = new ArrayList<>();
apiScenarioWithBLOBs.forEach(item -> {
if (StringUtils.isN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportJmx
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | exportJmx | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | public void updateAsciiStream(String columnName,
@Nullable InputStream inputStream, long length)
throws SQLException {
updateAsciiStream(findColumn(columnName), inputStream, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAsciiStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateAsciiStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getAttributeLocalName(int index){
return parser.getAttributeLocalName(index);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttributeLocalName
File: main/src/com/google/refine/importers/XmlImporter.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20157 | MEDIUM | 5 | OpenRefine | getAttributeLocalName | main/src/com/google/refine/importers/XmlImporter.java | 6a0d7d56e4ffb420316ce7849fde881344fbf881 | 0 |
Analyze the following code function for security vulnerabilities | public void setID(CertId id) {
this.id = id;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setID
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setID | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private static synchronized DocumentBuilder getDocBuilder() throws ParserConfigurationException {
if (docBuilderFactory == null)
initDocBuilderFactory();
DocumentBuilder docBuilder = docBuilderFactory.newDocumentBuilder();
docBuilder.setEntityResolver(new EntityResolver() {
... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2016-15026
- Severity: MEDIUM
- CVSS Score: 4.3
Description: 1) Take steps to guard against external XXE attacks (except, note that <!DOCTYPE> cannot be disabled in XML plists).
2) Resolve the actual PLIST DTD from inside the JAR file itself, and prevent resoluti... | [
"CWE-611"
] | CVE-2016-15026 | MEDIUM | 4.3 | 3breadt/dd-plist | getDocBuilder | src/main/java/com/dd/plist/XMLPropertyListParser.java | 8c954e8d9f6f6863729e50105a8abf3f87fff74c | 1 |
Analyze the following code function for security vulnerabilities | private void pushBackUnconsumedBytes() {
int remaining = inf.getRemaining();
BufferObjectDataInput bufferedInput = (BufferObjectDataInput) in;
int position = bufferedInput.position();
int rewindBack = max(0, remaining - ExtendedGZipInputStream.GZIP_TRAILER_SIZE);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pushBackUnconsumedBytes
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | pushBackUnconsumedBytes | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Response processAddDestination(DestinationInfo info) throws Exception {
TransportConnectionState cs = lookupConnectionState(info.getConnectionId());
broker.addDestinationInfo(cs.getContext(), info);
if (info.getDestination().isTemporary()) {
cs.addTempDestination... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processAddDestination
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | processAddDestination | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean forAllActivities(Predicate<ActivityRecord> callback, boolean traverseTopToBottom) {
return callback.test(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forAllActivities
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | forAllActivities | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | protected void requestRestoreLoad() {
if (mContentViewCore != null) mContentViewCore.requestRestoreLoad();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestRestoreLoad
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | requestRestoreLoad | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.