instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public final HeaderEntry<K, V> before() {
return before;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: before
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | before | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAssociatedCompanionApp(int userId, int uid) {
final Set<Integer> allUids = mCompanionAppUidsMap.get(userId);
if (allUids == null) {
return false;
}
return allUids.contains(uid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAssociatedCompanionApp
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | isAssociatedCompanionApp | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | protected void setOCItemDataDNs(OdmClinicalDataBean data, String idataIds, HashMap<Integer, String> idataOidPoses) {
this.setOCItemDataDNsTypesExpected();
HashMap<String, ArrayList<ChildNoteBean>> pDNs = new HashMap<String, ArrayList<ChildNoteBean>>();
// HashMap<String, ArrayList<DiscrepancyNot... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOCItemDataDNs
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setOCItemDataDNs | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | Call getForegroundCall() {
return mForegroundCall;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getForegroundCall
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getForegroundCall | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | public int getExpungeThreadCount() {
return myExpungeThreadCount;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getExpungeThreadCount
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | getExpungeThreadCount | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | @Transactional
public UploadPackageResultDto uploadPackage(MultipartFile pluginPackageFile) {
// 1. save package file to local
String tmpFileName = new SimpleDateFormat("yyyyMMddHHmmssSSS").format(new Date());
File localFilePath = new File(SystemUtils.getTempFolderPath() + tmpFileName + "/"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uploadPackage
File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
Repository: WeBankPartners/wecube-platform
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-45746 | MEDIUM | 5 | WeBankPartners/wecube-platform | uploadPackage | platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java | 1164dae43c505f8a0233cc049b2689d6ca6d0c37 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XWikiDocument getRevision(DocumentReference reference, String revision) throws XWikiException
{
// Parse the version
String revisionPrefix = null;
if (revision != null) {
int revisionPrefixIndex = revision.indexOf(':');
if (revisionPrefixIndex > 0... | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2023-29208
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-16285: Error when accessing deleted document
Function: getRevision
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DefaultDocumentRevisionProvider.java
Rep... | [
"CWE-668"
] | CVE-2023-29208 | HIGH | 7.5 | xwiki/xwiki-platform | getRevision | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DefaultDocumentRevisionProvider.java | d9e947559077e947315bf700c5703dfc7dd8a8d7 | 1 |
Analyze the following code function for security vulnerabilities | private void migrateAllLegacySettingsIfNeededLocked() {
final int key = makeKey(SETTINGS_TYPE_GLOBAL, UserHandle.USER_SYSTEM);
File globalFile = getSettingsFile(key);
if (SettingsState.stateFileExists(globalFile)) {
return;
}
mSettingsCreation... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrateAllLegacySettingsIfNeededLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | migrateAllLegacySettingsIfNeededLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | private String escapeString(final String string)
{
if (string == null || string.length() == 0) {
return "\"\"";
}
char c = 0;
int i;
final int len = string.length();
final StringBuilder sb = new StringBuilder(len + 4);
String t;
sb.append('"');
for (i = 0; i < len; i += 1) {
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2013-7250
- Severity: LOW
- CVSS Score: 3.5
Description: Escapes now HTML (JsonBuilder).
Function: escapeString
File: src/main/java/org/projectforge/web/core/JsonBuilder.java
Repository: micromata/projectforge-webapp
Fixed Code:
private String escapeString(final... | [
"CWE-79"
] | CVE-2013-7250 | LOW | 3.5 | micromata/projectforge-webapp | escapeString | src/main/java/org/projectforge/web/core/JsonBuilder.java | 5a6a25366491443b76e528a04a9e4ba26f08a83c | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void makePackageIdle(String packageName, int userId) {
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
!= PackageManager.PERMISSION_GRANTED) {
String msg = "Permission Denial: makePackageIdle() from pid="
+ Binder.g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makePackageIdle
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | makePackageIdle | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setFocusedStack(int stackId) {
enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "setFocusedStack()");
if (DEBUG_FOCUS) Slog.d(TAG_FOCUS, "setFocusedStack: stackId=" + stackId);
final long callingId = Binder.clearCallingIdentity();
try {
synchronized ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFocusedStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setFocusedStack | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("checkstyle:npathcomplexity")
protected BeanDefinition getEvictionConfig(Node node) {
Node size = node.getAttributes().getNamedItem("size");
Node maxSizePolicy = node.getAttributes().getNamedItem("max-size-policy");
Node evictionPolicy = node.getAttributes()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEvictionConfig
File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | getEvictionConfig | hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected PackageParser.ProviderIntentInfo[] newArray(int size) {
return new PackageParser.ProviderIntentInfo[size];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newArray
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | newArray | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public Number optNumber(String key) {
return this.optNumber(key, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optNumber
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | optNumber | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | public void close(final AjaxRequestTarget target)
{
target.appendJavaScript("$('#" + getMainContainerMarkupId() + "').modal('hide');");
} | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2013-7251
- Severity: MEDIUM
- CVSS Score: 6.8
Description: CSRF protection.
Function: close
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
Fixed Code:
public void close(final AjaxRequestTarget target)... | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | close | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 1 |
Analyze the following code function for security vulnerabilities | private String getBareJID(String from) {
String[] res = from.split("/", 2);
return res[0].toLowerCase();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBareJID
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | getBareJID | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getUidProcessState(int uid, String callingPackage) {
if (!hasUsageStatsPermission(callingPackage)) {
enforceCallingPermission(android.Manifest.permission.PACKAGE_USAGE_STATS,
"getUidProcessState");
}
// In case the caller is requesting pro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUidProcessState
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getUidProcessState | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | protected JavaType _typeFromId(String id, DatabindContext ctxt) throws IOException
{
// 24-Apr-2019, tatu: [databind#2195] validate as well as resolve:
JavaType t = ctxt.resolveAndValidateSubType(_baseType, id, _subTypeValidator);
if (t == null) {
if (ctxt instanceof Deserializat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _typeFromId
File: src/main/java/com/fasterxml/jackson/databind/jsontype/impl/ClassNameIdResolver.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | _typeFromId | src/main/java/com/fasterxml/jackson/databind/jsontype/impl/ClassNameIdResolver.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean moveActivityTaskToBack(IBinder token, boolean nonRoot) {
enforceNotIsolatedCaller("moveActivityTaskToBack");
synchronized(this) {
final long origId = Binder.clearCallingIdentity();
try {
int taskId = ActivityRecord.getTaskForActivityLo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveActivityTaskToBack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | moveActivityTaskToBack | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void execute(HttpServletRequest servletRequest, HttpServletResponse servletResponse) throws Exception
{
XWikiContext context = null;
try {
// Initialize the XWiki Context which is the main object used to pass information across
// classes/methods. It's a... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: execute
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | execute | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java | b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554 | 0 |
Analyze the following code function for security vulnerabilities | @POST
@Produces(MediaType.TEXT_XML)
@Path("addCatalog")
@RestQuery(name = "addCatalogURL", description = "Add a metadata catalog to a given media package using an URL", restParameters = {
@RestParameter(description = "The location of the catalog", isRequired = true, name = "url", type = RestParameter.Ty... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addMediaPackageCatalog
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2020-5230 | MEDIUM | 5 | opencast | addMediaPackageCatalog | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java | bbb473f34ab95497d6c432c81285efb0c739f317 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isFastMode() {
return fastmode;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFastMode
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | isFastMode | worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | public CopyBuildTask inFile(Getter<File> in) {
inputType = FILE;
inputFile = in;
orGetterChangeNoticer(in);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inFile
File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
Repository: Calsign/APDE
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36628 | CRITICAL | 9.8 | Calsign/APDE | inFile | APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java | c6d64cbe465348c1bfd211122d89e3117afadecf | 0 |
Analyze the following code function for security vulnerabilities | public ResourceRetriever getResourceRetriever() {
return resourceRetriever;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResourceRetriever
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | getResourceRetriever | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<BaseObject> updateObjectsFromRequest(String className, String pref, XWikiContext context)
throws XWikiException
{
return updateXObjectsFromRequest(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), pref,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateObjectsFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | updateObjectsFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setProcessForeground(IBinder token, int pid, boolean isForeground) {
enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT,
"setProcessForeground()");
synchronized(this) {
boolean changed = false;
synchronize... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProcessForeground
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | setProcessForeground | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String[] getAlias() {
return new String[0];
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAlias
File: src/main/java/de/presti/ree6/commands/impl/mod/Import.java
Repository: Ree6-Applications/Ree6
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-39302 | MEDIUM | 5.4 | Ree6-Applications/Ree6 | getAlias | src/main/java/de/presti/ree6/commands/impl/mod/Import.java | 459b5bc24f0ea27e50031f563373926e94b9aa0a | 0 |
Analyze the following code function for security vulnerabilities | private void writeBoolean(XmlSerializer xml, Bundle restrictions, String restrictionKey)
throws IOException {
if (restrictions.containsKey(restrictionKey)) {
xml.attribute(null, restrictionKey,
Boolean.toString(restrictions.getBoolean(restrictionKey)));
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeBoolean
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | writeBoolean | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | protected boolean browserHasNewestVersion(HttpServletRequest request,
long resourceLastModifiedTimestamp) {
assert resourceLastModifiedTimestamp >= -1L;
if (resourceLastModifiedTimestamp == -1L) {
// We do not know when it was modified so the browser cannot have an
/... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: browserHasNewestVersion
File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | browserHasNewestVersion | flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setxWikiClassXML(String xClassXML)
{
setXClassXML(xClassXML);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setxWikiClassXML
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setxWikiClassXML | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | static void writeTagExtra(TypedXmlSerializer out, String tag, PersistableBundle bundle)
throws IOException, XmlPullParserException {
if (bundle == null) return;
out.startTag(null, tag);
bundle.saveToXml(out);
out.endTag(null, tag);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeTagExtra
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | writeTagExtra | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public static String getFileName(String file) {
log.debug("getFileName({})", file);
int idx = file.lastIndexOf(".");
String ret = idx >= 0 ? file.substring(0, idx) : file;
log.debug("getFileName: {}", ret);
return ret;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileName
File: src/main/java/com/openkm/util/FileUtils.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-377"
] | CVE-2022-3969 | MEDIUM | 5.5 | openkm/document-management-system | getFileName | src/main/java/com/openkm/util/FileUtils.java | c069e4d73ab8864345c25119d8459495f45453e1 | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeSetDrawsContent(long nativeContentViewCoreImpl, boolean draws); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeSetDrawsContent
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | nativeSetDrawsContent | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | List<String> getSeeds() {
ArrayList<String> terms = new ArrayList<String>();
boolean trailingQuote = source.endsWith("\"");
boolean leadingQuote = source.startsWith("\"");
boolean trailingSpace = source.endsWith(" ");
if (trailingQuote || ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSeeds
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getSeeds | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void reportSizeConfigurations(IBinder token, int[] horizontalSizeConfiguration,
int[] verticalSizeConfigurations, int[] smallestSizeConfigurations) {
if (DEBUG_CONFIGURATION) Slog.v(TAG, "Report configuration: " + token + " "
+ horizontalSizeConfiguration + " " +... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportSizeConfigurations
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | reportSizeConfigurations | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canSetPasswordQualityOnParent(String packageName, final CallerIdentity caller) {
return !mInjector.isChangeEnabled(
PREVENT_SETTING_PASSWORD_QUALITY_ON_PARENT, packageName, caller.getUserId())
|| isProfileOwnerOfOrganizationOwnedDevice(caller);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canSetPasswordQualityOnParent
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | canSetPasswordQualityOnParent | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getUrlBeforeEdit() {
return state.urlBeforeEdit;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUrlBeforeEdit
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | getUrlBeforeEdit | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | public static String find() {
return BASE + UUID;
} | Vulnerability Classification:
- CWE: CWE-697
- CVE: CVE-2022-39308
- Severity: MEDIUM
- CVSS Score: 5.9
Description: Access Token APIs (#5797)
* Define a AuthTokenSqlMapDao to store and retrieve token information from DB
* Introduce Auth Token API to manage auth tokens
* Store the hashed token instead of stori... | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | find | spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 1 |
Analyze the following code function for security vulnerabilities | public long lastModified() {
return internal.lastModified();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lastModified
File: src/net/sourceforge/plantuml/security/SFile.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | lastModified | src/net/sourceforge/plantuml/security/SFile.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onUserStopped(@NonNull TargetUser user) {
mService.mBatteryStatsService.onCleanupUser(user.getUserIdentifier());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUserStopped
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | onUserStopped | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public String getUserPreference(String prefname, boolean useCookie, XWikiContext context)
{
// First we look in the cookies
if (useCookie) {
String result = Util.normalizeLanguage(getUserPreferenceFromCookie(prefname, context));
if (result != null) {
return re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserPreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getUserPreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public void setEditorEnabled(boolean isEnabled)
throws IllegalStateException {
if (isEditorActive()) {
throw new IllegalStateException(
"Cannot disable the editor while an item ("
+ getEditedItemId() + ") is being edited");
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEditorEnabled
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setEditorEnabled | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage
public @NonNull ApkAssets[] getApkAssets() {
synchronized (this) {
if (mOpen) {
return mApkAssets;
}
}
return sEmptyApkAssets;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApkAssets
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getApkAssets | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | void removeUserDirectory() {
this.userDirectory = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUserDirectory
File: modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2020-5206 | MEDIUM | 6.4 | opencast | removeUserDirectory | modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java | b157e1fb3b35991ca7bf59f0730329fbe7ce82e8 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canPlayMoveAnimation() {
// During the transition from pip to fullscreen, the activity windowing mode is set to
// fullscreen at the beginning while the task is kept in pinned mode. Skip the move
// animation in such case since the transition is handled in SysUI.
final b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canPlayMoveAnimation
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | canPlayMoveAnimation | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private Map<String, String> getRoleNameMap(Set<String> roleIds) throws org.graylog2.database.NotFoundException {
final Map<String, Role> roleMap = roleService.findIdMap(roleIds);
final Map<String, String> result = new HashMap<>(roleMap.size());
roleMap.forEach((key, value) -> result.put(key, val... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRoleNameMap
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | getRoleNameMap | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | private void calculateHistoryCount() {
myMemoryCacheService.get(MemoryCacheService.CacheEnum.HISTORY_COUNT, key, supplier);
new TransactionTemplate(myTxManager).executeWithoutResult(t->{
HistoryBuilder historyBuilder = myHistoryBuilderFactory.newHistoryBuilder(mySearchEntity.getResourceType(), mySearchEntity.ge... | Vulnerability Classification:
- CWE: CWE-400
- CVE: CVE-2021-32053
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Work on history caching
Function: calculateHistoryCount
File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
Repository: hapifhir/hapi-fhir
Fixed Code:
p... | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | calculateHistoryCount | hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java | f2934b229c491235ab0e7782dea86b324521082a | 1 |
Analyze the following code function for security vulnerabilities | private List<UserManager.EnforcingUser> getDevicePolicySources(
List<UserManager.EnforcingUser> sources) {
int sizeBefore = sources.size();
List<UserManager.EnforcingUser> realSources = new ArrayList<>(sizeBefore);
for (int i = 0; i < sizeBefore; i++) {
UserManager.Enforc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDevicePolicySources
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getDevicePolicySources | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public HTMLCleanerConfiguration getDefaultConfiguration()
{
HTMLCleanerConfiguration configuration = new DefaultHTMLCleanerConfiguration();
configuration.setFilters(Arrays.asList(
this.controlFilter,
this.bodyFilter,
this.listItemFilter,
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-29201
- Severity: CRITICAL
- CVSS Score: 9.0
Description: XCOMMONS-1680: Filter Html attributes in restricted mode based on a whitelist
* Add a SanitizerFilter that checks namespaces and filters elements
based on the HTMLElementSanitizer
Function: getDefa... | [
"CWE-79"
] | CVE-2023-29201 | CRITICAL | 9 | xwiki/xwiki-commons | getDefaultConfiguration | xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/DefaultHTMLCleaner.java | b11eae9d82cb53f32962056b5faa73f3720c6182 | 1 |
Analyze the following code function for security vulnerabilities | public float getScale() {
return mRenderCoordinates.getPageScaleFactor();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScale
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getScale | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isWhiteSpace() {
return current==' ' || current=='\t' || current=='\n' || current=='\r';
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isWhiteSpace
File: src/main/org/hjson/JsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | isWhiteSpace | src/main/org/hjson/JsonParser.java | 91bef056d56bf968451887421c89a44af1d692ff | 0 |
Analyze the following code function for security vulnerabilities | @RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN)
public long getPasswordExpiration(@Nullable ComponentName admin) {
if (mService != null) {
try {
return mService.getPasswordExpiration(admin, myUserId(), mParentInstance);
} catch (RemoteException e) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPasswordExpiration
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getPasswordExpiration | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void readPendingOperationsLocked() {
FileInputStream fis = null;
if (!mPendingFile.getBaseFile().exists()) {
if (Log.isLoggable(TAG_FILE, Log.VERBOSE)) {
Log.v(TAG_FILE, "No pending operation file.");
}
return;
}
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readPendingOperationsLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | readPendingOperationsLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | private void activate(HttpConversationContext conversationContext, final HttpServletRequest request) {
if (lazy && conversationContext instanceof LazyHttpConversationContextImpl) {
LazyHttpConversationContextImpl lazyConversationContext = (LazyHttpConversationContextImpl) conversationContext;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activate
File: impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java
Repository: weld/core
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2014-8122 | MEDIUM | 4.3 | weld/core | activate | impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java | 8e413202fa1af08c09c580f444e4fd16874f9c65 | 0 |
Analyze the following code function for security vulnerabilities | private String getVersion() {
for (NodeTuple tuple: getValue()) {
ScalarNode keyNode = (ScalarNode) tuple.getKeyNode();
if (keyNode.getValue().equals("version"))
return ((ScalarNode)tuple.getValueNode()).getValue();
}
throw new GeneralException("Unable to find version");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersion
File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-21249 | MEDIUM | 6.5 | theonedev/onedev | getVersion | server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java | d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66 | 0 |
Analyze the following code function for security vulnerabilities | @Editable(order=800, description=""
+ "Specifies name of the attribute inside the user LDAP entry whose value will be taken as user "
+ "email. This field is normally set to <i>mail</i> according to RFC 2798")
@NotEmpty
public String getUserEmailAttribute() {
return userEmailAttribute;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserEmailAttribute
File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
Repository: theonedev/onedev
The code follows secure coding pr... | [
"CWE-90"
] | CVE-2021-32651 | MEDIUM | 4.3 | theonedev/onedev | getUserEmailAttribute | server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java | 4440f0c57e440488d7e653417b2547eaae8ad19c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void runTool(String... args) throws SQLException {
boolean tcpStart = false, pgStart = false, webStart = false;
boolean browserStart = false;
boolean tcpShutdown = false, tcpShutdownForce = false;
String tcpPassword = "";
String tcpShutdownServer = "";
... | Vulnerability Classification:
- CWE: CWE-312
- CVE: CVE-2022-45868
- Severity: HIGH
- CVSS Score: 7.8
Description: Disallow plain webAdminPassword values to force usage of hashes
Function: runTool
File: h2/src/main/org/h2/tools/Server.java
Repository: h2database
Fixed Code:
@Override
public void runTool(String..... | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | runTool | h2/src/main/org/h2/tools/Server.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 1 |
Analyze the following code function for security vulnerabilities | public void setCertRequestType(String certRequestType) {
this.certRequestType = certRequestType;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCertRequestType
File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setCertRequestType | base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setActivityController(IActivityController controller, boolean imAMonkey) {
if (controller != null) {
Binder.allowBlocking(controller.asBinder());
}
mActivityTaskManager.setActivityController(controller, imAMonkey);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setActivityController
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | setActivityController | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setApiKey(String apiKey) {
for (Authentication auth : authentications.values()) {
if (auth instanceof ApiKeyAuth) {
((ApiKeyAuth) auth).setApiKey(apiKey);
return this;
}
}
throw new RuntimeException("No API key authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApiKey
File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setApiKey | samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasUsageStatsPermission(String callingPackage) {
final int mode = mAppOpsService.checkOperation(AppOpsManager.OP_GET_USAGE_STATS,
Binder.getCallingUid(), callingPackage);
if (mode == AppOpsManager.MODE_DEFAULT) {
return checkCallingPermission(Manifest.permissi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasUsageStatsPermission
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | hasUsageStatsPermission | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | void reloadHeaderBarLayout(boolean reloadWidget) {
Resources res = mContext.getResources();
mWindowRect = mSystemServicesProxy.getWindowRect();
mStatusBarHeight = res.getDimensionPixelSize(com.android.internal.R.dimen.status_bar_height);
mNavBarHeight = res.getDimensionPixelSize(com.andr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reloadHeaderBarLayout
File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0813 | MEDIUM | 6.6 | android | reloadHeaderBarLayout | packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java | 16a76dadcc23a13223e9c2216dad1fe5cad7d6e1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void unstableProviderDied(IBinder connection) {
mCpHelper.unstableProviderDied(connection);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unstableProviderDied
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | unstableProviderDied | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void onRectangleOnScreenRequested(IBinder token, Rect rectangle) {
synchronized (mWindowMap) {
if (mAccessibilityController != null) {
WindowState window = mWindowMap.get(token);
//TODO (multidisplay): Magnification is supported only for the default display.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRectangleOnScreenRequested
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | onRectangleOnScreenRequested | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean check(ExecutorConfig c1, ExecutorConfig c2) {
if (c1 == c2) {
return true;
}
if (c1 == null || c2 == null) {
return false;
}
int cap1 = c1.getQueueCapacity();
int cap2 = c2.getQueueCapacity(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void finishRecipientErrorDialog() {
// after the user dismisses the recipient error
// dialog we want to make sure to refocus the
// recipient to field so they can fix the issue
// easily
if (mTo != null) {
mTo.requestFocus();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishRecipientErrorDialog
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | finishRecipientErrorDialog | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | private void logIncoming(String msg, Object... params) {
// Keep these as debug; the incoming logging is traced on a package level through the
// session logging.
Log.d(this, "CS -> TC[" + Log.getPackageAbbreviation(mComponentName) + "]: "
+ msg, params);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logIncoming
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | logIncoming | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public String getNextPageUrl() throws IndexUnreachableException, DAOException {
return getNextPageUrl(1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNextPageUrl
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getNextPageUrl | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public void resetSimPasspointNetwork() {
mProviders.values().stream().forEach(p -> p.setAnonymousIdentity(null));
mWifiConfigManager.saveToStore(true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetSimPasspointNetwork
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | resetSimPasspointNetwork | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | private static void removeSpansOfType(SpannableString str, Class<?> cls) {
for (Object span : str.getSpans(0, str.length(), cls)) {
str.removeSpan(span);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeSpansOfType
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | removeSpansOfType | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public Integer getIntegerValue(String key) {
String value = fields.get(key);
if (value == null) { return null; }
try {
return Integer.parseInt(value);
} catch (NumberFormatException e) {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntegerValue
File: src/main/java/org/olat/restapi/support/MultipartReader.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | getIntegerValue | src/main/java/org/olat/restapi/support/MultipartReader.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | public Number getNumber(String key) throws JSONException {
Object object = this.get(key);
try {
if (object instanceof Number) {
return (Number)object;
}
return stringToNumber(object.toString());
} catch (Exception e) {
throw wrongVa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNumber
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | getNumber | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | public final void setEncoding(final String encoding) {
this.encoding = encoding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEncoding
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | setEncoding | cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("save")
@Csrf
public String save(@RequestAttribute SysSite site, @SessionAttribute SysUser admin, String path, String content,
HttpServletRequest request, ModelMap model) {
if (CommonUtils.notEmpty(path)) {
try {
String filepath = siteComponent.get... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-51252
- Severity: MEDIUM
- CVSS Score: 5.4
Description: https://github.com/sanluan/PublicCMS/issues/79
Function: save
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java
Repository: sanluan/Pu... | [
"CWE-79"
] | CVE-2023-51252 | MEDIUM | 5.4 | sanluan/PublicCMS | save | publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java | 2459a3f92c680ae011a369f32306c17df07caaa0 | 1 |
Analyze the following code function for security vulnerabilities | @Override
protected Column<?, ?> getColumnByInternalId(String internalId) {
return getGrid().getColumnByInternalId(internalId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColumnByInternalId
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getColumnByInternalId | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public void setDeRegisteredTitle(String deRegisteredTitle) {
this.deRegisteredTitle = deRegisteredTitle;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDeRegisteredTitle
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setDeRegisteredTitle | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onTextChanged(CharSequence s, int start, int before, int count) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTextChanged
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onTextChanged | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public int getSubscriptionId() {
return mSubscriptionId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSubscriptionId
File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | getSubscriptionId | framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final void finishHeavyWeightApp() {
if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES)
!= PackageManager.PERMISSION_GRANTED) {
String msg = "Permission Denial: finishHeavyWeightApp() from pid="
+ Binder.getCallingPid()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishHeavyWeightApp
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | finishHeavyWeightApp | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void setColorParams() throws Exception {
assertPlotParam("bgcolor", "x000000");
assertPlotParam("bgcolor", "XDEADBE");
assertPlotParam("bgcolor", "%58DEADBE");
assertInvalidPlotParam("bgcolor", "XDEADBEF");
assertInvalidPlotParam("bgcolor", "%5BDEADBE");
assertPlotParam("fgcolor"... | Vulnerability Classification:
- CWE: CWE-78
- CVE: CVE-2023-25826
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Improved fix for #2261.
Regular expressions wouldn't catch the newlines or possibly other
control characters. Now we'll use the TAG validation code to make
sure the inputs are only plain ASCII printabl... | [
"CWE-78"
] | CVE-2023-25826 | CRITICAL | 9.8 | OpenTSDB/opentsdb | setColorParams | test/tsd/TestGraphHandler.java | 26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25 | 1 |
Analyze the following code function for security vulnerabilities | public boolean hasEditComment(XWikiContext context)
{
String bl = getXWikiPreference("editcomment", "", context);
if ("1".equals(bl)) {
return true;
}
if ("0".equals(bl)) {
return false;
}
return "1".equals(getConfiguration().getProperty("xwi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasEditComment
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | hasEditComment | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public void getByIdAsString(String table, String id, Handler<AsyncResult<String>> replyHandler) {
getById(table, id, string -> string, replyHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getByIdAsString
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getByIdAsString | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void sendKeyguardBouncerChanged(boolean showingBouncer) {
if (DEBUG) Log.d(TAG, "sendKeyguardBouncerChanged(" + showingBouncer + ")");
Message message = mHandler.obtainMessage(MSG_KEYGUARD_BOUNCER_CHANGED);
message.arg1 = showingBouncer ? 1 : 0;
message.sendToTarget();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendKeyguardBouncerChanged
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | sendKeyguardBouncerChanged | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<Collection> findDirectMapped(Context context, int actionID) throws SQLException {
return collectionDAO
.findAuthorized(context, context.getCurrentUser(), Arrays.asList(Constants.ADD, Constants.ADMIN));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findDirectMapped
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | findDirectMapped | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | private boolean publishManifestShortcuts(List<ShortcutInfo> newManifestShortcutList) {
if (ShortcutService.DEBUG || ShortcutService.DEBUG_REBOOT) {
Slog.d(TAG, String.format(
"Package %s: publishing manifest shortcuts", getPackageName()));
}
boolean changed = fals... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: publishManifestShortcuts
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | publishManifestShortcuts | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | private static String concatSelections(String selection1, String selection2) {
if (TextUtils.isEmpty(selection1)) {
return selection2;
} else if (TextUtils.isEmpty(selection2)) {
return selection1;
} else {
return selection1 + " AND " + selection2;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: concatSelections
File: src/com/android/providers/telephony/MmsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-22"
] | CVE-2023-21268 | MEDIUM | 5.5 | android | concatSelections | src/com/android/providers/telephony/MmsProvider.java | ca4c9a19635119d95900793e7a41b820cd1d94d9 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
void tempAllowlistUidLocked(int targetUid, long duration, @ReasonCode int reasonCode,
String reason, @TempAllowListType int type, int callingUid) {
synchronized (mProcLock) {
// The temp allowlist type could change according to the reasonCode.
if (mLoca... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tempAllowlistUidLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | tempAllowlistUidLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public boolean tryEnableNetwork(int networkId) {
WifiConfiguration config = getInternalConfiguredNetwork(networkId);
if (config == null) {
return false;
}
if (mWifiBlocklistMonitor.shouldEnableNetwork(config)) {
return updateNetworkSelectionStatus(config, NetworkS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tryEnableNetwork
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | tryEnableNetwork | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private int getDefaultSubscription() {
return PhoneFactory.getDefaultSubscription();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultSubscription
File: src/java/com/android/internal/telephony/PhoneSubInfoController.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-0831 | MEDIUM | 4.3 | android | getDefaultSubscription | src/java/com/android/internal/telephony/PhoneSubInfoController.java | 79eecef63f3ea99688333c19e22813f54d4a31b1 | 0 |
Analyze the following code function for security vulnerabilities | public Scanner setElementName(String ename) {
fElementName = ename;
fStyle = fElementName.equalsIgnoreCase("STYLE");
fTextarea = fElementName.equalsIgnoreCase("TEXTAREA");
fTitle = fElementName.equalsIgnoreCase("TITLE");
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setElementName
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | setElementName | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | public void setScriptableObject(final Object scriptObject) {
scriptObject_ = scriptObject;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setScriptableObject
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | setScriptableObject | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | public Builder withPublicSeed(byte[] val)
{
publicSeed = XMSSUtil.cloneArray(val);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withPublicSeed
File: core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-470"
] | CVE-2018-1000613 | HIGH | 7.5 | bcgit/bc-java | withPublicSeed | core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java | 4092ede58da51af9a21e4825fbad0d9a3ef5a223 | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasMaximumRingingCalls() {
return MAXIMUM_RINGING_CALLS <= getNumCallsWithState(CallState.RINGING);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasMaximumRingingCalls
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | hasMaximumRingingCalls | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Override // binder call
public void onAcquired(long deviceId, int acquireInfo) {
mHandler.obtainMessage(MSG_ACQUIRED, acquireInfo, 0, deviceId).sendToTarget();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAcquired
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onAcquired | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PodOperationsImpl newInstance(OperationContext context) {
return new PodOperationsImpl((PodOperationContext) context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newInstance
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | newInstance | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isWebSafeImage(String fileName) {
fileName = fileName.toLowerCase();
return fileName.endsWith(".jpg") || fileName.endsWith(".jpeg")
|| fileName.endsWith(".gif") || fileName.endsWith(".png");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isWebSafeImage
File: server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-21242 | HIGH | 7.5 | theonedev/onedev | isWebSafeImage | server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java | f864053176c08f59ef2d97fea192ceca46a4d9be | 0 |
Analyze the following code function for security vulnerabilities | private static List<AppInfoVO> convert(List<AppInfoDO> data) {
if (CollectionUtils.isEmpty(data)) {
return Lists.newLinkedList();
}
return data.stream().map(appInfoDO -> {
AppInfoVO appInfoVO = new AppInfoVO();
BeanUtils.copyProperties(appInfoDO, appInfoVO);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convert
File: powerjob-server/src/main/java/com/github/kfcfans/powerjob/server/web/controller/AppInfoController.java
Repository: PowerJob
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2020-28865 | MEDIUM | 5 | PowerJob | convert | powerjob-server/src/main/java/com/github/kfcfans/powerjob/server/web/controller/AppInfoController.java | 464ce2dc0ca3e65fa1dc428239829890c52a413a | 0 |
Analyze the following code function for security vulnerabilities | private int runSetPermissionEnforced() {
final String permission = nextArg();
if (permission == null) {
System.err.println("Error: no permission specified");
showUsage();
return 1;
}
final String enforcedRaw = nextArg();
if (enforcedRaw == null... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runSetPermissionEnforced
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | runSetPermissionEnforced | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | static Expression<Object> toExpressionRecursively(Path<Object> path, PropertyPath property) {
Path<Object> result = path.get(property.getSegment());
return property.hasNext() ? toExpressionRecursively(result, property.next()) : result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toExpressionRecursively
File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | toExpressionRecursively | src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | public String formatDate(Date date, String format)
{
return this.xwiki.formatDate(date, format, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: formatDate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | formatDate | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.