instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public final HeaderEntry<K, V> before() { return before; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: before File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
before
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAssociatedCompanionApp(int userId, int uid) { final Set<Integer> allUids = mCompanionAppUidsMap.get(userId); if (allUids == null) { return false; } return allUids.contains(uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAssociatedCompanionApp File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
isAssociatedCompanionApp
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected void setOCItemDataDNs(OdmClinicalDataBean data, String idataIds, HashMap<Integer, String> idataOidPoses) { this.setOCItemDataDNsTypesExpected(); HashMap<String, ArrayList<ChildNoteBean>> pDNs = new HashMap<String, ArrayList<ChildNoteBean>>(); // HashMap<String, ArrayList<DiscrepancyNot...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOCItemDataDNs File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setOCItemDataDNs
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
Call getForegroundCall() { return mForegroundCall; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getForegroundCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getForegroundCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
public int getExpungeThreadCount() { return myExpungeThreadCount; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExpungeThreadCount File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getExpungeThreadCount
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Transactional public UploadPackageResultDto uploadPackage(MultipartFile pluginPackageFile) { // 1. save package file to local String tmpFileName = new SimpleDateFormat("yyyyMMddHHmmssSSS").format(new Date()); File localFilePath = new File(SystemUtils.getTempFolderPath() + tmpFileName + "/"...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uploadPackage File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
uploadPackage
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
@Override public XWikiDocument getRevision(DocumentReference reference, String revision) throws XWikiException { // Parse the version String revisionPrefix = null; if (revision != null) { int revisionPrefixIndex = revision.indexOf(':'); if (revisionPrefixIndex > 0...
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2023-29208 - Severity: HIGH - CVSS Score: 7.5 Description: XWIKI-16285: Error when accessing deleted document Function: getRevision File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DefaultDocumentRevisionProvider.java Rep...
[ "CWE-668" ]
CVE-2023-29208
HIGH
7.5
xwiki/xwiki-platform
getRevision
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DefaultDocumentRevisionProvider.java
d9e947559077e947315bf700c5703dfc7dd8a8d7
1
Analyze the following code function for security vulnerabilities
private void migrateAllLegacySettingsIfNeededLocked() { final int key = makeKey(SETTINGS_TYPE_GLOBAL, UserHandle.USER_SYSTEM); File globalFile = getSettingsFile(key); if (SettingsState.stateFileExists(globalFile)) { return; } mSettingsCreation...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateAllLegacySettingsIfNeededLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
migrateAllLegacySettingsIfNeededLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
private String escapeString(final String string) { if (string == null || string.length() == 0) { return "\"\""; } char c = 0; int i; final int len = string.length(); final StringBuilder sb = new StringBuilder(len + 4); String t; sb.append('"'); for (i = 0; i < len; i += 1) { ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2013-7250 - Severity: LOW - CVSS Score: 3.5 Description: Escapes now HTML (JsonBuilder). Function: escapeString File: src/main/java/org/projectforge/web/core/JsonBuilder.java Repository: micromata/projectforge-webapp Fixed Code: private String escapeString(final...
[ "CWE-79" ]
CVE-2013-7250
LOW
3.5
micromata/projectforge-webapp
escapeString
src/main/java/org/projectforge/web/core/JsonBuilder.java
5a6a25366491443b76e528a04a9e4ba26f08a83c
1
Analyze the following code function for security vulnerabilities
@Override public void makePackageIdle(String packageName, int userId) { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: makePackageIdle() from pid=" + Binder.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makePackageIdle File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
makePackageIdle
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void setFocusedStack(int stackId) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "setFocusedStack()"); if (DEBUG_FOCUS) Slog.d(TAG_FOCUS, "setFocusedStack: stackId=" + stackId); final long callingId = Binder.clearCallingIdentity(); try { synchronized ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocusedStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setFocusedStack
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("checkstyle:npathcomplexity") protected BeanDefinition getEvictionConfig(Node node) { Node size = node.getAttributes().getNamedItem("size"); Node maxSizePolicy = node.getAttributes().getNamedItem("max-size-policy"); Node evictionPolicy = node.getAttributes()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEvictionConfig File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
getEvictionConfig
hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override protected PackageParser.ProviderIntentInfo[] newArray(int size) { return new PackageParser.ProviderIntentInfo[size]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newArray File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
newArray
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public Number optNumber(String key) { return this.optNumber(key, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optNumber File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optNumber
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public void close(final AjaxRequestTarget target) { target.appendJavaScript("$('#" + getMainContainerMarkupId() + "').modal('hide');"); }
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2013-7251 - Severity: MEDIUM - CVSS Score: 6.8 Description: CSRF protection. Function: close File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp Fixed Code: public void close(final AjaxRequestTarget target)...
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
close
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
1
Analyze the following code function for security vulnerabilities
private String getBareJID(String from) { String[] res = from.split("/", 2); return res[0].toLowerCase(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBareJID File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
getBareJID
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
@Override public int getUidProcessState(int uid, String callingPackage) { if (!hasUsageStatsPermission(callingPackage)) { enforceCallingPermission(android.Manifest.permission.PACKAGE_USAGE_STATS, "getUidProcessState"); } // In case the caller is requesting pro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidProcessState File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getUidProcessState
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected JavaType _typeFromId(String id, DatabindContext ctxt) throws IOException { // 24-Apr-2019, tatu: [databind#2195] validate as well as resolve: JavaType t = ctxt.resolveAndValidateSubType(_baseType, id, _subTypeValidator); if (t == null) { if (ctxt instanceof Deserializat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _typeFromId File: src/main/java/com/fasterxml/jackson/databind/jsontype/impl/ClassNameIdResolver.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_typeFromId
src/main/java/com/fasterxml/jackson/databind/jsontype/impl/ClassNameIdResolver.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@Override public boolean moveActivityTaskToBack(IBinder token, boolean nonRoot) { enforceNotIsolatedCaller("moveActivityTaskToBack"); synchronized(this) { final long origId = Binder.clearCallingIdentity(); try { int taskId = ActivityRecord.getTaskForActivityLo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveActivityTaskToBack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
moveActivityTaskToBack
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override public void execute(HttpServletRequest servletRequest, HttpServletResponse servletResponse) throws Exception { XWikiContext context = null; try { // Initialize the XWiki Context which is the main object used to pass information across // classes/methods. It's a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
execute
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
@POST @Produces(MediaType.TEXT_XML) @Path("addCatalog") @RestQuery(name = "addCatalogURL", description = "Add a metadata catalog to a given media package using an URL", restParameters = { @RestParameter(description = "The location of the catalog", isRequired = true, name = "url", type = RestParameter.Ty...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addMediaPackageCatalog File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
addMediaPackageCatalog
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
@Override public boolean isFastMode() { return fastmode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFastMode File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
isFastMode
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public CopyBuildTask inFile(Getter<File> in) { inputType = FILE; inputFile = in; orGetterChangeNoticer(in); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inFile File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
inFile
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
public ResourceRetriever getResourceRetriever() { return resourceRetriever; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResourceRetriever File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java Repository: pac4j The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-44878
MEDIUM
5
pac4j
getResourceRetriever
pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
22b82ffd702a132d9f09da60362fc6264fc281ae
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<BaseObject> updateObjectsFromRequest(String className, String pref, XWikiContext context) throws XWikiException { return updateXObjectsFromRequest( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), pref, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateObjectsFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
updateObjectsFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public void setProcessForeground(IBinder token, int pid, boolean isForeground) { enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT, "setProcessForeground()"); synchronized(this) { boolean changed = false; synchronize...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProcessForeground File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
setProcessForeground
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public String[] getAlias() { return new String[0]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAlias File: src/main/java/de/presti/ree6/commands/impl/mod/Import.java Repository: Ree6-Applications/Ree6 The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-39302
MEDIUM
5.4
Ree6-Applications/Ree6
getAlias
src/main/java/de/presti/ree6/commands/impl/mod/Import.java
459b5bc24f0ea27e50031f563373926e94b9aa0a
0
Analyze the following code function for security vulnerabilities
private void writeBoolean(XmlSerializer xml, Bundle restrictions, String restrictionKey) throws IOException { if (restrictions.containsKey(restrictionKey)) { xml.attribute(null, restrictionKey, Boolean.toString(restrictions.getBoolean(restrictionKey))); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeBoolean File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
writeBoolean
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
protected boolean browserHasNewestVersion(HttpServletRequest request, long resourceLastModifiedTimestamp) { assert resourceLastModifiedTimestamp >= -1L; if (resourceLastModifiedTimestamp == -1L) { // We do not know when it was modified so the browser cannot have an /...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: browserHasNewestVersion File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
browserHasNewestVersion
flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
6ae6460ca4f3a9b50bd46fbf49c807fe67718307
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setxWikiClassXML(String xClassXML) { setXClassXML(xClassXML); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setxWikiClassXML File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setxWikiClassXML
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
static void writeTagExtra(TypedXmlSerializer out, String tag, PersistableBundle bundle) throws IOException, XmlPullParserException { if (bundle == null) return; out.startTag(null, tag); bundle.saveToXml(out); out.endTag(null, tag); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeTagExtra File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
writeTagExtra
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public static String getFileName(String file) { log.debug("getFileName({})", file); int idx = file.lastIndexOf("."); String ret = idx >= 0 ? file.substring(0, idx) : file; log.debug("getFileName: {}", ret); return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileName File: src/main/java/com/openkm/util/FileUtils.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-377" ]
CVE-2022-3969
MEDIUM
5.5
openkm/document-management-system
getFileName
src/main/java/com/openkm/util/FileUtils.java
c069e4d73ab8864345c25119d8459495f45453e1
0
Analyze the following code function for security vulnerabilities
private native void nativeSetDrawsContent(long nativeContentViewCoreImpl, boolean draws);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeSetDrawsContent File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
nativeSetDrawsContent
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
List<String> getSeeds() { ArrayList<String> terms = new ArrayList<String>(); boolean trailingQuote = source.endsWith("\""); boolean leadingQuote = source.startsWith("\""); boolean trailingSpace = source.endsWith(" "); if (trailingQuote || ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSeeds File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getSeeds
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public void reportSizeConfigurations(IBinder token, int[] horizontalSizeConfiguration, int[] verticalSizeConfigurations, int[] smallestSizeConfigurations) { if (DEBUG_CONFIGURATION) Slog.v(TAG, "Report configuration: " + token + " " + horizontalSizeConfiguration + " " +...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportSizeConfigurations File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
reportSizeConfigurations
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private boolean canSetPasswordQualityOnParent(String packageName, final CallerIdentity caller) { return !mInjector.isChangeEnabled( PREVENT_SETTING_PASSWORD_QUALITY_ON_PARENT, packageName, caller.getUserId()) || isProfileOwnerOfOrganizationOwnedDevice(caller); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canSetPasswordQualityOnParent File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
canSetPasswordQualityOnParent
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public String getUrlBeforeEdit() { return state.urlBeforeEdit; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUrlBeforeEdit File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
getUrlBeforeEdit
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
public static String find() { return BASE + UUID; }
Vulnerability Classification: - CWE: CWE-697 - CVE: CVE-2022-39308 - Severity: MEDIUM - CVSS Score: 5.9 Description: Access Token APIs (#5797) * Define a AuthTokenSqlMapDao to store and retrieve token information from DB * Introduce Auth Token API to manage auth tokens * Store the hashed token instead of stori...
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
find
spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java
236d4baf92e6607f2841c151c855adcc477238b8
1
Analyze the following code function for security vulnerabilities
public long lastModified() { return internal.lastModified(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lastModified File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
lastModified
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public void onUserStopped(@NonNull TargetUser user) { mService.mBatteryStatsService.onCleanupUser(user.getUserIdentifier()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserStopped File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
onUserStopped
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String getUserPreference(String prefname, boolean useCookie, XWikiContext context) { // First we look in the cookies if (useCookie) { String result = Util.normalizeLanguage(getUserPreferenceFromCookie(prefname, context)); if (result != null) { return re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserPreference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getUserPreference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void setEditorEnabled(boolean isEnabled) throws IllegalStateException { if (isEditorActive()) { throw new IllegalStateException( "Cannot disable the editor while an item (" + getEditedItemId() + ") is being edited"); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEditorEnabled File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setEditorEnabled
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@UnsupportedAppUsage public @NonNull ApkAssets[] getApkAssets() { synchronized (this) { if (mOpen) { return mApkAssets; } } return sEmptyApkAssets; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApkAssets File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getApkAssets
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
void removeUserDirectory() { this.userDirectory = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUserDirectory File: modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2020-5206
MEDIUM
6.4
opencast
removeUserDirectory
modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java
b157e1fb3b35991ca7bf59f0730329fbe7ce82e8
0
Analyze the following code function for security vulnerabilities
private boolean canPlayMoveAnimation() { // During the transition from pip to fullscreen, the activity windowing mode is set to // fullscreen at the beginning while the task is kept in pinned mode. Skip the move // animation in such case since the transition is handled in SysUI. final b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canPlayMoveAnimation File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
canPlayMoveAnimation
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private Map<String, String> getRoleNameMap(Set<String> roleIds) throws org.graylog2.database.NotFoundException { final Map<String, Role> roleMap = roleService.findIdMap(roleIds); final Map<String, String> result = new HashMap<>(roleMap.size()); roleMap.forEach((key, value) -> result.put(key, val...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRoleNameMap File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
getRoleNameMap
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
private void calculateHistoryCount() { myMemoryCacheService.get(MemoryCacheService.CacheEnum.HISTORY_COUNT, key, supplier); new TransactionTemplate(myTxManager).executeWithoutResult(t->{ HistoryBuilder historyBuilder = myHistoryBuilderFactory.newHistoryBuilder(mySearchEntity.getResourceType(), mySearchEntity.ge...
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2021-32053 - Severity: MEDIUM - CVSS Score: 5.0 Description: Work on history caching Function: calculateHistoryCount File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java Repository: hapifhir/hapi-fhir Fixed Code: p...
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
calculateHistoryCount
hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
f2934b229c491235ab0e7782dea86b324521082a
1
Analyze the following code function for security vulnerabilities
private List<UserManager.EnforcingUser> getDevicePolicySources( List<UserManager.EnforcingUser> sources) { int sizeBefore = sources.size(); List<UserManager.EnforcingUser> realSources = new ArrayList<>(sizeBefore); for (int i = 0; i < sizeBefore; i++) { UserManager.Enforc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDevicePolicySources File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getDevicePolicySources
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public HTMLCleanerConfiguration getDefaultConfiguration() { HTMLCleanerConfiguration configuration = new DefaultHTMLCleanerConfiguration(); configuration.setFilters(Arrays.asList( this.controlFilter, this.bodyFilter, this.listItemFilter, ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29201 - Severity: CRITICAL - CVSS Score: 9.0 Description: XCOMMONS-1680: Filter Html attributes in restricted mode based on a whitelist * Add a SanitizerFilter that checks namespaces and filters elements based on the HTMLElementSanitizer Function: getDefa...
[ "CWE-79" ]
CVE-2023-29201
CRITICAL
9
xwiki/xwiki-commons
getDefaultConfiguration
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/DefaultHTMLCleaner.java
b11eae9d82cb53f32962056b5faa73f3720c6182
1
Analyze the following code function for security vulnerabilities
public float getScale() { return mRenderCoordinates.getPageScaleFactor(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getScale File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getScale
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private boolean isWhiteSpace() { return current==' ' || current=='\t' || current=='\n' || current=='\r'; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWhiteSpace File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
isWhiteSpace
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) public long getPasswordExpiration(@Nullable ComponentName admin) { if (mService != null) { try { return mService.getPasswordExpiration(admin, myUserId(), mParentInstance); } catch (RemoteException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordExpiration File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPasswordExpiration
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void readPendingOperationsLocked() { FileInputStream fis = null; if (!mPendingFile.getBaseFile().exists()) { if (Log.isLoggable(TAG_FILE, Log.VERBOSE)) { Log.v(TAG_FILE, "No pending operation file."); } return; } try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readPendingOperationsLocked File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
readPendingOperationsLocked
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
private void activate(HttpConversationContext conversationContext, final HttpServletRequest request) { if (lazy && conversationContext instanceof LazyHttpConversationContextImpl) { LazyHttpConversationContextImpl lazyConversationContext = (LazyHttpConversationContextImpl) conversationContext; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activate File: impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
activate
impl/src/main/java/org/jboss/weld/servlet/ConversationContextActivator.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
private String getVersion() { for (NodeTuple tuple: getValue()) { ScalarNode keyNode = (ScalarNode) tuple.getKeyNode(); if (keyNode.getValue().equals("version")) return ((ScalarNode)tuple.getValueNode()).getValue(); } throw new GeneralException("Unable to find version"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVersion File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21249
MEDIUM
6.5
theonedev/onedev
getVersion
server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66
0
Analyze the following code function for security vulnerabilities
@Editable(order=800, description="" + "Specifies name of the attribute inside the user LDAP entry whose value will be taken as user " + "email. This field is normally set to <i>mail</i> according to RFC 2798") @NotEmpty public String getUserEmailAttribute() { return userEmailAttribute; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserEmailAttribute File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java Repository: theonedev/onedev The code follows secure coding pr...
[ "CWE-90" ]
CVE-2021-32651
MEDIUM
4.3
theonedev/onedev
getUserEmailAttribute
server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
4440f0c57e440488d7e653417b2547eaae8ad19c
0
Analyze the following code function for security vulnerabilities
@Override public void runTool(String... args) throws SQLException { boolean tcpStart = false, pgStart = false, webStart = false; boolean browserStart = false; boolean tcpShutdown = false, tcpShutdownForce = false; String tcpPassword = ""; String tcpShutdownServer = ""; ...
Vulnerability Classification: - CWE: CWE-312 - CVE: CVE-2022-45868 - Severity: HIGH - CVSS Score: 7.8 Description: Disallow plain webAdminPassword values to force usage of hashes Function: runTool File: h2/src/main/org/h2/tools/Server.java Repository: h2database Fixed Code: @Override public void runTool(String.....
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
runTool
h2/src/main/org/h2/tools/Server.java
23ee3d0b973923c135fa01356c8eaed40b895393
1
Analyze the following code function for security vulnerabilities
public void setCertRequestType(String certRequestType) { this.certRequestType = certRequestType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCertRequestType File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setCertRequestType
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void setActivityController(IActivityController controller, boolean imAMonkey) { if (controller != null) { Binder.allowBlocking(controller.asBinder()); } mActivityTaskManager.setActivityController(controller, imAMonkey); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setActivityController File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setActivityController
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKey(String apiKey) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKey(apiKey); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKey File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKey
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private boolean hasUsageStatsPermission(String callingPackage) { final int mode = mAppOpsService.checkOperation(AppOpsManager.OP_GET_USAGE_STATS, Binder.getCallingUid(), callingPackage); if (mode == AppOpsManager.MODE_DEFAULT) { return checkCallingPermission(Manifest.permissi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasUsageStatsPermission File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
hasUsageStatsPermission
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
void reloadHeaderBarLayout(boolean reloadWidget) { Resources res = mContext.getResources(); mWindowRect = mSystemServicesProxy.getWindowRect(); mStatusBarHeight = res.getDimensionPixelSize(com.android.internal.R.dimen.status_bar_height); mNavBarHeight = res.getDimensionPixelSize(com.andr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reloadHeaderBarLayout File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
reloadHeaderBarLayout
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
0
Analyze the following code function for security vulnerabilities
@Override public void unstableProviderDied(IBinder connection) { mCpHelper.unstableProviderDied(connection); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unstableProviderDied File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
unstableProviderDied
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void onRectangleOnScreenRequested(IBinder token, Rect rectangle) { synchronized (mWindowMap) { if (mAccessibilityController != null) { WindowState window = mWindowMap.get(token); //TODO (multidisplay): Magnification is supported only for the default display. ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRectangleOnScreenRequested File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
onRectangleOnScreenRequested
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override boolean check(ExecutorConfig c1, ExecutorConfig c2) { if (c1 == c2) { return true; } if (c1 == null || c2 == null) { return false; } int cap1 = c1.getQueueCapacity(); int cap2 = c2.getQueueCapacity(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private void finishRecipientErrorDialog() { // after the user dismisses the recipient error // dialog we want to make sure to refocus the // recipient to field so they can fix the issue // easily if (mTo != null) { mTo.requestFocus(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishRecipientErrorDialog File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
finishRecipientErrorDialog
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
private void logIncoming(String msg, Object... params) { // Keep these as debug; the incoming logging is traced on a package level through the // session logging. Log.d(this, "CS -> TC[" + Log.getPackageAbbreviation(mComponentName) + "]: " + msg, params); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logIncoming File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
logIncoming
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public String getNextPageUrl() throws IndexUnreachableException, DAOException { return getNextPageUrl(1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNextPageUrl File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getNextPageUrl
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public void resetSimPasspointNetwork() { mProviders.values().stream().forEach(p -> p.setAnonymousIdentity(null)); mWifiConfigManager.saveToStore(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetSimPasspointNetwork File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
resetSimPasspointNetwork
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private static void removeSpansOfType(SpannableString str, Class<?> cls) { for (Object span : str.getSpans(0, str.length(), cls)) { str.removeSpan(span); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeSpansOfType File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
removeSpansOfType
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public Integer getIntegerValue(String key) { String value = fields.get(key); if (value == null) { return null; } try { return Integer.parseInt(value); } catch (NumberFormatException e) { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntegerValue File: src/main/java/org/olat/restapi/support/MultipartReader.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
getIntegerValue
src/main/java/org/olat/restapi/support/MultipartReader.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
public Number getNumber(String key) throws JSONException { Object object = this.get(key); try { if (object instanceof Number) { return (Number)object; } return stringToNumber(object.toString()); } catch (Exception e) { throw wrongVa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNumber File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
getNumber
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public final void setEncoding(final String encoding) { this.encoding = encoding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEncoding File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
setEncoding
cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
@RequestMapping("save") @Csrf public String save(@RequestAttribute SysSite site, @SessionAttribute SysUser admin, String path, String content, HttpServletRequest request, ModelMap model) { if (CommonUtils.notEmpty(path)) { try { String filepath = siteComponent.get...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-51252 - Severity: MEDIUM - CVSS Score: 5.4 Description: https://github.com/sanluan/PublicCMS/issues/79 Function: save File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java Repository: sanluan/Pu...
[ "CWE-79" ]
CVE-2023-51252
MEDIUM
5.4
sanluan/PublicCMS
save
publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java
2459a3f92c680ae011a369f32306c17df07caaa0
1
Analyze the following code function for security vulnerabilities
@Override protected Column<?, ?> getColumnByInternalId(String internalId) { return getGrid().getColumnByInternalId(internalId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColumnByInternalId File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getColumnByInternalId
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public void setDeRegisteredTitle(String deRegisteredTitle) { this.deRegisteredTitle = deRegisteredTitle; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDeRegisteredTitle File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setDeRegisteredTitle
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public void onTextChanged(CharSequence s, int start, int before, int count) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTextChanged File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onTextChanged
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public int getSubscriptionId() { return mSubscriptionId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSubscriptionId File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
getSubscriptionId
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public final void finishHeavyWeightApp() { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: finishHeavyWeightApp() from pid=" + Binder.getCallingPid()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishHeavyWeightApp File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
finishHeavyWeightApp
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Test public void setColorParams() throws Exception { assertPlotParam("bgcolor", "x000000"); assertPlotParam("bgcolor", "XDEADBE"); assertPlotParam("bgcolor", "%58DEADBE"); assertInvalidPlotParam("bgcolor", "XDEADBEF"); assertInvalidPlotParam("bgcolor", "%5BDEADBE"); assertPlotParam("fgcolor"...
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2023-25826 - Severity: CRITICAL - CVSS Score: 9.8 Description: Improved fix for #2261. Regular expressions wouldn't catch the newlines or possibly other control characters. Now we'll use the TAG validation code to make sure the inputs are only plain ASCII printabl...
[ "CWE-78" ]
CVE-2023-25826
CRITICAL
9.8
OpenTSDB/opentsdb
setColorParams
test/tsd/TestGraphHandler.java
26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25
1
Analyze the following code function for security vulnerabilities
public boolean hasEditComment(XWikiContext context) { String bl = getXWikiPreference("editcomment", "", context); if ("1".equals(bl)) { return true; } if ("0".equals(bl)) { return false; } return "1".equals(getConfiguration().getProperty("xwi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasEditComment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
hasEditComment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void getByIdAsString(String table, String id, Handler<AsyncResult<String>> replyHandler) { getById(table, id, string -> string, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByIdAsString File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getByIdAsString
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void sendKeyguardBouncerChanged(boolean showingBouncer) { if (DEBUG) Log.d(TAG, "sendKeyguardBouncerChanged(" + showingBouncer + ")"); Message message = mHandler.obtainMessage(MSG_KEYGUARD_BOUNCER_CHANGED); message.arg1 = showingBouncer ? 1 : 0; message.sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendKeyguardBouncerChanged File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
sendKeyguardBouncerChanged
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public List<Collection> findDirectMapped(Context context, int actionID) throws SQLException { return collectionDAO .findAuthorized(context, context.getCurrentUser(), Arrays.asList(Constants.ADD, Constants.ADMIN)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findDirectMapped File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
findDirectMapped
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private boolean publishManifestShortcuts(List<ShortcutInfo> newManifestShortcutList) { if (ShortcutService.DEBUG || ShortcutService.DEBUG_REBOOT) { Slog.d(TAG, String.format( "Package %s: publishing manifest shortcuts", getPackageName())); } boolean changed = fals...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: publishManifestShortcuts File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
publishManifestShortcuts
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
private static String concatSelections(String selection1, String selection2) { if (TextUtils.isEmpty(selection1)) { return selection2; } else if (TextUtils.isEmpty(selection2)) { return selection1; } else { return selection1 + " AND " + selection2; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: concatSelections File: src/com/android/providers/telephony/MmsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-22" ]
CVE-2023-21268
MEDIUM
5.5
android
concatSelections
src/com/android/providers/telephony/MmsProvider.java
ca4c9a19635119d95900793e7a41b820cd1d94d9
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void tempAllowlistUidLocked(int targetUid, long duration, @ReasonCode int reasonCode, String reason, @TempAllowListType int type, int callingUid) { synchronized (mProcLock) { // The temp allowlist type could change according to the reasonCode. if (mLoca...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempAllowlistUidLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
tempAllowlistUidLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public boolean tryEnableNetwork(int networkId) { WifiConfiguration config = getInternalConfiguredNetwork(networkId); if (config == null) { return false; } if (mWifiBlocklistMonitor.shouldEnableNetwork(config)) { return updateNetworkSelectionStatus(config, NetworkS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryEnableNetwork File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
tryEnableNetwork
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private int getDefaultSubscription() { return PhoneFactory.getDefaultSubscription(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultSubscription File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getDefaultSubscription
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
public Scanner setElementName(String ename) { fElementName = ename; fStyle = fElementName.equalsIgnoreCase("STYLE"); fTextarea = fElementName.equalsIgnoreCase("TEXTAREA"); fTitle = fElementName.equalsIgnoreCase("TITLE"); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setElementName File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
setElementName
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
public void setScriptableObject(final Object scriptObject) { scriptObject_ = scriptObject; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setScriptableObject File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
setScriptableObject
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
public Builder withPublicSeed(byte[] val) { publicSeed = XMSSUtil.cloneArray(val); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPublicSeed File: core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-470" ]
CVE-2018-1000613
HIGH
7.5
bcgit/bc-java
withPublicSeed
core/src/main/java/org/bouncycastle/pqc/crypto/xmss/XMSSMTPrivateKeyParameters.java
4092ede58da51af9a21e4825fbad0d9a3ef5a223
0
Analyze the following code function for security vulnerabilities
private boolean hasMaximumRingingCalls() { return MAXIMUM_RINGING_CALLS <= getNumCallsWithState(CallState.RINGING); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasMaximumRingingCalls File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
hasMaximumRingingCalls
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Override // binder call public void onAcquired(long deviceId, int acquireInfo) { mHandler.obtainMessage(MSG_ACQUIRED, acquireInfo, 0, deviceId).sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAcquired File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAcquired
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public PodOperationsImpl newInstance(OperationContext context) { return new PodOperationsImpl((PodOperationContext) context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
newInstance
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
public boolean isWebSafeImage(String fileName) { fileName = fileName.toLowerCase(); return fileName.endsWith(".jpg") || fileName.endsWith(".jpeg") || fileName.endsWith(".gif") || fileName.endsWith(".png"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWebSafeImage File: server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
isWebSafeImage
server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
private static List<AppInfoVO> convert(List<AppInfoDO> data) { if (CollectionUtils.isEmpty(data)) { return Lists.newLinkedList(); } return data.stream().map(appInfoDO -> { AppInfoVO appInfoVO = new AppInfoVO(); BeanUtils.copyProperties(appInfoDO, appInfoVO); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convert File: powerjob-server/src/main/java/com/github/kfcfans/powerjob/server/web/controller/AppInfoController.java Repository: PowerJob The code follows secure coding practices.
[ "CWE-522" ]
CVE-2020-28865
MEDIUM
5
PowerJob
convert
powerjob-server/src/main/java/com/github/kfcfans/powerjob/server/web/controller/AppInfoController.java
464ce2dc0ca3e65fa1dc428239829890c52a413a
0
Analyze the following code function for security vulnerabilities
private int runSetPermissionEnforced() { final String permission = nextArg(); if (permission == null) { System.err.println("Error: no permission specified"); showUsage(); return 1; } final String enforcedRaw = nextArg(); if (enforcedRaw == null...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runSetPermissionEnforced File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runSetPermissionEnforced
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
static Expression<Object> toExpressionRecursively(Path<Object> path, PropertyPath property) { Path<Object> result = path.get(property.getSegment()); return property.hasNext() ? toExpressionRecursively(result, property.next()) : result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toExpressionRecursively File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
toExpressionRecursively
src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public String formatDate(Date date, String format) { return this.xwiki.formatDate(date, format, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatDate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
formatDate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0