instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public StandardTemplateParams headerless(boolean headerless) {
mHeaderless = headerless;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: headerless
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | headerless | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private void resetUserChangesToRuntimePermissionsAndFlagsLPw(int userId) {
final int packageCount = mPackages.size();
for (int i = 0; i < packageCount; i++) {
PackageParser.Package pkg = mPackages.valueAt(i);
PackageSetting ps = (PackageSetting) pkg.mExtras;
resetUser... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetUserChangesToRuntimePermissionsAndFlagsLPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | resetUserChangesToRuntimePermissionsAndFlagsLPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Boolean isUsedInFetchArtifact(PipelineConfig pipelineConfig) {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUsedInFetchArtifact
File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | isUsedInFetchArtifact | domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | public String findFilter( String url_suffix )
{
if( url_suffix == null )
{
throw new IllegalArgumentException( "The url_suffix must not be null." );
}
CaptureType type = em.find( CaptureType.class, url_suffix );
if( type != null )
{
... | Vulnerability Classification:
- CWE: CWE-754
- CVE: CVE-2021-39196
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Fixed major security bug.
A user could effectively specify an undefined url and the program would return a null filter rather than throwing an exception and returning an error to the user. This was a r... | [
"CWE-754"
] | CVE-2021-39196 | MEDIUM | 6.8 | jdhwpgmbca/pcapture | findFilter | src/main/java/com/rtds/svc/CaptureTypeService.java | 0f74f431e0970a2e5784dbd955cfa4760e3b1ef7 | 1 |
Analyze the following code function for security vulnerabilities | private void assignImplicitRanks(List<ShortcutInfo> shortcuts) {
for (int i = shortcuts.size() - 1; i >= 0; i--) {
shortcuts.get(i).setImplicitRank(i);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: assignImplicitRanks
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | assignImplicitRanks | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_WIPE_DATA, conditional = true)
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN)
public void setMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int num) {
if (mService != null) {
try {
mService.setMaximum... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaximumFailedPasswordsForWipe
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setMaximumFailedPasswordsForWipe | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ThreadGroup getThreadGroup() {
if (!isActive)
return super.getThreadGroup();
return testThreadGroup;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThreadGroup
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | getThreadGroup | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | public void clearProfileOwnerLocked(ActiveAdmin admin, int userId) {
mDeviceAdminServiceController.stopServiceForOwner(userId, "clear-profile-owner");
if (admin != null) {
admin.disableCamera = false;
admin.userRestrictions = null;
admin.defaultEnabledRestrictionsAlr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearProfileOwnerLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | clearProfileOwnerLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Api getPluginApi(XWikiPluginInterface plugin, XWikiContext context)
{
return new SkinExtensionPluginApi((AbstractSkinExtensionPlugin) plugin, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPluginApi
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
The code follows secure c... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | getPluginApi | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Definition patch(final String path,
final Route.Filter filter) {
return appendDefinition(PATCH, path, filter);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: patch
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | patch | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public State newTileState() {
State state = new State();
state.handlesLongClick = false;
return state;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newTileState
File: packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21289 | MEDIUM | 5.5 | android | newTileState | packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java | 7a5e51c918b7097be3c7e669e1825a4d159c4185 | 0 |
Analyze the following code function for security vulnerabilities | private String getMetricsTag() {
String tag = getClass().getName();
if (getIntent() != null && getIntent().hasExtra(EXTRA_SHOW_FRAGMENT)) {
tag = getIntent().getStringExtra(EXTRA_SHOW_FRAGMENT);
}
if (tag.startsWith("com.android.settings.")) {
tag = tag.replace("c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetricsTag
File: src/com/android/settings/SettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | getMetricsTag | src/com/android/settings/SettingsActivity.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | public void sendConfirmationEmail(String xwikiname, String password, String email, String message,
String contentfield, XWikiContext context) throws XWikiException
{
sendValidationEmail(xwikiname, password, email, "message", message, contentfield, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendConfirmationEmail
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | sendConfirmationEmail | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | TaskRecord recentTaskForIdLocked(int id) {
final int N = mRecentTasks.size();
for (int i=0; i<N; i++) {
TaskRecord tr = mRecentTasks.get(i);
if (tr.taskId == id) {
return tr;
}
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recentTaskForIdLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | recentTaskForIdLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void cancel(Account account, OCFile file) {
cancel(account.name, file.getRemotePath(), null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancel
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | cancel | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | private void resetBuffer(final XMLStringBuffer buffer, final int lineNumber,
final int columnNumber, final int characterOffset) {
lineNumber_ = lineNumber;
columnNumber_ = columnNumber;
this.characterOffset_ = characterOffset;
this.buffer = buffer.ch;
this.offset = buffe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetBuffer
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | resetBuffer | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | protected void fillValues(Node node, BeanDefinitionBuilder builder, String... excludeNames) {
Collection<String> epn = excludeNames != null && excludeNames.length > 0
? new HashSet<String>(asList(excludeNames)) : null;
fillAttributeValues(node, builder, epn);
for ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillValues
File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | fillValues | hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void updateEditablity() {
boolean canWrite = this.conversation.getMode() == Conversation.MODE_SINGLE || this.conversation.getMucOptions().participating() || this.conversation.getNextCounterpart() != null;
this.binding.textinput.setFocusable(canWrite);
this.binding.textinput.setFocusableI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateEditablity
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | updateEditablity | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void exportProject(long projectId, TarArchiveOutputStream tos) throws IOException {
File dir = this.getProjectDir(projectId);
this.tarDir("", dir, tos);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportProject
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | exportProject | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void processRequest() throws Exception {
FormProcessor fp = new FormProcessor(request);
String filePathName = "";
String fileName = fp.getString("fileName");
File f = new File(fileName);
if(fileName != null && fileName.indexOf("..") > -1) {
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-24830
- Severity: HIGH
- CVSS Score: 7.5
Description: OC-17139: code changes after code review
Function: processRequest
File: web/src/main/java/org/akaza/openclinica/control/submit/DownloadAttachedFileServlet.java
Repository: OpenClinica
Fixed Code:
@Overr... | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | processRequest | web/src/main/java/org/akaza/openclinica/control/submit/DownloadAttachedFileServlet.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 1 |
Analyze the following code function for security vulnerabilities | private static String toQuotedCommaSeparatedString(final Set<String> roles) {
return Joiner.on(',').join(Iterables.transform(roles, s -> {
return new StringBuilder(s.length() + 2).append('"').append(s).append('"').toString();
}));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toQuotedCommaSeparatedString
File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
Repository: opensearch-project/security
The code follows secure coding practices. | [
"CWE-612",
"CWE-863"
] | CVE-2022-41918 | MEDIUM | 6.3 | opensearch-project/security | toQuotedCommaSeparatedString | src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java | f7cc569c9d3fa5d5432c76c854eed280d45ce6f4 | 0 |
Analyze the following code function for security vulnerabilities | public void updateBlob(@Positive int columnIndex, @Nullable InputStream inputStream, long length)
throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(),
"updateBlob(int, InputStream, long)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBlob
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateBlob | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@After
public void tearDown() throws Exception {
super.tearDown();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tearDown
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | tearDown | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final DeserializerFactory withAdditionalDeserializers(Deserializers additional) {
return withConfig(_factoryConfig.withAdditionalDeserializers(additional));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withAdditionalDeserializers
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | withAdditionalDeserializers | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void discardMediaPackage(MediaPackage mp) throws IOException {
String mediaPackageId = mp.getIdentifier().toString();
for (MediaPackageElement element : mp.getElements()) {
if (!workingFileRepository.delete(mediaPackageId, element.getIdentifier()))
logger.warn("Unable to find (a... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: discardMediaPackage
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | discardMediaPackage | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | private static Object getProviderRoleById(Integer providerRoleId) {
// we have to fetch the provider role by reflection, since the provider management module is not a required dependency
try {
Class<?> providerManagementServiceClass = Context.loadClass("org.openmrs.module.providermanagement.api.ProviderManagem... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProviderRoleById
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | getProviderRoleById | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | 9dcd304688e65c31cac5532fe501b9816ed975ae | 0 |
Analyze the following code function for security vulnerabilities | int countMediaPackages() throws SearchServiceDatabaseException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: countMediaPackages
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-21318 | MEDIUM | 5.5 | opencast | countMediaPackages | modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java | b18c6a7f81f08ed14884592a6c14c9ab611ad450 | 0 |
Analyze the following code function for security vulnerabilities | public SVNRevision getRevision(SVNRevision defaultValue) {
SVNRevision revision = getRevisionFromRemoteUrl(remote);
return revision != null ? revision : defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevision
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | getRevision | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unused")
@CalledByNative
private void onFlingStartEventConsumed(int vx, int vy) {
mTouchScrollInProgress = false;
mPotentiallyActiveFlingCount++;
for (mGestureStateListenersIterator.rewind();
mGestureStateListenersIterator.hasNext();) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFlingStartEventConsumed
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | onFlingStartEventConsumed | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | public Mono<ActionExecutionResult> executeCommon(APIConnection apiConnection,
DatasourceConfiguration datasourceConfiguration,
ActionConfiguration actionConfiguration,
... | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2022-4096
- Severity: MEDIUM
- CVSS Score: 6.5
Description: fix: Better support for disallowed hosts (#16842)
Function: executeCommon
File: app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java
Repository: appsmithorg/ap... | [
"CWE-918"
] | CVE-2022-4096 | MEDIUM | 6.5 | appsmithorg/appsmith | executeCommon | app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java | 769719ccfe667f059fe0b107a19ec9feb90f2e40 | 1 |
Analyze the following code function for security vulnerabilities | private int compareSignaturesCompat(PackageSignatures existingSigs,
PackageParser.Package scannedPkg) {
if (!isCompatSignatureUpdateNeeded(scannedPkg)) {
return PackageManager.SIGNATURE_NO_MATCH;
}
ArraySet<Signature> existingSet = new ArraySet<Signature>();
for ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: compareSignaturesCompat
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | compareSignaturesCompat | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void sendConfirmationMail(String xwikiname, String password, String email, String contentfield)
throws XWikiException
{
if (hasProgrammingRights()) {
this.xwiki.sendConfirmationEmail(xwikiname, password, email, "", contentfield, getXWikiContext());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendConfirmationMail
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | sendConfirmationMail | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public void setUrl(URI url) {
this.url = url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUrl
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setUrl | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onUnlockMethodStateChanged() {
mLockIcon.update();
updateCameraVisibility();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUnlockMethodStateChanged
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onUnlockMethodStateChanged | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | protected void registerListeners() {
if (this instanceof XmppConnectionService.OnConversationUpdate) {
this.xmppConnectionService.setOnConversationListChangedListener((XmppConnectionService.OnConversationUpdate) this);
}
if (this instanceof XmppConnectionService.OnAccountUpdate) {
this.xmppConnectionService... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerListeners
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | registerListeners | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public boolean postsNeedApproval() {
return CONF.postsNeedApproval();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postsNeedApproval
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | postsNeedApproval | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private long toTimeMillis(K name, V value) {
try {
return valueConverter.convertToTimeMillis(value);
} catch (IllegalArgumentException e) {
throw new IllegalArgumentException(
"Failed to convert header value to millsecond for header '" + name + '\'');
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toTimeMillis
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | toTimeMillis | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | Builder setResultWho(String resultWho) {
mResultWho = resultWho;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResultWho
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setResultWho | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int checkAddPermission(WindowManager.LayoutParams attrs, int[] outAppOp) {
int type = attrs.type;
outAppOp[0] = AppOpsManager.OP_NONE;
if (!((type >= FIRST_APPLICATION_WINDOW && type <= LAST_APPLICATION_WINDOW)
|| (type >= FIRST_SUB_WINDOW && type <= LAST_S... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAddPermission
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | checkAddPermission | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void setMessage(String message) {
this.message = parser.parseExpression(message, ParserContext.TEMPLATE_EXPRESSION);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMessage
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setMessage | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
void checkAppWindowsReadyToShow() {
if (allDrawn == mLastAllDrawn) {
return;
}
mLastAllDrawn = allDrawn;
if (!allDrawn) {
return;
}
// The token has now changed state to having all windows shown... what to do, what to do?
i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAppWindowsReadyToShow
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | checkAppWindowsReadyToShow | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private UserOverviewDTO getAdminUserDTO(AllUserSessions sessions) {
final Optional<User> optionalAdmin = userManagementService.getRootUser();
if (!optionalAdmin.isPresent()) {
return null;
}
final User admin = optionalAdmin.get();
final Set<String> adminRoles = userMa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAdminUserDTO
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | getAdminUserDTO | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | public void saveLockPattern(List<LockPatternView.Cell> pattern, String savedPattern, int userId) {
try {
if (pattern == null || pattern.size() < MIN_LOCK_PATTERN_SIZE) {
throw new IllegalArgumentException("pattern must not be null and at least "
+ MIN_LOCK_PAT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveLockPattern
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | saveLockPattern | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | protected int engineDoFinal(
byte[] input,
int inputOffset,
int inputLen,
byte[] output,
int outputOffset)
throws IllegalBlockSizeException, BadPaddingException
{
if (input != null)
{
bOut.write(input, inputOffset, inputLen);... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineDoFinal
File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-361"
] | CVE-2016-1000345 | MEDIUM | 4.3 | bcgit/bc-java | engineDoFinal | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java | 21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35 | 0 |
Analyze the following code function for security vulnerabilities | private static String relativeToAbsoluteURI(KeycloakSession session, String rootUrl, String relative) {
if (rootUrl != null) {
rootUrl = ResolveRelative.resolveRootUrl(session, rootUrl);
}
if (rootUrl == null || rootUrl.isEmpty()) {
rootUrl = UriUtils.getOrigin(session.g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: relativeToAbsoluteURI
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | relativeToAbsoluteURI | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 0 |
Analyze the following code function for security vulnerabilities | protected JsonDeserializer<?> findConvertingContentDeserializer(DeserializationContext ctxt,
BeanProperty prop, JsonDeserializer<?> existingDeserializer)
throws JsonMappingException
{
final AnnotationIntrospector intr = ctxt.getAnnotationIntrospector();
if (_neitherNull(intr, pro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findConvertingContentDeserializer
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | findConvertingContentDeserializer | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | public List<ResolveInfo> queryIntentForPackage(Intent intent, String resolvedType,
int flags, ArrayList<PackageParser.Activity> packageActivities, int userId) {
if (!sUserManager.exists(userId)) return null;
if (packageActivities == null) {
return null;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryIntentForPackage
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryIntentForPackage | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | boolean finishIfSameAffinity(ActivityRecord r) {
// End search once we get to the activity that doesn't have the same affinity.
if (!Objects.equals(r.taskAffinity, taskAffinity)) return true;
r.finishIfPossible("request-affinity", true /* oomAdj */);
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishIfSameAffinity
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | finishIfSameAffinity | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public int getScmCheckoutRetryCount() {
return scmCheckoutRetryCount;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScmCheckoutRetryCount
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getScmCheckoutRetryCount | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | private void reportStartInstrumentationFailure(IInstrumentationWatcher watcher,
ComponentName cn, String report) {
Slog.w(TAG, report);
try {
if (watcher != null) {
Bundle results = new Bundle();
results.putString(Instrumentation.REPORT_KEY_IDENTIF... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportStartInstrumentationFailure
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | reportStartInstrumentationFailure | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | boolean beginFullBackup(FullBackupJob scheduledJob) {
long now = System.currentTimeMillis();
FullBackupEntry entry = null;
long latency = MIN_FULL_BACKUP_INTERVAL;
if (!mEnabled || !mProvisioned) {
// Backups are globally disabled, so don't proceed. We also don't reschedule... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: beginFullBackup
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | beginFullBackup | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onViewAttached() {
mUpdateMonitor.registerCallback(mKeyguardUpdateMonitorCallback);
mView.setSwipeListener(mSwipeListener);
mView.addMotionEventListener(mGlobalTouchListener);
mConfigurationController.addCallback(mConfigurationListener);
mUserSwitcher... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onViewAttached
File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21245 | HIGH | 7.8 | android | onViewAttached | packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java | a33159e8cb297b9eee6fa5c63c0e343d05fad622 | 0 |
Analyze the following code function for security vulnerabilities | private static void resolveGroupBy(@NonNull Bundle queryArgs,
@NonNull Consumer<String> honored) {
final String[] columns = queryArgs.getStringArray(QUERY_ARG_GROUP_COLUMNS);
if (columns != null && columns.length != 0) {
String groupBy = TextUtils.join(", ", columns);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveGroupBy
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | resolveGroupBy | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | public @Nullable Reader getNCharacterStream(@Positive int columnIndex) throws SQLException {
connection.getLogger().log(Level.FINEST, " getNCharacterStream columnIndex: {0}", columnIndex);
throw org.postgresql.Driver.notImplemented(this.getClass(), "getNCharacterStream(int)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNCharacterStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getNCharacterStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | protected void traceLdapEnv(Properties env)
{
if (trace)
{
Properties tmp = new Properties();
tmp.putAll(env);
String credentials = tmp.getProperty(Context.SECURITY_CREDENTIALS);
String bindCredential = tmp.getProperty(BIND_CREDENTIAL);
if (credentials != null... | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2015-1849
- Severity: MEDIUM
- CVSS Score: 4.3
Description: SECURITY-877
Function: traceLdapEnv
File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
Repository: wildfly-security/jboss-negotiation
Fixed Code:
p... | [
"CWE-200"
] | CVE-2015-1849 | MEDIUM | 4.3 | wildfly-security/jboss-negotiation | traceLdapEnv | jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java | 0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e | 1 |
Analyze the following code function for security vulnerabilities | private void notifyUploadStart(UploadFileOperation upload) {
// / create status notification with a progress bar
mLastPercent = 0;
mNotificationBuilder = NotificationUtils.newNotificationBuilder(this, themeColorUtils);
mNotificationBuilder
.setOngoing(true)
.setSm... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyUploadStart
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | notifyUploadStart | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | public List<ActivityManager.RunningAppProcessInfo> getRunningAppProcesses()
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRunningAppProcesses
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getRunningAppProcesses | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public KeyPair generateKeyPair()
{
if (!initialised)
{
DSAParametersGenerator pGen = new DSAParametersGenerator();
pGen.init(strength, certainty, random);
param = new DSAKeyGenerationParameters(random, pGen.generateParameters());
engine.init(param);
... | Vulnerability Classification:
- CWE: CWE-310
- CVE: CVE-2016-1000343
- Severity: MEDIUM
- CVSS Score: 5.0
Description: updated default DSA parameters to follow 186-4
Function: generateKeyPair
File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/KeyPairGeneratorSpi.java
Repository: bcgit/bc-java
F... | [
"CWE-310"
] | CVE-2016-1000343 | MEDIUM | 5 | bcgit/bc-java | generateKeyPair | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/KeyPairGeneratorSpi.java | 50a53068c094d6cff37659da33c9b4505becd389 | 1 |
Analyze the following code function for security vulnerabilities | @Deprecated
public boolean removeObjects(String className)
{
return removeXObjects(resolveClassReference(className));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | removeObjects | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAjaxRequest(Request request) {
String requestedWithHeader = request.getHeader(GeneralConstants.HTTP_HEADER_X_REQUESTED_WITH);
return requestedWithHeader != null && "XMLHttpRequest".equalsIgnoreCase(requestedWithHeader);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAjaxRequest
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practic... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | isAjaxRequest | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setExpansion(float headerExpansionFraction) {
mExpansionAmount = headerExpansionFraction;
mSecondHalfAnimator.setPosition(headerExpansionFraction);
if (mShowFullAlarm) {
mFirstHalfAnimator.setPosition(headerExpansionFraction);
}
mDateSizeAnim... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setExpansion
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3886 | HIGH | 7.2 | android | setExpansion | packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java | 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract HttpMessage createMessage(String[] initialLine) throws Exception; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createMessage
File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2019-16869 | MEDIUM | 5 | netty | createMessage | codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java | 39cafcb05c99f2aa9fce7e6597664c9ed6a63a95 | 0 |
Analyze the following code function for security vulnerabilities | public void issueExport(IssueExportRequest request, HttpServletResponse response) {
EasyExcelExporter.resetCellMaxTextLength();
Map<String, String> userMap = baseUserService.getProjectMemberOption(request.getProjectId()).stream().collect(Collectors.toMap(User::getId, User::getName));
// 获取缺陷模板及自... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: issueExport
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | issueExport | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private void updateAfterSizeChanged() {
mPopupZoomer.hide(false);
// Execute a delayed form focus operation because the OSK was brought
// up earlier.
if (!mFocusPreOSKViewportRect.isEmpty()) {
Rect rect = new Rect();
getContainerView().getWindowVisibleDisplayFra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAfterSizeChanged
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | updateAfterSizeChanged | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void saveAttachment(XWikiAttachment attachment, boolean deleted, XWikiContext context) throws XWikiException
{
try {
// If the comment is larger than the max size supported by the Storage, then abbreviate it
String comment = attachment.getComment();
if (comment !=... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveAttachment
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | saveAttachment | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) {
throwIfParentInstance("isNetworkLoggingEnabled");
return mIsNetworkLoggingEnabledCache.query(admin);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNetworkLoggingEnabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isNetworkLoggingEnabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Collection<LBVip> listVips() {
return vips.values();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: listVips
File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
Repository: floodlight
The code follows secure coding practices. | [
"CWE-362",
"CWE-476"
] | CVE-2015-6569 | MEDIUM | 4.3 | floodlight | listVips | src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java | 7f5bedb625eec3ff4d29987c31cef2553a962b36 | 0 |
Analyze the following code function for security vulnerabilities | public void onAuthenticationFailed() { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAuthenticationFailed
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onAuthenticationFailed | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public static SslHandler getSslHandler(Channel channel) {
return channel.pipeline().get(SslHandler.class);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSslHandler
File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | getSslHandler | providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public BaseClass getEditModeClass(XWikiContext context) throws XWikiException
{
return getMandatoryClass(context, new DocumentReference(
new LocalDocumentReference(XWikiConstant.EDIT_MODE_CLASS), new WikiReference(context.getWikiId())));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEditModeClass
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getEditModeClass | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public static void main(String[] args)throws Exception {
Process p = Runtime.getRuntime().exec("ls");
System.out.println(JNAUtil.getProcessID(p));
} | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2022-41958
- Severity: HIGH
- CVSS Score: 7.8
Description: yaml rce
Function: main
File: src/main/java/com/chaitin/xray/test/Main.java
Repository: 4ra1n/super-xray
Fixed Code:
public static void main(String[] args)throws Exception {
String context = "!!... | [
"CWE-502"
] | CVE-2022-41958 | HIGH | 7.8 | 4ra1n/super-xray | main | src/main/java/com/chaitin/xray/test/Main.java | 4d0d59663596db03f39d7edd2be251d48b52dcfc | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onNavigationItemSelected(int position, long itemId) {
int initialComposeMode = mComposeMode;
if (position == ComposeActivity.REPLY) {
mComposeMode = ComposeActivity.REPLY;
} else if (position == ComposeActivity.REPLY_ALL) {
mComposeMode = Comp... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onNavigationItemSelected
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | onNavigationItemSelected | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public void unbroadcastIntent(IApplicationThread caller, Intent intent, int userId)
throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(caller != null ? calle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unbroadcastIntent
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | unbroadcastIntent | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private Document parseXml(String xmlContent) {
try {
DocumentBuilder builder = DocumentBuilderFactory.newInstance().newDocumentBuilder();
Document document = builder.parse(new InputSource(new StringReader(xmlContent)));
document.getDocumentElement().normalize();
return document;
} catch (Exception e) ... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-0219
- Severity: MEDIUM
- CVSS Score: 4.3
Description: fix: use secure xml parser for process manifest
Function: parseXml
File: jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java
Repository: skylot/jadx
Fixed Code:
private Document parseXml(... | [
"CWE-611"
] | CVE-2022-0219 | MEDIUM | 4.3 | skylot/jadx | parseXml | jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java | d22db30166e7cb369d72be41382bb63ac8b81c52 | 1 |
Analyze the following code function for security vulnerabilities | public void sendStream(final int iCode, final String iReason, final String iContentType, InputStream iContent, long iSize,
final String iFileName) throws IOException {
writeStatus(iCode, iReason);
writeHeaders(iContentType);
writeLine("Content-Transfer-Encoding: binary");
if (iFileName != null) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendStream
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | sendStream | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServiceNotificationPolicy applyForegroundServiceNotification(
Notification notification, String tag, int id, String pkg, int userId) {
synchronized (ActivityManagerService.this) {
return mServices.applyForegroundServiceNotificationLocked(notification,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyForegroundServiceNotification
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | applyForegroundServiceNotification | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void onAuthenticationAcquired(int acquireInfo) {} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAuthenticationAcquired
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onAuthenticationAcquired | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean canShowTransient() {
return (mAttrs.insetsFlags.behavior & BEHAVIOR_SHOW_TRANSIENT_BARS_BY_SWIPE) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canShowTransient
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | canShowTransient | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public static String createSessionExpiredJSON(boolean async) {
JsonObject json = Json.createObject();
JsonObject meta = Json.createObject();
json.put("meta", meta);
if (async) {
meta.put(JsonConstants.META_ASYNC, true);
}
meta.put(JsonConstants.META_SESSION_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createSessionExpiredJSON
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | createSessionExpiredJSON | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | public static StringBuffer alterBodyHtmlAbsolutizePaths(StringBuffer HTML, String serverName)
{
return new StringBuffer(alterBodyHtmlAbsolutizePaths(HTML.toString(), serverName));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: alterBodyHtmlAbsolutizePaths
File: src/com/dotmarketing/factories/EmailFactory.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | alterBodyHtmlAbsolutizePaths | src/com/dotmarketing/factories/EmailFactory.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | public static Materials p4Materials(String view) {
P4Material material = p4Material("localhost:1666", "user", "password", view, true);
return new Materials(material);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: p4Materials
File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | p4Materials | domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | private static String removeUserInfoFromUrlPath(String url) {
// Simple solution:
final Matcher matcher = PATTERN_USERINFO.matcher(url);
if (matcher.find())
return matcher.replaceFirst("$1$3");
return url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUserInfoFromUrlPath
File: src/net/sourceforge/plantuml/security/SURL.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | removeUserInfoFromUrlPath | src/net/sourceforge/plantuml/security/SURL.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | public String dialogButtonsOk() {
return dialogButtons(new int[] {BUTTON_OK}, new String[1]);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogButtonsOk
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogButtonsOk | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | public static int defaultMaxConnectionPerHost() {
return Integer.getInteger(ASYNC_CLIENT + "maxConnectionsPerHost", -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultMaxConnectionPerHost
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultMaxConnectionPerHost | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | public abstract URL getStaticResource(String url); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStaticResource
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | getStaticResource | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Analyze the following code function for security vulnerabilities | private void readEscape() throws IOException {
read();
switch(current) {
case '"':
case '/':
case '\\':
captureBuffer.append((char)current);
break;
case 'b':
captureBuffer.append('\b');
break;
case 'f':
captureBuffer.append('\f');
bre... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readEscape
File: src/main/org/hjson/JsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | readEscape | src/main/org/hjson/JsonParser.java | 91bef056d56bf968451887421c89a44af1d692ff | 0 |
Analyze the following code function for security vulnerabilities | public static String loadTei(String pi, String language)
throws AccessDeniedException, FileNotFoundException, IOException, ViewerConfigurationException {
logger.trace("loadTei: {}/{}", pi, language);
if (pi == null) {
return null;
}
TextResourceBuilder builder = n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadTei
File: goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-15124 | MEDIUM | 4 | intranda/goobi-viewer-core | loadTei | goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java | 44ceb8e2e7e888391e8a941127171d6366770df3 | 0 |
Analyze the following code function for security vulnerabilities | public Element toDOM(Document document) {
Element requestElement = document.createElement("CertRetrievalRequest");
if (certId != null) {
Element issuerDNElement = document.createElement("certId");
issuerDNElement.appendChild(document.createTextNode(certId.toHexString()));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDOM
File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toDOM | base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected final float _parseFloatPrimitive(JsonParser p, DeserializationContext ctxt)
throws IOException
{
String text;
switch (p.currentTokenId()) {
case JsonTokenId.ID_STRING:
text = p.getText();
break;
case JsonTokenId.ID_NUMBER_INT:
fin... | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2022-42003
- Severity: HIGH
- CVSS Score: 7.5
Description: Fix #3590
Function: _parseFloatPrimitive
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
Fixed Code:
protected final float _parse... | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _parseFloatPrimitive | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 1 |
Analyze the following code function for security vulnerabilities | @Override
protected ServiceRegistry getServiceRegistry() {
return serviceRegistry;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServiceRegistry
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | getServiceRegistry | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setStrictPostBinding(Boolean strictPostBinding) {
logger
.warn("Option 'strictPostBinding' is deprecated and should not be used. This configuration is now set in picketlink.xml.");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStrictPostBinding
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding ... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | setStrictPostBinding | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean bypass(PackageNamePermissionQuery query) {
return query.userId < 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bypass
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | bypass | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject optJSONObject(String key) {
Object o = opt(key);
return o instanceof JSONObject ? (JSONObject)o : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optJSONObject
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | optJSONObject | src/main/java/org/codehaus/jettison/json/JSONObject.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean zoomOut() {
if (!canZoomOut()) {
return false;
}
return pinchByDelta(0.8f);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: zoomOut
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | zoomOut | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Collection<LBPool> listPools() {
return pools.values();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: listPools
File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
Repository: floodlight
The code follows secure coding practices. | [
"CWE-362",
"CWE-476"
] | CVE-2015-6569 | MEDIUM | 4.3 | floodlight | listPools | src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java | 7f5bedb625eec3ff4d29987c31cef2553a962b36 | 0 |
Analyze the following code function for security vulnerabilities | public void selectStream(String sql, JsonArray params, Handler<AsyncResult<SQLRowStream>> replyHandler) {
client.getConnection(conn -> selectStream(conn, sql, params, closeAndHandleResult(conn, replyHandler)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selectStream
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | selectStream | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | protected String unescape(final String s) {
return s.replace("\\\\", "\\");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unescape
File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java
Repository: codelibs/fess
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000822 | HIGH | 7.5 | codelibs/fess | unescape | src/main/java/org/codelibs/fess/util/GsaConfigParser.java | faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isUriCorrect(@Nonnull final String uri) {
return URI_PATTERN.matcher(uri).matches();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUriCorrect
File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
Repository: raydac/netbeans-mmd-plugin
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000542 | MEDIUM | 6.8 | raydac/netbeans-mmd-plugin | isUriCorrect | mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java | 9fba652bf06e649186b8f9e612d60e9cc15097e9 | 0 |
Analyze the following code function for security vulnerabilities | private JFileChooser createSaveFileChooser(boolean exportCall) {
JFileChooser fileChooser = new JFileChooser(calcInitialDir(exportCall));
fileChooser.setAcceptAllFileFilterUsed(false); // We don't want "all files" as a choice
// The input field should show the diagram name as preset
fileChooser.setSelectedFile(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createSaveFileChooser
File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
Repository: umlet
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | createSaveFileChooser | umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 0 |
Analyze the following code function for security vulnerabilities | public void animateCollapsePanels(int flags, boolean force, boolean delayed) {
animateCollapsePanels(flags, force, delayed, 1.0f /* speedUpFactor */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: animateCollapsePanels
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | animateCollapsePanels | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.