instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public StandardTemplateParams headerless(boolean headerless) { mHeaderless = headerless; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: headerless File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
headerless
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private void resetUserChangesToRuntimePermissionsAndFlagsLPw(int userId) { final int packageCount = mPackages.size(); for (int i = 0; i < packageCount; i++) { PackageParser.Package pkg = mPackages.valueAt(i); PackageSetting ps = (PackageSetting) pkg.mExtras; resetUser...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetUserChangesToRuntimePermissionsAndFlagsLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
resetUserChangesToRuntimePermissionsAndFlagsLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public Boolean isUsedInFetchArtifact(PipelineConfig pipelineConfig) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUsedInFetchArtifact File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
isUsedInFetchArtifact
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public String findFilter( String url_suffix ) { if( url_suffix == null ) { throw new IllegalArgumentException( "The url_suffix must not be null." ); } CaptureType type = em.find( CaptureType.class, url_suffix ); if( type != null ) { ...
Vulnerability Classification: - CWE: CWE-754 - CVE: CVE-2021-39196 - Severity: MEDIUM - CVSS Score: 6.8 Description: Fixed major security bug. A user could effectively specify an undefined url and the program would return a null filter rather than throwing an exception and returning an error to the user. This was a r...
[ "CWE-754" ]
CVE-2021-39196
MEDIUM
6.8
jdhwpgmbca/pcapture
findFilter
src/main/java/com/rtds/svc/CaptureTypeService.java
0f74f431e0970a2e5784dbd955cfa4760e3b1ef7
1
Analyze the following code function for security vulnerabilities
private void assignImplicitRanks(List<ShortcutInfo> shortcuts) { for (int i = shortcuts.size() - 1; i >= 0; i--) { shortcuts.get(i).setImplicitRank(i); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assignImplicitRanks File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
assignImplicitRanks
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_WIPE_DATA, conditional = true) @RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) public void setMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int num) { if (mService != null) { try { mService.setMaximum...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaximumFailedPasswordsForWipe File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setMaximumFailedPasswordsForWipe
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public ThreadGroup getThreadGroup() { if (!isActive) return super.getThreadGroup(); return testThreadGroup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThreadGroup File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
getThreadGroup
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public void clearProfileOwnerLocked(ActiveAdmin admin, int userId) { mDeviceAdminServiceController.stopServiceForOwner(userId, "clear-profile-owner"); if (admin != null) { admin.disableCamera = false; admin.userRestrictions = null; admin.defaultEnabledRestrictionsAlr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearProfileOwnerLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
clearProfileOwnerLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public Api getPluginApi(XWikiPluginInterface plugin, XWikiContext context) { return new SkinExtensionPluginApi((AbstractSkinExtensionPlugin) plugin, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPluginApi File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follows secure c...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
getPluginApi
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition patch(final String path, final Route.Filter filter) { return appendDefinition(PATCH, path, filter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: patch File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
patch
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public State newTileState() { State state = new State(); state.handlesLongClick = false; return state; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newTileState File: packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21289
MEDIUM
5.5
android
newTileState
packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java
7a5e51c918b7097be3c7e669e1825a4d159c4185
0
Analyze the following code function for security vulnerabilities
private String getMetricsTag() { String tag = getClass().getName(); if (getIntent() != null && getIntent().hasExtra(EXTRA_SHOW_FRAGMENT)) { tag = getIntent().getStringExtra(EXTRA_SHOW_FRAGMENT); } if (tag.startsWith("com.android.settings.")) { tag = tag.replace("c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricsTag File: src/com/android/settings/SettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
getMetricsTag
src/com/android/settings/SettingsActivity.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
public void sendConfirmationEmail(String xwikiname, String password, String email, String message, String contentfield, XWikiContext context) throws XWikiException { sendValidationEmail(xwikiname, password, email, "message", message, contentfield, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendConfirmationEmail File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
sendConfirmationEmail
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
TaskRecord recentTaskForIdLocked(int id) { final int N = mRecentTasks.size(); for (int i=0; i<N; i++) { TaskRecord tr = mRecentTasks.get(i); if (tr.taskId == id) { return tr; } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recentTaskForIdLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
recentTaskForIdLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void cancel(Account account, OCFile file) { cancel(account.name, file.getRemotePath(), null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancel File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
cancel
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
private void resetBuffer(final XMLStringBuffer buffer, final int lineNumber, final int columnNumber, final int characterOffset) { lineNumber_ = lineNumber; columnNumber_ = columnNumber; this.characterOffset_ = characterOffset; this.buffer = buffer.ch; this.offset = buffe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetBuffer File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
resetBuffer
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
protected void fillValues(Node node, BeanDefinitionBuilder builder, String... excludeNames) { Collection<String> epn = excludeNames != null && excludeNames.length > 0 ? new HashSet<String>(asList(excludeNames)) : null; fillAttributeValues(node, builder, epn); for ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillValues File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
fillValues
hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private void updateEditablity() { boolean canWrite = this.conversation.getMode() == Conversation.MODE_SINGLE || this.conversation.getMucOptions().participating() || this.conversation.getNextCounterpart() != null; this.binding.textinput.setFocusable(canWrite); this.binding.textinput.setFocusableI...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateEditablity File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
updateEditablity
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public void exportProject(long projectId, TarArchiveOutputStream tos) throws IOException { File dir = this.getProjectDir(projectId); this.tarDir("", dir, tos); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exportProject File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
exportProject
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
@Override public void processRequest() throws Exception { FormProcessor fp = new FormProcessor(request); String filePathName = ""; String fileName = fp.getString("fileName"); File f = new File(fileName); if(fileName != null && fileName.indexOf("..") > -1) { ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-24830 - Severity: HIGH - CVSS Score: 7.5 Description: OC-17139: code changes after code review Function: processRequest File: web/src/main/java/org/akaza/openclinica/control/submit/DownloadAttachedFileServlet.java Repository: OpenClinica Fixed Code: @Overr...
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
processRequest
web/src/main/java/org/akaza/openclinica/control/submit/DownloadAttachedFileServlet.java
6f864e86543f903bd20d6f9fc7056115106441f3
1
Analyze the following code function for security vulnerabilities
private static String toQuotedCommaSeparatedString(final Set<String> roles) { return Joiner.on(',').join(Iterables.transform(roles, s -> { return new StringBuilder(s.length() + 2).append('"').append(s).append('"').toString(); })); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toQuotedCommaSeparatedString File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
toQuotedCommaSeparatedString
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
public void updateBlob(@Positive int columnIndex, @Nullable InputStream inputStream, long length) throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "updateBlob(int, InputStream, long)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBlob File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateBlob
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override @After public void tearDown() throws Exception { super.tearDown(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tearDown File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
tearDown
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public final DeserializerFactory withAdditionalDeserializers(Deserializers additional) { return withConfig(_factoryConfig.withAdditionalDeserializers(additional)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withAdditionalDeserializers File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
withAdditionalDeserializers
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@Override public void discardMediaPackage(MediaPackage mp) throws IOException { String mediaPackageId = mp.getIdentifier().toString(); for (MediaPackageElement element : mp.getElements()) { if (!workingFileRepository.delete(mediaPackageId, element.getIdentifier())) logger.warn("Unable to find (a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: discardMediaPackage File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
discardMediaPackage
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
private static Object getProviderRoleById(Integer providerRoleId) { // we have to fetch the provider role by reflection, since the provider management module is not a required dependency try { Class<?> providerManagementServiceClass = Context.loadClass("org.openmrs.module.providermanagement.api.ProviderManagem...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProviderRoleById File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getProviderRoleById
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
int countMediaPackages() throws SearchServiceDatabaseException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countMediaPackages File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
countMediaPackages
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
public SVNRevision getRevision(SVNRevision defaultValue) { SVNRevision revision = getRevisionFromRemoteUrl(remote); return revision != null ? revision : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRevision File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getRevision
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void onFlingStartEventConsumed(int vx, int vy) { mTouchScrollInProgress = false; mPotentiallyActiveFlingCount++; for (mGestureStateListenersIterator.rewind(); mGestureStateListenersIterator.hasNext();) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFlingStartEventConsumed File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
onFlingStartEventConsumed
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
public Mono<ActionExecutionResult> executeCommon(APIConnection apiConnection, DatasourceConfiguration datasourceConfiguration, ActionConfiguration actionConfiguration, ...
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2022-4096 - Severity: MEDIUM - CVSS Score: 6.5 Description: fix: Better support for disallowed hosts (#16842) Function: executeCommon File: app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java Repository: appsmithorg/ap...
[ "CWE-918" ]
CVE-2022-4096
MEDIUM
6.5
appsmithorg/appsmith
executeCommon
app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java
769719ccfe667f059fe0b107a19ec9feb90f2e40
1
Analyze the following code function for security vulnerabilities
private int compareSignaturesCompat(PackageSignatures existingSigs, PackageParser.Package scannedPkg) { if (!isCompatSignatureUpdateNeeded(scannedPkg)) { return PackageManager.SIGNATURE_NO_MATCH; } ArraySet<Signature> existingSet = new ArraySet<Signature>(); for ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compareSignaturesCompat File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
compareSignaturesCompat
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void sendConfirmationMail(String xwikiname, String password, String email, String contentfield) throws XWikiException { if (hasProgrammingRights()) { this.xwiki.sendConfirmationEmail(xwikiname, password, email, "", contentfield, getXWikiContext()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendConfirmationMail File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
sendConfirmationMail
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public void setUrl(URI url) { this.url = url; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUrl File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setUrl
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public void onUnlockMethodStateChanged() { mLockIcon.update(); updateCameraVisibility(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUnlockMethodStateChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onUnlockMethodStateChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
protected void registerListeners() { if (this instanceof XmppConnectionService.OnConversationUpdate) { this.xmppConnectionService.setOnConversationListChangedListener((XmppConnectionService.OnConversationUpdate) this); } if (this instanceof XmppConnectionService.OnAccountUpdate) { this.xmppConnectionService...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerListeners File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
registerListeners
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public boolean postsNeedApproval() { return CONF.postsNeedApproval(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postsNeedApproval File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
postsNeedApproval
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private long toTimeMillis(K name, V value) { try { return valueConverter.convertToTimeMillis(value); } catch (IllegalArgumentException e) { throw new IllegalArgumentException( "Failed to convert header value to millsecond for header '" + name + '\''); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toTimeMillis File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
toTimeMillis
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
Builder setResultWho(String resultWho) { mResultWho = resultWho; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setResultWho File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setResultWho
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public int checkAddPermission(WindowManager.LayoutParams attrs, int[] outAppOp) { int type = attrs.type; outAppOp[0] = AppOpsManager.OP_NONE; if (!((type >= FIRST_APPLICATION_WINDOW && type <= LAST_APPLICATION_WINDOW) || (type >= FIRST_SUB_WINDOW && type <= LAST_S...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAddPermission File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
checkAddPermission
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public void setMessage(String message) { this.message = parser.parseExpression(message, ParserContext.TEMPLATE_EXPRESSION); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMessage File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setMessage
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override void checkAppWindowsReadyToShow() { if (allDrawn == mLastAllDrawn) { return; } mLastAllDrawn = allDrawn; if (!allDrawn) { return; } // The token has now changed state to having all windows shown... what to do, what to do? i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAppWindowsReadyToShow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
checkAppWindowsReadyToShow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private UserOverviewDTO getAdminUserDTO(AllUserSessions sessions) { final Optional<User> optionalAdmin = userManagementService.getRootUser(); if (!optionalAdmin.isPresent()) { return null; } final User admin = optionalAdmin.get(); final Set<String> adminRoles = userMa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAdminUserDTO File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
getAdminUserDTO
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
public void saveLockPattern(List<LockPatternView.Cell> pattern, String savedPattern, int userId) { try { if (pattern == null || pattern.size() < MIN_LOCK_PATTERN_SIZE) { throw new IllegalArgumentException("pattern must not be null and at least " + MIN_LOCK_PAT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveLockPattern File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
saveLockPattern
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
protected int engineDoFinal( byte[] input, int inputOffset, int inputLen, byte[] output, int outputOffset) throws IllegalBlockSizeException, BadPaddingException { if (input != null) { bOut.write(input, inputOffset, inputLen);...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineDoFinal File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-361" ]
CVE-2016-1000345
MEDIUM
4.3
bcgit/bc-java
engineDoFinal
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java
21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35
0
Analyze the following code function for security vulnerabilities
private static String relativeToAbsoluteURI(KeycloakSession session, String rootUrl, String relative) { if (rootUrl != null) { rootUrl = ResolveRelative.resolveRootUrl(session, rootUrl); } if (rootUrl == null || rootUrl.isEmpty()) { rootUrl = UriUtils.getOrigin(session.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: relativeToAbsoluteURI File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java Repository: keycloak The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4361
MEDIUM
6.1
keycloak
relativeToAbsoluteURI
services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
0
Analyze the following code function for security vulnerabilities
protected JsonDeserializer<?> findConvertingContentDeserializer(DeserializationContext ctxt, BeanProperty prop, JsonDeserializer<?> existingDeserializer) throws JsonMappingException { final AnnotationIntrospector intr = ctxt.getAnnotationIntrospector(); if (_neitherNull(intr, pro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findConvertingContentDeserializer File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
findConvertingContentDeserializer
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
public List<ResolveInfo> queryIntentForPackage(Intent intent, String resolvedType, int flags, ArrayList<PackageParser.Activity> packageActivities, int userId) { if (!sUserManager.exists(userId)) return null; if (packageActivities == null) { return null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryIntentForPackage File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
queryIntentForPackage
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
boolean finishIfSameAffinity(ActivityRecord r) { // End search once we get to the activity that doesn't have the same affinity. if (!Objects.equals(r.taskAffinity, taskAffinity)) return true; r.finishIfPossible("request-affinity", true /* oomAdj */); return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishIfSameAffinity File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
finishIfSameAffinity
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public int getScmCheckoutRetryCount() { return scmCheckoutRetryCount; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getScmCheckoutRetryCount File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getScmCheckoutRetryCount
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
private void reportStartInstrumentationFailure(IInstrumentationWatcher watcher, ComponentName cn, String report) { Slog.w(TAG, report); try { if (watcher != null) { Bundle results = new Bundle(); results.putString(Instrumentation.REPORT_KEY_IDENTIF...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportStartInstrumentationFailure File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
reportStartInstrumentationFailure
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
boolean beginFullBackup(FullBackupJob scheduledJob) { long now = System.currentTimeMillis(); FullBackupEntry entry = null; long latency = MIN_FULL_BACKUP_INTERVAL; if (!mEnabled || !mProvisioned) { // Backups are globally disabled, so don't proceed. We also don't reschedule...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginFullBackup File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
beginFullBackup
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override protected void onViewAttached() { mUpdateMonitor.registerCallback(mKeyguardUpdateMonitorCallback); mView.setSwipeListener(mSwipeListener); mView.addMotionEventListener(mGlobalTouchListener); mConfigurationController.addCallback(mConfigurationListener); mUserSwitcher...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onViewAttached File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
onViewAttached
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
private static void resolveGroupBy(@NonNull Bundle queryArgs, @NonNull Consumer<String> honored) { final String[] columns = queryArgs.getStringArray(QUERY_ARG_GROUP_COLUMNS); if (columns != null && columns.length != 0) { String groupBy = TextUtils.join(", ", columns); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveGroupBy File: src/com/android/providers/media/util/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-35683
MEDIUM
5.5
android
resolveGroupBy
src/com/android/providers/media/util/DatabaseUtils.java
23d156ed1bed6d2c2b325f0be540d0afca510c49
0
Analyze the following code function for security vulnerabilities
public @Nullable Reader getNCharacterStream(@Positive int columnIndex) throws SQLException { connection.getLogger().log(Level.FINEST, " getNCharacterStream columnIndex: {0}", columnIndex); throw org.postgresql.Driver.notImplemented(this.getClass(), "getNCharacterStream(int)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNCharacterStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getNCharacterStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
protected void traceLdapEnv(Properties env) { if (trace) { Properties tmp = new Properties(); tmp.putAll(env); String credentials = tmp.getProperty(Context.SECURITY_CREDENTIALS); String bindCredential = tmp.getProperty(BIND_CREDENTIAL); if (credentials != null...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2015-1849 - Severity: MEDIUM - CVSS Score: 4.3 Description: SECURITY-877 Function: traceLdapEnv File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java Repository: wildfly-security/jboss-negotiation Fixed Code: p...
[ "CWE-200" ]
CVE-2015-1849
MEDIUM
4.3
wildfly-security/jboss-negotiation
traceLdapEnv
jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e
1
Analyze the following code function for security vulnerabilities
private void notifyUploadStart(UploadFileOperation upload) { // / create status notification with a progress bar mLastPercent = 0; mNotificationBuilder = NotificationUtils.newNotificationBuilder(this, themeColorUtils); mNotificationBuilder .setOngoing(true) .setSm...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyUploadStart File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
notifyUploadStart
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
public List<ActivityManager.RunningAppProcessInfo> getRunningAppProcesses() throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRunningAppProcesses File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getRunningAppProcesses
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public KeyPair generateKeyPair() { if (!initialised) { DSAParametersGenerator pGen = new DSAParametersGenerator(); pGen.init(strength, certainty, random); param = new DSAKeyGenerationParameters(random, pGen.generateParameters()); engine.init(param); ...
Vulnerability Classification: - CWE: CWE-310 - CVE: CVE-2016-1000343 - Severity: MEDIUM - CVSS Score: 5.0 Description: updated default DSA parameters to follow 186-4 Function: generateKeyPair File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/KeyPairGeneratorSpi.java Repository: bcgit/bc-java F...
[ "CWE-310" ]
CVE-2016-1000343
MEDIUM
5
bcgit/bc-java
generateKeyPair
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/KeyPairGeneratorSpi.java
50a53068c094d6cff37659da33c9b4505becd389
1
Analyze the following code function for security vulnerabilities
@Deprecated public boolean removeObjects(String className) { return removeXObjects(resolveClassReference(className)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
removeObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private boolean isAjaxRequest(Request request) { String requestedWithHeader = request.getHeader(GeneralConstants.HTTP_HEADER_X_REQUESTED_WITH); return requestedWithHeader != null && "XMLHttpRequest".equalsIgnoreCase(requestedWithHeader); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAjaxRequest File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practic...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
isAjaxRequest
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public void setExpansion(float headerExpansionFraction) { mExpansionAmount = headerExpansionFraction; mSecondHalfAnimator.setPosition(headerExpansionFraction); if (mShowFullAlarm) { mFirstHalfAnimator.setPosition(headerExpansionFraction); } mDateSizeAnim...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setExpansion File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3886
HIGH
7.2
android
setExpansion
packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
0
Analyze the following code function for security vulnerabilities
protected abstract HttpMessage createMessage(String[] initialLine) throws Exception;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createMessage File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2019-16869
MEDIUM
5
netty
createMessage
codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
39cafcb05c99f2aa9fce7e6597664c9ed6a63a95
0
Analyze the following code function for security vulnerabilities
public void issueExport(IssueExportRequest request, HttpServletResponse response) { EasyExcelExporter.resetCellMaxTextLength(); Map<String, String> userMap = baseUserService.getProjectMemberOption(request.getProjectId()).stream().collect(Collectors.toMap(User::getId, User::getName)); // 获取缺陷模板及自...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: issueExport File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
issueExport
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void updateAfterSizeChanged() { mPopupZoomer.hide(false); // Execute a delayed form focus operation because the OSK was brought // up earlier. if (!mFocusPreOSKViewportRect.isEmpty()) { Rect rect = new Rect(); getContainerView().getWindowVisibleDisplayFra...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAfterSizeChanged File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
updateAfterSizeChanged
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void saveAttachment(XWikiAttachment attachment, boolean deleted, XWikiContext context) throws XWikiException { try { // If the comment is larger than the max size supported by the Storage, then abbreviate it String comment = attachment.getComment(); if (comment !=...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAttachment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
saveAttachment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) { throwIfParentInstance("isNetworkLoggingEnabled"); return mIsNetworkLoggingEnabledCache.query(admin); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNetworkLoggingEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isNetworkLoggingEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public Collection<LBVip> listVips() { return vips.values(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listVips File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java Repository: floodlight The code follows secure coding practices.
[ "CWE-362", "CWE-476" ]
CVE-2015-6569
MEDIUM
4.3
floodlight
listVips
src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
7f5bedb625eec3ff4d29987c31cef2553a962b36
0
Analyze the following code function for security vulnerabilities
public void onAuthenticationFailed() { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAuthenticationFailed File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticationFailed
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public static SslHandler getSslHandler(Channel channel) { return channel.pipeline().get(SslHandler.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSslHandler File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
getSslHandler
providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public BaseClass getEditModeClass(XWikiContext context) throws XWikiException { return getMandatoryClass(context, new DocumentReference( new LocalDocumentReference(XWikiConstant.EDIT_MODE_CLASS), new WikiReference(context.getWikiId()))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditModeClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getEditModeClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public static void main(String[] args)throws Exception { Process p = Runtime.getRuntime().exec("ls"); System.out.println(JNAUtil.getProcessID(p)); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2022-41958 - Severity: HIGH - CVSS Score: 7.8 Description: yaml rce Function: main File: src/main/java/com/chaitin/xray/test/Main.java Repository: 4ra1n/super-xray Fixed Code: public static void main(String[] args)throws Exception { String context = "!!...
[ "CWE-502" ]
CVE-2022-41958
HIGH
7.8
4ra1n/super-xray
main
src/main/java/com/chaitin/xray/test/Main.java
4d0d59663596db03f39d7edd2be251d48b52dcfc
1
Analyze the following code function for security vulnerabilities
@Override public boolean onNavigationItemSelected(int position, long itemId) { int initialComposeMode = mComposeMode; if (position == ComposeActivity.REPLY) { mComposeMode = ComposeActivity.REPLY; } else if (position == ComposeActivity.REPLY_ALL) { mComposeMode = Comp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNavigationItemSelected File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onNavigationItemSelected
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void unbroadcastIntent(IApplicationThread caller, Intent intent, int userId) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(caller != null ? calle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unbroadcastIntent File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
unbroadcastIntent
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private Document parseXml(String xmlContent) { try { DocumentBuilder builder = DocumentBuilderFactory.newInstance().newDocumentBuilder(); Document document = builder.parse(new InputSource(new StringReader(xmlContent))); document.getDocumentElement().normalize(); return document; } catch (Exception e) ...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-0219 - Severity: MEDIUM - CVSS Score: 4.3 Description: fix: use secure xml parser for process manifest Function: parseXml File: jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java Repository: skylot/jadx Fixed Code: private Document parseXml(...
[ "CWE-611" ]
CVE-2022-0219
MEDIUM
4.3
skylot/jadx
parseXml
jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java
d22db30166e7cb369d72be41382bb63ac8b81c52
1
Analyze the following code function for security vulnerabilities
public void sendStream(final int iCode, final String iReason, final String iContentType, InputStream iContent, long iSize, final String iFileName) throws IOException { writeStatus(iCode, iReason); writeHeaders(iContentType); writeLine("Content-Transfer-Encoding: binary"); if (iFileName != null) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendStream File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
sendStream
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
@Override public ServiceNotificationPolicy applyForegroundServiceNotification( Notification notification, String tag, int id, String pkg, int userId) { synchronized (ActivityManagerService.this) { return mServices.applyForegroundServiceNotificationLocked(notification,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyForegroundServiceNotification File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
applyForegroundServiceNotification
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void onAuthenticationAcquired(int acquireInfo) {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAuthenticationAcquired File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticationAcquired
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean canShowTransient() { return (mAttrs.insetsFlags.behavior & BEHAVIOR_SHOW_TRANSIENT_BARS_BY_SWIPE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canShowTransient File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
canShowTransient
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public static String createSessionExpiredJSON(boolean async) { JsonObject json = Json.createObject(); JsonObject meta = Json.createObject(); json.put("meta", meta); if (async) { meta.put(JsonConstants.META_ASYNC, true); } meta.put(JsonConstants.META_SESSION_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createSessionExpiredJSON File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
createSessionExpiredJSON
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
public static StringBuffer alterBodyHtmlAbsolutizePaths(StringBuffer HTML, String serverName) { return new StringBuffer(alterBodyHtmlAbsolutizePaths(HTML.toString(), serverName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: alterBodyHtmlAbsolutizePaths File: src/com/dotmarketing/factories/EmailFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
alterBodyHtmlAbsolutizePaths
src/com/dotmarketing/factories/EmailFactory.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
public static Materials p4Materials(String view) { P4Material material = p4Material("localhost:1666", "user", "password", view, true); return new Materials(material); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: p4Materials File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
p4Materials
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
private static String removeUserInfoFromUrlPath(String url) { // Simple solution: final Matcher matcher = PATTERN_USERINFO.matcher(url); if (matcher.find()) return matcher.replaceFirst("$1$3"); return url; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUserInfoFromUrlPath File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
removeUserInfoFromUrlPath
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public String dialogButtonsOk() { return dialogButtons(new int[] {BUTTON_OK}, new String[1]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dialogButtonsOk File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
dialogButtonsOk
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
public static int defaultMaxConnectionPerHost() { return Integer.getInteger(ASYNC_CLIENT + "maxConnectionsPerHost", -1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: defaultMaxConnectionPerHost File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7398
MEDIUM
4.3
AsyncHttpClient/async-http-client
defaultMaxConnectionPerHost
src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
a894583921c11c3b01f160ada36a8bb9d5158e96
0
Analyze the following code function for security vulnerabilities
public abstract URL getStaticResource(String url);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStaticResource File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
getStaticResource
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
private void readEscape() throws IOException { read(); switch(current) { case '"': case '/': case '\\': captureBuffer.append((char)current); break; case 'b': captureBuffer.append('\b'); break; case 'f': captureBuffer.append('\f'); bre...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readEscape File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readEscape
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
public static String loadTei(String pi, String language) throws AccessDeniedException, FileNotFoundException, IOException, ViewerConfigurationException { logger.trace("loadTei: {}/{}", pi, language); if (pi == null) { return null; } TextResourceBuilder builder = n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadTei File: goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-15124
MEDIUM
4
intranda/goobi-viewer-core
loadTei
goobi-viewer-core/src/main/java/io/goobi/viewer/controller/DataFileTools.java
44ceb8e2e7e888391e8a941127171d6366770df3
0
Analyze the following code function for security vulnerabilities
public Element toDOM(Document document) { Element requestElement = document.createElement("CertRetrievalRequest"); if (certId != null) { Element issuerDNElement = document.createElement("certId"); issuerDNElement.appendChild(document.createTextNode(certId.toHexString())); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDOM File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toDOM
base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
protected final float _parseFloatPrimitive(JsonParser p, DeserializationContext ctxt) throws IOException { String text; switch (p.currentTokenId()) { case JsonTokenId.ID_STRING: text = p.getText(); break; case JsonTokenId.ID_NUMBER_INT: fin...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2022-42003 - Severity: HIGH - CVSS Score: 7.5 Description: Fix #3590 Function: _parseFloatPrimitive File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind Fixed Code: protected final float _parse...
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_parseFloatPrimitive
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
1
Analyze the following code function for security vulnerabilities
@Override protected ServiceRegistry getServiceRegistry() { return serviceRegistry; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServiceRegistry File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
getServiceRegistry
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setStrictPostBinding(Boolean strictPostBinding) { logger .warn("Option 'strictPostBinding' is deprecated and should not be used. This configuration is now set in picketlink.xml."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStrictPostBinding File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding ...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setStrictPostBinding
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public boolean bypass(PackageNamePermissionQuery query) { return query.userId < 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bypass File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
bypass
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public JSONObject optJSONObject(String key) { Object o = opt(key); return o instanceof JSONObject ? (JSONObject)o : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optJSONObject File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optJSONObject
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public boolean zoomOut() { if (!canZoomOut()) { return false; } return pinchByDelta(0.8f); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: zoomOut File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
zoomOut
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override public Collection<LBPool> listPools() { return pools.values(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listPools File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java Repository: floodlight The code follows secure coding practices.
[ "CWE-362", "CWE-476" ]
CVE-2015-6569
MEDIUM
4.3
floodlight
listPools
src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
7f5bedb625eec3ff4d29987c31cef2553a962b36
0
Analyze the following code function for security vulnerabilities
public void selectStream(String sql, JsonArray params, Handler<AsyncResult<SQLRowStream>> replyHandler) { client.getConnection(conn -> selectStream(conn, sql, params, closeAndHandleResult(conn, replyHandler))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectStream File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
selectStream
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
protected String unescape(final String s) { return s.replace("\\\\", "\\"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unescape File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java Repository: codelibs/fess The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000822
HIGH
7.5
codelibs/fess
unescape
src/main/java/org/codelibs/fess/util/GsaConfigParser.java
faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7
0
Analyze the following code function for security vulnerabilities
public static boolean isUriCorrect(@Nonnull final String uri) { return URI_PATTERN.matcher(uri).matches(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUriCorrect File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java Repository: raydac/netbeans-mmd-plugin The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000542
MEDIUM
6.8
raydac/netbeans-mmd-plugin
isUriCorrect
mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
9fba652bf06e649186b8f9e612d60e9cc15097e9
0
Analyze the following code function for security vulnerabilities
private JFileChooser createSaveFileChooser(boolean exportCall) { JFileChooser fileChooser = new JFileChooser(calcInitialDir(exportCall)); fileChooser.setAcceptAllFileFilterUsed(false); // We don't want "all files" as a choice // The input field should show the diagram name as preset fileChooser.setSelectedFile(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createSaveFileChooser File: umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java Repository: umlet The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000548
MEDIUM
6.8
umlet
createSaveFileChooser
umlet-swing/src/main/java/com/baselet/diagram/io/DiagramFileHandler.java
e1c4cc6ae692cc8d1c367460dbf79343e996f9bd
0
Analyze the following code function for security vulnerabilities
public void animateCollapsePanels(int flags, boolean force, boolean delayed) { animateCollapsePanels(flags, force, delayed, 1.0f /* speedUpFactor */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: animateCollapsePanels File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
animateCollapsePanels
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0