instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public Descriptors.FieldDescriptor getOneofFieldDescriptor(Descriptors.OneofDescriptor oneof) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOneofFieldDescriptor File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
getOneofFieldDescriptor
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
@Override public String toNativePath(String path) { return removeFilePrefix(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toNativePath File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
toNativePath
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public String getPackageForToken(IBinder token) { synchronized(this) { ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return null; } return r.packageName; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageForToken File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageForToken
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasShareTargets(String packageName, String packageToCheck, @UserIdInt int userId) { verifyCaller(packageName, userId); enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_APP_PREDICTIONS, "hasShareTargets"); synchronized (mL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasShareTargets File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
hasShareTargets
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public String[] getAccountTypesWithManagementDisabled() { return getAccountTypesWithManagementDisabledAsUser(UserHandle.getCallingUserId(), false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountTypesWithManagementDisabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAccountTypesWithManagementDisabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public <X> X getFirstByXPath(final String xpathExpr) { return getFirstByXPath(xpathExpr, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstByXPath File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getFirstByXPath
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private Profile getProfileForEditing(String id, Profile authUser) { if (!canEditProfile(authUser, id)) { return null; } return isMyid(authUser, id) ? authUser : (Profile) utils.getParaClient().read(Profile.id(id)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileForEditing File: src/main/java/com/erudika/scoold/controllers/ProfileController.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getProfileForEditing
src/main/java/com/erudika/scoold/controllers/ProfileController.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private void updateWifiConfigInWcmIfPresent( WifiConfiguration newConfig, int uid, String packageName, boolean isFromSuggestion) { WifiConfiguration configInWcm = mWifiConfigManager.getConfiguredNetwork(newConfig.getProfileKey()); if (configInWcm == null) return; // s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateWifiConfigInWcmIfPresent File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
updateWifiConfigInWcmIfPresent
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
public SysUser getUserByPhone(@Param("phone") String phone);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByPhone File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByPhone
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public static boolean isValidCompressedBuffer(long inputAddr, long offset, long length) throws IOException { return impl.isValidCompressedBuffer(inputAddr, offset, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidCompressedBuffer File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
isValidCompressedBuffer
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
public boolean showsTime() { return when != 0 && extras.getBoolean(EXTRA_SHOW_WHEN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showsTime File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
showsTime
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void handle(Message msg, SSHPacket buf) throws SSHException { this.msg = msg; log.trace("Received packet {}", msg); if (msg.geq(50)) { // not a transport layer packet service.handle(msg, buf); } else if (msg.in(20, 21) || msg.in(30, 49)) { /...
Vulnerability Classification: - CWE: CWE-354 - CVE: CVE-2023-48795 - Severity: MEDIUM - CVSS Score: 5.9 Description: Implement OpenSSH strict key exchange extension Function: handle File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj Fixed Code: @Override public void han...
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
handle
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
1
Analyze the following code function for security vulnerabilities
public String getFirstNonNullAttributeFromList(List<String> attributesList) { for (String attribute : attributesList) { if (attributes.get(attribute) != null) { return attributes.get(attribute); } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstNonNullAttributeFromList File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-0239
HIGH
7.5
stanfordnlp/CoreNLP
getFirstNonNullAttributeFromList
src/edu/stanford/nlp/util/XMLUtils.java
1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd
0
Analyze the following code function for security vulnerabilities
boolean manageExternalJars(final URL ref, final String version, final DownloadAction action) { boolean approved = false; JNLPClassLoader foundLoader = LocateJnlpClassLoader.getLoaderByResourceUrl(this, ref, version); final VersionString resourceVersion = (version == null) ? null : VersionString....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: manageExternalJars File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
manageExternalJars
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
private String typeURIToString(String uri) { switch (uri) { case "http://www.w3.org/2001/XMLSchema#string": return "String"; case "https://w3id.org/cwl/cwl#File": return "File"; case "http://www.w3.org/2001/XMLSchema#boolean": r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: typeURIToString File: src/main/java/org/commonwl/view/cwl/CWLService.java Repository: common-workflow-language/cwlviewer The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-41110
HIGH
7.5
common-workflow-language/cwlviewer
typeURIToString
src/main/java/org/commonwl/view/cwl/CWLService.java
f6066f09edb70033a2ce80200e9fa9e70a5c29de
0
Analyze the following code function for security vulnerabilities
protected BlockStateChainingListener getBlockState() { return (BlockStateChainingListener) getListenerChain().getListener(BlockStateChainingListener.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBlockState File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure ...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
getBlockState
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public void updateUiForNormalMode() { Log.d(TAG, "updateUiForNormalMode"); if (isVoiceOnlyCall) { binding.callControls.setVisibility(View.VISIBLE); } else { // animateCallControls needs this to be invisible for a check. binding.callControls.setVisibility(View....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUiForNormalMode File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
updateUiForNormalMode
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
public static int translateModeStringToPosix(String mode) { // Sanity check for invalid chars for (int i = 0; i < mode.length(); i++) { switch (mode.charAt(i)) { case 'r': case 'w': case 't': case 'a': break;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: translateModeStringToPosix File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
translateModeStringToPosix
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public void removePasspointProviderWithPackage(@NonNull String packageName) { stopTrackingAppOpsChange(packageName); for (Map.Entry<String, PasspointProvider> entry : getPasspointProviderWithPackage( packageName).entrySet()) { String uniqueId = entry.getValue().getConfig().ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removePasspointProviderWithPackage File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
removePasspointProviderWithPackage
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private boolean isAliasInCredentialManagementAppPolicy(CallerIdentity caller, String alias) { return mInjector.binderWithCleanCallingIdentity(() -> { try (KeyChainConnection connection = KeyChain.bindAsUser(mContext, caller.getUserHandle())) { // The policy will b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAliasInCredentialManagementAppPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isAliasInCredentialManagementAppPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setBackupServiceEnabled(@NonNull ComponentName admin, boolean enabled) { throwIfParentInstance("setBackupServiceEnabled"); try { mService.setBackupServiceEnabled(admin, enabled); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBackupServiceEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setBackupServiceEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static PostgresClient getInstance(Vertx vertx) { return getInstanceInternal(vertx, DEFAULT_SCHEMA); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getInstance
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void extractPresentationPage(final String sourceMeetingId, final String presentationId, final Integer presentationSlide, final String destinationMeetingId) { /** * We delay processing of the presentation to make sure that the meeting has already been crea...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPresentationPage File: bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43798
MEDIUM
5.4
bigbluebutton
extractPresentationPage
bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java
02ba4c6ff8e78a0f4384ad1b7c7367c5a90376e8
0
Analyze the following code function for security vulnerabilities
ProcessRecord handleApplicationWtfInner(int callingUid, int callingPid, @Nullable IBinder app, @Nullable String tag, @Nullable final ApplicationErrorReport.CrashInfo crashInfo) { final ProcessRecord r = findAppProcess(app, "WTF"); final String processName = app == null ? "system_server" ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleApplicationWtfInner File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
handleApplicationWtfInner
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void bindAlertedIcon(RemoteViews contentView, StandardTemplateParams p) { contentView.setDrawableTint( R.id.alerted_icon, false /* targetBackground */, getColors(p).getSecondaryTextColor(), PorterDuff.Mode.SRC_IN); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindAlertedIcon File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
bindAlertedIcon
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
void setDublinCoreService(DublinCoreCatalogService dcService) { this.dublinCoreService = dcService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDublinCoreService File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
setDublinCoreService
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
public void init(CipherParameters params) throws IllegalArgumentException { ccm.init(true, params); this.macLength = ccm.getMac().length; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-310" ]
CVE-2016-1000339
MEDIUM
5
bcgit/bc-java
init
prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java
413b42f4d770456508585c830cfcde95f9b0e93b
0
Analyze the following code function for security vulnerabilities
private void processParamObjects(ParamObjectsType xmlParamObjects, String packageName, String packageVersion, String configId) { pluginParamObjectSupportService.registerParamObjects(xmlParamObjects, packageName, packageVersion, configId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processParamObjects File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
processParamObjects
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
public static String generateAssertionID() { String encodedID = generateID(); if (encodedID == null) { return null; } String id = null; try { id = SystemConfigurationUtil.getServerID( SAMLServiceManager.getServerProtocol(), ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateAssertionID File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
generateAssertionID
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
private String getConnectingSsidInternal() { WifiConfiguration config = getConnectingWifiConfigurationInternal(); return config != null ? config.SSID : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectingSsidInternal File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getConnectingSsidInternal
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public boolean willActivityBeVisible(IBinder token) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); mRemote.transact(WILL_ACTIVITY_BE_VISIBLE_TRANSACTION,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: willActivityBeVisible File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
willActivityBeVisible
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public Element createElement(String tagName) throws DOMException { return doc.createElement(tagName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createElement File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
createElement
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDaemon() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDaemon File: graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
isDaemon
graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
public String getClientSecret(String cId) { return clientSecretMap.get(cId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientSecret File: src/main/java/com/mxgraph/online/AbsAuthServlet.java Repository: jgraph/drawio The code follows secure coding practices.
[ "CWE-601", "CWE-918" ]
CVE-2022-1767
MEDIUM
5
jgraph/drawio
getClientSecret
src/main/java/com/mxgraph/online/AbsAuthServlet.java
c63f3a04450f30798df47f9badbc74eb8a69fbdf
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams text(CharSequence text) { this.text = text; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: text File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
text
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void removeStack(int stackId) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "removeStack()"); synchronized (this) { final long ident = Binder.clearCallingIdentity(); try { final ActivityStack stack = mStackSupervisor.getStack...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
removeStack
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public float getY() { return y; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getY File: svg-core/src/main/java/com/kitfox/svg/ImageSVG.java Repository: blackears/svgSalamander The code follows secure coding practices.
[ "CWE-918" ]
CVE-2017-5617
MEDIUM
5.8
blackears/svgSalamander
getY
svg-core/src/main/java/com/kitfox/svg/ImageSVG.java
826555b0a3229b6cf4671fe4de7aa51b5946b63d
0
Analyze the following code function for security vulnerabilities
private ServiceProvider removeUnsupportedTemplateConfigs(ServiceProvider serviceProvider) { ServiceProvider updatedSp = serviceProvider; if (updatedSp != null) { updatedSp.setApplicationName(null); updatedSp.setDescription(null); updatedSp.setApplicationID(0); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUnsupportedTemplateConfigs File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/c...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
removeUnsupportedTemplateConfigs
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
final void idleUids() { synchronized (this) { final long nowElapsed = SystemClock.elapsedRealtime(); final long maxBgTime = nowElapsed - BACKGROUND_SETTLE_TIME; long nextTime = 0; for (int i=mActiveUids.size()-1; i>=0; i--) { final UidRecord uidRec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: idleUids File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
idleUids
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public int getResponseCode(Object connection) throws IOException { // workaround for Android bug discussed here: http://stackoverflow.com/questions/17638398/androids-httpurlconnection-throws-eofexception-on-head-requests HttpURLConnection con = (HttpURLConnection) connection; if("head".equalsIgn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResponseCode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getResponseCode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS) public void finalizeWorkProfileProvisioning( @NonNull UserHandle managedProfileUser, @Nullable Account migratedAccount) { Objects.requireNonNull(managedProfileUser, "managedProfileUser can't be null"...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalizeWorkProfileProvisioning File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
finalizeWorkProfileProvisioning
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private ComponentDocumentTranslationBundle createComponentDocumentBundle(XWikiDocument document, ComponentDescriptor<TranslationBundle> descriptor) throws TranslationBundleDoesNotExistsException { ComponentDocumentTranslationBundle documentBundle; try { documentBundle = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createComponentDocumentBundle File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/Documen...
[ "CWE-74" ]
CVE-2023-29510
HIGH
8.8
xwiki/xwiki-platform
createComponentDocumentBundle
xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java
d06ff8a58480abc7f63eb1d4b8b366024d990643
0
Analyze the following code function for security vulnerabilities
private String generateJmx(ApiScenarioWithBLOBs apiScenario) { HashTree jmeterHashTree = new ListedHashTree(); MsTestPlan testPlan = new MsTestPlan(); testPlan.setName(apiScenario.getName()); testPlan.setHashTree(new LinkedList<>()); ParameterConfig config = new ParameterConfig()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateJmx File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
generateJmx
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
protected JsonObject inputToJsonObject(String input) { try (JsonReader jsonReader = jsonReaderFactory.createReader(new StringReader(input))) { return jsonReader.readObject(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inputToJsonObject File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java Repository: quarkusio/quarkus The code follows secure coding practices.
[ "CWE-444" ]
CVE-2022-2466
CRITICAL
9.8
quarkusio/quarkus
inputToJsonObject
extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java
08e5c3106ce4bfb18b24a38514eeba6464668b07
0
Analyze the following code function for security vulnerabilities
@Override public void enableSystemApp(ComponentName who, String callerPackage, String packageName) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isProfileOwner(caller) || isDefaultDeviceOwne...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableSystemApp File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
enableSystemApp
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void postUrlAsync(final AwContents awContents, final String url, byte[] postData) throws Exception { class PostUrl implements Runnable { byte[] mPostData; public PostUrl(byte[] postData) { mPostData = postData; } @Override ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postUrlAsync File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5155
MEDIUM
4.3
chromium
postUrlAsync
android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6
0
Analyze the following code function for security vulnerabilities
public void setStatus(AppointmentRequestStatus status) { this.status = status; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatus File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4727
MEDIUM
6.1
openmrs/openmrs-module-appointmentscheduling
setStatus
api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
2ccbe39c020809765de41eeb8ee4c70b5ec49cc8
0
Analyze the following code function for security vulnerabilities
public boolean shouldDumpMain() { return mDumpMain; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDumpMain File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
shouldDumpMain
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private boolean isResetPasswordTokenActiveForUserLocked(int userHandle) { DevicePolicyData policy = getUserData(userHandle); if (policy.mPasswordTokenHandle != 0) { return mInjector.binderWithCleanCallingIdentity(() -> mLockPatternUtils.isEscrowTokenActive(policy.mPasswor...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isResetPasswordTokenActiveForUserLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isResetPasswordTokenActiveForUserLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected int readRaw(byte[] b) throws IOException { return zipEntryInputStream.readRawFully(b); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readRaw File: src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
readRaw
src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
protected final boolean hasTheSessionSecurityTokenToBeRenewed(final HttpServletRequest request, final String function) { boolean hasToBeRenewed = SecuritySettings.isSessionTokenRenewEnabled(); if (hasToBeRenewed) { for (Pattern sessionSecurityTokenPattern : SESSION_SECURITY_GENERATION_FUNCTION_PATTE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasTheSessionSecurityTokenToBeRenewed File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
hasTheSessionSecurityTokenToBeRenewed
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public boolean getContentIntentAvailableOffline() { return (mFlags & FLAG_CONTENT_INTENT_AVAILABLE_OFFLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentIntentAvailableOffline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getContentIntentAvailableOffline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void setPackageDescription(String packageDescription) { this.packageDescription = packageDescription; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageDescription File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
setPackageDescription
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
@Override protected byte[] engineDoFinal(byte[] input, int inputOffset, int inputLen) throws IllegalBlockSizeException, BadPaddingException { final int maximumLen = getOutputSizeForFinal(inputLen); /* Assume that we'll output exactly on a byte boundary. */ final byte[] output = n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineDoFinal File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
engineDoFinal
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
private Uri getNotificationUriFor(int key, String name) { if (isConfigSettingsKey(key)) { return (name != null) ? Uri.withAppendedPath(DeviceConfig.CONTENT_URI, name) : DeviceConfig.CONTENT_URI; } else if (isGlobalSettingsKey(key)) { return...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNotificationUriFor File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getNotificationUriFor
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public void setContentEncoding(String contentEncoding) { this.contentEncoding = contentEncoding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContentEncoding File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
setContentEncoding
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
public @Nullable String getNString(String columnName) throws SQLException { return getNString(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNString File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getNString
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public void setPackageAskScreenCompat(String packageName, boolean ask) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageAskScreenCompat File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
setPackageAskScreenCompat
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private int findNotificationRecordIndexLocked(NotificationRecord target) { return mRankingHelper.indexOf(mNotificationList, target); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findNotificationRecordIndexLocked File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
findNotificationRecordIndexLocked
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private boolean hasActiveInstrumentationLocked(int pid) { if (pid == 0) { return false; } synchronized (mPidsSelfLocked) { ProcessRecord process = mPidsSelfLocked.get(pid); return process != null && process.getActiveInstrumentation() != ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasActiveInstrumentationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
hasActiveInstrumentationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void enforceModifyPermission(String message) { mContext.enforceCallingOrSelfPermission(MODIFY_PHONE_STATE, message); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceModifyPermission File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
enforceModifyPermission
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
@Override public MvcClass consumes(final List<MediaType> consumes) { this.consumes = consumes; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: consumes File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
consumes
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
private static String stringifyKBSize(long size) { return stringifySize(size * 1024, 1024); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stringifyKBSize File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stringifyKBSize
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void migrateLegacySettingsForUserLocked(DatabaseHelper dbHelper, SQLiteDatabase database, int userId) { // Move over the system settings. final int systemKey = makeKey(SETTINGS_TYPE_SYSTEM, userId); ensureSettingsStateLocked(systemKey); SettingsSta...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateLegacySettingsForUserLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
migrateLegacySettingsForUserLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent) { switch (intent.getAction()) { case ACTION_PROXY_NOTIFY_RECENTS_VISIBLITY_TO_OWNER: visibilityChanged(intent.getBooleanExtra(EXTRA_RECENTS_VISIBILITY, false)); break; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
onReceive
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
0
Analyze the following code function for security vulnerabilities
protected void setCertId(CertId certId) { this.certId = certId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCertId File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setCertId
base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setShortcutId(String shortcutId) { mN.mShortcutId = shortcutId; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setShortcutId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setShortcutId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private void updateNotificationsOnDensityOrFontScaleChanged() { ArrayList<Entry> activeNotifications = mNotificationData.getActiveNotifications(); for (int i = 0; i < activeNotifications.size(); i++) { Entry entry = activeNotifications.get(i); boolean exposedGuts = mNotificationG...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNotificationsOnDensityOrFontScaleChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateNotificationsOnDensityOrFontScaleChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setMarshallerListener(Marshaller.Listener marshallerListener) { this.marshallerListener = marshallerListener; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMarshallerListener File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
setMarshallerListener
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
public Map<String, Authentication> getAuthentications() { return authentications; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthentications File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getAuthentications
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void openNewTab(String url, String extraHeaders, byte[] postData, int disposition) { // This is only called in chrome layers. assert false; }
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2014-3159 - Severity: MEDIUM - CVSS Score: 6.4 Description: Use LoadURLWithParams in ChromeWebContentsDelegateAndroid Build a LoadURLParams object from the OpenURLParams and properly set all parameters on that object when calling into NavigationController. This ...
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
openNewTab
android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
98a50b76141f0b14f292f49ce376e6554142d5e2
1
Analyze the following code function for security vulnerabilities
public int getTimeout() { return mTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTimeout File: core/java/android/service/gatekeeper/GateKeeperResponse.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-0806
HIGH
9.3
android
getTimeout
core/java/android/service/gatekeeper/GateKeeperResponse.java
b87c968e5a41a1a09166199bf54eee12608f3900
0
Analyze the following code function for security vulnerabilities
@LogMessage(level = Level.WARN) @Message(id = 711, value = "Context activation pattern {0} ignored as it is overriden by the integrator.", format = Format.MESSAGE_FORMAT) void webXmlMappingPatternIgnored(String pattern);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: webXmlMappingPatternIgnored File: impl/src/main/java/org/jboss/weld/logging/ServletLogger.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
webXmlMappingPatternIgnored
impl/src/main/java/org/jboss/weld/logging/ServletLogger.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
public String getCharacterEncoding() { return characterEncoding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharacterEncoding File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding ...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
getCharacterEncoding
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Test public void getByIdConnectionFailure(TestContext context) throws Exception { postgresClientNonexistingTenant().getByIdAsString( FOO, randomUuid(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByIdConnectionFailure File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getByIdConnectionFailure
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void activityResumed(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityResumed File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activityResumed
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public MediaPackage addPartialTrack(URI uri, MediaPackageElementFlavor flavor, long startTime, MediaPackage mediaPackage) throws IOException, IngestException { Job job = null; try { job = serviceRegistry.createJob( JOB_TYPE, INGEST_TRACK_FROM_URI, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPartialTrack File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
addPartialTrack
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
public int createXObject(EntityReference classReference, XWikiContext context) throws XWikiException { DocumentReference absoluteClassReference = resolveClassReference(classReference); BaseObject object = BaseClass.newCustomClassInstance(absoluteClassReference, context); object.setOwnerDocum...
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-26470 - Severity: HIGH - CVSS Score: 7.5 Description: XWIKI-19223: Improve xobject memory storage in XWikidocument Function: createXObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/...
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
createXObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
1
Analyze the following code function for security vulnerabilities
protected void handleSerialization(Node node) { BeanDefinitionBuilder serializationConfigBuilder = createBeanBuilder(SerializationConfig.class); AbstractBeanDefinition beanDefinition = serializationConfigBuilder.getBeanDefinition(); fillAttributeValues(node, serializationConfigBuilde...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2016-10750 - Severity: MEDIUM - CVSS Score: 6.8 Description: Add basic protection against untrusted deserialization. Function: handleSerialization File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java Repository: ha...
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
handleSerialization
hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
1
Analyze the following code function for security vulnerabilities
protected void save(List<Contentlet> contentlets) throws DotDataException, DotStateException, DotSecurityException { for(Contentlet con : contentlets) save(con); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
save
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Override public void stopAppSwitches() { mAmInternal.enforceCallingPermission(STOP_APP_SWITCHES, "stopAppSwitches"); synchronized (mGlobalLock) { mAppSwitchesState = APP_SWITCH_DISALLOW; mLastStopAppSwitchesTime = SystemClock.uptimeMillis(); mH.removeMessages(H.R...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopAppSwitches File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
stopAppSwitches
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private PostgresClient createFooBinary(TestContext context) { return createTable(context, TENANT, FOO, "id UUID PRIMARY KEY , jsonb TEXT NOT NULL"); // TEXT to store binary data }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createFooBinary File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
createFooBinary
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public Principal getLocalPrincipal() { Certificate[] local = localCerts; if (local == null || local.length == 0) { return null; } return ((java.security.cert.X509Certificate) local[0]).getIssuerX500Principal(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalPrincipal File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
getLocalPrincipal
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public void unregisterTaskStackListener(ITaskStackListener listener) { mActivityTaskManager.unregisterTaskStackListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterTaskStackListener File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
unregisterTaskStackListener
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
boolean isLastWindow(WindowState win) { return mChildren.size() == 1 && mChildren.get(0) == win; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLastWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isLastWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
void dumpFileMetadata(FileMetadata info) { if (DEBUG) { StringBuilder b = new StringBuilder(128); // mode string b.append((info.type == BackupAgent.TYPE_DIRECTORY) ? 'd' : '-'); b.append(((info.mode & 0400) != 0) ? 'r' : '-'); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpFileMetadata File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
dumpFileMetadata
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private static String[] getDefaultCipherSuites( boolean x509CipherSuitesNeeded, boolean pskCipherSuitesNeeded) { if (x509CipherSuitesNeeded) { // X.509 based cipher suites need to be listed. if (pskCipherSuitesNeeded) { // Both X.509 and PSK based ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultCipherSuites File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getDefaultCipherSuites
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
static void copyStream(InputStream is, OutputStream os) throws IOException { Utils.copyStream(is, os, -1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyStream File: 1.x/src/rogatkin/web/WarRoller.java Repository: drogatkin/TJWS2 The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4594
CRITICAL
9.8
drogatkin/TJWS2
copyStream
1.x/src/rogatkin/web/WarRoller.java
1bac15c496ec54efe21ad7fab4e17633778582fc
0
Analyze the following code function for security vulnerabilities
public void checkDeletingDocument(DocumentReference userReference, XWikiDocument document, XWikiContext context) throws XWikiException { String currentWiki = null; currentWiki = context.getWikiId(); try { context.setWikiId(document.getDocumentReference().getWikiReference...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkDeletingDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
checkDeletingDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public File getDownloadablePresentationFile(String meetingId, String presId, String presFilename) { log.info("Find downloadable presentation for meetingId={} presId={} filename={}", meetingId, presId, presFilename); File presDir = Util.getPresentationDir(presentationBaseDir, meetingId, presId); re...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-12443 - Severity: HIGH - CVSS Score: 7.5 Description: Return 404 error when the file download is not allowed. Function: getDownloadablePresentationFile File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton ...
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
getDownloadablePresentationFile
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
1
Analyze the following code function for security vulnerabilities
private Map getThisOptions(JSONObject task) { Map<String, String> optionMap = new HashMap<>(); task.getJSONObject("options").keySet().stream().forEach(k -> { optionMap.put(k, task.getJSONObject("options").getString(k)); }); return optionMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThisOptions File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
getThisOptions
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
@Override public boolean playEffect(Vector3 position, int type, int data) { World world = getWorld(); final Effect effect = effects.get(type); if (effect == null) { return false; } world.playEffect(BukkitAdapter.adapt(world, position), effect, data); re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: playEffect File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
playEffect
worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
@Override protected void completedAfter() { super.completedAfter(); GeneralEntityServiceContextHolder.isSkipSeriesValue(Boolean.TRUE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: completedAfter File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
completedAfter
src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
d0de4cc35303168f44ca57712c824b5cb9525e54
0
Analyze the following code function for security vulnerabilities
public void updateSQLXML(String columnName, @Nullable SQLXML xmlObject) throws SQLException { updateSQLXML(findColumn(columnName), xmlObject); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSQLXML File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateSQLXML
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public String optString(int index, String defaultValue) { Object o = opt(index); return o != null ? o.toString() : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optString File: src/main/java/org/codehaus/jettison/json/JSONArray.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optString
src/main/java/org/codehaus/jettison/json/JSONArray.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
FrameType getFrameType() { return frameType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFrameType File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getFrameType
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return Objects.hash(key, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: src/main/java/com/gitblit/StoredUserConfig.java Repository: gitblit-org/gitblit The code follows secure coding practices.
[ "CWE-269" ]
CVE-2022-31267
HIGH
7.5
gitblit-org/gitblit
hashCode
src/main/java/com/gitblit/StoredUserConfig.java
9b4afad6f4be212474809533ec2c280cce86501a
0
Analyze the following code function for security vulnerabilities
private void onDocumentEvent(XWikiDocument document) { boolean remove = false; if (document.getObject(getExtensionClassName()) != null) { // new or already existing object if (document.getObject(getExtensionClassName(), USE_FIELDNAME, "always", false) != null) { ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29206 - Severity: MEDIUM - CVSS Score: 5.4 Description: XWIKI-9119: Refactoring of SkinExtensionPlugin * Provide some tests Function: onDocumentEvent File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugi...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
onDocumentEvent
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
1
Analyze the following code function for security vulnerabilities
private final void processCurBroadcastLocked(BroadcastRecord r, ProcessRecord app) throws RemoteException { if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Process cur broadcast " + r + " for app " + app); if (app.thread == null) { throw new RemoteException(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processCurBroadcastLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
processCurBroadcastLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public SQLType getType() { return this.type; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getType File: extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
getType
extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
0