instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public Descriptors.FieldDescriptor getOneofFieldDescriptor(Descriptors.OneofDescriptor oneof) {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOneofFieldDescriptor
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | getOneofFieldDescriptor | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toNativePath(String path) {
return removeFilePrefix(path);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toNativePath
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | toNativePath | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getPackageForToken(IBinder token) {
synchronized(this) {
ActivityRecord r = ActivityRecord.isInStackLocked(token);
if (r == null) {
return null;
}
return r.packageName;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageForToken
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getPackageForToken | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasShareTargets(String packageName, String packageToCheck,
@UserIdInt int userId) {
verifyCaller(packageName, userId);
enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_APP_PREDICTIONS,
"hasShareTargets");
synchronized (mL... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasShareTargets
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | hasShareTargets | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String[] getAccountTypesWithManagementDisabled() {
return getAccountTypesWithManagementDisabledAsUser(UserHandle.getCallingUserId(), false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccountTypesWithManagementDisabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getAccountTypesWithManagementDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public <X> X getFirstByXPath(final String xpathExpr) {
return getFirstByXPath(xpathExpr, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstByXPath
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | getFirstByXPath | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | private Profile getProfileForEditing(String id, Profile authUser) {
if (!canEditProfile(authUser, id)) {
return null;
}
return isMyid(authUser, id) ? authUser : (Profile) utils.getParaClient().read(Profile.id(id));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileForEditing
File: src/main/java/com/erudika/scoold/controllers/ProfileController.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getProfileForEditing | src/main/java/com/erudika/scoold/controllers/ProfileController.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private void updateWifiConfigInWcmIfPresent(
WifiConfiguration newConfig, int uid, String packageName, boolean isFromSuggestion) {
WifiConfiguration configInWcm =
mWifiConfigManager.getConfiguredNetwork(newConfig.getProfileKey());
if (configInWcm == null) return;
// s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateWifiConfigInWcmIfPresent
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | updateWifiConfigInWcmIfPresent | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | public SysUser getUserByPhone(@Param("phone") String phone); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserByPhone
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45208 | MEDIUM | 4.3 | jeecgboot/jeecg-boot | getUserByPhone | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java | 51e2227bfe54f5d67b09411ee9a336750164e73d | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isValidCompressedBuffer(long inputAddr, long offset, long length)
throws IOException
{
return impl.isValidCompressedBuffer(inputAddr, offset, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidCompressedBuffer
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | isValidCompressedBuffer | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | public boolean showsTime() {
return when != 0 && extras.getBoolean(EXTRA_SHOW_WHEN);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showsTime
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | showsTime | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handle(Message msg, SSHPacket buf)
throws SSHException {
this.msg = msg;
log.trace("Received packet {}", msg);
if (msg.geq(50)) { // not a transport layer packet
service.handle(msg, buf);
} else if (msg.in(20, 21) || msg.in(30, 49)) { /... | Vulnerability Classification:
- CWE: CWE-354
- CVE: CVE-2023-48795
- Severity: MEDIUM
- CVSS Score: 5.9
Description: Implement OpenSSH strict key exchange extension
Function: handle
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
Fixed Code:
@Override
public void han... | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | handle | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 1 |
Analyze the following code function for security vulnerabilities | public String getFirstNonNullAttributeFromList(List<String> attributesList) {
for (String attribute : attributesList) {
if (attributes.get(attribute) != null) {
return attributes.get(attribute);
}
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstNonNullAttributeFromList
File: src/edu/stanford/nlp/util/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-0239 | HIGH | 7.5 | stanfordnlp/CoreNLP | getFirstNonNullAttributeFromList | src/edu/stanford/nlp/util/XMLUtils.java | 1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd | 0 |
Analyze the following code function for security vulnerabilities | boolean manageExternalJars(final URL ref, final String version, final DownloadAction action) {
boolean approved = false;
JNLPClassLoader foundLoader = LocateJnlpClassLoader.getLoaderByResourceUrl(this, ref, version);
final VersionString resourceVersion = (version == null) ? null : VersionString.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: manageExternalJars
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | manageExternalJars | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | private String typeURIToString(String uri) {
switch (uri) {
case "http://www.w3.org/2001/XMLSchema#string":
return "String";
case "https://w3id.org/cwl/cwl#File":
return "File";
case "http://www.w3.org/2001/XMLSchema#boolean":
r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: typeURIToString
File: src/main/java/org/commonwl/view/cwl/CWLService.java
Repository: common-workflow-language/cwlviewer
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-41110 | HIGH | 7.5 | common-workflow-language/cwlviewer | typeURIToString | src/main/java/org/commonwl/view/cwl/CWLService.java | f6066f09edb70033a2ce80200e9fa9e70a5c29de | 0 |
Analyze the following code function for security vulnerabilities | protected BlockStateChainingListener getBlockState()
{
return (BlockStateChainingListener) getListenerChain().getListener(BlockStateChainingListener.class);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBlockState
File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
Repository: xwiki/xwiki-rendering
The code follows secure ... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | getBlockState | xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | public void updateUiForNormalMode() {
Log.d(TAG, "updateUiForNormalMode");
if (isVoiceOnlyCall) {
binding.callControls.setVisibility(View.VISIBLE);
} else {
// animateCallControls needs this to be invisible for a check.
binding.callControls.setVisibility(View.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateUiForNormalMode
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | updateUiForNormalMode | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | public static int translateModeStringToPosix(String mode) {
// Sanity check for invalid chars
for (int i = 0; i < mode.length(); i++) {
switch (mode.charAt(i)) {
case 'r':
case 'w':
case 't':
case 'a':
break;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: translateModeStringToPosix
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | translateModeStringToPosix | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | public void removePasspointProviderWithPackage(@NonNull String packageName) {
stopTrackingAppOpsChange(packageName);
for (Map.Entry<String, PasspointProvider> entry : getPasspointProviderWithPackage(
packageName).entrySet()) {
String uniqueId = entry.getValue().getConfig().ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removePasspointProviderWithPackage
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | removePasspointProviderWithPackage | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAliasInCredentialManagementAppPolicy(CallerIdentity caller, String alias) {
return mInjector.binderWithCleanCallingIdentity(() -> {
try (KeyChainConnection connection = KeyChain.bindAsUser(mContext,
caller.getUserHandle())) {
// The policy will b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAliasInCredentialManagementAppPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isAliasInCredentialManagementAppPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void setBackupServiceEnabled(@NonNull ComponentName admin, boolean enabled) {
throwIfParentInstance("setBackupServiceEnabled");
try {
mService.setBackupServiceEnabled(admin, enabled);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBackupServiceEnabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setBackupServiceEnabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static PostgresClient getInstance(Vertx vertx) {
return getInstanceInternal(vertx, DEFAULT_SCHEMA);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstance
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getInstance | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void extractPresentationPage(final String sourceMeetingId, final String presentationId,
final Integer presentationSlide, final String destinationMeetingId) {
/**
* We delay processing of the presentation to make sure that the meeting has already been crea... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractPresentationPage
File: bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43798 | MEDIUM | 5.4 | bigbluebutton | extractPresentationPage | bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java | 02ba4c6ff8e78a0f4384ad1b7c7367c5a90376e8 | 0 |
Analyze the following code function for security vulnerabilities | ProcessRecord handleApplicationWtfInner(int callingUid, int callingPid, @Nullable IBinder app,
@Nullable String tag, @Nullable final ApplicationErrorReport.CrashInfo crashInfo) {
final ProcessRecord r = findAppProcess(app, "WTF");
final String processName = app == null ? "system_server"
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleApplicationWtfInner
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | handleApplicationWtfInner | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void bindAlertedIcon(RemoteViews contentView, StandardTemplateParams p) {
contentView.setDrawableTint(
R.id.alerted_icon,
false /* targetBackground */,
getColors(p).getSecondaryTextColor(),
PorterDuff.Mode.SRC_IN);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindAlertedIcon
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | bindAlertedIcon | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | void setDublinCoreService(DublinCoreCatalogService dcService) {
this.dublinCoreService = dcService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDublinCoreService
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2020-5230 | MEDIUM | 5 | opencast | setDublinCoreService | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java | bbb473f34ab95497d6c432c81285efb0c739f317 | 0 |
Analyze the following code function for security vulnerabilities | public void init(CipherParameters params)
throws IllegalArgumentException
{
ccm.init(true, params);
this.macLength = ccm.getMac().length;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2016-1000339 | MEDIUM | 5 | bcgit/bc-java | init | prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java | 413b42f4d770456508585c830cfcde95f9b0e93b | 0 |
Analyze the following code function for security vulnerabilities | private void processParamObjects(ParamObjectsType xmlParamObjects, String packageName, String packageVersion, String configId) {
pluginParamObjectSupportService.registerParamObjects(xmlParamObjects, packageName, packageVersion, configId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processParamObjects
File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
Repository: WeBankPartners/wecube-platform
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-45746 | MEDIUM | 5 | WeBankPartners/wecube-platform | processParamObjects | platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java | 1164dae43c505f8a0233cc049b2689d6ca6d0c37 | 0 |
Analyze the following code function for security vulnerabilities | public static String generateAssertionID() {
String encodedID = generateID();
if (encodedID == null) {
return null;
}
String id = null;
try {
id = SystemConfigurationUtil.getServerID(
SAMLServiceManager.getServerProtocol(),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateAssertionID
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | generateAssertionID | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | private String getConnectingSsidInternal() {
WifiConfiguration config = getConnectingWifiConfigurationInternal();
return config != null ? config.SSID : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectingSsidInternal
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getConnectingSsidInternal | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public boolean willActivityBeVisible(IBinder token) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
mRemote.transact(WILL_ACTIVITY_BE_VISIBLE_TRANSACTION,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: willActivityBeVisible
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | willActivityBeVisible | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Element createElement(String tagName) throws DOMException {
return doc.createElement(tagName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createElement
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | createElement | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isDaemon() {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDaemon
File: graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2024-24824 | HIGH | 8.8 | Graylog2/graylog2-server | isDaemon | graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java | 75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8 | 0 |
Analyze the following code function for security vulnerabilities | public String getClientSecret(String cId)
{
return clientSecretMap.get(cId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientSecret
File: src/main/java/com/mxgraph/online/AbsAuthServlet.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-601",
"CWE-918"
] | CVE-2022-1767 | MEDIUM | 5 | jgraph/drawio | getClientSecret | src/main/java/com/mxgraph/online/AbsAuthServlet.java | c63f3a04450f30798df47f9badbc74eb8a69fbdf | 0 |
Analyze the following code function for security vulnerabilities | final StandardTemplateParams text(CharSequence text) {
this.text = text;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: text
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | text | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removeStack(int stackId) {
enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "removeStack()");
synchronized (this) {
final long ident = Binder.clearCallingIdentity();
try {
final ActivityStack stack = mStackSupervisor.getStack... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | removeStack | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public float getY()
{
return y;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getY
File: svg-core/src/main/java/com/kitfox/svg/ImageSVG.java
Repository: blackears/svgSalamander
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2017-5617 | MEDIUM | 5.8 | blackears/svgSalamander | getY | svg-core/src/main/java/com/kitfox/svg/ImageSVG.java | 826555b0a3229b6cf4671fe4de7aa51b5946b63d | 0 |
Analyze the following code function for security vulnerabilities | private ServiceProvider removeUnsupportedTemplateConfigs(ServiceProvider serviceProvider) {
ServiceProvider updatedSp = serviceProvider;
if (updatedSp != null) {
updatedSp.setApplicationName(null);
updatedSp.setDescription(null);
updatedSp.setApplicationID(0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUnsupportedTemplateConfigs
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/c... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | removeUnsupportedTemplateConfigs | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | final void idleUids() {
synchronized (this) {
final long nowElapsed = SystemClock.elapsedRealtime();
final long maxBgTime = nowElapsed - BACKGROUND_SETTLE_TIME;
long nextTime = 0;
for (int i=mActiveUids.size()-1; i>=0; i--) {
final UidRecord uidRec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: idleUids
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | idleUids | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public int getResponseCode(Object connection) throws IOException {
// workaround for Android bug discussed here: http://stackoverflow.com/questions/17638398/androids-httpurlconnection-throws-eofexception-on-head-requests
HttpURLConnection con = (HttpURLConnection) connection;
if("head".equalsIgn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResponseCode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getResponseCode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@RequiresPermission(android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS)
public void finalizeWorkProfileProvisioning(
@NonNull UserHandle managedProfileUser, @Nullable Account migratedAccount) {
Objects.requireNonNull(managedProfileUser, "managedProfileUser can't be null"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finalizeWorkProfileProvisioning
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | finalizeWorkProfileProvisioning | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private ComponentDocumentTranslationBundle createComponentDocumentBundle(XWikiDocument document,
ComponentDescriptor<TranslationBundle> descriptor) throws TranslationBundleDoesNotExistsException
{
ComponentDocumentTranslationBundle documentBundle;
try {
documentBundle =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createComponentDocumentBundle
File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/Documen... | [
"CWE-74"
] | CVE-2023-29510 | HIGH | 8.8 | xwiki/xwiki-platform | createComponentDocumentBundle | xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java | d06ff8a58480abc7f63eb1d4b8b366024d990643 | 0 |
Analyze the following code function for security vulnerabilities | private String generateJmx(ApiScenarioWithBLOBs apiScenario) {
HashTree jmeterHashTree = new ListedHashTree();
MsTestPlan testPlan = new MsTestPlan();
testPlan.setName(apiScenario.getName());
testPlan.setHashTree(new LinkedList<>());
ParameterConfig config = new ParameterConfig()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateJmx
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | generateJmx | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | protected JsonObject inputToJsonObject(String input) {
try (JsonReader jsonReader = jsonReaderFactory.createReader(new StringReader(input))) {
return jsonReader.readObject();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inputToJsonObject
File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java
Repository: quarkusio/quarkus
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2022-2466 | CRITICAL | 9.8 | quarkusio/quarkus | inputToJsonObject | extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java | 08e5c3106ce4bfb18b24a38514eeba6464668b07 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void enableSystemApp(ComponentName who, String callerPackage, String packageName) {
final CallerIdentity caller = getCallerIdentity(who, callerPackage);
Preconditions.checkCallAuthorization((caller.hasAdminComponent()
&& (isProfileOwner(caller) || isDefaultDeviceOwne... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enableSystemApp
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | enableSystemApp | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void postUrlAsync(final AwContents awContents,
final String url, byte[] postData) throws Exception {
class PostUrl implements Runnable {
byte[] mPostData;
public PostUrl(byte[] postData) {
mPostData = postData;
}
@Override
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postUrlAsync
File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5155 | MEDIUM | 4.3 | chromium | postUrlAsync | android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java | b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6 | 0 |
Analyze the following code function for security vulnerabilities | public void setStatus(AppointmentRequestStatus status) {
this.status = status;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStatus
File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
Repository: openmrs/openmrs-module-appointmentscheduling
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4727 | MEDIUM | 6.1 | openmrs/openmrs-module-appointmentscheduling | setStatus | api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java | 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean shouldDumpMain() {
return mDumpMain;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldDumpMain
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | shouldDumpMain | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isResetPasswordTokenActiveForUserLocked(int userHandle) {
DevicePolicyData policy = getUserData(userHandle);
if (policy.mPasswordTokenHandle != 0) {
return mInjector.binderWithCleanCallingIdentity(() ->
mLockPatternUtils.isEscrowTokenActive(policy.mPasswor... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isResetPasswordTokenActiveForUserLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isResetPasswordTokenActiveForUserLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected int readRaw(byte[] b) throws IOException {
return zipEntryInputStream.readRawFully(b);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readRaw
File: src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | readRaw | src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | protected final boolean hasTheSessionSecurityTokenToBeRenewed(final HttpServletRequest request,
final String function) {
boolean hasToBeRenewed = SecuritySettings.isSessionTokenRenewEnabled();
if (hasToBeRenewed) {
for (Pattern sessionSecurityTokenPattern : SESSION_SECURITY_GENERATION_FUNCTION_PATTE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasTheSessionSecurityTokenToBeRenewed
File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | hasTheSessionSecurityTokenToBeRenewed | core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | public boolean getContentIntentAvailableOffline() {
return (mFlags & FLAG_CONTENT_INTENT_AVAILABLE_OFFLINE) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContentIntentAvailableOffline
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getContentIntentAvailableOffline | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public void setPackageDescription(String packageDescription)
{
this.packageDescription = packageDescription;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPackageDescription
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-27480 | HIGH | 7.7 | xwiki/xwiki-platform | setPackageDescription | xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java | e3527b98fdd8dc8179c24dc55e662b2c55199434 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected byte[] engineDoFinal(byte[] input, int inputOffset, int inputLen)
throws IllegalBlockSizeException, BadPaddingException {
final int maximumLen = getOutputSizeForFinal(inputLen);
/* Assume that we'll output exactly on a byte boundary. */
final byte[] output = n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineDoFinal
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | engineDoFinal | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | private Uri getNotificationUriFor(int key, String name) {
if (isConfigSettingsKey(key)) {
return (name != null) ? Uri.withAppendedPath(DeviceConfig.CONTENT_URI, name)
: DeviceConfig.CONTENT_URI;
} else if (isGlobalSettingsKey(key)) {
return... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNotificationUriFor
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getNotificationUriFor | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public void setContentEncoding(String contentEncoding) {
this.contentEncoding = contentEncoding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContentEncoding
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | setContentEncoding | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | public @Nullable String getNString(String columnName) throws SQLException {
return getNString(findColumn(columnName));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNString
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getNString | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public void setPackageAskScreenCompat(String packageName, boolean ask)
throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPackageAskScreenCompat
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | setPackageAskScreenCompat | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private int findNotificationRecordIndexLocked(NotificationRecord target) {
return mRankingHelper.indexOf(mNotificationList, target);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findNotificationRecordIndexLocked
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | findNotificationRecordIndexLocked | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
private boolean hasActiveInstrumentationLocked(int pid) {
if (pid == 0) {
return false;
}
synchronized (mPidsSelfLocked) {
ProcessRecord process = mPidsSelfLocked.get(pid);
return process != null && process.getActiveInstrumentation() != ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasActiveInstrumentationLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | hasActiveInstrumentationLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void enforceModifyPermission(String message) {
mContext.enforceCallingOrSelfPermission(MODIFY_PHONE_STATE, message);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceModifyPermission
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | enforceModifyPermission | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public MvcClass consumes(final List<MediaType> consumes) {
this.consumes = consumes;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: consumes
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | consumes | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | private static String stringifyKBSize(long size) {
return stringifySize(size * 1024, 1024);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stringifyKBSize
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | stringifyKBSize | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private void migrateLegacySettingsForUserLocked(DatabaseHelper dbHelper,
SQLiteDatabase database, int userId) {
// Move over the system settings.
final int systemKey = makeKey(SETTINGS_TYPE_SYSTEM, userId);
ensureSettingsStateLocked(systemKey);
SettingsSta... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrateLegacySettingsForUserLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | migrateLegacySettingsForUserLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent) {
switch (intent.getAction()) {
case ACTION_PROXY_NOTIFY_RECENTS_VISIBLITY_TO_OWNER:
visibilityChanged(intent.getBooleanExtra(EXTRA_RECENTS_VISIBILITY, false));
break;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0813 | MEDIUM | 6.6 | android | onReceive | packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java | 16a76dadcc23a13223e9c2216dad1fe5cad7d6e1 | 0 |
Analyze the following code function for security vulnerabilities | protected void setCertId(CertId certId) {
this.certId = certId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCertId
File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setCertId | base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setShortcutId(String shortcutId) {
mN.mShortcutId = shortcutId;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShortcutId
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setShortcutId | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private void updateNotificationsOnDensityOrFontScaleChanged() {
ArrayList<Entry> activeNotifications = mNotificationData.getActiveNotifications();
for (int i = 0; i < activeNotifications.size(); i++) {
Entry entry = activeNotifications.get(i);
boolean exposedGuts = mNotificationG... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNotificationsOnDensityOrFontScaleChanged
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | updateNotificationsOnDensityOrFontScaleChanged | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void setMarshallerListener(Marshaller.Listener marshallerListener) {
this.marshallerListener = marshallerListener;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMarshallerListener
File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-4152 | MEDIUM | 6.8 | spring-projects/spring-framework | setMarshallerListener | spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java | 2843b7d2ee12e3f9c458f6f816befd21b402e3b9 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Authentication> getAuthentications() {
return authentications;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthentications
File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getAuthentications | samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void openNewTab(String url, String extraHeaders, byte[] postData, int disposition) {
// This is only called in chrome layers.
assert false;
} | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2014-3159
- Severity: MEDIUM
- CVSS Score: 6.4
Description: Use LoadURLWithParams in ChromeWebContentsDelegateAndroid
Build a LoadURLParams object from the OpenURLParams and properly set all
parameters on that object when calling into NavigationController. This ... | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | openNewTab | android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 1 |
Analyze the following code function for security vulnerabilities | public int getTimeout() {
return mTimeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTimeout
File: core/java/android/service/gatekeeper/GateKeeperResponse.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-0806 | HIGH | 9.3 | android | getTimeout | core/java/android/service/gatekeeper/GateKeeperResponse.java | b87c968e5a41a1a09166199bf54eee12608f3900 | 0 |
Analyze the following code function for security vulnerabilities | @LogMessage(level = Level.WARN)
@Message(id = 711, value = "Context activation pattern {0} ignored as it is overriden by the integrator.", format = Format.MESSAGE_FORMAT)
void webXmlMappingPatternIgnored(String pattern); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: webXmlMappingPatternIgnored
File: impl/src/main/java/org/jboss/weld/logging/ServletLogger.java
Repository: weld/core
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2014-8122 | MEDIUM | 4.3 | weld/core | webXmlMappingPatternIgnored | impl/src/main/java/org/jboss/weld/logging/ServletLogger.java | 8e413202fa1af08c09c580f444e4fd16874f9c65 | 0 |
Analyze the following code function for security vulnerabilities | public String getCharacterEncoding() {
return characterEncoding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCharacterEncoding
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding ... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | getCharacterEncoding | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void getByIdConnectionFailure(TestContext context) throws Exception {
postgresClientNonexistingTenant().getByIdAsString(
FOO, randomUuid(), context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getByIdConnectionFailure
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getByIdConnectionFailure | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void activityResumed(IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityResumed
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | activityResumed | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public MediaPackage addPartialTrack(URI uri, MediaPackageElementFlavor flavor, long startTime,
MediaPackage mediaPackage) throws IOException, IngestException {
Job job = null;
try {
job = serviceRegistry.createJob(
JOB_TYPE,
INGEST_TRACK_FROM_URI,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPartialTrack
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | addPartialTrack | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | public int createXObject(EntityReference classReference, XWikiContext context) throws XWikiException
{
DocumentReference absoluteClassReference = resolveClassReference(classReference);
BaseObject object = BaseClass.newCustomClassInstance(absoluteClassReference, context);
object.setOwnerDocum... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-26470
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-19223: Improve xobject memory storage in XWikidocument
Function: createXObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/... | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | createXObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 1 |
Analyze the following code function for security vulnerabilities | protected void handleSerialization(Node node) {
BeanDefinitionBuilder serializationConfigBuilder = createBeanBuilder(SerializationConfig.class);
AbstractBeanDefinition beanDefinition = serializationConfigBuilder.getBeanDefinition();
fillAttributeValues(node, serializationConfigBuilde... | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2016-10750
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Add basic protection against untrusted deserialization.
Function: handleSerialization
File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
Repository: ha... | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | handleSerialization | hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 1 |
Analyze the following code function for security vulnerabilities | protected void save(List<Contentlet> contentlets) throws DotDataException, DotStateException, DotSecurityException {
for(Contentlet con : contentlets)
save(con);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | save | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void stopAppSwitches() {
mAmInternal.enforceCallingPermission(STOP_APP_SWITCHES, "stopAppSwitches");
synchronized (mGlobalLock) {
mAppSwitchesState = APP_SWITCH_DISALLOW;
mLastStopAppSwitchesTime = SystemClock.uptimeMillis();
mH.removeMessages(H.R... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopAppSwitches
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | stopAppSwitches | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | private PostgresClient createFooBinary(TestContext context) {
return createTable(context, TENANT, FOO,
"id UUID PRIMARY KEY , jsonb TEXT NOT NULL"); // TEXT to store binary data
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createFooBinary
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | createFooBinary | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Principal getLocalPrincipal() {
Certificate[] local = localCerts;
if (local == null || local.length == 0) {
return null;
}
return ((java.security.cert.X509Certificate) local[0]).getIssuerX500Principal();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalPrincipal
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | getLocalPrincipal | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void unregisterTaskStackListener(ITaskStackListener listener) {
mActivityTaskManager.unregisterTaskStackListener(listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterTaskStackListener
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | unregisterTaskStackListener | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | boolean isLastWindow(WindowState win) {
return mChildren.size() == 1 && mChildren.get(0) == win;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLastWindow
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isLastWindow | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | void dumpFileMetadata(FileMetadata info) {
if (DEBUG) {
StringBuilder b = new StringBuilder(128);
// mode string
b.append((info.type == BackupAgent.TYPE_DIRECTORY) ? 'd' : '-');
b.append(((info.mode & 0400) != 0) ? 'r' : '-');
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpFileMetadata
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | dumpFileMetadata | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private static String[] getDefaultCipherSuites(
boolean x509CipherSuitesNeeded,
boolean pskCipherSuitesNeeded) {
if (x509CipherSuitesNeeded) {
// X.509 based cipher suites need to be listed.
if (pskCipherSuitesNeeded) {
// Both X.509 and PSK based ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultCipherSuites
File: src/main/java/org/conscrypt/SSLParametersImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3840 | HIGH | 10 | android | getDefaultCipherSuites | src/main/java/org/conscrypt/SSLParametersImpl.java | 5af5e93463f4333187e7e35f3bd2b846654aa214 | 0 |
Analyze the following code function for security vulnerabilities | static void copyStream(InputStream is, OutputStream os) throws IOException {
Utils.copyStream(is, os, -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyStream
File: 1.x/src/rogatkin/web/WarRoller.java
Repository: drogatkin/TJWS2
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4594 | CRITICAL | 9.8 | drogatkin/TJWS2 | copyStream | 1.x/src/rogatkin/web/WarRoller.java | 1bac15c496ec54efe21ad7fab4e17633778582fc | 0 |
Analyze the following code function for security vulnerabilities | public void checkDeletingDocument(DocumentReference userReference, XWikiDocument document, XWikiContext context)
throws XWikiException
{
String currentWiki = null;
currentWiki = context.getWikiId();
try {
context.setWikiId(document.getDocumentReference().getWikiReference... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkDeletingDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | checkDeletingDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public File getDownloadablePresentationFile(String meetingId, String presId, String presFilename) {
log.info("Find downloadable presentation for meetingId={} presId={} filename={}", meetingId, presId, presFilename);
File presDir = Util.getPresentationDir(presentationBaseDir, meetingId, presId);
re... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2020-12443
- Severity: HIGH
- CVSS Score: 7.5
Description: Return 404 error when the file download is not allowed.
Function: getDownloadablePresentationFile
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
... | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | getDownloadablePresentationFile | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 1 |
Analyze the following code function for security vulnerabilities | private Map getThisOptions(JSONObject task) {
Map<String, String> optionMap = new HashMap<>();
task.getJSONObject("options").keySet().stream().forEach(k -> {
optionMap.put(k, task.getJSONObject("options").getString(k));
});
return optionMap;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getThisOptions
File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java
Repository: fit2cloud/rackshift
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-42405 | CRITICAL | 9.8 | fit2cloud/rackshift | getThisOptions | rackshift-server/src/main/java/io/rackshift/service/TaskService.java | 305aea3b20d36591d519f7d04e0a25be05a51e93 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean playEffect(Vector3 position, int type, int data) {
World world = getWorld();
final Effect effect = effects.get(type);
if (effect == null) {
return false;
}
world.playEffect(BukkitAdapter.adapt(world, position), effect, data);
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: playEffect
File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | playEffect | worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void completedAfter() {
super.completedAfter();
GeneralEntityServiceContextHolder.isSkipSeriesValue(Boolean.TRUE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: completedAfter
File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-1613 | MEDIUM | 4 | getrebuild/rebuild | completedAfter | src/main/java/com/rebuild/core/service/dataimport/DataImporter.java | d0de4cc35303168f44ca57712c824b5cb9525e54 | 0 |
Analyze the following code function for security vulnerabilities | public void updateSQLXML(String columnName, @Nullable SQLXML xmlObject) throws SQLException {
updateSQLXML(findColumn(columnName), xmlObject);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSQLXML
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateSQLXML | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public String optString(int index, String defaultValue) {
Object o = opt(index);
return o != null ? o.toString() : defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optString
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | optString | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | FrameType getFrameType() {
return frameType;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFrameType
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | getFrameType | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return Objects.hash(key, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: src/main/java/com/gitblit/StoredUserConfig.java
Repository: gitblit-org/gitblit
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2022-31267 | HIGH | 7.5 | gitblit-org/gitblit | hashCode | src/main/java/com/gitblit/StoredUserConfig.java | 9b4afad6f4be212474809533ec2c280cce86501a | 0 |
Analyze the following code function for security vulnerabilities | private void onDocumentEvent(XWikiDocument document)
{
boolean remove = false;
if (document.getObject(getExtensionClassName()) != null) {
// new or already existing object
if (document.getObject(getExtensionClassName(), USE_FIELDNAME, "always", false) != null) {
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-29206
- Severity: MEDIUM
- CVSS Score: 5.4
Description: XWIKI-9119: Refactoring of SkinExtensionPlugin
* Provide some tests
Function: onDocumentEvent
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugi... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | onDocumentEvent | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 1 |
Analyze the following code function for security vulnerabilities | private final void processCurBroadcastLocked(BroadcastRecord r,
ProcessRecord app) throws RemoteException {
if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST,
"Process cur broadcast " + r + " for app " + app);
if (app.thread == null) {
throw new RemoteException();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processCurBroadcastLocked
File: services/core/java/com/android/server/am/BroadcastQueue.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | processCurBroadcastLocked | services/core/java/com/android/server/am/BroadcastQueue.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public SQLType getType() {
return this.type;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getType
File: extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | getType | extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.