instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public void sendDoubleTapForTest(long timeMs, int x, int y) {
if (mNativeContentViewCore == 0) return;
nativeDoubleTap(mNativeContentViewCore, timeMs, x, y);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendDoubleTapForTest
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | sendDoubleTapForTest | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setApiKeyPrefix(String apiKeyPrefix) {
for (Authentication auth : authentications.values()) {
if (auth instanceof ApiKeyAuth) {
((ApiKeyAuth) auth).setApiKeyPrefix(apiKeyPrefix);
return this;
}
}
throw new RuntimeException("No API key authentication configured!")... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApiKeyPrefix
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setApiKeyPrefix | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private static String getSettingValue(Bundle args) {
return (args != null) ? args.getString(Settings.NameValueTable.VALUE) : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSettingValue
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | getSettingValue | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isValidRedirectUrl(String redirectUrl) {
log.info("Validating redirect URL [{}]", redirectUrl);
URL url;
try {
url = new URL(redirectUrl);
String protocol = url.getProtocol();
String host = url.getHost();
if(insertDocumentSupporte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValidRedirectUrl
File: bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43798 | MEDIUM | 5.4 | bigbluebutton | isValidRedirectUrl | bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java | 02ba4c6ff8e78a0f4384ad1b7c7367c5a90376e8 | 0 |
Analyze the following code function for security vulnerabilities | public void setSession(Session session)
{
WebDriver.Options options = getDriver().manage();
options.deleteAllCookies();
if (session != null) {
for (Cookie cookie : session.getCookies()) {
// Using a cookie for single component domain (i.e., without '.', like 'loca... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSession
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | setSession | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public String getValidationScript()
{
if (this.validationScript == null) {
return "";
} else {
return this.validationScript;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValidationScript
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getValidationScript | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void register(String typeName, Class type) {
typeMapping.putIfAbsent(typeName, type);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: register
File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
Repository: alibaba/fastjson
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-25845 | MEDIUM | 6.8 | alibaba/fastjson | register | src/main/java/com/alibaba/fastjson/parser/ParserConfig.java | 8f3410f81cbd437f7c459f8868445d50ad301f15 | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final File file, final boolean validate) {
FileReader reader = null;
try {
reader = new FileReader(file);
return unmarshal(clazz, new InputSource(reader), null, validate, false);
} catch (final FileNotFoundException e) {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | void removeUserData(int userHandle) {
final boolean isOrgOwned;
synchronized (getLockObject()) {
if (userHandle == UserHandle.USER_SYSTEM) {
Slogf.w(LOG_TAG, "Tried to remove device policy file for user 0! Ignoring.");
return;
}
updateP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUserData
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | removeUserData | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Nonnull
@MustNotContainNull
private static List<JMenuItem> putAllItemsAsSection(@Nonnull final JPopupMenu menu, @Nullable final JMenu subMenu, @Nonnull @MustNotContainNull final List<JMenuItem> items) {
if (!items.isEmpty()) {
if (menu.getComponentCount() > 0) {
menu.add(UI_COMPO_FACTORY.makeMenu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: putAllItemsAsSection
File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
Repository: raydac/netbeans-mmd-plugin
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000542 | MEDIUM | 6.8 | raydac/netbeans-mmd-plugin | putAllItemsAsSection | mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java | 9fba652bf06e649186b8f9e612d60e9cc15097e9 | 0 |
Analyze the following code function for security vulnerabilities | public OptionalEntity<FileConfig> getFileConfig() {
return OptionalUtil.ofNullable(fileConfig);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileConfig
File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java
Repository: codelibs/fess
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000822 | HIGH | 7.5 | codelibs/fess | getFileConfig | src/main/java/org/codelibs/fess/util/GsaConfigParser.java | faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7 | 0 |
Analyze the following code function for security vulnerabilities | public List<ClientTransport.Factory> getClientTransportFactories() {
return _transportFactories;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientTransportFactories
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | getClientTransportFactories | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | public PollingResult poll( TaskListener listener ) {
SCM scm = getScm();
if (scm==null) {
listener.getLogger().println(Messages.AbstractProject_NoSCM());
return NO_CHANGES;
}
if (!isBuildable()) {
listener.getLogger().println(Messages.AbstractProject_D... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: poll
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | poll | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @HotPath(caller = HotPath.PROCESS_CHANGE)
@Override
public void onCleanUpApplicationRecord(WindowProcessController proc) {
synchronized (mGlobalLockWithoutBoost) {
if (proc == mHomeProcess) {
mHomeProcess = null;
}
if (proc ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCleanUpApplicationRecord
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | onCleanUpApplicationRecord | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | private void checkPartialSigningWithUser() {
if (signing == SigningState.FULL && JNLPRuntime.isVerifying()) {
signing = SigningState.PARTIAL;
try {
securityDelegate.promptUserOnPartialSigning();
} catch (LaunchException e) {
throw new RuntimeEx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkPartialSigningWithUser
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | checkPartialSigningWithUser | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | private void verifyContent(byte[] storedMac) throws IOException {
if (getLocalFileHeader().isDataDescriptorExists()
&& CompressionMethod.DEFLATE.equals(Zip4jUtil.getCompressionMethod(getLocalFileHeader()))) {
// Skip content verification in case of Deflate compression and if data descriptor exists.
... | Vulnerability Classification:
- CWE: CWE-346
- CVE: CVE-2023-22899
- Severity: MEDIUM
- CVSS Score: 5.9
Description: #485 Check for MAC even when DataDescritor exists
Function: verifyContent
File: src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java
Repository: srikanth-lingala/zip4j
Fixed Code:
... | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | verifyContent | src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java | 597b31afb473a40e8252de5b5def1876bab198d3 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void onCommentOpened(AjaxRequestTarget target, CodeComment comment) {
state.commentId = comment.getId();
state.position = SourceRendererProvider.getPosition(Preconditions.checkNotNull(comment.mapRange(state.blobIdent)));
pushState(target);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCommentOpened
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | onCommentOpened | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | public int getHeight() {
return this.getData("height");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHeight
File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-1231 | MEDIUM | 4.3 | plantuml | getHeight | src/net/sourceforge/plantuml/ugraphic/UImageSvg.java | c9137be051ce98b3e3e27f65f54ec7d9f8886903 | 0 |
Analyze the following code function for security vulnerabilities | public String toString() {
return super.toString().toLowerCase();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | toString | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | protected void appendToSubject(VFSLeaf file, VFSMetadata infos, StringBuilder sb) {
if (sb.length() > 0)
sb.append(", ");
if (infos != null && StringHelper.containsNonWhitespace(infos.getTitle())) {
sb.append(infos.getTitle());
} else {
sb.append(file.getName());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: appendToSubject
File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | appendToSubject | src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | private boolean allAttached(Collection<? extends Component> components) {
for (Component component : components) {
if (component.getParent() != this) {
return false;
}
}
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: allAttached
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | allAttached | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public String getSpacePreference(String preference, String defaultValue)
{
return this.xwiki.getSpacePreference(preference, defaultValue, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpacePreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getSpacePreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public String getUserTimeZone(XWikiContext context)
{
String tz = getUserPreference("timezone", context);
// We perform this verification ourselves since TimeZone#getTimeZone(String) with an invalid parameter returns
// GMT and not the system default.
if (!ArrayUtils.contains(TimeZon... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserTimeZone
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getUserTimeZone | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | String getServerID() {
return serverID;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServerID
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getServerID | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | private final int _decode32Bits() throws IOException {
int ptr = _inputPtr;
if ((ptr + 3) >= _inputEnd) {
return _slow32();
}
final byte[] b = _inputBuffer;
int v = (b[ptr++] << 24) + ((b[ptr++] & 0xFF) << 16)
+ ((b[ptr++] & 0xFF) << 8) + (b[ptr++] & 0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _decode32Bits
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _decode32Bits | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | private static CharSequenceMap toLowercaseMap(Iterator<? extends CharSequence> valuesIter,
int arraySizeHint) {
final CharSequenceMap result = new CharSequenceMap(arraySizeHint);
while (valuesIter.hasNext()) {
final AsciiString lowerCased = ... | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2019-16771
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Merge pull request from GHSA-35fr-h7jr-hh86
Motivation:
An `HttpService` can produce a malformed HTTP response when a user
specified a malformed HTTP header values, such as:
ResponseHeaders.of(Htt... | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | toLowercaseMap | core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void setSyncAutomatically(Account account, String providerName, boolean sync) {
setSyncAutomaticallyAsUser(account, providerName, sync, UserHandle.getCallingUserId());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSyncAutomatically
File: services/core/java/com/android/server/content/ContentService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2426 | MEDIUM | 4.3 | android | setSyncAutomatically | services/core/java/com/android/server/content/ContentService.java | 63363af721650e426db5b0bdfb8b2d4fe36abdb0 | 0 |
Analyze the following code function for security vulnerabilities | private boolean deletePackageLI(String packageName, UserHandle user,
boolean deleteCodeAndResources, int[] allUserHandles, boolean[] perUserInstalled,
int flags, PackageRemovedInfo outInfo,
boolean writeSettings) {
if (packageName == null) {
Slog.w(TAG, "Attempt t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deletePackageLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | deletePackageLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUserIcon(int userId, Bitmap bitmap) {
checkManageUsersPermission("update users");
long ident = Binder.clearCallingIdentity();
try {
synchronized (mPackagesLock) {
UserInfo info = mUsers.get(userId);
if (info == null || info... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserIcon
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | setUserIcon | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | public void deactivate() {
SolrServerFactory.shutdown(solrServer);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deactivate
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-21318 | MEDIUM | 5.5 | opencast | deactivate | modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java | b18c6a7f81f08ed14884592a6c14c9ab611ad450 | 0 |
Analyze the following code function for security vulnerabilities | public void setDefaultDialerApplication(@NonNull String packageName) {
throwIfParentInstance("setDefaultDialerApplication");
if (mService != null) {
try {
mService.setDefaultDialerApplication(packageName);
} catch (RemoteException e) {
throw e.reth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDefaultDialerApplication
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setDefaultDialerApplication | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int numOfConjectural(int nodeTypeValue) throws IOException {
StringBuilder sql = new StringBuilder();
List<Object> condition = new ArrayList<>(5);
sql.append("select count(*) num from ").append(ServiceTraffic.INDEX_NAME).append(" where ");
sql.append(ServiceTraffic.N... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: numOfConjectural
File: oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2MetadataQueryDAO.java
Repository: apache/skywalking
The ... | [
"CWE-89"
] | CVE-2020-13921 | HIGH | 7.5 | apache/skywalking | numOfConjectural | oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2MetadataQueryDAO.java | ddb6d9a5019a9c1fe31c364485a4e4b5066fefc3 | 0 |
Analyze the following code function for security vulnerabilities | public void updatePersistentConfiguration(Configuration values) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
values.writeToParcel(data, 0);
mRemote.transact(UPDATE_PERSISTENT_CON... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePersistentConfiguration
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | updatePersistentConfiguration | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void transformTranslate(Object nativeTransform, float x, float y, float z) {
//((Matrix) nativeTransform).preTranslate(x, y);
((CN1Matrix4f)nativeTransform).translate(x, y, z);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: transformTranslate
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | transformTranslate | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Properties getMessages(String baseBundlename, Locale locale) throws IOException {
Properties m = new Properties();
InputStream in = classLoader.getResourceAsStream(THEME_RESOURCES_MESSAGES + baseBundlename + "_" + locale.toString() + ".properties");
if(in != null){
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMessages
File: services/src/main/java/org/keycloak/theme/ClasspathThemeResourceProviderFactory.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-3856 | MEDIUM | 4.3 | keycloak | getMessages | services/src/main/java/org/keycloak/theme/ClasspathThemeResourceProviderFactory.java | 73f0474008e1bebd0733e62a22aceda9e5de6743 | 0 |
Analyze the following code function for security vulnerabilities | public void setSafeMode(boolean safeMode) {
mSafeMode = safeMode;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSafeMode
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | setSafeMode | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public byte[] getURLContentAsBytes(String surl, String username, String password, int timeout, String userAgent)
throws IOException
{
HttpClient client = getHttpClient(timeout, userAgent);
// pass our credentials to HttpClient, they will only be used for
// authenticating to servers... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLContentAsBytes
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getURLContentAsBytes | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPasswordMinimumLetters(ComponentName who, int length, boolean parent) {
if (!mHasFeature || notSupportedOnAutomotive("setPasswordMinimumLetters")) {
return;
}
Objects.requireNonNull(who, "ComponentName is null");
final int userId = mInjector.userH... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPasswordMinimumLetters
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setPasswordMinimumLetters | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void doGet(HttpServletRequest request, HttpServletResponse response) {
System.out.println("Servlet called");
PrintWriter outWriter = null;
response.setContentType("text/html");
System.out.println("Content type set");
try {
outWriter = response.getWriter();
if (outWriter != null)
Sy... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doGet
File: HeatMapServer/src/com/datformers/servlet/LoginServlet.java
Repository: ssn2013/cis450Project
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2015-10020 | MEDIUM | 5.2 | ssn2013/cis450Project | doGet | HeatMapServer/src/com/datformers/servlet/LoginServlet.java | 39b495011437a105c7670e17e071f99195b4922e | 0 |
Analyze the following code function for security vulnerabilities | private void notifyPosted(final ManagedServiceInfo info,
final StatusBarNotification sbn, NotificationRankingUpdate rankingUpdate) {
final INotificationListener listener = (INotificationListener)info.service;
StatusBarNotificationHolder sbnHolder = new StatusBarNotificationHolder... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyPosted
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | notifyPosted | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | private void createNewConnection(final Message message) {
if (!activity.xmppConnectionService.getHttpConnectionManager().checkConnection(message)) {
Toast.makeText(getActivity(), R.string.not_connected_try_again, Toast.LENGTH_SHORT).show();
return;
}
activity.xmppConnecti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNewConnection
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | createNewConnection | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Contract(pure = false, value = "null, _ -> fail")
public static void setAccessible(AccessibleObject object, boolean isAccessible) {
OpenAccess.openAccess(object, isAccessible);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAccessible
File: api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java
Repository: Karlatemp/UnsafeAccessor
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-31139 | MEDIUM | 4.3 | Karlatemp/UnsafeAccessor | setAccessible | api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java | 4ef83000184e8f13239a1ea2847ee401d81585fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean startUserInBackground(final int userId) {
return startUserInBackgroundWithListener(userId, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startUserInBackground
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | startUserInBackground | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private int getUserIdToWipeForFailedPasswords(ActiveAdmin admin) {
final int userId = admin.getUserHandle().getIdentifier();
final ComponentName component = admin.info.getComponent();
return isProfileOwnerOfOrganizationOwnedDevice(component, userId)
? getProfileParentId(userId) :... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserIdToWipeForFailedPasswords
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getUserIdToWipeForFailedPasswords | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private List<Map<String, Object>> findEntry(String sql, Object... paras) {
List<Log> logList = find(sql, paras);
List<Map<String, Object>> convertList = new ArrayList<>();
for (Log log : logList) {
convertList.add(log.getAttrs());
}
return convertList;
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2018-17420
- Severity: MEDIUM
- CVSS Score: 6.5
Description: fix #37 admin search article has sql injection
Function: findEntry
File: data/src/main/java/com/zrlog/model/Log.java
Repository: 94fzb/zrlog
Fixed Code:
private List<Map<String, Object>> findEntry(Stri... | [
"CWE-89"
] | CVE-2018-17420 | MEDIUM | 6.5 | 94fzb/zrlog | findEntry | data/src/main/java/com/zrlog/model/Log.java | 157b8fbbb64eb22ddb52e7c5754e88180b7c3d4f | 1 |
Analyze the following code function for security vulnerabilities | public ApiClient setDateFormat(DateFormat dateFormat) {
this.dateFormat = dateFormat;
// also set the date format for model (de)serialization with Date properties
this.json.setDateFormat((DateFormat) dateFormat.clone());
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDateFormat
File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setDateFormat | samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private XMLReader createTextConverter() throws SAXException {
if (textConverterRef == null) {
throw new ProcessException(
"No text converter has been assigned to the parser but parsers of type '" + type + "' require one");
}
// Load the latest TextConverter to ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createTextConverter
File: stroom-pipeline/src/main/java/stroom/pipeline/server/parser/CombinedParser.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | createTextConverter | stroom-pipeline/src/main/java/stroom/pipeline/server/parser/CombinedParser.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | @WorkerThread
public @NonNull Bundle getApplicationRestrictions(
@Nullable ComponentName admin, String packageName) {
throwIfParentInstance("getApplicationRestrictions");
if (mService != null) {
try {
return mService.getApplicationRestrictions(admin, mContext.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationRestrictions
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getApplicationRestrictions | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private void handleNewUserCreated(UserInfo user, @Nullable Object token) {
if (VERBOSE_LOG) {
Slogf.v(LOG_TAG, "handleNewUserCreated(): user=" + user.toFullString()
+ ", token=" + token);
}
final int userId = user.id;
if (isPolicyEngineForFinanceFlagEnab... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleNewUserCreated
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | handleNewUserCreated | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected List<String> internalGetPartitionedTopicList() {
validateAdminAccessForTenant(namespaceName.getTenant());
validateNamespaceOperation(namespaceName, NamespaceOperation.GET_TOPICS);
// Validate that namespace exists, throws 404 if it doesn't exist
try {
if (!namespace... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGetPartitionedTopicList
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGetPartitionedTopicList | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public String getDescription() {
return description.getExpressionString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDescription
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/HipchatNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getDescription | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/HipchatNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setOauthCredentials(String clientId, String clientSecret) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).setCredentials(clientId, clientSecret, isDebugging());
return this;
}
}
throw new RuntimeException("No O... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOauthCredentials
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setOauthCredentials | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public Document getDocument(String documentReference) throws XWikiException
{
DocumentReference reference;
// We ignore the passed full name if it's null to be backward compatible with previous behaviors.
if (documentReference != null) {
// Note: We use the CurrentMixed Resolver... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private static void bindArgs(@NonNull SQLiteStatement st, @Nullable Object[] bindArgs) {
if (bindArgs == null) return;
for (int i = 0; i < bindArgs.length; i++) {
final Object bindArg = bindArgs[i];
switch (getTypeOfObject(bindArg)) {
case Cursor.FIELD_TYPE_NULL:... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindArgs
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | bindArgs | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | protected void updateVisibilities() {
updateAlarmVisibilities();
mEmergencyOnly.setVisibility(mExpanded && mShowEmergencyCallsOnly
? View.VISIBLE : View.INVISIBLE);
mSettingsContainer.setVisibility(mExpanded ? View.VISIBLE : View.INVISIBLE);
mSettingsContainer.findViewByI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateVisibilities
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3886 | HIGH | 7.2 | android | updateVisibilities | packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java | 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | 0 |
Analyze the following code function for security vulnerabilities | List<String> getShellArgsList()
{
return shellArgs;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShellArgsList
File: src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java
Repository: apache/maven-shared-utils
The code follows secure coding practices. | [
"CWE-116"
] | CVE-2022-29599 | HIGH | 7.5 | apache/maven-shared-utils | getShellArgsList | src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java | 2735facbbbc2e13546328cb02dbb401b3776eea3 | 0 |
Analyze the following code function for security vulnerabilities | public boolean canComment(Profile authUser, HttpServletRequest req) {
return isAuthenticated(req) && ((authUser.hasBadge(ENTHUSIAST) || CONF.newUsersCanComment() || isMod(authUser)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canComment
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | canComment | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected FrameHeaderData parseFrame(ByteBuffer data) throws IOException {
if (prefaceCount < PREFACE_BYTES.length) {
while (data.hasRemaining() && prefaceCount < PREFACE_BYTES.length) {
if (data.get() != PREFACE_BYTES[prefaceCount]) {
IoUtils.safeCl... | Vulnerability Classification:
- CWE: CWE-214
- CVE: CVE-2021-3859
- Severity: HIGH
- CVSS Score: 7.5
Description: [UNDERTOW-1979] CVE-2021-3859 continuation frames are not read correctly
Function: parseFrame
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
Fixed... | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | parseFrame | core/src/main/java/io/undertow/protocols/http2/Http2Channel.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getBlockUninstallForUser(String packageName, int userId) {
synchronized (mPackages) {
PackageSetting ps = mSettings.mPackages.get(packageName);
if (ps == null) {
Log.i(TAG, "Package doesn't exist in get block uninstall " + packageName);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBlockUninstallForUser
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getBlockUninstallForUser | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String getVersion()
{
return this.xwiki.getVersion();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private void updateSaeAutoUpgradeFlagForUserSelectNetwork(int networkId) {
if (SdkLevel.isAtLeastS()) return;
if (mWifiGlobals.isWpa3SaeUpgradeEnabled()) return;
WifiConfiguration config = mWifiConfigManager.getConfiguredNetwork(networkId);
if (null == config) return;
SecurityPa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSaeAutoUpgradeFlagForUserSelectNetwork
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | updateSaeAutoUpgradeFlagForUserSelectNetwork | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public boolean convertToTranslucent(IBinder token, ActivityOptions options) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertToTranslucent
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | convertToTranslucent | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private String getPublicSharingCondition( String access )
{
return String.join( " or ",
jsonbFunction( EXTRACT_PATH_TEXT, "public" ) + " like " + withQuotes( access ),
jsonbFunction( EXTRACT_PATH_TEXT, "public" ) + " is null" );
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2022-24848
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Merge pull request from GHSA-52vp-f7hj-cj92
* fix: Add validation for programs org unit associations [DHIS2-13056]
* fix compilation failure in test class
* Fix one more compilation failure in another... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | getPublicSharingCondition | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java | ef04483a9b177d62e48dcf4e498b302a11f95e7d | 1 |
Analyze the following code function for security vulnerabilities | public boolean verifyHttpsHost() {
return verifyHttpsHost;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyHttpsHost
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | verifyHttpsHost | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void write(char[] chars, int offset, int length) {
builder.append(chars, offset, length);
tryFlush();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | write | web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getRelPath() {
Path bFile = getBasefile().toPath();
Path bcRoot = FolderConfig.getCanonicalRootPath();
String relPath;
if(bFile.startsWith(bcRoot)) {
relPath = bcRoot.relativize(bFile).toString();
if(relPath.endsWith("/")) {
relPath = relPath.substring(0, relPath.length() -... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRelPath
File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | getRelPath | src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java | 336d5ce80681be61a0bbf4f73d2af5d1ff67e93a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void scheduleApplicationInfoChanged(List<String> packageNames, int userId) {
enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
"scheduleApplicationInfoChanged()");
final long origId = Binder.clearCallingIdentity();
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleApplicationInfoChanged
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | scheduleApplicationInfoChanged | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private static String getSingleValidRedirectUri(Collection<String> validRedirects) {
if (validRedirects.size() != 1) return null;
String validRedirect = validRedirects.iterator().next();
return validateRedirectUriWildcard(validRedirect);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSingleValidRedirectUri
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | getSingleValidRedirectUri | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 0 |
Analyze the following code function for security vulnerabilities | public int getMinPushSize() {
return minPushSize;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMinPushSize
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | getMinPushSize | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | private short toShort(K name, V value) {
try {
return valueConverter.convertToShort(value);
} catch (IllegalArgumentException e) {
throw new IllegalArgumentException("Failed to convert header value to short for header '" + name + '\'');
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toShort
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | toShort | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | public void clearTemplateCache() {
webConfiguration.clearTemplateCache();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearTemplateCache
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2020-20914 | CRITICAL | 9.8 | sanluan/PublicCMS | clearTemplateCache | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java | bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void doStart() {
dnsClient = new DnsClient(config.requestTimeout());
dnsClient.start(config.serverIps());
} | Vulnerability Classification:
- CWE: CWE-345
- CVE: CVE-2023-41045
- Severity: MEDIUM
- CVSS Score: 5.3
Description: Merge pull request from GHSA-g96c-x7rh-99r3
* Add support for randomizing DNS Lookup source port
* Clarify purpose of lease
* Skip initial refresh
Previously, the pool was being refreshed immediatel... | [
"CWE-345"
] | CVE-2023-41045 | MEDIUM | 5.3 | Graylog2/graylog2-server | doStart | graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java | a101f4f12180fd3dfa7d3345188a099877a3c327 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean configure(StaplerRequest req, JSONObject json) throws FormException {
req.bindJSON(this,json);
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: configure
File: core/src/main/java/jenkins/model/JenkinsLocationConfiguration.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2014-9634 | MEDIUM | 5 | jenkinsci/jenkins | configure | core/src/main/java/jenkins/model/JenkinsLocationConfiguration.java | 582128b9ac179a788d43c1478be8a5224dc19710 | 0 |
Analyze the following code function for security vulnerabilities | void connectComet(OortComet comet) {
connectComet(comet, newOortHandshakeFields(comet.getURL(), null));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connectComet
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | connectComet | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @CalledByNative
public void toggleFullscreenModeForTab(boolean enterFullscreen) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toggleFullscreenModeForTab
File: components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java
Repository: chromium
The code follows se... | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | toggleFullscreenModeForTab | components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void handleDump(IndentingPrintWriter pw) {
if (mNetworkLoggingNotificationUserId != UserHandle.USER_NULL) {
pw.println("mNetworkLoggingNotificationUserId: " + mNetworkLoggingNotificationUserId);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleDump
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | handleDump | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int removeMonitor(String monitorId) {
return 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeMonitor
File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
Repository: floodlight
The code follows secure coding practices. | [
"CWE-362",
"CWE-476"
] | CVE-2015-6569 | MEDIUM | 4.3 | floodlight | removeMonitor | src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java | 7f5bedb625eec3ff4d29987c31cef2553a962b36 | 0 |
Analyze the following code function for security vulnerabilities | public SSHClient getConnectedClient(Config config) throws IOException {
SSHClient sshClient = new SSHClient(config);
sshClient.addHostKeyVerifier(new PromiscuousVerifier());
sshClient.connect("127.0.0.1", getFirstMappedPort());
return sshClient;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectedClient
File: src/itest/java/com/hierynomus/sshj/SshdContainer.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getConnectedClient | src/itest/java/com/hierynomus/sshj/SshdContainer.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServerIndex(Integer serverIndex) {
this.serverIndex = serverIndex;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServerIndex
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServerIndex | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) {
return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildPasswordKey
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | buildPasswordKey | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private static void handleWatchFileResult(
CompletableFuture<com.linecorp.centraldogma.common.Entry<Object>> future,
AsyncMethodCallback resultHandler) {
future.handle((res, cause) -> {
if (cause == null) {
final WatchFileResult wfr = new WatchFileResult();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleWatchFileResult
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | handleWatchFileResult | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | @Get("/projects/{projectName}/repos/{repoName}/compare")
public CompletableFuture<?> getDiff(
@Param @Default("/**") String pathPattern,
@Param @Default("1") String from, @Param @Default("head") String to,
Repository repository,
@RequestConverter(QueryRequestConverter... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDiff
File: server/src/main/java/com/linecorp/centraldogma/server/internal/api/ContentServiceV1.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | getDiff | server/src/main/java/com/linecorp/centraldogma/server/internal/api/ContentServiceV1.java | 6a395aed73f0b009cf8174a3ebf3ed826521c11d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void moveTaskToStack(int taskId, int stackId, boolean toTop) {
enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
"moveTaskToStack()");
if (stackId == HOME_STACK_ID) {
Slog.e(TAG, "moveTaskToStack: Attempt to move task " + taskId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTaskToStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | moveTaskToStack | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public static byte[] compress(byte[] input) {
if (input.length == 0) {
return new byte[0];
}
int len = Math.max(input.length / 10, 10);
Deflater compressor = new Deflater();
compressor.setLevel(Deflater.BEST_SPEED);
compressor.setInput(input);
compres... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: compress
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | compress | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public Endpoint getUserInfoOIDCEndpoint() throws URISyntaxException
{
return getEndPoint(UserInfoOIDCEndpoint.HINT);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserInfoOIDCEndpoint
File: oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java
Repository: xwiki-contrib/oidc
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39387 | HIGH | 7.5 | xwiki-contrib/oidc | getUserInfoOIDCEndpoint | oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java | 0247af1417925b9734ab106ad7cd934ee870ac89 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressLint("InflateParams")
protected void showJoinConferenceDialog(final String prefilledJid) {
FragmentTransaction ft = getSupportFragmentManager().beginTransaction();
Fragment prev = getSupportFragmentManager().findFragmentByTag(FRAGMENT_TAG_DIALOG);
if (prev != null) {
ft.remove(prev);
}
ft.addToBa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showJoinConferenceDialog
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | showJoinConferenceDialog | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | private void setDialogParamsAsBottomSheet() {
final Window window = mDialog.getWindow();
window.setType(WindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY);
window.addFlags(WindowManager.LayoutParams.FLAG_ALT_FOCUSABLE_IM
| WindowManager.LayoutParams.FLAG_DIM_BEHIND);
wi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDialogParamsAsBottomSheet
File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | setDialogParamsAsBottomSheet | services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | private void setRightButton(IntentButton button) {
mRightButton = button;
updateRightAffordanceIcon();
updateCameraVisibility();
inflateCameraPreview();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRightButton
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setRightButton | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Uri insert(Uri arg0, ContentValues arg1) {
// TODO Auto-generated method stub
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insert
File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java
Repository: hgzojer/vocabletrainer
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2017-20181 | MEDIUM | 4.3 | hgzojer/vocabletrainer | insert | src/at/hgz/vocabletrainer/VocableTrainerProvider.java | accf6838078f8eb105cfc7865aba5c705fb68426 | 0 |
Analyze the following code function for security vulnerabilities | public static void
setUrl(ThreadContext context, InputSource source, IRubyObject url)
{
String path = rubyStringToString(url);
// Dir.chdir might be called at some point before this.
if (path != null) {
try {
URI uri = URI.create(path);
source.setSystemId(uri.toURL().toString());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUrl
File: ext/java/nokogiri/internals/ParserContext.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-241"
] | CVE-2022-29181 | MEDIUM | 6.4 | sparklemotion/nokogiri | setUrl | ext/java/nokogiri/internals/ParserContext.java | db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 0 |
Analyze the following code function for security vulnerabilities | private static Throwing.Consumer<? super Object> bindService(Logger log,
final Set<Object> src,
final Config conf,
final Env env,
final RouteMetadata rm,
final Binder binder,
final Multibinder<Route.Definition> definitions,
final Multibinder<WebSocket.Definition> sockets,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bindService
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | bindService | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | boolean isResizeable() {
return isResizeable(/* checkPictureInPictureSupport */ true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isResizeable
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | isResizeable | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private void initializeMandatoryDocument(MandatoryDocumentInitializer initializer, XWikiContext context)
{
try {
DocumentReference documentReference =
getCurrentReferenceDocumentReferenceResolver().resolve(initializer.getDocumentReference());
if (documentReference.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeMandatoryDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | initializeMandatoryDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public void setUrlDirectionListener(UrlDirectionListener listener) {
mUrlDirectionListener = listener;
if (mUrlDirectionListener != null) {
mUrlDirectionListener.onUrlDirectionChanged(mUrlDirection);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUrlDirectionListener
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | setUrlDirectionListener | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
@SuppressWarnings("unchecked")
protected String getInternalIdForColumn(Column<?, ?> column) {
return getGrid().getInternalIdForColumn((Column<T, ?>) column);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInternalIdForColumn
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getInternalIdForColumn | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | private String processAction(String action) {
RequestDataValueProcessor processor = getRequestContext().getRequestDataValueProcessor();
ServletRequest request = this.pageContext.getRequest();
if ((processor != null) && (request instanceof HttpServletRequest)) {
action = processor.processAction((HttpServletRequ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processAction
File: spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-1904 | MEDIUM | 4.3 | spring-projects/spring-framework | processAction | spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java | 741b4b229ae032bd17175b46f98673ce0bd2d485 | 0 |
Analyze the following code function for security vulnerabilities | private Collection<WifiConfiguration> getInternalConfiguredNetworks() {
return mConfiguredNetworks.valuesForCurrentUser();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInternalConfiguredNetworks
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getInternalConfiguredNetworks | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final int startActivityAsCaller(IApplicationThread caller, String callingPackage,
Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode,
int startFlags, ProfilerInfo profilerInfo, Bundle bOptions, boolean ignoreTargetSecurity,
in... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAsCaller
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | startActivityAsCaller | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private void submitForm() {
ApplicationContext ac = AppUtil.getApplicationContext();
WorkflowUserManager workflowUserManager = (WorkflowUserManager) ac.getBean("workflowUserManager");
UserDao userDao = (UserDao) ac.getBean("userDao");
User userObject = userDao.getUser(workflowUserManager... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2022-4859
- Severity: MEDIUM
- CVSS Score: 4.0
Description: Fixed: wflow-core - User Profile Menu - Prevent XSS. T1604 @7.0-SNAPSHOT
Function: submitForm
File: wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java
Repository: jogetworkflow/jw-... | [
"CWE-79"
] | CVE-2022-4859 | MEDIUM | 4 | jogetworkflow/jw-community | submitForm | wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java | 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8 | 1 |
Analyze the following code function for security vulnerabilities | public void postCredential(String url, String username, String password, File keyFile, PrintWriter logWriter) throws SVNException, IOException {
postCredential(null,url,username,password,keyFile,logWriter);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postCredential
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | postCredential | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.