instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | boolean containsDismissKeyguardWindow() {
// Window state is transient during relaunch. We are not guaranteed to be frozen during the
// entirety of the relaunch.
if (isRelaunching()) {
return mLastContainsDismissKeyguardWindow;
}
for (int i = mChildren.size() - 1; i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: containsDismissKeyguardWindow
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | containsDismissKeyguardWindow | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void post() {
remove();
mListView.postDelayed(this, SEARCH_RESULT_ANNOUNCEMENT_DELAY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: post
File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | post | services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | public int getEndLineNumber() {
return endLineNumber_;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEndLineNumber
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | getEndLineNumber | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | public String deleteRecordAction(boolean keepTraceDocument) throws IOException, IndexUnreachableException {
try {
if (viewManager == null) {
return "";
}
if (IndexerTools.deleteRecord(viewManager.getPi(), keepTraceDocument,
Paths.get(DataM... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteRecordAction
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | deleteRecordAction | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public void setMnemonic(List<String> keyWords) {
this.keyWords = keyWords;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMnemonic
File: src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-212"
] | CVE-2021-32658 | LOW | 2.1 | nextcloud/android | setMnemonic | src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java | 355f3c745b464b741b20a3b96597303490c26333 | 0 |
Analyze the following code function for security vulnerabilities | private void parsePlayerRepair(final List<Element> elements) throws GameParseException {
for (final Element current : elements) {
final PlayerId player = getPlayerId(current, "player", true);
final RepairFrontier repairFrontier = getRepairFrontier(current, "frontier", true);
player.setRepairFronti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parsePlayerRepair
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parsePlayerRepair | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | public void toDOM(Document document, Element infoElement) {
if (requestID != null) {
Element requestTypeElement = document.createElement("requestID");
requestTypeElement.appendChild(document.createTextNode(requestID.toHexString()));
infoElement.appendChild(requestTypeElement... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDOM
File: base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toDOM | base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void initExecutorService() {
scheduledExecutorService = new ScheduledThreadPoolExecutor(1, r -> {
Thread thread = new Thread(r);
thread.setName("update-version-plugin-thread");
return thread;
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initExecutorService
File: web/src/main/java/com/zrlog/web/plugin/UpdateVersionPlugin.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | initExecutorService | web/src/main/java/com/zrlog/web/plugin/UpdateVersionPlugin.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | private int waitResultIfNeeded(WaitResult waitResult, ActivityRecord r,
LaunchingState launchingState) {
final int res = waitResult.result;
if (res == START_DELIVERED_TO_TOP
|| (res == START_TASK_TO_FRONT && r.nowVisible && r.isState(RESUMED))) {
// The activity s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: waitResultIfNeeded
File: services/core/java/com/android/server/wm/ActivityStarter.java
Repository: android
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-21269 | HIGH | 7.8 | android | waitResultIfNeeded | services/core/java/com/android/server/wm/ActivityStarter.java | 70ec64dc5a2a816d6aa324190a726a85fd749b30 | 0 |
Analyze the following code function for security vulnerabilities | @DeprecatedAt("2022-08-31")
@Deprecated
public Document parseDocument(Reader reader, ParserOptions parserOptions) throws InvalidSyntaxException {
ParserEnvironment parserEnvironment = ParserEnvironment.newParserEnvironment()
.document(reader)
.parserOptions(parserOptions)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseDocument
File: src/main/java/graphql/parser/Parser.java
Repository: graphql-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-28867 | HIGH | 7.5 | graphql-java | parseDocument | src/main/java/graphql/parser/Parser.java | 8a1c884c81c0b656db201cfd95881feb0f430a55 | 0 |
Analyze the following code function for security vulnerabilities | private OnDemandDocumentTranslationBundle createOnDemandDocumentBundle(DocumentReference documentReference,
String uid) throws TranslationBundleDoesNotExistsException
{
XWikiContext context = this.xcontextProvider.get();
XWikiDocument document;
try {
document = context.g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createOnDemandDocumentBundle
File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/Document... | [
"CWE-74"
] | CVE-2023-29510 | HIGH | 8.8 | xwiki/xwiki-platform | createOnDemandDocumentBundle | xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java | d06ff8a58480abc7f63eb1d4b8b366024d990643 | 0 |
Analyze the following code function for security vulnerabilities | public void setSerialNumberRangeInUse(boolean serialNumberRangeInUse) {
this.serialNumberRangeInUse = serialNumberRangeInUse;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSerialNumberRangeInUse
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setSerialNumberRangeInUse | base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static boolean defaultUseProxyProperties() {
return Boolean.getBoolean(ASYNC_CLIENT + "useProxyProperties");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultUseProxyProperties
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultUseProxyProperties | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | private boolean removeExcessNetworks() {
final int maxNumConfigs = mContext.getResources().getInteger(
R.integer.config_wifiMaxNumWifiConfigurations);
if (maxNumConfigs < 0) {
// Max number of saved networks not specified.
return false;
}
List<Wif... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeExcessNetworks
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | removeExcessNetworks | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean isFilterStopped(PackageParser.ActivityIntentInfo filter, int userId) {
if (!sUserManager.exists(userId)) return true;
PackageParser.Package p = filter.activity.owner;
if (p != null) {
PackageSetting ps = (PackageSetting)p.mExtras;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFilterStopped
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isFilterStopped | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private void resetGlobalSetting(int requestingUserId, int mode, String tag) {
if (DEBUG) {
Slog.v(LOG_TAG, "resetGlobalSetting(" + requestingUserId + ", "
+ mode + ", " + tag + ")");
}
mutateGlobalSetting(null, null, tag, false, requestingUserId,
M... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetGlobalSetting
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | resetGlobalSetting | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Id
@GeneratedValue(generator = "cmsGenerator")
@GenericGenerator(name = "cmsGenerator", strategy = CmsUpgrader.IDENTIFIER_GENERATOR)
@Column(name = "id", unique = true, nullable = false)
public Long getId() {
return this.id;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getId
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | getId | publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | private void instantExpandNotificationsPanel() {
// Make our window larger and the panel expanded.
makeExpandedVisible(true);
mNotificationPanel.expand(false /* animate */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: instantExpandNotificationsPanel
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | instantExpandNotificationsPanel | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public Builder setTimeout(long durationMs) {
mN.mTimeout = durationMs;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTimeout
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setTimeout | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private boolean doStartWebpack(ApplicationConfiguration config,
Pair<File, File> webPackFiles, long start) {
ProcessBuilder processBuilder = new ProcessBuilder()
.directory(npmFolder);
boolean useHomeNodeExec = config.getBooleanProperty(
InitParameters.REQUIR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doStartWebpack
File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-172"
] | CVE-2021-33604 | LOW | 1.2 | vaadin/flow | doStartWebpack | vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java | 2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc | 0 |
Analyze the following code function for security vulnerabilities | public Builder addLoader(ResourcesLoader loader) {
mLoaders.add(loader);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addLoader
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | addLoader | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | Field getReflectionField(ObjectStreamField osf) {
synchronized (reflectionFields) {
Field field = reflectionFields.get(osf);
if (field != null) {
return field;
}
}
try {
Class<?> declaringClass = forClass();
Field field... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getReflectionField
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | getReflectionField | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public void setDark(boolean dark, boolean animate) {
float darkAmount = dark ? 1 : 0;
if (mDarkAmount == darkAmount) {
return;
}
if (mDarkAnimator != null && mDarkAnimator.isRunning()) {
mDarkAnimator.cancel();
}
if (animate) {
mDarkAni... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDark
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setDark | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setRingbackRequested(String callId, boolean ringback,
Session.Info sessionInfo) {
Log.startSession(sessionInfo, "CSW.SRR", mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRingbackRequested
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | setRingbackRequested | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public int getVersion() {
return ((Long) DatabaseUtils.longForQuery(this, "PRAGMA user_version;", null)).intValue();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersion
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | getVersion | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | public boolean isDeviceOwnerApp(String packageName) {
throwIfParentInstance("isDeviceOwnerApp");
return isDeviceOwnerAppOnCallingUser(packageName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDeviceOwnerApp
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isDeviceOwnerApp | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public List<ApiMethodUrlDTO> parseUrl(ApiScenarioWithBLOBs scenario) {
List<ApiMethodUrlDTO> urlList = new ArrayList<>();
try {
String scenarioDefinition = scenario.getScenarioDefinition();
JSONObject scenarioObj = JSONObject.parseObject(scenarioDefinition);
List<Api... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseUrl
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | parseUrl | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getLockTaskMode() {
return mLockTaskMode;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLockTaskMode
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | getLockTaskMode | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | @JRubyMethod(name = "replace_entities")
public IRubyObject
get_replace_entities(ThreadContext context)
{
return context.runtime.newBoolean(replaceEntities);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get_replace_entities
File: ext/java/nokogiri/XmlSaxParserContext.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-241"
] | CVE-2022-29181 | MEDIUM | 6.4 | sparklemotion/nokogiri | get_replace_entities | ext/java/nokogiri/XmlSaxParserContext.java | db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 0 |
Analyze the following code function for security vulnerabilities | public Column<T, V> setWidth(double pixelWidth)
throws IllegalStateException, IllegalArgumentException {
checkColumnIsAttached();
if (pixelWidth < 0) {
throw new IllegalArgumentException(
"Pixel width should be greated than 0 (in " + toStri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWidth
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setWidth | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public String dialogButtonsOk(String okAttribute) {
return dialogButtons(new int[] {BUTTON_OK}, new String[] {okAttribute});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dialogButtonsOk
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | dialogButtonsOk | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void getNewInstanceTenant(TestContext context) {
Async async = context.async();
PostgresClient c1 = PostgresClient.getInstance(vertx, TENANT);
c1.closeClient(a -> {
assertSuccess(context, a);
PostgresClient c2 = PostgresClient.getInstance(vertx, TENANT);
context.assertNotEqu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNewInstanceTenant
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | getNewInstanceTenant | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | static public AsymmetricKeyParameter generatePublicKeyParameter(
PublicKey key)
throws InvalidKeyException
{
if (key instanceof DHPublicKey)
{
DHPublicKey k = (DHPublicKey)key;
return new DHPublicKeyParameters(k.getY(),
new DHParameters(... | Vulnerability Classification:
- CWE: CWE-310
- CVE: CVE-2016-1000339
- Severity: MEDIUM
- CVSS Score: 5.0
Description: added better support for DH domain parameters
added s box allocation to AESEngine
reduced use of AESFastEngine.
Function: generatePublicKeyParameter
File: prov/src/main/java/org/bouncycastle/jcajce/p... | [
"CWE-310"
] | CVE-2016-1000339 | MEDIUM | 5 | bcgit/bc-java | generatePublicKeyParameter | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/DHUtil.java | 413b42f4d770456508585c830cfcde95f9b0e93b | 1 |
Analyze the following code function for security vulnerabilities | public static StringBuilder makePage(final String title,
final String subtitle,
final String body) {
return makePage(null, title, subtitle, body);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makePage
File: src/tsd/HttpQuery.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | makePage | src/tsd/HttpQuery.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | private static void addToZip(final ZipOutputStream out, final Path root, final Path file) throws IOException {
if (Files.isDirectory(file)) {
addDirToZip(out, root, file);
} else {
addFileToZip(out, Paths.get(""), file);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addToZip
File: modules/common/app/utils/common/ZipUtil.java
Repository: JATOS
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4878 | MEDIUM | 5.2 | JATOS | addToZip | modules/common/app/utils/common/ZipUtil.java | 2b42519f309d8164e8811392770ce604cdabb5da | 0 |
Analyze the following code function for security vulnerabilities | public boolean cancelPendingTitleUpdate() {
if (pendingTitleUpdateCanceler == null) {
return false;
}
boolean result = pendingTitleUpdateCanceler.cancelExecution();
pendingTitleUpdateCanceler = null;
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelPendingTitleUpdate
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | cancelPendingTitleUpdate | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public static native String getAssetAllocations(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAssetAllocations
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getAssetAllocations | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public void setRecordingStatusDir(String dir) {
recordStatusDir = dir;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRecordingStatusDir
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | setRecordingStatusDir | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasAttachmentVersioning(XWikiContext context)
{
return getStoreConfiguration().isAttachmentVersioningEnabled();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasAttachmentVersioning
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | hasAttachmentVersioning | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void getAssociatedUserIds(Set<String> result) {
synchronized (_uid2Location) {
for (Map.Entry<String, Set<Location>> entry : _uid2Location.entrySet()) {
for (Location location : entry.getValue()) {
if (location instanceof LocalLocation) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAssociatedUserIds
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | getAssociatedUserIds | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setHasTopUi(boolean hasTopUi) throws RemoteException {
if (checkCallingPermission(permission.INTERNAL_SYSTEM_WINDOW) != PERMISSION_GRANTED) {
String msg = "Permission Denial: setHasTopUi() from pid="
+ Binder.getCallingPid()
+ ", uid=... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHasTopUi
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setHasTopUi | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String getEscapedContent(XWikiContext context) throws XWikiException
{
return XMLUtils.escape(getTranslatedContent(context));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEscapedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getEscapedContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void sendRedirect(String redirect) throws IOException
{
if (StringUtils.isBlank(redirect)) {
// Nowhere to go to
return;
}
if (StringUtils.containsAny(redirect, '\r', '\n')) {
LOGGER.warn("Possible HTTP Response Splitting attack, attem... | Vulnerability Classification:
- CWE: CWE-601
- CVE: CVE-2023-29204
- Severity: MEDIUM
- CVSS Score: 6.1
Description: XWIKI-19994: False positive redirect checking
Function: sendRedirect
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-p... | [
"CWE-601"
] | CVE-2023-29204 | MEDIUM | 6.1 | xwiki/xwiki-platform | sendRedirect | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | e4f7f68e93cb08c25632c126356d218abf192d1e | 1 |
Analyze the following code function for security vulnerabilities | native boolean configHciSnoopLogNative(boolean enable); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: configHciSnoopLogNative
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | configHciSnoopLogNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public SVNRepository openRepository(AbstractProject context) throws SVNException {
return Hudson.getInstance().getDescriptorByType(DescriptorImpl.class).getRepository(context,getSVNURL());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openRepository
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | openRepository | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public int getGlobalPrivateDnsMode(@NonNull ComponentName admin) {
throwIfParentInstance("setGlobalPrivateDns");
if (mService == null) {
return PRIVATE_DNS_MODE_UNKNOWN;
}
try {
return mService.getGlobalPrivateDnsMode(admin);
} catch (RemoteException re) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalPrivateDnsMode
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getGlobalPrivateDnsMode | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("counter")
public void count(@RequestAttribute SysSite site, Long id, HttpServletRequest request) {
statisticsComponent.contentClicks(site, id);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: count
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/web/cms/ContentController.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | count | publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/web/cms/ContentController.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean supports(AuthenticationToken token) {
return token instanceof JSONWebToken || super.supports(token);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: supports
File: portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java
Repository: ManyDesigns/Portofino
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-29451 | MEDIUM | 6.4 | ManyDesigns/Portofino | supports | portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java | 8c754a0ad234555e813dcbf9e57d637f9f23d8fb | 0 |
Analyze the following code function for security vulnerabilities | private void highlightList(Map<String, Object> options, List<Object> collection, int width) {
highlightList(options, collection, width, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: highlightList
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | highlightList | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | public static CiphertextHeaderV2 decode(final InputStream input, final Function<String, SecretKey> keyLookup)
throws EncodingException, StreamException
{
return decodeInternal(
input, keyLookup, ByteUtil::readInt, CiphertextHeaderV2::readByte, CiphertextHeaderV2::readInto);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decode
File: src/main/java/org/cryptacular/CiphertextHeaderV2.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | decode | src/main/java/org/cryptacular/CiphertextHeaderV2.java | 00395c232cdc62d4292ce27999c026fc1f076b1d | 0 |
Analyze the following code function for security vulnerabilities | boolean isVisibleNow() {
return (mToken.isVisible() || mAttrs.type == TYPE_APPLICATION_STARTING)
&& isVisible();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isVisibleNow
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isVisibleNow | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public boolean exists(String fullname, XWikiContext context)
{
return exists(getCurrentMixedDocumentReferenceResolver().resolve(fullname), context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exists
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | exists | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("threads")
@Operation(summary = "Put threads",
description = "Creates a new thread in the forum of the course node.")
@ApiResponse(responseCode = "200", description = "Ok.",
content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = MessageVO.class)),
@Content(me... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newThreadToForum
File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | newThreadToForum | src/main/java/org/olat/modules/fo/restapi/ForumWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | public static SvnClientManager createClientManager(ISVNAuthenticationProvider authProvider) {
ISVNAuthenticationManager sam = createSvnAuthenticationManager(authProvider);
return new SvnClientManager(SVNClientManager.newInstance(createDefaultSVNOptions(), sam));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createClientManager
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | createClientManager | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAccountManagedByCaller(String accountType, int callingUid, int userId) {
if (accountType == null) {
return false;
} else {
return getTypesManagedByCaller(callingUid, userId).contains(accountType);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAccountManagedByCaller
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | isAccountManagedByCaller | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public static HostnameVerifier defaultHostnameVerifier() {
return new AllowAllHostnameVerifier();
} | Vulnerability Classification:
- CWE: CWE-345
- CVE: CVE-2013-7398
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Use a hostname verifier that does hostname verification, backport #510, close #197
Function: defaultHostnameVerifier
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repositor... | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultHostnameVerifier | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 1 |
Analyze the following code function for security vulnerabilities | public boolean isGroup() {
return group;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isGroup
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | isGroup | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PauseRequest pauseAsync() {
final PauseRequest out = new PauseRequest();
out.ready(new SuccessCallback<AsyncMedia>() {
@Override
public void onSucess(AsyncMedia value) {
if (out == pendingPauseRequest) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseAsync
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | pauseAsync | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isEmpty() {
return chunks.isEmpty() && submissions.isEmpty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEmpty
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | isEmpty | worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | private void validate(final String uri,
final String localName,
final Handler handler) throws SAXParseException {
boolean validParent = false;
boolean validPeer = false;
boolean invalidNesting = false;
final Set validParents = handler.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validate
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | validate | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | public String getIssuerDN() {
return issuerDN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIssuerDN
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getIssuerDN | base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDELETEAttachment() throws Exception
{
String attachmentName = String.format("%d.txt", System.currentTimeMillis());
String attachmentURI = buildURIForThisPage(AttachmentResource.class, attachmentName);
String content = "ATTACHMENT CONTENT";
PutMethod putMeth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDELETEAttachment
File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/AttachmentsResourceIT.java
Repository: xwiki/xwiki-platform
Th... | [
"CWE-352"
] | CVE-2023-37277 | CRITICAL | 9.6 | xwiki/xwiki-platform | testDELETEAttachment | xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/AttachmentsResourceIT.java | 4c175405faa0e62437df397811c7526dfc0fbae7 | 0 |
Analyze the following code function for security vulnerabilities | void notifyTaskStackChangedLocked() {
mHandler.sendEmptyMessage(LOG_STACK_STATE);
mHandler.removeMessages(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG);
Message nmsg = mHandler.obtainMessage(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG);
mHandler.sendMessageDelayed(nmsg, NOTIFY_TASK_STACK_CHANGE_LIS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyTaskStackChangedLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | notifyTaskStackChangedLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private int getTargetSdk(String packageName, int userId) {
final ApplicationInfo ai;
try {
ai = mIPackageManager.getApplicationInfo(packageName, 0, userId);
return ai == null ? 0 : ai.targetSdkVersion;
} catch (RemoteException e) {
// Shouldn't happen
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTargetSdk
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getTargetSdk | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void convertSyntax(XWikiDocument doc, String targetSyntaxId, XWikiContext xcontext) throws XWikiException
{
// Convert the syntax without saving. The syntax conversion will be saved later along with the other changes.
doc.convertSyntax(targetSyntaxId, xcontext);
for (Locale locale :... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertSyntax
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | convertSyntax | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java | 30c52b01559b8ef5ed1035dac7c34aaf805764d5 | 0 |
Analyze the following code function for security vulnerabilities | public Column<T, V> setStyleGenerator(
StyleGenerator<T> cellStyleGenerator) {
Objects.requireNonNull(cellStyleGenerator,
"Cell style generator must not be null");
this.styleGenerator = cellStyleGenerator;
getGrid().getDataCommunicator().reset();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStyleGenerator
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setStyleGenerator | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public File prepareDownloadFile(Response response) throws IOException {
String filename = null;
String contentDisposition = (String) response.getHeaders().getFirst("Content-Disposition");
if (contentDisposition != null && !"".equals(contentDisposition)) {
// Get filename from the Content-Disposition h... | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2021-21430
- Severity: LOW
- CVSS Score: 2.1
Description: use Files.createTempFile
Function: prepareDownloadFile
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openap... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | prepareDownloadFile | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 1 |
Analyze the following code function for security vulnerabilities | @JRubyMethod(name = "recovery")
public IRubyObject
get_recovery(ThreadContext context)
{
return context.runtime.newBoolean(recovery);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get_recovery
File: ext/java/nokogiri/XmlSaxParserContext.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-241"
] | CVE-2022-29181 | MEDIUM | 6.4 | sparklemotion/nokogiri | get_recovery | ext/java/nokogiri/XmlSaxParserContext.java | db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 0 |
Analyze the following code function for security vulnerabilities | public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() {
enforceNotIsolatedCaller("getProcessesInErrorState");
// assume our apps are happy - lazy create the list
List<ActivityManager.ProcessErrorStateInfo> errList = null;
final boolean allUsers = ActivityManager.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessesInErrorState
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | getProcessesInErrorState | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | protected void addPermission(Permission p) {
runtimePermissions.add(p);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPermission
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | addPermission | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void resetConnectionTime(String callId, Session.Info sessionInfo) {
Log.startSession(sessionInfo, "CSW.rCCT", mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
logIncoming("rese... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetConnectionTime
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | resetConnectionTime | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | final void addBroadcastStatLocked(String action, String srcPackage, int receiveCount,
int skipCount, long dispatchTime) {
rotateBroadcastStatsIfNeededLocked();
mCurBroadcastStats.addBroadcast(action, srcPackage, receiveCount, skipCount, dispatchTime);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addBroadcastStatLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | addBroadcastStatLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getHeader(String s)
{
return this.response.getHeader(s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHeader
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-601"
] | CVE-2022-23618 | MEDIUM | 5.8 | xwiki/xwiki-platform | getHeader | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | 5251c02080466bf9fb55288f04a37671108f8096 | 0 |
Analyze the following code function for security vulnerabilities | public HttpURLConnection createConnection(TLSClientParameters tlsClientParameters,
Proxy proxy, URL url) throws IOException {
HttpURLConnection connection =
(HttpURLConnection) (proxy != null
? url.openConnection(proxy)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConnection
File: rt/transports/http/src/main/java/org/apache/cxf/transport/https/HttpsURLConnectionFactory.java
Repository: apache/cxf
The code follows secure coding practices. | [
"CWE-755"
] | CVE-2018-8039 | MEDIUM | 6.8 | apache/cxf | createConnection | rt/transports/http/src/main/java/org/apache/cxf/transport/https/HttpsURLConnectionFactory.java | fae6fabf9bd7647f5e9cb68897a7d72b545b741b | 0 |
Analyze the following code function for security vulnerabilities | public static final native boolean readProcFile(String file, int[] format,
String[] outStrings, long[] outLongs, float[] outFloats); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readProcFile
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | readProcFile | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onRequestContinued() {
mNumRequestContinued++;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRequestContinued
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | onRequestContinued | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @SysUISingleton
@Provides
static NotificationLogger provideNotificationLogger(
NotificationListener notificationListener,
@UiBackground Executor uiBgExecutor,
NotifPipelineFlags notifPipelineFlags,
NotifLiveDataStore notifLiveDataStore,
NotificationVis... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: provideNotificationLogger
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | provideNotificationLogger | packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long getConnectionStateTimestamp() {
return (mState == ConnectionState.ONLINE) ? mLastOnline : mLastOffline;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectionStateTimestamp
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | getConnectionStateTimestamp | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("resource")
protected Object deserializeWithUnwrapped(JsonParser p, DeserializationContext ctxt,
Object bean)
throws IOException
{
JsonToken t = p.currentToken();
if (t == JsonToken.START_OBJECT) {
t = p.nextToken();
}
TokenBuffer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deserializeWithUnwrapped
File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42004 | HIGH | 7.5 | FasterXML/jackson-databind | deserializeWithUnwrapped | src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java | 063183589218fec19a9293ed2f17ec53ea80ba88 | 0 |
Analyze the following code function for security vulnerabilities | public void onSettingsClick(String key); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSettingsClick
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | onSettingsClick | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public void browserBack(PeerComponent browserPeer) {
((AndroidImplementation.AndroidBrowserComponent) browserPeer).back();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: browserBack
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | browserBack | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private boolean checkAndHandleLinkedNetworkRoaming(String associatedBssid) {
if (!mContext.getResources().getBoolean(R.bool.config_wifiEnableLinkedNetworkRoaming)) {
return false;
}
ScanResult scanResult = mScanRequestProxy.getScanResult(associatedBssid);
if (scanResult == n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAndHandleLinkedNetworkRoaming
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | checkAndHandleLinkedNetworkRoaming | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void parseQueryMTypeWWildcardFilterImplicit() throws Exception {
HttpQuery query = NettyMocks.getQuery(tsdb,
"/api/query?start=1h-ago&m=sum:sys.cpu.0{}{host=*quirm}");
TSQuery tsq = (TSQuery) parseQuery.invoke(rpc, tsdb, query, expressions);
TSSubQuery sub = tsq.getQueries().get(0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseQueryMTypeWWildcardFilterImplicit
File: test/tsd/TestQueryRpc.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | parseQueryMTypeWWildcardFilterImplicit | test/tsd/TestQueryRpc.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | public void setMinHomeDownlinkBandwidth(long minHomeDownlinkBandwidth) {
mMinHomeDownlinkBandwidth = minHomeDownlinkBandwidth;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMinHomeDownlinkBandwidth
File: framework/java/android/net/wifi/hotspot2/pps/Policy.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21240 | MEDIUM | 5.5 | android | setMinHomeDownlinkBandwidth | framework/java/android/net/wifi/hotspot2/pps/Policy.java | 69119d1d3102e27b6473c785125696881bce9563 | 0 |
Analyze the following code function for security vulnerabilities | @Test (expected = BadRequestException.class)
public void parseQueryStartMissing() throws Exception {
HttpQuery query = NettyMocks.getQuery(tsdb,
"/api/query?end=1h-ago&m=sum:sys.cpu.0");
parseQuery.invoke(rpc, tsdb, query, expressions);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseQueryStartMissing
File: test/tsd/TestQueryRpc.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | parseQueryStartMissing | test/tsd/TestQueryRpc.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onSimStateChanged(int subId, int slotId, State simState) {
updateEmergencyCallButton();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSimStateChanged
File: packages/Keyguard/src/com/android/keyguard/EmergencyButton.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | onSimStateChanged | packages/Keyguard/src/com/android/keyguard/EmergencyButton.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | private T buildFromConnection(Http2Connection connection) {
Long maxHeaderListSize = initialSettings.maxHeaderListSize();
Http2FrameReader reader = new DefaultHttp2FrameReader(new DefaultHttp2HeadersDecoder(isValidateHeaders(),
maxHeaderListSize == null ? DEFAULT_HEADER_LIST_SIZE : maxHe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildFromConnection
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | buildFromConnection | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | public int[] getGlobalGids() {
return mGlobalGids;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalGids
File: services/core/java/com/android/server/SystemConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | getGlobalGids | services/core/java/com/android/server/SystemConfig.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | public static String replaceMatchAnyChar(@NonNull String arg) {
return arg.replace('*', '%');
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replaceMatchAnyChar
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | replaceMatchAnyChar | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | private boolean checkWebpackConnection() {
try {
readManifestPaths();
return true;
} catch (IOException e) {
getLogger().debug("Error checking webpack dev server connection",
e);
}
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkWebpackConnection
File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-172"
] | CVE-2021-33604 | LOW | 1.2 | vaadin/flow | checkWebpackConnection | vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java | 2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc | 0 |
Analyze the following code function for security vulnerabilities | private boolean isProfileOwnerOfOrganizationOwnedDevice(ComponentName who, int userId) {
return isProfileOwner(who, userId) && isProfileOwnerOfOrganizationOwnedDevice(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isProfileOwnerOfOrganizationOwnedDevice
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isProfileOwnerOfOrganizationOwnedDevice | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public boolean showsChronometer() {
return when != 0 && extras.getBoolean(EXTRA_SHOW_CHRONOMETER);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showsChronometer
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | showsChronometer | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public static int defaultMaxTotalConnections() {
return Integer.getInteger(ASYNC_CLIENT + "maxTotalConnections", -1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultMaxTotalConnections
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultMaxTotalConnections | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | @Provides
@SysUISingleton
static OnUserInteractionCallback provideOnUserInteractionCallback(
NotifPipelineFlags notifPipelineFlags,
HeadsUpManager headsUpManager,
StatusBarStateController statusBarStateController,
Lazy<NotifCollection> notifCollection,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: provideOnUserInteractionCallback
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | provideOnUserInteractionCallback | packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy(anyOf = {"this", "mProcLock"})
private void updateApplicationInfoLOSP(@NonNull List<String> packagesToUpdate,
boolean updateFrameworkRes, int userId) {
if (updateFrameworkRes) {
ParsingPackageUtils.readConfigUseRoundIcon(null);
}
mProcessList.updateApplica... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateApplicationInfoLOSP
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateApplicationInfoLOSP | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean shouldMagnify() {
if (mAttrs.type == TYPE_ACCESSIBILITY_MAGNIFICATION_OVERLAY
|| mAttrs.type == TYPE_INPUT_METHOD
|| mAttrs.type == TYPE_INPUT_METHOD_DIALOG
|| mAttrs.type == TYPE_MAGNIFICATION_OVERLAY
|| mAttrs.type == TYPE_N... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldMagnify
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | shouldMagnify | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void annotateInjectorExceptions(Collection<Message> messages) {
super.annotateInjectorExceptions(messages);
for (Message message : messages) {
if (message.getCause() instanceof MongoException) {
MongoException e = (MongoException) message.getCause();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: annotateInjectorExceptions
File: graylog2-server/src/main/java/org/graylog2/commands/Server.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2023-41045 | MEDIUM | 5.3 | Graylog2/graylog2-server | annotateInjectorExceptions | graylog2-server/src/main/java/org/graylog2/commands/Server.java | 466af814523cffae9fbc7e77bab7472988f03c3e | 0 |
Analyze the following code function for security vulnerabilities | protected PublicKey engineGeneratePublic(
KeySpec keySpec)
throws InvalidKeySpecException
{
if (keySpec instanceof DHPublicKeySpec)
{
return new BCDHPublicKey((DHPublicKeySpec)keySpec);
}
return super.engineGeneratePublic(keySpec);
} | Vulnerability Classification:
- CWE: CWE-310
- CVE: CVE-2016-1000339
- Severity: MEDIUM
- CVSS Score: 5.0
Description: added better support for DH domain parameters
added s box allocation to AESEngine
reduced use of AESFastEngine.
Function: engineGeneratePublic
File: prov/src/main/java/org/bouncycastle/jcajce/provide... | [
"CWE-310"
] | CVE-2016-1000339 | MEDIUM | 5 | bcgit/bc-java | engineGeneratePublic | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/KeyFactorySpi.java | 413b42f4d770456508585c830cfcde95f9b0e93b | 1 |
Analyze the following code function for security vulnerabilities | public void broadcastWpsSuccessEvent(String iface) {
sendMessage(iface, WPS_SUCCESS_EVENT);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: broadcastWpsSuccessEvent
File: service/java/com/android/server/wifi/WifiMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | broadcastWpsSuccessEvent | service/java/com/android/server/wifi/WifiMonitor.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | protected static void copyAttributes(RMQMessage rmqMessage, Message message) throws JMSException {
try {
rmqMessage.setJMSCorrelationID(message.getJMSCorrelationID());
rmqMessage.setJMSType(message.getJMSType());
// NOTE: all other JMS header values are set when the message i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyAttributes
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | copyAttributes | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.