instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public void hidePermanentlyLw() { if (!mPermanentlyHidden) { mPermanentlyHidden = true; hide(true /* doAnimation */, true /* requestAnim */); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hidePermanentlyLw File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
hidePermanentlyLw
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
int getAppCompatState() { return getAppCompatState(/* ignoreVisibility= */ false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAppCompatState File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getAppCompatState
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private IdProviders getSortedIdProviders() { IdProviders idProviders = securityService.get().getIdProviders(); return IdProviders.from( idProviders.stream(). sorted( Comparator.comparing( u -> u.getKey().toString() ) ). collect( Collectors.toList() ) ); }
Vulnerability Classification: - CWE: CWE-384 - CVE: CVE-2024-23679 - Severity: CRITICAL - CVSS Score: 9.8 Description: Invalidate old session after login #9253 (cherry picked from commit 0189975691e9e6407a9fee87006f730e84f734ff) Function: getSortedIdProviders File: modules/lib/lib-auth/src/main/java/com/enonic/xp/li...
[ "CWE-384" ]
CVE-2024-23679
CRITICAL
9.8
enonic/xp
getSortedIdProviders
modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java
1f44674eb9ab3fbab7103e8d08067846e88bace4
1
Analyze the following code function for security vulnerabilities
@Override @Deprecated(since = "4.3M1") public String getRealLanguage() { String lang = getLanguage(); if (lang.equals("")) { return getDefaultLanguage(); } else { return lang; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRealLanguage File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getRealLanguage
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public void setDefaultAttachmentArchiveStore(AttachmentVersioningStore attachmentArchiveStore) { this.defaultAttachmentArchiveStore = attachmentArchiveStore; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDefaultAttachmentArchiveStore File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setDefaultAttachmentArchiveStore
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public <T> T post(Env env, String path, Object request, Class<T> responseType, Object... uriVariables) throws RestClientException { return execute(HttpMethod.POST, env, path, request, responseType, uriVariables); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: post File: apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java Repository: apolloconfig/apollo The code follows secure coding practices.
[ "CWE-20" ]
CVE-2020-15170
MEDIUM
6.8
apolloconfig/apollo
post
apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/component/RetryableRestTemplate.java
ae9ba6cfd32ed80469f162e5e3583e2477862ddf
0
Analyze the following code function for security vulnerabilities
protected String getContentAsText(XWikiAttachment attachment) { try { Metadata metadata = new Metadata(); metadata.set(TikaCoreProperties.RESOURCE_NAME_KEY, attachment.getFilename()); InputStream in = attachment.getContentInputStream(this.xcontextProvider.get()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentAsText File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java Reposi...
[ "CWE-312", "CWE-200" ]
CVE-2023-50719
HIGH
7.5
xwiki/xwiki-platform
getContentAsText
xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java
3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea
0
Analyze the following code function for security vulnerabilities
private SSLEngineResult.HandshakeStatus mayFinishHandshake(SSLEngineResult.HandshakeStatus status) throws SSLException { if (status == NOT_HANDSHAKING && handshakeState != HandshakeState.FINISHED) { // If the status was NOT_HANDSHAKING and we not finished the handshake we need to call ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mayFinishHandshake File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
mayFinishHandshake
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
public String method() { return method; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: method File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
method
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
@Override protected void removeFolderReferences(Folder folder) throws DotDataException, DotStateException, ElasticsearchException, DotSecurityException { //Folder parentFolder = null; Identifier folderId = null; try{ //parentFolder = APILocator.getFolderAPI().findParentFolder(folder, APIL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeFolderReferences File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
removeFolderReferences
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public int getFieldSize() { return (key.getParameters().getP().bitLength() + 7) / 8; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFieldSize File: core/src/main/java/org/bouncycastle/crypto/agreement/DHBasicAgreement.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-320" ]
CVE-2016-1000346
MEDIUM
4.3
bcgit/bc-java
getFieldSize
core/src/main/java/org/bouncycastle/crypto/agreement/DHBasicAgreement.java
1127131c89021612c6eefa26dbe5714c194e7495
0
Analyze the following code function for security vulnerabilities
public float getLineMax(int line) { float margin = getParagraphLeadingMargin(line); float signedExtent = getLineExtent(line, false); return margin + (signedExtent >= 0 ? signedExtent : -signedExtent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLineMax File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getLineMax
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
@Override public String getClassName() { return hostObjectName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClassName File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
getClassName
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
public List<DeletedDocument> getDeletedDocuments(String batchId) throws XWikiException { XWikiDeletedDocument[] deletedDocuments = this.xwiki.getDeletedDocuments(batchId, this.context); List<DeletedDocument> result = wrapDeletedDocuments(deletedDocuments); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeletedDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getDeletedDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private final int jjStartNfa_1(int pos, long active0) { return jjMoveNfa_1(jjStopStringLiteralDfa_1(pos, active0), pos + 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jjStartNfa_1 File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java Repository: jakartaee/expression-language The code follows secure coding practices.
[ "CWE-917" ]
CVE-2021-28170
MEDIUM
5
jakartaee/expression-language
jjStartNfa_1
impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
b6a3943ac5fba71cbc6719f092e319caa747855b
0
Analyze the following code function for security vulnerabilities
private boolean handleAppCrashLocked(ProcessRecord app, String shortMsg, String longMsg, String stackTrace) { long now = SystemClock.uptimeMillis(); Long crashTime; if (!app.isolated) { crashTime = mProcessCrashTimes.get(app.info.processName, app.uid); } else { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleAppCrashLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
handleAppCrashLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Test public void executeParamSyntaxError(TestContext context) { postgresClient().execute("'", new JsonArray(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeParamSyntaxError File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
executeParamSyntaxError
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
protected String getModelAttribute() { return this.modelAttribute; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getModelAttribute File: spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-1904
MEDIUM
4.3
spring-projects/spring-framework
getModelAttribute
spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java
741b4b229ae032bd17175b46f98673ce0bd2d485
0
Analyze the following code function for security vulnerabilities
@Nullable private static Double toDouble(@Nullable String v) { try { return v != null ? Double.parseDouble(v) : null; } catch (NumberFormatException ignore) { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDouble File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
toDouble
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "9.9RC1") public XWikiAttachmentStoreInterface getAttachmentStore(XWikiContext context) { return context.getWiki().getAttachmentStore(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentStore File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getAttachmentStore
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public void hideSelectActionBar() { if (mActionMode != null) { mActionMode.finish(); mActionMode = null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hideSelectActionBar File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
hideSelectActionBar
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void invokeCallback(IPackageMoveObserver callback, int what, SomeArgs args) throws RemoteException { switch (what) { case MSG_CREATED: { callback.onCreated(args.argi1, (Bundle) args.arg2); break; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeCallback File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
invokeCallback
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public void writeUnknownObject(Object v, String name, TypedXmlSerializer out) throws XmlPullParserException, IOException { if (v instanceof PersistableBundle) { out.startTag(null, TAG_PERSISTABLEMAP); out.attribute(null, "name", name); ((PersistableB...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeUnknownObject File: core/java/android/os/PersistableBundle.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40074
MEDIUM
5.5
android
writeUnknownObject
core/java/android/os/PersistableBundle.java
40e4ea759743737958dde018f3606d778f7a53f3
0
Analyze the following code function for security vulnerabilities
static DataSource lookupDataSource(Hints hints) throws FactoryException { Object hint = hints.get(Hints.EPSG_DATA_SOURCE); if (hint instanceof DataSource) { return (DataSource) hint; } else if (hint instanceof String) { String name = (String) hint; InitialCont...
Vulnerability Classification: - CWE: CWE-917 - CVE: CVE-2022-24818 - Severity: HIGH - CVSS Score: 7.5 Description: [GEOT-7115] Streamline JNDI lookups Function: lookupDataSource File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java Repository: geotools Fixed Code:...
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
lookupDataSource
modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
1
Analyze the following code function for security vulnerabilities
private native void nativeScrollEnd(long nativeContentViewCoreImpl, long timeMs);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeScrollEnd File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeScrollEnd
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override public Route.Collection put(final String path1, final String path2, final String path3, final Route.OneArgHandler handler) { return new Route.Collection( new Route.Definition[]{put(path1, handler), put(path2, handler), put(path3, handler)}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
put
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message msg) { CatLog.d(this, "handleMessage[" + msg.what + "]"); switch (msg.what) { case MSG_ID_SESSION_END: case MSG_ID_PROACTIVE_COMMAND: case MSG_ID_EVENT_NOTIFY: case MSG_ID_REFRESH: CatLog.d(this, "ril message ar...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: src/java/com/android/internal/telephony/cat/CatService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3843
HIGH
9.3
android
handleMessage
src/java/com/android/internal/telephony/cat/CatService.java
b48581401259439dc5ef6dcf8b0f303e4cbefbe9
0
Analyze the following code function for security vulnerabilities
public boolean removeSharedAccountAsUser(Account account, int userId) { return removeSharedAccountAsUser(account, userId, getCallingUid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeSharedAccountAsUser File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
removeSharedAccountAsUser
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Editable(order=390, name="Agent Selector", placeholder="Any agent", description="Specify agents applicable for this executor") @io.onedev.server.web.editable.annotation.AgentQuery(forExecutor=true) public String getAgentQuery() { return agentQuery; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAgentQuery File: server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExecutor.java Repository: theonedev/onedev The code follows secure coding p...
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
getAgentQuery
server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
synchronized int getUserId() { return mUserId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserId File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
getUserId
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
public void uninstallPackageWithActiveAdmins(String packageName) { try { mService.uninstallPackageWithActiveAdmins(packageName); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uninstallPackageWithActiveAdmins File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
uninstallPackageWithActiveAdmins
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String displayPrettyName(String fieldname, boolean showMandatory) { if (this.currentObj == null) { return this.doc.displayPrettyName(fieldname, showMandatory, getXWikiContext()); } else { return this.doc.displayPrettyName(fieldname, showMandatory, this.currentObj.getBa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayPrettyName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
displayPrettyName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public boolean isEscapeForwardSlashAlways() { return escapeForwardSlashAlways; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEscapeForwardSlashAlways File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
isEscapeForwardSlashAlways
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
@Test public void parseQuery2MType() throws Exception { HttpQuery query = NettyMocks.getQuery(tsdb, "/api/query?start=1h-ago&m=sum:sys.cpu.0&m=avg:sys.cpu.1"); TSQuery tsq = (TSQuery) parseQuery.invoke(rpc, tsdb, query, expressions); assertNotNull(tsq.getQueries()); assertEquals(2, tsq.getQuerie...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseQuery2MType File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
parseQuery2MType
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
@Override public double getDoubleProperty(String name) throws JMSException { Object o = this.getObjectProperty(name); if (o == null) throw new NumberFormatException("Null is not a valid double"); else if (o instanceof String) { return Double.parseDouble((String) o); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDoubleProperty File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
getDoubleProperty
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
public void removeTrigger(TriggerDescriptor trigger) throws IOException { removeFromList(trigger,triggers()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeTrigger File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
removeTrigger
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition lt(T value) { Condition conditionLocal = new LtCondition<T>(selector, selector.generateParameter(value)); return getOnGoingLogicalCondition(conditionLocal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lt File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
lt
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
public void setOutputStream(WinstoneOutputStream outData) { this.outputStream = outData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOutputStream File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
setOutputStream
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
private Set<String> getAllRecordingIds(List<File> recs) { Set<String> ids = new HashSet<>(); Iterator<File> iterator = recs.iterator(); while (iterator.hasNext()) { ids.add(iterator.next().getName()); } return ids; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllRecordingIds File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
getAllRecordingIds
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasNext() { return next != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasNext File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
hasNext
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
protected void dismissKeyguardThenExecute(OnDismissAction action, boolean afterKeyguardGone) { dismissKeyguardThenExecute(action, null /* cancelRunnable */, afterKeyguardGone); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissKeyguardThenExecute File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
dismissKeyguardThenExecute
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void wakeUpIfDozing(long time, View where) { if (mDozing) { PowerManager pm = (PowerManager) mContext.getSystemService(Context.POWER_SERVICE); pm.wakeUp(time, "com.android.systemui:NODOZE"); mWakeUpComingFromTouch = true; where.getLocationInWindow(mTmpInt2)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wakeUpIfDozing File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
wakeUpIfDozing
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("UnusedParameters") public static String[] getComponentId(HttpServletRequest request, MainSessionController mainSessionCtrl) { SilverpeasWebUtil webUtil = ServiceProvider.getSingleton(SilverpeasWebUtil.class); return webUtil.getComponentId(request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getComponentId File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getComponentId
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
private void bindGuts(final ExpandableNotificationRow row, MenuItem item) { row.inflateGuts(); row.setGutsView(item); final StatusBarNotification sbn = row.getStatusBarNotification(); row.setTag(sbn.getPackageName()); final NotificationGuts guts = row.getGuts(); guts.setC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindGuts File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
bindGuts
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override protected Contentlet save(Contentlet contentlet, String existingInode) throws DotDataException, DotStateException, DotSecurityException { com.dotmarketing.portlets.contentlet.business.Contentlet fatty = new com.dotmarketing.portlets.contentlet.business.Contentlet(); if(InodeUtils.isSet(contentle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
save
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public boolean isThirdPartTemplateSupport(String platform) { if (StringUtils.isBlank(platform)) { return false; } PluginMetaInfo pluginMetaInfo = pluginManager.getPluginMetaInfoByKey(platform); if (PlatformPluginService.isPluginPlatform(platform) && pluginMetaInfo == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isThirdPartTemplateSupport File: test-track/backend/src/main/java/io/metersphere/service/PlatformPluginService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
isThirdPartTemplateSupport
test-track/backend/src/main/java/io/metersphere/service/PlatformPluginService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@Override public int getPendingAppTransition() { return mAppTransition.getAppTransition(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPendingAppTransition File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getPendingAppTransition
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void registerNetworkPolicyUidObserver(@NonNull IUidObserver observer, int which, int cutpoint, @NonNull String callingPackage) { mNetworkPolicyUidObserver = observer; mUidObserverController.register(observer, which, cutpoint, callingPackage, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerNetworkPolicyUidObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
registerNetworkPolicyUidObserver
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
Map<String, Object> toHeaders() throws IOException, JMSException { Map<String, Object> hdrs = new HashMap<String, Object>(); // set non-null user properties for (Map.Entry<String, Serializable> e : this.userJmsProperties.entrySet()) { putIfNotNull(hdrs, e.getKey(), e.getValue()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toHeaders File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
toHeaders
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
public void toXML(Object obj, Writer out) { HierarchicalStreamWriter writer = hierarchicalStreamDriver.createWriter(out); try { marshal(obj, writer); } finally { writer.flush(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toXML File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
toXML
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
@Override public void appNotRespondingViaProvider(IBinder connection) { mCpHelper.appNotRespondingViaProvider(connection); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appNotRespondingViaProvider File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
appNotRespondingViaProvider
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public boolean requestAssistContextExtras(int requestType, IResultReceiver receiver, IBinder activityToken) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestAssistContextExtras File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
requestAssistContextExtras
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public boolean enableSwitch(Context context, ApplicationInfo app) { try { PackageInfo info = context.getPackageManager().getPackageInfo( app.packageName, PackageManager.GET_PERMISSIONS); final AppRow row = new AppRow(); recordCanBeBlocked(info, row); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableSwitch File: src/com/android/settings/notification/NotificationBackend.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
enableSwitch
src/com/android/settings/notification/NotificationBackend.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
protected T _fromDecimal(DeserializationContext context, BigDecimal value) { long seconds = value.longValue(); int nanoseconds = DecimalUtils.extractNanosecondDecimal(value, seconds); return fromNanoseconds.apply(new FromDecimalArguments( seconds, nanoseconds, getZone(context...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2018-1000873 - Severity: MEDIUM - CVSS Score: 4.3 Description: Avoid latency problems converting decimal to time. Fixes https://github.com/FasterXML/jackson-databind/issues/2141 Function: _fromDecimal File: datetime/src/main/java/com/fasterxml/jackson/datatype/j...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
_fromDecimal
datetime/src/main/java/com/fasterxml/jackson/datatype/jsr310/deser/InstantDeserializer.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
1
Analyze the following code function for security vulnerabilities
public Jooby use(final Jooby.Module module) { requireNonNull(module, "A module is required."); bag.add(module); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: use File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
use
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public void updateApplication(ServiceProvider serviceProvider, String tenantDomain, String username) throws IdentityApplicationManagementException { validateApplicationConfigurations(serviceProvider, tenantDomain, username); // invoking the listeners Collection<Applic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApplication File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
updateApplication
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
final void addBroadcastStatLocked(String action, String srcPackage, int receiveCount, int skipCount, long dispatchTime) { final long now = SystemClock.elapsedRealtime(); if (mCurBroadcastStats == null || (mCurBroadcastStats.mStartRealtime +(24*60*60*1000) < now)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addBroadcastStatLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
addBroadcastStatLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private void migrate74(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("Builds.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) element.addElement("triggerChain").setText...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate74 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate74
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
int binderGetCallingPid() { return Binder.getCallingPid(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: binderGetCallingPid File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
binderGetCallingPid
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public float getAttributeFloatValue(int idx, float defaultValue) { final int t = nativeGetAttributeDataType(mParseState, idx); if (t == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null document"); } // Note: don't attempt to convert any other ty...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeFloatValue File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeFloatValue
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public String getPlainText(String messageId) { return getPlainText(messageId, (Object[])null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPlainText File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
getPlainText
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
public static boolean fail(String message) { throw new InvalidPathException(message); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fail File: json-path/src/main/java/com/jayway/jsonpath/internal/path/PathCompiler.java Repository: json-path/JsonPath The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-51074
MEDIUM
5.3
json-path/JsonPath
fail
json-path/src/main/java/com/jayway/jsonpath/internal/path/PathCompiler.java
f49ff25e3bad8c8a0c853058181f2c00b5beb305
0
Analyze the following code function for security vulnerabilities
private void clearOverrideApnUnchecked() { if (!mHasTelephonyFeature) { return; } // Disable Override APNs and remove them from database. setOverrideApnsEnabledUnchecked(false); final List<ApnSetting> apns = getOverrideApnsUnchecked(); for (int i = 0; i < apns...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearOverrideApnUnchecked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
clearOverrideApnUnchecked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Test public void createsCountQueryCorrectly() throws Exception { assertCountQuery(QUERY, COUNT_QUERY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createsCountQueryCorrectly File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
createsCountQueryCorrectly
src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
@Override public void onAuthenticationSucceeded(AuthenticationResult result) { handleFingerprintAuthenticated(); }
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3917 - Severity: HIGH - CVSS Score: 7.2 Description: Bind fingerprint when we start authentication This fixes a bug where it was possible to authenticate the wrong user. We now bind the userId when we start authentication and confirm it when authentication ...
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticationSucceeded
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
1
Analyze the following code function for security vulnerabilities
@Test public void getByIdsConnectionFailure(TestContext context) { postgresClientNonexistingTenant().getByIdAsString(FOO, randomUuidArray(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByIdsConnectionFailure File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getByIdsConnectionFailure
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public List<Action> getViewActions() { return getActions(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewActions File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getViewActions
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public ServerBuilder tls(File keyCertChainFile, File keyFile) { return (ServerBuilder) TlsSetters.super.tls(keyCertChainFile, keyFile); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tls File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
tls
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public boolean isPortrait() { int orientation = getContext().getResources().getConfiguration().orientation; if (orientation == Configuration.ORIENTATION_UNDEFINED || orientation == Configuration.ORIENTATION_SQUARE) { return super.isPortrait(); } return orienta...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPortrait File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isPortrait
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void setPasswordExpirationTimeout(ComponentName who, long timeout, boolean parent) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return; } Objects.requireNonNull(who, "ComponentName is null"); Preconditions.checkArgumentNonnegative(tim...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPasswordExpirationTimeout File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setPasswordExpirationTimeout
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void processInstallRequests(boolean success, List<InstallRequest> installRequests) { List<InstallRequest> apexInstallRequests = new ArrayList<>(); List<InstallRequest> apkInstallRequests = new ArrayList<>(); for (InstallRequest request : installRequests) { if ((request.mArgs.m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processInstallRequests File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
processInstallRequests
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
@Override public boolean addAccountExplicitlyWithVisibility(Account account, String password, Bundle extras, Map packageToVisibility, String opPackageName) { Bundle.setDefusable(extras, true); int callingUid = Binder.getCallingUid(); int userId = UserHandle.getCallingUserId(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAccountExplicitlyWithVisibility File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
addAccountExplicitlyWithVisibility
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public static int getIntValueRounded(String value, int defaultValue, String key) { int result; try { result = Math.round(Float.parseFloat(value)); } catch (Exception e) { if (LOG.isDebugEnabled()) { LOG.debug(Messages.get().getBundle().key(Messages.ERR_UN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntValueRounded File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getIntValueRounded
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
Call getFirstCallWithState(Call callToSkip, int... states) { for (int currentState : states) { // check the foreground first if (mForegroundCall != null && mForegroundCall.getState() == currentState) { return mForegroundCall; } for (Call call : mC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstCallWithState File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getFirstCallWithState
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
static BigInteger objectToBigInteger(Object val, BigInteger defaultValue) { if (NULL.equals(val)) { return defaultValue; } if (val instanceof BigInteger){ return (BigInteger) val; } if (val instanceof BigDecimal){ return ((BigDecimal) val).toBi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: objectToBigInteger File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
objectToBigInteger
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
private CleanerProperties getDefaultCleanerProperties(HTMLCleanerConfiguration configuration) { CleanerProperties defaultProperties = new CleanerProperties(); defaultProperties.setOmitUnknownTags(true); // HTML Cleaner uses the compact notation by default but we don't want that since: ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29528 - Severity: CRITICAL - CVSS Score: 9.0 Description: XCOMMONS-2568: Improve comment handling in HTMLCleaner (#306) Function: getDefaultCleanerProperties File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/DefaultHTMLClea...
[ "CWE-79" ]
CVE-2023-29528
CRITICAL
9
xwiki/xwiki-commons
getDefaultCleanerProperties
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/internal/html/DefaultHTMLCleaner.java
8ff1a9d7e5d7b45b690134a537d53dc05cae04ab
1
Analyze the following code function for security vulnerabilities
@Override boolean check(ReliableTopicConfig c1, ReliableTopicConfig c2) { return c1 == c2 || !(c1 == null || c2 == null) && nullSafeEqual(c1.getReadBatchSize(), c2.getReadBatchSize()) && nullSafeEqual(c1.getName(), c2.getName()) && nullSafe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationAsInt01() throws Exception { Duration value = READER.with(DeserializationFeature.READ_DATE_TIMESTAMPS_AS_NANOSECONDS) .readValue("60"); assertNotNull("The value should not be null.", value); assertEquals("The value is not correct.", Du...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationAsInt01 File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationAsInt01
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
public boolean rowUpdated() throws SQLException { checkClosed(); return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rowUpdated File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
rowUpdated
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private void getUniqueLinkedEntityReferences(XDOM dom, Map<EntityType, Set<ResourceType>> entityTypes, Set<EntityReference> references) { Set<EntityReference> uniqueLinkedEntityReferences = getLinkParser().getUniqueLinkedEntityReferences(dom, entityTypes, getDocumentReference()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUniqueLinkedEntityReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getUniqueLinkedEntityReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public void dumpHeapFinished(String path) { mAppProfiler.dumpHeapFinished(path, Binder.getCallingPid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpHeapFinished File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
dumpHeapFinished
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private synchronized void clearRowBuffer(boolean copyCurrentRow) throws SQLException { // inserts want an empty array while updates want a copy of the current row if (copyCurrentRow) { rowBuffer = castNonNull(thisRow, "thisRow").updateableCopy(); } else { rowBuffer = new Tuple(fields.length); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearRowBuffer File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
clearRowBuffer
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private static native long nativeCreate(byte[] data, int offset, int size);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeCreate File: core/java/android/content/res/StringBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeCreate
core/java/android/content/res/StringBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
void conference(final Call call, Call otherCall) { final String callId = mCallIdMapper.getCallId(call); final String otherCallId = mCallIdMapper.getCallId(otherCall); if (callId != null && otherCallId != null && isServiceValid("conference")) { try { logOutgoing("confe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: conference File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
conference
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public List<RootTaskInfo> getAllRootTaskInfos() { return mActivityTaskManager.getAllRootTaskInfos(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllRootTaskInfos File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getAllRootTaskInfos
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void addArguments( String[] line ) { for ( int i = 0; i < line.length; i++ ) { createArgument().setValue( line[i] ); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addArguments File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
addArguments
src/main/java/org/codehaus/plexus/util/cli/Commandline.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
private void notifyAffiliatedProfileTransferOwnershipComplete(int callingUserId) { final Bundle extras = new Bundle(); extras.putParcelable(Intent.EXTRA_USER, UserHandle.of(callingUserId)); sendDeviceOwnerCommand( DeviceAdminReceiver.ACTION_AFFILIATED_PROFILE_TRANSFER_OWNERSHIP_C...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyAffiliatedProfileTransferOwnershipComplete File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
notifyAffiliatedProfileTransferOwnershipComplete
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void removeChannelListener(ChannelListener listener) { if (listener == null) { return; } ChannelListener.validateListener(listener); if (this.channelListeners.remove(listener)) { if (log.isTraceEnabled()) { log.trace("removeCh...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeChannelListener File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
removeChannelListener
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
public List<ValidationError> errors() { return Collections.unmodifiableList(errors); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: errors File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
errors
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
@Override public void moveToFront() { checkCaller(); // Will bring task to front if it already has a root activity. final long origId = Binder.clearCallingIdentity(); try { synchronized (this) { mStackSupervisor.startActivityFro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveToFront File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
moveToFront
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public final boolean dispatchGesture(@NonNull GestureDescription gesture, @Nullable GestureResultCallback callback, @Nullable Handler handler) { final IAccessibilityServiceConnection connection = AccessibilityInteractionClient.getInstance().getConnection( ...
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2016-3923 - Severity: MEDIUM - CVSS Score: 4.3 Description: Limit capabilities of a11y gesture dispatch. Changing the service side to accept descriptions of motion events, not motion events themselves, so we can control their creation. Bug: 30647115 Change-Id: ...
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
dispatchGesture
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
1
Analyze the following code function for security vulnerabilities
@PostMapping("/fileUpload") public String fileUpload(@RequestParam("file") MultipartFile file) throws JsonProcessingException { if (ConfigConstants.getFileUploadDisable()) { return new ObjectMapper().writeValueAsString(ReturnResponse.failure("文件传接口已禁用")); } // 获取文件名 Strin...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-36593 - Severity: MEDIUM - CVSS Score: 6.5 Description: Fix #370 Function: fileUpload File: server/src/main/java/cn/keking/web/controller/FileController.java Repository: kekingcn/kkFileView Fixed Code: @PostMapping("/fileUpload") public ReturnResponse<O...
[ "CWE-22" ]
CVE-2022-36593
MEDIUM
6.5
kekingcn/kkFileView
fileUpload
server/src/main/java/cn/keking/web/controller/FileController.java
86960e38135f551e8343d44caf4bac0a66234657
1
Analyze the following code function for security vulnerabilities
private boolean isValidEmail( final String value ) { return value != null && value.chars().filter( ch -> ch == '@' ).count() == 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidEmail File: modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java Repository: enonic/xp The code follows secure coding practices.
[ "CWE-384" ]
CVE-2024-23679
CRITICAL
9.8
enonic/xp
isValidEmail
modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java
0189975691e9e6407a9fee87006f730e84f734ff
0
Analyze the following code function for security vulnerabilities
public static String getHashType() { String hashType = UtilProperties.getPropertyValue("security", "password.encrypt.hash.type"); if (UtilValidate.isEmpty(hashType)) { Debug.logWarning("Password encrypt hash type is not specified in security.properties, use SHA", module); hashTy...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHashType File: framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java Repository: apache/ofbiz-framework The code follows secure coding practices.
[ "CWE-209" ]
CVE-2021-25958
MEDIUM
5
apache/ofbiz-framework
getHashType
framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java
2f5b8d33e32c4d9a48243cf9e503236acd5aec5c
0
Analyze the following code function for security vulnerabilities
static void copyClasspathResourceToFile(String classpath, File dir) { InputStream in = null; FileOutputStream fos = null; try { in = SearchServiceImpl.class.getResourceAsStream(classpath); File file = new File(dir, FilenameUtils.getName(classpath)); logger.debug("copying " + classpath + " ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyClasspathResourceToFile File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
copyClasspathResourceToFile
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
private static Getter<InputStream> fis(Getter<File> file) { return context -> { try { return new FileInputStream(file.get(context)); } catch (FileNotFoundException e) { return null; } }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fis File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
fis
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
@WebMethod(name="heapdump.hprof") public void doHeapDump(StaplerRequest req, StaplerResponse rsp) throws IOException, InterruptedException { owner.checkPermission(Jenkins.ADMINISTER); rsp.setContentType("application/octet-stream"); FilePath dump = obtain(); try {...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2014-2068 - Severity: LOW - CVSS Score: 3.5 Description: [FIXED SECURITY-73] Require RUN_SCRIPTS for /heapDump. Function: doHeapDump File: core/src/main/java/hudson/util/RemotingDiagnostics.java Repository: jenkinsci/jenkins Fixed Code: @WebMethod(name="heapdum...
[ "CWE-264" ]
CVE-2014-2068
LOW
3.5
jenkinsci/jenkins
doHeapDump
core/src/main/java/hudson/util/RemotingDiagnostics.java
0530a6645aac10fec005614211660e98db44b5eb
1
Analyze the following code function for security vulnerabilities
protected Connection getConnection() throws SQLException { try { return datasource.getConnection(); } catch (SQLException e) { LOGGER.log(Level.SEVERE, "Connection failed", e); throw e; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnection File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getConnection
modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
private void dumpJson(PrintWriter pw, DumpFilter filter) { JSONObject dump = new JSONObject(); try { dump.put("service", "Notification Manager"); dump.put("bans", mRankingHelper.dumpBansJson(filter)); dump.put("ranking", mRankingHelper.dumpJson(filter)); d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpJson File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
dumpJson
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private void updateProfileOffDeadlineNotificationLocked( int profileUserId, ActiveAdmin profileOwner, int notificationState) { if (notificationState == PROFILE_OFF_NOTIFICATION_NONE) { mInjector.getNotificationManager().cancel(SystemMessage.NOTE_PERSONAL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateProfileOffDeadlineNotificationLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
updateProfileOffDeadlineNotificationLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0