instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public static void copyFile(File source, File target, long sourceCount) {
if (!source.exists()) {
throw new IllegalArgumentException("Source does not exist " + source.getAbsolutePath());
}
if (!source.isFile()) {
throw new IllegalArgumentException("Source is not a file " ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyFile
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | copyFile | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public String getName() {
return internal.getName();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: src/net/sourceforge/plantuml/security/SFile.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | getName | src/net/sourceforge/plantuml/security/SFile.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | public void requestBugReport() {
enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport");
SystemProperties.set("ctl.start", "bugreport");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReport
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | requestBugReport | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | UriPermissionOwner getUriPermissionsLocked() {
if (uriPermissions == null) {
uriPermissions = new UriPermissionOwner(mAtmService.mUgmInternal, this);
}
return uriPermissions;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUriPermissionsLocked
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getUriPermissionsLocked | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void addConfigAttribute(ProfileAttribute configAttr) {
configAttrs.add(configAttr);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addConfigAttribute
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | addConfigAttribute | base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private PostgresClient postgresClientConnectionThrowsException() {
SQLConnection sqlConnection = new PostgreSQLConnectionImpl(null, null, null) {
@Override
public SQLConnection update(String sql, Handler<AsyncResult<UpdateResult>> resultHandler) {
throw new RuntimeException();
}
@Ov... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postgresClientConnectionThrowsException
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | postgresClientConnectionThrowsException | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateOomAdj() {
synchronized (ActivityManagerService.this) {
ActivityManagerService.this.updateOomAdjLocked(OomAdjuster.OOM_ADJ_REASON_NONE);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateOomAdj
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateOomAdj | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void finishReceiver(IBinder who, int resultCode, String resultData,
Bundle resultExtras, boolean resultAbort) {
if (DEBUG_BROADCAST) Slog.v(TAG, "Finish receiver: " + who);
// Refuse possible leaked file descriptors
if (resultExtras != null && resultExtras.hasFileDescriptors(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishReceiver
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | finishReceiver | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public static PdfObject getPdfObjectRelease(PdfObject obj, PdfObject parent) {
PdfObject obj2 = getPdfObject(obj, parent);
releaseLastXrefPartial(obj);
return obj2;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPdfObjectRelease
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getPdfObjectRelease | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | private Map<Long, ServiceReference<?>> filterReferencesByContextPath(
ServiceReference<?>[] references) {
Map<Long, ServiceReference<?>> matchedReferences = new HashMap<>();
for (ServiceReference<?> reference : references) {
if (reference.getUsingBundles().length ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: filterReferencesByContextPath
File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
Repository: vaadin/osgi
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-31407 | MEDIUM | 5 | vaadin/osgi | filterReferencesByContextPath | flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java | 3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8 | 0 |
Analyze the following code function for security vulnerabilities | private void notifyInterruptionFilterChanged(ManagedServiceInfo info,
int interruptionFilter) {
final INotificationListener listener = (INotificationListener) info.service;
try {
listener.onInterruptionFilterChanged(interruptionFilter);
} catch (Remote... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyInterruptionFilterChanged
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | notifyInterruptionFilterChanged | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mLock")
private void unloadUserLocked(int userId) {
if (DEBUG || DEBUG_REBOOT) {
Slog.d(TAG, "unloadUserLocked: user=" + userId);
}
// Cancel any ongoing background tasks.
getUserShortcutsLocked(userId).cancelAllInFlightTasks();
// Save all dirty info... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unloadUserLocked
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | unloadUserLocked | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setLocationPackagesProvider(PackagesProvider provider) {
synchronized (mPackages) {
mDefaultPermissionPolicy.setLocationPackagesProviderLPw(provider);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLocationPackagesProvider
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setLocationPackagesProvider | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void loginAndGotoPage(String username, String password, String pageURL)
{
loginAndGotoPage(username, password, pageURL, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loginAndGotoPage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | loginAndGotoPage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public String getImeiForSubscriber(int subId) {
PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(subId);
if (phoneSubInfoProxy != null) {
return phoneSubInfoProxy.getImei();
} else {
Rlog.e(TAG,"getDeviceId phoneSubInfoProxy is null" +
" for ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getImeiForSubscriber
File: src/java/com/android/internal/telephony/PhoneSubInfoController.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-0831 | MEDIUM | 4.3 | android | getImeiForSubscriber | src/java/com/android/internal/telephony/PhoneSubInfoController.java | 79eecef63f3ea99688333c19e22813f54d4a31b1 | 0 |
Analyze the following code function for security vulnerabilities | public void finishReceiver(IBinder who, int resultCode, String resultData, Bundle map,
boolean abortBroadcast, int flags) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.wr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishReceiver
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | finishReceiver | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int movePackage(final String packageName, final String volumeUuid) {
mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MOVE_PACKAGE, null);
final int moveId = mNextMoveId.getAndIncrement();
mHandler.post(new Runnable() {
@Override
p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: movePackage
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | movePackage | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private int peek() throws IOException {
return peek(0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: peek
File: src/main/org/hjson/HjsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | peek | src/main/org/hjson/HjsonParser.java | 00e3b1325cb6c2b80b347dbec9181fd17ce0a599 | 0 |
Analyze the following code function for security vulnerabilities | private void retryUploads(Intent intent, User user, List<String> requestedUploads) {
boolean onWifiOnly;
boolean whileChargingOnly;
OCUpload upload = intent.getParcelableExtra(KEY_RETRY_UPLOAD);
onWifiOnly = upload.isUseWifiOnly();
whileChargingOnly = upload.isWhileChargingOnly(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: retryUploads
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | retryUploads | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void waitOnHandlers() {
try {
Log.startSession("TSI.wOH");
enforceModifyPermission();
synchronized (mLock) {
long token = Binder.clearCallingIdentity();
try {
Log.i(this, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: waitOnHandlers
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | waitOnHandlers | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | void pendingAssistExtrasTimedOut(PendingAssistExtras pae) {
IResultReceiver receiver;
synchronized (this) {
mPendingAssistExtras.remove(pae);
receiver = pae.receiver;
}
if (receiver != null) {
// Caller wants result sent back to them.
try {... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pendingAssistExtrasTimedOut
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | pendingAssistExtrasTimedOut | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | int getConnectionState(BluetoothDevice device) {
enforceCallingOrSelfPermission(BLUETOOTH_PERM, "Need BLUETOOTH permission");
byte[] addr = Utils.getBytesFromAddress(device.getAddress());
return getConnectionStateNative(addr);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectionState
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | getConnectionState | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public List<X509Certificate> getCertificatesInLineage() {
return mCertificateLineage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCertificatesInLineage
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | getCertificatesInLineage | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | public ImportedFiles withCurrentDir(AParentFolder newCurrentDir) {
if (newCurrentDir == null) {
return this;
}
return new ImportedFiles(imported, newCurrentDir);
} | Vulnerability Classification:
- CWE: CWE-284
- CVE: CVE-2023-3431
- Severity: MEDIUM
- CVSS Score: 5.3
Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead
https://github.com/plantuml/plantuml-server/issues/232
Function: withCurrentDir
File: src/net/sourceforge/plantuml/preproc/Importe... | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | withCurrentDir | src/net/sourceforge/plantuml/preproc/ImportedFiles.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 1 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_LOCK_TASK, conditional = true)
public @LockTaskFeature int getLockTaskFeatures(@Nullable ComponentName admin) {
throwIfParentInstance("getLockTaskFeatures");
if (mService != null) {
try {
return mService.getLockTaskFeatures... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLockTaskFeatures
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getLockTaskFeatures | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public final String getClientId() {
return clientId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientId
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | getClientId | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | public void setEnabled(boolean enabled) {
this.enabled = enabled;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEnabled
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setEnabled | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | void startSetupActivityLocked() {
// Only do this once per boot.
if (mCheckedForSetup) {
return;
}
// We will show this screen if the current one is a different
// version than the last one shown, and we are not running in
// low-level factory test mode.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startSetupActivityLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | startSetupActivityLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void registerUserSwitchObserver(IUserSwitchObserver observer, String name) {
mUserController.registerUserSwitchObserver(observer, name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerUserSwitchObserver
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | registerUserSwitchObserver | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private UserReference userStringToUserReference(String userString)
{
// The user API is missing the concept of relative user references ATM so if we want to resolve (partial) user
// references that were stored in the database relative to this document then we need to check where the users
/... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: userStringToUserReference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | userStringToUserReference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public InputStream getInputStream(String prefix, String path, Map<String, ?> queryParams, Object... elements)
throws Exception
{
String cleanPrefix = prefix.endsWith("/") ? prefix.substring(0, prefix.length() - 1) : prefix;
if (path.startsWith(cleanPrefix)) {
cleanPrefix = "";
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInputStream
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getInputStream | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void afterPropertiesSet() {
applicationEventPublisher.registerListener();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: afterPropertiesSet
File: spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-384"
] | CVE-2019-10158 | HIGH | 7.5 | infinispan | afterPropertiesSet | spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java | f3efef8de7fec4108dd5ab725cea6ae09f14815d | 0 |
Analyze the following code function for security vulnerabilities | protected String checkoutFileOrImage(Cell cell) {
List<String> urls = new ArrayList<>();
for (String s : cell.asString().split(MVAL_SPLIT)) {
if (EasyUrl.isUrl(s) || s.startsWith("rb/")) urls.add(s);
}
return urls.isEmpty() ? null : JSON.toJSON(urls).toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkoutFileOrImage
File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | checkoutFileOrImage | src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | public int getProfileParent(int profileId) {
final long identity = Binder.clearCallingIdentity();
try {
UserInfo parent = mUserManager.getProfileParent(profileId);
if (parent != null) {
return parent.getUserHandle().getIdentifier();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProfileParent
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | getProfileParent | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public boolean blockBuildWhenDownstreamBuilding() {
return blockBuildWhenDownstreamBuilding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: blockBuildWhenDownstreamBuilding
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | blockBuildWhenDownstreamBuilding | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public long getMaximumSize() {
long pageCount = DatabaseUtils.longForQuery(this, "PRAGMA max_page_count;", null);
return pageCount * getPageSize();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaximumSize
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | getMaximumSize | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | String getPayload() {
return "";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPayload
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getPayload | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public BaseObject newObject(String className, XWikiContext context) throws XWikiException
{
return newXObject(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()),
context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | newObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long getPasswordExpiration(ComponentName who, int userHandle, boolean parent) {
if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) {
return 0L;
}
Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId");
final CallerIdentity caller... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPasswordExpiration
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getPasswordExpiration | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public static <BEAN> Grid<BEAN> withPropertySet(
PropertySet<BEAN> propertySet) {
return new Grid<>(propertySet);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withPropertySet
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | withPropertySet | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public int getData(String name) {
final Pattern p = Pattern.compile("(?i)<svg[^>]+" + name + "\\W+(\\d+)");
final Matcher m = p.matcher(svg);
if (m.find()) {
final String s = m.group(1);
return Integer.parseInt(s);
}
final Pattern p2 = Pattern.compile("viewBox[= \"\']+([0-9.]+)[\\s,]+([0-9.]+)[\\s,]+([0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getData
File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-1231 | MEDIUM | 4.3 | plantuml | getData | src/net/sourceforge/plantuml/ugraphic/UImageSvg.java | c9137be051ce98b3e3e27f65f54ec7d9f8886903 | 0 |
Analyze the following code function for security vulnerabilities | public void setTampered(boolean tampered) {
this.tampered = tampered;
pageRefs.keepPages();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTampered
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | setTampered | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public void setForceEphemeralUsers(
@NonNull ComponentName admin, boolean forceEphemeralUsers) {
throwIfParentInstance("setForceEphemeralUsers");
if (mService != null) {
try {
mService.setForceEphemeralUsers(admin, forceEphemeralUsers);
} catch (Remote... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setForceEphemeralUsers
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setForceEphemeralUsers | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private Matcher matchResultLine(String resultLine) {
return GIT_DIFF_TREE_PATTERN.matcher(resultLine);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: matchResultLine
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | matchResultLine | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | public boolean shouldDumpUid() {
return mDumpUid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldDumpUid
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | shouldDumpUid | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private void HEXLOG(byte[] block) {
int offset = 0;
int todo = block.length;
StringBuilder buf = new StringBuilder(64);
while (todo > 0) {
buf.append(String.format("%04x ", offset));
int numThisLine = (todo > 16) ? 16 : todo;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: HEXLOG
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | HEXLOG | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | public void ensureImmutableShortcutsNotIncluded(@NonNull List<ShortcutInfo> shortcuts,
boolean ignoreInvisible) {
for (int i = shortcuts.size() - 1; i >= 0; i--) {
ensureNotImmutable(shortcuts.get(i).getId(), ignoreInvisible);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ensureImmutableShortcutsNotIncluded
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | ensureImmutableShortcutsNotIncluded | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void printXMLElement(String name, Map<String, String> attributes)
{
handleSpaceWhenStartElement();
super.printXMLElement(name, attributes);
} | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-32070
- Severity: MEDIUM
- CVSS Score: 6.1
Description: XRENDERING-663: Restrict allowed attributes in HTML rendering
* Change HTML renderers to only print allowed attributes and elements.
* Add prefix to forbidden attributes to preserve them in XWiki syntax... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | printXMLElement | xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String convert(String url) throws DiffException
{
if (url.startsWith("data:")) {
// Already data URI.
return url;
}
String cachedDataURI = this.cache.get(url);
if (cachedDataURI == null) {
try {
cachedDataURI =... | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2023-48240
- Severity: HIGH
- CVSS Score: 8.8
Description: XWIKI-20818: Improve data URI converter
* Cache failures
* Properly dispose the caches
* Only send requests to trusted domains
* Only embed actual images
* Limit responses to 1MB
* Introduce configuratio... | [
"CWE-918"
] | CVE-2023-48240 | HIGH | 8.8 | xwiki/xwiki-platform | convert | xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java | bff0203e739b6e3eb90af5736f04278c73c2a8bb | 1 |
Analyze the following code function for security vulnerabilities | public boolean isBatteryLow() {
return level < LOW_BATTERY_THRESHOLD;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBatteryLow
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | isBatteryLow | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | private static void traverse(final Binder binder, final String p, final ConfigObject root) {
root.forEach((n, v) -> {
if (v instanceof ConfigObject) {
ConfigObject child = (ConfigObject) v;
String path = p + n;
Named named = Names.named(path);
binder.bind(Config.class).annotate... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: traverse
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | traverse | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isMod(Profile authUser) {
return authUser != null && (isAdmin(authUser) || User.Groups.MODS.toString().equals(authUser.getGroups()));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMod
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | isMod | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onCanceledViaNewOutgoingCallBroadcast(final Call call) {
mPendingCallsToDisconnect.add(call);
mHandler.postDelayed(new Runnable() {
@Override
public void run() {
if (mPendingCallsToDisconnect.remove(call)) {
Log.i(t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCanceledViaNewOutgoingCallBroadcast
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | onCanceledViaNewOutgoingCallBroadcast | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Unstable
public boolean isRestricted()
{
return getIntValue("restricted", 0) == 1;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRestricted
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-41046 | MEDIUM | 6.3 | xwiki/xwiki-platform | isRestricted | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java | edc52579eeaab1b4514785c134044671a1ecd839 | 0 |
Analyze the following code function for security vulnerabilities | Call getActiveCall() {
return getFirstCallWithState(CallState.ACTIVE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActiveCall
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getActiveCall | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getCharacterEncoding() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCharacterEncoding
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getCharacterEncoding | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | public static void init(HttpServletRequest request) throws Exception {
regionList.clear();
idStr = "";
table = "variantList";
Output.rvisPercentile = null;
query = request.getParameter("query").toUpperCase();
if (query.split("-").length == 4) {
idStr = query... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: src/main/java/model/Input.java
Repository: nickzren/alsdb
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-15021 | MEDIUM | 5.2 | nickzren/alsdb | init | src/main/java/model/Input.java | cbc79a68145e845f951113d184b4de207c341599 | 0 |
Analyze the following code function for security vulnerabilities | public static int hashCodeAscii(CharSequence bytes) {
final int length = bytes.length();
final int remainingBytes = length & 7;
int hash = HASH_CODE_ASCII_SEED;
// Benchmarking shows that by just naively looping for inputs 8~31 bytes long we incur a relatively large
// performanc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCodeAscii
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | hashCodeAscii | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | public static PackageManager getPackageManagerForUser(Context context, int userId) {
Context contextForUser = context;
// UserHandle defines special userId as negative values, e.g. USER_ALL
if (userId >= 0) {
try {
// Create a context for the correct user so if a pack... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageManagerForUser
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getPackageManagerForUser | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void writeToParcel(Parcel parcel, int flags) {
final boolean oldAllowFds = parcel.pushAllowFds(false);
try {
writeToParcelInner(parcel, flags);
} finally {
parcel.restoreAllowFds(oldAllowFds);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeToParcel
File: core/java/android/os/PersistableBundle.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40074 | MEDIUM | 5.5 | android | writeToParcel | core/java/android/os/PersistableBundle.java | 40e4ea759743737958dde018f3606d778f7a53f3 | 0 |
Analyze the following code function for security vulnerabilities | public String getTables() {
return mTables;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTables
File: core/java/android/database/sqlite/SQLiteQueryBuilder.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | getTables | core/java/android/database/sqlite/SQLiteQueryBuilder.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Enumeration<String> getParameterNames() {
return new Vector<String>().elements();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParameterNames
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getParameterNames | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | public static HttpRequest create(final String method, final String destination) {
return new HttpRequest()
.method(method.toUpperCase())
.set(destination);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | create | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUninstallBlocked(ComponentName who, String callerPackage, String packageName,
boolean uninstallBlocked) {
final CallerIdentity caller = getCallerIdentity(who, callerPackage);
if (isPolicyEngineForFinanceFlagEnabled()) {
EnforcingAdmin enforcingAdmin ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUninstallBlocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setUninstallBlocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dispatch(Tag tag) throws RemoteException {
NfcPermissions.enforceAdminPermissions(mContext);
mNfcDispatcher.dispatchTag(tag);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatch
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | dispatch | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<Collection> findAll(Context context, Integer limit, Integer offset) throws SQLException {
MetadataField nameField = metadataFieldService.findByElement(context, MetadataSchemaEnum.DC.getName(),
"title", null);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findAll
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | findAll | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | private SessionFactory injectCustomMappingsInSessionFactory(XWikiDocument doc, XWikiContext context)
throws XWikiException
{
// If we haven't turned of dynamic custom mappings we should not inject them
if (!context.getWiki().hasDynamicCustomMappings()) {
return getSessionFactory(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectCustomMappingsInSessionFactory
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practice... | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | injectCustomMappingsInSessionFactory | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | private void checkParams()
throws Exception
{
if (vi == null)
{
throw new Exception("no layers defined.");
}
if (vi.length > 1)
{
for (int i = 0; i < vi.length - 1; i++)
{
if (vi[i] >= vi[i + 1])
{
... | Vulnerability Classification:
- CWE: CWE-470
- CVE: CVE-2018-1000613
- Severity: HIGH
- CVSS Score: 7.5
Description: added additional checking to XMSS BDS tree parsing. Failures now mostly cause IOException
Function: checkParams
File: core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java
Repos... | [
"CWE-470"
] | CVE-2018-1000613 | HIGH | 7.5 | bcgit/bc-java | checkParams | core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java | 4092ede58da51af9a21e4825fbad0d9a3ef5a223 | 1 |
Analyze the following code function for security vulnerabilities | public static void copy(File from, File to) throws IOException {
checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to);
asByteSource(from).copyTo(asByteSink(to));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | copy | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | public boolean convertFromTranslucent(IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertFromTranslucent
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | convertFromTranslucent | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private String getStringValue(String x, Map<String, Object> map) {
Object obj = map.get(x);
if (obj == null)
return null;
String ret = null;
if (obj instanceof String[]) {
ret = ((String[]) obj)[0];
} else {
ret = obj.toString();
}
return (UtilMethods.isSet(ret)) ? ret : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStringValue
File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | getStringValue | src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | static DOMFragmentParser getDomParser()
throws SAXNotRecognizedException, SAXNotSupportedException {
DOMFragmentParser parser = new DOMFragmentParser();
parser.setProperty("http://cyberneko.org/html/properties/names/elems", "lower");
parser.setFeature("http://cyberneko.org/html/feat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDomParser
File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
Repository: nahsra/antisamy
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-28367 | MEDIUM | 4.3 | nahsra/antisamy | getDomParser | src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java | 0199e7e194dba5e7d7197703f43ebe22401e61ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public V next() {
if (!hasNext()) {
throw new NoSuchElementException();
}
if (previous != null) {
removalPrevious = previous;
}
previous = next;
calculateNext(next.next);
return previous... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: next
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | next | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void showInvalidChargerWarning() {
mInvalidCharger = true;
updateNotification();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showInvalidChargerWarning
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | showInvalidChargerWarning | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | public static void uploadUpdateFile(
Context context,
Account account,
OCFile existingFile,
Integer behaviour,
NameCollisionPolicy nameCollisionPolicy,
boolean disableRetries
) {
uploadUpdateFile(context, account, new OCFile[... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uploadUpdateFile
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | uploadUpdateFile | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean isPanelVisibleBecauseOfHeadsUp() {
return mHeadsUpManager.hasPinnedHeadsUp() || mHeadsUpAnimatingAway;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPanelVisibleBecauseOfHeadsUp
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | isPanelVisibleBecauseOfHeadsUp | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
void setVibrator(Vibrator vibrator) {
mVibrator = vibrator;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVibrator
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | setVibrator | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | private void updateSharedLibrariesLPw(PackageParser.Package pkg,
PackageParser.Package changingLib) throws PackageManagerException {
if (pkg.usesLibraries != null || pkg.usesOptionalLibraries != null) {
final ArraySet<String> usesLibraryFiles = new ArraySet<>();
int N = pkg.u... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSharedLibrariesLPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | updateSharedLibrariesLPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private static void buildAndValidateConstraint(Map.Entry<String, Map<String, ?>> constraint, String field,
Object actualValue, LinkedList<String> errors) {
if (constraint == null) {
return;
}
String consName = constraint.getKey();
Map<String, ?> vals = constraint.getValue();
if (vals == null) {
vals ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildAndValidateConstraint
File: para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java
Repository: Erudika/para
The code follows secure coding practices. | [
"CWE-840"
] | CVE-2022-1848 | MEDIUM | 4.3 | Erudika/para | buildAndValidateConstraint | para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java | fa677c629842df60099daa9c23bd802bc41b48d1 | 0 |
Analyze the following code function for security vulnerabilities | protected void updateParamsForAuth(String[] authNames, List<Pair> queryParams, Map<String, String> headerParams,
Map<String, String> cookieParams, String payload, String method, URI uri) throws ApiException {
for (String authName : authNames) {
Authentication auth = authen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateParamsForAuth
File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | updateParamsForAuth | samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected InboxUserNotificationEntity decorate(final SILVERMAILMessage notification) {
this.id = notification.getId();
this.source = notification.getSource();
this.subject = notification.getSubject();
this.senderName = notification.getSenderName();
this.date = toLocalDate(notification.getDate()).toS... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-47324
- Severity: MEDIUM
- CVSS Score: 5.4
Description: Bug #13811: fixing stored XSS leading to full account takeover
* making HTML sanitize processing accessible for JSTL instructions
* sanitizing user notification title and contents on registering
* sanit... | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | decorate | core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java | 9a55728729a3b431847045c674b3e883507d1e1a | 1 |
Analyze the following code function for security vulnerabilities | public void setWebhookUrl(@Nullable URI webhookUrl) {
this.webhookUrl = webhookUrl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWebhookUrl
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setWebhookUrl | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | private void ensureXrefSize(int size) {
if (size == 0)
return;
if (xref == null)
xref = new int[size];
else {
if (xref.length < size) {
int xref2[] = new int[size];
System.arraycopy(xref, 0, xref2, 0, xref.length);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ensureXrefSize
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | ensureXrefSize | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PlayRequest playAsync() {
final PlayRequest out = new PlayRequest();
out.ready(new SuccessCallback<AsyncMedia>() {
@Override
public void onSucess(AsyncMedia value) {
if (out == pendingPlayRequest) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: playAsync
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | playAsync | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isOpen() {
return open;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOpen
File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | isOpen | src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getName() {
return "MSBib";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java
Repository: JabRef/jabref
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000652 | HIGH | 7.5 | JabRef/jabref | getName | src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java | 89f855d76713b4cd25ac0830c719cd61c511851e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public abstract void sendNonza(Nonza element) throws NotConnectedException, InterruptedException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendNonza
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | sendNonza | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public String getFormat()
{
return this.doc.getFormat();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFormat
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getFormat | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M2")
public List<String> getChildren(XWikiContext context) throws XWikiException
{
return getChildren(0, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getChildren
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getChildren | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isConcurrentVoiceAndDataAllowed() {
return (mSS.getRilVoiceRadioTechnology() >= ServiceState.RIL_RADIO_TECHNOLOGY_UMTS);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isConcurrentVoiceAndDataAllowed
File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | isConcurrentVoiceAndDataAllowed | src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping(value = "/{studyOID}/submission", method = RequestMethod.POST)
public ResponseEntity<String> doSubmission(HttpServletRequest request, HttpServletResponse response,
@PathVariable("studyOID") String studyOID, @RequestParam(FORM_CONTEXT) String ecid) {
logger.info("Processing xform... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doSubmission
File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | doSubmission | web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void renameAccount(
IAccountManagerResponse response, Account accountToRename, String newName) {
final int callingUid = Binder.getCallingUid();
if (Log.isLoggable(TAG, Log.VERBOSE)) {
Log.v(TAG, "renameAccount: " + accountToRename + " -> " + newName
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: renameAccount
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | renameAccount | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public View.People getPeople() {
return new View.People(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPeople
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getPeople | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void unregisterPhoneAccount(PhoneAccountHandle accountHandle) {
synchronized (mLock) {
try {
Log.startSession("TSI.uPA");
enforcePhoneAccountModificationForPackage(
accountHandle.getComponentName().g... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterPhoneAccount
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | unregisterPhoneAccount | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | public final void installSystemProviders() {
List<ProviderInfo> providers;
synchronized (this) {
ProcessRecord app = mProcessNames.get("system", Process.SYSTEM_UID);
providers = generateApplicationProvidersLocked(app);
if (providers != null) {
for (int... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installSystemProviders
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | installSystemProviders | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | protected Object createDiscordNotification(InstanceEvent event, Instance instance) {
Map<String, Object> body = new HashMap<>();
body.put("content", createContent(event, instance));
body.put("tts", tts);
if (avatarUrl != null) {
body.put("avatar_url", avatarUrl);
}
if (username != null) {
body.put("u... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDiscordNotification
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | createDiscordNotification | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getPreferredOptionsPanelGravity() {
synchronized (mWindowMap) {
final int rotation = getRotation();
// TODO(multidisplay): Assume that such devices physical keys are on the main screen.
final DisplayContent displayContent = getDefaultDisplayContentLo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPreferredOptionsPanelGravity
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | getPreferredOptionsPanelGravity | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void setBackEndSorting(List<QuerySortOrder> sortOrder,
boolean immediateReset) {
backEndSorting.clear();
backEndSorting.addAll(sortOrder);
if (immediateReset) {
reset();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBackEndSorting
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | setBackEndSorting | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean equal(File file1, File file2) throws IOException {
checkNotNull(file1);
checkNotNull(file2);
if (file1 == file2 || file1.equals(file2)) {
return true;
}
/*
* Some operating systems may return zero as the length for files denoting system-dependent
* entities suc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equal
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | equal | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | @GetMapping("/update/current-by-resource/{resourceId}")
public void updateCurrentUserByResourceId(@PathVariable String resourceId) {
baseUserService.updateCurrentUserByResourceId(resourceId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateCurrentUserByResourceId
File: framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-38494 | HIGH | 7.5 | metersphere | updateCurrentUserByResourceId | framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java | a23f75d93b666901fd148d834df9384f6f24cf28 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.