instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static void copyFile(File source, File target, long sourceCount) { if (!source.exists()) { throw new IllegalArgumentException("Source does not exist " + source.getAbsolutePath()); } if (!source.isFile()) { throw new IllegalArgumentException("Source is not a file " ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyFile File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
copyFile
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public String getName() { return internal.getName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getName
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void requestBugReport() { enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport"); SystemProperties.set("ctl.start", "bugreport"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
UriPermissionOwner getUriPermissionsLocked() { if (uriPermissions == null) { uriPermissions = new UriPermissionOwner(mAtmService.mUgmInternal, this); } return uriPermissions; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUriPermissionsLocked File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getUriPermissionsLocked
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void addConfigAttribute(ProfileAttribute configAttr) { configAttrs.add(configAttr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addConfigAttribute File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
addConfigAttribute
base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private PostgresClient postgresClientConnectionThrowsException() { SQLConnection sqlConnection = new PostgreSQLConnectionImpl(null, null, null) { @Override public SQLConnection update(String sql, Handler<AsyncResult<UpdateResult>> resultHandler) { throw new RuntimeException(); } @Ov...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postgresClientConnectionThrowsException File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
postgresClientConnectionThrowsException
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public void updateOomAdj() { synchronized (ActivityManagerService.this) { ActivityManagerService.this.updateOomAdjLocked(OomAdjuster.OOM_ADJ_REASON_NONE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOomAdj File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateOomAdj
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void finishReceiver(IBinder who, int resultCode, String resultData, Bundle resultExtras, boolean resultAbort) { if (DEBUG_BROADCAST) Slog.v(TAG, "Finish receiver: " + who); // Refuse possible leaked file descriptors if (resultExtras != null && resultExtras.hasFileDescriptors(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishReceiver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
finishReceiver
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public static PdfObject getPdfObjectRelease(PdfObject obj, PdfObject parent) { PdfObject obj2 = getPdfObject(obj, parent); releaseLastXrefPartial(obj); return obj2; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPdfObjectRelease File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
getPdfObjectRelease
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
private Map<Long, ServiceReference<?>> filterReferencesByContextPath( ServiceReference<?>[] references) { Map<Long, ServiceReference<?>> matchedReferences = new HashMap<>(); for (ServiceReference<?> reference : references) { if (reference.getUsingBundles().length ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterReferencesByContextPath File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java Repository: vaadin/osgi The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-31407
MEDIUM
5
vaadin/osgi
filterReferencesByContextPath
flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8
0
Analyze the following code function for security vulnerabilities
private void notifyInterruptionFilterChanged(ManagedServiceInfo info, int interruptionFilter) { final INotificationListener listener = (INotificationListener) info.service; try { listener.onInterruptionFilterChanged(interruptionFilter); } catch (Remote...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyInterruptionFilterChanged File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
notifyInterruptionFilterChanged
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mLock") private void unloadUserLocked(int userId) { if (DEBUG || DEBUG_REBOOT) { Slog.d(TAG, "unloadUserLocked: user=" + userId); } // Cancel any ongoing background tasks. getUserShortcutsLocked(userId).cancelAllInFlightTasks(); // Save all dirty info...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unloadUserLocked File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
unloadUserLocked
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public void setLocationPackagesProvider(PackagesProvider provider) { synchronized (mPackages) { mDefaultPermissionPolicy.setLocationPackagesProviderLPw(provider); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLocationPackagesProvider File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setLocationPackagesProvider
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void loginAndGotoPage(String username, String password, String pageURL) { loginAndGotoPage(username, password, pageURL, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loginAndGotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
loginAndGotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public String getImeiForSubscriber(int subId) { PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(subId); if (phoneSubInfoProxy != null) { return phoneSubInfoProxy.getImei(); } else { Rlog.e(TAG,"getDeviceId phoneSubInfoProxy is null" + " for ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImeiForSubscriber File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getImeiForSubscriber
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
public void finishReceiver(IBinder who, int resultCode, String resultData, Bundle map, boolean abortBroadcast, int flags) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.wr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishReceiver File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
finishReceiver
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public int movePackage(final String packageName, final String volumeUuid) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MOVE_PACKAGE, null); final int moveId = mNextMoveId.getAndIncrement(); mHandler.post(new Runnable() { @Override p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: movePackage File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
movePackage
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private int peek() throws IOException { return peek(0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: peek File: src/main/org/hjson/HjsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
peek
src/main/org/hjson/HjsonParser.java
00e3b1325cb6c2b80b347dbec9181fd17ce0a599
0
Analyze the following code function for security vulnerabilities
private void retryUploads(Intent intent, User user, List<String> requestedUploads) { boolean onWifiOnly; boolean whileChargingOnly; OCUpload upload = intent.getParcelableExtra(KEY_RETRY_UPLOAD); onWifiOnly = upload.isUseWifiOnly(); whileChargingOnly = upload.isWhileChargingOnly(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retryUploads File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
retryUploads
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@Override public void waitOnHandlers() { try { Log.startSession("TSI.wOH"); enforceModifyPermission(); synchronized (mLock) { long token = Binder.clearCallingIdentity(); try { Log.i(this, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: waitOnHandlers File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
waitOnHandlers
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
void pendingAssistExtrasTimedOut(PendingAssistExtras pae) { IResultReceiver receiver; synchronized (this) { mPendingAssistExtras.remove(pae); receiver = pae.receiver; } if (receiver != null) { // Caller wants result sent back to them. try {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pendingAssistExtrasTimedOut File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
pendingAssistExtrasTimedOut
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
int getConnectionState(BluetoothDevice device) { enforceCallingOrSelfPermission(BLUETOOTH_PERM, "Need BLUETOOTH permission"); byte[] addr = Utils.getBytesFromAddress(device.getAddress()); return getConnectionStateNative(addr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectionState File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
getConnectionState
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public List<X509Certificate> getCertificatesInLineage() { return mCertificateLineage; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCertificatesInLineage File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getCertificatesInLineage
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public ImportedFiles withCurrentDir(AParentFolder newCurrentDir) { if (newCurrentDir == null) { return this; } return new ImportedFiles(imported, newCurrentDir); }
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-3431 - Severity: MEDIUM - CVSS Score: 5.3 Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead https://github.com/plantuml/plantuml-server/issues/232 Function: withCurrentDir File: src/net/sourceforge/plantuml/preproc/Importe...
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
withCurrentDir
src/net/sourceforge/plantuml/preproc/ImportedFiles.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
1
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_LOCK_TASK, conditional = true) public @LockTaskFeature int getLockTaskFeatures(@Nullable ComponentName admin) { throwIfParentInstance("getLockTaskFeatures"); if (mService != null) { try { return mService.getLockTaskFeatures...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockTaskFeatures File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getLockTaskFeatures
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public final String getClientId() { return clientId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientId File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
getClientId
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
public void setEnabled(boolean enabled) { this.enabled = enabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEnabled File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setEnabled
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
void startSetupActivityLocked() { // Only do this once per boot. if (mCheckedForSetup) { return; } // We will show this screen if the current one is a different // version than the last one shown, and we are not running in // low-level factory test mode. ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startSetupActivityLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
startSetupActivityLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public void registerUserSwitchObserver(IUserSwitchObserver observer, String name) { mUserController.registerUserSwitchObserver(observer, name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerUserSwitchObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
registerUserSwitchObserver
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private UserReference userStringToUserReference(String userString) { // The user API is missing the concept of relative user references ATM so if we want to resolve (partial) user // references that were stored in the database relative to this document then we need to check where the users /...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userStringToUserReference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
userStringToUserReference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public InputStream getInputStream(String prefix, String path, Map<String, ?> queryParams, Object... elements) throws Exception { String cleanPrefix = prefix.endsWith("/") ? prefix.substring(0, prefix.length() - 1) : prefix; if (path.startsWith(cleanPrefix)) { cleanPrefix = ""; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputStream File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getInputStream
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public void afterPropertiesSet() { applicationEventPublisher.registerListener(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: afterPropertiesSet File: spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java Repository: infinispan The code follows secure coding practices.
[ "CWE-384" ]
CVE-2019-10158
HIGH
7.5
infinispan
afterPropertiesSet
spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java
f3efef8de7fec4108dd5ab725cea6ae09f14815d
0
Analyze the following code function for security vulnerabilities
protected String checkoutFileOrImage(Cell cell) { List<String> urls = new ArrayList<>(); for (String s : cell.asString().split(MVAL_SPLIT)) { if (EasyUrl.isUrl(s) || s.startsWith("rb/")) urls.add(s); } return urls.isEmpty() ? null : JSON.toJSON(urls).toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkoutFileOrImage File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
checkoutFileOrImage
src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
public int getProfileParent(int profileId) { final long identity = Binder.clearCallingIdentity(); try { UserInfo parent = mUserManager.getProfileParent(profileId); if (parent != null) { return parent.getUserHandle().getIdentifier(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileParent File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getProfileParent
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public boolean blockBuildWhenDownstreamBuilding() { return blockBuildWhenDownstreamBuilding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: blockBuildWhenDownstreamBuilding File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
blockBuildWhenDownstreamBuilding
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public long getMaximumSize() { long pageCount = DatabaseUtils.longForQuery(this, "PRAGMA max_page_count;", null); return pageCount * getPageSize(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumSize File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
getMaximumSize
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
String getPayload() { return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPayload File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getPayload
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public BaseObject newObject(String className, XWikiContext context) throws XWikiException { return newXObject( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
newObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public long getPasswordExpiration(ComponentName who, int userHandle, boolean parent) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return 0L; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordExpiration File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPasswordExpiration
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public static <BEAN> Grid<BEAN> withPropertySet( PropertySet<BEAN> propertySet) { return new Grid<>(propertySet); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPropertySet File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
withPropertySet
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public int getData(String name) { final Pattern p = Pattern.compile("(?i)<svg[^>]+" + name + "\\W+(\\d+)"); final Matcher m = p.matcher(svg); if (m.find()) { final String s = m.group(1); return Integer.parseInt(s); } final Pattern p2 = Pattern.compile("viewBox[= \"\']+([0-9.]+)[\\s,]+([0-9.]+)[\\s,]+([0...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getData File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java Repository: plantuml The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-1231
MEDIUM
4.3
plantuml
getData
src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
c9137be051ce98b3e3e27f65f54ec7d9f8886903
0
Analyze the following code function for security vulnerabilities
public void setTampered(boolean tampered) { this.tampered = tampered; pageRefs.keepPages(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTampered File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
setTampered
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public void setForceEphemeralUsers( @NonNull ComponentName admin, boolean forceEphemeralUsers) { throwIfParentInstance("setForceEphemeralUsers"); if (mService != null) { try { mService.setForceEphemeralUsers(admin, forceEphemeralUsers); } catch (Remote...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setForceEphemeralUsers File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setForceEphemeralUsers
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private Matcher matchResultLine(String resultLine) { return GIT_DIFF_TREE_PATTERN.matcher(resultLine); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: matchResultLine File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
matchResultLine
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public boolean shouldDumpUid() { return mDumpUid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDumpUid File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
shouldDumpUid
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void HEXLOG(byte[] block) { int offset = 0; int todo = block.length; StringBuilder buf = new StringBuilder(64); while (todo > 0) { buf.append(String.format("%04x ", offset)); int numThisLine = (todo > 16) ? 16 : todo; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: HEXLOG File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
HEXLOG
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
public void ensureImmutableShortcutsNotIncluded(@NonNull List<ShortcutInfo> shortcuts, boolean ignoreInvisible) { for (int i = shortcuts.size() - 1; i >= 0; i--) { ensureNotImmutable(shortcuts.get(i).getId(), ignoreInvisible); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureImmutableShortcutsNotIncluded File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
ensureImmutableShortcutsNotIncluded
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
@Override public void printXMLElement(String name, Map<String, String> attributes) { handleSpaceWhenStartElement(); super.printXMLElement(name, attributes); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-32070 - Severity: MEDIUM - CVSS Score: 6.1 Description: XRENDERING-663: Restrict allowed attributes in HTML rendering * Change HTML renderers to only print allowed attributes and elements. * Add prefix to forbidden attributes to preserve them in XWiki syntax...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
printXMLElement
xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
1
Analyze the following code function for security vulnerabilities
@Override public String convert(String url) throws DiffException { if (url.startsWith("data:")) { // Already data URI. return url; } String cachedDataURI = this.cache.get(url); if (cachedDataURI == null) { try { cachedDataURI =...
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2023-48240 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20818: Improve data URI converter * Cache failures * Properly dispose the caches * Only send requests to trusted domains * Only embed actual images * Limit responses to 1MB * Introduce configuratio...
[ "CWE-918" ]
CVE-2023-48240
HIGH
8.8
xwiki/xwiki-platform
convert
xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java
bff0203e739b6e3eb90af5736f04278c73c2a8bb
1
Analyze the following code function for security vulnerabilities
public boolean isBatteryLow() { return level < LOW_BATTERY_THRESHOLD; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBatteryLow File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
isBatteryLow
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private static void traverse(final Binder binder, final String p, final ConfigObject root) { root.forEach((n, v) -> { if (v instanceof ConfigObject) { ConfigObject child = (ConfigObject) v; String path = p + n; Named named = Names.named(path); binder.bind(Config.class).annotate...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: traverse File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
traverse
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public boolean isMod(Profile authUser) { return authUser != null && (isAdmin(authUser) || User.Groups.MODS.toString().equals(authUser.getGroups())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMod File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isMod
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
@Override public boolean onCanceledViaNewOutgoingCallBroadcast(final Call call) { mPendingCallsToDisconnect.add(call); mHandler.postDelayed(new Runnable() { @Override public void run() { if (mPendingCallsToDisconnect.remove(call)) { Log.i(t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCanceledViaNewOutgoingCallBroadcast File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
onCanceledViaNewOutgoingCallBroadcast
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Unstable public boolean isRestricted() { return getIntValue("restricted", 0) == 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRestricted File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
isRestricted
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
Call getActiveCall() { return getFirstCallWithState(CallState.ACTIVE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getActiveCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Override public String getCharacterEncoding() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharacterEncoding File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getCharacterEncoding
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public static void init(HttpServletRequest request) throws Exception { regionList.clear(); idStr = ""; table = "variantList"; Output.rvisPercentile = null; query = request.getParameter("query").toUpperCase(); if (query.split("-").length == 4) { idStr = query...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: src/main/java/model/Input.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
init
src/main/java/model/Input.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
public static int hashCodeAscii(CharSequence bytes) { final int length = bytes.length(); final int remainingBytes = length & 7; int hash = HASH_CODE_ASCII_SEED; // Benchmarking shows that by just naively looping for inputs 8~31 bytes long we incur a relatively large // performanc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCodeAscii File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
hashCodeAscii
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public static PackageManager getPackageManagerForUser(Context context, int userId) { Context contextForUser = context; // UserHandle defines special userId as negative values, e.g. USER_ALL if (userId >= 0) { try { // Create a context for the correct user so if a pack...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageManagerForUser File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getPackageManagerForUser
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void writeToParcel(Parcel parcel, int flags) { final boolean oldAllowFds = parcel.pushAllowFds(false); try { writeToParcelInner(parcel, flags); } finally { parcel.restoreAllowFds(oldAllowFds); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeToParcel File: core/java/android/os/PersistableBundle.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40074
MEDIUM
5.5
android
writeToParcel
core/java/android/os/PersistableBundle.java
40e4ea759743737958dde018f3606d778f7a53f3
0
Analyze the following code function for security vulnerabilities
public String getTables() { return mTables; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTables File: core/java/android/database/sqlite/SQLiteQueryBuilder.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
getTables
core/java/android/database/sqlite/SQLiteQueryBuilder.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override public Enumeration<String> getParameterNames() { return new Vector<String>().elements(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParameterNames File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getParameterNames
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public static HttpRequest create(final String method, final String destination) { return new HttpRequest() .method(method.toUpperCase()) .set(destination); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
create
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
@Override public void setUninstallBlocked(ComponentName who, String callerPackage, String packageName, boolean uninstallBlocked) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); if (isPolicyEngineForFinanceFlagEnabled()) { EnforcingAdmin enforcingAdmin ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUninstallBlocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setUninstallBlocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void dispatch(Tag tag) throws RemoteException { NfcPermissions.enforceAdminPermissions(mContext); mNfcDispatcher.dispatchTag(tag); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatch File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
dispatch
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Override public List<Collection> findAll(Context context, Integer limit, Integer offset) throws SQLException { MetadataField nameField = metadataFieldService.findByElement(context, MetadataSchemaEnum.DC.getName(), "title", null); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAll File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
findAll
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private SessionFactory injectCustomMappingsInSessionFactory(XWikiDocument doc, XWikiContext context) throws XWikiException { // If we haven't turned of dynamic custom mappings we should not inject them if (!context.getWiki().hasDynamicCustomMappings()) { return getSessionFactory(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectCustomMappingsInSessionFactory File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practice...
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
injectCustomMappingsInSessionFactory
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private void checkParams() throws Exception { if (vi == null) { throw new Exception("no layers defined."); } if (vi.length > 1) { for (int i = 0; i < vi.length - 1; i++) { if (vi[i] >= vi[i + 1]) { ...
Vulnerability Classification: - CWE: CWE-470 - CVE: CVE-2018-1000613 - Severity: HIGH - CVSS Score: 7.5 Description: added additional checking to XMSS BDS tree parsing. Failures now mostly cause IOException Function: checkParams File: core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java Repos...
[ "CWE-470" ]
CVE-2018-1000613
HIGH
7.5
bcgit/bc-java
checkParams
core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java
4092ede58da51af9a21e4825fbad0d9a3ef5a223
1
Analyze the following code function for security vulnerabilities
public static void copy(File from, File to) throws IOException { checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to); asByteSource(from).copyTo(asByteSink(to)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
copy
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public boolean convertFromTranslucent(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertFromTranslucent File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
convertFromTranslucent
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private String getStringValue(String x, Map<String, Object> map) { Object obj = map.get(x); if (obj == null) return null; String ret = null; if (obj instanceof String[]) { ret = ((String[]) obj)[0]; } else { ret = obj.toString(); } return (UtilMethods.isSet(ret)) ? ret : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStringValue File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
getStringValue
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
static DOMFragmentParser getDomParser() throws SAXNotRecognizedException, SAXNotSupportedException { DOMFragmentParser parser = new DOMFragmentParser(); parser.setProperty("http://cyberneko.org/html/properties/names/elems", "lower"); parser.setFeature("http://cyberneko.org/html/feat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDomParser File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-28367
MEDIUM
4.3
nahsra/antisamy
getDomParser
src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
0199e7e194dba5e7d7197703f43ebe22401e61ae
0
Analyze the following code function for security vulnerabilities
@Override public V next() { if (!hasNext()) { throw new NoSuchElementException(); } if (previous != null) { removalPrevious = previous; } previous = next; calculateNext(next.next); return previous...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: next File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
next
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public void showInvalidChargerWarning() { mInvalidCharger = true; updateNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showInvalidChargerWarning File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
showInvalidChargerWarning
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
public static void uploadUpdateFile( Context context, Account account, OCFile existingFile, Integer behaviour, NameCollisionPolicy nameCollisionPolicy, boolean disableRetries ) { uploadUpdateFile(context, account, new OCFile[...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uploadUpdateFile File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
uploadUpdateFile
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isPanelVisibleBecauseOfHeadsUp() { return mHeadsUpManager.hasPinnedHeadsUp() || mHeadsUpAnimatingAway; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPanelVisibleBecauseOfHeadsUp File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isPanelVisibleBecauseOfHeadsUp
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void setVibrator(Vibrator vibrator) { mVibrator = vibrator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVibrator File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
setVibrator
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private void updateSharedLibrariesLPw(PackageParser.Package pkg, PackageParser.Package changingLib) throws PackageManagerException { if (pkg.usesLibraries != null || pkg.usesOptionalLibraries != null) { final ArraySet<String> usesLibraryFiles = new ArraySet<>(); int N = pkg.u...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSharedLibrariesLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
updateSharedLibrariesLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private static void buildAndValidateConstraint(Map.Entry<String, Map<String, ?>> constraint, String field, Object actualValue, LinkedList<String> errors) { if (constraint == null) { return; } String consName = constraint.getKey(); Map<String, ?> vals = constraint.getValue(); if (vals == null) { vals ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildAndValidateConstraint File: para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java Repository: Erudika/para The code follows secure coding practices.
[ "CWE-840" ]
CVE-2022-1848
MEDIUM
4.3
Erudika/para
buildAndValidateConstraint
para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java
fa677c629842df60099daa9c23bd802bc41b48d1
0
Analyze the following code function for security vulnerabilities
protected void updateParamsForAuth(String[] authNames, List<Pair> queryParams, Map<String, String> headerParams, Map<String, String> cookieParams, String payload, String method, URI uri) throws ApiException { for (String authName : authNames) { Authentication auth = authen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateParamsForAuth File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateParamsForAuth
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected InboxUserNotificationEntity decorate(final SILVERMAILMessage notification) { this.id = notification.getId(); this.source = notification.getSource(); this.subject = notification.getSubject(); this.senderName = notification.getSenderName(); this.date = toLocalDate(notification.getDate()).toS...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-47324 - Severity: MEDIUM - CVSS Score: 5.4 Description: Bug #13811: fixing stored XSS leading to full account takeover * making HTML sanitize processing accessible for JSTL instructions * sanitizing user notification title and contents on registering * sanit...
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
decorate
core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java
9a55728729a3b431847045c674b3e883507d1e1a
1
Analyze the following code function for security vulnerabilities
public void setWebhookUrl(@Nullable URI webhookUrl) { this.webhookUrl = webhookUrl; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWebhookUrl File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setWebhookUrl
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
private void ensureXrefSize(int size) { if (size == 0) return; if (xref == null) xref = new int[size]; else { if (xref.length < size) { int xref2[] = new int[size]; System.arraycopy(xref, 0, xref2, 0, xref.length); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureXrefSize File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
ensureXrefSize
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public PlayRequest playAsync() { final PlayRequest out = new PlayRequest(); out.ready(new SuccessCallback<AsyncMedia>() { @Override public void onSucess(AsyncMedia value) { if (out == pendingPlayRequest) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: playAsync File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
playAsync
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public boolean isOpen() { return open; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOpen File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
isOpen
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
@Override public String getName() { return "MSBib"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java Repository: JabRef/jabref The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000652
HIGH
7.5
JabRef/jabref
getName
src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java
89f855d76713b4cd25ac0830c719cd61c511851e
0
Analyze the following code function for security vulnerabilities
@Override public abstract void sendNonza(Nonza element) throws NotConnectedException, InterruptedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendNonza File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendNonza
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public String getFormat() { return this.doc.getFormat(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFormat File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getFormat
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M2") public List<String> getChildren(XWikiContext context) throws XWikiException { return getChildren(0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildren File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getChildren
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public boolean isConcurrentVoiceAndDataAllowed() { return (mSS.getRilVoiceRadioTechnology() >= ServiceState.RIL_RADIO_TECHNOLOGY_UMTS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConcurrentVoiceAndDataAllowed File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
isConcurrentVoiceAndDataAllowed
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = "/{studyOID}/submission", method = RequestMethod.POST) public ResponseEntity<String> doSubmission(HttpServletRequest request, HttpServletResponse response, @PathVariable("studyOID") String studyOID, @RequestParam(FORM_CONTEXT) String ecid) { logger.info("Processing xform...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doSubmission File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
doSubmission
web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
@Override public void renameAccount( IAccountManagerResponse response, Account accountToRename, String newName) { final int callingUid = Binder.getCallingUid(); if (Log.isLoggable(TAG, Log.VERBOSE)) { Log.v(TAG, "renameAccount: " + accountToRename + " -> " + newName ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameAccount File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
renameAccount
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public View.People getPeople() { return new View.People(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPeople File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getPeople
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public void unregisterPhoneAccount(PhoneAccountHandle accountHandle) { synchronized (mLock) { try { Log.startSession("TSI.uPA"); enforcePhoneAccountModificationForPackage( accountHandle.getComponentName().g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterPhoneAccount File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
unregisterPhoneAccount
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public final void installSystemProviders() { List<ProviderInfo> providers; synchronized (this) { ProcessRecord app = mProcessNames.get("system", Process.SYSTEM_UID); providers = generateApplicationProvidersLocked(app); if (providers != null) { for (int...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installSystemProviders File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
installSystemProviders
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
protected Object createDiscordNotification(InstanceEvent event, Instance instance) { Map<String, Object> body = new HashMap<>(); body.put("content", createContent(event, instance)); body.put("tts", tts); if (avatarUrl != null) { body.put("avatar_url", avatarUrl); } if (username != null) { body.put("u...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDiscordNotification File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
createDiscordNotification
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public int getPreferredOptionsPanelGravity() { synchronized (mWindowMap) { final int rotation = getRotation(); // TODO(multidisplay): Assume that such devices physical keys are on the main screen. final DisplayContent displayContent = getDefaultDisplayContentLo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredOptionsPanelGravity File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getPreferredOptionsPanelGravity
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public void setBackEndSorting(List<QuerySortOrder> sortOrder, boolean immediateReset) { backEndSorting.clear(); backEndSorting.addAll(sortOrder); if (immediateReset) { reset(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBackEndSorting File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
setBackEndSorting
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
public static boolean equal(File file1, File file2) throws IOException { checkNotNull(file1); checkNotNull(file2); if (file1 == file2 || file1.equals(file2)) { return true; } /* * Some operating systems may return zero as the length for files denoting system-dependent * entities suc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equal File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
equal
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@GetMapping("/update/current-by-resource/{resourceId}") public void updateCurrentUserByResourceId(@PathVariable String resourceId) { baseUserService.updateCurrentUserByResourceId(resourceId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateCurrentUserByResourceId File: framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java Repository: metersphere The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-38494
HIGH
7.5
metersphere
updateCurrentUserByResourceId
framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java
a23f75d93b666901fd148d834df9384f6f24cf28
0