instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void dismissInvalidChargerNotification() { if (mInvalidCharger) Slog.i(TAG, "dismissing invalid charger notification"); mInvalidCharger = false; updateNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissInvalidChargerNotification File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
dismissInvalidChargerNotification
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public static boolean shouldDirBeHidden(@NonNull File file) { if (isDirectoryHidden(file)) { return true; } File parent = file.getParentFile(); while (parent != null) { if (isDirectoryHidden(parent)) { return true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDirBeHidden File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
shouldDirBeHidden
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public static File getRunningDestinationDirectory(Context context, int destination) throws IOException { return getDestinationDirectory(context, destination, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRunningDestinationDirectory File: src/com/android/providers/downloads/Helpers.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
getRunningDestinationDirectory
src/com/android/providers/downloads/Helpers.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
private void saveInstanceState(Bundle outState) { NewsReaderDetailFragment ndf = getNewsReaderDetailFragment(); if (ndf != null) { outState.putLong(OPTIONAL_FOLDER_ID, ndf.getIdFolder()); outState.putBoolean(IS_FOLDER_BOOLEAN, ndf.getIdFeed() == null); outState.putLong(ID_FEED_STRING, ndf.getIdFeed() != nu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveInstanceState File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
saveInstanceState
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
public void setToBigInteger(BigInteger n) { setBcdToZero(); flags = 0; if (n.signum() == -1) { flags |= NEGATIVE_FLAG; n = n.negate(); } if (n.signum() != 0) { _setToBigInteger(n); compact(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setToBigInteger File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
setToBigInteger
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
@Override public QueryManager getQueryManager() { return this.queryManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getQueryManager File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
getQueryManager
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private void renameLinks(XWikiDocument backlinkDocument, DocumentReference oldLink, DocumentReference newLink, XWikiContext context) throws XWikiException { // FIXME: Duplicate code. See org.xwiki.refactoring.internal.DefaultLinkRefactoring#renameLinks in // xwiki-platform-refactoring-defaul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameLinks File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
renameLinks
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
protected void initialize(Ruby runtime) { try { parser = createParser(); } catch (SAXException se) { // Unexpected failure in XML subsystem RaiseException ex = runtime.newRuntimeError(se.toString()); ex.initCause(se); throw ex; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initialize File: ext/java/nokogiri/XmlSaxParserContext.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-241" ]
CVE-2022-29181
MEDIUM
6.4
sparklemotion/nokogiri
initialize
ext/java/nokogiri/XmlSaxParserContext.java
db05ba9a1bd4b90aa6c76742cf6102a7c7297267
0
Analyze the following code function for security vulnerabilities
@LargeTest @Test public void testIncomingCallBlockCheckTimesoutIsAllowed() throws Exception { final CountDownLatch latch = new CountDownLatch(1); String phoneNumber = "650-555-1212"; blockNumberWithAnswer(phoneNumber, new Answer<Bundle>() { @Override public Bundle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testIncomingCallBlockCheckTimesoutIsAllowed File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testIncomingCallBlockCheckTimesoutIsAllowed
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public JsonDeserializer<?> createTreeDeserializer(DeserializationConfig config, JavaType nodeType, BeanDescription beanDesc) throws JsonMappingException { @SuppressWarnings("unchecked") Class<? extends JsonNode> nodeClass = (Class<? extends JsonNode>) nodeType.getRa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createTreeDeserializer File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
createTreeDeserializer
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
private StringBuilder buildSuperclassHierarchy(Class c, StringBuilder buf) { Class sc = c.getSuperclass(); if (sc!=null) buildSuperclassHierarchy(sc,buf).append(':'); return buf.append(c.getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildSuperclassHierarchy File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
buildSuperclassHierarchy
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public void unbindFinished(IBinder token, Intent intent, boolean doRebind) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); intent.writeToParce...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unbindFinished File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
unbindFinished
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private void addAttachmentAndUpdateView(Intent data) { if (data == null) { return; } if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.JELLY_BEAN) { final ClipData clipData = data.getClipData(); if (clipData != null) { for (int i = 0, size = cl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachmentAndUpdateView File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
addAttachmentAndUpdateView
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
private final void servlet31(HttpServletRequest request) { try { for(Part part:request.getParts()) { if(part.getContentType() != null && (StringHelper.containsNonWhitespace(part.getSubmittedFileName()) || !part.getContentType().startsWith("text/plain"))) { contentType = part.getContentType(); filenam...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-41242 - Severity: HIGH - CVSS Score: 7.9 Description: OO-5819: container can only create file in its own path Function: servlet31 File: src/main/java/org/olat/restapi/support/MultipartReader.java Repository: OpenOLAT Fixed Code: private final void servlet31...
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
servlet31
src/main/java/org/olat/restapi/support/MultipartReader.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
1
Analyze the following code function for security vulnerabilities
private int jjStartNfaWithStates_2(int pos, int kind, int state) { jjmatchedKind = kind; jjmatchedPos = pos; try { curChar = input_stream.readChar(); } catch(java.io.IOException e) { return pos + 1; } return jjMoveNfa_2(state, pos + 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jjStartNfaWithStates_2 File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java Repository: jakartaee/expression-language The code follows secure coding practices.
[ "CWE-917" ]
CVE-2021-28170
MEDIUM
5
jakartaee/expression-language
jjStartNfaWithStates_2
impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
b6a3943ac5fba71cbc6719f092e319caa747855b
0
Analyze the following code function for security vulnerabilities
public synchronized void updateTime(@Positive int columnIndex, @Nullable Time x) throws SQLException { updateValue(columnIndex, x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTime File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateTime
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private Class<?> loadClassExt(String name) throws ClassNotFoundException { // make recursive addAvailable(); // find it try { return findClass(name); } catch (ClassNotFoundException ex) { } // add resources until found while (true) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadClassExt File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
loadClassExt
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
protected Float _checkFloatSpecialValue(String text) { if (!text.isEmpty()) { switch (text.charAt(0)) { case 'I': if (_isPosInf(text)) { return Float.POSITIVE_INFINITY; } break; case 'N': ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _checkFloatSpecialValue File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_checkFloatSpecialValue
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
public static void copy(InputStream input, File output) throws IOException { FileOutputStream fos = new FileOutputStream(output); IOUtils.copy(input, fos); fos.flush(); fos.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: src/main/java/com/openkm/util/FileUtils.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-377" ]
CVE-2022-3969
MEDIUM
5.5
openkm/document-management-system
copy
src/main/java/com/openkm/util/FileUtils.java
c069e4d73ab8864345c25119d8459495f45453e1
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") default Map<String, V> subMap(String prefix, ArgumentConversionContext<V> valueType) { // special handling for maps for resolving sub keys String finalPrefix = prefix + '.'; return names().stream() .filter(name -> name.startsWith(finalPrefix)) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: subMap File: core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
subMap
core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
void detachFromProcess() { if (app != null) { app.removeActivity(this, false /* keepAssociation */); } app = null; mInputDispatchingTimeoutMillis = DEFAULT_DISPATCHING_TIMEOUT_MILLIS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detachFromProcess File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
detachFromProcess
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public Builder setExecutorService(ExecutorService applicationThreadPool) { this.applicationThreadPool = applicationThreadPool; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setExecutorService File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setExecutorService
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
private boolean scrolledToBottom() { return this.binding != null && scrolledToBottom(this.binding.messagesView); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scrolledToBottom File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
scrolledToBottom
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
protected void pushData(int firstIndex, List<T> data) { JsonArray dataArray = Json.createArray(); int i = 0; for (T item : data) { dataArray.set(i++, getDataObject(item)); } rpc.setData(firstIndex, dataArray); handler.addActiveData(data.stream()); ha...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushData File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
pushData
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
@Override public List<String> searchDocumentsNames(String wheresql, int nb, int start, String selectColumns, XWikiContext context) throws XWikiException { String sql = createSQLQuery("select distinct doc.fullName", wheresql); return searchDocumentsNamesInternal(sql, nb, start, Collection...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocumentsNames File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
searchDocumentsNames
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
public Message setData(String dataMimeType, Uri dataUri) { mDataMimeType = dataMimeType; mDataUri = dataUri; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setData File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setData
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@IgnoreJRERequirement public static ThreadInfo[] getThreadInfos() { ThreadMXBean mbean = ManagementFactory.getThreadMXBean(); return mbean.dumpAllThreads(mbean.isObjectMonitorUsageSupported(),mbean.isSynchronizerUsageSupported()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThreadInfos File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getThreadInfos
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public static void filterContent(String[] values) { filterContent(values, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterContent File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-47105
CRITICAL
9.8
jeecgboot/jeecg-boot
filterContent
jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java
0fc374de4745eac52620eeb8caf6a7b76127529a
0
Analyze the following code function for security vulnerabilities
@Deprecated public static boolean execute(AbstractBuild build, BuildListener listener, BuildTrigger trigger) { return execute(build, listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: core/src/main/java/hudson/tasks/BuildTrigger.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
execute
core/src/main/java/hudson/tasks/BuildTrigger.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") final boolean updateOomAdjLocked(ProcessRecord app, String oomAdjReason) { return mOomAdjuster.updateOomAdjLocked(app, oomAdjReason); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOomAdjLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateOomAdjLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String getContextRootRelativePath() { return contextRootRelativePath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContextRootRelativePath File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getContextRootRelativePath
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
boolean isDragResizing() { return mDragResizing; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDragResizing File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isDragResizing
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
void dumpPendingIntentsLocked(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean dumpAll, String dumpPackage) { boolean printed = false; pw.println("ACTIVITY MANAGER PENDING INTENTS (dumpsys activity intents)"); if (mIntentSenderRecords.size() > 0) { //...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpPendingIntentsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dumpPendingIntentsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public ServerBuilder http1MaxChunkSize(int http1MaxChunkSize) { this.http1MaxChunkSize = validateNonNegative(http1MaxChunkSize, "http1MaxChunkSize"); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: http1MaxChunkSize File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
http1MaxChunkSize
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
void registerUninstallListener() { mContext.registerReceiver(mUninstallListener, new IntentFilter(Intent.ACTION_UID_REMOVED)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerUninstallListener File: services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
registerUninstallListener
services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
String getSchemaName() { return schemaName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSchemaName File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getSchemaName
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void openNativeNavigationApp(double latitude, double longitude){ execute("google.navigation:ll=" + latitude+ "," + longitude); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openNativeNavigationApp File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
openNativeNavigationApp
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setSlaveAgentPort(int port) throws IOException { this.slaveAgentPort = port; // relaunch the agent if(tcpSlaveAgentListener==null) { if(slaveAgentPort!=-1) tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); } else { if(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSlaveAgentPort File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
setSlaveAgentPort
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
void doStopUidForIdleUidsLocked() { final int size = mActiveUids.size(); for (int i = 0; i < size; i++) { final int uid = mActiveUids.keyAt(i); if (UserHandle.isCore(uid)) { continue; } final UidRecord uidRec = mActiveUids.valueAt(i); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doStopUidForIdleUidsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
doStopUidForIdleUidsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private int[] getAllUserIds() { return UserManagerService.getInstance().getUserIdsIncludingPreCreated(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllUserIds File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getAllUserIds
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
@Override public void setManagedProfileMaximumTimeOff(ComponentName who, long timeoutMillis) { Objects.requireNonNull(who, "ComponentName is null"); Preconditions.checkArgumentNonnegative(timeoutMillis, "Timeout must be non-negative."); final CallerIdentity caller = getCallerIdentity(who); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManagedProfileMaximumTimeOff File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setManagedProfileMaximumTimeOff
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public Jooby throwBootstrapException() { this.throwBootstrapException = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: throwBootstrapException File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
throwBootstrapException
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
private void doKeyguardForChildProfilesLocked() { UserManager um = UserManager.get(mContext); for (int profileId : um.getEnabledProfileIds(UserHandle.myUserId())) { if (mLockPatternUtils.isSeparateProfileChallengeEnabled(profileId)) { lockProfile(profileId); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doKeyguardForChildProfilesLocked File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
doKeyguardForChildProfilesLocked
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public ArrayList<RecordingMetadata> filterRecordingsByMetadata(List<RecordingMetadata> recordings, Map<String, String> metadataFilters) { ArrayList<RecordingMetadata> resultRecordings = new ArrayList<>(); for (RecordingMetadata entry : recordings) { if (recordingMatchesMetadata(entry, metada...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterRecordingsByMetadata File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
filterRecordingsByMetadata
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
public void onSavedCertificate() { checkOcServer(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSavedCertificate File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
onSavedCertificate
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private static String createPassword(String password) throws Exception { String key = AES.getSecretKey(); if(key != null){ SecretKey sk = AES.getSecretKeyObject(key); String newPassword = AES.encryptPasswordAsBase64(password, sk); return newPassword; } /** no key , so nothing to encryp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPassword File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
createPassword
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private void parseCustomHtmlTag(HtmlCleaner htmlCleaner, Map<String, String> plugin, TagNode tag, String tagName) throws IOException { if ("plugin".equals(tagName) && tag.hasAttribute("name")) { tag.setForeignMarkup(true); Map<String, String> tmp = new LinkedHashMap<>(tag.getAttributes()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseCustomHtmlTag File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
parseCustomHtmlTag
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
private int updateLruProcessInternalLocked(ProcessRecord app, long now, int index, String what, Object obj, ProcessRecord srcApp) { app.lastActivityTime = now; if (app.activities.size() > 0) { // Don't want to touch dependent processes that are hosting activities. re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLruProcessInternalLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
updateLruProcessInternalLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private PyTorchJobSpec parsePyTorchJobSpec(ExperimentSpec experimentSpec) throws InvalidSpecException { PyTorchJobSpec pyTorchJobSpec = new PyTorchJobSpec(); V1Container initContainer = this.getExperimentHandlerContainer(experimentSpec); Map<PyTorchJobReplicaType, MLJobReplicaSpec> replicaSpecMap...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2023-46302 - Severity: CRITICAL - CVSS Score: 9.8 Description: Replace snakyaml to jackson yaml Function: parsePyTorchJobSpec File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJo...
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
parsePyTorchJobSpec
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/pytorchjob/PyTorchJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
1
Analyze the following code function for security vulnerabilities
private boolean needToStartChooseAccountActivity(Account[] accounts, String callingPackage) { if (accounts.length < 1) return false; if (accounts.length > 1) return true; Account account = accounts[0]; UserAccounts userAccounts = getUserAccounts(UserHandle.getCallingUserId()); in...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: needToStartChooseAccountActivity File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
needToStartChooseAccountActivity
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
void backgroundServicesFinishedLocked(int userId) { for (BroadcastQueue queue : mBroadcastQueues) { queue.backgroundServicesFinishedLocked(userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: backgroundServicesFinishedLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
backgroundServicesFinishedLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public XDOM parse(String content, Syntax syntax, EntityReference source) throws ParseException, MissingParserException { XDOM xdom = parse(content, syntax); if (source != null) { xdom.getMetaData().addMetaData(MetaData.SOURCE, serializer.serialize(source)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parse File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-parser/src/main/java/org/xwiki/rendering/internal/parser/DefaultContentParser.java Repository: xwiki/xwiki-platform The code follows se...
[ "CWE-755" ]
CVE-2023-26479
MEDIUM
6.5
xwiki/xwiki-platform
parse
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-parser/src/main/java/org/xwiki/rendering/internal/parser/DefaultContentParser.java
e5b82cd98072464196a468b8f7fe6396dce142a7
0
Analyze the following code function for security vulnerabilities
@Override public void serviceExceptionAsync(final IOException e) { if (asyncException.compareAndSet(false, true)) { new Thread("Async Exception Handler") { @Override public void run() { serviceException(e); } }.start...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serviceExceptionAsync File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
serviceExceptionAsync
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
void dumpProvidersLocked(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean dumpAll, String dumpPackage) { boolean needSep; boolean printedAnything = false; ItemMatcher matcher = new ItemMatcher(); matcher.build(args, opti); pw.println("ACTIVITY MAN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpProvidersLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dumpProvidersLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static int uncompress(ByteBuffer compressed, ByteBuffer uncompressed) throws IOException { if (!compressed.isDirect()) { throw new SnappyError(SnappyErrorCode.NOT_A_DIRECT_BUFFER, "input is not a direct buffer"); } if (!uncompressed.isDirect()) { t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uncompress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
uncompress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
private void updateNotification() { if (DEBUG) Slog.d(TAG, "updateNotification mWarning=" + mWarning + " mPlaySound=" + mPlaySound + " mSaver=" + mSaver + " mInvalidCharger=" + mInvalidCharger); if (mInvalidCharger) { showInvalidChargerNotification(); mShowing = S...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNotification File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
updateNotification
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
public static String escapeHtml(String source) { if (source == null) { return null; } source = CmsEncoder.escapeXml(source); source = CmsStringUtil.substitute(source, "\r", ""); source = CmsStringUtil.substitute(source, "\n", "<br/>\n"); return source; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeHtml File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
escapeHtml
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
protected boolean validateIssuerAudienceAndAzp(@NonNull JwtClaims claims, @NonNull String iss, @NonNull List<String> audiences, @NonNull String clientId, ...
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-36820 - Severity: MEDIUM - CVSS Score: 6.5 Description: Merge pull request from GHSA-qw22-8w9r-864h The `aud` claim should contain the Client ID. https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation > Clients MUST validate the ID Token ...
[ "CWE-284" ]
CVE-2023-36820
MEDIUM
6.5
micronaut-projects/micronaut-security
validateIssuerAudienceAndAzp
security-oauth2/src/main/java/io/micronaut/security/oauth2/client/IdTokenClaimsValidator.java
9728b925221a0d87798ccf250657a3c214b7e980
1
Analyze the following code function for security vulnerabilities
void finishUserSwitch(UserStartedState uss) { synchronized (this) { finishUserBoot(uss); startProfilesLocked(); int num = mUserLru.size(); int i = 0; while (num > MAX_RUNNING_USERS && i < mUserLru.size()) { Integer oldUserId = mUserLr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishUserSwitch File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
finishUserSwitch
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public Optional<MongoDbSession> forUser(UserOverviewDTO user) { return sessions.getOrDefault(user.id(), Optional.empty()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forUser File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
forUser
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
@Override public void onLaunchAnimationCancelled() { setOccluded(true /* occluded */, false /* animate */); Log.d(TAG, "Occlude launch animation cancelled. Occluded state is now: " + mOccluded); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLaunchAnimationCancelled File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onLaunchAnimationCancelled
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public ModalDialog addButtonBar(final AjaxRequestTarget target) { target.add(buttonBarContainer); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addButtonBar File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
addButtonBar
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
protected Http2Connection connection() { return connection; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connection File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java Repository: netty The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
netty
connection
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
58f75f665aa81a8cbcf6ffa74820042a285c5e61
0
Analyze the following code function for security vulnerabilities
public void stop() { LOG.debug("Attempting to stop DNS client"); if (nettyEventLoop == null) { LOG.error("DNS resolution event loop not initialized"); return; } // Make sure to close the resolver before shutting down the event loop resolver.close(); ...
Vulnerability Classification: - CWE: CWE-345 - CVE: CVE-2023-41045 - Severity: MEDIUM - CVSS Score: 5.3 Description: Merge pull request from GHSA-g96c-x7rh-99r3 * Add support for randomizing DNS Lookup source port * Clarify purpose of lease * Skip initial refresh Previously, the pool was being refreshed immediatel...
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
stop
graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java
466af814523cffae9fbc7e77bab7472988f03c3e
1
Analyze the following code function for security vulnerabilities
@CalledByNative private void hideSelectPopup() { if (mSelectPopup != null) mSelectPopup.hide(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hideSelectPopup File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
hideSelectPopup
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public String getAltSubjectMatch() { return getFieldValue(ALTSUBJECT_MATCH_KEY, ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAltSubjectMatch File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
getAltSubjectMatch
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return tokType + "\t" + token + "\t" + expires; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: src/gribbit/auth/User.java Repository: lukehutch/gribbit The code follows secure coding practices.
[ "CWE-346" ]
CVE-2014-125071
MEDIUM
5.2
lukehutch/gribbit
toString
src/gribbit/auth/User.java
620418df247aebda3dd4be1dda10fe229ea505dd
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting protected void setBrowseNamespaceTemplate(final Template browseNamespaceTemplate) { this.browseNamespaceTemplate = browseNamespaceTemplate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBrowseNamespaceTemplate File: varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
setBrowseNamespaceTemplate
varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
private void preventBulkImport(ExportConfig config) { if (config.isBulkImport()) { throw new RuntimeException("You can use the `bulkImport` only with apoc.export.all and apoc.export.csv.graph"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: preventBulkImport File: core/src/main/java/apoc/export/csv/ExportCSV.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23532
MEDIUM
6.5
neo4j-contrib/neo4j-apoc-procedures
preventBulkImport
core/src/main/java/apoc/export/csv/ExportCSV.java
01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522
0
Analyze the following code function for security vulnerabilities
private void logRecordWithUid(UserAccounts accounts, String action, String tableName, int uid) { logRecord(action, tableName, -1, accounts, uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logRecordWithUid File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
logRecordWithUid
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public void deleteTenant(String tenant) { StopWatch stopWatch = StopWatch.createStarted(); log.info("START - SETUP:DeleteTenant: tenantKey: {}", tenant); try { databaseService.drop(tenant); tenantListRepository.deleteTenant(tenant); tenantConfigRepository.de...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteTenant File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java Repository: xm-online/xm-uaa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15557
HIGH
7.5
xm-online/xm-uaa
deleteTenant
src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java
bd235434f119c67090952e08fc28abe41aea2e2c
0
Analyze the following code function for security vulnerabilities
@Override @SuppressWarnings("unchecked") public <T> T fromString(String content, Class<T> classOfT) { try (StringReader reader = new StringReader(content)) { JAXBContext jaxbContext = JAXBContext.newInstance(classOfT); Unmarshaller jaxbUnmarshaller = jaxbContext.createUnmarshalle...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-20059 - Severity: HIGH - CVSS Score: 7.5 Description: Fix #486 Function: fromString File: pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java Repository: pippo-java/pippo Fixed Code: @Override @SuppressWarnings("unchecked")...
[ "CWE-611" ]
CVE-2018-20059
HIGH
7.5
pippo-java/pippo
fromString
pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java
9f36e5891c0b11f840e1e1561ae96d83ba9ce759
1
Analyze the following code function for security vulnerabilities
@Nullable public String getName() { int id = nativeGetName(mParseState); return id >= 0 ? getSequenceString(mStrings.getSequence(id)) : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getName
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public static SetupEncryptionDialogFragment newInstance(User user, int position) { SetupEncryptionDialogFragment fragment = new SetupEncryptionDialogFragment(); Bundle args = new Bundle(); args.putParcelable(ARG_USER, user); args.putInt(ARG_POSITION, position); fragment.setArgume...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-212" ]
CVE-2021-32658
LOW
2.1
nextcloud/android
newInstance
src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java
355f3c745b464b741b20a3b96597303490c26333
0
Analyze the following code function for security vulnerabilities
public File prepareDownloadFile(Response response) throws IOException { String filename = null; String contentDisposition = (String) response.getHeaders().getFirst("Content-Disposition"); if (contentDisposition != null && !"".equals(contentDisposition)) { // Get filename from the Content-Disposition h...
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2021-21430 - Severity: LOW - CVSS Score: 2.1 Description: use Files.createTempFile Function: prepareDownloadFile File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator ...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
prepareDownloadFile
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
1
Analyze the following code function for security vulnerabilities
public static byte getByte(byte[] data, int index) { return PlatformDependent0.getByte(data, index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByte File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
getByte
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@Override public void run() { if(com.codename1.ui.Toolbar.isGlobalToolbar()) { return; } ActionBar ab = activity.getActionBar(); String title = f.getTitle(); boolean hasMenuBtn = false; if(android.os.Build.VERSION.SDK_INT >=...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
run
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public String getNamespaceType() { return getXmlType().name.equals("hazelcast") ? "config" : "client-config"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNamespaceType File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
getNamespaceType
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public void setTemplate(String template) { DocumentReference templateReference = null; if (!StringUtils.isEmpty(template)) { templateReference = getCurrentMixedDocumentReferenceResolver().resolve(template); } setTemplateDocumentReference(t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTemplate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
setTemplate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@RequestMapping({"/userview/(*:appId)/(*:userviewId)/(*:key)/serviceworker"}) public void serviceWorker(ModelMap map, HttpServletRequest request, HttpServletResponse response, @RequestParam("appId") String appId, @RequestParam("userviewId") String userviewId, @RequestParam("key") String userviewKey) throws IOExcept...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serviceWorker File: wflow-consoleweb/src/main/java/org/joget/apps/app/controller/UserviewWebController.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
serviceWorker
wflow-consoleweb/src/main/java/org/joget/apps/app/controller/UserviewWebController.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
public String getBase64EncodedPublicKey() { String key = Display.getInstance().getProperty("android.licenseKey", ""); return key; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBase64EncodedPublicKey File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getBase64EncodedPublicKey
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
protected HashMap<Integer,String> getParentItemOIDs(String crfVersionIds) { HashMap<Integer,String> oids = new HashMap<Integer,String>(); this.setParentItemOIDsTypesExpected(); ArrayList rows = this.select(this.getParentItemOIDsSql(crfVersionIds)); Iterator it = rows.iterator(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParentItemOIDs File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
getParentItemOIDs
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private DocumentReferenceResolver<String> getDefaultDocumentReferenceResolver() { if (this.defaultDocumentReferenceResolver == null) { this.defaultDocumentReferenceResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_STRING); } return this.defaultDocumentReferenceResolve...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDocumentReferenceResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getDefaultDocumentReferenceResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
protected final Object _deserializeOther(JsonParser p, DeserializationContext ctxt, JsonToken t) throws IOException { // and then others, generally requiring use of @JsonCreator if (t != null) { switch (t) { case VALUE_STRING: return deserializeFro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _deserializeOther File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42004
HIGH
7.5
FasterXML/jackson-databind
_deserializeOther
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
063183589218fec19a9293ed2f17ec53ea80ba88
0
Analyze the following code function for security vulnerabilities
public @NonNull Set<String> getAffiliationIds(@NonNull ComponentName admin) { throwIfParentInstance("getAffiliationIds"); try { return new ArraySet<>(mService.getAffiliationIds(admin)); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAffiliationIds File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getAffiliationIds
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void release(int displayId) { synchronized (mGlobalLock) { final RootWindowContainer.SleepToken token = mSleepTokens.get(displayId); if (token != null) { mRootWindowContainer.removeSleepToken(token); mSleepToken...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: release File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
release
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public SyncNotedAppOp noteOperation(int code, int uid, @Nullable String packageName, @Nullable String featureId, boolean shouldCollectAsyncNotedOp, @Nullable String message, boolean shouldCollectMessage, @NonNull HeptFunction<Integer, Integer, String, St...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteOperation File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
noteOperation
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public abstract BaseXMLBuilder element(String name);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: element File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
element
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
@Override public void setNearbyNotificationStreamingPolicy(int policy) { if (!mHasFeature) { return; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwner(caller)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNearbyNotificationStreamingPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setNearbyNotificationStreamingPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void switchUserNow(int userId) { try { ActivityManagerNative.getDefault().switchUser(userId); } catch (RemoteException re) { // Nothing to do } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: switchUserNow File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
switchUserNow
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
public void setProfileId(String profileId) { this.profileId = profileId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProfileId File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setProfileId
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public final String toString() { return key.toString() + '=' + value.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
toString
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
protected abstract List<QueryTable> getQueryTableInfo(String sql);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getQueryTableInfo File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34602
HIGH
7.5
jeecgboot/jeecg-boot
getQueryTableInfo
jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java
dd7bf104e7ed59142909567ecd004335c3442ec5
0
Analyze the following code function for security vulnerabilities
public synchronized static int getCurrentUser() { return sCurrentUser; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentUser File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getCurrentUser
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setHasOptionsMenu(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onCreate
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
protected HttpUriRequest makeRequest() throws IOException, MessageInvalidException { final String requestUri = getRequestUri(); HttpUriRequest req; if (mAttemptNumber == ATTEMPT_UNAUTHENTICATED_GET) { req = mConnection.makeGet(requestUri); } else { req = mConnecti...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2016-2415 - Severity: HIGH - CVSS Score: 7.1 Description: Patch Exchange Autodiscover Code for Security Issue The change removes the unauthenticated GET fallback attempt for the Autodiscover process. Given that the Autodiscover code is functionally broken and th...
[ "CWE-200" ]
CVE-2016-2415
HIGH
7.1
android
makeRequest
src/com/android/exchange/eas/EasAutoDiscover.java
0d1a38b1755efe7ed4e8d7302a24186616bba9b2
1
Analyze the following code function for security vulnerabilities
public ModalDialog open(final AjaxRequestTarget target) { target.appendJavaScript("$('#" + getMainContainerMarkupId() + "').modal('show');"); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: open File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
open
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
private void processDefinedInterfaces(InterfaceType xmlIntf, PluginPackages pluginPackageEntity, PluginConfigs pluginConfigEntity) { if (log.isInfoEnabled()) { log.info("process interfaces..."); } if (xmlIntf == null) { return; } PluginConfigI...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processDefinedInterfaces File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure coding pract...
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
processDefinedInterfaces
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
public List<Entry<P>> getPrimitive(final byte[] identifier) { List<Entry<P>> found = primitives.get(new String(identifier, UTF_8)); return found != null ? found : Collections.<Entry<P>>emptyList(); }
Vulnerability Classification: - CWE: CWE-176 - CVE: CVE-2020-8929 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fixing ciphertext malleability issue in Java caused by storing the ciphertext prefix in a hashmap keyed by UTF8 encoded strings, instead of byte arrays, leading to the ability to retrieve keys with IDs t...
[ "CWE-176" ]
CVE-2020-8929
MEDIUM
5
tink-crypto/tink
getPrimitive
java_src/src/main/java/com/google/crypto/tink/PrimitiveSet.java
93d839a5865b9d950dffdc9d0bc99b71280a8899
1
Analyze the following code function for security vulnerabilities
public String getUserNameFromToken(String authToken) { if (null == authToken) { return null; } String[] parts = authToken.split(":"); return parts[0]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserNameFromToken File: app/templates/src/main/java/package/security/xauth/_TokenProvider.java Repository: jhipster/generator-jhipster The code follows secure coding practices.
[ "CWE-307" ]
CVE-2015-20110
HIGH
7.5
jhipster/generator-jhipster
getUserNameFromToken
app/templates/src/main/java/package/security/xauth/_TokenProvider.java
79fe5626cb1bb80f9ac86cf46980748e65d2bdbc
0