instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private HashMap<String, String> cleanString(HashMap<String, String> strList, String[] allowed) {
String allow = "";
HashMap<String, String> cleaned = null;
Iterator<String> it = null;
String cleanStr = null;
String key = null;
for (int i = 0; i < allowed.length; i++) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanString
File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java
Repository: jflyfox/jfinal_cms
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2021-37262 | MEDIUM | 5 | jflyfox/jfinal_cms | cleanString | src/main/java/com/jflyfox/modules/filemanager/FileManager.java | e7fd0fe9362464c4d2bd308318eecc89a847b116 | 0 |
Analyze the following code function for security vulnerabilities | public void dumpPendingOperations(StringBuilder sb) {
sb.append("Pending Ops: ").append(mPendingOperations.size()).append(" operation(s)\n");
for (PendingOperation pop : mPendingOperations) {
sb.append("(info: " + pop.target.toString())
.append(", extras: " + pop.extras)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpPendingOperations
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | dumpPendingOperations | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | private Map<String, List<String>> getHeaders(RoutingContext ctx) {
Map<String, List<String>> h = new HashMap<>();
MultiMap headers = ctx.request().headers();
for (String header : headers.names()) {
h.put(header, headers.getAll(header));
}
return h;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHeaders
File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java
Repository: quarkusio/quarkus
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2022-2466 | CRITICAL | 9.8 | quarkusio/quarkus | getHeaders | extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java | 08e5c3106ce4bfb18b24a38514eeba6464668b07 | 0 |
Analyze the following code function for security vulnerabilities | private void appendExtraInformation(StringBuilder breadcrumb) {
if (StringUtil.isDefined(getExtraInformation())) {
if (breadcrumb.length() > 0) {
breadcrumb.append(CONNECTOR);
}
breadcrumb.append("<span class=\"information\">");
breadcrumb.append(getExtraInformation());
breadcr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: appendExtraInformation
File: core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | appendExtraInformation | core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | public JDK getJDK(String name) {
if(name==null) {
// if only one JDK is configured, "default JDK" should mean that JDK.
List<JDK> jdks = getJDKs();
if(jdks.size()==1) return jdks.get(0);
return null;
}
for (JDK j : getJDKs()) {
if(j.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJDK
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getJDK | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public static int makeKey(int type, int userId) {
return (type << SETTINGS_TYPE_SHIFT) | userId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeKey
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | makeKey | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | protected final void initContentViewCore() {
initContentViewCore(ContentViewUtil.createNativeWebContents(mIncognito));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initContentViewCore
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | initContentViewCore | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | @Unstable
public boolean exists(PageReference reference, XWikiContext context)
{
// Try as space
DocumentReference documentReference = getCurrentReferenceDocumentReferenceResolver().resolve(reference);
if (exists(documentReference, context)) {
return true;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exists
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-36092 | HIGH | 7.5 | xwiki/xwiki-platform | exists | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | 71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb | 0 |
Analyze the following code function for security vulnerabilities | private void removeUserNow() {
if (mRemovingUserId == UserHandle.myUserId()) {
removeThisUser();
} else {
new Thread() {
public void run() {
synchronized (mUserLock) {
mUserManager.removeUser(mRemovingUserId);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeUserNow
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | removeUserNow | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void shutdown() {
try {
sendShutdown();
channel.close();
} finally {
server.getClientConnectionManager().disconnect(connection.id);
if (OLogManager.instance().isDebugEnabled())
OLogManager.instance().debug(this, "Connection closed");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shutdown
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | shutdown | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTopologyRecoveryEnabled() {
return topologyRecovery;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTopologyRecoveryEnabled
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | isTopologyRecoveryEnabled | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | List<Rect> getSystemGestureExclusion() {
return mExclusionRects;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemGestureExclusion
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getSystemGestureExclusion | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public String getRequestURL() throws XWikiException
{
return getXWikiContext().getURLFactory().getRequestURL(getXWikiContext()).toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestURL
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getRequestURL | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public void setUseDesktopUserAgent(boolean useDesktop, boolean reloadOnChange) {
if (mContentViewCore != null) {
mContentViewCore.setUseDesktopUserAgent(useDesktop, reloadOnChange);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseDesktopUserAgent
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | setUseDesktopUserAgent | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public double getScale() {
return scale;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScale
File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-1231 | MEDIUM | 4.3 | plantuml | getScale | src/net/sourceforge/plantuml/ugraphic/UImageSvg.java | c9137be051ce98b3e3e27f65f54ec7d9f8886903 | 0 |
Analyze the following code function for security vulnerabilities | public static final boolean is64Bit() {
return VMRuntime.getRuntime().is64Bit();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: is64Bit
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | is64Bit | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | public static String getProjection(String query) {
Assert.hasText(query, "Query must not be null or empty!");
Matcher matcher = PROJECTION_CLAUSE.matcher(query);
return matcher.find() ? matcher.group(1) : "";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProjection
File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | getProjection | src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isEncrypting() {
return encrypting;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEncrypting
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | isEncrypting | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
@RequiresPermission(value = Manifest.permission.WHITELIST_RESTRICTED_PERMISSIONS,
conditional = true)
public Set<String> getAllowlistedRestrictedPermissions(@NonNull String packageName,
@PackageManager.PermissionWhitelistFlags int allowlistFlag) {
try {
final... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllowlistedRestrictedPermissions
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getAllowlistedRestrictedPermissions | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public static String getViewExt(String type) {
if ("freemarker".equals(type)) {
return ".ftl";
} else {
return ".jsp";
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getViewExt
File: common/src/main/java/com/zrlog/util/ZrLogUtil.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | getViewExt | common/src/main/java/com/zrlog/util/ZrLogUtil.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SSLSessionInfo getSslSessionInfo() {
return sslSessionInfo;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSslSessionInfo
File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2019-10184 | MEDIUM | 5 | undertow-io/undertow | getSslSessionInfo | servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java | d2715e3afa13f50deaa19643676816ce391551e9 | 0 |
Analyze the following code function for security vulnerabilities | @PipelineProperty(description = "The XML fragment wrapper that should be used to wrap the input XML.")
@PipelinePropertyDocRef(types=TextConverter.ENTITY_TYPE)
public void setTextConverter(final DocRef textConverterRef) {
this.textConverterRef = textConverterRef;
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2018-1000651
- Severity: HIGH
- CVSS Score: 7.5
Description: gh-813 Turn on secure processing feature for XML parsers etc
Function: setTextConverter
File: stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java
Repository: gchq/stro... | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | setTextConverter | stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 1 |
Analyze the following code function for security vulnerabilities | public final void publishContentProviders(IApplicationThread caller,
List<ContentProviderHolder> providers) {
if (providers == null) {
return;
}
enforceNotIsolatedCaller("publishContentProviders");
synchronized (this) {
final ProcessRecord r = getReco... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: publishContentProviders
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | publishContentProviders | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void getEntryBatchSize(CompletableFuture<Integer> batchSizeFuture, PersistentTopic topic,
MessageIdImpl messageId, int batchIndex) {
if (batchIndex >= 0) {
try {
ManagedLedgerImpl ledger = (ManagedLedgerImpl) topic.getManagedLedger();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEntryBatchSize
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | getEntryBatchSize | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | @JsonProperty("SubjectDN")
public String getSubjectDN() {
return subjectDN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSubjectDN
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getSubjectDN | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static byte[] getStreamBytesRaw(PRStream stream, RandomAccessFileOrArray file) throws IOException {
PdfReader reader = stream.getReader();
byte b[];
if (stream.getOffset() < 0)
b = stream.getBytes();
else {
b = new byte[stream.getLength()];
file... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStreamBytesRaw
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getStreamBytesRaw | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean matchParentBounds() {
final Rect overrideBounds = getResolvedOverrideBounds();
if (overrideBounds.isEmpty()) {
return true;
}
// An activity in size compatibility mode may have override bounds which equals to its
// parent bounds, so the e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: matchParentBounds
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | matchParentBounds | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public InboxStyle addLine(CharSequence cs) {
mTexts.add(safeCharSequence(cs));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addLine
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | addLine | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public <T> void join(JoinBy from, JoinBy to, String operation, String joinType,
Class<T> returnedClazz, CQLWrapper cr, boolean setId,
Handler<AsyncResult<Results<T>>> replyHandler){
String filter = "";
if(cr != null){
filter = cr.toString();
}
join(from, to, operation, joinType, filter... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: join
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | join | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private OutputStream getOutput() throws IOException {
if(os == null) {
os = socketInstance.getOutputStream();
}
return os;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOutput
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getOutput | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected OutputStream getFileOutputLocal(String name) throws DirectoryException {
try {
return new FileOutputStream(generatePath(name));
} catch (FileNotFoundException e) {
throw new DirectoryException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileOutputLocal
File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java
Repository: iBotPeaches/Apktool
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2024-21633 | HIGH | 7.8 | iBotPeaches/Apktool | getFileOutputLocal | brut.j.dir/src/main/java/brut/directory/FileDirectory.java | d348c43b24a9de350ff6e5bd610545a10c1fc712 | 0 |
Analyze the following code function for security vulnerabilities | public void handleAtRule(ApplContext ac, String ident, String string) {
style.getWarnings().addWarning(new Warning(cssFouffa.getSourceFile(),
cssFouffa.getLine(),
"at-rule",
2,
new String[]{ident, string},
ac));
//stylesheet... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleAtRule
File: org/w3c/css/css/StyleSheetParser.java
Repository: w3c/css-validator
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-4070 | LOW | 3.5 | w3c/css-validator | handleAtRule | org/w3c/css/css/StyleSheetParser.java | e5c09a9119167d3064db786d5f00d730b584a53b | 0 |
Analyze the following code function for security vulnerabilities | private XWikiDocument beforeDelete(XWikiDocument doc, XWikiContext context) throws XWikiException
{
XWikiDocument blankDoc = prepareDocumentDelete(doc, context);
ObservationManager om = getObservationManager();
// Inform notification mechanisms that a document is about to be deleted
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: beforeDelete
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | beforeDelete | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<PermissionInfo> queryPermissionsByGroup(String group, int flags) {
// reader
synchronized (mPackages) {
ArrayList<PermissionInfo> out = new ArrayList<PermissionInfo>(10);
for (BasePermission p : mSettings.mPermissions.values()) {
if (grou... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryPermissionsByGroup
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryPermissionsByGroup | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public ClientConfig getClientConfig() {
return clientConfig;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getClientConfig
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getClientConfig | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getSQL(Insert insert) {
// Insert clause
StringBuilder sql = new StringBuilder();
String insertClause = getInsertStatement(insert);
sql.append(insertClause);
// Table
sql.append(" ").append(getTableSQL(insert));
// Columns
boo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public String toString()
{
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: ext/java/nokogiri/Html4SaxParserContext.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-241"
] | CVE-2022-29181 | MEDIUM | 6.4 | sparklemotion/nokogiri | toString | ext/java/nokogiri/Html4SaxParserContext.java | db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 0 |
Analyze the following code function for security vulnerabilities | public OutputStream openFileOutputStream(String file) throws IOException {
file = removeFilePrefix(file);
OutputStream os = null;
try{
os = createFileOuputStream(file);
}catch(FileNotFoundException fne){
//It is impossible to know if a path is considered an extern... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openFileOutputStream
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | openFileOutputStream | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startLockTaskModeByToken(IBinder token) {
synchronized (this) {
final ActivityRecord r = ActivityRecord.forTokenLocked(token);
if (r == null) {
return;
}
startLockTaskModeLocked(r.getTask(), false /* isSystemCaller */);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startLockTaskModeByToken
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | startLockTaskModeByToken | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private static void serializeAppWidget(XmlSerializer out, Widget widget) throws IOException {
out.startTag(null, "g");
out.attribute(null, "id", Integer.toHexString(widget.appWidgetId));
out.attribute(null, "rid", Integer.toHexString(widget.restoredId));
out.attribute(null, "h", Integer.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serializeAppWidget
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | serializeAppWidget | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | private void writeByteDirect(int n) throws TException {
writeByteDirect((byte) n);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeByteDirect
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | writeByteDirect | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | boolean isKeyguardLocked(int displayId) {
return mKeyguardController.isKeyguardLocked(displayId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyguardLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | isKeyguardLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public void setJSONContextClient(JSONContext.Client jsonContext) {
_jsonContext = jsonContext;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setJSONContextClient
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | setJSONContextClient | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | IIntentSender getIntentSenderLocked(int type, String packageName, String featureId,
int callingUid, int userId, IBinder token, String resultWho, int requestCode,
Intent[] intents, String[] resolvedTypes, int flags, Bundle bOptions) {
ActivityRecord activity = null;
if (type == A... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntentSenderLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getIntentSenderLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | CompatibilityInfo compatibilityInfoForPackage(ApplicationInfo ai) {
return mAtmInternal.compatibilityInfoForPackage(ai);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: compatibilityInfoForPackage
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | compatibilityInfoForPackage | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public int getShutdownTimeout() {
return shutdownTimeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShutdownTimeout
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | getShutdownTimeout | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public void requestNotificationUpdate() {
updateNotifications();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestNotificationUpdate
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | requestNotificationUpdate | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static void unzip(String zipFilePath, String targetPath, boolean overwrite) throws IOException {
ZipFile zipFile = new ZipFile(zipFilePath);
Enumeration<? extends ZipEntry> entryEnum = zipFile.getEntries();
if (null != entryEnum) {
while (entryEnum.hasMoreElements()) {
... | Vulnerability Classification:
- CWE: CWE-434
- CVE: CVE-2018-12914
- Severity: HIGH
- CVSS Score: 7.5
Description: https://github.com/sanluan/PublicCMS/issues/13 Unsafe Unzip bug fix
Function: unzip
File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java
Repository: sanluan/Publ... | [
"CWE-434"
] | CVE-2018-12914 | HIGH | 7.5 | sanluan/PublicCMS | unzip | publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java | c19fe66378c75725f3e3a380a6cb9f8b8a7dcb71 | 1 |
Analyze the following code function for security vulnerabilities | public String getFullName()
{
return this.deletedDoc.getFullName();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFullName
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-29208 | HIGH | 7.5 | xwiki/xwiki-platform | getFullName | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java | d9e947559077e947315bf700c5703dfc7dd8a8d7 | 0 |
Analyze the following code function for security vulnerabilities | public S3PluginActifactPullRequestDto createS3PluginActifactPullRequest(S3PluginActifactDto pullRequestDto) {
if (pullRequestDto == null) {
throw new WecubeCoreException("3095", "Illegal argument.");
}
if (StringUtils.isBlank(pullRequestDto.getKeyName())) {
throw new Wec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createS3PluginActifactPullRequest
File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
Repository: WeBankPartners/wecube-platform
The code follows secure cod... | [
"CWE-22"
] | CVE-2021-45746 | MEDIUM | 5 | WeBankPartners/wecube-platform | createS3PluginActifactPullRequest | platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java | 1164dae43c505f8a0233cc049b2689d6ca6d0c37 | 0 |
Analyze the following code function for security vulnerabilities | private ConsumerBrokerExchange addConsumerBrokerExchange(ConsumerId id) {
ConsumerBrokerExchange result = consumerExchanges.get(id);
if (result == null) {
synchronized (consumerExchanges) {
result = new ConsumerBrokerExchange();
TransportConnectionState state ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addConsumerBrokerExchange
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | addConsumerBrokerExchange | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected final Object clone() {
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clone
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | clone | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | public void setClassLoader(ClassLoader classLoader) {
classLoaderReference.setReference(classLoader);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClassLoader
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | setClassLoader | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | boolean setFocusedStack(ActivityRecord r, String reason) {
if (r == null) {
// Not sure what you are trying to do, but it is not going to work...
return false;
}
final TaskRecord task = r.task;
if (task == null || task.stack == null) {
Slog.w(TAG, "Can... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFocusedStack
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | setFocusedStack | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | private void schedulePersistUriGrants() {
if (!mHandler.hasMessages(PERSIST_URI_GRANTS_MSG)) {
mHandler.sendMessageDelayed(mHandler.obtainMessage(PERSIST_URI_GRANTS_MSG),
10 * DateUtils.SECOND_IN_MILLIS);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: schedulePersistUriGrants
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | schedulePersistUriGrants | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public List<String> getFollows(String scenarioId) {
List<String> result = new ArrayList<>();
if (StringUtils.isBlank(scenarioId)) {
return result;
}
ApiScenarioFollowExample example = new ApiScenarioFollowExample();
example.createCriteria().andScenarioIdEqualTo(scenar... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFollows
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | getFollows | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onServiceDisconnected(ComponentName name) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onServiceDisconnected
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | onServiceDisconnected | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public <T> PageSerializable<T> toPageSerializable(Function<E, T> function) {
List<T> list = new ArrayList<T>(this.size());
for (E e : this) {
list.add(function.apply(e));
}
PageSerializable<T> pageSerializable = new PageSerializable<T>(list);
pageSerializable.setTotal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toPageSerializable
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | toPageSerializable | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void selectStreamParam(TestContext context) {
createNumbers(context, 25, 26, 27)
.selectStream("SELECT i FROM numbers WHERE i IN (?, ?, ?) ORDER BY i",
new JsonArray().add(25).add(27).add(29),
context.asyncAssertSuccess(select -> {
intsAsString(select, context.asyncAsser... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selectStreamParam
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | selectStreamParam | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean startUserInBackground(final int userId) {
return mUserController.startUser(userId, /* foreground */ false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startUserInBackground
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | startUserInBackground | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public ServerBuilder tlsAllowUnsafeCiphers(boolean tlsAllowUnsafeCiphers) {
virtualHostTemplate.tlsAllowUnsafeCiphers(tlsAllowUnsafeCiphers);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tlsAllowUnsafeCiphers
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | tlsAllowUnsafeCiphers | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public java.lang.Object parseGroovyFromString(String script) throws XWikiException
{
if (hasProgrammingRights()) {
return this.xwiki.parseGroovyFromString(script, getXWikiContext());
}
return "groovy_missingrights";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseGroovyFromString
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | parseGroovyFromString | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private boolean isBodyParsed() {
return getStartLineNumber() != -1 && getEndLineNumber() == -1;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBodyParsed
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | isBodyParsed | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | private static void mapQueryCachePredicateConfigXmlGenerator(XmlGenerator gen,
QueryCacheConfig queryCacheConfig) {
PredicateConfig predicateConfig = queryCacheConfig.getPredicateConfig();
String type = predicateConfig.getClassName() != n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mapQueryCachePredicateConfigXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | mapQueryCachePredicateConfigXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public AdjunctManager getAdjuncts(String dummy) {
return adjuncts;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAdjuncts
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getAdjuncts | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public WifiConfiguration getSavedNetworkForScanDetailAndCache(ScanDetail scanDetail) {
WifiConfiguration network = getSavedNetworkForScanDetail(scanDetail);
if (network == null) {
return null;
}
saveToScanDetailCacheForNetwork(network, scanDetail);
// Cache DTIM value... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSavedNetworkForScanDetailAndCache
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getSavedNetworkForScanDetailAndCache | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setProviderIndex(long providerIndex) {
mProviderIndex = providerIndex;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProviderIndex
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | setProviderIndex | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public byte[] get() throws IOException {
if (file == null) {
return EmptyArrays.EMPTY_BYTES;
}
return readFrom(file);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get
File: codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java
Repository: netty
The code follows secure coding practices. | [
"CWE-378",
"CWE-379"
] | CVE-2021-21290 | LOW | 1.9 | netty | get | codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java | c735357bf29d07856ad171c6611a2e1a0e0000ec | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "2.2M2")
public BaseObject getObject(String className, boolean create, XWikiContext context)
{
return getXObject(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), create,
context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getObject | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public static final native int[] getPidsForCommands(String[] cmds); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPidsForCommands
File: core/java/android/os/Process.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3911 | HIGH | 9.3 | android | getPidsForCommands | core/java/android/os/Process.java | 2c7008421cb67f5d89f16911bdbe36f6c35311ad | 0 |
Analyze the following code function for security vulnerabilities | public static <K, V> ConcurrentMap<K, V> newConcurrentHashMap(int initialCapacity, float loadFactor) {
return new ConcurrentHashMap<K, V>(initialCapacity, loadFactor);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newConcurrentHashMap
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | newConcurrentHashMap | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ResolveInfo getLastChosenActivity(Intent intent, String resolvedType, int flags) {
final int userId = UserHandle.getCallingUserId();
if (DEBUG_PREFERRED) Log.v(TAG, "Querying last chosen activity for " + intent);
List<ResolveInfo> query = queryIntentActivities(intent, resolv... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastChosenActivity
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getLastChosenActivity | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, Authentication> getAuthentications() {
return authentications;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthentications
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getAuthentications | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void replace(int start, int end, String s) {
elide(start, end);
sanitizedJson.append(s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replace
File: src/main/java/com/google/json/JsonSanitizer.java
Repository: OWASP/json-sanitizer
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-13973 | MEDIUM | 4.3 | OWASP/json-sanitizer | replace | src/main/java/com/google/json/JsonSanitizer.java | 53ceaac3e0a10e86d512ce96a0056578f2d1978f | 0 |
Analyze the following code function for security vulnerabilities | void systemPropertiesSet(String key, String value) {
SystemProperties.set(key, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: systemPropertiesSet
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | systemPropertiesSet | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void updateAsciiStream(@Positive int columnIndex,
@Nullable InputStream inputStream) throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(),
"updateAsciiStream(int, InputStream)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAsciiStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateAsciiStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private void scanDirLI(File dir, int parseFlags, int scanFlags, long currentTime) {
final File[] files = dir.listFiles();
if (ArrayUtils.isEmpty(files)) {
Log.d(TAG, "No files in app dir " + dir);
return;
}
if (DEBUG_PACKAGE_SCANNING) {
Log.d(TAG, "Sc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanDirLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | scanDirLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public BaseObject addObjectFromRequest(String className, XWikiContext context) throws XWikiException
{
return addObjectFromRequest(className, "", 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObjectFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | addObjectFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private void validateAttachments(final Attachable attachable) throws GameParseException {
for (final IAttachment a : attachable.getAttachments().values()) {
a.validate(data);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateAttachments
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | validateAttachments | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | public String getColumnCastSQL(Column column) {
String columnSQL = getColumnSQL(column);
return "CAST(" + columnSQL + " AS VARCHAR)";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColumnCastSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getColumnCastSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public Builder setAllowSslConnectionPool(boolean allowSslConnectionPool) {
this.allowSslConnectionPool = allowSslConnectionPool;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAllowSslConnectionPool
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setAllowSslConnectionPool | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public long getLongValue(DocumentReference classReference, String fieldName)
{
BaseObject obj = getXObject(classReference, 0);
if (obj == null) {
return 0;
}
return obj.getLongValue(fieldName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLongValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getLongValue | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startDocument() throws SAXException {
startBuffer();
super.startDocument();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDocument
File: stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | startDocument | stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | public String getRenderedContent() throws XWikiException
{
return this.doc.getRenderedContent(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getRenderedContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setPreloadBlobFromInputStream(Boolean thePreloadBlobFromInputStream) {
// ignore
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPreloadBlobFromInputStream
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setPreloadBlobFromInputStream | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | public ParaObject checkAuth(HttpServletRequest req, HttpServletResponse res) throws ServletException, IOException {
Profile authUser = null;
String jwt = HttpUtils.getStateParam(CONF.authCookie(), req);
if (isApiRequest(req)) {
return checkApiAuth(req);
} else if (jwt != null && !StringUtils.endsWithAny(req.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAuth
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | checkAuth | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public Node getSingleNode() {
// Drop the STREAM-START event.
parser.getEvent();
// Compose a document if the stream is not empty.
Node document = null;
if (!parser.checkEvent(Event.ID.StreamEnd)) {
document = getNode();
}
// Ensure that the stream con... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSingleNode
File: src/main/java/org/yaml/snakeyaml/composer/Composer.java
Repository: snakeyaml
The code follows secure coding practices. | [
"CWE-776"
] | CVE-2022-25857 | HIGH | 7.5 | snakeyaml | getSingleNode | src/main/java/org/yaml/snakeyaml/composer/Composer.java | fc300780da21f4bb92c148bc90257201220cf174 | 0 |
Analyze the following code function for security vulnerabilities | protected void writeAuthTokenIntoCacheLocked(UserAccounts accounts,
Account account, String key, String value) {
Map<String, String> authTokensForAccount = accounts.authTokenCache.get(account);
if (authTokensForAccount == null) {
authTokensForAccount = accounts.accountsDb.findAut... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeAuthTokenIntoCacheLocked
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | writeAuthTokenIntoCacheLocked | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public List<Cliente> buscarFuncionarioNome(String nome) throws SQLException, ClassNotFoundException {
Connection con = null;
PreparedStatement stmt = null;
ResultSet rs = null;
try {
con = ConnectionFactory.getConnection();
stmt = con.prepareStatement(stmtBuscarN... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2015-10061
- Severity: MEDIUM
- CVSS Score: 5.2
Description: ClienteDAO - alterados statements para utilizar o metodo setString do PreparedStatement para evitar SQL Injection
- alterados statements para utilizar ilike ao inves de like para pesquisar sem case sensi... | [
"CWE-89"
] | CVE-2015-10061 | MEDIUM | 5.2 | evandro-machado/Trabalho-Web2 | buscarFuncionarioNome | src/java/br/com/magazine/dao/ClienteDAO.java | f59ac954625d0a4f6d34f069a2e26686a7a20aeb | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void setInterruptionFilter(String pkg, int filter) throws RemoteException {
enforcePolicyAccess(pkg, "setInterruptionFilter");
final int zen = NotificationManager.zenModeFromInterruptionFilter(filter, -1);
if (zen == -1) throw new IllegalArgumentException("In... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setInterruptionFilter
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | setInterruptionFilter | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | private void cleanUpOldUsers() {
// This is needed in case the broadcast {@link Intent.ACTION_USER_REMOVED} was not handled
// before reboot
Set<Integer> usersWithProfileOwners;
Set<Integer> usersWithData;
synchronized (getLockObject()) {
usersWithProfileOwners = mOwn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanUpOldUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | cleanUpOldUsers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isKeyguardHostWindow(WindowManager.LayoutParams attrs) {
return attrs.type == TYPE_STATUS_BAR;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyguardHostWindow
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | isKeyguardHostWindow | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DynamicForm withGlobalError(final String error) {
return withGlobalError(error, new ArrayList<>());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withGlobalError
File: web/play-java-forms/src/main/java/play/data/DynamicForm.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | withGlobalError | web/play-java-forms/src/main/java/play/data/DynamicForm.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Iterable<File> successors(File file) {
return fileTreeChildren(file);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: successors
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-8908 | LOW | 2.1 | google/guava | successors | android/guava/src/com/google/common/io/Files.java | fec0dbc4634006a6162cfd4d0d09c962073ddf40 | 0 |
Analyze the following code function for security vulnerabilities | public void setCriteriaService(XWikiCriteriaService criteriaService)
{
this.criteriaService = criteriaService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCriteriaService
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | setCriteriaService | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public TranslationBundle getBundle(String bundleId) throws TranslationBundleDoesNotExistsException
{
String roleHint = ID_PREFIX + bundleId;
if (this.componentManagerProvider.get().hasComponent(TranslationBundle.class, roleHint)) {
try {
return this.compone... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBundle
File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFa... | [
"CWE-74"
] | CVE-2023-29510 | HIGH | 8.8 | xwiki/xwiki-platform | getBundle | xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java | d06ff8a58480abc7f63eb1d4b8b366024d990643 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isJsonMime(String mime) {
String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$";
return mime != null && (mime.matches(jsonMime) || mime.equals("*/*"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isJsonMime
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding pra... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | isJsonMime | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public KeyguardAffordanceView getRightIcon() {
return getLayoutDirection() == LAYOUT_DIRECTION_RTL
? mKeyguardBottomArea.getLeftView()
: mKeyguardBottomArea.getRightView();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRightIcon
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getRightIcon | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private List<Gadget> prepareGadgets(List<BaseObject> objects, Syntax sourceSyntax,
MacroTransformationContext context) throws Exception
{
List<Gadget> gadgets = new ArrayList<>();
// prepare velocity tools to render title
VelocityContext velocityContext = velocityManager.getVelocity... | Vulnerability Classification:
- CWE: CWE-94
- CVE: CVE-2021-32621
- Severity: MEDIUM
- CVSS Score: 6.5
Description: XWIKI-17794: Properly interpret velocity in gadget titles
Function: prepareGadgets
File: xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/int... | [
"CWE-94"
] | CVE-2021-32621 | MEDIUM | 6.5 | xwiki/xwiki-platform | prepareGadgets | xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java | bb7068bd911f91e5511f3cfb03276c7ac81100bc | 1 |
Analyze the following code function for security vulnerabilities | private void startMoveAnimation(int left, int top) {
// If we are an inset provider, all our animations are driven by the inset client.
if (mControllableInsetProvider != null) {
return;
}
ProtoLog.v(WM_DEBUG_ANIM, "Setting move animation on %s", this);
final Point o... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startMoveAnimation
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | startMoveAnimation | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.