instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private HashMap<String, String> cleanString(HashMap<String, String> strList, String[] allowed) { String allow = ""; HashMap<String, String> cleaned = null; Iterator<String> it = null; String cleanStr = null; String key = null; for (int i = 0; i < allowed.length; i++) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanString File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java Repository: jflyfox/jfinal_cms The code follows secure coding practices.
[ "CWE-74" ]
CVE-2021-37262
MEDIUM
5
jflyfox/jfinal_cms
cleanString
src/main/java/com/jflyfox/modules/filemanager/FileManager.java
e7fd0fe9362464c4d2bd308318eecc89a847b116
0
Analyze the following code function for security vulnerabilities
public void dumpPendingOperations(StringBuilder sb) { sb.append("Pending Ops: ").append(mPendingOperations.size()).append(" operation(s)\n"); for (PendingOperation pop : mPendingOperations) { sb.append("(info: " + pop.target.toString()) .append(", extras: " + pop.extras) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpPendingOperations File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
dumpPendingOperations
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
private Map<String, List<String>> getHeaders(RoutingContext ctx) { Map<String, List<String>> h = new HashMap<>(); MultiMap headers = ctx.request().headers(); for (String header : headers.names()) { h.put(header, headers.getAll(header)); } return h; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaders File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java Repository: quarkusio/quarkus The code follows secure coding practices.
[ "CWE-444" ]
CVE-2022-2466
CRITICAL
9.8
quarkusio/quarkus
getHeaders
extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java
08e5c3106ce4bfb18b24a38514eeba6464668b07
0
Analyze the following code function for security vulnerabilities
private void appendExtraInformation(StringBuilder breadcrumb) { if (StringUtil.isDefined(getExtraInformation())) { if (breadcrumb.length() > 0) { breadcrumb.append(CONNECTOR); } breadcrumb.append("<span class=\"information\">"); breadcrumb.append(getExtraInformation()); breadcr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendExtraInformation File: core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
appendExtraInformation
core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public JDK getJDK(String name) { if(name==null) { // if only one JDK is configured, "default JDK" should mean that JDK. List<JDK> jdks = getJDKs(); if(jdks.size()==1) return jdks.get(0); return null; } for (JDK j : getJDKs()) { if(j.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJDK File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getJDK
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public static int makeKey(int type, int userId) { return (type << SETTINGS_TYPE_SHIFT) | userId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeKey File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
makeKey
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
protected final void initContentViewCore() { initContentViewCore(ContentViewUtil.createNativeWebContents(mIncognito)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initContentViewCore File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
initContentViewCore
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Unstable public boolean exists(PageReference reference, XWikiContext context) { // Try as space DocumentReference documentReference = getCurrentReferenceDocumentReferenceResolver().resolve(reference); if (exists(documentReference, context)) { return true; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exists File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
exists
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
private void removeUserNow() { if (mRemovingUserId == UserHandle.myUserId()) { removeThisUser(); } else { new Thread() { public void run() { synchronized (mUserLock) { mUserManager.removeUser(mRemovingUserId); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUserNow File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
removeUserNow
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
@Override public void shutdown() { try { sendShutdown(); channel.close(); } finally { server.getClientConnectionManager().disconnect(connection.id); if (OLogManager.instance().isDebugEnabled()) OLogManager.instance().debug(this, "Connection closed"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shutdown File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
shutdown
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
public boolean isTopologyRecoveryEnabled() { return topologyRecovery; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTopologyRecoveryEnabled File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
isTopologyRecoveryEnabled
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
List<Rect> getSystemGestureExclusion() { return mExclusionRects; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSystemGestureExclusion File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getSystemGestureExclusion
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public String getRequestURL() throws XWikiException { return getXWikiContext().getURLFactory().getRequestURL(getXWikiContext()).toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getRequestURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public void setUseDesktopUserAgent(boolean useDesktop, boolean reloadOnChange) { if (mContentViewCore != null) { mContentViewCore.setUseDesktopUserAgent(useDesktop, reloadOnChange); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseDesktopUserAgent File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
setUseDesktopUserAgent
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public double getScale() { return scale; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getScale File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java Repository: plantuml The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-1231
MEDIUM
4.3
plantuml
getScale
src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
c9137be051ce98b3e3e27f65f54ec7d9f8886903
0
Analyze the following code function for security vulnerabilities
public static final boolean is64Bit() { return VMRuntime.getRuntime().is64Bit(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: is64Bit File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
is64Bit
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public static String getProjection(String query) { Assert.hasText(query, "Query must not be null or empty!"); Matcher matcher = PROJECTION_CLAUSE.matcher(query); return matcher.find() ? matcher.group(1) : ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProjection File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
getProjection
src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
protected boolean isEncrypting() { return encrypting; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEncrypting File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
isEncrypting
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
@NonNull @RequiresPermission(value = Manifest.permission.WHITELIST_RESTRICTED_PERMISSIONS, conditional = true) public Set<String> getAllowlistedRestrictedPermissions(@NonNull String packageName, @PackageManager.PermissionWhitelistFlags int allowlistFlag) { try { final...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllowlistedRestrictedPermissions File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getAllowlistedRestrictedPermissions
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public static String getViewExt(String type) { if ("freemarker".equals(type)) { return ".ftl"; } else { return ".jsp"; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewExt File: common/src/main/java/com/zrlog/util/ZrLogUtil.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getViewExt
common/src/main/java/com/zrlog/util/ZrLogUtil.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@Override public SSLSessionInfo getSslSessionInfo() { return sslSessionInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSslSessionInfo File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
getSslSessionInfo
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
@PipelineProperty(description = "The XML fragment wrapper that should be used to wrap the input XML.") @PipelinePropertyDocRef(types=TextConverter.ENTITY_TYPE) public void setTextConverter(final DocRef textConverterRef) { this.textConverterRef = textConverterRef; }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000651 - Severity: HIGH - CVSS Score: 7.5 Description: gh-813 Turn on secure processing feature for XML parsers etc Function: setTextConverter File: stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java Repository: gchq/stro...
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
setTextConverter
stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
1
Analyze the following code function for security vulnerabilities
public final void publishContentProviders(IApplicationThread caller, List<ContentProviderHolder> providers) { if (providers == null) { return; } enforceNotIsolatedCaller("publishContentProviders"); synchronized (this) { final ProcessRecord r = getReco...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: publishContentProviders File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
publishContentProviders
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private void getEntryBatchSize(CompletableFuture<Integer> batchSizeFuture, PersistentTopic topic, MessageIdImpl messageId, int batchIndex) { if (batchIndex >= 0) { try { ManagedLedgerImpl ledger = (ManagedLedgerImpl) topic.getManagedLedger(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEntryBatchSize File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
getEntryBatchSize
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
@JsonProperty("SubjectDN") public String getSubjectDN() { return subjectDN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSubjectDN File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getSubjectDN
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static byte[] getStreamBytesRaw(PRStream stream, RandomAccessFileOrArray file) throws IOException { PdfReader reader = stream.getReader(); byte b[]; if (stream.getOffset() < 0) b = stream.getBytes(); else { b = new byte[stream.getLength()]; file...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStreamBytesRaw File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
getStreamBytesRaw
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public boolean matchParentBounds() { final Rect overrideBounds = getResolvedOverrideBounds(); if (overrideBounds.isEmpty()) { return true; } // An activity in size compatibility mode may have override bounds which equals to its // parent bounds, so the e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: matchParentBounds File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
matchParentBounds
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public InboxStyle addLine(CharSequence cs) { mTexts.add(safeCharSequence(cs)); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addLine File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
addLine
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public <T> void join(JoinBy from, JoinBy to, String operation, String joinType, Class<T> returnedClazz, CQLWrapper cr, boolean setId, Handler<AsyncResult<Results<T>>> replyHandler){ String filter = ""; if(cr != null){ filter = cr.toString(); } join(from, to, operation, joinType, filter...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: join File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
join
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private OutputStream getOutput() throws IOException { if(os == null) { os = socketInstance.getOutputStream(); } return os; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOutput File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getOutput
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override protected OutputStream getFileOutputLocal(String name) throws DirectoryException { try { return new FileOutputStream(generatePath(name)); } catch (FileNotFoundException e) { throw new DirectoryException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileOutputLocal File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
getFileOutputLocal
brut.j.dir/src/main/java/brut/directory/FileDirectory.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
public void handleAtRule(ApplContext ac, String ident, String string) { style.getWarnings().addWarning(new Warning(cssFouffa.getSourceFile(), cssFouffa.getLine(), "at-rule", 2, new String[]{ident, string}, ac)); //stylesheet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleAtRule File: org/w3c/css/css/StyleSheetParser.java Repository: w3c/css-validator The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-4070
LOW
3.5
w3c/css-validator
handleAtRule
org/w3c/css/css/StyleSheetParser.java
e5c09a9119167d3064db786d5f00d730b584a53b
0
Analyze the following code function for security vulnerabilities
private XWikiDocument beforeDelete(XWikiDocument doc, XWikiContext context) throws XWikiException { XWikiDocument blankDoc = prepareDocumentDelete(doc, context); ObservationManager om = getObservationManager(); // Inform notification mechanisms that a document is about to be deleted ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beforeDelete File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
beforeDelete
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public List<PermissionInfo> queryPermissionsByGroup(String group, int flags) { // reader synchronized (mPackages) { ArrayList<PermissionInfo> out = new ArrayList<PermissionInfo>(10); for (BasePermission p : mSettings.mPermissions.values()) { if (grou...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryPermissionsByGroup File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
queryPermissionsByGroup
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public ClientConfig getClientConfig() { return clientConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientConfig File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getClientConfig
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public String getSQL(Insert insert) { // Insert clause StringBuilder sql = new StringBuilder(); String insertClause = getInsertStatement(insert); sql.append(insertClause); // Table sql.append(" ").append(getTableSQL(insert)); // Columns boo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
public String toString() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: ext/java/nokogiri/Html4SaxParserContext.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-241" ]
CVE-2022-29181
MEDIUM
6.4
sparklemotion/nokogiri
toString
ext/java/nokogiri/Html4SaxParserContext.java
db05ba9a1bd4b90aa6c76742cf6102a7c7297267
0
Analyze the following code function for security vulnerabilities
public OutputStream openFileOutputStream(String file) throws IOException { file = removeFilePrefix(file); OutputStream os = null; try{ os = createFileOuputStream(file); }catch(FileNotFoundException fne){ //It is impossible to know if a path is considered an extern...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openFileOutputStream File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
openFileOutputStream
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void startLockTaskModeByToken(IBinder token) { synchronized (this) { final ActivityRecord r = ActivityRecord.forTokenLocked(token); if (r == null) { return; } startLockTaskModeLocked(r.getTask(), false /* isSystemCaller */); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startLockTaskModeByToken File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startLockTaskModeByToken
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static void serializeAppWidget(XmlSerializer out, Widget widget) throws IOException { out.startTag(null, "g"); out.attribute(null, "id", Integer.toHexString(widget.appWidgetId)); out.attribute(null, "rid", Integer.toHexString(widget.restoredId)); out.attribute(null, "h", Integer....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serializeAppWidget File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
serializeAppWidget
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
private void writeByteDirect(int n) throws TException { writeByteDirect((byte) n); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeByteDirect File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
writeByteDirect
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
boolean isKeyguardLocked(int displayId) { return mKeyguardController.isKeyguardLocked(displayId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyguardLocked File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
isKeyguardLocked
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public void setJSONContextClient(JSONContext.Client jsonContext) { _jsonContext = jsonContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setJSONContextClient File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
setJSONContextClient
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
IIntentSender getIntentSenderLocked(int type, String packageName, String featureId, int callingUid, int userId, IBinder token, String resultWho, int requestCode, Intent[] intents, String[] resolvedTypes, int flags, Bundle bOptions) { ActivityRecord activity = null; if (type == A...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntentSenderLocked File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getIntentSenderLocked
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
CompatibilityInfo compatibilityInfoForPackage(ApplicationInfo ai) { return mAtmInternal.compatibilityInfoForPackage(ai); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compatibilityInfoForPackage File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
compatibilityInfoForPackage
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public int getShutdownTimeout() { return shutdownTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShutdownTimeout File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
getShutdownTimeout
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public void requestNotificationUpdate() { updateNotifications(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestNotificationUpdate File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
requestNotificationUpdate
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static void unzip(String zipFilePath, String targetPath, boolean overwrite) throws IOException { ZipFile zipFile = new ZipFile(zipFilePath); Enumeration<? extends ZipEntry> entryEnum = zipFile.getEntries(); if (null != entryEnum) { while (entryEnum.hasMoreElements()) { ...
Vulnerability Classification: - CWE: CWE-434 - CVE: CVE-2018-12914 - Severity: HIGH - CVSS Score: 7.5 Description: https://github.com/sanluan/PublicCMS/issues/13 Unsafe Unzip bug fix Function: unzip File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java Repository: sanluan/Publ...
[ "CWE-434" ]
CVE-2018-12914
HIGH
7.5
sanluan/PublicCMS
unzip
publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/ZipUtils.java
c19fe66378c75725f3e3a380a6cb9f8b8a7dcb71
1
Analyze the following code function for security vulnerabilities
public String getFullName() { return this.deletedDoc.getFullName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFullName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-29208
HIGH
7.5
xwiki/xwiki-platform
getFullName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java
d9e947559077e947315bf700c5703dfc7dd8a8d7
0
Analyze the following code function for security vulnerabilities
public S3PluginActifactPullRequestDto createS3PluginActifactPullRequest(S3PluginActifactDto pullRequestDto) { if (pullRequestDto == null) { throw new WecubeCoreException("3095", "Illegal argument."); } if (StringUtils.isBlank(pullRequestDto.getKeyName())) { throw new Wec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createS3PluginActifactPullRequest File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure cod...
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
createS3PluginActifactPullRequest
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
private ConsumerBrokerExchange addConsumerBrokerExchange(ConsumerId id) { ConsumerBrokerExchange result = consumerExchanges.get(id); if (result == null) { synchronized (consumerExchanges) { result = new ConsumerBrokerExchange(); TransportConnectionState state ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addConsumerBrokerExchange File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
addConsumerBrokerExchange
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override protected final Object clone() { return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clone File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
clone
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public void setClassLoader(ClassLoader classLoader) { classLoaderReference.setReference(classLoader); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClassLoader File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
setClassLoader
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
boolean setFocusedStack(ActivityRecord r, String reason) { if (r == null) { // Not sure what you are trying to do, but it is not going to work... return false; } final TaskRecord task = r.task; if (task == null || task.stack == null) { Slog.w(TAG, "Can...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocusedStack File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
setFocusedStack
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
private void schedulePersistUriGrants() { if (!mHandler.hasMessages(PERSIST_URI_GRANTS_MSG)) { mHandler.sendMessageDelayed(mHandler.obtainMessage(PERSIST_URI_GRANTS_MSG), 10 * DateUtils.SECOND_IN_MILLIS); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: schedulePersistUriGrants File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
schedulePersistUriGrants
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public List<String> getFollows(String scenarioId) { List<String> result = new ArrayList<>(); if (StringUtils.isBlank(scenarioId)) { return result; } ApiScenarioFollowExample example = new ApiScenarioFollowExample(); example.createCriteria().andScenarioIdEqualTo(scenar...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFollows File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getFollows
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
@Override public void onServiceDisconnected(ComponentName name) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onServiceDisconnected File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
onServiceDisconnected
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public <T> PageSerializable<T> toPageSerializable(Function<E, T> function) { List<T> list = new ArrayList<T>(this.size()); for (E e : this) { list.add(function.apply(e)); } PageSerializable<T> pageSerializable = new PageSerializable<T>(list); pageSerializable.setTotal...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toPageSerializable File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
toPageSerializable
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
@Test public void selectStreamParam(TestContext context) { createNumbers(context, 25, 26, 27) .selectStream("SELECT i FROM numbers WHERE i IN (?, ?, ?) ORDER BY i", new JsonArray().add(25).add(27).add(29), context.asyncAssertSuccess(select -> { intsAsString(select, context.asyncAsser...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectStreamParam File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
selectStreamParam
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public boolean startUserInBackground(final int userId) { return mUserController.startUser(userId, /* foreground */ false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startUserInBackground File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
startUserInBackground
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Deprecated public ServerBuilder tlsAllowUnsafeCiphers(boolean tlsAllowUnsafeCiphers) { virtualHostTemplate.tlsAllowUnsafeCiphers(tlsAllowUnsafeCiphers); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tlsAllowUnsafeCiphers File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
tlsAllowUnsafeCiphers
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public java.lang.Object parseGroovyFromString(String script) throws XWikiException { if (hasProgrammingRights()) { return this.xwiki.parseGroovyFromString(script, getXWikiContext()); } return "groovy_missingrights"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseGroovyFromString File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
parseGroovyFromString
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private boolean isBodyParsed() { return getStartLineNumber() != -1 && getEndLineNumber() == -1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBodyParsed File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
isBodyParsed
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private static void mapQueryCachePredicateConfigXmlGenerator(XmlGenerator gen, QueryCacheConfig queryCacheConfig) { PredicateConfig predicateConfig = queryCacheConfig.getPredicateConfig(); String type = predicateConfig.getClassName() != n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mapQueryCachePredicateConfigXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
mapQueryCachePredicateConfigXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public AdjunctManager getAdjuncts(String dummy) { return adjuncts; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAdjuncts File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getAdjuncts
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public WifiConfiguration getSavedNetworkForScanDetailAndCache(ScanDetail scanDetail) { WifiConfiguration network = getSavedNetworkForScanDetail(scanDetail); if (network == null) { return null; } saveToScanDetailCacheForNetwork(network, scanDetail); // Cache DTIM value...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSavedNetworkForScanDetailAndCache File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getSavedNetworkForScanDetailAndCache
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public void setProviderIndex(long providerIndex) { mProviderIndex = providerIndex; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProviderIndex File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
setProviderIndex
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public byte[] get() throws IOException { if (file == null) { return EmptyArrays.EMPTY_BYTES; } return readFrom(file); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
get
codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M2") public BaseObject getObject(String className, boolean create, XWikiContext context) { return getXObject( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), create, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public static final native int[] getPidsForCommands(String[] cmds);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPidsForCommands File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
getPidsForCommands
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public static <K, V> ConcurrentMap<K, V> newConcurrentHashMap(int initialCapacity, float loadFactor) { return new ConcurrentHashMap<K, V>(initialCapacity, loadFactor); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newConcurrentHashMap File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
newConcurrentHashMap
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@Override public ResolveInfo getLastChosenActivity(Intent intent, String resolvedType, int flags) { final int userId = UserHandle.getCallingUserId(); if (DEBUG_PREFERRED) Log.v(TAG, "Querying last chosen activity for " + intent); List<ResolveInfo> query = queryIntentActivities(intent, resolv...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastChosenActivity File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getLastChosenActivity
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public Map<String, Authentication> getAuthentications() { return authentications; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthentications File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getAuthentications
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void replace(int start, int end, String s) { elide(start, end); sanitizedJson.append(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: replace File: src/main/java/com/google/json/JsonSanitizer.java Repository: OWASP/json-sanitizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-13973
MEDIUM
4.3
OWASP/json-sanitizer
replace
src/main/java/com/google/json/JsonSanitizer.java
53ceaac3e0a10e86d512ce96a0056578f2d1978f
0
Analyze the following code function for security vulnerabilities
void systemPropertiesSet(String key, String value) { SystemProperties.set(key, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: systemPropertiesSet File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
systemPropertiesSet
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void updateAsciiStream(@Positive int columnIndex, @Nullable InputStream inputStream) throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "updateAsciiStream(int, InputStream)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAsciiStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateAsciiStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private void scanDirLI(File dir, int parseFlags, int scanFlags, long currentTime) { final File[] files = dir.listFiles(); if (ArrayUtils.isEmpty(files)) { Log.d(TAG, "No files in app dir " + dir); return; } if (DEBUG_PACKAGE_SCANNING) { Log.d(TAG, "Sc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanDirLI File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
scanDirLI
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Deprecated public BaseObject addObjectFromRequest(String className, XWikiContext context) throws XWikiException { return addObjectFromRequest(className, "", 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObjectFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addObjectFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private void validateAttachments(final Attachable attachable) throws GameParseException { for (final IAttachment a : attachable.getAttachments().values()) { a.validate(data); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateAttachments File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
validateAttachments
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
public String getColumnCastSQL(Column column) { String columnSQL = getColumnSQL(column); return "CAST(" + columnSQL + " AS VARCHAR)"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColumnCastSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getColumnCastSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
public Builder setAllowSslConnectionPool(boolean allowSslConnectionPool) { this.allowSslConnectionPool = allowSslConnectionPool; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowSslConnectionPool File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setAllowSslConnectionPool
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public long getLongValue(DocumentReference classReference, String fieldName) { BaseObject obj = getXObject(classReference, 0); if (obj == null) { return 0; } return obj.getLongValue(fieldName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLongValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getLongValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public void startDocument() throws SAXException { startBuffer(); super.startDocument(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startDocument File: stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
startDocument
stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
public String getRenderedContent() throws XWikiException { return this.doc.getRenderedContent(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setPreloadBlobFromInputStream(Boolean thePreloadBlobFromInputStream) { // ignore }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPreloadBlobFromInputStream File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setPreloadBlobFromInputStream
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public ParaObject checkAuth(HttpServletRequest req, HttpServletResponse res) throws ServletException, IOException { Profile authUser = null; String jwt = HttpUtils.getStateParam(CONF.authCookie(), req); if (isApiRequest(req)) { return checkApiAuth(req); } else if (jwt != null && !StringUtils.endsWithAny(req....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAuth File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
checkAuth
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public Node getSingleNode() { // Drop the STREAM-START event. parser.getEvent(); // Compose a document if the stream is not empty. Node document = null; if (!parser.checkEvent(Event.ID.StreamEnd)) { document = getNode(); } // Ensure that the stream con...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSingleNode File: src/main/java/org/yaml/snakeyaml/composer/Composer.java Repository: snakeyaml The code follows secure coding practices.
[ "CWE-776" ]
CVE-2022-25857
HIGH
7.5
snakeyaml
getSingleNode
src/main/java/org/yaml/snakeyaml/composer/Composer.java
fc300780da21f4bb92c148bc90257201220cf174
0
Analyze the following code function for security vulnerabilities
protected void writeAuthTokenIntoCacheLocked(UserAccounts accounts, Account account, String key, String value) { Map<String, String> authTokensForAccount = accounts.authTokenCache.get(account); if (authTokensForAccount == null) { authTokensForAccount = accounts.accountsDb.findAut...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeAuthTokenIntoCacheLocked File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
writeAuthTokenIntoCacheLocked
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public List<Cliente> buscarFuncionarioNome(String nome) throws SQLException, ClassNotFoundException { Connection con = null; PreparedStatement stmt = null; ResultSet rs = null; try { con = ConnectionFactory.getConnection(); stmt = con.prepareStatement(stmtBuscarN...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2015-10061 - Severity: MEDIUM - CVSS Score: 5.2 Description: ClienteDAO - alterados statements para utilizar o metodo setString do PreparedStatement para evitar SQL Injection - alterados statements para utilizar ilike ao inves de like para pesquisar sem case sensi...
[ "CWE-89" ]
CVE-2015-10061
MEDIUM
5.2
evandro-machado/Trabalho-Web2
buscarFuncionarioNome
src/java/br/com/magazine/dao/ClienteDAO.java
f59ac954625d0a4f6d34f069a2e26686a7a20aeb
1
Analyze the following code function for security vulnerabilities
@Override public void setInterruptionFilter(String pkg, int filter) throws RemoteException { enforcePolicyAccess(pkg, "setInterruptionFilter"); final int zen = NotificationManager.zenModeFromInterruptionFilter(filter, -1); if (zen == -1) throw new IllegalArgumentException("In...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setInterruptionFilter File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
setInterruptionFilter
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private void cleanUpOldUsers() { // This is needed in case the broadcast {@link Intent.ACTION_USER_REMOVED} was not handled // before reboot Set<Integer> usersWithProfileOwners; Set<Integer> usersWithData; synchronized (getLockObject()) { usersWithProfileOwners = mOwn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanUpOldUsers File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
cleanUpOldUsers
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public boolean isKeyguardHostWindow(WindowManager.LayoutParams attrs) { return attrs.type == TYPE_STATUS_BAR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyguardHostWindow File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
isKeyguardHostWindow
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public DynamicForm withGlobalError(final String error) { return withGlobalError(error, new ArrayList<>()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withGlobalError File: web/play-java-forms/src/main/java/play/data/DynamicForm.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
withGlobalError
web/play-java-forms/src/main/java/play/data/DynamicForm.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
@Override public Iterable<File> successors(File file) { return fileTreeChildren(file); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: successors File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
successors
android/guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
public void setCriteriaService(XWikiCriteriaService criteriaService) { this.criteriaService = criteriaService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCriteriaService File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setCriteriaService
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public TranslationBundle getBundle(String bundleId) throws TranslationBundleDoesNotExistsException { String roleHint = ID_PREFIX + bundleId; if (this.componentManagerProvider.get().hasComponent(TranslationBundle.class, roleHint)) { try { return this.compone...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBundle File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFa...
[ "CWE-74" ]
CVE-2023-29510
HIGH
8.8
xwiki/xwiki-platform
getBundle
xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java
d06ff8a58480abc7f63eb1d4b8b366024d990643
0
Analyze the following code function for security vulnerabilities
public boolean isJsonMime(String mime) { String jsonMime = "(?i)^(application/json|[^;/ \t]+/[^;/ \t]+[+]json)[ \t]*(;.*)?$"; return mime != null && (mime.matches(jsonMime) || mime.equals("*/*")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isJsonMime File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding pra...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
isJsonMime
samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public KeyguardAffordanceView getRightIcon() { return getLayoutDirection() == LAYOUT_DIRECTION_RTL ? mKeyguardBottomArea.getLeftView() : mKeyguardBottomArea.getRightView(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRightIcon File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getRightIcon
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private List<Gadget> prepareGadgets(List<BaseObject> objects, Syntax sourceSyntax, MacroTransformationContext context) throws Exception { List<Gadget> gadgets = new ArrayList<>(); // prepare velocity tools to render title VelocityContext velocityContext = velocityManager.getVelocity...
Vulnerability Classification: - CWE: CWE-94 - CVE: CVE-2021-32621 - Severity: MEDIUM - CVSS Score: 6.5 Description: XWIKI-17794: Properly interpret velocity in gadget titles Function: prepareGadgets File: xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/int...
[ "CWE-94" ]
CVE-2021-32621
MEDIUM
6.5
xwiki/xwiki-platform
prepareGadgets
xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java
bb7068bd911f91e5511f3cfb03276c7ac81100bc
1
Analyze the following code function for security vulnerabilities
private void startMoveAnimation(int left, int top) { // If we are an inset provider, all our animations are driven by the inset client. if (mControllableInsetProvider != null) { return; } ProtoLog.v(WM_DEBUG_ANIM, "Setting move animation on %s", this); final Point o...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startMoveAnimation File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
startMoveAnimation
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0