instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | protected <F> void setFilter(F filter) {
this.filter = filter;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFilter
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | setFilter | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | private void abortFailed(UserRequest ureq, String errorMessageKey) {
getWindowControl().setError(translator.translate(errorMessageKey));
status = FolderCommandStatus.STATUS_FAILED;
fireEvent(ureq, FOLDERCOMMAND_FINISHED);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: abortFailed
File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41152 | MEDIUM | 4 | OpenOLAT | abortFailed | src/main/java/org/olat/core/commons/modules/bc/commands/CmdMoveCopy.java | 418bb509ffcb0e25ab4390563c6c47f0458583eb | 0 |
Analyze the following code function for security vulnerabilities | public boolean isRebuilt() {
return this.rebuilt;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRebuilt
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | isRebuilt | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public void setExpireSearchResultsAfterMillis(long theExpireSearchResultsAfterMillis) {
myExpireSearchResultsAfterMillis = theExpireSearchResultsAfterMillis;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setExpireSearchResultsAfterMillis
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setExpireSearchResultsAfterMillis | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void hideBootMessages() {
mHandler.sendEmptyMessage(MSG_HIDE_BOOT_MESSAGE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hideBootMessages
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | hideBootMessages | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onPause() {
if (InPlaceEditView.isEditing()) {
AndroidImplementation.stopEditing(true);
}
super.onPause();
AndroidNativeUtil.onPause();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPause
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | onPause | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | protected InputStream toResourceInputStream(Object restObject) throws JAXBException
{
InputStream resourceStream;
if (restObject instanceof InputStream) {
resourceStream = (InputStream) restObject;
} else if (restObject instanceof byte[]) {
res... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toResourceInputStream
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | toResourceInputStream | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | private static Optional<WebSocket> findSockets(final Set<WebSocket.Definition> sockets,
final String path) {
for (WebSocket.Definition socketDef : sockets) {
Optional<WebSocket> match = socketDef.matches(path);
if (match.isPresent()) {
return match;
}
}
return Optional.empty(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findSockets
File: jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-15477 | MEDIUM | 4.3 | jooby-project/jooby | findSockets | jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java | 34856a738829d8fedca4ed27bd6ff413af87186f | 0 |
Analyze the following code function for security vulnerabilities | private LogMaker newLogMaker(int category, int saveType) {
return newLogMaker(category).addTaggedData(MetricsEvent.FIELD_AUTOFILL_SAVE_TYPE, saveType);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newLogMaker
File: services/autofill/java/com/android/server/autofill/ui/SaveUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | newLogMaker | services/autofill/java/com/android/server/autofill/ui/SaveUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public HttpServletResponse getHttpServletResponse()
{
return this.response;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHttpServletResponse
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-601"
] | CVE-2022-23618 | MEDIUM | 5.8 | xwiki/xwiki-platform | getHttpServletResponse | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java | 5251c02080466bf9fb55288f04a37671108f8096 | 0 |
Analyze the following code function for security vulnerabilities | public GridSingleSelect<T> asSingleSelect() {
return new GridSingleSelect<>(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asSingleSelect
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | asSingleSelect | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public void addOnNetworkUpdateListener(@NonNull OnNetworkUpdateListener listener) {
if (listener == null) {
Log.wtf(TAG, "addOnNetworkUpdateListener: listener must not be null");
return;
}
mListeners.add(listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addOnNetworkUpdateListener
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | addOnNetworkUpdateListener | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public void setResult(int result) {
mResult.set(result);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResult
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | setResult | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | public static void copyResourceFolder(String[] resources, String savePath) throws IOException {
for (String resource : resources) {
String aux = resource.substring(resource.lastIndexOf("/") + 1, resource.length());
File b = new File(savePath + File.separator + aux);
b.createNewFile();
copyLocalResource(re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyResourceFolder
File: src/main/java/widoco/WidocoUtils.java
Repository: dgarijo/Widoco
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4772 | HIGH | 7.8 | dgarijo/Widoco | copyResourceFolder | src/main/java/widoco/WidocoUtils.java | f2279b76827f32190adfa9bd5229b7d5a147fa92 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isOWS(char ch) {
return ch == ' ' || ch == (char) 0x09;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOWS
File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | isOWS | codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | private URL resolve(final Request req, final String path) throws Throwable {
String target = fn.apply(req, path);
return resolve(target);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolve
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | resolve | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public URI getUrl() {
return url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUrl
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getUrl | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getCertifiedText() {
return fCertifiedText;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCertifiedText
File: ext/java/nokogiri/XmlSchema.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | getCertifiedText | ext/java/nokogiri/XmlSchema.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | private GameData parseShallow(final InputStream stream) throws GameParseException, EngineVersionException {
final Element root = parseDom(stream);
parseMapProperties(root);
return data;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseShallow
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parseShallow | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<EPerson> allMembers(Context c, Group g) throws SQLException {
// two queries - first to get all groups which are a member of this group
// second query gets all members of each group in the first query
// Get all groups which are a member of this group
List<Gro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: allMembers
File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | allMembers | dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | public String getPrivateKeyFile() {
return prop.getProperty(TS_PRIVATE_KEY_FILE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrivateKeyFile
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getPrivateKeyFile | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | public static File getMetricsDirectory() {
String neo4jHome = apocConfig().getString(GraphDatabaseSettings.neo4j_home.name());
String metricsSetting = apocConfig().getString("dbms.directories.metrics", neo4jHome + File.separator + "metrics");
File metricsDir = metricsSetting.isEmpty() ? new Fil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetricsDirectory
File: core/src/main/java/apoc/util/FileUtils.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23532 | MEDIUM | 6.5 | neo4j-contrib/neo4j-apoc-procedures | getMetricsDirectory | core/src/main/java/apoc/util/FileUtils.java | 01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handleCommand(ChannelUID channelUID, Command command) {
if (command instanceof RefreshType) {
// Placeholder for later refinement
} else {
if (channelUID.getId().equals(RUN)) {
if (command instanceof OnOffType) {
if (c... | Vulnerability Classification:
- CWE: CWE-863
- CVE: CVE-2020-5242
- Severity: HIGH
- CVSS Score: 9.3
Description: Merge pull request from GHSA-w698-693g-23hv
* fix arbitrary code execution vulnerability
Signed-off-by: Jan N. Klug <jan.n.klug@rub.de>
* Update bundles/org.openhab.binding.exec/src/main/java/org/openha... | [
"CWE-863"
] | CVE-2020-5242 | HIGH | 9.3 | openhab/openhab-addons | handleCommand | bundles/org.openhab.binding.exec/src/main/java/org/openhab/binding/exec/internal/handler/ExecHandler.java | 4c4cb664f2e2c3866aadf117d22fb54aa8dd0031 | 1 |
Analyze the following code function for security vulnerabilities | public static void main (String[] args) throws URISyntaxException, IOException, ClassNotFoundException, NoSuchMethodException, InvocationTargetException, IllegalAccessException {
URI uri = WarFileLauncher.class.getProtectionDomain().getCodeSource().getLocation().toURI();
String pathFromUri;
if(u... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: main
File: microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java
Repository: ManyDesigns/Portofino
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-3952 | HIGH | 7.1 | ManyDesigns/Portofino | main | microservices/launcher/src/main/java/com/manydesigns/portofino/microservices/launcher/WarFileLauncher.java | 94653cb357806c9cf24d8d294e6afea33f8f0775 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder t(String value) {
return text(value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: t
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | t | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getOffsetLimitSQL(Select select) {
int offset = select.getOffset();
int limit = select.getLimit();
StringBuilder out = new StringBuilder();
if (limit > 0) out.append(" LIMIT ").append(limit);
if (offset > 0) out.append(" OFFSET ").append(offset);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOffsetLimitSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getOffsetLimitSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public VFSLeaf createChildLeaf(String name) {
File fNewFile = new File(getBasefile(), name);
try {
if(!isInPath(name)) {
log.warn("Could not create a new leaf::{} in container::{} - file out of parent directory", name, getBasefile().getAbsolutePath());
return null;
}
if(!fNewFile.getPare... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-41242
- Severity: HIGH
- CVSS Score: 7.9
Description: OO-5819: clean starting / for backward compatibility
Function: createChildLeaf
File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
Repository: OpenOLAT
Fixed Code:
@Override
public VFSLeaf c... | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | createChildLeaf | src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java | 336d5ce80681be61a0bbf4f73d2af5d1ff67e93a | 1 |
Analyze the following code function for security vulnerabilities | private boolean performRollbackManagerRestore(int userId, int token, PackageInstalledInfo res,
PostInstallData data) {
final String packageName = res.mPkg.getPackageName();
final int[] allUsers = mPm.mUserManager.getUserIds();
final int[] installedUsers;
final PackageSetting... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performRollbackManagerRestore
File: services/core/java/com/android/server/pm/InstallPackageHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21257 | HIGH | 7.8 | android | performRollbackManagerRestore | services/core/java/com/android/server/pm/InstallPackageHelper.java | 1aec7feaf07e6d4568ca75d18158445dbeac10f6 | 0 |
Analyze the following code function for security vulnerabilities | private void startOwnerService(int userId, String actionForLog) {
final ComponentName owner = getOwnerComponent(userId);
if (owner != null) {
mDeviceAdminServiceController.startServiceForAdmin(
owner.getPackageName(), userId, actionForLog);
invalidateBinderCac... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startOwnerService
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | startOwnerService | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<StackInfo> getAllStackInfos() throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(GET_ALL_STACK_INFOS_TRANSACTION, data, reply, 0);
reply.read... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllStackInfos
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getAllStackInfos | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public String debugRun(RunDefinitionRequest request, List<MultipartFile> bodyFiles, List<MultipartFile> scenarioFiles) {
return apiScenarioExecuteService.debug(request, bodyFiles, scenarioFiles);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: debugRun
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | debugRun | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | @Contract(pure = false, value = "null -> fail")
public static <T extends AccessibleObject> T openAccess(T object) {
setAccessible(object, true);
return object;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openAccess
File: api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java
Repository: Karlatemp/UnsafeAccessor
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-31139 | MEDIUM | 4.3 | Karlatemp/UnsafeAccessor | openAccess | api/src/main/java/io/github/karlatemp/unsafeaccessor/Root.java | 4ef83000184e8f13239a1ea2847ee401d81585fd | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("test")
@Operation(summary = "Update a Test Element onto a given course", description = "This attaches a Test Element onto a given course. The element will be\n" +
" inserted underneath the supplied parentNodeId")
@ApiResponse(responseCode = "200", description = "The test node metadatas", content = {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachTest
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | attachTest | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void requestInterruptionFilterFromListener(INotificationListener token,
int interruptionFilter) throws RemoteException {
final long identity = Binder.clearCallingIdentity();
try {
synchronized (mNotificationList) {
fina... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestInterruptionFilterFromListener
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | requestInterruptionFilterFromListener | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long getProviderIndex() {
return mProviderIndex;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProviderIndex
File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | getProviderIndex | service/java/com/android/server/wifi/hotspot2/PasspointManager.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | public byte[] getPageContent(int pageNum) throws IOException{
RandomAccessFileOrArray rf = getSafeFile();
try {
rf.reOpen();
return getPageContent(pageNum, rf);
}
finally {
try{rf.close();}catch(Exception e){}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageContent
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getPageContent | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public X509Certificate getCaCertificate() {
return mCaCert;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCaCertificate
File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3897 | MEDIUM | 4.3 | android | getCaCertificate | wifi/java/android/net/wifi/WifiEnterpriseConfig.java | 81be4e3aac55305cbb5c9d523cf5c96c66604b39 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void selectSingle(TestContext context) {
postgresClient = createNumbers(context, 41, 42, 43);
postgresClient.selectSingle("SELECT i FROM numbers WHERE i IN (41, 43, 45) ORDER BY i",
context.asyncAssertSuccess(select -> {
context.assertEquals(41, select.getInteger(0));
})... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: selectSingle
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | selectSingle | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private PageReferenceResolver<EntityReference> getCurrentGetPageResolver()
{
if (this.currentgetpageResolver == null) {
this.currentgetpageResolver = Utils.getComponent(PageReferenceResolver.TYPE_REFERENCE, "currentgetpage");
}
return this.currentgetpageResolver;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentGetPageResolver
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getCurrentGetPageResolver | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public V remove(K key) {
Jedis jedis = jedisPool.getResource();
byte[] byteKey = getKey(key);
V value = valueSerializer.deserialize(jedis.get(byteKey));
jedis.del(byteKey);
jedis.close();
return value;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: remove
File: publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-46990 | CRITICAL | 9.8 | sanluan/PublicCMS | remove | publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java | c7bf58bf07fdc60a71134c6a73a4947c7709abf7 | 0 |
Analyze the following code function for security vulnerabilities | public String getSpaceFilter(Profile authUser, String spaceId) {
if (isAllSpaces(spaceId)) {
if (authUser != null && authUser.hasSpaces()) {
return "(" + authUser.getSpaces().stream().map(s -> "properties.space:\"" + s + "\"").
collect(Collectors.joining(" OR ")) + ")";
} else {
return "properties... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpaceFilter
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getSpaceFilter | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public static String schedule(String pipelineName) {
return BASE + SCHEDULE_PATH.replaceAll(":pipeline_name", pipelineName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: schedule
File: spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | schedule | spark/spark-base/src/main/java/com/thoughtworks/go/spark/Routes.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | public static String getLineColumnNumber(Location location) {
StringBuilder builder = new StringBuilder("[");
builder.append(location.getLineNumber()).append(",").append(location.getColumnNumber()).append("]");
return builder.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLineColumnNumber
File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-2582 | MEDIUM | 4 | keycloak | getLineColumnNumber | saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java | 0cb5ba0f6e83162d221681f47b470c3042eef237 | 0 |
Analyze the following code function for security vulnerabilities | @Override
MapConfig getDefault(Config c) {
return c.getMapConfig("default");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefault
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | getDefault | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | final void addProcessToGcListLocked(ProcessRecord proc) {
boolean added = false;
for (int i=mProcessesToGc.size()-1; i>=0; i--) {
if (mProcessesToGc.get(i).lastRequestedGc <
proc.lastRequestedGc) {
added = true;
mProcessesToGc.add(i+1, proc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addProcessToGcListLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | addProcessToGcListLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void configure() {
memoryStore(binder(), s -> s.maximumSize(1000));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: configure
File: ratpack-session/src/main/java/ratpack/session/SessionModule.java
Repository: ratpack
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2019-11808 | MEDIUM | 4.3 | ratpack | configure | ratpack-session/src/main/java/ratpack/session/SessionModule.java | f2b63eb82dd71194319fd3945f5edf29b8f3a42d | 0 |
Analyze the following code function for security vulnerabilities | public void setSystemServiceManager(SystemServiceManager mgr) {
mSystemServiceManager = mgr;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSystemServiceManager
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setSystemServiceManager | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate57(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
try {
String content = FileUtils.readFileToString(file, StandardCharsets.UTF_8);
content = StringUtils.replace(content,
"io.onedev.server.model.support.inputspec.numberinput.",
"io.onedev.se... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate57
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate57 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | static void logSurface(WindowState w, String msg, RuntimeException where) {
String str = " SURFACE " + msg + ": " + w;
if (where != null) {
Slog.i(TAG, str, where);
} else {
Slog.i(TAG, str);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logSurface
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | logSurface | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void uploadFile(String uploadKey) {
mCurrentUpload = mPendingUploads.get(uploadKey);
if (mCurrentUpload != null) {
/// Check account existence
if (!accountManager.exists(mCurrentUpload.getAccount())) {
Log_OC.w(TAG, "Account " + mCurrentUpload.getAccount()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uploadFile
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | uploadFile | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | private void actionValidate(int currentStackDepth, Element ele, Node parentNode, String tagName, String tagNameLowerCase, Tag tag, boolean masqueradingParam, Tag embedTag, NodeList eleChildNodes) throws ScanException {
/*
* If doing <param> as <embed>, now is the time to convert it.
*/
String nameVal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: actionValidate
File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
Repository: nahsra/antisamy
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-28367 | MEDIUM | 4.3 | nahsra/antisamy | actionValidate | src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java | 0199e7e194dba5e7d7197703f43ebe22401e61ae | 0 |
Analyze the following code function for security vulnerabilities | public void setMaxSessionCookieSize(int maxSessionCookieSize) {
if (maxSessionCookieSize < 1024 || maxSessionCookieSize > 4096) {
this.maxSessionCookieSize = 2048;
} else {
this.maxSessionCookieSize = maxSessionCookieSize;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaxSessionCookieSize
File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java
Repository: ratpack
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2021-29481 | MEDIUM | 5 | ratpack | setMaxSessionCookieSize | ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java | 60302fae7ef26897b9a0ec0def6281a9425344cf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final int available() throws IOException {
ensureOpen();
final long len = nativeAssetGetRemainingLength(mAssetNativePtr);
return len > Integer.MAX_VALUE ? Integer.MAX_VALUE : (int) len;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: available
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | available | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public static HttpRequest options(final String destination) {
return new HttpRequest()
.method(HttpMethod.OPTIONS)
.set(destination);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: options
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | options | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void clear()
{
xObjects.clear();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clear
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | clear | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | private JsonObject readObject(boolean objectWithoutBraces, int depth) throws IOException, ParseException {
if (!objectWithoutBraces) read();
JsonObject object=new JsonObject();
skipWhiteSpace();
while (true) {
if (objectWithoutBraces) {
if (isEndOfText()) break;
} else {
if (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readObject
File: src/main/org/hjson/HjsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | readObject | src/main/org/hjson/HjsonParser.java | 00e3b1325cb6c2b80b347dbec9181fd17ce0a599 | 0 |
Analyze the following code function for security vulnerabilities | private File getCustomLogoFile() {
return new File(Bootstrap.getSiteDir(), "logo.png");
} | Vulnerability Classification:
- CWE: CWE-552
- CVE: CVE-2022-39208
- Severity: HIGH
- CVSS Score: 7.5
Description: Fix security vulnerability issue regarding site/* access
Function: getCustomLogoFile
File: server-core/src/main/java/io/onedev/server/web/component/brandlogo/BrandLogoPanel.java
Repository: theonedev/one... | [
"CWE-552"
] | CVE-2022-39208 | HIGH | 7.5 | theonedev/onedev | getCustomLogoFile | server-core/src/main/java/io/onedev/server/web/component/brandlogo/BrandLogoPanel.java | 8aa94e0daf8447cdf76d4f27bfda0a85a7ea5822 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void extendPulse() {
mDozeScrimController.extendPulse();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extendPulse
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | extendPulse | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | void storeMediaPackage(MediaPackage mediaPackage, AccessControlList acl, Date now)
throws SearchServiceDatabaseException, UnauthorizedException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: storeMediaPackage
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-21318 | MEDIUM | 5.5 | opencast | storeMediaPackage | modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabase.java | b18c6a7f81f08ed14884592a6c14c9ab611ad450 | 0 |
Analyze the following code function for security vulnerabilities | private static int getIntProperty(Properties props, String key, int defaultValue) {
String result = props.getProperty(key);
if (result != null) {
try {
return Integer.parseInt(result);
} catch (NumberFormatException e) {
e.printStackTrace();
}
}
return defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntProperty
File: umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java
Repository: umlet
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000548 | MEDIUM | 6.8 | umlet | getIntProperty | umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java | e1c4cc6ae692cc8d1c367460dbf79343e996f9bd | 0 |
Analyze the following code function for security vulnerabilities | private boolean isKeyguardShowingAndNotOccluded() {
if (mKeyguardDelegate == null) return false;
return mKeyguardDelegate.isShowing() && !mKeyguardOccluded;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyguardShowingAndNotOccluded
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | isKeyguardShowingAndNotOccluded | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void setWritable(boolean b) {
internal.setWritable(b);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setWritable
File: src/net/sourceforge/plantuml/security/SFile.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | setWritable | src/net/sourceforge/plantuml/security/SFile.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("check")
@Csrf
@ResponseBody
public boolean check(@RequestAttribute SysSite site, @RequestParam("fileNames[]") String[] fileNames, String path) {
if (null != fileNames) {
for (String fileName : fileNames) {
String filepath = CommonUtils.joinString(path, Co... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-51252 | MEDIUM | 5.4 | sanluan/PublicCMS | check | publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/cms/CmsWebFileAdminController.java | 2459a3f92c680ae011a369f32306c17df07caaa0 | 0 |
Analyze the following code function for security vulnerabilities | private boolean denyIfQueueLimitReached(SmsTracker tracker) {
if (mPendingTrackerCount >= MO_MSG_QUEUE_LIMIT) {
// Deny sending message when the queue limit is reached.
Rlog.e(TAG, "Denied because queue limit reached");
tracker.onFailed(mContext, RESULT_ERROR_LIMIT_EXCEEDED, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: denyIfQueueLimitReached
File: src/java/com/android/internal/telephony/SMSDispatcher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3858 | HIGH | 9.3 | android | denyIfQueueLimitReached | src/java/com/android/internal/telephony/SMSDispatcher.java | df31d37d285dde9911b699837c351aed2320b586 | 0 |
Analyze the following code function for security vulnerabilities | private void startClient(ClientMonitor newClient, boolean initiatedByClient) {
ClientMonitor currentClient = mCurrentClient;
if (currentClient != null) {
if (DEBUG) Slog.v(TAG, "request stop current client " + currentClient.getOwnerString());
currentClient.stop(initiatedByClient)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startClient
File: services/core/java/com/android/server/fingerprint/FingerprintService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | startClient | services/core/java/com/android/server/fingerprint/FingerprintService.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public Builder version(String version) {
if (!ClickHouseChecker.isNullOrEmpty(version)) {
options.put(ClickHouseClientOption.SERVER_VERSION.getKey(), version);
} else {
options.remove(ClickHouseClientOption.SERVER_VERSION.getKey());
}
retur... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: version
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | version | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | protected static String getCharsetFromContentTypeHeader(String type, StringBuffer remainder) {
if (type == null) {
return null;
}
// Parse type to set encoding if needed
StringTokenizer st = new StringTokenizer(type, ";");
String localEncoding = null;
while (s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCharsetFromContentTypeHeader
File: src/java/winstone/WinstoneResponse.java
Repository: jenkinsci/winstone
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2011-4344 | LOW | 2.6 | jenkinsci/winstone | getCharsetFromContentTypeHeader | src/java/winstone/WinstoneResponse.java | 410ed3001d51c689cf59085b7417466caa2ded7b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Intent createShowAdminSupportIntent(int userId, boolean useDefaultIfNoAdmin) {
// This method is called from AM with its lock held, so don't take the DPMS lock.
// b/29242568
if (getEnforcingAdminAndUserDetailsInternal(userId, null) != null
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createShowAdminSupportIntent
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | createShowAdminSupportIntent | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private DomNode getFirstChildElement(final DomNode parent) {
DomNode node = parent.getFirstChild();
while (node != null && !isAccepted(node)) {
node = node.getNextSibling();
}
return node;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstChildElement
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | getFirstChildElement | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | static void reduceToContent(final XMLStringBuffer buffer, final String startMarker, final String endMarker) {
int i = 0;
int startContent = -1;
final int l1 = startMarker.length();
final int l2 = endMarker.length();
while (i < buffer.length - l1 - l2) {
final char c = buffer.ch[buffer.offset+i];
if (Cha... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reduceToContent
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | reduceToContent | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | protected Map<String, QName> createMap() {
return Collections.synchronizedMap(new HashMap<String, QName>());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createMap
File: src/main/java/org/dom4j/tree/QNameCache.java
Repository: dom4j
The code follows secure coding practices. | [
"CWE-91"
] | CVE-2018-1000632 | MEDIUM | 5 | dom4j | createMap | src/main/java/org/dom4j/tree/QNameCache.java | e598eb43d418744c4dbf62f647dd2381c9ce9387 | 0 |
Analyze the following code function for security vulnerabilities | public Jooby timezone(final ZoneId zoneId) {
this.zoneId = requireNonNull(zoneId, "ZoneId required.");
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: timezone
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | timezone | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dumpHigh(FileDescriptor fd, PrintWriter pw, String[] args,
boolean asProto) {
dump(fd, pw, new String[] {"-a"}, asProto);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpHigh
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | dumpHigh | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void chooseHeight(CharSequence text, int start, int end,
int spanstartv, int v,
Paint.FontMetricsInt fm) {
// Should not get called, at least not by StaticLayout.
chooseHeight(text, start, end, spanstartv, v, fm, null);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: chooseHeight
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | chooseHeight | core/java/android/content/res/StringBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | private void setPendingLock(boolean hasPendingLock) {
mPendingLock = hasPendingLock;
Trace.traceCounter(Trace.TRACE_TAG_APP, "pendingLock", mPendingLock ? 1 : 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPendingLock
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | setPendingLock | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private void updateLockTaskFeaturesLocked(int flags, int userId) {
long ident = mInjector.binderClearCallingIdentity();
try {
mInjector.getIActivityTaskManager().updateLockTaskFeatures(userId, flags);
} catch (RemoteException e) {
// Not gonna happen.
} finally {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateLockTaskFeaturesLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | updateLockTaskFeaturesLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean isBillingEnabled() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBillingEnabled
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isBillingEnabled | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void removeContentProviderExternal(String name, IBinder token) {
enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY,
"Do not have permission in call removeContentProviderExternal()");
int userId = UserHandle.getCallingUserId();
long ident ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContentProviderExternal
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | removeContentProviderExternal | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String getTwitterLoginURL() {
return getParaEndpoint() + "/twitter_auth?state=" + getParaAppId();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTwitterLoginURL
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getTwitterLoginURL | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | private static String method(final String methodParam, final NativeRequest request)
throws Exception {
Optional<String> header = request.header(methodParam);
if (header.isPresent()) {
return header.get();
}
List<String> param = request.params(methodParam);
return param.size() == 0 ? requ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: method
File: jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-15477 | MEDIUM | 4.3 | jooby-project/jooby | method | jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java | 34856a738829d8fedca4ed27bd6ff413af87186f | 0 |
Analyze the following code function for security vulnerabilities | public static boolean scheduleAsRegularPriority(int tid, boolean suppressLogs) {
try {
Process.setThreadScheduler(tid, Process.SCHED_OTHER, 0);
return true;
} catch (IllegalArgumentException e) {
if (!suppressLogs) {
Slog.w(TAG, "Failed to set scheduli... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleAsRegularPriority
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | scheduleAsRegularPriority | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void onCancelled(GestureDescription gestureDescription) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCancelled
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | onCancelled | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | public List<Delta> getRenderedContentDiff(String fromRev, String toRev, XWikiContext context)
throws XWikiException, DifferentiationFailedException
{
XWikiDocument fromDoc = context.getWiki().getDocument(this, fromRev, context);
XWikiDocument toDoc = context.getWiki().getDocument(this, toRev... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContentDiff
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRenderedContentDiff | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTransWrappedSessionKey(String transWrappedSessionKey) {
attributes.put(TRANS_WRAPPED_SESSION_KEY, transWrappedSessionKey);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTransWrappedSessionKey
File: base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setTransWrappedSessionKey | base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void parseResourceInitialization(final List<Element> elements) throws GameParseException {
for (final Element current : elements) {
final PlayerId player = getPlayerId(current, "player", true);
final Resource resource = getResource(current, "resource", true);
final int quantity = Integer.p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseResourceInitialization
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parseResourceInitialization | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | private void startAppNotificationSettingsActivity(String packageName, final int appUid,
final NotificationChannel channel) {
final Intent intent = new Intent(Settings.ACTION_APP_NOTIFICATION_SETTINGS);
intent.putExtra(Settings.EXTRA_APP_PACKAGE, packageName);
intent.putExtra(Settings... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startAppNotificationSettingsActivity
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | startAppNotificationSettingsActivity | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void setAppOpsPolicy(@Nullable CheckOpsDelegate appOpsPolicy) {
mAppOpsService.setAppOpsPolicy(appOpsPolicy);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAppOpsPolicy
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | setAppOpsPolicy | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public void sendSMS(final String phoneNumber, final String message, boolean i) throws IOException {
/*if(!checkForPermission(Manifest.permission.SEND_SMS, "This is required to send a SMS")){
return;
}*/
if(!checkForPermission(Manifest.permission.READ_PHONE_STATE, "This is required to... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendSMS
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | sendSMS | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static void cursorStringToInsertHelper(Cursor cursor, String field,
InsertHelper inserter, int index) {
inserter.bind(index, cursor.getString(cursor.getColumnIndexOrThrow(field)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cursorStringToInsertHelper
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | cursorStringToInsertHelper | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | public void setProcessForeground(IBinder token, int pid,
boolean isForeground) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
data.writeInt(p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProcessForeground
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | setProcessForeground | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public static JAXBContext getContextFor(final Class<?> clazz) throws JAXBException {
LOG.trace("Getting context for class {}", clazz);
final JAXBContext context;
if (m_contexts.containsKey(clazz)) {
context = m_contexts.get(clazz);
} else {
final Collection<Class<... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContextFor
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | getContextFor | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | public void createTenant(String tenant) {
StopWatch stopWatch = StopWatch.createStarted();
log.info("START - SETUP:CreateTenant: tenantKey: {}", tenant);
try {
tenantListRepository.addTenant(tenant);
databaseService.create(tenant.toLowerCase());
databaseServi... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2019-15557
- Severity: HIGH
- CVSS Score: 7.5
Description: fix create schema for new tenant
Function: createTenant
File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java
Repository: xm-online/xm-uaa
Fixed Code:
public void createTenant(String ten... | [
"CWE-89"
] | CVE-2019-15557 | HIGH | 7.5 | xm-online/xm-uaa | createTenant | src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java | bd235434f119c67090952e08fc28abe41aea2e2c | 1 |
Analyze the following code function for security vulnerabilities | private TrustManager getTrustManager() {
TrustManager trust = (TrustManager) mContext.getSystemService(Context.TRUST_SERVICE);
if (trust == null) {
Log.e(TAG, "Can't get TrustManagerService: is it running?",
new IllegalStateException("Stack trace:"));
}
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTrustManager
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | getTrustManager | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | public static String numberToString(Number number) throws JSONException {
if (number == null) {
throw new JSONException("Null pointer");
}
testValidity(number);
// Shave off trailing zeros and decimal point, if possible.
String string = number.toString();
if... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: numberToString
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | numberToString | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | protected Date checkoutDateValue(Cell cell) {
Date date = cell.asDate();
if (date != null) return date;
String date2str = cell.asString();
try {
DateTime dt = DateUtil.parse(date2str);
if (dt != null) date = dt.toJdkDate();
} catch (DateException ignored... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkoutDateValue
File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | checkoutDateValue | src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate89(File dataDir, Stack<Integer> versions) {
Map<String, Integer> pullRequestCommentCounts = new HashMap<>();
for (File file: dataDir.listFiles()) {
if (file.getName().startsWith("PullRequestComments.xml")) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate89
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate89 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void fillRect(Object graphics, int x, int y, int w, int h, byte alpha) {
((AndroidGraphics) graphics).fillRect(x, y, w, h, alpha);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillRect
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | fillRect | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static File makeNewCacheFile(final URL source, final VersionString version) {
final CacheLRUWrapper lruHandler = CacheLRUWrapper.getInstance();
synchronized (lruHandler) {
File cacheFile = null;
try {
lruHandler.lock();
lruHandler.load();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeNewCacheFile
File: core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | makeNewCacheFile | core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java | 2ab070cdac087bd208f64fa8138bb709f8d7680c | 0 |
Analyze the following code function for security vulnerabilities | public void addPossiblyUnsafeJavascriptInterface(Object object, String name,
Class<? extends Annotation> requiredAnnotation) {
if (mNativeContentViewCore != 0 && object != null) {
mJavaScriptInterfaces.put(name, object);
nativeAddJavascriptInterface(mNativeContentViewCore, ob... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addPossiblyUnsafeJavascriptInterface
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | addPossiblyUnsafeJavascriptInterface | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void registerForWifiMonitorEvents() {
for (int event : WIFI_MONITOR_EVENTS) {
mWifiMonitor.registerHandler(mInterfaceName, event, getHandler());
}
mWifiMetrics.registerForWifiMonitorEvents(mInterfaceName);
mWifiLastResortWatchdog.registerForWifiMonitorEvents(mInterf... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerForWifiMonitorEvents
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | registerForWifiMonitorEvents | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.