instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private void parseSequence(final Node sequence) throws GameParseException {
parseSteps(getChildren("step", sequence));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseSequence
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parseSequence | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean copyShielded(net.sf.jazzlib.ZipInputStream oZip, VFSLeaf newEntry) {
try(InputStream in = new ShieldInputStream(oZip)) {
return VFSManager.copyContent(in, newEntry);
} catch(Exception e) {
handleIOException("", e);
return false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyShielded
File: src/main/java/org/olat/core/util/ZipUtil.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | copyShielded | src/main/java/org/olat/core/util/ZipUtil.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getMatchUrlCache() {
return myMatchUrlCache;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMatchUrlCache
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | getMatchUrlCache | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | public void setFooterVisible(boolean visible) {
footer.setVisible(visible);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFooterVisible
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setFooterVisible | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | WindowManager.LayoutParams getAttrs() {
return mAttrs;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttrs
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getAttrs | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public boolean isShowingInterstitialPage() {
ContentViewCore contentViewCore = getContentViewCore();
return contentViewCore != null && contentViewCore.isShowingInterstitialPage();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isShowingInterstitialPage
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | isShowingInterstitialPage | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void cleanUnversionedFiles() {
runOrBomb(gitWd().withArgs("clean", gitCleanArgs()));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanUnversionedFiles
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | cleanUnversionedFiles | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void deregister(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {
ctx.deregister(promise);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deregister
File: handler/src/main/java/io/netty/handler/ssl/SslClientHelloHandler.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-34462 | MEDIUM | 6.5 | netty | deregister | handler/src/main/java/io/netty/handler/ssl/SslClientHelloHandler.java | 535da17e45201ae4278c0479e6162bb4127d4c32 | 0 |
Analyze the following code function for security vulnerabilities | protected JSONObject newJSONObject() throws JSONException {
return new JSONObject(this);
} | Vulnerability Classification:
- CWE: CWE-674, CWE-787
- CVE: CVE-2022-45693
- Severity: HIGH
- CVSS Score: 7.5
Description: Fixing StackOverflow error
Function: newJSONObject
File: src/main/java/org/codehaus/jettison/json/JSONTokener.java
Repository: jettison-json/jettison
Fixed Code:
protected JSONObject newJSONObj... | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | newJSONObject | src/main/java/org/codehaus/jettison/json/JSONTokener.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 1 |
Analyze the following code function for security vulnerabilities | private Object[] resolveParams(MethodInvocationContext<?, ?> context, String[] parameterNames) {
Object[] parameterValues;
if (ArrayUtils.isEmpty(parameterNames)) {
parameterValues = context.getParameterValues();
} else {
List list = new ArrayList();
Map<Strin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveParams
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | resolveParams | runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | public ValueRetriever getValueRetriever() {
return valueRetriever;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValueRetriever
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | getValueRetriever | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setOrganizationIdForUser(
@NonNull String callerPackage, @NonNull String organizationId, int userId) {
if (!mHasFeature) {
return;
}
Objects.requireNonNull(callerPackage);
final CallerIdentity caller = getCallerIdentity(callerPackage);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOrganizationIdForUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setOrganizationIdForUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void setContinueNavigationAction(
ContinueNavigationAction continueNavigationAction) {
this.continueNavigationAction = continueNavigationAction;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContinueNavigationAction
File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | setContinueNavigationAction | flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | public static OutputStream newOutputStream(final ByteBuffer dst) {
return new OutputStream() {
public void write(int b) {
dst.put((byte) b);
}
public void write(byte[] bytes, int off, int len) {
dst.put(bytes, off, len);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newOutputStream
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | newOutputStream | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public int startActivityFromRecents(int taskId, Bundle options) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeInt(taskId);
if (options == null) {
data.writeInt(0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityFromRecents
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | startActivityFromRecents | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public List<ManagementLink> getManagementLinks() {
return ManagementLink.all();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getManagementLinks
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getManagementLinks | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
Resources injectGetResourcesForApplicationAsUser(String packageName, int userId) {
final long start = getStatStartTime();
final long token = injectClearCallingIdentity();
try {
return mContext.createContextAsUser(UserHandle.of(userId), /* flags */ 0)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectGetResourcesForApplicationAsUser
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | injectGetResourcesForApplicationAsUser | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public static Object escapeXml(Object obj) {
if (obj == null) {
return null;
} else if (obj instanceof CharSequence) {
return escapeXml((CharSequence) obj);
} else {
return obj;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escapeXml
File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
Repository: dbeaver
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3836 | MEDIUM | 4.3 | dbeaver | escapeXml | bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java | 4debf8f25184b7283681ed3fb5e9e887d9d4fe22 | 0 |
Analyze the following code function for security vulnerabilities | protected String getCookieValue(String name, HttpServletRequest request)
{
String val = null;
Cookie[] cookies = request.getCookies();
if (cookies != null)
{
for (Cookie cookie : cookies)
{
if (name.equals(cookie.getName()))
{
val = cookie.getValue();
break;
}
}
}
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCookieValue
File: src/main/java/com/mxgraph/online/AbsAuthServlet.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-601",
"CWE-918"
] | CVE-2022-1767 | MEDIUM | 5 | jgraph/drawio | getCookieValue | src/main/java/com/mxgraph/online/AbsAuthServlet.java | c63f3a04450f30798df47f9badbc74eb8a69fbdf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ObjectNode createParserUIInitializationData(
ImportingJob job, List<ObjectNode> fileRecords, String format) {
ObjectNode options = super.createParserUIInitializationData(job, fileRecords, format);
try {
if (fileRecords.size() > 0) {
ObjectNode... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createParserUIInitializationData
File: main/src/com/google/refine/importers/XmlImporter.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20157 | MEDIUM | 5 | OpenRefine | createParserUIInitializationData | main/src/com/google/refine/importers/XmlImporter.java | 6a0d7d56e4ffb420316ce7849fde881344fbf881 | 0 |
Analyze the following code function for security vulnerabilities | private byte[] trimBytes(@Positive int columnIndex, byte[] bytes) throws SQLException {
// we need to trim if maxsize is set and the length is greater than maxsize and the
// type of this column is a candidate for trimming
if (maxFieldSize > 0 && bytes.length > maxFieldSize && isColumnTrimmable(columnIndex)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimBytes
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | trimBytes | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public void writeSetEnd() {} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeSetEnd
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | writeSetEnd | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public InputEventReceiver createInputEventReceiver(
InputChannel inputChannel, Looper looper) {
return new HideNavInputEventReceiver(inputChannel, looper);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createInputEventReceiver
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | createInputEventReceiver | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | private void updateActionViews(int menuState, Rect stackBounds) {
ViewGroup expandContainer = findViewById(R.id.expand_container);
ViewGroup actionsContainer = findViewById(R.id.actions_container);
actionsContainer.setOnTouchListener((v, ev) -> {
// Do nothing, prevent click through ... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-40123
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Disallow loading icon from content URI to PipMenu
Bug: 278246904
Test: manually, with the PoC app attached to the bug
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:1... | [
"CWE-Other"
] | CVE-2023-40123 | MEDIUM | 5.5 | android | updateActionViews | libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java | 7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 1 |
Analyze the following code function for security vulnerabilities | protected void createPage(List<String> spaces, String pageName, String content) throws Exception
{
String uri = buildURI(PageResource.class, getWiki(), spaces, pageName);
Page page = this.objectFactory.createPage();
page.setContent(content);
PutMethod putMethod = executePutXml(uri,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createPage
File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java
Repository: xwiki/xwiki-platform
The code ... | [
"CWE-352"
] | CVE-2023-37277 | CRITICAL | 9.6 | xwiki/xwiki-platform | createPage | xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java | 4c175405faa0e62437df397811c7526dfc0fbae7 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public String getContentAuthor()
{
return userReferenceToString(getContentAuthorReference());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContentAuthor
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getContentAuthor | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public <T> void streamGet(
String table, Class<T> clazz, String fieldName, String where,
boolean returnIdField, boolean setId, List<FacetField> facets, String distinctOn,
Handler<T> streamHandler, Handler<AsyncResult<Void>> replyHandler
) {
client.getConnection(res -> {
if (res.succeeded()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: streamGet
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | streamGet | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | protected void handleKexMessage(int cmd, Buffer buffer) throws Exception {
validateKexState(cmd, KexState.RUN);
boolean debugEnabled = log.isDebugEnabled();
if (kex.next(cmd, buffer)) {
if (debugEnabled) {
log.debug("handleKexMessage({})[{}] KEX processing complete a... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleKexMessage
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | handleKexMessage | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Optional<ValidationError> error(String key) {
return super.error(asDynamicKey(key));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: error
File: web/play-java-forms/src/main/java/play/data/DynamicForm.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | error | web/play-java-forms/src/main/java/play/data/DynamicForm.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | protected synchronized void setPendingStop(boolean pendingStop) {
this.pendingStop = pendingStop;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPendingStop
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | setPendingStop | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | ActivityOptions getOptions() {
return mPendingOptions;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOptions
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getOptions | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean shouldRunPrepareActivity(
Utils utils, Context context, ProvisioningParams params) {
// TODO(b/177849035): Remove NFC-specific logic
if (params.isNfc) {
return false;
}
if (params.wifiInfo != null) {
return true;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldRunPrepareActivity
File: src/com/android/managedprovisioning/provisioning/AdminIntegratedFlowPrepareActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21275 | HIGH | 7.8 | android | shouldRunPrepareActivity | src/com/android/managedprovisioning/provisioning/AdminIntegratedFlowPrepareActivity.java | 8277a2a946e617a7ea65056e4cedeb1fecf3a5f5 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
static NameValidator<CharSequence> nameValidator(boolean validate) {
return validate ? HttpNameValidator : NameValidator.NOT_NULL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nameValidator
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | nameValidator | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isMultiLingual(XWikiContext context)
{
return "1".equals(getXWikiPreference("multilingual", "0", context));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMultiLingual
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | isMultiLingual | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isUploading(User user, OCFile file) {
if (user == null || file == null) {
return false;
}
return mPendingUploads.contains(user.getAccountName(), file.getRemotePath());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUploading
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | isUploading | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | public ObjectOutputStream createObjectOutputStream(Writer writer, String rootNodeName) throws IOException {
return createObjectOutputStream(hierarchicalStreamDriver.createWriter(writer), rootNodeName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createObjectOutputStream
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | createObjectOutputStream | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | public static long tableSize(Map<String, Object> table)
throws UnsupportedEncodingException
{
long acc = 0;
for(Map.Entry<String, Object> entry: table.entrySet()) {
acc += shortStrSize(entry.getKey());
acc += fieldValueSize(entry.getValue());
}
return ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tableSize
File: src/main/java/com/rabbitmq/client/impl/Frame.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | tableSize | src/main/java/com/rabbitmq/client/impl/Frame.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public List<String> getAllowedUrls() {
String allowedURL = prop.getProperty(TS_ALLOWED_URLS, "file://.*|http(s)?://.*");
return Arrays.asList(allowedURL.split(","));
} | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2023-43654
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Issue warning about allowed_urls when default value is used
Function: getAllowedUrls
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
Fixed Cod... | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getAllowedUrls | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 1 |
Analyze the following code function for security vulnerabilities | public Rectangle getBoxSize(int index, String boxName) {
return getBoxSize(pageRefs.getPageNRelease(index), boxName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBoxSize
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getBoxSize | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public void setPlaybackSpeed(String packageName, int pid, int uid, float speed) {
try {
final String reason = TAG + ":setPlaybackSpeed";
mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(),
pid, uid, packageName, reason);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPlaybackSpeed
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | setPlaybackSpeed | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void savePlugin(String projectName, Plugin plugin, AsyncMethodCallback resultHandler) {
unimplemented(resultHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: savePlugin
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | savePlugin | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | public void setRenewal(boolean renewal) {
this.renewal = renewal;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRenewal
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setRenewal | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeReloadIgnoringCache(
long nativeContentViewCoreImpl, boolean checkForRepost); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeReloadIgnoringCache
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeReloadIgnoringCache | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private static void escapeXml(Object o, StringBuilder appendTo) {
if (o == null) {
appendTo.append("null");
return;
}
String s = o.toString();
int length = s.length();
appendTo.ensureCapacity(appendTo.length() + length + CAPACIT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escapeXml
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | escapeXml | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | private RunMap<R> createBuildRunMap() {
return new RunMap<R>(getBuildDir(), new Constructor<R>() {
public R create(File dir) throws IOException {
return loadBuild(dir);
}
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createBuildRunMap
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | createBuildRunMap | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public void init(ServletConfig servletConfig) throws ServletException {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: src/com/dotmarketing/servlets/AudioCaptchaServlet.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-254",
"CWE-264"
] | CVE-2016-8600 | MEDIUM | 5 | dotCMS/core | init | src/com/dotmarketing/servlets/AudioCaptchaServlet.java | cb84b130065c9eed1d1df9e4770ffa5d4bd30569 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void enforceCallerIsRecentsOrHasPermission(String permission, String func) {
ActivityManagerService.this.enforceCallerIsRecentsOrHasPermission(permission, func);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceCallerIsRecentsOrHasPermission
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | enforceCallerIsRecentsOrHasPermission | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void setAppendable(boolean appendable) {
this.appendable = appendable;
if (appendable)
getPdfObject(trailer.get(PdfName.ROOT));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAppendable
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | setAppendable | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | private void handleSpaceWhenEndlement()
{
// Use case: <tag1>something </tag1>...
// All spaces are spaces since otherwise they'll be all stripped by browsers
if (!this.isInCData && !this.isInPreserveElement) {
for (int i = 0; i < this.spaceCount; i++) {
pr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleSpaceWhenEndlement
File: xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
Repository: xwiki/xwiki-rendering
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | handleSpaceWhenEndlement | xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | void onClick(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onClick
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40098 | MEDIUM | 5.5 | android | onClick | packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java | d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 0 |
Analyze the following code function for security vulnerabilities | public byte[] getCalculatedAuthenticationBytes() {
return mac.doFinal();
} | Vulnerability Classification:
- CWE: CWE-346
- CVE: CVE-2023-22899
- Severity: MEDIUM
- CVSS Score: 5.9
Description: #485 Calculate AES mac with cache and push back functionality
Function: getCalculatedAuthenticationBytes
File: src/main/java/net/lingala/zip4j/crypto/AESDecrypter.java
Repository: srikanth-lingala/zip4... | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | getCalculatedAuthenticationBytes | src/main/java/net/lingala/zip4j/crypto/AESDecrypter.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 1 |
Analyze the following code function for security vulnerabilities | public static long uncompressedLength(long inputAddr, long len)
throws IOException
{
return impl.uncompressedLength(inputAddr, len);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uncompressedLength
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | uncompressedLength | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | public static void validate(EndElement endElement, String tag) {
String elementTag = getEndElementName(endElement);
if (!tag.equals(elementTag))
throw new RuntimeException(logger.parserExpectedEndTag("</" + tag + ">. Found </" + elementTag + ">"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validate
File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-2582 | MEDIUM | 4 | keycloak | validate | saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java | 0cb5ba0f6e83162d221681f47b470c3042eef237 | 0 |
Analyze the following code function for security vulnerabilities | public void recacheSecretToken()
{
// Save the current URL to be able to get back after we cache the secret token. We're not using the browser's
// Back button because if the current page is the result of a POST request then by going back we are re-sending
// the POST data which can have une... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recacheSecretToken
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | recacheSecretToken | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handleMessage(Message msg) {
switch (msg.what) {
case MSG_ENABLE_POINTER_LOCATION:
enablePointerLocation();
break;
case MSG_DISABLE_POINTER_LOCATION:
disablePointerLocation();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleMessage
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | handleMessage | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | native int getConnectionStateNative(byte[] address); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectionStateNative
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | getConnectionStateNative | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | protected RemoteViews makeMediaContentView(@Nullable RemoteViews customContent) {
final int numActions = mBuilder.mActions.size();
final int numActionsToShow = Math.min(mActionsToShowInCompact == null
? 0 : mActionsToShowInCompact.length, MAX_MEDIA_BUTTONS_IN_COMPACT);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeMediaContentView
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeMediaContentView | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public List<Cliente> buscarClienteEmail(String email) throws SQLException, ClassNotFoundException {
Connection con = null;
PreparedStatement stmt = null;
ResultSet rs = null;
try {
con = ConnectionFactory.getConnection();
stmt = con.prepareStatement(stmtBuscarEma... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2015-10061
- Severity: MEDIUM
- CVSS Score: 5.2
Description: ClienteDAO - alterados statements para utilizar o metodo setString do PreparedStatement para evitar SQL Injection
- alterados statements para utilizar ilike ao inves de like para pesquisar sem case sensi... | [
"CWE-89"
] | CVE-2015-10061 | MEDIUM | 5.2 | evandro-machado/Trabalho-Web2 | buscarClienteEmail | src/java/br/com/magazine/dao/ClienteDAO.java | f59ac954625d0a4f6d34f069a2e26686a7a20aeb | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String getHostOrIP() {
try {
InetAddress i = java.net.InetAddress.getLocalHost();
if(i.isLoopbackAddress()) {
Enumeration<NetworkInterface> nie = NetworkInterface.getNetworkInterfaces();
while(nie.hasMoreElements()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHostOrIP
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getHostOrIP | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static String verifyRedirectUri(KeycloakSession session, String rootUrl, String redirectUri, Set<String> validRedirects, boolean requireRedirectUri) {
KeycloakUriInfo uriInfo = session.getContext().getUri();
RealmModel realm = session.getContext().getRealm();
if (redirectUri == null) {
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2022-4361
- Severity: MEDIUM
- CVSS Score: 6.1
Description: Check the redirect URI is http(s) when used for a form Post (#22)
Closes https://github.com/keycloak/security/issues/22
Co-authored-by: Stian Thorgersen <stianst@gmail.com>
Function: verifyRedirectUr... | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | verifyRedirectUri | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 1 |
Analyze the following code function for security vulnerabilities | public ApiClient setOauthScope(String scope) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).setScope(scope);
return this;
}
}
throw new RuntimeException("No OAuth2 authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setOauthScope
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setOauthScope | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isCompatible(MergePolicyConfig c1, MergePolicyConfig c2) {
return c1 == c2 || !(c1 == null || c2 == null)
&& c1.getBatchSize() == c2.getBatchSize()
&& nullSafeEqual(c1.getPolicy(), c2.getPolicy());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCompatible
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isCompatible | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | static private int calculateProgressPercent(long totalExpectedSize, long totalRetrievedSize) {
return totalExpectedSize == 0 ? -1 : (int) (totalRetrievedSize * 100 / totalExpectedSize);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: calculateProgressPercent
File: main/src/com/google/refine/importing/ImportingUtilities.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | calculateProgressPercent | main/src/com/google/refine/importing/ImportingUtilities.java | e243e73e4064de87a913946bd320fbbe246da656 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Float getFloatAndRemove(K name) {
V v = getAndRemove(name);
try {
return v != null ? toFloat(name, v) : null;
} catch (RuntimeException ignore) {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFloatAndRemove
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | getFloatAndRemove | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | public Stage saveBuildingStage(Stage stage) {
for (JobInstance jobInstance : stage.getJobInstances()) {
JobInstanceMother.setBuildingState(jobInstance);
jobInstance.setAgentUuid(AGENT_UUID);
jobInstanceDao.updateAssignedInfo(jobInstance);
}
return stage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveBuildingStage
File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-697"
] | CVE-2022-39308 | MEDIUM | 5.9 | gocd | saveBuildingStage | server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java | 236d4baf92e6607f2841c151c855adcc477238b8 | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder xpathFind(String xpath, NamespaceContext nsContext)
throws XPathExpressionException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: xpathFind
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | xpathFind | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private boolean updateNetworkSelectionStatus(@NonNull WifiConfiguration config, int reason) {
int prevNetworkSelectionStatus = config.getNetworkSelectionStatus()
.getNetworkSelectionStatus();
if (!mWifiBlocklistMonitor.updateNetworkSelectionStatus(config, reason)) {
return fa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNetworkSelectionStatus
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | updateNetworkSelectionStatus | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public static String encodeURIComponent(String s, String charset)
{
if (s == null)
{
return null;
}
else
{
String result;
try
{
result = URLEncoder.encode(s, charset).replaceAll("\\+", "%20")
.replaceAll("\\%21", "!").replaceAll("\\%27", "'")
.replaceAll("\\%28", "(").replaceAll(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encodeURIComponent
File: src/main/java/com/mxgraph/online/Utils.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-3398 | HIGH | 7.5 | jgraph/drawio | encodeURIComponent | src/main/java/com/mxgraph/online/Utils.java | 064729fec4262f9373d9fdcafda0be47cd18dd50 | 0 |
Analyze the following code function for security vulnerabilities | public String getMdnNumber() {
return mMdn;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMdnNumber
File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | getMdnNumber | src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | private ActiveAdmin getNetworkLoggingControllingAdminLocked() {
int affectedUserId = getNetworkLoggingAffectedUser();
if (affectedUserId < 0) {
return null;
}
return getDeviceOrProfileOwnerAdminLocked(affectedUserId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNetworkLoggingControllingAdminLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getNetworkLoggingControllingAdminLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void run() {
synchronized (mProcessCpuTracker) {
mProcessCpuInitLatch.countDown();
mProcessCpuTracker.init();
}
while (true) {
try {
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: run
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | run | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private List<String> getResourceLibraryContracts(FacesContext context) {
UIViewRoot viewRoot = context.getViewRoot();
if(viewRoot == null) {
if(context.getApplication().getResourceHandler().isResourceRequest(context)) {
// it is a resource request. look at the parameter con=... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResourceLibraryContracts
File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | getResourceLibraryContracts | impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | public void setUserEmailAttribute(String userEmailAttribute) {
this.userEmailAttribute = userEmailAttribute;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserEmailAttribute
File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
Repository: theonedev/onedev
The code follows secure coding pr... | [
"CWE-90"
] | CVE-2021-32651 | MEDIUM | 4.3 | theonedev/onedev | setUserEmailAttribute | server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java | 4440f0c57e440488d7e653417b2547eaae8ad19c | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void removeServiceDestroyListener(ServiceDestroyListener listener) {
serviceDestroyListeners.remove(listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeServiceDestroyListener
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | removeServiceDestroyListener | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | protected KBTemplate getByUuid_PrevAndNext(Session session,
KBTemplate kbTemplate, String uuid,
OrderByComparator<KBTemplate> orderByComparator, boolean previous) {
StringBundler query = null;
if (orderByComparator != null) {
query = new StringBundler(4 +
(orderByComparator.getOrderByConditionFields().... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getByUuid_PrevAndNext
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
Repository: brianchandotcom/liferay-portal... | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | getByUuid_PrevAndNext | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 0 |
Analyze the following code function for security vulnerabilities | private void debugLog(String msg) {
if (DBG) Log.d(TAG, msg);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: debugLog
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | debugLog | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void processRequest() throws Exception {
String dir = SQLInitServlet.getField("filePath") + "crf" + File.separator + "new" + File.separator;
// YW 09-10-2007 << Now CRF_Design_Template_v2.xls is located at
// $CATALINA_HOME/webapps/OpenClinica-instanceName/properties
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-24830
- Severity: HIGH
- CVSS Score: 7.5
Description: OC-17139: code changes after code review
Function: processRequest
File: web/src/main/java/org/akaza/openclinica/control/admin/DownloadVersionSpreadSheetServlet.java
Repository: OpenClinica
Fixed Code:
@... | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | processRequest | web/src/main/java/org/akaza/openclinica/control/admin/DownloadVersionSpreadSheetServlet.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 1 |
Analyze the following code function for security vulnerabilities | public void editarResponsavel(Responsavel responsavel) throws Exception{
ResultSet result = this.bancoConec.execConsulta("Select * from ACI_Responsavel where Email='"
+responsavel.getEmail()+"'");
if(!result.first()){
throw new Exception("Responsavel com esse email já inexistente");
}
result.close();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: editarResponsavel
File: Escola Eclipse/Escola/src/banco_de_dados/dao/Responsaveis.java
Repository: marinaguimaraes/ACI_Escola
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2015-10037 | MEDIUM | 5.2 | marinaguimaraes/ACI_Escola | editarResponsavel | Escola Eclipse/Escola/src/banco_de_dados/dao/Responsaveis.java | 34eed1f7b9295d1424912f79989d8aba5de41e9f | 0 |
Analyze the following code function for security vulnerabilities | public void setPid( long pid )
{
this.pid = pid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPid
File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | setPid | src/main/java/org/codehaus/plexus/util/cli/Commandline.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | private void notifyMenuStateChangeStart(int menuState, boolean resize, Runnable callback) {
mController.onMenuStateChangeStart(menuState, resize, callback);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyMenuStateChangeStart
File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40123 | MEDIUM | 5.5 | android | notifyMenuStateChangeStart | libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java | 7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isUseNonce() {
return useNonce;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUseNonce
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | isUseNonce | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasElement(int element)
{
return ((this.elements & element) == element);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasElement
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | hasElement | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void registerProcessObserver(IProcessObserver observer) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(observer != null ? observer.asBinder() : null);
mRe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerProcessObserver
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | registerProcessObserver | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public void doIndex(StaplerResponse rsp) throws IOException {
rsp.sendRedirect("heapdump.hprof");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doIndex
File: core/src/main/java/hudson/util/RemotingDiagnostics.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-2068 | LOW | 3.5 | jenkinsci/jenkins | doIndex | core/src/main/java/hudson/util/RemotingDiagnostics.java | 0530a6645aac10fec005614211660e98db44b5eb | 0 |
Analyze the following code function for security vulnerabilities | public long setMaximumSize(long numBytes) {
long pageSize = getPageSize();
long numPages = numBytes / pageSize;
// If numBytes isn't a multiple of pageSize, bump up a page
if ((numBytes % pageSize) != 0) {
numPages++;
}
long newPageCount = DatabaseUtils.longFo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaximumSize
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | setMaximumSize | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | public Jooby env(final Env.Builder env) {
this.env = requireNonNull(env, "Env builder is required.");
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: env
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | env | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setClientConfig(ClientConfig clientConfig) {
this.clientConfig = clientConfig;
// Rebuild HTTP Client according to the new "clientConfig" value.
this.httpClient = buildHttpClient();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClientConfig
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure codi... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setClientConfig | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public boolean isReady() {
if (mNativeContentViewCore == 0) return false;
return nativeIsRenderWidgetHostViewReady(mNativeContentViewCore);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isReady
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | isReady | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | protected AppWidgetHostView onCreateView(Context context, int appWidgetId,
AppWidgetProviderInfo appWidget) {
return new AppWidgetHostView(context, mOnClickHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreateView
File: core/java/android/appwidget/AppWidgetHost.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | onCreateView | core/java/android/appwidget/AppWidgetHost.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public void cleanupBitmapsForPackage(@UserIdInt int userId, String packageName) {
final File packagePath = new File(getUserBitmapFilePath(userId), packageName);
if (!packagePath.isDirectory()) {
return;
}
// ShortcutPackage is already removed at this point, we can safely remo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanupBitmapsForPackage
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | cleanupBitmapsForPackage | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canManageCaCerts(CallerIdentity caller) {
return (caller.hasAdminComponent() && (isDefaultDeviceOwner(caller)
|| isProfileOwner(caller)))
|| (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_CERT_INSTALL))
|| hasCallingOrSelfPermission(MA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canManageCaCerts
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | canManageCaCerts | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | final ProcessRecord startProcessLocked(String processName,
ApplicationInfo info, boolean knownToBeDead, int intentFlags,
String hostingType, ComponentName hostingName, boolean allowWhileBooting,
boolean isolated, boolean keepIfLarge) {
return startProcessLocked(processName, i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startProcessLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | startProcessLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public View getLeftPreview() {
return getLayoutDirection() == LAYOUT_DIRECTION_RTL
? mKeyguardBottomArea.getRightPreview()
: mKeyguardBottomArea.getLeftPreview();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLeftPreview
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getLeftPreview | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public DocumentSection getDocumentSection(int sectionNumber) throws XWikiException
{
// return a document section according to section number
return getSections().get(sectionNumber - 1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocumentSection
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getDocumentSection | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void setShutdownTimeout(int shutdownTimeout) {
this.shutdownTimeout = shutdownTimeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShutdownTimeout
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | setShutdownTimeout | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | void setTransparentRegionWindow(Session session, IWindow client, Region region) {
long origId = Binder.clearCallingIdentity();
try {
synchronized (mWindowMap) {
WindowState w = windowForClientLocked(session, client, false);
if ((w != null) && w.mHasSurface) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTransparentRegionWindow
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setTransparentRegionWindow | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public ProfileOutput getOutputByID(String id) {
for (ProfileOutput output : outputs) {
if (output.getId().equals(id))
return output;
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOutputByID
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getOutputByID | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static void writeLines(Collection<String> lines, Path path) throws IOException {
Files.write(path, lines, StandardCharsets.UTF_8);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeLines
File: pf4j/src/main/java/org/pf4j/util/FileUtils.java
Repository: pf4j
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-40827 | HIGH | 7.5 | pf4j | writeLines | pf4j/src/main/java/org/pf4j/util/FileUtils.java | ed9392069fe14c6c30d9f876710e5ad40f7ea8c1 | 0 |
Analyze the following code function for security vulnerabilities | protected Token mapToToken(int token) {
switch(token){
case XMLStreamConstants.START_ELEMENT: return Token.StartEntity;
case XMLStreamConstants.END_ELEMENT: return Token.EndEntity;
case XMLStreamConstants.CHARACTERS: return Token.Value;
case XM... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mapToToken
File: main/src/com/google/refine/importers/XmlImporter.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20157 | MEDIUM | 5 | OpenRefine | mapToToken | main/src/com/google/refine/importers/XmlImporter.java | 6a0d7d56e4ffb420316ce7849fde881344fbf881 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setKeyGrantForApp(ComponentName who, String callerPackage, String alias,
String packageName, boolean hasGrant) {
Preconditions.checkStringNotEmpty(alias, "Alias to grant cannot be empty");
Preconditions.checkStringNotEmpty(packageName, "Package to grant to cannot... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyGrantForApp
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setKeyGrantForApp | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.