instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void setupEdgeToEdge() { WindowCompat.setDecorFitsSystemWindows(getWindow(), false); ViewCompat.setOnApplyWindowInsetsListener(findViewById(android.R.id.content), (v, windowInsets) -> { Insets insets = windowInsets.getInsets(WindowInsetsCompat.Type.systemBars(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setupEdgeToEdge File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
setupEdgeToEdge
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
public String getActiveClass() { if (this.currentObj == null) { return null; } else { return this.currentObj.getName(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getActiveClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public synchronized void updateAsciiStream( String columnName, java.io.@Nullable InputStream x, int length) throws SQLException { updateAsciiStream(findColumn(columnName), x, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAsciiStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateAsciiStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public boolean isSystemPriority() { return (mFlags & MediaSession.FLAG_EXCLUSIVE_GLOBAL_PRIORITY) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSystemPriority File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
isSystemPriority
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
boolean cancelBondProcess(BluetoothDevice device) { enforceCallingOrSelfPermission(BLUETOOTH_ADMIN_PERM, "Need BLUETOOTH ADMIN permission"); byte[] addr = Utils.getBytesFromAddress(device.getAddress()); return cancelBondNative(addr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelBondProcess File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
cancelBondProcess
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
private Map<String, CWLElement> getInputsOutputs(JsonNode inputsOutputs) { Map<String, CWLElement> returnMap = new HashMap<>(); if (inputsOutputs.getClass() == ArrayNode.class) { // Explicit ID and other fields within each list for (JsonNode inputOutput : inputsOutputs) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputsOutputs File: src/main/java/org/commonwl/view/cwl/CWLService.java Repository: common-workflow-language/cwlviewer The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-41110
HIGH
7.5
common-workflow-language/cwlviewer
getInputsOutputs
src/main/java/org/commonwl/view/cwl/CWLService.java
f6066f09edb70033a2ce80200e9fa9e70a5c29de
0
Analyze the following code function for security vulnerabilities
private BeanManager getBeanManager() { if (beanManager == null) { FacesContext facesContext = FacesContext.getCurrentInstance(); beanManager = Util.getCdiBeanManager(facesContext); } return beanManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBeanManager File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getBeanManager
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
@Override public void onConnectionServiceFocusReleased(Session.Info sessionInfo) throws RemoteException { Log.startSession(sessionInfo, "CSW.oCSFR", mPackageAbbreviation); long token = Binder.clearCallingIdentity(); try { synchronized (mLock) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConnectionServiceFocusReleased File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
onConnectionServiceFocusReleased
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public static boolean isSecurityParamsValid(SecurityParams params) { if (!params.isEnabled()) return false; if (!isSecurityParamsSupported(params)) return false; return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecurityParamsValid File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
isSecurityParamsValid
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private void ensureValidLocked() { if (mObject == 0) { throw new RuntimeException("AssetManager has been destroyed"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureValidLocked File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
ensureValidLocked
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void saveAsAuthor() throws XWikiException { saveAsAuthor("", false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAsAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
saveAsAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
void initiateOneRestore(PackageInfo app, int appVersionCode) { final String packageName = app.packageName; if (DEBUG) Slog.d(TAG, "initiateOneRestore packageName=" + packageName); // !!! TODO: get the dirs from the transport mBackupDataName = new File(mDataDir, packageN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initiateOneRestore File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
initiateOneRestore
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private <T extends AnnotatedMember> T _fixAccess(T member) { if (member != null && _canFixAccess) { ClassUtil.checkAndFixAccess((Member) member.getAnnotated(), _forceAccess); } return member; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _fixAccess File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_fixAccess
src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public void setRows(int rows) { setIntValue("rows", rows); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRows File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
setRows
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
public static Class<?> findCollectionFallback(JavaType type) { return _collectionFallbacks.get(type.getRawClass().getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findCollectionFallback File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
findCollectionFallback
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public String buildAjaxResultContainer(String title) { StringBuffer html = new StringBuffer(512); html.append(dialogBlockStart(title)); html.append(dialogWhiteBoxStart()); html.append("<div id='ajaxreport' >"); html.append(buildAjaxWaitMessage()); html.append("</div>\n")...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildAjaxResultContainer File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
buildAjaxResultContainer
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
static Certificate[] verifyBytes(byte[] blockBytes, byte[] sfBytes) throws GeneralSecurityException { Object obj = null; try { obj = Providers.startJarVerification(); PKCS7 block = new PKCS7(blockBytes); SignerInfo[] verifiedSignerInfos = block.verify(sfByte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyBytes File: core/java/android/util/jar/StrictJarVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
verifyBytes
core/java/android/util/jar/StrictJarVerifier.java
84df68840b6f2407146e722ebd95a7d8bc6e3529
0
Analyze the following code function for security vulnerabilities
Endpoint getEndpoint() { return endpoint; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEndpoint File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getEndpoint
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
@Override public Iterable<File> successors(File file) { // check isDirectory() just because it may be faster than listFiles() on a non-directory if (file.isDirectory()) { File[] files = file.listFiles(); if (files != null) { return Collections.unmodifiab...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: successors File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
successors
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
private static Optional<Method> findMethod(Component instance, Class<?> clazz, String methodName) { List<Method> methods = Stream.of(clazz.getDeclaredMethods()) .filter(method -> methodName.equals(method.getName())) .filter(method -> hasMethodAnnotation(method)) ...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2023-25500 - Severity: MEDIUM - CVSS Score: 4.3 Description: Update messages to point to logs. Start both error and log with same string. Function: findMethod File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRp...
[ "CWE-200" ]
CVE-2023-25500
MEDIUM
4.3
vaadin/flow
findMethod
flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
e13da1c685fa1b5fdd74774813a028748bc4b62b
1
Analyze the following code function for security vulnerabilities
@TestOnly public void fetchAndResetToHead(ConsoleOutputStreamConsumer outputStreamConsumer, boolean shallow) { fetch(outputStreamConsumer); resetWorkingDir(outputStreamConsumer, new StringRevision(remoteBranch()), shallow); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchAndResetToHead File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
fetchAndResetToHead
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public int setSocketOpt(int optionName, byte [] optionVal, int optionLen) throws IOException { int ret = 0; if (mSocketState == SocketState.CLOSED) throw new IOException("socket closed"); IBluetooth bluetoothProxy = BluetoothAdapter.getDefaultAdapter().getBluetoothService(null); if (blue...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSocketOpt File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
setSocketOpt
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
public void delete(String id) { //及连删除外键表 this.preDelete(id); testPlanScenarioCaseService.deleteByScenarioId(id); apiScenarioMapper.deleteByPrimaryKey(id); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
delete
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void setPassword(char[] password) { this.password = password; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPassword File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
setPassword
src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
public void removeColumnVisibilityChangeListener( ColumnVisibilityChangeListener listener) { removeListener(ColumnVisibilityChangeEvent.class, listener, COLUMN_VISIBILITY_METHOD); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeColumnVisibilityChangeListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
removeColumnVisibilityChangeListener
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Override public void updateTopComponentForFactoryTest() { synchronized (mGlobalLock) { if (mFactoryTest != FACTORY_TEST_LOW_LEVEL) { return; } final ResolveInfo ri = mContext.getPackageManager() .resolveActi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTopComponentForFactoryTest File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
updateTopComponentForFactoryTest
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public void write(final ObjectDataOutput out, final Class obj) throws IOException { out.writeUTF(obj.getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
write
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@NonNull private RemoteViews makeMessagingView(int viewType) { boolean isCollapsed = viewType != StandardTemplateParams.VIEW_TYPE_BIG; boolean hideRightIcons = viewType != StandardTemplateParams.VIEW_TYPE_NORMAL; boolean isConversationLayout = mConversationType != CONVERSATIO...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeMessagingView File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
makeMessagingView
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public synchronized void save() { if(BulkChange.contains(this)) return; try { getConfigFile().write(this); SaveableListener.fireOnChange(this, getConfigFile()); } catch (IOException e) { LOGGER.log(Level.WARNING, "Failed to save "+getConfigFile(),e); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: core/src/main/java/hudson/model/Descriptor.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
save
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
static public void noteWakeupAlarm(PendingIntent ps, int sourceUid, String sourcePkg, String tag) { try { getDefault().noteWakeupAlarm(ps.getTarget(), sourceUid, sourcePkg, tag); } catch (RemoteException ex) { } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteWakeupAlarm File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
noteWakeupAlarm
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private final void moveTaskBackwardsLocked(int task) { Slog.e(TAG, "moveTaskBackwards not yet implemented!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTaskBackwardsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
moveTaskBackwardsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static String getPayloadOneLineString(final IBaseDataObject payload) { final StringBuilder sb = new StringBuilder(); final String fn = payload.getFilename(); final int attPos = fn.indexOf(emissary.core.Family.SEP); if (attPos != -1) { sb.append(fn.substring(attPos + 1)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPayloadOneLineString File: src/main/java/emissary/util/PayloadUtil.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
getPayloadOneLineString
src/main/java/emissary/util/PayloadUtil.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public void setDateHeader(String name, long date) { setHeader(name, formatHeaderDate(new Date(date))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDateHeader File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
setDateHeader
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
private void ensureCorrectTheme(Intent data) { String oldListLayout = data.getStringExtra(SettingsActivity.SP_FEED_LIST_LAYOUT); String newListLayout = mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT,"0"); if (ThemeChooser.themeRequiresRestartOfUI() || !newListLayout.equals(oldListLayout)...
Vulnerability Classification: - CWE: CWE-829 - CVE: CVE-2021-41256 - Severity: MEDIUM - CVSS Score: 5.8 Description: fix GHSL-2021-1033 Signed-off-by: David Luhmer <david-dev@live.de> Function: ensureCorrectTheme File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository...
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
ensureCorrectTheme
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
1
Analyze the following code function for security vulnerabilities
@Override public void checkExit(int status) { try { if (enterPublicInterface()) return; if (Thread.currentThread() == SecurityConstants.MAIN_THREAD && getNonWhitelistedStackFrames().isEmpty()) { // always allow maven to exit return; } throw new SecurityException(localized("security.error_syst...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkExit File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
checkExit
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public boolean hasMessage(String messageId) { return this.keyToBundleMap.containsKey(messageId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasMessage File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
hasMessage
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
@Override public MergeTarget newMergeTargetForField( Descriptors.FieldDescriptor descriptor, Message defaultInstance) { throw new UnsupportedOperationException("newMergeTargetForField() called on FieldSet object"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newMergeTargetForField File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
newMergeTargetForField
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
@Nullable public String getIdAttribute() { final int id = nativeGetIdAttribute(mParseState); if (id == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null document"); } return id >= 0 ? getSequenceString(mStrings.getSequence(id)) : null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIdAttribute File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getIdAttribute
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isToolbarEnabled() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isToolbarEnabled File: src/com/android/settings/password/ChooseLockPassword.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
isToolbarEnabled
src/com/android/settings/password/ChooseLockPassword.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
@Override public Set<? extends LocallyAvailableResource> search(String pattern) { if (!getBaseDir().exists()) { return Collections.emptySet(); } final Set<LocallyAvailableResource> entries = new HashSet<LocallyAvailableResource>(); findFiles(pattern).visit(new EmptyFileV...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: search File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java Repository: gradle The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35946
MEDIUM
5.5
gradle
search
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
0
Analyze the following code function for security vulnerabilities
private boolean loadFromUserStoreAfterUnlockOrSwitch(int userId) { try { List<WifiConfigStore.StoreFile> userStoreFiles = WifiConfigStore.createUserFiles( userId, mFrameworkFacade.isNiapModeOn(mContext)); if (userStoreFiles == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadFromUserStoreAfterUnlockOrSwitch File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
loadFromUserStoreAfterUnlockOrSwitch
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public static String escape(String s) { return Util.escape(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escape File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
escape
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public int getGameAction(int keyCode) { switch (keyCode) { case DROID_IMPL_KEY_DOWN: return Display.GAME_DOWN; case DROID_IMPL_KEY_UP: return Display.GAME_UP; case DROID_IMPL_KEY_LEFT: return Display.GAME_LEFT; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGameAction File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getGameAction
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private Provider<DocumentReference> getDefaultDocumentReferenceProvider() { if (this.defaultDocumentReferenceProvider == null) { this.defaultDocumentReferenceProvider = Utils.getComponent(DocumentReference.TYPE_PROVIDER); } return this.defaultDocumentReferenceProvider; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDocumentReferenceProvider File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getDefaultDocumentReferenceProvider
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public void clearAccounts(String packageName) { synchronized (mLock) { try { Log.startSession("TSI.cA"); enforcePhoneAccountModificationForPackage(packageName); mPhoneAccountRegistrar .c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearAccounts File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
clearAccounts
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public void addResourceProvider(String key, ResourceProvider provider) { if (resourceProviders == null) { resourceProviders = new LinkedHashMap<String, ResourceProvider>(); } boolean addedInDevMode = UiFrameworkUtil.checkAndSetDevelopmentModeForProvider(key, provider); if (addedInDevMode) { resourcePr...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-24621 - Severity: MEDIUM - CVSS Score: 6.5 Description: UIFR-215: Do not allow loading arbitrary files Function: addResourceProvider File: api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java Repository: openmrs/openmrs-module-uiframework...
[ "CWE-22" ]
CVE-2020-24621
MEDIUM
6.5
openmrs/openmrs-module-uiframework
addResourceProvider
api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java
0422fa52c7eba3d96cce2936cb92897dca4b680a
1
Analyze the following code function for security vulnerabilities
public List<File> getImageFiles(String input) { List<File> files = new ArrayList<>(); String regex = "(\\!\\[.*?\\]\\((.*?)\\))"; Pattern pattern = Pattern.compile(regex); if (StringUtils.isBlank(input)) { return new ArrayList<>(); } Matcher matcher = pattern....
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2022-23544 - Severity: MEDIUM - CVSS Score: 6.1 Description: fix(测试跟踪): 缺陷平台请求转发添加白名单 Function: getImageFiles File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere Fixed Code: public List...
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getImageFiles
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
1
Analyze the following code function for security vulnerabilities
@Override void cancelAnimation() { super.cancelAnimation(); clearThumbnail(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelAnimation File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
cancelAnimation
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void activityStopped(IBinder token, Bundle state, PersistableBundle persistentState, CharSequence description) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityStopped File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activityStopped
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private List<ValidationError> getFieldErrorsAsValidationErrors(Lang lang, BindingResult result) { return result.getFieldErrors().stream() .map( error -> { String key = error.getObjectName() + "." + error.getField(); if (key.startsWith("target.") && rootName == null) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFieldErrorsAsValidationErrors File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
getFieldErrorsAsValidationErrors
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
protected void overrideByteOrder() { String byteOrderOverride = System.getProperty(BYTE_ORDER_OVERRIDE_PROPERTY); if (StringUtil.isNullOrEmpty(byteOrderOverride)) { return; } if (BIG_ENDIAN.toString().equals(byteOrderOverride)) { byteOrder = BIG_ENDIAN; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: overrideByteOrder File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
overrideByteOrder
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public void updateAppWidgetOptions(String callingPackage, int appWidgetId, Bundle options) { final int userId = UserHandle.getCallingUserId(); if (DEBUG) { Slog.i(TAG, "updateAppWidgetOptions() " + userId); } // Make sure the package runs under the caller uid....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAppWidgetOptions File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
updateAppWidgetOptions
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
Configuration[] getSizeAndUiModeConfigurations() { synchronized (this) { ensureValidLocked(); return nativeGetSizeAndUiModeConfigurations(mObject); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSizeAndUiModeConfigurations File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getSizeAndUiModeConfigurations
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
protected abstract void connectInternal() throws SmackException, IOException, XMPPException, InterruptedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectInternal File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
connectInternal
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public boolean isUserInGroup(String groupName) { boolean result = false; try { if (this.user == null) { LOGGER.warn("User considered not part of group [{}] since user is null", groupName); } else { result = this.user.isUserInGroup(groupName, ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUserInGroup File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-41929
MEDIUM
4.9
xwiki/xwiki-platform
isUserInGroup
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
0
Analyze the following code function for security vulnerabilities
@Beta public static boolean equal(File file1, File file2) throws IOException { checkNotNull(file1); checkNotNull(file2); if (file1 == file2 || file1.equals(file2)) { return true; } /* * Some operating systems may return zero as the length for files denoting system-dependent * enti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equal File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
equal
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
@Override public boolean isValid(Integer value, ConstraintValidatorContext context) { if (proxyManager.get(value) != null) { return true; } String errorMessage = String.format("No proxy server found for specified port %d", value); LOG.warn(errorMessage); context.buildConstrai...
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2020-26282 - Severity: HIGH - CVSS Score: 7.5 Description: Fix Critical Java EL Injection RCE vulnerability from GHSL-2020-213 Function: isValid File: browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java Reposi...
[ "CWE-74" ]
CVE-2020-26282
HIGH
7.5
browserup/browserup-proxy
isValid
browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java
4b38e7a3e20917e5c3329d0d4e9590bed9d578ab
1
Analyze the following code function for security vulnerabilities
private ActivityInfo resolveActivityInfo(Intent intent, int flags, int userId) { ActivityInfo ai = null; ComponentName comp = intent.getComponent(); try { if (comp != null) { ai = AppGlobals.getPackageManager().getActivityInfo(comp, flags, userId); } else ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveActivityInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
resolveActivityInfo
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void setSecureSetting(@NonNull ComponentName admin, String setting, String value) { throwIfParentInstance("setSecureSetting"); if (mService != null) { try { mService.setSecureSetting(admin, setting, value); } catch (RemoteException e) { thr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSecureSetting File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setSecureSetting
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int sendIntentSender(IIntentSender target, IBinder allowlistToken, int code, Intent intent, String resolvedType, IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) { return ActivityManagerService.this.sendIntentSender(target,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
sendIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
CrossProfileApps getCrossProfileApps() { return mContext.getSystemService(CrossProfileApps.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCrossProfileApps File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getCrossProfileApps
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Pure public float getFloat(String columnName) throws SQLException { return getFloat(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFloat File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getFloat
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public static Property<?> createProperty(String pName, Object value) { Util.assertHasLength(pName); Util.assertNotNull(value); if (validPropertyPrimitives.containsKey(value.getClass())) { return PropertyFactory.createProperty(pName, validPropertyPrimitives.get(va...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createProperty File: ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java Repository: ff4j The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
createProperty
ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java
481ca723a57f87eca931196ec9a772967ab70b3b
0
Analyze the following code function for security vulnerabilities
private void handleSAML2UnsolicitedResponse(Request request, Response response) throws ServletException { SAML2Request samlRequest = new SAML2Request(); String id = IDGenerator.create("ID_"); String assertionConsumerURL = request.getParameter(JBossSAMLConstants.UNSOLICITED_RESPONSE_TARGET.get()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSAML2UnsolicitedResponse File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secu...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
handleSAML2UnsolicitedResponse
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
private void scanUntilEndTag(final String tagName) throws IOException { final XMLStringBuffer buffer = new XMLStringBuffer(); final String end = "/" + tagName; final int lengthToScan = tagName.length() + 2; while (true) { int c = fCurrentEntity.read(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanUntilEndTag File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
scanUntilEndTag
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return Objects.hash(host, port, protocol, credentials, options, tags, cluster, replicaNum, shardNum, shardWeight, weight); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
hashCode
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
public static VFSContainer getAllSubdirs(VFSContainer base, String subDirPath, Identity identity, boolean create) { StringTokenizer st; if (subDirPath.indexOf('/') != -1) { st = new StringTokenizer(subDirPath, "/", false); } else { // try it windows style, backslash is also valid format st = new StringT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllSubdirs File: src/main/java/org/olat/core/util/ZipUtil.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
getAllSubdirs
src/main/java/org/olat/core/util/ZipUtil.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
@Override protected boolean recordLogRec(Message msg) { switch (msg.what) { case CMD_RSSI_POLL: return mVerboseLoggingEnabled; default: return true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recordLogRec File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
recordLogRec
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public boolean requestPinAppWidget(@NonNull String callingPackage, @NonNull AppWidgetProviderInfo appWidget, @Nullable Bundle extras, @Nullable IntentSender resultIntent, int userId) { Objects.requireNonNull(appWidget); return requestPinItem(call...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestPinAppWidget File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
requestPinAppWidget
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private static Charset getCharset() { return CHARSET; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharset File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
getCharset
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public int getNearbyAppStreamingPolicy(final int userId) { if (!mHasFeature) { return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isProfileOwner(caller) ||...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNearbyAppStreamingPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getNearbyAppStreamingPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void onDevicePolicyManagerStateChanged() { showPrimarySecurityScreen(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDevicePolicyManagerStateChanged File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
onDevicePolicyManagerStateChanged
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
public String convertUsername(String username) { return this.xwiki.convertUsername(username, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertUsername File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
convertUsername
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public void init(FilterConfig filterConfig) throws ServletException { LOGGER.debug("(XssFilter) initialize"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java Repository: shopizer-ecommerce/shopizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-33561
LOW
3.5
shopizer-ecommerce/shopizer
init
sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java
197f8c78c8f673b957e41ca2c823afc654c19271
0
Analyze the following code function for security vulnerabilities
public String getXMLContent() throws XWikiException { String xml = this.doc.getXMLContent(getXWikiContext()); return getXWikiContext().getUtil().substitute("s/<email>.*?<\\/email>/<email>********<\\/email>/goi", getXWikiContext().getUtil().substitute("s/<password>.*?<\\/password>/<passwo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXMLContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getXMLContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public void onTextChanged(CharSequence s, int start, int before, int count) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTextChanged File: src/com/android/settings/password/ChooseLockPassword.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onTextChanged
src/com/android/settings/password/ChooseLockPassword.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
private XWikiContext getXWikiContext() { return (XWikiContext) execution.getContext().getProperty("xwikicontext"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXWikiContext File: xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java Repository: xwiki/xwiki-platform Th...
[ "CWE-94" ]
CVE-2021-32621
MEDIUM
6.5
xwiki/xwiki-platform
getXWikiContext
xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java
bb7068bd911f91e5511f3cfb03276c7ac81100bc
0
Analyze the following code function for security vulnerabilities
boolean setSystemGestureExclusion(List<Rect> exclusionRects) { if (mExclusionRects.equals(exclusionRects)) { return false; } mExclusionRects.clear(); mExclusionRects.addAll(exclusionRects); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSystemGestureExclusion File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
setSystemGestureExclusion
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private void acceptRingingCallInternal() { Call call = mCallsManager.getFirstCallWithState(CallState.RINGING); if (call != null) { call.answer(call.getVideoState()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: acceptRingingCallInternal File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
acceptRingingCallInternal
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
@Override public void sendResetPasswordEmailRequest(ResetPasswordRequestResponse requestResponse) throws ResetPasswordException { if (this.checkUserReference(requestResponse.getUserReference())) { AuthenticationResourceReference resourceReference = new AuthenticationR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendResetPasswordEmailRequest File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/inte...
[ "CWE-522" ]
CVE-2022-41933
MEDIUM
6.5
xwiki/xwiki-platform
sendResetPasswordEmailRequest
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/DefaultResetPasswordManager.java
443e8398b75a1295067d74afb5898370782d863a
0
Analyze the following code function for security vulnerabilities
public Intent getResult() { try { return mResult.take(); } catch (InterruptedException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResult File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
getResult
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void mergexWikiObjects(XWikiDocument templatedoc) { mergeXObjects(templatedoc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergexWikiObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
mergexWikiObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate findByUuid_Last(String uuid, OrderByComparator<KBTemplate> orderByComparator) throws NoSuchTemplateException { KBTemplate kbTemplate = fetchByUuid_Last(uuid, orderByComparator); if (kbTemplate != null) { return kbTemplate; } StringBundler msg = new StringBundler(4); msg....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByUuid_Last File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The ...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByUuid_Last
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public boolean checkPasswordHistory(String password, int userId) { String passwordHashString = new String( passwordToHash(password, userId), StandardCharsets.UTF_8); String passwordHistory = getString(PASSWORD_HISTORY_KEY, userId); if (passwordHistory == null) { retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPasswordHistory File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
checkPasswordHistory
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
public void setIssuerDN(String issuerDN) { this.issuerDN = issuerDN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIssuerDN File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setIssuerDN
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void onBootCompleted() { synchronized (this) { if (mContext.getResources().getBoolean( com.android.internal.R.bool.config_guestUserAutoCreated)) { // TODO(b/191067027): Move post-boot guest creation to system_server mUserSwitch...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBootCompleted File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onBootCompleted
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
private String lockTaskModeToString() { switch (mLockTaskModeState) { case LOCK_TASK_MODE_LOCKED: return "LOCKED"; case LOCK_TASK_MODE_PINNED: return "PINNED"; case LOCK_TASK_MODE_NONE: return "NONE"; default: return...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lockTaskModeToString File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
lockTaskModeToString
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override protected void onUnsuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, AuthenticationException failed) throws IOException { super.onUnsuccessfulAuthentication(request, response, failed); LOGGER.log(Level.INFO, "Login attempt failed", failed); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUnsuccessfulAuthentication File: core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-287" ]
CVE-2014-2066
MEDIUM
6.8
jenkinsci/jenkins
onUnsuccessfulAuthentication
core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java
8ac74c350779921598f9d5edfed39dd35de8842a
0
Analyze the following code function for security vulnerabilities
private String normalizeJarBasePath(String rawPath) { if (rawPath == null || rawPath.isEmpty()) { return ""; } return rawPath.endsWith(JAR_PATH_SEPARATOR) ? rawPath : rawPath + JAR_PATH_SEPARATOR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: normalizeJarBasePath File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-379" ]
CVE-2021-31411
MEDIUM
4.6
vaadin/flow
normalizeJarBasePath
flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
82cea56045b8430f7a26f037c01486b1feffa51d
0
Analyze the following code function for security vulnerabilities
public int getCarrierId() { return mCarrierId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCarrierId File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
getCarrierId
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
protected Editor<T> createEditor() { return new EditorImpl<>(propertySet); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createEditor File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
createEditor
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public Configuration getConfiguration() { // If the process has not registered to any display area to listen to the configuration // change, we can simply return the mFullConfiguration as default. if (!registeredForDisplayAreaConfigChanges()) { return super.getConfigura...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfiguration File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getConfiguration
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public List<KBTemplate> findByUuid(String uuid, int start, int end) { return findByUuid(uuid, start, end, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByUuid File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code ...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByUuid
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
private UI getUI() { assert isAttached(); assert getOwner() instanceof StateTree : "Attach should only be called when the node has been attached to the tree, not to a null owner"; return ((StateTree) getOwner()).getUI(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUI File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getUI
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAssistDataAllowedOnCurrentActivity() { int userId; synchronized (this) { userId = mUserController.getCurrentUserIdLocked(); ActivityRecord activity = getFocusedStack().topActivity(); if (activity == null) { return false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAssistDataAllowedOnCurrentActivity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
isAssistDataAllowedOnCurrentActivity
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setGroupedWithParent(boolean groupedWithParent) { mGroupedWithParent = groupedWithParent; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setGroupedWithParent File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
setGroupedWithParent
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
protected String emptyJsonResponse() { return sendJson(JSONCodec.encodeObject(o -> o)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: emptyJsonResponse File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
emptyJsonResponse
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public void onDismiss(DialogInterface dialog) { assert mNativeWebsiteSettingsPopup != 0; webContentsObserver.destroy(); nativeDestroy(mNativeWebsiteSettingsPopup); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDismiss File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-1261
MEDIUM
5
chromium
onDismiss
chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f
0
Analyze the following code function for security vulnerabilities
public void close() throws IOException { if (rof != null) { rof.close(); rof = null; } if (unpack != null) { unpack.cleanUp(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2018-12418
MEDIUM
4.3
junrar
close
src/main/java/com/github/junrar/Archive.java
ad8d0ba8e155630da8a1215cee3f253e0af45817
0
Analyze the following code function for security vulnerabilities
@Override public Collection<LBPool> listPool(String poolId) { Collection<LBPool> result = new HashSet<LBPool>(); result.add(pools.get(poolId)); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listPool File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java Repository: floodlight The code follows secure coding practices.
[ "CWE-362", "CWE-476" ]
CVE-2015-6569
MEDIUM
4.3
floodlight
listPool
src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
7f5bedb625eec3ff4d29987c31cef2553a962b36
0