instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public void run() {
RecentsConfiguration config = RecentsConfiguration.getInstance();
if (config.svelteLevel == RecentsConfiguration.SVELTE_NONE) {
RecentsTaskLoader loader = RecentsTaskLoader.getInstance();
SystemServicesProxy ssp = loader.getSystemServicesProxy(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: run
File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0813 | MEDIUM | 6.6 | android | run | packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java | 16a76dadcc23a13223e9c2216dad1fe5cad7d6e1 | 0 |
Analyze the following code function for security vulnerabilities | public WorkflowInstance addZippedMediaPackage(InputStream zipStream)
throws IngestException, IOException, MediaPackageException {
try {
return addZippedMediaPackage(zipStream, null, null);
} catch (NotFoundException e) {
throw new IllegalStateException("A not found exception was thrown wit... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addZippedMediaPackage
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | addZippedMediaPackage | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | public void onRemovalError(Fingerprint fp, int errMsgId, CharSequence errString) { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onRemovalError
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onRemovalError | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | private void _writeUser(final String name, final User details) throws Exception {
if (name == null || details == null) {
throw new Exception("UserFactory:saveUser null");
} else {
_assertSaltAcceptable(details);
m_users.put(name, details);
}
_s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _writeUser
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | _writeUser | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | public void stop() {
if (atomicHandler.get() == null) {
return;
}
try {
// The most reliable way to stop the webpack-dev-server is
// by informing webpack to exit. We have implemented in webpack a
// a listener that handles the stop command via HT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stop
File: flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | stop | flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public PageParameters getParamsBeforeEdit() {
return paramsOf(getProject(), state);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParamsBeforeEdit
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | getParamsBeforeEdit | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAuthenticatedUser(final Context context, final EPerson ePerson) {
return Objects.equals(context.getCurrentUser(), ePerson);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAuthenticatedUser
File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | isAuthenticatedUser | dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | public List<Pair> parameterToPairs(String collectionFormat, String name, Object value){
List<Pair> params = new ArrayList<Pair>();
// preconditions
if (name == null || name.isEmpty() || value == null) return params;
Collection valueCollection;
if (value instanceof Collection) {
valueCollecti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parameterToPairs
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | parameterToPairs | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private String getBaseUrl(String pUrl, String pServletPath) {
String sUrl;
try {
URL url = new URL(pUrl);
String host = getIpIfPossible(url.getHost());
sUrl = new URL(url.getProtocol(),host,url.getPort(),pServletPath).toExternalForm();
} catch (MalformedURLExc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBaseUrl
File: agent/core/src/main/java/org/jolokia/http/AgentServlet.java
Repository: jolokia
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2014-0168 | MEDIUM | 6.8 | jolokia | getBaseUrl | agent/core/src/main/java/org/jolokia/http/AgentServlet.java | 2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364 | 0 |
Analyze the following code function for security vulnerabilities | private String getParent(XWikiRequest request, XWikiDocument doc, boolean isSpace, XWikiContext context)
{
// This template can be passed a parent document reference in parameter (using the "parent" parameter).
// If a parent parameter is passed, use it to set the parent when creating the new Page o... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | getParent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java | 30c52b01559b8ef5ed1035dac7c34aaf805764d5 | 0 |
Analyze the following code function for security vulnerabilities | boolean pauseBackStacks(boolean userLeaving, boolean resuming, boolean dontWait) {
boolean someActivityPaused = false;
for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) {
ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseBackStacks
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | pauseBackStacks | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | public void setStatus(String status) {
this.status = status;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStatus
File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setStatus | base/common/src/main/java/com/netscape/certsrv/cert/CertData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private String hexToString(final byte[] data) {
// check to see if the byte array has an even number of elements
if ((data.length % 2) != 0) return null;
// there will be two hexadecimal characters for each byte element
final char[] buffer = new char[data.length * 2];
f... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hexToString
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | hexToString | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAssistDataAllowedOnCurrentActivity() {
int userId = mCurrentUserId;
synchronized (this) {
ActivityRecord activity = getFocusedStack().topActivity();
if (activity == null) {
return false;
}
userId = activity.us... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAssistDataAllowedOnCurrentActivity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | isAssistDataAllowedOnCurrentActivity | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getDismissKeyguardIfInsecure() {
return mDismissKeyguardIfInsecure;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDismissKeyguardIfInsecure
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | getDismissKeyguardIfInsecure | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SyncNotedAppOp noteProxyOperation(int code,
@NonNull AttributionSource attributionSource, boolean shouldCollectAsyncNotedOp,
@Nullable String message, boolean shouldCollectMessage, boolean skiProxyOperation,
@NonNull HexFunction<Integer, Attributi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noteProxyOperation
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | noteProxyOperation | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void process(RequestEvent event) throws IOException {
FeatureManager featureManager = event.getFeatureManager();
HttpServletRequest request = event.getRequest();
HttpServletResponse response = event.getResponse();
// identify the feature
Feature feature = nu... | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2020-28191
- Severity: HIGH
- CVSS Score: 8.8
Description: Added CSRF protection to the togglz console via a CSRF token passed between the server and the clinet. This remediates the vulnerabilty CVE-2020-28191 by blocking CSRF attacks as the attcker will not be a... | [
"CWE-352"
] | CVE-2020-28191 | HIGH | 8.8 | togglz | process | console/src/main/java/org/togglz/console/handlers/edit/EditPageHandler.java | ed66e3f584de954297ebaf98ea4a235286784707 | 1 |
Analyze the following code function for security vulnerabilities | protected synchronized void decorateWithTLS(TLSClientParameters tlsClientParameters,
HttpURLConnection connection) throws GeneralSecurityException {
int hash = tlsClientParameters.hashCode();
if (hash != lastTlsHash) {
lastTlsHash = hash;
socketFactory = null;
... | Vulnerability Classification:
- CWE: CWE-755
- CVE: CVE-2018-8039
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Fix hostname verification using the deprecated SSL stack
Function: decorateWithTLS
File: rt/transports/http/src/main/java/org/apache/cxf/transport/https/HttpsURLConnectionFactory.java
Repository: apache... | [
"CWE-755"
] | CVE-2018-8039 | MEDIUM | 6.8 | apache/cxf | decorateWithTLS | rt/transports/http/src/main/java/org/apache/cxf/transport/https/HttpsURLConnectionFactory.java | fae6fabf9bd7647f5e9cb68897a7d72b545b741b | 1 |
Analyze the following code function for security vulnerabilities | @NonNull
@Deprecated
public BubbleMetadata.Builder createIntentBubble(@NonNull PendingIntent intent,
@NonNull Icon icon) {
if (intent == null) {
throw new IllegalArgumentException("Bubble requires non-null pending intent");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createIntentBubble
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | createIntentBubble | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private boolean isUnauthorized(Response response) {
return response.getStatus() == HttpServletResponse.SC_FORBIDDEN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUnauthorized
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practi... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | isUnauthorized | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @PostMapping("/update/password")
@MsAuditLog(module = OperLogModule.SYSTEM_USER, type = OperLogConstants.UPDATE, title = "个人密码")
public int updateCurrentUserPassword(@RequestBody EditPassWordRequest request) {
return baseUserService.updateCurrentUserPassword(request);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateCurrentUserPassword
File: framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-38494 | HIGH | 7.5 | metersphere | updateCurrentUserPassword | framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java | a23f75d93b666901fd148d834df9384f6f24cf28 | 0 |
Analyze the following code function for security vulnerabilities | boolean hasMethodWriteObject() {
return (methodWriteObject != null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasMethodWriteObject
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | hasMethodWriteObject | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | private void calculateHistoryCount() {
MemoryCacheService.HistoryCountKey key;
if (mySearchEntity.getResourceId() != null) {
key = MemoryCacheService.HistoryCountKey.forInstance(mySearchEntity.getResourceId());
} else if (mySearchEntity.getResourceType() != null) {
key = MemoryCacheService.HistoryCountKey.f... | Vulnerability Classification:
- CWE: CWE-400
- CVE: CVE-2021-32053
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Resolve test failures
Function: calculateHistoryCount
File: hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java
Repository: hapifhir/hapi-fhir
Fixed Code:
pri... | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | calculateHistoryCount | hapi-fhir-jpaserver-base/src/main/java/ca/uhn/fhir/jpa/search/PersistedJpaBundleProvider.java | b53ae23e6fb8fdb6017aa9e8c688c49a4d91e9f4 | 1 |
Analyze the following code function for security vulnerabilities | private String getReportUrl(String filename, String urlBase) {
String reportUrl = urlBase + "/pages/forms/migrate/" + filename + "/downloadLogFile";
return reportUrl;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getReportUrl
File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | getReportUrl | web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | private PrintWriter openFile(File file) throws FileNotFoundException, UnsupportedEncodingException {
PrintWriter writer = new PrintWriter(file.getPath(), "UTF-8");
return writer;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openFile
File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | openFile | web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | void setHiddenWhileSuspended(boolean hide) {
if (mOwnerCanAddInternalSystemWindow
|| (!isSystemAlertWindowType(mAttrs.type) && mAttrs.type != TYPE_TOAST)) {
return;
}
if (mHiddenWhileSuspended == hide) {
return;
}
mHiddenWhileSuspended = hi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHiddenWhileSuspended
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | setHiddenWhileSuspended | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | void onRestoreStates(Bundle savedStates) {
mBundle = (HashMap) savedStates.getSerializable(DATA_KEY);
mName = savedStates.getString(KeyChain.EXTRA_NAME);
byte[] bytes = savedStates.getByteArray(Credentials.USER_PRIVATE_KEY);
if (bytes != null) {
setPrivateKey(bytes);
... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2016-2422
- Severity: HIGH
- CVSS Score: 9.3
Description: Trust CA certificates added for the whole OS only
Excludes any CA certificates installed for wifi-only from being used for
anything else. Does not take effect retroactively against certs which
were alread... | [
"CWE-264"
] | CVE-2016-2422 | HIGH | 9.3 | android | onRestoreStates | src/com/android/certinstaller/CredentialHelper.java | 70dde9870e9450e10418a32206ac1bb30f036b2c | 1 |
Analyze the following code function for security vulnerabilities | @Override
public int getLocalPort() {
return 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalPort
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getLocalPort | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private void logUserRestrictionCall(
String key, boolean enabled, boolean parent, CallerIdentity caller) {
final int eventId = enabled
? DevicePolicyEnums.ADD_USER_RESTRICTION
: DevicePolicyEnums.REMOVE_USER_RESTRICTION;
DevicePolicyEventLogger
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logUserRestrictionCall
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | logUserRestrictionCall | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public ROWTYPE getRow(int rowIndex) {
if (rowIndex >= rows.size() || rowIndex < 0) {
throw new IllegalArgumentException(
"No row at given index " + rowIndex);
}
return rows.get(rowIndex);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRow
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getRow | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public void makeRemoteNamedDestinationsLocal() {
if (remoteToLocalNamedDestinations)
return;
remoteToLocalNamedDestinations = true;
HashMap names = getNamedDestination(true);
if (names.isEmpty())
return;
for (int k = 1; k <= pageRefs.size(); ++k) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeRemoteNamedDestinationsLocal
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | makeRemoteNamedDestinationsLocal | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | public void setCaptionsDir(String dir) {
captionsDir = dir;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCaptionsDir
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | setCaptionsDir | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void engineInit(int opmode, Key key, AlgorithmParameterSpec params,
SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException {
checkAndSetEncodedKey(opmode, key);
engineInitInternal(this.encodedKey, params, random);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineInit
File: src/main/java/org/conscrypt/OpenSSLCipher.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2461 | HIGH | 7.6 | android | engineInit | src/main/java/org/conscrypt/OpenSSLCipher.java | 1638945d4ed9403790962ec7abed1b7a232a9ff8 | 0 |
Analyze the following code function for security vulnerabilities | @Programming
public XWikiDeletedDocument getDeletedDocument()
{
if (hasProgrammingRights()) {
return this.deletedDoc;
} else {
return null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeletedDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-29208 | HIGH | 7.5 | xwiki/xwiki-platform | getDeletedDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/DeletedDocument.java | d9e947559077e947315bf700c5703dfc7dd8a8d7 | 0 |
Analyze the following code function for security vulnerabilities | public void setEditorFieldFactory(FieldGroupFieldFactory fieldFactory) {
editorFieldGroup.setFieldFactory(fieldFactory);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEditorFieldFactory
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | setEditorFieldFactory | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean matches(Path path) {
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: matches
File: src/main/java/org/olat/core/util/PathUtils.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | matches | src/main/java/org/olat/core/util/PathUtils.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Element toDOM(Document document) {
Element certEnrollmentRequestElement = document.createElement("CertEnrollmentRequest");
toDOM(document, certEnrollmentRequestElement);
return certEnrollmentRequestElement;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDOM
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toDOM | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void cancelNotificationFromListenerLocked(ManagedServiceInfo info,
int callingUid, int callingPid, String pkg, String tag, int id, int userId) {
cancelNotification(callingUid, callingPid, pkg, tag, id, 0,
Notification.FLAG_ONGOING_EVENT | Notification.FLAG_FOREGRO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelNotificationFromListenerLocked
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | cancelNotificationFromListenerLocked | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public Object nextValue() throws JSONException {
char c = this.nextClean();
String string;
switch (c) {
case '"':
case '\'':
return this.nextString(c);
case '{':
this.back();
try {
return new JSONObject(this);
... | Vulnerability Classification:
- CWE: CWE-770
- CVE: CVE-2023-5072
- Severity: HIGH
- CVSS Score: 7.5
Description: Generalize the logic to disallow nested objects and arrays as keys in objects.
Fixes #771.
Function: nextValue
File: src/main/java/org/json/JSONTokener.java
Repository: stleary/JSON-java
Fixed Code:
pub... | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | nextValue | src/main/java/org/json/JSONTokener.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void setKeyguardDisabledFeatures(
ComponentName who, String callerPackageName, int which, boolean parent) {
if (!mHasFeature) {
return;
}
CallerIdentity caller;
if (isUnicornFlagEnabled()) {
caller = getCallerIdentity(who, callerP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyguardDisabledFeatures
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setKeyguardDisabledFeatures | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | void reset(boolean clearRequest) {
mStartActivity = null;
mIntent = null;
mCallingUid = -1;
mOptions = null;
mRestrictedBgActivity = false;
mLaunchTaskBehind = false;
mLaunchFlags = 0;
mLaunchMode = INVALID_LAUNCH_MODE;
mLaunchParams.reset();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reset
File: services/core/java/com/android/server/wm/ActivityStarter.java
Repository: android
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-21269 | HIGH | 7.8 | android | reset | services/core/java/com/android/server/wm/ActivityStarter.java | 70ec64dc5a2a816d6aa324190a726a85fd749b30 | 0 |
Analyze the following code function for security vulnerabilities | private Intent putExtrasToIntent(@NonNull Intent intent, @NonNull Notification notification, @NonNull User user) {
return intent
.putExtra(EXTRA_ACCOUNT, user.getAccountName())
.putExtra(EXTRA_LINK, notification.getLink())
.putExtra(EXTRA_OBJECT_ID, notification.getObjectId()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: putExtrasToIntent
File: src/main/java/com/nextcloud/client/integrations/deck/DeckApiImpl.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | putExtrasToIntent | src/main/java/com/nextcloud/client/integrations/deck/DeckApiImpl.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void handlerAdded(ChannelHandlerContext ctx) throws Exception
{
copyAttrsFromParentChannel(this.parent, ctx.channel());
addHttp2StreamSpecificHandlers(ctx.pipeline());
addHttpHandlerFn.accept(ctx.pipeline());
ctx.pipeline().remove(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handlerAdded
File: zuul-core/src/main/java/com/netflix/zuul/netty/server/http2/Http2StreamInitializer.java
Repository: Netflix/zuul
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-21295 | LOW | 2.6 | Netflix/zuul | handlerAdded | zuul-core/src/main/java/com/netflix/zuul/netty/server/http2/Http2StreamInitializer.java | 033d3c2de354e249f6d775bde8b67b0997888958 | 0 |
Analyze the following code function for security vulnerabilities | private int runListLibraries() {
try {
List<String> list = new ArrayList<String>();
String[] rawList = mPm.getSystemSharedLibraryNames();
for (int i=0; i<rawList.length; i++) {
list.add(rawList[i]);
}
// Sort by name
Colle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runListLibraries
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | runListLibraries | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | protected Map<String, Object> extractCustomAttributes(final String xml) {
final SAXParserFactory spf = SAXParserFactory.newInstance();
spf.setNamespaceAware(true);
spf.setValidating(false);
try {
final SAXParser saxParser = spf.newSAXParser();
final XMLReader xmlR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractCustomAttributes
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | extractCustomAttributes | cas-client-core/src/main/java/org/jasig/cas/client/validation/Cas20ServiceTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | public boolean setKeyguardDisabled(@NonNull ComponentName admin, boolean disabled) {
throwIfParentInstance("setKeyguardDisabled");
try {
return mService.setKeyguardDisabled(admin, disabled);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyguardDisabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setKeyguardDisabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public HttpRequest protocol(final String protocol) {
this.protocol = protocol;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: protocol
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | protocol | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CipherState fork(byte[] key, int offset) {
CipherState cipher;
cipher = new AESGCMFallbackCipherState();
cipher.initializeKey(key, offset);
return cipher;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fork
File: src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | fork | src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Analyze the following code function for security vulnerabilities | void installStage(String packageName, File stagedDir, String stagedCid,
IPackageInstallObserver2 observer, PackageInstaller.SessionParams params,
String installerPackageName, int installerUid, UserHandle user) {
final VerificationParams verifParams = new VerificationParams(null, params.o... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installStage
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | installStage | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasRunningActivity(int uid, @Nullable String packageName) {
if (packageName == null) return false;
synchronized (ActivityManagerService.this) {
for (int i = 0; i < mLruProcesses.size(); i++) {
final ProcessRecord processRecord... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasRunningActivity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | hasRunningActivity | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder decorator(
DecoratingHttpServiceFunction decoratingHttpServiceFunction) {
virtualHostTemplate.decorator(decoratingHttpServiceFunction);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: decorator
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | decorator | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | private String getCreatorPackageName(WifiConfiguration config) {
String creatorName = config.creatorName;
// getNameForUid (Stored in WifiConfiguration.creatorName) returns a concatenation of name
// and uid for shared UIDs ("name:uid").
if (!creatorName.contains(":")) {
retu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCreatorPackageName
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getCreatorPackageName | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public Bundle sendWindowWallpaperCommandLocked(WindowState window,
String action, int x, int y, int z, Bundle extras, boolean sync) {
if (window == mWallpaperTarget || window == mLowerWallpaperTarget
|| window == mUpperWallpaperTarget) {
boolean doWait = sync;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendWindowWallpaperCommandLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | sendWindowWallpaperCommandLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | private void handleKeyguardDone() {
Trace.beginSection("KeyguardViewMediator#handleKeyguardDone");
final int currentUser = KeyguardUpdateMonitor.getCurrentUser();
mUiBgExecutor.execute(() -> {
if (mLockPatternUtils.isSecure(currentUser)) {
mLockPatternUtils.getDeviceP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleKeyguardDone
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | handleKeyguardDone | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | protected boolean updateSeries(URI uri) throws IOException, IngestException {
HttpResponse response = null;
InputStream in = null;
boolean isUpdated = false;
try {
HttpGet getDc = new HttpGet(uri);
response = httpClient.execute(getDc);
in = response.getEntity().getContent();
Dubl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSeries
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | updateSeries | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | public void setLaunchTransitionEndRunnable(Runnable r) {
mLaunchAnimationEndRunnable = r;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLaunchTransitionEndRunnable
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setLaunchTransitionEndRunnable | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Beta
@Deprecated
@CanIgnoreReturnValue // some processors won't return a useful result
public
static <T> T readBytes(File file, ByteProcessor<T> processor) throws IOException {
return asByteSource(file).read(processor);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readBytes
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-8908 | LOW | 2.1 | google/guava | readBytes | guava/src/com/google/common/io/Files.java | fec0dbc4634006a6162cfd4d0d09c962073ddf40 | 0 |
Analyze the following code function for security vulnerabilities | void updateAdapterState(int prevState, int newState){
if (mCallbacks !=null) {
int n=mCallbacks.beginBroadcast();
debugLog("updateAdapterState() - Broadcasting state to " + n + " receivers.");
for (int i=0; i <n;i++) {
try {
mCallbacks.getB... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAdapterState
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | updateAdapterState | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private void onFingerprintAuthenticated(int userId) {
mUserFingerprintAuthenticated.put(userId, true);
// If fingerprint unlocking is allowed, this event will lead to a Keyguard dismiss or to a
// wake-up (if Keyguard is not showing), so we don't need to listen until Keyguard is
// full... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFingerprintAuthenticated
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onFingerprintAuthenticated | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@UnsupportedAppUsage
public int addAssetPath(String path) {
return addAssetPathInternal(path, false /*overlay*/, false /*appAsLib*/);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addAssetPath
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | addAssetPath | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | protected abstract String getContextPath(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContextPath
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practi... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | getContextPath | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | protected void flingSettings(float vel, boolean expand, final Runnable onFinishRunnable,
boolean isClick) {
float target = expand ? mQsMaxExpansionHeight : mQsMinExpansionHeight;
if (target == mQsExpansionHeight) {
if (onFinishRunnable != null) {
onFinishRunnable.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flingSettings
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | flingSettings | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public String getName() {
return className;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | getName | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | private void setQsExpansion(float height) {
height = Math.min(Math.max(height, mQsMinExpansionHeight), mQsMaxExpansionHeight);
mQsFullyExpanded = height == mQsMaxExpansionHeight && mQsMaxExpansionHeight != 0;
if (height > mQsMinExpansionHeight && !mQsExpanded && !mStackScrollerOverscrolling) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setQsExpansion
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setQsExpansion | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private int installLocationPolicy(PackageInfoLite pkgLite) {
String packageName = pkgLite.packageName;
int installLocation = pkgLite.installLocation;
boolean onSd = (installFlags & PackageManager.INSTALL_EXTERNAL) != 0;
// reader
synchronized (mPackages) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installLocationPolicy
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | installLocationPolicy | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int checkUriPermission(Uri uri, int pid, int uid,
final int modeFlags, int userId, IBinder callerToken) {
enforceNotIsolatedCaller("checkUriPermission");
// Another redirected-binder-call permissions check as in
// {@link checkPermissionWithToken}.
Ident... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkUriPermission
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | checkUriPermission | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public File readFrom(Class<File> type, Type genericType,
Annotation[] annotations, MediaType mediaType,
MultivaluedMap<String, String> httpHeaders, InputStream entityStream) throws IOException {
File downloadedFile = File.createTempFile(PREFIX, SUFFIX);
if (HeaderUt... | Vulnerability Classification:
- CWE: CWE-668
- CVE: CVE-2023-0481
- Severity: LOW
- CVSS Score: 3.3
Description: Use newer API for creating tmp files in RESTEasy Reactive
Function: readFrom
File: independent-projects/resteasy-reactive/common/runtime/src/main/java/org/jboss/resteasy/reactive/common/providers/serialise... | [
"CWE-668"
] | CVE-2023-0481 | LOW | 3.3 | quarkusio/quarkus | readFrom | independent-projects/resteasy-reactive/common/runtime/src/main/java/org/jboss/resteasy/reactive/common/providers/serialisers/FileBodyHandler.java | 95d5904f7cf18c8165b97d8ca03b203d7f69c17e | 1 |
Analyze the following code function for security vulnerabilities | public void setXObjects(DocumentReference classReference, List<BaseObject> objects)
{
// Remove existing objects
List<BaseObject> existingbjects = this.xObjects.get(classReference);
if (existingbjects != null) {
existingbjects.clear();
}
for (BaseObject obj : obj... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-26470
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-19223: Improve xobject memory storage in XWikidocument
Function: setXObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xw... | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setXObjects | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public RemoteViews makeContentView(boolean increasedHeight) {
return makeMediaContentView(mBuilder.mN.contentView);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeContentView
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeContentView | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | final void scheme(String scheme) {
requireNonNull(scheme, "scheme");
set(HttpHeaderNames.SCHEME, scheme);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheme
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | scheme | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public String getIssuedOnFrom() {
return issuedOnFrom;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIssuedOnFrom
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getIssuedOnFrom | base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected void doDSGet(Context context,
HttpServletRequest request,
HttpServletResponse response)
throws ServletException, IOException, SQLException, AuthorizeException
{
// First get the step
int step = UIUtil.getIntParameter(request, "step");
try
{
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doDSGet
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-601",
"CWE-79"
] | CVE-2022-31192 | MEDIUM | 6.1 | DSpace | doDSGet | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/RequestItemServlet.java | 28eb8158210d41168a62ed5f9e044f754513bc37 | 0 |
Analyze the following code function for security vulnerabilities | public static String displayablePath(String path, int visibleChars) {
/*
* use a very simple method: prefix + "..." + suffix
*
* where prefix is the beginning part of path (as much as we can squeeze in)
* and suffix is the end path of path
*/
if (path == nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayablePath
File: core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | displayablePath | core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java | 2ab070cdac087bd208f64fa8138bb709f8d7680c | 0 |
Analyze the following code function for security vulnerabilities | private void addItemsToAccept(final String[] items){
if (items == null){
return;
}
for (int i = 0; i < items.length; ++i) {
String item = items[i];
this.addAccept(item);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addItemsToAccept
File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
Repository: alibaba/fastjson
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-25845 | MEDIUM | 6.8 | alibaba/fastjson | addItemsToAccept | src/main/java/com/alibaba/fastjson/parser/ParserConfig.java | 8f3410f81cbd437f7c459f8868445d50ad301f15 | 0 |
Analyze the following code function for security vulnerabilities | public Drawable getConversationDrawable(Context context, ShortcutInfo info, String pkg,
int uid, boolean important) {
if (info == null) {
return null;
}
ConversationIconFactory iconFactory = new ConversationIconFactory(context,
context.getSystemService(Lau... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConversationDrawable
File: src/com/android/settings/notification/NotificationBackend.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35667 | HIGH | 7.8 | android | getConversationDrawable | src/com/android/settings/notification/NotificationBackend.java | d8355ac47e068ad20c6a7b1602e72f0585ec0085 | 0 |
Analyze the following code function for security vulnerabilities | private void writePendingOperationsLocked() {
final int N = mPendingOperations.size();
FileOutputStream fos = null;
try {
if (N == 0) {
if (Log.isLoggable(TAG_FILE, Log.VERBOSE)){
Log.v(TAG, "Truncating " + mPendingFile.getBaseFile());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writePendingOperationsLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | writePendingOperationsLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public int installLocationPolicy(PackageInfoLite pkgLite, int installFlags) {
String packageName = pkgLite.packageName;
int installLocation = pkgLite.installLocation;
// reader
synchronized (mPm.mLock) {
// Currently installed package which the new package is attempting to re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installLocationPolicy
File: services/core/java/com/android/server/pm/InstallPackageHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21257 | HIGH | 7.8 | android | installLocationPolicy | services/core/java/com/android/server/pm/InstallPackageHelper.java | 1aec7feaf07e6d4568ca75d18158445dbeac10f6 | 0 |
Analyze the following code function for security vulnerabilities | public IActivityContainer createVirtualActivityContainer(IBinder parentActivityToken,
IActivityContainerCallback callback) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createVirtualActivityContainer
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | createVirtualActivityContainer | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean isSelfAnimating(int flags, int typesToCheck) {
if (mControllableInsetProvider != null) {
return false;
}
return super.isSelfAnimating(flags, typesToCheck);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSelfAnimating
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isSelfAnimating | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "5.1M2")
public List<String> getTranslationList(XWikiContext context) throws XWikiException
{
// in few cases like accessing a deleted document, the store might be null.
if (getStore() != null) {
return getStore().getTranslationList(this, context);
} else ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTranslationList
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getTranslationList | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void createProjectMetadataTest()
throws Exception {
ObjectNode optionObj = ParsingUtilities.evaluateJsonStringToObjectNode(
"{\"projectName\":\"acme\",\"projectTags\":[],\"created\":\"2017-12-18T13:28:40.659\",\"modified\":\"2017-12-20T09:28:06.654\",\"creator\":\"\"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createProjectMetadataTest
File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-19859 | MEDIUM | 4 | OpenRefine | createProjectMetadataTest | main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java | 79994e86da1a3eecc62723f4ba90f14a63ad0e72 | 0 |
Analyze the following code function for security vulnerabilities | boolean canForceResizeNonResizable(int windowingMode) {
if (windowingMode == WINDOWING_MODE_PINNED && info.supportsPictureInPicture()) {
return false;
}
// Activity should be resizable if the task is.
final boolean supportsMultiWindow = task != null
? task.sup... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canForceResizeNonResizable
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | canForceResizeNonResizable | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_WIPE_DATA, conditional = true)
public void wipeData(int flags, @NonNull CharSequence reason) {
Objects.requireNonNull(reason, "reason string is null");
Preconditions.checkStringNotEmpty(reason, "reason string is empty");
Preconditions.checkArg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wipeData
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | wipeData | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | BroadcastQueue broadcastQueueForIntent(Intent intent) {
final boolean isFg = (intent.getFlags() & Intent.FLAG_RECEIVER_FOREGROUND) != 0;
if (DEBUG_BROADCAST_BACKGROUND) Slog.i(TAG_BROADCAST,
"Broadcast intent " + intent + " on "
+ (isFg ? "foreground" : "background") + " ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: broadcastQueueForIntent
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | broadcastQueueForIntent | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, String> getServerVariables() {
return serverVariables;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServerVariables
File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure co... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getServerVariables | samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | protected void startBrowserProcess() throws Exception {
// The activity must be launched in order for proper webview statics to be setup.
getActivity();
getInstrumentation().runOnMainSync(new Runnable() {
@Override
public void run() {
AwBrowserProcess.star... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startBrowserProcess
File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5155 | MEDIUM | 4.3 | chromium | startBrowserProcess | android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java | b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isInPictureInPictureMode(IBinder token) {
final long origId = Binder.clearCallingIdentity();
try {
synchronized(this) {
return isInPictureInPictureMode(ActivityRecord.forTokenLocked(token));
}
} finally {
Binder.res... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInPictureInPictureMode
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | isInPictureInPictureMode | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static XMLBuilder parse(File xmlFile)
throws ParserConfigurationException, SAXException, IOException
{
return XMLBuilder.parse(new InputSource(new FileReader(xmlFile)));
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2014-125087
- Severity: MEDIUM
- CVSS Score: 5.2
Description: Disable external entities by default to prevent XXE injection attacks, re #6
XML Builder classes now explicitly enable or disable
'external-general-entities' and 'external-parameter-entities' features... | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | parse | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 1 |
Analyze the following code function for security vulnerabilities | private void initialAuthenticationLayout(View decor, FillResponse response) {
RemoteViews presentation = response.getDialogPresentation();
if (presentation == null) {
presentation = response.getPresentation();
}
if (presentation == null) {
throw new RuntimeExcepti... | Vulnerability Classification:
- CWE: CWE-Other, CWE-610
- CVE: CVE-2023-40133
- Severity: MEDIUM
- CVSS Score: 5.5
Description: [DO NOT MERGE] Verify URI Permissions in Autofill RemoteViews
Check permissions of URI inside of FillResponse's RemoteViews. If the
current user does not have the required permissions to vie... | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | initialAuthenticationLayout | services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 1 |
Analyze the following code function for security vulnerabilities | public boolean checkScenarioEnv(String scenarioId) {
ApiScenarioWithBLOBs apiScenarioWithBLOBs = apiScenarioMapper.selectByPrimaryKey(scenarioId);
apiScenarioEnvService.setScenarioEnv(apiScenarioWithBLOBs);
return apiScenarioEnvService.checkScenarioEnv(apiScenarioWithBLOBs, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkScenarioEnv
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | checkScenarioEnv | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<String> searchDocuments(String parameterizedWhereClause, int maxResults, int startOffset,
List<?> parameterValues) throws XWikiException
{
return this.xwiki.getStore().searchDocumentsNames(parameterizedWhereClause, maxResults, startOffset,
parameterValues, get... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: searchDocuments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | searchDocuments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public SQLType getType() {
return this.type;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getType
File: extensions/database/src/com/google/refine/extension/database/mariadb/MariaDBConnectionManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-41886 | HIGH | 7.5 | OpenRefine | getType | extensions/database/src/com/google/refine/extension/database/mariadb/MariaDBConnectionManager.java | 2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d | 0 |
Analyze the following code function for security vulnerabilities | public String getVirtualHost() {
return this.virtualHost;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVirtualHost
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | getVirtualHost | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private void setVisibleRequested(boolean visible) {
if (visible == mVisibleRequested) {
return;
}
mVisibleRequested = visible;
setInsetsFrozen(!visible);
if (app != null) {
mTaskSupervisor.onProcessActivityStateChanged(app, false /* forceBatch */);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVisibleRequested
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setVisibleRequested | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent) {
if (Intent.ACTION_UID_REMOVED.equals(intent.getAction())) {
int uid = intent.getIntExtra(Intent.EXTRA_UID, -1);
PackageInactivityListener listener = mListeners.get(uid);
if (listener != ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | onReceive | services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | private void handleSimStateChange(int subId, int slotId, State state) {
if (DEBUG_SIM_STATES) {
Log.d(TAG, "handleSimStateChange(subId=" + subId + ", slotId="
+ slotId + ", state=" + state +")");
}
if (!SubscriptionManager.isValidSubscriptionId(subId)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleSimStateChange
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | handleSimStateChange | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int countCollectionsWithSubmit(String q, Context context, Community community, String entityType)
throws SQLException, SearchServiceException {
DiscoverQuery discoverQuery = new DiscoverQuery();
discoverQuery.setMaxResults(0);
discoverQuery.setDSpaceObjectFilter(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: countCollectionsWithSubmit
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | countCollectionsWithSubmit | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | private void deleteSyncAttachment(AttachmentModuleRelationMapper batchAttachmentModuleRelationMapper,
Set<String> jiraAttachmentSet,
List<FileAttachmentMetadata> allMsAttachments) {
// 删除Jira中不存在的附件
if (CollectionUtils.isNotEmpt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteSyncAttachment
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | deleteSyncAttachment | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setContentLengthLong(long arg0) {
// ignore
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContentLengthLong
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | setContentLengthLong | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | public void setAllowComment(Integer allowComment) {
this.allowComment = allowComment;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAllowComment
File: src/main/java/cn/luischen/model/ContentDomain.java
Repository: WinterChenS/my-site
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29638 | MEDIUM | 5.4 | WinterChenS/my-site | setAllowComment | src/main/java/cn/luischen/model/ContentDomain.java | d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.