instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Bean
public CorsFilter corsFilter() {
CorsConfiguration config = new CorsConfiguration();
config.setAllowCredentials(true);
config.addAllowedOrigin("*");
config.addAllowedHeader("*");
config.setMaxAge(18000L);
config.addAllowedMethod("*");
UrlBasedCorsConfigu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: corsFilter
File: console/src/main/java/com/alibaba/nacos/console/config/ConsoleConfig.java
Repository: alibaba/nacos
The code follows secure coding practices. | [
"CWE-290"
] | CVE-2021-29441 | HIGH | 7.5 | alibaba/nacos | corsFilter | console/src/main/java/com/alibaba/nacos/console/config/ConsoleConfig.java | 91d16023d91ea21a5e58722c751485a0b9bbeeb3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getIconMaxDimensions(String packageName, int userId) {
verifyCaller(packageName, userId);
synchronized (mLock) {
return mMaxIconDimension;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIconMaxDimensions
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getIconMaxDimensions | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | default void onNetworkUpdated(
@NonNull WifiConfiguration newConfig, @NonNull WifiConfiguration oldConfig) { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onNetworkUpdated
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | onNetworkUpdated | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | protected String getItemGroupAndItemMetaCondition(String crfVersionIds) {
return " where cv.crf_version_id in (" + crfVersionIds + ") and cv.crf_version_id = ifm.crf_version_id"
+ " and ifm.item_id = item.item_id and ifm.response_set_id = rs.response_set_id"
+ " and ifm.item_id = igm.item_id and... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getItemGroupAndItemMetaCondition
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | getItemGroupAndItemMetaCondition | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | public void backupAgentCreated(String agentPackageName, IBinder agent) {
if (DEBUG_BACKUP) Slog.v(TAG_BACKUP, "backupAgentCreated: " + agentPackageName
+ " = " + agent);
synchronized(this) {
if (!agentPackageName.equals(mBackupAppName)) {
Slog.e(TAG, "Backup ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: backupAgentCreated
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | backupAgentCreated | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void reportCurKeyguardUsageEvent(boolean keyguardShowing) {
ActivityManagerService.this.reportGlobalUsageEvent(keyguardShowing
? UsageEvents.Event.KEYGUARD_SHOWN
: UsageEvents.Event.KEYGUARD_HIDDEN);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportCurKeyguardUsageEvent
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | reportCurKeyguardUsageEvent | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dumpHeapFinished(String path) {
synchronized (this) {
if (Binder.getCallingPid() != mMemWatchDumpPid) {
Slog.w(TAG, "dumpHeapFinished: Calling pid " + Binder.getCallingPid()
+ " does not match last pid " + mMemWatchDumpPid);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpHeapFinished
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | dumpHeapFinished | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onChildItemLongClicked(long idFeed) {
startDialogFragment(idFeed, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onChildItemLongClicked
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
The code follows secure coding practices. | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | onChildItemLongClicked | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getPublicId() {
return fPublicId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPublicId
File: ext/java/nokogiri/XmlSchema.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | getPublicId | ext/java/nokogiri/XmlSchema.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | void sendContinueUserSwitchLocked(UserStartedState uss, int oldUserId, int newUserId) {
mCurUserSwitchCallback = null;
mHandler.removeMessages(USER_SWITCH_TIMEOUT_MSG);
mHandler.sendMessage(mHandler.obtainMessage(CONTINUE_USER_SWITCH_MSG,
oldUserId, newUserId, uss));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendContinueUserSwitchLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | sendContinueUserSwitchLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void clearChanges() {
changes = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearChanges
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | clearChanges | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | private UserReferenceSerializer<String> getUserReferenceCompactWikiSerializer()
{
return Utils.getComponent(UserReferenceSerializer.TYPE_STRING, "compactwiki/document");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserReferenceCompactWikiSerializer
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getUserReferenceCompactWikiSerializer | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @Override
void setClientVisible(boolean clientVisible) {
// TODO(shell-transitions): Remove mDeferHidingClient once everything is shell-transitions.
// pip activities should just remain in clientVisible.
if (!clientVisible && mDeferHidingClient) return;
super... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClientVisible
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | setClientVisible | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean parse(XMLTokener x, JSONObject context, String name, XMLParserConfiguration config)
throws JSONException {
char c;
int i;
JSONObject jsonObject = null;
String string;
String tagName;
Object token;
XMLXsiTypeConverter<?> xmlXsiTyp... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2022-45688
- Severity: HIGH
- CVSS Score: 7.5
Description: fix: limit the nesting depth
Function: parse
File: src/main/java/org/json/XML.java
Repository: stleary/JSON-java
Fixed Code:
private static boolean parse(XMLTokener x, JSONObject context, String name, X... | [
"CWE-787"
] | CVE-2022-45688 | HIGH | 7.5 | stleary/JSON-java | parse | src/main/java/org/json/XML.java | f566a1d9ee1f8139357017dc6c7def1da19cd8d4 | 1 |
Analyze the following code function for security vulnerabilities | Call getFirstCallWithState(int... states) {
return getFirstCallWithState(null, states);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstCallWithState
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getFirstCallWithState | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public boolean hasSelection() {
return mHasSelection;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasSelection
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | hasSelection | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | public void setSecret(final String secret) {
this.secret = secret;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSecret
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | setSecret | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | public void addProfilePolicySet(String id, Vector<ProfilePolicy> policySet) {
this.policySets.put(id, policySet);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addProfilePolicySet
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | addProfilePolicySet | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | private void removeAdminArtifacts(final ComponentName adminReceiver, final int userHandle) {
synchronized (getLockObject()) {
final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle);
if (admin == null) {
return;
}
final D... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeAdminArtifacts
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | removeAdminArtifacts | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public static int getSqlStatementType(String sql) {
sql = sql.trim();
if (sql.length() < 3) {
return STATEMENT_OTHER;
}
String prefixSql = sql.substring(0, 3).toUpperCase(Locale.ROOT);
if (prefixSql.equals("SEL")) {
return STATEMENT_SELECT;
} else ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSqlStatementType
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-40121 | MEDIUM | 5.5 | android | getSqlStatementType | core/java/android/database/DatabaseUtils.java | 3287ac2d2565dc96bf6177967f8e3aed33954253 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ServerBuilder annotatedService(String pathPrefix, Object service,
Iterable<?> exceptionHandlersAndConverters) {
virtualHostTemplate.annotatedService(pathPrefix, service, exceptionHandlersAndConverters);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: annotatedService
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | annotatedService | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | protected void initializeRequestListIfNeeded(XWikiContext context)
{
if (!context.containsKey(this.contextKey)) {
context.put(this.contextKey, new LinkedHashSet<String>());
}
if (!context.containsKey(this.parametersContextKey)) {
context.put(this.parametersContextKey,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeRequestListIfNeeded
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
The code... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | initializeRequestListIfNeeded | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getDeviceDensity() {
DisplayMetrics metrics = new DisplayMetrics();
if (getActivity() != null) {
getActivity().getWindowManager().getDefaultDisplay().getMetrics(metrics);
} else {
metrics = getContext().getResources().getDisplayMetrics();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceDensity
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getDeviceDensity | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void showWaitingForDebugger(IApplicationThread who, boolean waiting) {
synchronized (this) {
ProcessRecord app =
who != null ? getRecordForAppLocked(who) : null;
if (app == null) return;
Message msg = Message.obtain();
msg.wha... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showWaitingForDebugger
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | showWaitingForDebugger | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String getName() {
return name;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getName | base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mLock")
private List<String> getSettingsNamesLocked(int settingsType, int userId) {
// Don't enforce the instant app whitelist for now -- its too prone to unintended breakage
// in the current form.
return mSettingsRegistry.getSettingsNamesLocked(settingsType, userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSettingsNamesLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getSettingsNamesLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | private int updateProfileOffDeadlineLocked(
int profileUserId, ActiveAdmin profileOwner, boolean unlocked) {
final long now = mInjector.systemCurrentTimeMillis();
if (profileOwner.mProfileOffDeadline != 0 && now > profileOwner.mProfileOffDeadline) {
Slogf.i(LOG_TAG, "Profile off ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateProfileOffDeadlineLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | updateProfileOffDeadlineLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void deleteWithProgrammingRights() throws XWikiException
{
if (hasProgrammingRights()) {
deleteDocument();
} else {
java.lang.Object[] args = { this.getFullName() };
throw new XWikiException(XWikiException.MODULE_XWIKI_ACCESS, XWikiException.ERROR_XWIKI_ACC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteWithProgrammingRights
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | deleteWithProgrammingRights | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | private String readPreviousNameInternal(UserAccounts accounts, Account account) {
if (account == null) {
return null;
}
synchronized (accounts.dbLock) {
synchronized (accounts.cacheLock) {
AtomicReference<String> previousNameRef = accounts.previousNameCac... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readPreviousNameInternal
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | readPreviousNameInternal | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | private void clearAutocompleteSpanIfInvalid() {
Editable editableText = getEditableText();
CharSequence previousUserText = mAutocompleteSpan.mUserText;
CharSequence previousAutocompleteText = mAutocompleteSpan.mAutocompleteText;
if (editableText.length()
!= (previousUserT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearAutocompleteSpanIfInvalid
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | clearAutocompleteSpanIfInvalid | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | private void getFileInfo(String path) {
String pathTmp = path;
if (pathTmp == "") {
pathTmp = getFilePath();
}
String[] tmp = pathTmp.split("/");
File file = new File(this.fileRoot + pathTmp);
this.item = new HashMap<String, Object>();
String fileName ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileInfo
File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java
Repository: jflyfox/jfinal_cms
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2021-37262 | MEDIUM | 5 | jflyfox/jfinal_cms | getFileInfo | src/main/java/com/jflyfox/modules/filemanager/FileManager.java | e7fd0fe9362464c4d2bd308318eecc89a847b116 | 0 |
Analyze the following code function for security vulnerabilities | private void validateSystemSettingValue(String name, String value) {
Settings.System.Validator validator = Settings.System.VALIDATORS.get(name);
if (validator != null && !validator.validate(value)) {
throw new IllegalArgumentException("Invalid value: " + value
+ " for set... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateSystemSettingValue
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | validateSystemSettingValue | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | public byte[] encode()
{
final ByteBuffer bb = ByteBuffer.allocate(length);
bb.order(ByteOrder.BIG_ENDIAN);
bb.putInt(length);
bb.putInt(nonce.length);
bb.put(nonce);
if (keyName != null) {
final byte[] b = keyName.getBytes();
bb.putInt(b.length);
bb.put(b);
}
return ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encode
File: src/main/java/org/cryptacular/CiphertextHeader.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | encode | src/main/java/org/cryptacular/CiphertextHeader.java | 8c6c7528f1e24c6b71f3e36db0cb8a697256ce25 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void queryByNamedQuery(String projectName, String namedQuery, Revision revision,
AsyncMethodCallback resultHandler) {
unimplemented(resultHandler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryByNamedQuery
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | queryByNamedQuery | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void marshal(Object graph, Result result) throws XmlMappingException {
marshal(graph, result, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: marshal
File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-4152 | MEDIUM | 6.8 | spring-projects/spring-framework | marshal | spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java | 2843b7d2ee12e3f9c458f6f816befd21b402e3b9 | 0 |
Analyze the following code function for security vulnerabilities | public void sendOptionsChangedIntentLocked(Widget widget) {
Intent intent = new Intent(AppWidgetManager.ACTION_APPWIDGET_OPTIONS_CHANGED);
intent.setComponent(widget.provider.info.provider);
intent.putExtra(AppWidgetManager.EXTRA_APPWIDGET_ID, widget.appWidgetId);
intent.putExtra(AppWidg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendOptionsChangedIntentLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | sendOptionsChangedIntentLocked | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | public void save(String table, String id, Object entity, boolean returnId, boolean upsert, boolean convertEntity,
Handler<AsyncResult<String>> replyHandler) {
client.getConnection(conn -> save(conn, table, id, entity,
returnId, upsert, convertEntity, closeAndHandleResult(conn, replyHandler)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | save | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onCreate(Bundle icicle) {
super.onCreate(icicle);
addPreferencesFromResource(R.xml.callforward_options);
mSubscriptionInfoHelper = new SubscriptionInfoHelper(this, getIntent());
mSubscriptionInfoHelper.setActionBarTitle(
getActionBar(), getR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: src/com/android/phone/GsmUmtsCallForwardOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | onCreate | src/com/android/phone/GsmUmtsCallForwardOptions.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | public static byte[] ASCIIHexDecode(byte in[]) {
ByteArrayOutputStream out = new ByteArrayOutputStream();
boolean first = true;
int n1 = 0;
for (int k = 0; k < in.length; ++k) {
int ch = in[k] & 0xff;
if (ch == '>')
break;
if (PRTokenis... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ASCIIHexDecode
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | ASCIIHexDecode | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "9.0RC1")
public Document toXMLDocument(XWikiContext context) throws XWikiException
{
return toXMLDocument(true, false, false, false, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toXMLDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | toXMLDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void allowsShortJpaSyntax() throws Exception {
assertCountQuery(SIMPLE_QUERY, COUNT_QUERY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: allowsShortJpaSyntax
File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
Repository: spring-projects/spring-data-jpa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | allowsShortJpaSyntax | src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public IdentityProvider getIdentityProvider(String federatedIdPName, String tenantDomain)
throws IdentityApplicationManagementException {
try {
startTenantFlow(tenantDomain);
IdentityProviderDAO idpdao = ApplicationMgtSystemConfig.getInstance().getIdentityProvi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIdentityProvider
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-identit... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getIdentityProvider | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean check(DiscoveryStrategyConfig c1, DiscoveryStrategyConfig c2) {
return c1 == c2 || !(c1 == null || c2 == null)
&& nullSafeEqual(c1.getClassName(), c2.getClassName())
&& nullSafeEqual(c1.getProperties(), c2.getProperties());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | private void sendResourceUpdatedBroadcast(int resourceType, List<String> resourceIds) {
final Intent intent = new Intent(ACTION_DEVICE_POLICY_RESOURCE_UPDATED);
intent.putExtra(EXTRA_RESOURCE_IDS, resourceIds.toArray(String[]::new));
intent.putExtra(EXTRA_RESOURCE_TYPE, resourceType);
in... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendResourceUpdatedBroadcast
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | sendResourceUpdatedBroadcast | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@UnsupportedAppUsage
public CharSequence get(int idx) {
CharSequence seq = getSequence(idx);
return seq == null ? "" : seq;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: get
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | get | core/java/android/content/res/StringBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public boolean isNotify() {
return notify;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNotify
File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-254",
"CWE-264"
] | CVE-2016-8600 | MEDIUM | 5 | dotCMS/core | isNotify | src/com/dotmarketing/cms/comment/struts/CommentsForm.java | cb84b130065c9eed1d1df9e4770ffa5d4bd30569 | 0 |
Analyze the following code function for security vulnerabilities | private boolean hasUserSetupCompleted(int userHandle) {
if (!mHasFeature) {
return true;
}
return mInjector.hasUserSetupCompleted(getUserData(userHandle));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasUserSetupCompleted
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | hasUserSetupCompleted | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void setKeyguardBottomAreaVisibility(int statusBarState,
boolean goingToFullShade) {
mKeyguardBottomArea.animate().cancel();
if (goingToFullShade) {
mKeyguardBottomArea.animate()
.alpha(0f)
.setStartDelay(mStatusBar.getKeyguardFadin... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyguardBottomAreaVisibility
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setKeyguardBottomAreaVisibility | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("javadoc")
public int computeHorizontalScrollOffset() {
return mRenderCoordinates.getScrollXPixInt();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: computeHorizontalScrollOffset
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | computeHorizontalScrollOffset | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void sendPutConfigurationForUserMsg(int userId, Configuration config) {
final ContentResolver resolver = mContext.getContentResolver();
Settings.System.putConfigurationForUser(resolver, config, userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendPutConfigurationForUserMsg
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | sendPutConfigurationForUserMsg | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public String getPackageForIntentSender(IIntentSender sender) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(sender.asBinder());
mRemote.transact(GET_PACKAGE_FOR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPackageForIntentSender
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getPackageForIntentSender | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private void setLeftButton(IntentButton button) {
mLeftButton = button;
if (!(mLeftButton instanceof DefaultLeftButton)) {
mLeftIsVoiceAssist = false;
}
updateLeftAffordance();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLeftButton
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setLeftButton | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void setReadLength(int readLength) {
readLength_ = readLength;
checkReadLength_ = true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setReadLength
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | setReadLength | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected XMLReader createReader() throws SAXException {
if (textConverterRef == null) {
throw new ProcessException(
"No XML fragment wrapper has been assigned to the parser but XML fragment parsers require one");
}
// Load the latest TextConverter ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createReader
File: stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | createReader | stroom-pipeline/src/main/java/stroom/xml/converter/xmlfragment/XMLFragmentParser.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isWebBrowserEditionResource(HttpServletRequest request) {
return request.getRequestURI().contains(getApplicationURL() + "/services/wbe/");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isWebBrowserEditionResource
File: core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | isWebBrowserEditionResource | core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | public void onCameraClick() {
if (EffortlessPermissions.hasPermissions(this, PERMISSIONS_CAMERA)) {
videoOn = !videoOn;
if (videoOn) {
binding.cameraButton.getHierarchy().setPlaceholderImage(R.drawable.ic_videocam_white_24px);
if (cameraEnumerator.getDevi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCameraClick
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | onCameraClick | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | public static String trimToSize(String source, int length, String suffix) {
int area = (length > 100) ? length / 2 : length;
return trimToSize(source, length, area, suffix);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimToSize
File: src/org/opencms/util/CmsStringUtil.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | trimToSize | src/org/opencms/util/CmsStringUtil.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | private void reconcileApps(String volumeUuid) {
final File[] files = FileUtils
.listFilesOrEmpty(Environment.getDataAppDirectory(volumeUuid));
for (File file : files) {
final boolean isPackage = (isApkFile(file) || file.isDirectory())
&& !PackageInstallerS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reconcileApps
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | reconcileApps | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public Boolean isUseResourceRoleMappings() {
return useResourceRoleMappings;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUseResourceRoleMappings
File: services/src/main/java/org/keycloak/services/managers/ClientManager.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-798"
] | CVE-2019-14837 | MEDIUM | 6.4 | keycloak | isUseResourceRoleMappings | services/src/main/java/org/keycloak/services/managers/ClientManager.java | 9a7c1a91a59ab85e7f8889a505be04a71580777f | 0 |
Analyze the following code function for security vulnerabilities | public final boolean isCheckForEOI ()
{
return m_bCheckForEOI;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCheckForEOI
File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java
Repository: phax/ph-commons
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34612 | HIGH | 7.5 | phax/ph-commons | isCheckForEOI | ph-json/src/main/java/com/helger/json/parser/JsonParser.java | 02a4d034dcfb2b6e1796b25f519bf57a6796edce | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationAsFloat02() throws Exception
{
Instant date = Instant.ofEpochSecond(123456789L, 183917322);
Instant value = MAPPER.readValue("123456789.183917322", Instant.class);
assertEquals("The value is not correct.", date, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDeserializationAsFloat02
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationAsFloat02 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | private void addComponent(Component c) {
extensionComponents.add(c);
c.setParent(this);
markAsDirty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addComponent
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | addComponent | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean jsFunction_isUserExistsInRole(Context cx, Scriptable thisObj,
Object[] args, Function funObj)
throws ScriptException,
APIManagementException, org.wso2.carbon.user.api.UserStoreException {
if (args == null || ar... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_isUserExistsInRole
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure ... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_isUserExistsInRole | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void purgeRepository(String projectName, String repositoryName, AsyncMethodCallback resultHandler) {
handleAsVoidResult(executor.execute(Command.purgeRepository(SYSTEM, projectName, repositoryName))
.thenCompose(unused -> mds.purgeRepo(SYSTEM, projectName,... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: purgeRepository
File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
Repository: line/centraldogma
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2021-38388 | MEDIUM | 6.5 | line/centraldogma | purgeRepository | server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java | e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd | 0 |
Analyze the following code function for security vulnerabilities | public List<Object> updateObjectsFromRequest(String className) throws XWikiException
{
return updateObjectsFromRequest(className, "");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateObjectsFromRequest
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | updateObjectsFromRequest | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | Column getColumnByColumnId(String columnId) {
Object propertyId = getPropertyIdByColumnId(columnId);
return getColumn(propertyId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColumnByColumnId
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getColumnByColumnId | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> pageSize(int pageSize) {
this.pageSize = pageSize;
calculateStartAndEndRow();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pageSize
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | pageSize | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | protected void setUseSni(boolean flag) {
useSni = Boolean.valueOf(flag);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseSni
File: src/main/java/org/conscrypt/SSLParametersImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3840 | HIGH | 10 | android | setUseSni | src/main/java/org/conscrypt/SSLParametersImpl.java | 5af5e93463f4333187e7e35f3bd2b846654aa214 | 0 |
Analyze the following code function for security vulnerabilities | public void notifyOutstandingRpc(ShutdownSignalException signal) {
RpcWrapper k = nextOutstandingRpc();
if (k != null) {
k.shutdown(signal);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyOutstandingRpc
File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | notifyOutstandingRpc | src/main/java/com/rabbitmq/client/impl/AMQChannel.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public void browserForward(PeerComponent browserPeer) {
((AndroidImplementation.AndroidBrowserComponent) browserPeer).forward();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: browserForward
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | browserForward | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean equals(@Nullable Object o) {
if (this == o) {
return true;
}
if (!(o instanceof Map.Entry)) {
return false;
}
final Map.Entry<?, ?> that = (Map.Entry<?, ?>) o;
final Object thatKey ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | equals | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public void getProcessStatesForPIDs(/*in*/ int[] pids, /*out*/ int[] states) {
if (pids == null) {
throw new NullPointerException("pids");
} else if (states == null) {
throw new NullPointerException("states");
} else if (pids.length != states.length) {
throw n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessStatesForPIDs
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | getProcessStatesForPIDs | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public Authentication getAuthentication(String authName) {
return authentications.get(authName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthentication
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getAuthentication | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void freeStorage(final String volumeUuid, final long freeStorageSize,
final IntentSender pi) {
mContext.enforceCallingOrSelfPermission(
android.Manifest.permission.CLEAR_APP_CACHE, null);
// Queue up an async operation since clearing cache may take a litt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: freeStorage
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | freeStorage | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void putItem(TopLevelItem item) throws IOException, InterruptedException {
String name = item.getName();
TopLevelItem old = items.get(name);
if (old ==item) return; // noop
checkPermission(Item.CREATE);
if (old!=null)
old.delete();
items.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: putItem
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | putItem | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SaReactorFilter setAuth(SaFilterAuthStrategy auth) {
this.auth = auth;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAuth
File: sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | setAuth | sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | IAccountManagerResponse getResponseAndClose() {
if (mResponse == null) {
close();
return null;
}
IAccountManagerResponse response = mResponse;
close(); // this clears mResponse so we need to save the response before this call
re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResponseAndClose
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getResponseAndClose | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getScreenCaptureDisabled(ComponentName who, int userHandle, boolean parent) {
if (!mHasFeature) {
return false;
}
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getScreenCaptureDisabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getScreenCaptureDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private AnnotationMap[] collectAnnotations(Annotation[][] mainAnns, Annotation[][] mixinAnns) {
final int count = mainAnns.length;
AnnotationMap[] result = new AnnotationMap[count];
for (int i = 0; i < count; ++i) {
AnnotationCollector c = collectAnnotations(AnnotationCollector.empty... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: collectAnnotations
File: src/main/java/com/fasterxml/jackson/databind/introspect/AnnotatedCreatorCollector.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | collectAnnotations | src/main/java/com/fasterxml/jackson/databind/introspect/AnnotatedCreatorCollector.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasManageOngoingCallsPermission(String callingPackage) {
try {
Log.startSession("TSI.hMOCP");
enforceCallingPackage(callingPackage, "hasManageOngoingCallsPermission");
return PermissionChecker.checkPermissionForDataDeliveryFrom... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasManageOngoingCallsPermission
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | hasManageOngoingCallsPermission | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public AttributeList deserialize(
JsonParser parser,
DeserializationContext context
) throws IOException, JsonProcessingException {
AttributeList list = new AttributeList();
JsonNode node = parser.getCodec().readTree(parser);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deserialize
File: base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | deserialize | base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected CountDownLatch getStopped() {
return stopped;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStopped
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | getStopped | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | public int finish() {
if(has_error()) {
return -1;
} else if(is_finished()) {
return 1;
} else {
return 0;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finish
File: ext/puma_http11/org/jruby/puma/Http11Parser.java
Repository: puma
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-41136 | LOW | 3.6 | puma | finish | ext/puma_http11/org/jruby/puma/Http11Parser.java | acdc3ae571dfae0e045cf09a295280127db65c7f | 0 |
Analyze the following code function for security vulnerabilities | public void connect() throws WebSocketException
{
try
{
// Connect to the server (either a proxy or a WebSocket endpoint).
doConnect();
}
catch (WebSocketException e)
{
// Failed to connect the server.
try
{
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connect
File: src/main/java/com/neovisionaries/ws/client/SocketConnector.java
Repository: TakahikoKawasaki/nv-websocket-client
The code follows secure coding practices. | [
"CWE-295"
] | CVE-2017-1000209 | MEDIUM | 4.3 | TakahikoKawasaki/nv-websocket-client | connect | src/main/java/com/neovisionaries/ws/client/SocketConnector.java | feb9c8302757fd279f4cfc99cbcdfb6ee709402d | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void executeList(TestContext context) {
Async async = context.async();
JsonArray ids = new JsonArray().add(randomUuid()).add(randomUuid());
List<JsonArray> list = new ArrayList<>(2);
list.add(new JsonArray().add(ids.getString(0)));
list.add(new JsonArray().add(ids.getString(1)));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeList
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | executeList | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public void addStanzaAcknowledgedListener(StanzaListener listener) {
stanzaAcknowledgedListeners.add(listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addStanzaAcknowledgedListener
File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | addStanzaAcknowledgedListener | smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isDigit() {
return current>='0' && current<='9';
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDigit
File: src/main/org/hjson/JsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34620 | HIGH | 7.5 | hjson/hjson-java | isDigit | src/main/org/hjson/JsonParser.java | 91bef056d56bf968451887421c89a44af1d692ff | 0 |
Analyze the following code function for security vulnerabilities | boolean isImplicitlyExcludingAllSystemGestures() {
final boolean stickyHideNav =
mAttrs.insetsFlags.behavior == BEHAVIOR_SHOW_TRANSIENT_BARS_BY_SWIPE
&& !getRequestedVisibility(ITYPE_NAVIGATION_BAR);
return stickyHideNav && mWmService.mConstants.mSystemGestureExcl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isImplicitlyExcludingAllSystemGestures
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isImplicitlyExcludingAllSystemGestures | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public void startDocument() {
this.isValidating = true;
this.current = null;
this.peer = null;
this.lastWasEndElement = false;
this.parents.clear();
this.characters = null;
this.configurationStack.clear();
this.namespaces.clear();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDocument
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | startDocument | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return (key == null ? 0 : key.hashCode()) ^ AsciiString.hashCode(value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | hashCode | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | public void setDefaultIntentResultListener(IntentResultListener l) {
this.defaultResultListener = l;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDefaultIntentResultListener
File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setDefaultIntentResultListener | Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_SECURITY_LOGGING, conditional = true)
public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) {
throwIfParentInstance("isSecurityLoggingEnabled");
try {
return mService.isSecurityLoggingEnabled(admin, mContext.getPackageName... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSecurityLoggingEnabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isSecurityLoggingEnabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @SuppressLint("InflateParams")
protected void showCreateContactDialog(final String prefilledJid, final Invite invite) {
FragmentTransaction ft = getSupportFragmentManager().beginTransaction();
Fragment prev = getSupportFragmentManager().findFragmentByTag(FRAGMENT_TAG_DIALOG);
if (prev != null) {
ft.remove(pre... | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2018-18467
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Do not insert text shared over XMPP uri when already drafting message
XMPP uris in the style of `xmpp:test@domain.tld?body=Something` can be used to
directly share a message with a specific contact. Pr... | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | showCreateContactDialog | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 1 |
Analyze the following code function for security vulnerabilities | @LargeTest
@Test
public void testPullNonPullableExternalCall() throws Exception {
// TODO: Revisit this unit test once telecom support for filtering external calls from
// InCall services is implemented.
mConnectionServiceFixtureA.mConnectionServiceDelegate.mProperties =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testPullNonPullableExternalCall
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | testPullNonPullableExternalCall | tests/src/com/android/server/telecom/tests/BasicCallTests.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DynamicForm discardingErrors() {
final Form<Dynamic> form = super.discardingErrors();
return new DynamicForm(
super.rawData(),
super.files(),
form.errors(),
form.value(),
this.messagesApi,
this.formatters,
this.validatorFactory,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: discardingErrors
File: web/play-java-forms/src/main/java/play/data/DynamicForm.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | discardingErrors | web/play-java-forms/src/main/java/play/data/DynamicForm.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Intent getIntentForIntentSender(IIntentSender pendingResult) {
if (!(pendingResult instanceof PendingIntentRecord)) {
return null;
}
try {
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
return res.key.requestIntent != null ?... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntentForIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getIntentForIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public int startPostEnroll(IBinder token) {
IFingerprintDaemon daemon = getFingerprintDaemon();
if (daemon == null) {
Slog.w(TAG, "startPostEnroll: no fingeprintd!");
return 0;
}
try {
return daemon.postEnroll();
} catch (RemoteException e) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startPostEnroll
File: services/core/java/com/android/server/fingerprint/FingerprintService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | startPostEnroll | services/core/java/com/android/server/fingerprint/FingerprintService.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Definition before(final String method, final String pattern,
final Route.Before handler) {
return appendDefinition(method, pattern, handler);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: before
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | before | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public long getMinRoamingUplinkBandwidth() {
return mMinRoamingUplinkBandwidth;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMinRoamingUplinkBandwidth
File: framework/java/android/net/wifi/hotspot2/pps/Policy.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21240 | MEDIUM | 5.5 | android | getMinRoamingUplinkBandwidth | framework/java/android/net/wifi/hotspot2/pps/Policy.java | 69119d1d3102e27b6473c785125696881bce9563 | 0 |
Analyze the following code function for security vulnerabilities | public void setManagedSubscriptionsPolicy(@Nullable ManagedSubscriptionsPolicy policy) {
throwIfParentInstance("setManagedSubscriptionsPolicy");
try {
mService.setManagedSubscriptionsPolicy(policy);
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setManagedSubscriptionsPolicy
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setManagedSubscriptionsPolicy | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.