instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public int getShortcutCount() {
synchronized (mLock) {
return mShortcuts.size();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortcutCount
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | getShortcutCount | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | private ArrayList<ComponentName> getSuppressors() {
ArrayList<ComponentName> names = new ArrayList<ComponentName>();
for (int i = mListenersDisablingEffects.size() - 1; i >= 0; --i) {
ArraySet<ManagedServiceInfo> serviceInfoList = mListenersDisablingEffects.valueAt(i);
for (Mana... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSuppressors
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | getSuppressors | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public boolean addHomepageLoadedListener(HomepageLoadedListener listener) {
if (mHomepageView == null) {
return false;
} else {
if (!mLoadedListeners.contains(listener)) {
mLoadedListeners.add(listener);
}
return true;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addHomepageLoadedListener
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | addHomepageLoadedListener | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isSharingShortcut(int callingUserId, @NonNull String callingPackage,
@NonNull String packageName, @NonNull String shortcutId, int userId,
@NonNull IntentFilter filter) {
Preconditions.checkStringNotEmpty(callingPackage, "callingPackage");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSharingShortcut
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | isSharingShortcut | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public boolean resourceExists(String name)
{
if (getEngineContext() != null) {
try {
if (getResource(name) != null) {
return true;
}
} catch (IOException e) {
}
}
try {
File file = new File(na... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resourceExists
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | resourceExists | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getAndExprConditionSQL(Condition[] conditions) {
return _getLogicalExprConditionSQL(conditions, "AND");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAndExprConditionSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getAndExprConditionSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public final Set<MessageHandler> getHandlers() {
Set<MessageHandler> msgHandlers = new HashSet<>();
for (HandlerWrapper handler : handlers.values()) {
msgHandlers.add(handler.getHandler());
}
return msgHandlers;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHandlers
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | getHandlers | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | public long getExpireSearchResultsAfterMillis() {
return myExpireSearchResultsAfterMillis;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getExpireSearchResultsAfterMillis
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | getExpireSearchResultsAfterMillis | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | private void exceptionHandler(Invocation ai, Exception e) {
if (ai.getActionKey().startsWith("/api")) {
ExceptionResponse exceptionResponse = new ExceptionResponse();
exceptionResponse.setError(1);
exceptionResponse.setMessage(e.getMessage());
exceptionResponse.se... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exceptionHandler
File: web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | exceptionHandler | web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<AppWidgetProviderInfo> getInstalledProvidersForProfile(int categoryFilter,
int profileId) {
final int userId = UserHandle.getCallingUserId();
if (DEBUG) {
Slog.i(TAG, "getInstalledProvidersForProfiles() " + userId);
}
// Ensure the prof... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstalledProvidersForProfile
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | getInstalledProvidersForProfile | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | private int convertToUsabilityStatsTriggerType(int unusableEventTriggerType) {
int triggerType;
switch (unusableEventTriggerType) {
case WifiIsUnusableEvent.TYPE_DATA_STALL_BAD_TX:
triggerType = WifiUsabilityStats.TYPE_DATA_STALL_BAD_TX;
break;
cas... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertToUsabilityStatsTriggerType
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | convertToUsabilityStatsTriggerType | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private boolean canReadPhoneState(String callingPackage, String message) {
// The system/default dialer can always read phone state - so that emergency calls will
// still work.
if (isPrivilegedDialerCalling(callingPackage)) {
return true;
}
try {
mContex... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canReadPhoneState
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | canReadPhoneState | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | public boolean getUserCanSkipBouncer(int userId) {
return getUserHasTrust(userId) || (mUserFingerprintAuthenticated.get(userId)
&& isUnlockingWithFingerprintAllowed());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserCanSkipBouncer
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | getUserCanSkipBouncer | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public void updateResources() {
int panelWidth = getResources().getDimensionPixelSize(R.dimen.notification_panel_width);
int panelGravity = getResources().getInteger(R.integer.notification_panel_layout_gravity);
FrameLayout.LayoutParams lp =
(FrameLayout.LayoutParams) mQsFrame.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateResources
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | updateResources | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getUserId() {
return mUserId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserId
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | getUserId | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | public static void writeByteArray(ObjectDataOutput out, byte[] value) throws IOException {
int size = (value == null) ? 0 : value.length;
out.writeInt(size);
if (size > 0) {
out.write(value);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeByteArray
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | writeByteArray | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | WebSession createNewSession(String hostAddr) {
String newId;
do {
newId = generateSessionId();
} while (sessions.get(newId) != null);
WebSession session = new WebSession(this);
session.lastAccess = System.currentTimeMillis();
session.put("sessionId", newId);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNewSession
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | createNewSession | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @RequestMapping("reCreateIndex")
@Csrf
public String reCreateIndex(@RequestAttribute SysSite site, @SessionAttribute SysUser admin, HttpServletRequest request,
ModelMap model) {
contentService.reCreateIndex();
Long userId = admin.getId();
logOperateService.save(new LogOperate... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reCreateIndex
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/sys/SysSiteAdminController.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2020-20914 | CRITICAL | 9.8 | sanluan/PublicCMS | reCreateIndex | publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/sys/SysSiteAdminController.java | bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isPackageAvailable(String packageName, int userId) {
if (!sUserManager.exists(userId)) return false;
enforceCrossUserPermission(Binder.getCallingUid(), userId, false, false, "is package available");
synchronized (mPackages) {
PackageParser.Package p = mPa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPackageAvailable
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isPackageAvailable | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void setEnforceReferentialIntegrityOnWrite(boolean theEnforceReferentialIntegrityOnWrite) {
myEnforceReferentialIntegrityOnWrite = theEnforceReferentialIntegrityOnWrite;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEnforceReferentialIntegrityOnWrite
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setEnforceReferentialIntegrityOnWrite | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SetValuedMap<String, String> getProgramOrganisationUnitsAssociations( Set<String> programUids )
{
return jdbcOrgUnitAssociationsStore.getOrganisationUnitsAssociations( programUids );
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProgramOrganisationUnitsAssociations
File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java
Repository: dhis2/dhis2-core
The code follows secure coding practices... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | getProgramOrganisationUnitsAssociations | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java | ef04483a9b177d62e48dcf4e498b302a11f95e7d | 0 |
Analyze the following code function for security vulnerabilities | public double getFooterRowHeight() {
return getState(false).footerRowHeight;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFooterRowHeight
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getFooterRowHeight | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void afterPropertiesSet() throws Exception {
boolean hasContextPath = StringUtils.hasLength(this.contextPath);
boolean hasClassesToBeBound = !ObjectUtils.isEmpty(this.classesToBeBound);
boolean hasPackagesToScan = !ObjectUtils.isEmpty(this.packagesToScan);
if (hasContextPath && (hasClassesToB... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: afterPropertiesSet
File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-4152 | MEDIUM | 6.8 | spring-projects/spring-framework | afterPropertiesSet | spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java | 2843b7d2ee12e3f9c458f6f816befd21b402e3b9 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean encoderEnforceMaxConcurrentStreams() {
return encoderEnforceMaxConcurrentStreams != null ? encoderEnforceMaxConcurrentStreams : false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encoderEnforceMaxConcurrentStreams
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | encoderEnforceMaxConcurrentStreams | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | public void setSemanticModules(SemanticModules modules) {
this.modules = modules;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSemanticModules
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | setSemanticModules | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | public String getDialogUri() {
if (!useNewStyle()) {
return getDialogRealUri();
} else {
return CmsToolManager.linkForToolPath(getJsp(), getCurrentToolPath());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDialogUri
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | getDialogUri | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | public Builder setScopes(Collection<String> scopes) {
this.scopes = Preconditions.checkNotNull(scopes);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setScopes
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | setScopes | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | public void setShutdownHandler(ShutdownHandler shutdownHandler) {
this.shutdownHandler = shutdownHandler;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShutdownHandler
File: h2/src/main/org/h2/tools/Server.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | setShutdownHandler | h2/src/main/org/h2/tools/Server.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private void dumpDumpFiles(PrintWriter pw) {
synchronized (mLock) {
pw.println("** SHORTCUT MANAGER FILES (dumpsys shortcut -n -f)");
mShortcutDumpFiles.dumpAll(pw);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpDumpFiles
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | dumpDumpFiles | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private byte[] derEncode(
BigInteger r,
BigInteger s)
throws IOException
{
ASN1Integer[] rs = new ASN1Integer[]{ new ASN1Integer(r), new ASN1Integer(s) };
return new DERSequence(rs).getEncoded(ASN1Encoding.DER);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: derEncode
File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2016-1000338 | MEDIUM | 5 | bcgit/bc-java | derEncode | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java | b0c3ce99d43d73a096268831d0d120ffc89eac7f | 0 |
Analyze the following code function for security vulnerabilities | public int getParentId() {
return mParentId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParentId
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | getParentId | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder connectionDrainDurationMicros(long durationMicros) {
checkArgument(connectionDrainDurationMicros >= 0,
"connectionDrainDurationMicros: %s (expected: >= 0)",
connectionDrainDurationMicros);
connectionDrainDurationMicros = durationMicros;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connectionDrainDurationMicros
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | connectionDrainDurationMicros | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public void setCreateDate(Date createDate) {
this.createDate = createDate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCreateDate
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | setCreateDate | publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DocumentFragment createDocumentFragment() {
return doc.createDocumentFragment();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDocumentFragment
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | createDocumentFragment | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public static String rescaleImageAndEncodeAsBase64(@Nonnull final InputStream in, final int maxSize) throws IOException {
final Image image = ImageIO.read(in);
String result = null;
if (image != null) {
result = rescaleImageAndEncodeAsBase64(image, maxSize);
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rescaleImageAndEncodeAsBase64
File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
Repository: raydac/netbeans-mmd-plugin
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000542 | MEDIUM | 6.8 | raydac/netbeans-mmd-plugin | rescaleImageAndEncodeAsBase64 | mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java | 9fba652bf06e649186b8f9e612d60e9cc15097e9 | 0 |
Analyze the following code function for security vulnerabilities | private PlaybackState getStateWithUpdatedPosition() {
PlaybackState state;
long duration;
synchronized (mLock) {
if (mDestroyed) {
return null;
}
state = mPlaybackState;
duration = mDuration;
}
PlaybackState result =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStateWithUpdatedPosition
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | getStateWithUpdatedPosition | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@RequiresPermission(anyOf = {
android.Manifest.permission.MANAGE_USERS,
android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS
})
public boolean isUnattendedManagedKiosk() {
throwIfParentInstance("isUnattendedManagedKiosk");
if (mService != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUnattendedManagedKiosk
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | isUnattendedManagedKiosk | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public void addDeny(String name) {
if (name == null || name.length() == 0) {
return;
}
long hash = TypeUtils.fnv1a_64(name);
if (Arrays.binarySearch(this.denyHashCodes, hash) >= 0) {
return;
}
long[] hashCodes = new long[this.denyHashCodes.length... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addDeny
File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
Repository: alibaba/fastjson
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-25845 | MEDIUM | 6.8 | alibaba/fastjson | addDeny | src/main/java/com/alibaba/fastjson/parser/ParserConfig.java | 8f3410f81cbd437f7c459f8868445d50ad301f15 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate102(File dataDir, Stack<Integer> versions) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate102
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate102 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | protected boolean _isEnumValueOf(AnnotatedWithParams creator) {
return creator.getDeclaringClass().isEnum()
&& "valueOf".equals(creator.getName());
} | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2019-16942
- Severity: HIGH
- CVSS Score: 7.5
Description: More clean up after #2478
Function: _isEnumValueOf
File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
Repository: FasterXML/jackson-databind
Fixed Code:
protected boolea... | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | _isEnumValueOf | src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 1 |
Analyze the following code function for security vulnerabilities | private void stopNotificationLogging() {
// Report all notifications as invisible and turn down the
// reporter.
if (!mCurrentlyVisibleNotifications.isEmpty()) {
logNotificationVisibilityChanges(Collections.<NotificationVisibility>emptyList(),
mCurrentlyVisibleNot... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopNotificationLogging
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | stopNotificationLogging | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @FrameIteratorSkip
private final int invokeExact_thunkArchetype_I(Object receiver, int argPlaceholder) {
return ComputedCalls.dispatchVirtual_I(jittedMethodAddress(receiver), vtableIndexArgument(receiver), receiver, argPlaceholder);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: invokeExact_thunkArchetype_I
File: jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java
Repository: eclipse-openj9/openj9
The code follows secure coding practices. | [
"CWE-440",
"CWE-250"
] | CVE-2021-41035 | HIGH | 7.5 | eclipse-openj9/openj9 | invokeExact_thunkArchetype_I | jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java | c6e0d9296ff9a3084965d83e207403de373c0bad | 0 |
Analyze the following code function for security vulnerabilities | public int runListUsers() {
try {
IActivityManager am = ActivityManagerNative.getDefault();
List<UserInfo> users = mUm.getUsers(false);
if (users == null) {
System.err.println("Error: couldn't get users");
return 1;
} else {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: runListUsers
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | runListUsers | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | private void loadSettingsLocked(DevicePolicyData policy, int userHandle) {
DevicePolicyData.load(policy,
makeJournaledFile(userHandle),
component -> findAdmin(
component, userHandle, /* throwForMissingPermission= */ false),
getOwnerComponen... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadSettingsLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | loadSettingsLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | protected void handleDeviceProvisioned() {
for (int i = 0; i < mCallbacks.size(); i++) {
KeyguardUpdateMonitorCallback cb = mCallbacks.get(i).get();
if (cb != null) {
cb.onDeviceProvisioned();
}
}
if (mDeviceProvisionedObserver != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleDeviceProvisioned
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | handleDeviceProvisioned | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | private void clearInternalData() {
mPendingRootCaCertDepth = -1;
mPendingRootCaCert = null;
mPendingServerCert = null;
mPendingServerCertSubjectInfo = null;
mPendingServerCertIssuerInfo = null;
mCurrentTofuConfig = null;
} | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-21242
- Severity: CRITICAL
- CVSS Score: 9.8
Description: [TOFU] Validate full cert chains before displaying dialog
When a full chain including a Root CA is provided by the server,
perform a full validation of the chain before displaying the
TOFU dialog.
... | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | clearInternalData | service/java/com/android/server/wifi/InsecureEapNetworkHandler.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 1 |
Analyze the following code function for security vulnerabilities | private void updateResumedAppTrace(@Nullable ActivityRecord resumed) {
if (mTracedResumedActivity != null) {
Trace.asyncTraceEnd(TRACE_TAG_ACTIVITY_MANAGER,
constructResumedTraceName(mTracedResumedActivity.packageName), 0);
}
if (resumed != null) {
Tra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateResumedAppTrace
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | updateResumedAppTrace | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public final TextPaint getPaint() {
return mPaint;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPaint
File: core/java/android/text/Layout.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9452 | MEDIUM | 4.3 | android | getPaint | core/java/android/text/Layout.java | 3b6f84b77c30ec0bab5147b0cffc192c86ba2634 | 0 |
Analyze the following code function for security vulnerabilities | private void createIdmapsForPackageLI(PackageParser.Package pkg) {
ArrayMap<String, PackageParser.Package> overlays = mOverlays.get(pkg.packageName);
if (overlays == null) {
Slog.w(TAG, "Unable to create idmap for " + pkg.packageName + ": no overlay packages");
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createIdmapsForPackageLI
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | createIdmapsForPackageLI | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean equals(Object obj) {
if (this == obj)
return true;
if (!super.equals(obj))
return false;
if (getClass() != obj.getClass())
return false;
CertRequestInfo other = (CertRequestInfo) obj;
if (certId == null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | equals | base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | void onServiceConnected() {
synchronized(mLock) {
if (mListeners != null && !mListeners.isEmpty()) {
setSoftKeyboardCallbackEnabled(true);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onServiceConnected
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | onServiceConnected | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | public int getLaunchedFromUid(IBinder activityToken) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(activityToken);
mRemote.transact(GET_LAUNCHED_FROM_UID_TRANSA... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLaunchedFromUid
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | getLaunchedFromUid | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public static SubscriptionResponse jsFunction_addAPISubscription(Context cx, Scriptable thisObj,
Object[] args, Function funObj)
throws APIManagementException {
if (!isStringArray(args)) {
throw new APIManagementExcepti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_addAPISubscription
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure ... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_addAPISubscription | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | public static LoadPaths of(
final List<File> paths,
final boolean unlimitedAccess
) {
if (paths == null || paths.isEmpty()) {
return new LoadPaths(null, unlimitedAccess);
}
else {
final List<File> savePaths = new ArrayList<>();
for... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: of
File: src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java
Repository: jlangch/venice
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-36007 | LOW | 3.3 | jlangch/venice | of | src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java | c942c73136333bc493050910f171a48e6f575b23 | 0 |
Analyze the following code function for security vulnerabilities | void postOnSystemServerInitThreadPool(Runnable runnable) {
SystemServerInitThreadPool.submit(runnable, LOG_TAG);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: postOnSystemServerInitThreadPool
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | postOnSystemServerInitThreadPool | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public File getDestDirectory() {
return destDirectory;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDestDirectory
File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
Repository: codehaus-plexus/plexus-archiver
The code follows secure coding practices. | [
"CWE-22",
"CWE-61"
] | CVE-2023-37460 | CRITICAL | 9.8 | codehaus-plexus/plexus-archiver | getDestDirectory | src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java | 54759839fbdf85caf8442076f001d5fd64e0dcb2 | 0 |
Analyze the following code function for security vulnerabilities | private void enforcePermission(String permission, int adminPolicy,
String callerPackageName, int targetUserId) throws SecurityException {
if (hasAdminPolicy(adminPolicy, callerPackageName)) {
return;
}
enforcePermission(permission, callerPackageName, targetUserId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforcePermission
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | enforcePermission | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private String getPersonalAppSuspensionText() {
return getUpdatableString(
PERSONAL_APP_SUSPENSION_MESSAGE, R.string.personal_apps_suspension_text);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPersonalAppSuspensionText
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getPersonalAppSuspensionText | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private FileProvider getFileProvider(Path folder) {
return fileProviders.stream()
.filter(provider -> provider.canHandle(folder))
.findFirst()
.orElseThrow(() -> new RuntimeException("no file provider found for " + folder.toString()));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileProvider
File: lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java
Repository: lukashinsch/spring-boot-actuator-logview
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-21234 | MEDIUM | 4 | lukashinsch/spring-boot-actuator-logview | getFileProvider | lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java | 760acbb939a8d1f7d1a7dfcd51ca848eea04e772 | 0 |
Analyze the following code function for security vulnerabilities | public void readStructEnd() {} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readStructEnd
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readStructEnd | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | public void setItemCVOIDsTypesExpected() {
this.unsetTypeExpected();
int i = 1;
this.setTypeExpected(i, TypeNames.INT); // crf_id
++i;
this.setTypeExpected(i, TypeNames.INT); // crf_version_id
++i;
this.setTypeExpected(i, TypeNames.INT); // item_id
++i;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setItemCVOIDsTypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setItemCVOIDsTypesExpected | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | private static Iterable<Element> getGrandChildrenByTagName(Element parent, String immediateChildName, String subChild){
NodeList elementsByTagName = parent.getElementsByTagName(immediateChildName);
if (elementsByTagName.getLength() == 0) return Collections.emptyList();
Element regExpListNode = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGrandChildrenByTagName
File: src/main/java/org/owasp/validator/html/Policy.java
Repository: nahsra/antisamy
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2017-14735 | MEDIUM | 4.3 | nahsra/antisamy | getGrandChildrenByTagName | src/main/java/org/owasp/validator/html/Policy.java | 82da009e733a989a57190cd6aa1b6824724f6d36 | 0 |
Analyze the following code function for security vulnerabilities | protected String evaluateTitle(String title, DocumentReference documentReference,
DocumentDisplayerParameters parameters)
{
StringWriter writer = new StringWriter();
String namespace = defaultEntityReferenceSerializer.serialize(parameters.isTransformationContextIsolated()
? docum... | Vulnerability Classification:
- CWE: CWE-863
- CVE: CVE-2023-46244
- Severity: HIGH
- CVSS Score: 8.8
Description: XWIKI-20624: Improve title display for modified documents
Function: evaluateTitle
File: xwiki-platform-core/xwiki-platform-display/xwiki-platform-display-api/src/main/java/org/xwiki/display/internal/Abst... | [
"CWE-863"
] | CVE-2023-46244 | HIGH | 8.8 | xwiki/xwiki-platform | evaluateTitle | xwiki-platform-core/xwiki-platform-display/xwiki-platform-display-api/src/main/java/org/xwiki/display/internal/AbstractDocumentTitleDisplayer.java | 11a9170dfe63e59f4066db67f84dbfce4ed619c6 | 1 |
Analyze the following code function for security vulnerabilities | private static boolean isCompatible(SSLConfig c1, SSLConfig c2) {
boolean c1Disabled = c1 == null || !c1.isEnabled();
boolean c2Disabled = c2 == null || !c2.isEnabled();
return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null
&& nullSafeEqual(c1... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCompatible
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isCompatible | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public static SvnMaterial svnMaterial(String svnUrl, String folder, String userName, String password, boolean checkExternals, String filterPattern) {
SvnMaterial svnMaterial = new SvnMaterial(svnUrl, userName, password, checkExternals, folder);
if (filterPattern != null)
svnMaterial.setFilte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: svnMaterial
File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | svnMaterial | domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | public void setSerialNum(CertId serialNum) {
this.serialNum = serialNum;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSerialNum
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setSerialNum | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static String unescapeXMLComment(String content)
{
StringBuffer str = new StringBuffer(content.length());
char[] buff = content.toCharArray();
boolean escaped = false;
for (char c : buff) {
if (!escaped && c == '\\') {
escaped = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unescapeXMLComment
File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
Repository: xwiki/xwiki-commons
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-24898 | MEDIUM | 4 | xwiki/xwiki-commons | unescapeXMLComment | xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java | 947e8921ebd95462d5a7928f397dd1b64f77c7d5 | 0 |
Analyze the following code function for security vulnerabilities | @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
boolean resolveAttrs(long themePtr, @AttrRes int defStyleAttr, @StyleRes int defStyleRes,
@Nullable int[] inValues, @NonNull int[] inAttrs, @NonNull int[] outValues,
@NonNull int[] outIndices) {
Objec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveAttrs
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | resolveAttrs | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public String getRealAssetsRootPath() {
String realPath = Config.getStringProperty("ASSET_REAL_PATH");
if (UtilMethods.isSet(realPath) && !realPath.endsWith(java.io.File.separator))
realPath = realPath + java.io.File.separator;
if (!UtilMethods.isSet(realPath))
return Fil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRealAssetsRootPath
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | getRealAssetsRootPath | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | ab2bb2e00b841d131b8734227f9106e3ac31bb99 | 0 |
Analyze the following code function for security vulnerabilities | private static void handleForwardError(String url, Exception exception, HttpServletResponse response) {
debug.error("SAMLUtils.sendError: Exception occurred while trying to forward to resource: " + url, exception);
try {
response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, excep... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleForwardError
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | handleForwardError | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | private RemoteViews makeCallLayout(int viewType) {
final boolean isCollapsed = viewType == StandardTemplateParams.VIEW_TYPE_NORMAL;
Bundle extras = mBuilder.mN.extras;
CharSequence title = mPerson != null ? mPerson.getName() : null;
CharSequence text = mBuilder.processLeg... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeCallLayout
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeCallLayout | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public Optional<Lang> lang() {
return Optional.ofNullable(this.lang);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lang
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | lang | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | public boolean checkSaltedPassword(final String raw, final String encrypted) {
return s_passwordEncryptor.checkPassword(raw, encrypted);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkSaltedPassword
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | checkSaltedPassword | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | private int jjMoveStringLiteralDfa2_1(long old0, long active0)
{
if (((active0 &= old0)) == 0L)
return jjStartNfa_1(0, old0);
try { curChar = input_stream.readChar(); }
catch(java.io.IOException e) {
jjStopStringLiteralDfa_1(1, active0);
return 2;
}
switch(curChar)
{
case 100:
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jjMoveStringLiteralDfa2_1
File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
Repository: jakartaee/expression-language
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2021-28170 | MEDIUM | 5 | jakartaee/expression-language | jjMoveStringLiteralDfa2_1 | impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java | b6a3943ac5fba71cbc6719f092e319caa747855b | 0 |
Analyze the following code function for security vulnerabilities | void notifyTaskStackChangedLocked() {
mHandler.removeMessages(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG);
Message nmsg = mHandler.obtainMessage(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG);
mHandler.sendMessageDelayed(nmsg, NOTIFY_TASK_STACK_CHANGE_LISTENERS_DELAY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyTaskStackChangedLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | notifyTaskStackChangedLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void backgroundResourcesReleased(IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: backgroundResourcesReleased
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | backgroundResourcesReleased | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = SET_TIME_ZONE, conditional = true)
public boolean setTimeZone(@Nullable ComponentName admin, String timeZone) {
throwIfParentInstance("setTimeZone");
if (mService != null) {
try {
return mService.setTimeZone(admin, mContext.getPackageName(), ti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTimeZone
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setTimeZone | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean startAsCaller(Activity activity, Bundle options, int userId) {
final Intent intent = getBaseIntentToSend();
if (intent == null) {
return false;
}
intent.setComponent(mChooserTarget.getComponentName());
intent.pu... | Vulnerability Classification:
- CWE: CWE-254, CWE-19
- CVE: CVE-2016-3752
- Severity: HIGH
- CVSS Score: 7.5
Description: Backport ChooserTarget package source check from N
Fix a bug where a ChooserTargetService could supply a ChooserTarget
pointing at a non-exported activity outside of its own package and
have it la... | [
"CWE-254",
"CWE-19"
] | CVE-2016-3752 | HIGH | 7.5 | android | startAsCaller | core/java/com/android/internal/app/ChooserActivity.java | ddbf2db5b946be8fdc45c7b0327bf560b2a06988 | 1 |
Analyze the following code function for security vulnerabilities | private Class<? extends XWikiAuthService> getAuthServiceClass() throws ClassNotFoundException
{
String authClass = getConfiguration().getProperty("xwiki.authentication.authclass");
if (StringUtils.isEmpty(authClass)) {
if (isLDAP()) {
authClass = "com.xpn.xwiki.user.impl.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthServiceClass
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-36092 | HIGH | 7.5 | xwiki/xwiki-platform | getAuthServiceClass | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | 71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb | 0 |
Analyze the following code function for security vulnerabilities | private boolean isBackgroundColorized(StandardTemplateParams p) {
return p.allowColorization && mN.isColorized();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBackgroundColorized
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isBackgroundColorized | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getMessage() {
return sb.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMessage
File: web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | getMessage | web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setChunkedStreamingMode(Object connection, int bufferLen){
HttpURLConnection con = ((HttpURLConnection) connection);
con.setChunkedStreamingMode(bufferLen);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setChunkedStreamingMode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setChunkedStreamingMode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private void migrateAutoTimezonePolicy() {
Slogf.i(LOG_TAG, "Skipping Migration of AUTO_TIMEZONE policy to device policy engine,"
+ "as no way to identify if the value was set by the admin or the user.");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrateAutoTimezonePolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | migrateAutoTimezonePolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public boolean findNonExcludedChanges(SVNURL url, long from, long to, ISVNAuthenticationProvider authProvider) throws SVNException {
if (from>to) return false; // empty revision range, meaning no change
// if no exclusion rules are defined, don't waste time going through "svn log".
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findNonExcludedChanges
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | findNonExcludedChanges | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public static void listen(final Consumer<String[]> consumer) throws Exception {
final ServerSocket listener = new ServerSocket(PORT);
Runnable runnable = new Runnable() {
@Override
public void run() {
while (true) {
try (Socket socket = listen... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-26235
- Severity: MEDIUM
- CVSS Score: 6.1
Description: fix
Function: listen
File: app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java
Repository: java-decompiler/jd-gui
Fixed Code:
public static void listen(final Consumer<String[]> con... | [
"CWE-79"
] | CVE-2023-26235 | MEDIUM | 6.1 | java-decompiler/jd-gui | listen | app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java | fbec621d9ff1ffadb97c5768f22bfa13e14c0ab7 | 1 |
Analyze the following code function for security vulnerabilities | public static byte[] compress(double[] input)
throws IOException
{
return rawCompress(input, input.length * 8); // double uses 8 bytes
} | Vulnerability Classification:
- CWE: CWE-190
- CVE: CVE-2023-34454
- Severity: HIGH
- CVSS Score: 7.5
Description: Merge pull request from GHSA-fjpj-2g6w-x25r
* Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception
* Fixed integer overflow by checking if bytesize is bigg... | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | compress | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public long[] getProcessPss(int[] pids) {
enforceNotIsolatedCaller("getProcessPss");
long[] pss = new long[pids.length];
for (int i=pids.length-1; i>=0; i--) {
ProcessRecord proc;
int oomAdj;
synchronized (this) {
synchronized (mP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessPss
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getProcessPss | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private boolean isCMISResource(HttpServletRequest request) {
return request.getRequestURI().contains(getApplicationURL() + "/cmis/");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCMISResource
File: core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | isCMISResource | core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | private boolean isGestureNavigateEnabled() {
final int navigationMode = getContext().getResources().getInteger(
com.android.internal.R.integer.config_navBarInteractionMode);
return navigationMode == NAV_BAR_MODE_GESTURAL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isGestureNavigateEnabled
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | isGestureNavigateEnabled | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onAnimationUpdate(ValueAnimator animation) {
mKeyguardStatusBarAnimateAlpha = (float) animation.getAnimatedValue();
updateHeaderKeyguardAlpha();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAnimationUpdate
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onAnimationUpdate | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void taskBack(String procInsId, Map<String, Object> variables) {
taskBack(getCurrentTask(procInsId), variables);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: taskBack
File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
Repository: thinkgem/jeesite
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-34601 | CRITICAL | 9.8 | thinkgem/jeesite | taskBack | src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java | 30750011b49f7c8d45d0f3ab13ed3a1a422655bb | 0 |
Analyze the following code function for security vulnerabilities | public Map<DocumentReference, List<BaseObject>> getXObjects()
{
return this.xObjects;
} | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-26470
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-19223: Improve xobject memory storage in XWikidocument
Function: getXObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xw... | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getXObjects | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 1 |
Analyze the following code function for security vulnerabilities | public <T extends AccessibleObject> T openAccess(T object) {
checkTrusted();
Root.OpenAccess.openAccess0(object, true);
return object;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openAccess
File: api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java
Repository: Karlatemp/UnsafeAccessor
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-31139 | MEDIUM | 4.3 | Karlatemp/UnsafeAccessor | openAccess | api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java | 4ef83000184e8f13239a1ea2847ee401d81585fd | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public BigPictureStyle bigPicture(@Nullable Icon icon) {
mPictureIcon = icon;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bigPicture
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | bigPicture | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setAnimationScale(int which, float scale) {
if (!checkCallingPermission(android.Manifest.permission.SET_ANIMATION_SCALE,
"setAnimationScale()")) {
throw new SecurityException("Requires SET_ANIMATION_SCALE permission");
}
scale = fixScale(sca... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAnimationScale
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setAnimationScale | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder clientAddressMapper(
Function<? super ProxiedAddresses, ? extends InetSocketAddress> clientAddressMapper) {
this.clientAddressMapper = requireNonNull(clientAddressMapper, "clientAddressMapper");
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clientAddressMapper
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | clientAddressMapper | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | private WikiDescriptorManager getWikiDescriptorManager()
{
if (this.wikiDescriptorManager == null) {
this.wikiDescriptorManager = Utils.getComponent(WikiDescriptorManager.class);
}
return this.wikiDescriptorManager;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWikiDescriptorManager
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getWikiDescriptorManager | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public <T> T getConfig(String platform, Class<T> clazz) {
String config = getPlatformConfig(platform);
if (StringUtils.isBlank(config)) {
MSException.throwException("配置为空");
}
return JSON.parseObject(config, clazz);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfig
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getConfig | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate59(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
if (file.getName().startsWith("Settings.xml")) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element: dom.getRootElement().elements()) {
if (element.elementTextTrim("key").equa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate59
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate59 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTitleInCompatibilityMode()
{
return "1".equals(getConfiguration().getProperty("xwiki.title.compatibility", "0"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTitleInCompatibilityMode
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | isTitleInCompatibilityMode | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.