instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static void deleteWithErrMesg(File f) { deleteWithErrMesg(f, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteWithErrMesg File: core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
deleteWithErrMesg
core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java
2ab070cdac087bd208f64fa8138bb709f8d7680c
0
Analyze the following code function for security vulnerabilities
private String getLinuxBrowser() throws Exception { if (linuxBrowser == null) { String browsers= configService.getString(LINUX_BROWSERS_PROP_NAME); if (browsers== null) { logger.error("Required property not set: " + ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLinuxBrowser File: modules/service/browserlauncher/src/main/java/net/java/sip/communicator/impl/browserlauncher/BrowserLauncherImpl.java Repository: jitsi The code follows secure coding practices.
[ "CWE-77" ]
CVE-2022-43550
CRITICAL
9.8
jitsi
getLinuxBrowser
modules/service/browserlauncher/src/main/java/net/java/sip/communicator/impl/browserlauncher/BrowserLauncherImpl.java
8aa7be58522f4264078d54752aae5483bfd854b2
0
Analyze the following code function for security vulnerabilities
private void writeInternal() { synchronized (mPackages) { synchronized (mFileLock) { AtomicFile file = getFile(); FileOutputStream f = null; try { f = file.startWrite(); BufferedOutput...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeInternal File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
writeInternal
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void setRunning(boolean running) { mKeepRunning.set(running); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRunning File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
setRunning
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private void onJobFinished(JobFinishedEvent event) { // Skip it if: // * the authenticator was not yet initialized // * we are using the standard authenticator // * the event is not related to an install or uninstall job if (this.authService == null || this.authService.getCla...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onJobFinished File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
onJobFinished
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
private void appendDropBoxProcessHeaders(ProcessRecord process, String processName, StringBuilder sb) { // Watchdog thread ends up invoking this function (with // a null ProcessRecord) to add the stack file to dropbox. // Do not acquire a lock on this (am) in such cases, as it ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendDropBoxProcessHeaders File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
appendDropBoxProcessHeaders
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public boolean isUninstallBlocked(String packageName) { // This function should return true if and only if the package is blocked by // setUninstallBlocked(). It should still return false for other cases of blocks, such as // when the package is a system app, or when it is an activ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUninstallBlocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isUninstallBlocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void inserirResponsavel(Responsavel responsavel) throws Exception{ ResultSet result = this.bancoConec.execConsulta("Select * from ACI_Responsavel where Email='" +responsavel.getEmail()+"'"); if(result.first()){ throw new Exception("Responsavel com esse email já existente"); } result.close(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inserirResponsavel File: Escola Eclipse/Escola/src/banco_de_dados/dao/Responsaveis.java Repository: marinaguimaraes/ACI_Escola The code follows secure coding practices.
[ "CWE-89" ]
CVE-2015-10037
MEDIUM
5.2
marinaguimaraes/ACI_Escola
inserirResponsavel
Escola Eclipse/Escola/src/banco_de_dados/dao/Responsaveis.java
34eed1f7b9295d1424912f79989d8aba5de41e9f
0
Analyze the following code function for security vulnerabilities
public void setOverrideApnsEnabled(@NonNull ComponentName admin, boolean enabled) { throwIfParentInstance("setOverrideApnEnabled"); if (mService != null) { try { mService.setOverrideApnsEnabled(admin, enabled); } catch (RemoteException e) { throw e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOverrideApnsEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setOverrideApnsEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
String getHmacSha1(String data, byte[] key) { SecretKeySpec signingKey = new SecretKeySpec(key, HMAC_SHA1_ALGORITHM); Mac mac = null; try { mac = Mac.getInstance(HMAC_SHA1_ALGORITHM); mac.init(signingKey); } catch(NoSuchAlgorithmException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHmacSha1 File: JOpenId/src/org/expressme/openid/OpenIdManager.java Repository: michaelliao/jopenid The code follows secure coding practices.
[ "CWE-208" ]
CVE-2010-10006
LOW
1.4
michaelliao/jopenid
getHmacSha1
JOpenId/src/org/expressme/openid/OpenIdManager.java
c9baaa976b684637f0d5a50268e91846a7a719ab
0
Analyze the following code function for security vulnerabilities
public void unstableProviderDied(IBinder connection) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(connection); mRemote.transact(UNSTABLE_PROVIDER_DIED_TRANSACT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unstableProviderDied File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
unstableProviderDied
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private List<String> makeCommands(ApplicationConfiguration config, File webpack, File webpackConfig, String nodeExec) { List<String> command = new ArrayList<>(); command.add(nodeExec); command.add(webpack.getAbsolutePath()); command.add("--config"); command.add(webpac...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeCommands File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-172" ]
CVE-2021-33604
LOW
1.2
vaadin/flow
makeCommands
vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private boolean maybePrunePersistedUriGrantsLocked(int uid) { final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get(uid); if (perms == null) return false; if (perms.size() < MAX_PERSISTED_URI_GRANTS) return false; final ArrayList<UriPermission...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybePrunePersistedUriGrantsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
maybePrunePersistedUriGrantsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void addViewerPreference(PdfName key, PdfObject value) { this.viewerPreferences.addViewerPreference(key, value); setViewerPreferences(this.viewerPreferences); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addViewerPreference File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
addViewerPreference
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public HttpRequest query(final Map<String, String> queryMap) { for (final Map.Entry<String, String> entry : queryMap.entrySet()) { query.add(entry.getKey(), entry.getValue()); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: query File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
query
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
@Override public int getDisplayWidth() { if (this.myView != null) { int w = this.myView.getViewWidth(); displayWidth = w; return w; } return displayWidth; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisplayWidth File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getDisplayWidth
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public static String quote(String string, boolean escapeForwardSlashAlways) { if (string == null || string.length() == 0) { return "\"\""; } char c = 0; int i; int len = string.length(); StringBuilder sb = new StringBuilder(len + 4);...
Vulnerability Classification: - CWE: CWE-674, CWE-787 - CVE: CVE-2022-45693 - Severity: HIGH - CVSS Score: 7.5 Description: Fixing StackOverflow error Function: quote File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison Fixed Code: public static String quote(String string...
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
quote
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
1
Analyze the following code function for security vulnerabilities
@Override public void removeDynamicShortcuts(String packageName, List<String> shortcutIds, @UserIdInt int userId) { verifyCaller(packageName, userId); Objects.requireNonNull(shortcutIds, "shortcutIds must be provided"); List<ShortcutInfo> changedShortcuts = null; List<Sho...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeDynamicShortcuts File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
removeDynamicShortcuts
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private String extractLabel(JsonNode node) { if (node != null && node.has(LABEL)) { return node.get(LABEL).asText(); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractLabel File: src/main/java/org/commonwl/view/cwl/CWLService.java Repository: common-workflow-language/cwlviewer The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-41110
HIGH
7.5
common-workflow-language/cwlviewer
extractLabel
src/main/java/org/commonwl/view/cwl/CWLService.java
f6066f09edb70033a2ce80200e9fa9e70a5c29de
0
Analyze the following code function for security vulnerabilities
public void moveTaskToTop(int taskId) { final long origId = Binder.clearCallingIdentity(); try { synchronized(mWindowMap) { Task task = mTaskIdToTask.get(taskId); if (task == null) { // Normal behavior, addAppToken will be called next and t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTaskToTop File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
moveTaskToTop
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public static WebForm sendParameterizedEmail(Map<String,Object> parameters, Set<String> spamValidation, Host host, User user) throws DotRuntimeException { // check for possible spam if(spamValidation != null) if (FormSpamFilter.isSpamRequest(parameters, spamValidation)) { throw new DotRuntimeExcepti...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2016-4040 - Severity: MEDIUM - CVSS Score: 6.5 Description: fixes #8840 sort by sanitizing and email header injection Function: sendParameterizedEmail File: src/com/dotmarketing/factories/EmailFactory.java Repository: dotCMS/core Fixed Code: public static WebFor...
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
sendParameterizedEmail
src/com/dotmarketing/factories/EmailFactory.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
1
Analyze the following code function for security vulnerabilities
private String getSkinFileInternal(String fileName, String skinId, boolean forceSkinAction, XWikiContext context) { try { if (skinId != null) { // Try only in the specified skin. Skin skin = getInternalSkinManager().getSkin(skinId); if (skin != nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSkinFileInternal File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getSkinFileInternal
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Deprecated public BaseObject addObjectFromRequest(String className, String prefix, int num, XWikiContext context) throws XWikiException { return addXObjectFromRequest(resolveClassReference(className), prefix, num, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObjectFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addObjectFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public boolean onShowFileChooser(WebView mWebView, ValueCallback<Uri[]> filePathCallback, WebChromeClient.FileChooserParams fileChooserParams) { if (uploadMessage != null) { uploadMessage.onReceiveValue(null); uploadMessage = null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onShowFileChooser File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onShowFileChooser
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public boolean getHintAvoidBackgroundClipping() { return (mFlags & FLAG_HINT_AVOID_BACKGROUND_CLIPPING) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHintAvoidBackgroundClipping File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getHintAvoidBackgroundClipping
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void onStateChanged(boolean accessibilityEnabled, boolean touchExplorationEnabled) { mRightAffordanceView.setClickable(touchExplorationEnabled); mLeftAffordanceView.setClickable(touchExplorationEnabled); mRightAffordanceView.setFocusable(accessibilityEnabled); mLeftA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStateChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onStateChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
int unsafeConvertIncomingUser(int userId) { return (userId == UserHandle.USER_CURRENT || userId == UserHandle.USER_CURRENT_OR_SELF) ? mCurrentUserId : userId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unsafeConvertIncomingUser File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
unsafeConvertIncomingUser
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private String getAnalysisName(String analysisName, String domainId) { String finalName = analysisName.replaceAll(timeWindowPattern.pattern(), ""); finalName = StringUtils.join(StringUtils.splitByCharacterTypeCamelCase(finalName), " "); if (domainId != null && finalName.startsWith(domainId) && (finalName.length(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAnalysisName File: src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java Repository: OHDSI/WebAPI The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15563
HIGH
7.5
OHDSI/WebAPI
getAnalysisName
src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java
b3944074a1976c95d500239cbbf0741917ed75ca
0
Analyze the following code function for security vulnerabilities
private synchronized void doNotify() { if (!notified) { notified = true; notifyAll(); // NOSONAR } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doNotify File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-172" ]
CVE-2021-33604
LOW
1.2
vaadin/flow
doNotify
vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc
0
Analyze the following code function for security vulnerabilities
private void handleNewPackageInstalled(String packageName, int userHandle) { // If personal apps were suspended by the admin, suspend the newly installed one. if (!getUserData(userHandle).mAppsSuspended) { return; } final String[] packagesToSuspend = { packageName }; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleNewPackageInstalled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
handleNewPackageInstalled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@PasswordComplexity @RequiresPermission(value = MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS, conditional = true) public int getRequiredPasswordComplexity() { if (mService == null) { return PASSWORD_COMPLEXITY_NONE; } try { return mService.getRequiredPasswordComplexity(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequiredPasswordComplexity File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getRequiredPasswordComplexity
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public boolean isSyncPending(Account account, String authority, ComponentName cname) { return isSyncPendingAsUser(account, authority, cname, UserHandle.getCallingUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSyncPending File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
isSyncPending
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@Binds ConversationIconManager bindConversationIconManager(IconManager iconManager);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindConversationIconManager File: packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
bindConversationIconManager
packages/SystemUI/src/com/android/systemui/statusbar/notification/dagger/NotificationsModule.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
String getTenantId() { return tenantId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTenantId File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getTenantId
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public void setTestCallDiagnosticService(String packageName) { try { Log.startSession("TSI.sTCDS"); enforceModifyPermission(); enforceShellOnly(Binder.getCallingUid(), "setTestCallDiagnosticService is for " + "shell us...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTestCallDiagnosticService File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
setTestCallDiagnosticService
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public void warning(SAXParseException e) { sb.append("WARNING: "); sb.append(e.getMessage()); sb.append("\n"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: warning File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40315
HIGH
8
OpenNMS/opennms
warning
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
201301e067329ababa3c0671ded5c4c43347d4a8
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder2 xpathFind(String xpath, NamespaceContext nsContext) { try { Node foundNode = super.xpathFindImpl(xpath, nsContext); return new XMLBuilder2(foundNode, null); } catch (XPathExpressionException e) { throw wrapExceptionAsRuntimeExcepti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: xpathFind File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
xpathFind
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public void joinInit() throws InterruptedException { initThread.join(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: joinInit File: core/src/main/java/hudson/WebAppMain.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-254" ]
CVE-2014-9634
MEDIUM
5
jenkinsci/jenkins
joinInit
core/src/main/java/hudson/WebAppMain.java
582128b9ac179a788d43c1478be8a5224dc19710
0
Analyze the following code function for security vulnerabilities
public List<IssuesDao> list(IssuesRequest request) { request.setOrders(ServiceUtils.getDefaultOrderByField(request.getOrders(), "create_time")); request.getOrders().forEach(order -> { if (StringUtils.isNotEmpty(order.getName()) && order.getName().startsWith("custom")) { reque...
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2022-23544 - Severity: MEDIUM - CVSS Score: 6.1 Description: fix(测试跟踪): 缺陷平台请求转发添加白名单 Function: list File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere Fixed Code: public List<IssuesDao> list(IssuesRequest r...
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
list
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
1
Analyze the following code function for security vulnerabilities
public void setViewsTabBar(ViewsTabBar viewsTabBar) { this.viewsTabBar = viewsTabBar; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setViewsTabBar File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
setViewsTabBar
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public CompletableFuture<BatchIterator<Row>> getIterator(TransactionContext txnCtx, CollectPhase collectPhase, CollectTask collectTask, ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2024-24565 - Severity: MEDIUM - CVSS Score: 6.5 Description: Restrict `COPY FROM` using local files to superuser Fixing a security issue where any user could read/import content of any file on the host system, the CrateDB process user has read access to. Functio...
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
getIterator
server/src/main/java/io/crate/execution/engine/collect/sources/FileCollectSource.java
4e857d675683095945dd524d6ba03e692c70ecd6
1
Analyze the following code function for security vulnerabilities
private WindowState findWindow(int hashCode) { if (hashCode == -1) { // TODO(multidisplay): Extend to multiple displays. return getFocusedWindow(); } synchronized (mWindowMap) { final int numDisplays = mDisplayContents.size(); for (int displayNdx ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findWindow File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
findWindow
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void startConfirmDeviceCredentialIntent(Intent intent, Bundle options) { mAtmInternal.startConfirmDeviceCredentialIntent(intent, options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startConfirmDeviceCredentialIntent File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startConfirmDeviceCredentialIntent
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
protected JsonDeserializer<?> _findCustomCollectionDeserializer(CollectionType type, DeserializationConfig config, BeanDescription beanDesc, TypeDeserializer elementTypeDeserializer, JsonDeserializer<?> elementDeserializer) throws JsonMappingException { for (Deserializers d ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _findCustomCollectionDeserializer File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_findCustomCollectionDeserializer
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@Override protected Image generatePeerImage() { try { final Bitmap nativeBuffer = Bitmap.createBitmap( getWidth(), getHeight(), Bitmap.Config.ARGB_8888); Image image = new AndroidImplementation.NativeImage(nativeBuffer); getActi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generatePeerImage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
generatePeerImage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public boolean supportsLocalVoiceInteraction() throws RemoteException { return LocalServices.getService(VoiceInteractionManagerInternal.class) .supportsLocalVoiceInteraction(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsLocalVoiceInteraction File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
supportsLocalVoiceInteraction
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void fillA(TestContext context, PostgresClient client, String tenant, int i) { Async async = context.async(); String schema = PostgresClient.convertToPsqlStandard(tenant); execute(context, "INSERT INTO " + schema + ".a (i) VALUES (" + i + ") ON CONFLICT DO NOTHING;"); client.select("SELECT i FR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillA File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
fillA
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public void setMaximumTimeToLock(ComponentName who, long timeMs, boolean parent) { if (!mHasFeature) { return; } Objects.requireNonNull(who, "ComponentName is null"); final int userHandle = mInjector.userHandleGetCallingUserId(); synchronized (getLockObj...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaximumTimeToLock File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setMaximumTimeToLock
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformOrtho(Object nativeGraphics, float left, float right, float bottom, float top, float near, float far) { CN1Matrix4f m = (CN1Matrix4f)nativeGraphics; m.setOrtho(left, right, bottom, top, near, far); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformOrtho File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformOrtho
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setState(String state) { this.state = state; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setState File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setState
base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void createConferenceFailed( PhoneAccountHandle connectionManagerPhoneAccount, String callId, ConnectionRequest request, boolean isIncoming, Session.Info sessionInfo) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createConferenceFailed File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
createConferenceFailed
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public static int getStatusCode(HttpURLConnection conn) { try { return conn.getResponseCode(); } catch (IOException e) { throw ErrorUtil .createCommandException("connection to the remote repository host failed: " + e.getMessage()); } }
Vulnerability Classification: - CWE: CWE-306 - CVE: CVE-2021-32700 - Severity: MEDIUM - CVSS Score: 5.8 Description: Fix central connection Function: getStatusCode File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/util/Utils.java Repository: ballerina-platform/ballerina-lang Fixed Code: publi...
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
getStatusCode
cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/util/Utils.java
4609ffee1744ecd16aac09303b1783bf0a525816
1
Analyze the following code function for security vulnerabilities
public boolean isFeedbackEnabled() { return CONF.feedbackEnabled(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFeedbackEnabled File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isFeedbackEnabled
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private static UserConfiguration getUserConfiguration() { return Utils.getComponent(UserConfiguration.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserConfiguration File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getUserConfiguration
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
protected @Nullable String transformResponse(String response, String transformation) { String transformedResponse; try { String[] parts = splitTransformationConfig(transformation); String transformationType = parts[0]; String transformationFunction = parts[1]; ...
Vulnerability Classification: - CWE: CWE-863 - CVE: CVE-2020-5242 - Severity: HIGH - CVSS Score: 9.3 Description: Merge pull request from GHSA-w698-693g-23hv * fix arbitrary code execution vulnerability Signed-off-by: Jan N. Klug <jan.n.klug@rub.de> * Update bundles/org.openhab.binding.exec/src/main/java/org/openha...
[ "CWE-863" ]
CVE-2020-5242
HIGH
9.3
openhab/openhab-addons
transformResponse
bundles/org.openhab.binding.exec/src/main/java/org/openhab/binding/exec/internal/handler/ExecHandler.java
4c4cb664f2e2c3866aadf117d22fb54aa8dd0031
1
Analyze the following code function for security vulnerabilities
@Nullable public String getSynchronousMode() { return mSyncMode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSynchronousMode File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
getSynchronousMode
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
public static ActionOnCreate valueOfAction(String action) { return BY_ACTION.get(action); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: valueOfAction File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
valueOfAction
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java
30c52b01559b8ef5ed1035dac7c34aaf805764d5
0
Analyze the following code function for security vulnerabilities
private void updateSpeedBumpIndex() { int speedBumpIndex = 0; int currentIndex = 0; final int N = mStackScroller.getChildCount(); for (int i = 0; i < N; i++) { View view = mStackScroller.getChildAt(i); if (view.getVisibility() == View.GONE || !(view instanceof Exp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSpeedBumpIndex File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateSpeedBumpIndex
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static final String formatDateToUIString(final Date date) { if (date != null) { return DateFormat.getDateTimeInstance(DateFormat.SHORT, DateFormat.MEDIUM).format(date); } return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatDateToUIString File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-0869
MEDIUM
6.1
OpenNMS/opennms
formatDateToUIString
opennms-web-api/src/main/java/org/opennms/web/api/Util.java
66b4ba96a18b9952f25a350bbccc2a7e206238d1
0
Analyze the following code function for security vulnerabilities
@CriticalNative private static final native int nativeGetNamespace(long state);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetNamespace File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetNamespace
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public @ColorInt int getErrorColor() { return mErrorColor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getErrorColor File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getErrorColor
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private ModelAndView addDutySchedules(HttpServletRequest request, HttpServletResponse response) throws Exception { HttpSession userSession = request.getSession(true); if (userSession != null) { //group.modifyGroup.jsp WebGroup group = (WebGroup) userSession.getAttribute("group.m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDutySchedules File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352", "CWE-79" ]
CVE-2021-25929
LOW
3.5
OpenNMS/opennms
addDutySchedules
opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
0
Analyze the following code function for security vulnerabilities
@Override public void crashApplication(int uid, int initialPid, String packageName, String message) { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: crashApplication(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: crashApplication File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
crashApplication
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setCaCertificateAlias(String alias) { setFieldValue(CA_CERT_KEY, alias, CA_CERT_PREFIX); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCaCertificateAlias File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
setCaCertificateAlias
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
@Override public void finishAndRemoveTask() { checkCaller(); synchronized (ActivityManagerService.this) { long origId = Binder.clearCallingIdentity(); try { // We remove the task from recents to preserve backwards i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishAndRemoveTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
finishAndRemoveTask
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private void advancedNetworkConfigXmlGenerator(XmlGenerator gen, Config config) { AdvancedNetworkConfig netCfg = config.getAdvancedNetworkConfig(); if (!netCfg.isEnabled()) { return; } gen.open("advanced-network", "enabled", netCfg.isEnabled()); JoinConfig join = ne...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: advancedNetworkConfigXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
advancedNetworkConfigXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
private void resetFields() { localFileHeader = null; crc32.reset(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetFields File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
resetFields
src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
public static int getTypeOfObject(Object obj) { if (obj == null) { return Cursor.FIELD_TYPE_NULL; } else if (obj instanceof byte[]) { return Cursor.FIELD_TYPE_BLOB; } else if (obj instanceof Float || obj instanceof Double) { return Cursor.FIELD_TYPE_FLOAT; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTypeOfObject File: src/com/android/providers/media/util/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-35683
MEDIUM
5.5
android
getTypeOfObject
src/com/android/providers/media/util/DatabaseUtils.java
23d156ed1bed6d2c2b325f0be540d0afca510c49
0
Analyze the following code function for security vulnerabilities
public static String renderNav(HttpServletRequest request, String activeNav) { try { return renderNav2(request, activeNav); } catch (Exception ex) { log.error("Error on `renderNav`", ex); return "<!-- ERROR : " + ThrowableUtils.getRootCause(ex).getLocalizedMessage() +...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderNav File: src/main/java/com/rebuild/core/configuration/NavBuilder.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
renderNav
src/main/java/com/rebuild/core/configuration/NavBuilder.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
protected void visibilityChanged(boolean visible) { if (mVisible != visible) { mVisible = visible; if (!visible) { closeAndSaveGuts(true /* removeLeavebehind */, true /* force */, true /* removeControls */, -1 /* x */, -1 /* y */, true /* resetMenu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: visibilityChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
visibilityChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
boolean moveFocusableActivityToTop(String reason) { if (!isFocusable()) { ProtoLog.d(WM_DEBUG_FOCUS, "moveFocusableActivityToTop: unfocusable " + "activity=%s", this); return false; } final Task rootTask = getRootTask(); if (rootTask == null) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveFocusableActivityToTop File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
moveFocusableActivityToTop
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public <T> T getOption(Option<T> option) throws IOException { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOption File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
getOption
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
private boolean checkPolicyAccess(String pkg) { try { int uid = getContext().getPackageManager().getPackageUidAsUser( pkg, UserHandle.getCallingUserId()); if (PackageManager.PERMISSION_GRANTED == ActivityManager.checkComponentPermission( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPolicyAccess File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
checkPolicyAccess
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@CalledByNative private int getLocationInWindowY() { return mLocationInWindowY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocationInWindowY File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getLocationInWindowY
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void checkBroadcastFromSystem(Intent intent, ProcessRecord callerApp, String callerPackage, int callingUid, boolean isProtectedBroadcast, List receivers) { if ((intent.getFlags() & Intent.FLAG_RECEIVER_FROM_SHELL) != 0) { // Don't yell about broadcasts sent via shell ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkBroadcastFromSystem File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
checkBroadcastFromSystem
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static Class<?> getClassForElement(final String elementName) { if (elementName == null) return null; final Class<?> existing = m_elementClasses.get(elementName); if (existing != null) return existing; final ClassPathScanningCandidateComponentProvider scanner = new ClassPathScann...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClassForElement File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
getClassForElement
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
public List<ProfileInput> getInputs() { return inputs; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputs File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getInputs
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void checkRemoteInputOutside(MotionEvent event) { if (event.getAction() == MotionEvent.ACTION_OUTSIDE // touch outside the source bar && event.getX() == 0 && event.getY() == 0 // a touch outside both bars && mRemoteInputController.isRemoteInputActive()) { mRe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkRemoteInputOutside File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
checkRemoteInputOutside
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public boolean isNone() { return owner == null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNone File: src/net/sourceforge/plantuml/version/LicenseInfo.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
isNone
src/net/sourceforge/plantuml/version/LicenseInfo.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public String[] getAlias() { return new String[] { "reddit", "reditnotifier" }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAlias File: src/main/java/de/presti/ree6/commands/impl/community/RedditNotifier.java Repository: Ree6-Applications/Ree6 The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-39302
MEDIUM
5.4
Ree6-Applications/Ree6
getAlias
src/main/java/de/presti/ree6/commands/impl/community/RedditNotifier.java
459b5bc24f0ea27e50031f563373926e94b9aa0a
0
Analyze the following code function for security vulnerabilities
public void setNodes(List<? extends Node> nodes) throws IOException { this.slaves = new NodeList(nodes); updateComputerList(); trimLabels(); save(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNodes File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
setNodes
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
protected BeanDefinitionBuilder createAndFillBeanBuilder(Node node, Class clazz, String propertyName, BeanDefinitionBuilder parent, String... exceptPropertyNames) { BeanDefinitionBuilder builder = createBeanBuilder(clazz); Abstract...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAndFillBeanBuilder File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
createAndFillBeanBuilder
hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private static String toLuceneDate(String dateString) { String format = "MM/dd/yyyy"; return toLuceneDateWithFormat(dateString, format); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toLuceneDate File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
toLuceneDate
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public boolean isExplicitNull() { return explicitNull; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isExplicitNull File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
isExplicitNull
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public static Policy getInstance() throws PolicyException { return getInstance(DEFAULT_POLICY_URI); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: src/main/java/org/owasp/validator/html/Policy.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-14735
MEDIUM
4.3
nahsra/antisamy
getInstance
src/main/java/org/owasp/validator/html/Policy.java
82da009e733a989a57190cd6aa1b6824724f6d36
0
Analyze the following code function for security vulnerabilities
protected Exception _creatorReturnedNullException() { if (_nullFromCreator == null) { _nullFromCreator = new NullPointerException("JSON Creator returned null"); } return _nullFromCreator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _creatorReturnedNullException File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42004
HIGH
7.5
FasterXML/jackson-databind
_creatorReturnedNullException
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
063183589218fec19a9293ed2f17ec53ea80ba88
0
Analyze the following code function for security vulnerabilities
public abstract String urlForCommandLine();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: urlForCommandLine File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
urlForCommandLine
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public boolean profileControl(String process, int userId, boolean start, ProfilerInfo profilerInfo, int profileType) throws RemoteException { try { synchronized (this) { // note: hijacking SET_ACTIVITY_WATCHER, but should be changed to // its own permissi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: profileControl File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
profileControl
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override protected int getOutputSizeForUpdate(int inputLen) { return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOutputSizeForUpdate File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
getOutputSizeForUpdate
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
private String format(String input, int indent) { if (!formatted) { return input; } StreamResult xmlOutput = null; try { Source xmlInput = new StreamSource(new StringReader(input)); xmlOutput = new StreamResult(new StringWriter()); Transfor...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: format File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
format
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { HttpSession session = request.getSession(); session.invalidate(); RequestDispatcher rd = request.getRequestDispatcher("adminlogin.jsp"); request.setAttribute("loggedOutMsg", "Log Out Succes...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doGet File: src/com/bijay/onlinevotingsystem/controller/AdminLoginController.java Repository: bijaythapaa/OnlineVotingSystem The code follows secure coding practices.
[ "CWE-916" ]
CVE-2021-21253
MEDIUM
5
bijaythapaa/OnlineVotingSystem
doGet
src/com/bijay/onlinevotingsystem/controller/AdminLoginController.java
0181cb0272857696c8eb3e44fcf6cb014ff90f09
0
Analyze the following code function for security vulnerabilities
public static void removeChildren(Node e) { NodeList list = e.getChildNodes(); for (int i = 0; i < list.getLength(); i++) { Node n = list.item(i); e.removeChild(n); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeChildren File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
removeChildren
src/edu/stanford/nlp/util/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings({ "unchecked", "rawtypes" }) private static int compareComparables(Object a, Object b) { return ((Comparator) Comparator .nullsLast(Comparator.naturalOrder())).compare(a, b); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compareComparables File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
compareComparables
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
private void insertRequestHeaders(SQLiteDatabase db, long downloadId, ContentValues values) { ContentValues rowValues = new ContentValues(); rowValues.put(Downloads.Impl.RequestHeaders.COLUMN_DOWNLOAD_ID, downloadId); for (Map.Entry<String, Object> entry : values.valueSet()) { String...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: insertRequestHeaders File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
insertRequestHeaders
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
public boolean isSmResumptionPossible() { // There is no resumable stream available if (smSessionId == null) return false; final Long shutdownTimestamp = packetWriter.shutdownTimestamp; // Seems like we are already reconnected, report true if (shutdownTimestamp == nu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSmResumptionPossible File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
isSmResumptionPossible
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void showDisambiguationPopup(Rect targetRect, Bitmap zoomedBitmap) { mPopupZoomer.setBitmap(zoomedBitmap); mPopupZoomer.show(targetRect); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showDisambiguationPopup File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
showDisambiguationPopup
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private ResolveInfo chooseBestActivity(Intent intent, String resolvedType, int flags, List<ResolveInfo> query, int userId) { if (query != null) { final int N = query.size(); if (N == 1) { return query.get(0); } else if (N > 1) { fin...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: chooseBestActivity File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
chooseBestActivity
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public String getMessage() { return description.getExpressionString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessage File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
getMessage
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/OpsGenieNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public Collection<String> getHeaderNames() { return this.response.getHeaderNames(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaderNames File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-601" ]
CVE-2022-23618
MEDIUM
5.8
xwiki/xwiki-platform
getHeaderNames
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
5251c02080466bf9fb55288f04a37671108f8096
0
Analyze the following code function for security vulnerabilities
public Shell getShell() { return shell; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShell File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
getShell
src/main/java/org/codehaus/plexus/util/cli/Commandline.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0