instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private boolean isKeyExchangeAllowed() { return !isKexDone() || transport.isAuthenticated(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyExchangeAllowed File: src/main/java/net/schmizz/sshj/transport/KeyExchanger.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
isKeyExchangeAllowed
src/main/java/net/schmizz/sshj/transport/KeyExchanger.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void onRenderProcessChange() { attachImeAdapter(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRenderProcessChange File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onRenderProcessChange
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override public ServerBuilder service(String pathPattern, HttpService service) { requireNonNull(pathPattern, "pathPattern"); requireNonNull(service, "service"); warnIfServiceHasMultipleRoutes(pathPattern, service); virtualHostTemplate.service(pathPattern, service); return th...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: service File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
service
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") @Override public <T> T unwrap(Class<T> theType) { if (theType == RoutingContext.class) { return (T) context; } else if (theType == HttpServerRequest.class) { return (T) request; } else if (theType == HttpServerResponse.class) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unwrap File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follows secure co...
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
unwrap
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
@Override public void onUidStateChanged(int uid, int procState, long procStateSeq, int capability) { if (uid == mUid) { if (procState > ActivityManager.PROCESS_STATE_FOREGROUND_SERVICE && procState != ActivityManager.PROCESS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUidStateChanged File: services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21254
HIGH
7.8
android
onUidStateChanged
services/core/java/com/android/server/pm/permission/OneTimePermissionUserManager.java
fa539c85503dc63bfb53c76b6f12b3549f14a709
0
Analyze the following code function for security vulnerabilities
private void sendMultipartSms(SmsTracker tracker) { ArrayList<String> parts; ArrayList<PendingIntent> sentIntents; ArrayList<PendingIntent> deliveryIntents; HashMap<String, Object> map = tracker.getData(); String destinationAddress = (String) map.get("destination"); Str...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendMultipartSms File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3883
MEDIUM
4.3
android
sendMultipartSms
src/java/com/android/internal/telephony/SMSDispatcher.java
b2c89e6f8962dc7aff88cb38aa3ee67d751edda9
0
Analyze the following code function for security vulnerabilities
public void setPanelExpanded(boolean isExpanded) { mPanelExpanded = isExpanded; mStatusBarWindowManager.setPanelExpanded(isExpanded); mVisualStabilityManager.setPanelExpanded(isExpanded); if (isExpanded && getBarState() != StatusBarState.KEYGUARD) { if (DEBUG) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPanelExpanded File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setPanelExpanded
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void stop() { if (serverSocket != null) { try { serverSocket.close(); } catch (IOException e) { traceError(e); } serverSocket = null; } if (listenerThread != null) { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stop File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
stop
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public double readDouble() throws IOException { return primitiveTypes.readDouble(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readDouble File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readDouble
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void setParamOriginalParams(String paramOriginalParams) { m_paramOriginalParams = paramOriginalParams; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setParamOriginalParams File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
setParamOriginalParams
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public Map<Integer, String> getProcessesWithPendingBindMounts(int userId) { return mProcessList.getProcessesWithPendingBindMounts(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessesWithPendingBindMounts File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getProcessesWithPendingBindMounts
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting protected boolean hasInsertion() { return mHasInsertion; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasInsertion File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
hasInsertion
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private void saveGlobalProxyLocked(String proxySpec, String exclusionList) { if (exclusionList == null) { exclusionList = ""; } if (proxySpec == null) { proxySpec = ""; } // Remove white spaces proxySpec = proxySpec.trim(); String data[] = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveGlobalProxyLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
saveGlobalProxyLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private static native void nativeSetResourceResolutionLoggingEnabled(long ptr, boolean enabled);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeSetResourceResolutionLoggingEnabled File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeSetResourceResolutionLoggingEnabled
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
private void revokeUriPermissionLocked(int callingUid, GrantUri grantUri, final int modeFlags) { if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Revoking all granted permissions to " + grantUri); final IPackageManager pm = AppGlobals.getPackageManager(); final String authority = grantUri.uri.getAuthorit...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: revokeUriPermissionLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
revokeUriPermissionLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
InsetsState getInsetsState() { return getInsetsState(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInsetsState File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getInsetsState
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDeviceOwner(int uid) { int cachedUid = mDeviceOwnerUid; return uid >= 0 && cachedUid == uid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDeviceOwner File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
isDeviceOwner
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String getHeader(String name) { for (int n = 0; n < this.headers.size(); n++) { String header = (String) this.headers.get(n); if (header.startsWith(name + ": ")) return header.substring(name.length() + 2); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeader File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
getHeader
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
@Override public InputStream read() { try { if (Utils.isNotNullOrEmpty(getContext().getFile())) { return readFile(getContext().getFile()); } else if (Utils.isNotNullOrEmpty(getContext().getDir())) { return readTar(getContext().getDir()); } throw new IllegalStateException("N...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
read
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { char[] mkAsChar = new char[pwBytes.length]; for (int i = 0; i < pwBytes.length; i++) { mkAsChar[i] = (char) pwBytes[i]; } Key checksum = buildCharArrayKey(algorithm, mkAsChar, salt, r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeKeyChecksum File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
makeKeyChecksum
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
KeyChainConnection keyChainBindAsUser(UserHandle user) throws InterruptedException { return KeyChain.bindAsUser(mContext, user); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: keyChainBindAsUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
keyChainBindAsUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void removeFromHttpSession(WrappedSession wrappedSession) { wrappedSession.removeAttribute(getSessionAttributeName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeFromHttpSession File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
removeFromHttpSession
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
protected String getPropertiesPath() { return getSkinFolder() + "skin.properties"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPropertiesPath File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/skin/AbstractResourceSkin.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-29253
MEDIUM
4
xwiki/xwiki-platform
getPropertiesPath
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/skin/AbstractResourceSkin.java
4917c8f355717bb636d763844528b1fe0f95e8e2
0
Analyze the following code function for security vulnerabilities
private void setXrefPartialObject(int idx, PdfObject obj) { if (!partial || idx < 0) return; xrefObj.set(idx, obj); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setXrefPartialObject File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
setXrefPartialObject
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public int compare(WifiConfiguration a, WifiConfiguration b) { int configAScore = getNetworkStatusScore(a); int configBScore = getNetworkStatusScore(b); if (configAScore == configBScore) { return compareNetworksWithSameStatus(a, b); } els...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compare File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
compare
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
private static void logCopyAccountStatus(@CopyAccountStatus int status, String callerPackage) { DevicePolicyEventLogger .createEvent(DevicePolicyEnums.PLATFORM_PROVISIONING_COPY_ACCOUNT_STATUS) .setInt(status) .setStrings(callerPackage) .write(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logCopyAccountStatus File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
logCopyAccountStatus
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected CompletableFuture<Void> internalSetSubscriptionTypesEnabled( Set<SubscriptionType> subscriptionTypesEnabled) { List<SubType> subTypes = Lists.newArrayList(); subscriptionTypesEnabled.forEach(subscriptionType -> subTypes.add(SubType.valueOf(subscriptionType.name()))); return...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalSetSubscriptionTypesEnabled File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalSetSubscriptionTypesEnabled
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public void transmit(Method m) throws IOException { synchronized (_channelMutex) { transmit(new AMQCommand(m)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: transmit File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
transmit
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
@RequestMapping({ "/resource" }) public String actionResource(HttpServletRequest theServletRequest, final ResourceRequest theRequest, final BindingResult theBindingResult, final ModelMap theModel) { String resourceName = theRequest.getResource(); populateModelForResource(theServletRequest, theRequest, theModel);...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: actionResource File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-24301
MEDIUM
4.3
hapifhir/hapi-fhir
actionResource
hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java
adb3734fcbbf9a9165445e9ee5eef168dbcaedaf
0
Analyze the following code function for security vulnerabilities
public BatchOperaResponse batchCopy(ApiScenarioBatchRequest batchRequest) { ServiceUtils.getSelectAllIds(batchRequest, batchRequest.getCondition(), (query) -> extApiScenarioMapper.selectIdsByQuery(query)); List<ApiScenarioWithBLOBs> apiScenarioList = extApiScenarioMapper.selectIds(batch...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: batchCopy File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
batchCopy
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void scrollTo(int xPix, int yPix) { if (mNativeContentViewCore == 0) return; final float xCurrentPix = mRenderCoordinates.getScrollXPix(); final float yCurrentPix = mRenderCoordinates.getScrollYPix(); final float dxPix = xPix - xCurrentPix; final float dyPix = yPix - yCurr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scrollTo File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
scrollTo
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void transformSurfaceInsetsPosition(Point outPos, Rect surfaceInsets) { // Ignore the scale for child window because its insets have been scaled with the // parent surface. if (mGlobalScale == 1f || mIsChildWindow) { outPos.x = surfaceInsets.left; outPos.y = surfa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: transformSurfaceInsetsPosition File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
transformSurfaceInsetsPosition
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
boolean getThemeValue(long theme, @AnyRes int resId, @NonNull TypedValue outValue, boolean resolveRefs) { Objects.requireNonNull(outValue, "outValue"); synchronized (this) { ensureValidLocked(); final int cookie = nativeThemeGetAttributeValue(mObject, theme, resId, ou...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThemeValue File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getThemeValue
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
private native Profile nativeGetProfileAndroid(long nativeTabAndroid);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetProfileAndroid File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeGetProfileAndroid
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private static int getIntSafe(byte[] bytes, int offset) { if (BIG_ENDIAN_NATIVE_ORDER) { return bytes[offset] << 24 | (bytes[offset + 1] & 0xff) << 16 | (bytes[offset + 2] & 0xff) << 8 | bytes[offset + 3] & 0xff; } return by...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntSafe File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
getIntSafe
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
private void statsTracker(String descriptionKey, String sql, long startNanoTime) { long endNanoTime = System.nanoTime(); StatsTracker.addStatElement(STATS_KEY + DOT + descriptionKey, (endNanoTime - startNanoTime)); if (log.isDebugEnabled()) { logTimer(descriptionKey, sql, startNanoTime, endNanoTime); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: statsTracker File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
statsTracker
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void setBody(CharSequence text, boolean withSignature) { LogUtils.i(LOG_TAG, "Body populated, len: %d, sig: %b", text.length(), withSignature); mBodyView.setText(text); if (withSignature) { appendSignature(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBody File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
setBody
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public String getType() { return EditableUtils.getDisplayName(getClass()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getType File: server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-94" ]
CVE-2021-21248
MEDIUM
6.5
theonedev/onedev
getType
server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java
39d95ab8122c5d9ed18e69dc024870cae08d2d60
0
Analyze the following code function for security vulnerabilities
private void runOnFutureComplete(DeploymentConfiguration config) { try { doStartDevModeServer(config); } catch (ExecutionFailedException exception) { getLogger().error(null, exception); throw new CompletionException(exception); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runOnFutureComplete File: flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
runOnFutureComplete
flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java
6ae6460ca4f3a9b50bd46fbf49c807fe67718307
0
Analyze the following code function for security vulnerabilities
private Object lookup(final String name) throws NamespaceException { final String nsName = KeyManipulator.getServiceLocation(name); try { return Namespace.lookup(nsName); } catch (NamespaceException ne) { logger.error("Could not lookup place using " + nsName, ne); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lookup File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
lookup
src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public int getDaysOld() { return daysOld; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDaysOld File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
getDaysOld
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
private ILockSettings getLockSettings() { if (mLockSettingsService == null) { ILockSettings service = ILockSettings.Stub.asInterface( ServiceManager.getService("lock_settings")); mLockSettingsService = service; } return mLockSettingsService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockSettings File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getLockSettings
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Override public PageResult getNewBeeMallUsersPage(PageQueryUtil pageUtil) { List<MallUser> mallUsers = mallUserMapper.findMallUserList(pageUtil); int total = mallUserMapper.getTotalMallUsers(pageUtil); PageResult pageResult = new PageResult(mallUsers, total, pageUtil.getLimit(), pageUtil.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNewBeeMallUsersPage File: src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java Repository: newbee-ltd/newbee-mall The code follows secure coding practices.
[ "CWE-639" ]
CVE-2023-30216
MEDIUM
5.4
newbee-ltd/newbee-mall
getNewBeeMallUsersPage
src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java
4f8948579ddd6843a2e313fdd55aafc809246f63
0
Analyze the following code function for security vulnerabilities
private static void closeOpenedAttachmentFds(final SendOrSaveMessage sendOrSaveMessage) { final Bundle openedFds = sendOrSaveMessage.attachmentFds(); if (openedFds != null) { final Set<String> keys = openedFds.keySet(); for (final String key : keys) { final Parcel...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeOpenedAttachmentFds File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
closeOpenedAttachmentFds
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public Map<java.awt.RenderingHints.Key, ?> getImplementationHints() { return delegate.getImplementationHints(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImplementationHints File: modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getImplementationHints
modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
public String getUsername() { return username; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUsername File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
getUsername
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
public void loginAsAdminAndGotoPage(String pageURL) { loginAndGotoPage(ADMIN_CREDENTIALS.getUserName(), ADMIN_CREDENTIALS.getPassword(), pageURL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loginAsAdminAndGotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
loginAsAdminAndGotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public String getURL(EntityReference reference, String action, XWikiContext context) { return getURL(reference, action, null, null, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_WIFI, conditional = true) public void setWifiSsidPolicy(@Nullable WifiSsidPolicy policy) { throwIfParentInstance("setWifiSsidPolicy"); if (mService == null) { return; } try { mService.setWifiSsidPolicy(mContext....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWifiSsidPolicy File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setWifiSsidPolicy
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public boolean checkout(AbstractBuild build, Launcher launcher, FilePath workspace, final BuildListener listener, File changelogFile) throws IOException, InterruptedException { EnvVars env = build.getEnvironment(listener); EnvVarsUtils.overrideAll(env, build.getBuildVa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkout File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
checkout
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings({"unchecked", "rawtypes"}) private HashMap<String, String> createMap(Properties properties) { return new HashMap(properties); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createMap File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
createMap
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withTrustedPackages(Set<PackageRule> trustedPackages) { this.trustedPackages = Set.copyOf(trustedPackages); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withTrustedPackages File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withTrustedPackages
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public static FlippingStrategy instanceFlippingStrategy(String uid, String className, Map<String, String> initparams) { try { Class<FlippingStrategy> clazz = (Class<FlippingStrategy>) (classLoader == null ? Class.forName(className) : classLoader.loadClass(className))...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2022-44262 - Severity: CRITICAL - CVSS Score: 9.8 Description: fix: Validate FlippingStrategy in various parsers (#624) Function: instanceFlippingStrategy File: ff4j-core/src/main/java/org/ff4j/utils/MappingUtil.java Repository: ff4j Fixed Code: @SuppressWarn...
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
instanceFlippingStrategy
ff4j-core/src/main/java/org/ff4j/utils/MappingUtil.java
991df72725f78adbc413d9b0fbb676201f1882e0
1
Analyze the following code function for security vulnerabilities
private void readObjectForClass(Object object, ObjectStreamClass classDesc) throws IOException, ClassNotFoundException, NotActiveException { // Have to do this before calling defaultReadObject or anything that // calls defaultReadObject currentObject = object; currentClass = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readObjectForClass File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readObjectForClass
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
private HttpSessionContext getSessionContext() { if (sessionContextCache == null) { this.sessionContextCache = beanManager.instance().select(HttpSessionContext.class).get(); } return sessionContextCache; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionContext File: impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
getSessionContext
impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
void respondToRttRequest( Call call, ParcelFileDescriptor fromInCall, ParcelFileDescriptor toInCall) { final String callId = mCallIdMapper.getCallId(call); if (callId != null && isServiceValid("respondToRttRequest")) { try { logOutgoing("respondToRttRequest: %s %s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: respondToRttRequest File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
respondToRttRequest
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public boolean isFilterParameterEnabled() { return myFilterParameterEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFilterParameterEnabled File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isFilterParameterEnabled
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public void startInPlaceAnimationOnFrontMostApplication(ActivityOptions opts) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startInPlaceAnimationOnFrontMostApplication File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startInPlaceAnimationOnFrontMostApplication
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private static int hashCodeAsciiSanitizeByte(char value) { return value & 0x1f; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCodeAsciiSanitizeByte File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
hashCodeAsciiSanitizeByte
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public static void releaseLastXrefPartial(PdfObject obj) { if (obj == null) return; if (!obj.isIndirect()) return; if (!(obj instanceof PRIndirectReference)) return; PRIndirectReference ref = (PRIndirectReference)obj; PdfReader reader = ref.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: releaseLastXrefPartial File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
releaseLastXrefPartial
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public static Document parse(LSInput source) { try { LSParser p = LS_IMPL.createLSParser(DOMImplementationLS.MODE_SYNCHRONOUS, null); // Disable validation, since this takes a lot of time and causes unneeded network traffic p.getDomConfig().setParameter("validate", false)...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-24898 - Severity: MEDIUM - CVSS Score: 4.0 Description: XWIKI-18946: Improve the default XML parser Function: parse File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java Repository: xwiki/xwiki-commons Fixed Code: public stat...
[ "CWE-611" ]
CVE-2022-24898
MEDIUM
4
xwiki/xwiki-commons
parse
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
947e8921ebd95462d5a7928f397dd1b64f77c7d5
1
Analyze the following code function for security vulnerabilities
@SuppressWarnings("deprecation") public String getLegacyInstanceId() { return Util.getDigestOf(getSecretKey()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLegacyInstanceId File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getLegacyInstanceId
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
protected PostMethod executePost(String uri, InputStream is, String userName, String password) throws Exception { HttpClient httpClient = new HttpClient(); httpClient.getState().setCredentials(AuthScope.ANY, new UsernamePasswordCredentials(userName, password)); httpClient.getParams().setAuth...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executePost File: xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java Repository: xwiki/xwiki-platform The code...
[ "CWE-352" ]
CVE-2023-37277
CRITICAL
9.6
xwiki/xwiki-platform
executePost
xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-test/xwiki-platform-rest-test-tests/src/test/it/org/xwiki/rest/test/framework/AbstractHttpIT.java
4c175405faa0e62437df397811c7526dfc0fbae7
0
Analyze the following code function for security vulnerabilities
@NonNull @Override public LaunchAnimator.State createAnimatorState() { final int width = getLaunchContainer().getWidth(); final int height = getLaunchContainer().getHeight(); final float initialHeight = height / 3f; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAnimatorState File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
createAnimatorState
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@Override public void setClip(Object graphics, Shape shape) { //Path p = cn1ShapeToAndroidPath(shape); ((AndroidGraphics) graphics).setClip(shape); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClip File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setClip
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public static String addLimits(String query, long offSet, long limit) { if ( offSet == 0 && limit == -1 ) { //Nothing to do... return query; } StringBuffer queryString = new StringBuffer(); int count = 0; if(query!=null){ query = query.toLowerCase(); count = StringUtil.count(query, "select"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addLimits File: src/com/dotmarketing/common/util/SQLUtil.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
addLimits
src/com/dotmarketing/common/util/SQLUtil.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public void onHostEmulationData(byte[] data) { Log.d(TAG, "notifyHostEmulationData"); String selectAid = findSelectAid(data); ComponentName resolvedService = null; ApduServiceInfo resolvedServiceInfo = null; AidResolveInfo resolveInfo = null; synchronized (mLock) { ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-35671 - Severity: MEDIUM - CVSS Score: 5.5 Description: Ensure that SecureNFC setting cannot be bypassed Bug: 268038643 Test: ctsverifier (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:6cb53d963d376b97963120a4d2c7df961789e...
[ "CWE-Other" ]
CVE-2023-35671
MEDIUM
5.5
android
onHostEmulationData
src/com/android/nfc/cardemulation/HostEmulationManager.java
745632835f3d97513a9c2a96e56e1dc06c4e4176
1
Analyze the following code function for security vulnerabilities
@Override public String getRequestPath() { return request.getServletPath(); }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-44794 - Severity: CRITICAL - CVSS Score: 9.8 Description: 修复路由拦截鉴权可被绕过的问题 fix #515 Function: getRequestPath File: sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java Repository: dromara/Sa-Token ...
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
getRequestPath
sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java
954efeb73277f924f836da2a25322ea35ee1bfa3
1
Analyze the following code function for security vulnerabilities
protected int getCacheTime(String filenameWithPath) { /* * GWT conventions: * * - files containing .nocache. will not be cached. * * - files containing .cache. will be cached for one year. * * https://developers.google.com/web-toolkit/doc/latest/ ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCacheTime File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
getCacheTime
flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
6ae6460ca4f3a9b50bd46fbf49c807fe67718307
0
Analyze the following code function for security vulnerabilities
private void scheduleNotifyAppWidgetViewDataChanged(Widget widget, int viewId) { if (widget == null || widget.host == null || widget.host.zombie || widget.host.callbacks == null || widget.provider == null || widget.provider.zombie) { return; } SomeArg...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleNotifyAppWidgetViewDataChanged File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
scheduleNotifyAppWidgetViewDataChanged
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public void setQuarterlyVotes(Integer quarterlyVotes) { this.quarterlyVotes = quarterlyVotes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setQuarterlyVotes File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
setQuarterlyVotes
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthScope(String scope) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setScope(scope); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthScope File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthScope
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthScope(String scope) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setScope(scope); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthScope File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthScope
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected Client buildHttpClient() { // use the default client config if not yet initialized if (clientConfig == null) { clientConfig = getDefaultClientConfig(); } ClientBuilder clientBuilder = ClientBuilder.newBuilder(); customizeClientBuilder(clientBuilder); clientBuilder = clientBuil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildHttpClient File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
buildHttpClient
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public Response processMessage(Message messageSend) throws Exception { ProducerId producerId = messageSend.getProducerId(); ProducerBrokerExchange producerExchange = getProducerBrokerExchange(producerId); if (producerExchange.canDispatch(messageSend)) { broker.send(prod...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processMessage File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processMessage
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override public void setSecondaryLockscreenEnabled(ComponentName who, boolean enabled) { Objects.requireNonNull(who, "ComponentName is null"); // Check can set secondary lockscreen enabled final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSecondaryLockscreenEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setSecondaryLockscreenEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public Mono<DatasourceTestResult> testDatasource(DatasourceConfiguration datasourceConfiguration) { // At this point, the URL can be invalid because of mustache template keys inside it. Hence, connecting to // and verifying the URL isn't feasible. Since validation happens just ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDatasource File: app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java Repository: appsmithorg/appsmith The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-38298
HIGH
8.8
appsmithorg/appsmith
testDatasource
app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java
c59351ef94f9780c2a1ffc991e29b9272ab9fe64
0
Analyze the following code function for security vulnerabilities
@Override public void binderDied() { if (DEBUG_ALL) Slog.v( TAG, "Death received in " + this + " for thread " + mAppThread.asBinder()); synchronized(ActivityManagerService.this) { appDiedLocked(mApp, mPid, mAppThread, true); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: binderDied File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
binderDied
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static void interfacesConfigXmlGenerator(XmlGenerator gen, InterfacesConfig interfaces) { gen.open("interfaces", "enabled", interfaces.isEnabled()); for (String i : interfaces.getInterfaces()) { gen.node("interface", i); } gen.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: interfacesConfigXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
interfacesConfigXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
public @NonNull List<String> setMeteredDataDisabledPackages(@NonNull ComponentName admin, @NonNull List<String> packageNames) { throwIfParentInstance("setMeteredDataDisabled"); if (mService != null) { try { return mService.setMeteredDataDisabledPackages(admin, pac...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMeteredDataDisabledPackages File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setMeteredDataDisabledPackages
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected void updateKeyguardState(boolean goingToFullShade, boolean fromShadeLocked) { Trace.beginSection("StatusBar#updateKeyguardState"); if (mState == StatusBarState.KEYGUARD) { mKeyguardIndicationController.setVisible(true); mNotificationPanel.resetViews(); if (m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateKeyguardState File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateKeyguardState
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public List<String> getMeteredDataDisabledPackages(ComponentName who) { Objects.requireNonNull(who); if (!mHasFeature) { return new ArrayList<>(); } final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMeteredDataDisabledPackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getMeteredDataDisabledPackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void invokeBinaryHandler(final BufferedBinaryMessage context, final HandlerWrapper handler, final boolean finalFragment) { final Pooled<ByteBuffer[]> pooled = context.getData(); session.getContainer().invokeEndpointMethod(executor, new Runnable() { @Override public void ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeBinaryHandler File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
invokeBinaryHandler
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
@Override public void setPictureInPictureParams(IBinder token, final PictureInPictureParams params) { final long origId = Binder.clearCallingIdentity(); try { synchronized(this) { final ActivityRecord r = ensureValidPictureInPictureActivityParamsLocked( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPictureInPictureParams File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setPictureInPictureParams
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
protected void updateNotificationRanking(RankingMap ranking) { mNotificationData.updateRanking(ranking); updateNotifications(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNotificationRanking File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateNotificationRanking
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
void onFirstWindowDrawn(WindowState win) { firstWindowDrawn = true; // stop tracking mSplashScreenStyleSolidColor = true; // We now have a good window to show, remove dead placeholders removeDeadWindows(); if (mStartingWindow != null) { ProtoLog.v(WM_DEBUG_S...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFirstWindowDrawn File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
onFirstWindowDrawn
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private float getMinAspectRatio() { return info.getMinAspectRatio(getRequestedOrientation()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMinAspectRatio File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getMinAspectRatio
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public void setMaximumFailedPasswordsForWipe(ComponentName who, int num, boolean parent) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return; } Objects.requireNonNull(who, "ComponentName is null"); final int userId = mInjector.userHandleGetC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaximumFailedPasswordsForWipe File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setMaximumFailedPasswordsForWipe
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public IntentBuilder setForFace(boolean forFace) { mIntent.putExtra(ChooseLockSettingsHelper.EXTRA_KEY_FOR_FACE, forFace); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setForFace File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
setForFace
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public static void unzipFilesToPath(String jarPath, String destinationDir) throws IOException { File file = new File(jarPath); try (JarFile jar = new JarFile(file)) { // fist get all directories, // then make those directory on the destination Path /*for (Enumeration...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-21675 - Severity: MEDIUM - CVSS Score: 6.8 Description: Mitigate Zip Slip exlpoit Function: unzipFilesToPath File: src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java Repository: Konloch/bytecode-viewer Fixed Code: public static void unzipFile...
[ "CWE-22" ]
CVE-2022-21675
MEDIUM
6.8
Konloch/bytecode-viewer
unzipFilesToPath
src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java
c968e94b2c93da434a4ecfac6d08eda162d615d0
1
Analyze the following code function for security vulnerabilities
protected void writeCollectionBegin(byte elemType, int size) throws TException { if (size <= 14) { writeByteDirect(size << 4 | getCompactType(elemType)); } else { writeByteDirect(0xf0 | getCompactType(elemType)); writeVarint32(size); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeCollectionBegin File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
writeCollectionBegin
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public void setFileResourceManager(FileResourceManager fileResourceManager) { this.fileResourceManager = fileResourceManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFileResourceManager File: src/main/java/org/olat/modules/wiki/WikiManager.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
setFileResourceManager
src/main/java/org/olat/modules/wiki/WikiManager.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
@Override public synchronized boolean isInboundDone() { return isInboundDone || engineClosed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInboundDone File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
isInboundDone
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public void deleteAppWidgetId(String callingPackage, int appWidgetId) { final int userId = UserHandle.getCallingUserId(); if (DEBUG) { Slog.i(TAG, "deleteAppWidgetId() " + userId); } // Make sure the package runs under the caller uid. mSecurityPolicy.e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteAppWidgetId File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
deleteAppWidgetId
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public void doConfigSubmit(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, FormException { Jenkins.getInstance().doConfigExecutorsSubmit(req, rsp); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doConfigSubmit File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
doConfigSubmit
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public String getRuntimeSource(Jiffle.RuntimeModel model, boolean scriptInDocs) throws it.geosolutions.jaiext.jiffle.JiffleException { return createRuntimeSource(model, getRuntimeBaseClass(model).getName(), scriptInDocs); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRuntimeSource File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
getRuntimeSource
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
public FilePath obtain() throws IOException, InterruptedException { return RemotingDiagnostics.getHeapDump(channel); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: obtain File: core/src/main/java/hudson/util/RemotingDiagnostics.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-2068
LOW
3.5
jenkinsci/jenkins
obtain
core/src/main/java/hudson/util/RemotingDiagnostics.java
0530a6645aac10fec005614211660e98db44b5eb
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public static GameData parse( final String mapName, final InputStream stream, final XmlGameElementMapper xmlGameElementMapper) throws GameParseException, EngineVersionException { checkNotNull(mapName); checkNotNull(stream); checkNotNull(xmlGameElementMapper); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parse File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
parse
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void initReplyRecipients(final Message refMessage, final int action) { String[] sentToAddresses = refMessage.getToAddressesUnescaped(); final Collection<String> toAddresses; final String[] fromAddresses = refMessage.getFromAddressesUnescaped(); final String fromAdd...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initReplyRecipients File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
initReplyRecipients
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
List<SubscriptionInfo> getSubscriptionInfo(boolean forceReload) { List<SubscriptionInfo> sil = mSubscriptionInfo; if (sil == null || forceReload) { sil = mSubscriptionManager.getActiveSubscriptionInfoList(); } if (sil == null) { // getActiveSubscriptionInfoList wa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSubscriptionInfo File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getSubscriptionInfo
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0