instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private void elideTrailingComma(int closeBracketPos) {
// The content before closeBracketPos is stored in two places.
// 1. sanitizedJson
// 2. jsonish.substring(cleaned, closeBracketPos)
// We walk over whitespace characters in both right-to-left looking for a
// comma.
for (int i = closeBracke... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: elideTrailingComma
File: src/main/java/com/google/json/JsonSanitizer.java
Repository: OWASP/json-sanitizer
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-13973 | MEDIUM | 4.3 | OWASP/json-sanitizer | elideTrailingComma | src/main/java/com/google/json/JsonSanitizer.java | 53ceaac3e0a10e86d512ce96a0056578f2d1978f | 0 |
Analyze the following code function for security vulnerabilities | private Response sendRequest(String method, Invocation.Builder invocationBuilder, Entity<?> entity) {
Response response;
if ("POST".equals(method)) {
response = invocationBuilder.post(entity);
} else if ("PUT".equals(method)) {
response = invocationBuilder.put(entity);
} else if ("DELETE".eq... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendRequest
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | sendRequest | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void completeCloningAccount(IAccountManagerResponse response,
final Bundle accountCredentials, final Account account, final UserAccounts targetUser,
final int parentUserId){
Bundle.setDefusable(accountCredentials, true);
final long id = clearCallingIdentity();
try... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: completeCloningAccount
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | completeCloningAccount | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public void handleFrame(Frame frame) throws IOException {
AMQCommand command = _command;
if (command.handleFrame(frame)) { // a complete command has rolled off the assembly line
_command = new AMQCommand(); // prepare for the next one
handleCompleteInboundCommand(command);
... | Vulnerability Classification:
- CWE: CWE-400
- CVE: CVE-2023-46120
- Severity: HIGH
- CVSS Score: 7.5
Description: Add max inbound message size to ConnectionFactory
To avoid OOM with a very large message.
The default value is 64 MiB.
Fixes #1062
(cherry picked from commit 9ed45fde52224ec74fc523321efdf9a157d5cfca)
... | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | handleFrame | src/main/java/com/rabbitmq/client/impl/AMQChannel.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 1 |
Analyze the following code function for security vulnerabilities | public void onAuthenticationHelp(int helpCode, CharSequence helpString) { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAuthenticationHelp
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | onAuthenticationHelp | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public String getAuthenticatorId() {
return authenticatorId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthenticatorId
File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | getAuthenticatorId | base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static void removeChildren(Node e) {
NodeList list = e.getChildNodes();
for (int i = 0; i < list.getLength(); i++) {
Node n = list.item(i);
e.removeChild(n);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeChildren
File: src/edu/stanford/nlp/time/XMLUtils.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3869 | MEDIUM | 5 | stanfordnlp/CoreNLP | removeChildren | src/edu/stanford/nlp/time/XMLUtils.java | 5d83f1e8482ca304db8be726cad89554c88f136a | 0 |
Analyze the following code function for security vulnerabilities | public Map<Integer, String> getRequiredProtoPortMap() {
return mRequiredProtoPortMap;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequiredProtoPortMap
File: framework/java/android/net/wifi/hotspot2/pps/Policy.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21240 | MEDIUM | 5.5 | android | getRequiredProtoPortMap | framework/java/android/net/wifi/hotspot2/pps/Policy.java | 69119d1d3102e27b6473c785125696881bce9563 | 0 |
Analyze the following code function for security vulnerabilities | public static String uncompressString(byte[] input, int offset, int length, String encoding)
throws IOException,
UnsupportedEncodingException
{
byte[] uncompressed = new byte[uncompressedLength(input, offset, length)];
uncompress(input, offset, length, uncompressed, 0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uncompressString
File: src/main/java/org/xerial/snappy/Snappy.java
Repository: xerial/snappy-java
The code follows secure coding practices. | [
"CWE-190"
] | CVE-2023-34454 | HIGH | 7.5 | xerial/snappy-java | uncompressString | src/main/java/org/xerial/snappy/Snappy.java | d0042551e4a3509a725038eb9b2ad1f683674d94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void getMemoryInfo(ActivityManager.MemoryInfo outInfo) {
mProcessList.getMemoryInfo(outInfo);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMemoryInfo
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getMemoryInfo | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static String getCurrentDescriptorByNameUrl() {
StaplerRequest req = Stapler.getCurrentRequest();
// this override allows RenderOnDemandClosure to preserve the proper value
Object url = req.getAttribute("currentDescriptorByNameUrl");
if (url!=null) return url.toString();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentDescriptorByNameUrl
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getCurrentDescriptorByNameUrl | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private void updateFingerprintListeningState() {
boolean shouldListenForFingerprint = shouldListenForFingerprint();
if (mFingerprintRunningState == FINGERPRINT_STATE_RUNNING && !shouldListenForFingerprint) {
stopListeningForFingerprint();
} else if (mFingerprintRunningState != FINGER... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateFingerprintListeningState
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | updateFingerprintListeningState | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean addOneIntentFilterVerification(int verifierUid, int userId, int verificationId,
ActivityIntentInfo filter, String packageName) {
if (!hasValidDomains(filter)) {
return false;
}
IntentFilterVerificationState ivs = mI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addOneIntentFilterVerification
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | addOneIntentFilterVerification | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public static AsciiString of(AsciiString name) {
final AsciiString lowerCased = name.toLowerCase();
final AsciiString cached = map.get(lowerCased);
return cached != null ? cached : lowerCased;
} | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2019-16771
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Merge pull request from GHSA-35fr-h7jr-hh86
Motivation:
An `HttpService` can produce a malformed HTTP response when a user
specified a malformed HTTP header values, such as:
ResponseHeaders.of(Htt... | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | of | core/src/main/java/com/linecorp/armeria/common/HttpHeaderNames.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void visit(Material material, Revision revision) {
material.toJson(materialJson, revision);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visit
File: server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-28629 | MEDIUM | 5.4 | gocd | visit | server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java | 95f758229d419411a38577608709d8552cccf193 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int update(Uri uri, ContentValues values, String where, String[] whereArgs) {
if (DEBUG) {
Slog.v(LOG_TAG, "update() for user: " + UserHandle.getCallingUserId());
}
Arguments args = new Arguments(uri, where, whereArgs, false);
// If a legacy table that ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: update
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | update | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public List<SearchHit> getRelatedItems(String identifierField)
throws PresentationException, IndexUnreachableException, DAOException, ViewerConfigurationException {
logger.trace("getRelatedItems: {}", identifierField);
if (identifierField == null) {
return null;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRelatedItems
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getRelatedItems | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | private static DashboardCategory createCategory(Context context, String categoryKey) {
DashboardCategory category = new DashboardCategory();
category.key = categoryKey;
PackageManager pm = context.getPackageManager();
List<ResolveInfo> results = pm.queryIntentActivities(new Intent(catego... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createCategory
File: packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | createCategory | packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java | e206f02d46ae5e38c74d138b51f6e1637e261abe | 0 |
Analyze the following code function for security vulnerabilities | public void setMode(Mode m) throws IOException {
this.mode = m;
save();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMode
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | setMode | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public void writeByte(byte b) throws TException {
buffer[0] = b;
trans_.write(buffer, 0, 1);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeByte
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | writeByte | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public synchronized void flush() throws IOException {
out.flush();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flush
File: android/guava/src/com/google/common/io/FileBackedOutputStream.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | flush | android/guava/src/com/google/common/io/FileBackedOutputStream.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | private
boolean isRoamingBetweenOperators(boolean cdmaRoaming, ServiceState s) {
String spn = ((TelephonyManager) mPhone.getContext().
getSystemService(Context.TELEPHONY_SERVICE)).
getSimOperatorNameForPhone(mPhoneBase.getPhoneId());
// NOTE: in case of RUIM we shoul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRoamingBetweenOperators
File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-3831 | MEDIUM | 5 | android | isRoamingBetweenOperators | src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java | f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onLlcpFirstPacketReceived(NfcDepEndpoint device) {
sendMessage(NfcService.MSG_LLCP_LINK_FIRST_PACKET, device);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLlcpFirstPacketReceived
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | onLlcpFirstPacketReceived | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
@Override
public final Float getFloat(CharSequence name) {
final String v = get(name);
return toFloat(v);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFloat
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | getFloat | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean supportsResetOp(int op) {
return op == AppOpsManager.OP_INTERACT_ACROSS_PROFILES
&& LocalServices.getService(CrossProfileAppsInternal.class) != null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: supportsResetOp
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | supportsResetOp | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private ProcessStartResult startProcess(String hostingType, String entryPoint,
ProcessRecord app, int uid, int[] gids, int runtimeFlags, int mountExternal,
String seInfo, String requiredAbi, String instructionSet, String invokeWith,
long startTime) {
try {
Trace.t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startProcess
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | startProcess | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isInitialized(UserInfo user) {
return (user.flags & UserInfo.FLAG_INITIALIZED) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInitialized
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | isInitialized | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | private void performUpgradeLocked(int fromVersion) {
if (fromVersion < CURRENT_VERSION) {
Slog.v(TAG, "Upgrading widget database from " + fromVersion + " to "
+ CURRENT_VERSION);
}
int version = fromVersion;
// Update 1: keyguard moved from package "andr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performUpgradeLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | performUpgradeLocked | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public short getShort(CharSequence name, short defaultValue) {
return headers.getShort(name, defaultValue);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShort
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | getShort | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | @POST
@Path("assessment/{nodeId}")
@Operation(summary = "Update an assessment building block", description = "Updates an assessment building block")
@ApiResponse(responseCode = "200", description = "The course node metadatas", content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAssessment
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | updateAssessment | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | boolean setKeepClearAreas(List<Rect> restricted, List<Rect> unrestricted) {
final boolean newRestrictedAreas = !mKeepClearAreas.equals(restricted);
final boolean newUnrestrictedAreas = !mUnrestrictedKeepClearAreas.equals(unrestricted);
if (!newRestrictedAreas && !newUnrestrictedAreas) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeepClearAreas
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | setKeepClearAreas | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private User loadUserById(String userId) {
final User user = userManagementService.loadById(userId);
if (user == null) {
throw new NotFoundException("Couldn't find user with ID <" + userId + ">");
}
return user;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadUserById
File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices. | [
"CWE-613"
] | CVE-2023-41041 | LOW | 3.1 | Graylog2/graylog2-server | loadUserById | graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java | bb88f3d0b2b0351669ab32c60b595ab7242a3fe3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removeContentProvider(IBinder connection, boolean stable) {
mCpHelper.removeContentProvider(connection, stable);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContentProvider
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | removeContentProvider | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | void createNewUserLILPw(int userHandle) {
if (mInstaller != null) {
mInstaller.createUserConfig(userHandle);
mSettings.createNewUserLILPw(this, mInstaller, userHandle);
applyFactoryDefaultBrowserLPw(userHandle);
primeDomainVerificationsLPw(userHandle);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNewUserLILPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | createNewUserLILPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Beta
public static void copy(File from, File to) throws IOException {
checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to);
asByteSource(from).copyTo(asByteSink(to));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copy
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-8908 | LOW | 2.1 | google/guava | copy | guava/src/com/google/common/io/Files.java | fec0dbc4634006a6162cfd4d0d09c962073ddf40 | 0 |
Analyze the following code function for security vulnerabilities | protected void onNextButtonClick(View view) {
handleRightButton();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onNextButtonClick
File: src/com/android/settings/password/ChooseLockPattern.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | onNextButtonClick | src/com/android/settings/password/ChooseLockPattern.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | public boolean isCurrentUserPage(XWikiContext context)
{
DocumentReference userReference = context.getUserReference();
if (userReference == null) {
return false;
}
return userReference.equals(getDocumentReference());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCurrentUserPage
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | isCurrentUserPage | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private IMountService getMountService() {
final IBinder service = ServiceManager.getService("mount");
if (service != null) {
return IMountService.Stub.asInterface(service);
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMountService
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | getMountService | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Analyze the following code function for security vulnerabilities | public Form<T> withGlobalError(final String error, final List<Object> args) {
return withError("", error, args);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withGlobalError
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | withGlobalError | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object parseMessageFromBytes(
ByteString bytes,
ExtensionRegistryLite registry,
Descriptors.FieldDescriptor field,
Message defaultInstance)
throws IOException {
Message.Builder subBuilder = defaultInstance.newBuilderForType();
if (!field.isRepeate... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseMessageFromBytes
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | parseMessageFromBytes | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | public void addCookie(Cookie[] cookiesArray, boolean addToWebViewCookieManager){
addCookie(cookiesArray, addToWebViewCookieManager, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCookie
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | addCookie | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private void clearDeviceOwnerUserRestriction(UserHandle userHandle) {
if (isHeadlessFlagEnabled()) {
for (int userId : mUserManagerInternal.getUserIds()) {
UserHandle user = UserHandle.of(userId);
// ManagedProvisioning/DPC sets DISALLOW_ADD_USER. Clear to recover to ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearDeviceOwnerUserRestriction
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | clearDeviceOwnerUserRestriction | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private String getDocumentVersionQueryString(DocumentReference documentReference, XWikiContext context)
{
return "docVersion=" + sanitize(getDocumentVersion(documentReference, context));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocumentVersionQueryString
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | getDocumentVersionQueryString | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return subDirectory.hashCode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: common/src/main/java/com/thoughtworks/go/domain/FolderDirectoryEntry.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-43288 | LOW | 3.5 | gocd | hashCode | common/src/main/java/com/thoughtworks/go/domain/FolderDirectoryEntry.java | f5c1d2aa9ab302a97898a6e4b16218e64fe8e9e4 | 0 |
Analyze the following code function for security vulnerabilities | private boolean setActiveAdminAndDeviceOwner(
@UserIdInt int userId, ComponentName adminComponent, String name) {
enableAndSetActiveAdmin(userId, userId, adminComponent);
// TODO(b/178187130): Directly set DO and remove the check once silent provisioning is no
// longer used.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setActiveAdminAndDeviceOwner
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setActiveAdminAndDeviceOwner | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<String> getChildren(XWikiContext context) throws XWikiException
{
return getChildren(0, 0, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getChildren
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getChildren | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public Map<String, String> getOptions() {
return Collections.unmodifiableMap(options);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOptions
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | getOptions | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | public void setConfigFile(final String configFile) {
this.configFile = configFile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setConfigFile
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practic... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | setConfigFile | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XDOM getXDOM()
{
if (this.xdomCache == null) {
try {
this.xdomCache = parseContent(getContent());
} catch (XWikiException e) {
ErrorBlockGenerator errorBlockGenerator = Utils.getComponent(ErrorBlockGenerator.class);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXDOM
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getXDOM | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void render(HtmlRenderer renderer) {
if (isArtifactsDeleted || isEmpty()) {
HtmlElement element = p().content("Artifacts for this job instance are unavailable as they may have been <a href='" +
CurrentGoCDVersion.docsUrl("configuration/delete_artifacts.html")... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2021-43288
- Severity: LOW
- CVSS Score: 3.5
Description: #000 - Escape filenames in artifact tab
Function: render
File: common/src/main/java/com/thoughtworks/go/domain/DirectoryEntries.java
Repository: gocd
Fixed Code:
@Override
public void render(HtmlRende... | [
"CWE-79"
] | CVE-2021-43288 | LOW | 3.5 | gocd | render | common/src/main/java/com/thoughtworks/go/domain/DirectoryEntries.java | f5c1d2aa9ab302a97898a6e4b16218e64fe8e9e4 | 1 |
Analyze the following code function for security vulnerabilities | void mergeConference(Call call) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("mergeConference")) {
try {
logOutgoing("mergeConference %s", callId);
mServiceInterface.mergeConference(callId,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergeConference
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | mergeConference | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | private static native Object newInstance(Class<?> instantiationClass, long methodId); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newInstance
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | newInstance | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public void setStringValue(EntityReference classReference, String fieldName, String value)
{
BaseObject bobject = prepareXObject(classReference);
bobject.setStringValue(fieldName, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStringValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setStringValue | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | RestorePolicy readAppManifest(FileMetadata info, InputStream instream)
throws IOException {
// Fail on suspiciously large manifest files
if (info.size > 64 * 1024) {
throw new IOException("Restore manifest too big; corrupt? size=" + info.size);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readAppManifest
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | readAppManifest | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getBoolean(String key, boolean defaultValue, int userId) throws RemoteException {
checkReadPermission(key, userId);
String value = getStringUnchecked(key, null, userId);
return TextUtils.isEmpty(value) ?
defaultValue : (value.equals("1") || value.equa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBoolean
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2016-3749 | MEDIUM | 4.6 | android | getBoolean | services/core/java/com/android/server/LockSettingsService.java | e83f0f6a5a6f35323f5367f99c8e287c440f33f5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startAssist(Bundle args) {
if (mAssistManager != null) {
mAssistManager.startAssist(args);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startAssist
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | startAssist | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | boolean isDisplayed() {
final ActivityRecord atoken = mActivityRecord;
return isDrawn() && isVisibleByPolicy()
&& ((!isParentWindowHidden() && (atoken == null || atoken.mVisibleRequested))
|| isAnimating(TRANSITION | PARENTS));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDisplayed
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isDisplayed | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
// Change the title for accessibility so we announce "Compose" instead
// of the app_name while still showing the app_name in recents.
setTitle(R.string.compose_title);
setConte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | onCreate | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPermissionPolicy(ComponentName admin, String callerPackage, int policy) {
final CallerIdentity caller = getCallerIdentity(admin, callerPackage);
Preconditions.checkCallAuthorization((caller.hasAdminComponent()
&& (isProfileOwner(caller) || isDefaultDeviceOwne... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPermissionPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setPermissionPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private static void invokeMethod(Component instance, Method method,
JsonArray args, int promiseId, boolean inert) {
if (inert && !method.isAnnotationPresent(AllowInert.class)) {
return;
}
if (promiseId == -1) {
invokeMethod(instance, method, args);
} e... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: invokeMethod
File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25500 | MEDIUM | 4.3 | vaadin/flow | invokeMethod | flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java | 1fa4976902a117455bf2f98b191f8c80692b53c8 | 0 |
Analyze the following code function for security vulnerabilities | private void resetInteractAcrossProfilesAppOps(@UserIdInt int userId) {
mInjector.getCrossProfileApps(userId).clearInteractAcrossProfilesAppOps();
pregrantDefaultInteractAcrossProfilesAppOps(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetInteractAcrossProfilesAppOps
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | resetInteractAcrossProfilesAppOps | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onIsVoipAudioModeChanged(Call call) {
for (CallsManagerListener listener : mListeners) {
listener.onIsVoipAudioModeChanged(call);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onIsVoipAudioModeChanged
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | onIsVoipAudioModeChanged | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | private void referralAuthenticate(String absoluteName, Object credential)
throws LoginException
{
URI uri;
try
{
uri = new URI(absoluteName);
}
catch (URISyntaxException e)
{
LoginException le = new LoginException("Unable to find user DN ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: referralAuthenticate
File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
Repository: wildfly-security/jboss-negotiation
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2015-1849 | MEDIUM | 4.3 | wildfly-security/jboss-negotiation | referralAuthenticate | jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java | 0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e | 0 |
Analyze the following code function for security vulnerabilities | public static String sanitizePath(String path, char substitute) {
//on windows, we can receive both c:/path/ and c:\path\
path = path.replace("\\", "/");
if (OsUtil.isWindows() && path.matches("^[a-zA-Z]\\:.*")) {
path = path.replaceFirst(":", WIN_DRIVE_LETTER_COLON_WILDCHAR);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sanitizePath
File: core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | sanitizePath | core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java | 2ab070cdac087bd208f64fa8138bb709f8d7680c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean propertyExists(String name) throws JMSException {
return this.userJmsProperties.containsKey(name) || this.rmqProperties.containsKey(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: propertyExists
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | propertyExists | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | final double getDoubleAndRemove(CharSequence name, double defaultValue) {
final Double v = getDoubleAndRemove(name);
return v != null ? v : defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDoubleAndRemove
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | getDoubleAndRemove | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder removeOpenFlags(@DatabaseOpenFlags int openFlags) {
mOpenFlags &= ~openFlags;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeOpenFlags
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | removeOpenFlags | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isGalleryTypeSupported(int type) {
if (super.isGalleryTypeSupported(type)) {
return true;
}
if (type == -9999 || type == -9998) {
return true;
}
if (android.os.Build.VERSION.SDK_INT >= 16) {
switch (type) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isGalleryTypeSupported
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isGalleryTypeSupported | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | protected void answerJSON(int status, Map<String, String> answer) throws IOException
{
ObjectMapper mapper = new ObjectMapper();
XWikiContext context = contextProvider.get();
XWikiResponse response = context.getResponse();
String jsonAnswerAsString = mapper.writeValueAsString(answer)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: answerJSON
File: application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java
Repository: xwiki-contrib/application-changerequest
The code f... | [
"CWE-522"
] | CVE-2023-49280 | MEDIUM | 6.5 | xwiki-contrib/application-changerequest | answerJSON | application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java | ff0f5368ea04f0e4aa7b33821c707dc68a8c5ca8 | 0 |
Analyze the following code function for security vulnerabilities | protected ByteArrayBuilder _getByteArrayBuilder() {
if (_byteArrayBuilder == null) {
_byteArrayBuilder = new ByteArrayBuilder();
} else {
_byteArrayBuilder.reset();
}
return _byteArrayBuilder;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _getByteArrayBuilder
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _getByteArrayBuilder | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | public XmlGraphMLReader nodeLabels(boolean readLabels) {
this.labels = readLabels;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nodeLabels
File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
Repository: neo4j/apoc
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-23926 | HIGH | 8.1 | neo4j/apoc | nodeLabels | core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java | 3202b421b21973b2f57a43b33c88f3f6901cfd2a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getDefaultDialerPackage() {
final long token = Binder.clearCallingIdentity();
try {
return DefaultDialerManager.getDefaultDialerApplication(mContext);
} finally {
Binder.restoreCallingIdentity(token);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultDialerPackage
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | getDefaultDialerPackage | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | private void rejectRemoteInitiatedRenegation() throws SSLHandshakeException {
if (rejectRemoteInitiatedRenegation && SSL.getHandshakeCount(ssl) > 1) {
// TODO: In future versions me may also want to send a fatal_alert to the client and so notify it
// that the renegotiation failed.
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: rejectRemoteInitiatedRenegation
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | rejectRemoteInitiatedRenegation | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | public void writeResult(Object iResult, final String iFormat, final String iAccept) throws InterruptedException, IOException {
writeResult(iResult, iFormat, iAccept, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeResult
File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
Repository: orientechnologies/orientdb
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2015-2912 | MEDIUM | 6.8 | orientechnologies/orientdb | writeResult | server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java | d5a45e608ba8764fd817c1bdd7cf966564e828e9 | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isZeroSafe(byte[] bytes, int startPos, int length) {
final int end = startPos + length;
for (; startPos < end; ++startPos) {
if (bytes[startPos] != 0) {
return false;
}
}
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isZeroSafe
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | isZeroSafe | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
@TestApi
public String getDevicePolicyManagementRoleHolderUpdaterPackage() {
String devicePolicyManagementUpdaterConfig = mContext.getString(
com.android.internal.R.string.config_devicePolicyManagementUpdater);
if (TextUtils.isEmpty(devicePolicyManagementUpdaterConfig))... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDevicePolicyManagementRoleHolderUpdaterPackage
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getDevicePolicyManagementRoleHolderUpdaterPackage | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public P4Material getP4Material() {
return getExistingOrDefaultMaterial(new P4Material("", ""));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getP4Material
File: domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | getP4Material | domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | protected String getOCEventDataAuditsSql(String studySubjectOids) {
return "select ss.oc_oid as study_subject_oid, sed.oc_oid as definition_oid, ale.audit_id,"
+ " alet.name, ale.user_id, ale.audit_date, ale.reason_for_change, ale.old_value, ale.new_value," + " ale.audit_log_event_type_id"
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOCEventDataAuditsSql
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | getOCEventDataAuditsSql | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | private static String cleanURLMap(String urlMap){
if(!UtilMethods.isSet(urlMap)){
return null;
}
urlMap = urlMap.trim();
if(!urlMap.startsWith("/")){
urlMap = "/" + urlMap;
}
return urlMap;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanURLMap
File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | cleanURLMap | src/com/dotmarketing/portlets/structure/factories/StructureFactory.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated(since = "14.0RC1")
public DocumentReference getCreatorReference()
{
UserReference creator = this.getAuthors().getCreator();
if (creator != null && creator != GuestUserReference.INSTANCE) {
return this.getUserReferenceDocumentReferenceSerializer().serialize(creator);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCreatorReference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | getCreatorReference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public int sendInner(int code, Intent intent, String resolvedType, IBinder allowlistToken,
IIntentReceiver finishedReceiver, String requiredPermission, IBinder resultTo,
String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle options) {
if (intent != null) intent.setDef... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-20918
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Ensure that only SysUI can override pending intent launch flags
- Originally added in ag/5139951, this method ensured that activities
launched from widgets are always started in a new task (if th... | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | sendInner | services/core/java/com/android/server/am/PendingIntentRecord.java | 16c604aa7c253ce5cf075368a258c0b21386160d | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void stopLockTaskModeOnCurrent() throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(STOP_LOCK_TASK_BY_CURRENT_TRANSACTION, data, reply, 0);
reply.read... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopLockTaskModeOnCurrent
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | stopLockTaskModeOnCurrent | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public void saveCommandHistoryList(ArrayList<String> commandHistory) {
StringBuilder sb = new StringBuilder();
for (String s : commandHistory) {
if (sb.length() > 0) {
sb.append(';');
}
sb.append(s.replace("\\", "\\\\").replace(";", "\\;"));
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveCommandHistoryList
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | saveCommandHistoryList | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private Class<?> resolveConstructorClass(Class<?> objectClass) throws InvalidClassException {
if (resolvedConstructorClass != null) {
return resolvedConstructorClass;
}
// The class of the instance may not be the same as the class of the
// constructor to run
// This... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveConstructorClass
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | resolveConstructorClass | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public Jooby http2() {
this.http2 = true;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: http2
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | http2 | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public Page<E> reasonable(Boolean reasonable) {
setReasonable(reasonable);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reasonable
File: src/main/java/com/github/pagehelper/Page.java
Repository: pagehelper/Mybatis-PageHelper
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-28111 | HIGH | 7.5 | pagehelper/Mybatis-PageHelper | reasonable | src/main/java/com/github/pagehelper/Page.java | 554a524af2d2b30d09505516adc412468a84d8fa | 0 |
Analyze the following code function for security vulnerabilities | protected DocumentBuilder getDocumentBuilder(
) throws ServiceException {
DocumentBuilder documentBuilder = null;
DocumentBuilderFactory documentBuilderFactory = null;
try {
documentBuilderFactory = DocumentBuilderFactory.newInstance();
documentBuilderFactory.setNames... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2023-46502
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fixes XML eXternal Entity injection (XXE)
Function: getDocumentBuilder
File: core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java
Repository: opencrx
Fixed Code:
p... | [
"CWE-611"
] | CVE-2023-46502 | CRITICAL | 9.8 | opencrx | getDocumentBuilder | core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java | ce7a71db0bb34ecbcb0e822d40598e410a48b399 | 1 |
Analyze the following code function for security vulnerabilities | private void setBypassDevicePolicyManagementRoleQualificationStateInternal(
String currentRoleHolder, boolean allowBypass) {
boolean stateChanged = false;
DevicePolicyData policy = getUserData(UserHandle.USER_SYSTEM);
if (policy.mBypassDevicePolicyManagementRoleQualifications != allo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setBypassDevicePolicyManagementRoleQualificationStateInternal
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practic... | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setBypassDevicePolicyManagementRoleQualificationStateInternal | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private void updateBackgroundColor(RemoteViews contentView,
StandardTemplateParams p) {
if (isBackgroundColorized(p)) {
contentView.setInt(R.id.status_bar_latest_event_content, "setBackgroundColor",
getBackgroundColor(p));
} else {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBackgroundColor
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | updateBackgroundColor | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | protected void updateValue(@Positive int columnIndex, @Nullable Object value) throws SQLException {
checkUpdateable();
if (!onInsertRow && (isBeforeFirst() || isAfterLast() || castNonNull(rows, "rows").isEmpty())) {
throw new PSQLException(
GT.tr(
"Cannot update the ResultSet beca... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateValue
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateValue | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public float getWindowAnimationScaleLocked() {
return mAnimationsDisabled ? 0 : mWindowAnimationScaleSetting;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getWindowAnimationScaleLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | getWindowAnimationScaleLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | protected void setDataProvider(DataProvider<T, ?> dataProvider) {
detachDataProviderListener();
dropAllData();
this.dataProvider = dataProvider;
getKeyMapper().setIdentifierGetter(dataProvider::getId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDataProvider
File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2021-33609 | MEDIUM | 4 | vaadin/framework | setDataProvider | server/src/main/java/com/vaadin/data/provider/DataCommunicator.java | 9a93593d9f3802d2881fc8ad22dbc210d0d1d295 | 0 |
Analyze the following code function for security vulnerabilities | public void setServiceForeground(ComponentName className, IBinder token,
int id, Notification notification, boolean removeNotification) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServiceForeground
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | setServiceForeground | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<String> getDelegatedPermissionNames() {
return mDelegatedPermissionNames == null
? null
: new ArrayList<>(mDelegatedPermissionNames);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDelegatedPermissionNames
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getDelegatedPermissionNames | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public void calculatePlanReport(String planId, TestPlanSimpleReportDTO report) {
List<PlanReportIssueDTO> planReportIssueDTOS = extIssuesMapper.selectForPlanReport(planId);
planReportIssueDTOS = DistinctKeyUtil.distinctByKey(planReportIssueDTOS, PlanReportIssueDTO::getId);
TestPlanFunctionResult... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: calculatePlanReport
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | calculatePlanReport | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public long getTotalFileSize() {
return totalFileSize;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTotalFileSize
File: src/main/java/emissary/pickup/WorkBundle.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | getTotalFileSize | src/main/java/emissary/pickup/WorkBundle.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setApiKey(String apiKey) {
for (Authentication auth : authentications.values()) {
if (auth instanceof ApiKeyAuth) {
((ApiKeyAuth) auth).setApiKey(apiKey);
return this;
}
}
throw new RuntimeException("No API key authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApiKey
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setApiKey | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public static @Nullable String extractPathOwnerPackageName(@Nullable String path) {
if (path == null) return null;
final Matcher m = PATTERN_OWNED_PATH.matcher(path);
if (m.matches()) {
return m.group(1);
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractPathOwnerPackageName
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | extractPathOwnerPackageName | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void mergeMessage(
CodedInputStream input,
ExtensionRegistryLite extensionRegistry,
FieldDescriptor field,
Message defaultInstance)
throws IOException {
if (!field.isRepeated()) {
if (hasField(field)) {
Object fieldOrBuilder = extensio... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergeMessage
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | mergeMessage | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | public static void send(String[] args) {
try (Socket socket = new Socket(InetAddress.getLocalHost(), PORT);
ObjectOutputStream oos = new ObjectOutputStream(socket.getOutputStream())) {
// Send args to the main JD-GUI instance
oos.writeObject(args);
} catch (IOExcepti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: send
File: app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java
Repository: java-decompiler/jd-gui
The code follows secure coding practices. | [
"CWE-502",
"CWE-79"
] | CVE-2023-26234 | CRITICAL | 9.8 | java-decompiler/jd-gui | send | app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java | 0b1f57e0a906269fa4e7bc9d9878925f0d859fb0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.