instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
void sendContinueUserSwitchLocked(UserState uss, int oldUserId, int newUserId) { mCurUserSwitchCallback = null; mHandler.removeMessages(USER_SWITCH_TIMEOUT_MSG); mHandler.sendMessage(mHandler.obtainMessage(CONTINUE_USER_SWITCH_MSG, oldUserId, newUserId, uss)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendContinueUserSwitchLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
sendContinueUserSwitchLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
static int getLockTaskLaunchMode(ActivityInfo aInfo, @Nullable ActivityOptions options) { int lockTaskLaunchMode = aInfo.lockTaskLaunchMode; // Non-priv apps are not allowed to use always or never, fall back to default if (!aInfo.applicationInfo.isPrivilegedApp() && (lockTaskLaun...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockTaskLaunchMode File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getLockTaskLaunchMode
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public SCMCheckoutStrategy getScmCheckoutStrategy() { return scmCheckoutStrategy == null ? new DefaultSCMCheckoutStrategyImpl() : scmCheckoutStrategy; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getScmCheckoutStrategy File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getScmCheckoutStrategy
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public String getPicture() { return picture; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPicture File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getPicture
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
@Override public boolean processMessage(Message msg) { boolean isTurningOn= isTurningOn(); boolean isTurningOff = isTurningOff(); boolean isBleTurningOn = isBleTurningOn(); boolean isBleTurningOff = isBleTurningOff(); AdapterService adapterService = ...
Vulnerability Classification: - CWE: CWE-362, CWE-20 - CVE: CVE-2016-3760 - Severity: MEDIUM - CVSS Score: 5.4 Description: Add guest mode functionality (3/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving r...
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
processMessage
src/com/android/bluetooth/btservice/AdapterState.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
1
Analyze the following code function for security vulnerabilities
public boolean isWriteAheadLoggingEnabled() { return (mOpenFlags & ENABLE_WRITE_AHEAD_LOGGING) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWriteAheadLoggingEnabled File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
isWriteAheadLoggingEnabled
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
private boolean enterPublicInterface() { return recursionBreak.get().getAndIncrement() > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enterPublicInterface File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
enterPublicInterface
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
private String[] packagesToNames(List<PackageInfo> apps) { final int N = apps.size(); String[] names = new String[N]; for (int i = 0; i < N; i++) { names[i] = apps.get(i).packageName; } return names; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: packagesToNames File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
packagesToNames
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override public void promptUserOnPartialSigning() throws LaunchException { if (promptedForPartialSigning) { return; } promptedForPartialSigning = true; UnsignedAppletTrustConfirmation.checkPartiallySignedWithUserIfRequired(this, classLoader.file, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: promptUserOnPartialSigning File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
promptUserOnPartialSigning
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public void setVoiceKeepAwake(IVoiceInteractionSession session, boolean keepAwake) { synchronized (mGlobalLock) { if (mRunningVoice != null && mRunningVoice.asBinder() == session.asBinder()) { if (keepAwake) { mVoiceWakeLock.acquire(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVoiceKeepAwake File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
setVoiceKeepAwake
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@TestOnly public String currentRevision() { String[] args = new String[]{"log", "-1", "--pretty=format:%H"}; CommandLine gitCmd = gitWd().withArgs(args); return runOrBomb(gitCmd).outputAsString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: currentRevision File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
currentRevision
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
private static void listenerXmlGenerator(XmlGenerator gen, Config config) { if (config.getListenerConfigs().isEmpty()) { return; } gen.open("listeners"); for (ListenerConfig lc : config.getListenerConfigs()) { gen.node("listener", classNameOrImplClass(lc.getClassN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listenerXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
listenerXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
boolean isTaskOverlay() { return mTaskOverlay; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTaskOverlay File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isTaskOverlay
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public void onUEvent(UEventObserver.UEvent event) { setHdmiPlugged("1".equals(event.get("SWITCH_STATE"))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUEvent File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
onUEvent
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public byte[] verifyPassword(String password, long challenge, int userId) throws RequestThrottledException { throwIfCalledOnMainThread(); try { VerifyCredentialResponse response = getLockSettings().verifyPassword(password, challenge, userId); if (...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyPassword File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
verifyPassword
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Override public void onSupportActionModeStarted(ActionMode mode) { super.onSupportActionModeStarted(mode); ViewUtils.setStatusBarColor(this, R.color.action_mode_statusbar_color); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSupportActionModeStarted File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onSupportActionModeStarted
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder elementBefore(String name, String namespaceURI) { Element newElement = super.elementBeforeImpl(name, namespaceURI); return new XMLBuilder(newElement, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elementBefore File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
elementBefore
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public void addCompletionCallback(Runnable work, int priority) { validationList.add(work, priority); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCompletionCallback File: xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
addCompletionCallback
xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
boolean hasPkcs12KeyStore() { return mBundle.containsKey(KeyChain.EXTRA_PKCS12); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasPkcs12KeyStore File: src/com/android/certinstaller/CredentialHelper.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
hasPkcs12KeyStore
src/com/android/certinstaller/CredentialHelper.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("[ConnectionServiceWrapper componentName="); sb.append(mComponentName); sb.append("]"); return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
toString
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public synchronized void close() throws IOException { out.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: guava/src/com/google/common/io/FileBackedOutputStream.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
close
guava/src/com/google/common/io/FileBackedOutputStream.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public static TransformerFactory newInstance() { return TransformerFactory.newInstance(); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2018-1000651 - Severity: HIGH - CVSS Score: 7.5 Description: gh-813 Turn on secure processing feature for XML parsers etc Function: newInstance File: stroom-core-server/src/main/java/stroom/entity/server/util/TransformerFactoryFactory.java Repository: gchq/stroo...
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
newInstance
stroom-core-server/src/main/java/stroom/entity/server/util/TransformerFactoryFactory.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
1
Analyze the following code function for security vulnerabilities
protected void finalize() { cleanup(); if (TRACE_REF) { synchronized (AdapterService.class) { sRefCount--; debugLog("finalize() - REFCOUNT: FINALIZED. INSTANCE_COUNT= " + sRefCount); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalize File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
finalize
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public UIComponent createComponent(ValueExpression componentExpression, FacesContext context, String componentType) throws FacesException { notNull(COMPONENT_EXPRESSION, componentExpression); notNull(CONTEXT, context); notNull(COMPONENT_TYPE, componentType); return createComponentApply...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createComponent File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
createComponent
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
void onRefinementCanceled() { if (mRefinementResultReceiver != null) { mRefinementResultReceiver.destroy(); mRefinementResultReceiver = null; } finish(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRefinementCanceled File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
onRefinementCanceled
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
@Override public void setNotificationPolicyAccessGranted(String pkg, boolean granted) throws RemoteException { enforceSystemOrSystemUI("grant notification policy access"); final long identity = Binder.clearCallingIdentity(); try { synchronized ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNotificationPolicyAccessGranted File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
setNotificationPolicyAccessGranted
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public @UserOperationResult int startUserInBackground( @NonNull ComponentName admin, @NonNull UserHandle userHandle) { throwIfParentInstance("startUserInBackground"); try { return mService.startUserInBackground(admin, userHandle); } catch (RemoteException re) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startUserInBackground File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
startUserInBackground
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void enableAndSetActiveAdmin( @UserIdInt int userId, @UserIdInt int callingUserId, ComponentName adminComponent) { final String adminPackage = adminComponent.getPackageName(); enablePackage(adminPackage, callingUserId); setActiveAdmin(adminComponent, /* refreshing= */ true, u...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableAndSetActiveAdmin File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
enableAndSetActiveAdmin
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public static Path compile(String path, final Predicate... filters) { try { CharacterIndex ci = new CharacterIndex(path); ci.trim(); if(!( ci.charAt(0) == DOC_CONTEXT) && !( ci.charAt(0) == EVAL_CONTEXT)){ ci = new CharacterIndex("$." + path); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compile File: json-path/src/main/java/com/jayway/jsonpath/internal/path/PathCompiler.java Repository: json-path/JsonPath The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-51074
MEDIUM
5.3
json-path/JsonPath
compile
json-path/src/main/java/com/jayway/jsonpath/internal/path/PathCompiler.java
f49ff25e3bad8c8a0c853058181f2c00b5beb305
0
Analyze the following code function for security vulnerabilities
ActivityStarter setAllowPendingRemoteAnimationRegistryLookup(boolean allowLookup) { mRequest.allowPendingRemoteAnimationRegistryLookup = allowLookup; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowPendingRemoteAnimationRegistryLookup File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setAllowPendingRemoteAnimationRegistryLookup
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
public String getPkcs7CertChain() { return pkcs7CertChain; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPkcs7CertChain File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getPkcs7CertChain
base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
void setWillCloseOrEnterPip(boolean willCloseOrEnterPip) { mWillCloseOrEnterPip = willCloseOrEnterPip; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWillCloseOrEnterPip File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setWillCloseOrEnterPip
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public boolean onPrepareOptionsMenu(Menu menu) { boolean result = super.onPrepareOptionsMenu(menu); return mDataBusy ? false : result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPrepareOptionsMenu File: src/com/android/phone/settings/fdn/EditFdnContactScreen.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
onPrepareOptionsMenu
src/com/android/phone/settings/fdn/EditFdnContactScreen.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
@Override public MediaPackage addAttachment(InputStream in, String fileName, MediaPackageElementFlavor flavor, MediaPackage mediaPackage) throws IOException, IngestException { String[] tags = null; return addAttachment(in, fileName, flavor, tags, mediaPackage); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachment File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
addAttachment
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
Stream<PendingJavaScriptInvocation> getPendingJavaScriptInvocations() { return pendingJsInvocations.stream() .filter(invocation -> !invocation.isCanceled()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPendingJavaScriptInvocations File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getPendingJavaScriptInvocations
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
public ServerBuilder clientAddressTrustedProxyFilter( Predicate<? super InetAddress> clientAddressTrustedProxyFilter) { this.clientAddressTrustedProxyFilter = requireNonNull(clientAddressTrustedProxyFilter, "clientAddressTrustedProxyFilter"); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clientAddressTrustedProxyFilter File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
clientAddressTrustedProxyFilter
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public void setAllowContainsSearches(boolean theAllowContainsSearches) { this.myModelConfig.setAllowContainsSearches(theAllowContainsSearches); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowContainsSearches File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setAllowContainsSearches
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public List<Path> getImsmanifestFiles() { return imsmanifestFiles; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImsmanifestFiles File: src/main/java/org/olat/ims/qti21/pool/QTI21ImportProcessor.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
getImsmanifestFiles
src/main/java/org/olat/ims/qti21/pool/QTI21ImportProcessor.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
public void handleCompleteInboundCommand(AMQCommand command) throws IOException { // First, offer the command to the asynchronous-command // handling mechanism, which gets to act as a filter on the // incoming command stream. If processAsync() returns true, // the command has been dealt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleCompleteInboundCommand File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
handleCompleteInboundCommand
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
protected CellState getCellState() { return cellState; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCellState File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getCellState
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public boolean copyDocument(DocumentReference sourceDocumentReference, DocumentReference targetDocumentReference, XWikiContext context) throws XWikiException { return copyDocument(sourceDocumentReference, targetDocumentReference, null, true, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
copyDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private void removeUriPermissionsForPackageLocked( String packageName, int userHandle, boolean persistable, boolean targetOnly) { if (userHandle == UserHandle.USER_ALL && packageName == null) { throw new IllegalArgumentException("Must narrow by either package or us...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUriPermissionsForPackageLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
removeUriPermissionsForPackageLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void setDefaults(Map<String, Key> keys, Entity pc) { if (keys.isEmpty()) return; for (Key key : keys.values()) { if (key.defaultValue!=null) pc.setProperty(key.nameOrId,key.defaultValue); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDefaults File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
setDefaults
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
public void setVolumeManager(final VolumeManager volumeManager) { this.volumeManager = volumeManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVolumeManager File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2022-23596
MEDIUM
5
junrar
setVolumeManager
src/main/java/com/github/junrar/Archive.java
7b16b3d90b91445fd6af0adfed22c07413d4fab7
0
Analyze the following code function for security vulnerabilities
@Override public boolean setApplicationHidden(ComponentName who, String callerPackage, String packageName, boolean hidden, boolean parent) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApplicationHidden File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setApplicationHidden
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public Boolean lockUsers(Integer[] ids, int lockStatus) { if (ids.length < 1) { return false; } return mallUserMapper.lockUserBatch(ids, lockStatus) > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lockUsers File: src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java Repository: newbee-ltd/newbee-mall The code follows secure coding practices.
[ "CWE-639" ]
CVE-2023-30216
MEDIUM
5.4
newbee-ltd/newbee-mall
lockUsers
src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java
4f8948579ddd6843a2e313fdd55aafc809246f63
0
Analyze the following code function for security vulnerabilities
protected ID findRepeatedRecordId(Field[] repeatFields, Record data) { Map<String, Object> wheres = new HashMap<>(); for (Field c : repeatFields) { String cName = c.getName(); if (data.hasValue(cName)) { wheres.put(cName, data.getObjectValue(cName)); }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findRepeatedRecordId File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
findRepeatedRecordId
src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
d0de4cc35303168f44ca57712c824b5cb9525e54
0
Analyze the following code function for security vulnerabilities
public static byte[] compress(String s, String encoding) throws UnsupportedEncodingException, IOException { byte[] data = s.getBytes(encoding); return compress(data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
compress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private UriPermission findUriPermissionLocked(int targetUid, GrantUri grantUri) { final ArrayMap<GrantUri, UriPermission> targetUris = mGrantedUriPermissions.get(targetUid); if (targetUris != null) { return targetUris.get(grantUri); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findUriPermissionLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
findUriPermissionLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private VerifyCredentialResponse doVerifyPattern(String pattern, boolean hasChallenge, long challenge, int userId) throws RemoteException { checkPasswordReadPermission(userId); CredentialHash storedHash = mStorage.readPatternHash(userId); return doVerifyPattern(pattern, storedHash, hasC...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3908 - Severity: MEDIUM - CVSS Score: 4.3 Description: Fix vulnerability in LockSettings service Fixes bug 30003944 Change-Id: I8700d4424c6186c8d5e71d2fdede0223ad86904d (cherry picked from commit 2d71384a139ae27cbc7b57f06662bf6ee2010f2b) Function: doVeri...
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
doVerifyPattern
services/core/java/com/android/server/LockSettingsService.java
96daf7d4893f614714761af2d53dfb93214a32e4
1
Analyze the following code function for security vulnerabilities
public void setManagedProfileCallerIdAccessPolicy(@Nullable PackagePolicy policy) { throwIfParentInstance("setManagedProfileCallerIdAccessPolicy"); if (mService != null) { try { mService.setManagedProfileCallerIdAccessPolicy(policy); } catch (RemoteException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManagedProfileCallerIdAccessPolicy File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setManagedProfileCallerIdAccessPolicy
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void handleNotObscuredLocked(final WindowState w, final int innerDw, final int innerDh) { final WindowManager.LayoutParams attrs = w.mAttrs; final int attrFlags = attrs.flags; final boolean canBeSeen = w.isDisplayedLw(); final boolean opaqueDrawn = canBeSeen && w.isOp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleNotObscuredLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
handleNotObscuredLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void notifyNetworkPolicyRulesUpdated(int uid, long procStateSeq) { if (DEBUG_NETWORK) { Slog.d(TAG_NETWORK, "Got update from NPMS for uid: " + uid + " seq: " + procStateSeq); } UidRecord record; synchronized...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyNetworkPolicyRulesUpdated File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
notifyNetworkPolicyRulesUpdated
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public double getBodyRowHeight() { return getState(false).bodyRowHeight; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBodyRowHeight File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getBodyRowHeight
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public void setPublicId(String pubId) { fPublicId = pubId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPublicId File: ext/java/nokogiri/XmlSchema.java Repository: sparklemotion/nokogiri The code follows secure coding practices.
[ "CWE-611" ]
CVE-2020-26247
MEDIUM
4
sparklemotion/nokogiri
setPublicId
ext/java/nokogiri/XmlSchema.java
9c87439d9afa14a365ff13e73adc809cb2c3d97b
0
Analyze the following code function for security vulnerabilities
public BigInteger getBigInteger(String key) throws JSONException { Object object = this.get(key); BigInteger ret = objectToBigInteger(object, null); if (ret != null) { return ret; } throw wrongValueFormatException(key, "BigInteger", object, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBigInteger File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
getBigInteger
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public Builder port(ClickHouseProtocol protocol) { return port(protocol, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: port File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
port
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
public DocumentReference getAuthorReference() { return this.doc.getAuthorReference(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthorReference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getAuthorReference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public List<String> getPermittedCrossProfileNotificationListeners(ComponentName who) { if (!mHasFeature) { return null; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); synchronized (getLockOb...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermittedCrossProfileNotificationListeners File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPermittedCrossProfileNotificationListeners
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public String getSelectSQL(Select select) { StringBuilder clause = new StringBuilder(); clause.append(getSelectStatement(select)); clause.append(" "); if (select.getColumns().isEmpty()) { clause.append("*"); } else { boolean first = true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSelectSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getSelectSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition after(final String method, final String pattern, final Route.After handler) { return appendDefinition(method, pattern, handler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: after File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
after
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public StandardTemplateParams textViewId(int textViewId) { mTextViewId = textViewId; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: textViewId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
textViewId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
void getBounds(Point bounds) { mDisplay.getDisplayInfo(mDisplayInfo); bounds.x = mDisplayInfo.appWidth; bounds.y = mDisplayInfo.appHeight; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBounds File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
getBounds
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override public TaskSnapshot getTaskSnapshotBlocking( int taskId, boolean isLowResolution) { return ActivityTaskManagerService.this.getTaskSnapshot(taskId, isLowResolution); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTaskSnapshotBlocking File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getTaskSnapshotBlocking
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private static void writeTrustRootCerts(Parcel dest, Map<String, byte[]> trustRootCerts) { if (trustRootCerts == null) { dest.writeInt(NULL_VALUE); return; } dest.writeInt(trustRootCerts.size()); for (Map.Entry<String, byte[]> entry : trustRootCerts.entrySet()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeTrustRootCerts File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
writeTrustRootCerts
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "4.3M1") public String getRealLanguage(XWikiContext context) throws XWikiException { return getRealLanguage(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRealLanguage File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getRealLanguage
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
private void flingQsWithCurrentVelocity(float y, boolean isCancelMotionEvent) { float vel = getCurrentQSVelocity(); final boolean expandsQs = flingExpandsQs(vel); if (expandsQs) { logQsSwipeDown(y); } flingSettings(vel, expandsQs && !isCancelMotionEvent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flingQsWithCurrentVelocity File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
flingQsWithCurrentVelocity
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Nullable String getDefaultLauncher(@UserIdInt int userId) { final long start = getStatStartTime(); final long token = injectClearCallingIdentity(); try { synchronized (mLock) { throwIfUserLockedL(userId); final ShortcutUser user = getUserShortcut...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultLauncher File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getDefaultLauncher
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Deprecated public static void removeExclude(String URLPattern) { // not needed anymore }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeExclude File: dotCMS/src/main/java/com/dotmarketing/filters/CMSFilter.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
removeExclude
dotCMS/src/main/java/com/dotmarketing/filters/CMSFilter.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
@Override boolean check(RingbufferConfig c1, RingbufferConfig c2) { return c1 == c2 || !(c1 == null || c2 == null) && nullSafeEqual(c1.getName(), c2.getName()) && nullSafeEqual(c1.getBackupCount(), c2.getBackupCount()) && nullSafeEqual(c1.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
protected Http2ConnectionEncoder encoder() { return encoder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encoder File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java Repository: netty The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
netty
encoder
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
58f75f665aa81a8cbcf6ffa74820042a285c5e61
0
Analyze the following code function for security vulnerabilities
public long getXWikiPreferenceAsLong(String preference, String fallbackParameter, long defaultValue, XWikiContext context) { return NumberUtils.toLong(getXWikiPreference(preference, fallbackParameter, "", context), defaultValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXWikiPreferenceAsLong File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getXWikiPreferenceAsLong
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void doPost(HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException { process(request, response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doPost File: src/share/org/apache/struts/action/ActionServlet.java Repository: kawasima/struts1-forever The code follows secure coding practices.
[ "CWE-Other", "CWE-20" ]
CVE-2016-1181
MEDIUM
6.8
kawasima/struts1-forever
doPost
src/share/org/apache/struts/action/ActionServlet.java
eda3a79907ed8fcb0387a0496d0cb14332f250e8
0
Analyze the following code function for security vulnerabilities
boolean canReceiveTouchInput() { if (mActivityRecord == null || mActivityRecord.getTask() == null) { return true; } return !mActivityRecord.getTask().getRootTask().shouldIgnoreInput() && mActivityRecord.mVisibleRequested; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canReceiveTouchInput File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
canReceiveTouchInput
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public String getBaseBinURL() { return getBaseBinURL(this.currentWiki); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseBinURL File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getBaseBinURL
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
final void scheduleIdleLocked() { mHandler.sendEmptyMessage(IDLE_NOW_MSG); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleIdleLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
scheduleIdleLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public void reloadCountNumbersOfSlidingPaneAdapter() { NewsReaderListFragment nlf = getSlidingListFragment(); if (nlf != null) { nlf.ListViewNotifyDataSetChanged(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reloadCountNumbersOfSlidingPaneAdapter File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
reloadCountNumbersOfSlidingPaneAdapter
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
public void addImmutableType(Class type) { addImmutableType(type, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addImmutableType File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
addImmutableType
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
protected String compileLess(String less) { String css = ""; try { css = lessEngine.compile(less); } catch(Exception e) { LogUtil.error(this.getClass().getName(), e, "Error compiling LESS"); LogUtil.debug(this.getClass().getName(), "LESS: " + less); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compileLess File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
compileLess
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
@Override public Document build(final InputStream in, final String systemId) throws JDOMException, IOException { try { return getEngine().build(in, systemId); } finally { if (!reuseParser) { engine = null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build File: core/src/java/org/jdom2/input/SAXBuilder.java Repository: hunterhacker/jdom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33813
MEDIUM
5
hunterhacker/jdom
build
core/src/java/org/jdom2/input/SAXBuilder.java
bd3ab78370098491911d7fe9d7a43b97144a234e
0
Analyze the following code function for security vulnerabilities
public boolean removeStanzaAcknowledgedListener(StanzaListener listener) { return stanzaAcknowledgedListeners.remove(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStanzaAcknowledgedListener File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
removeStanzaAcknowledgedListener
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(final Object obj) { RouteKey that = (RouteKey) obj; return key.equals(that.key); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-15477
MEDIUM
4.3
jooby-project/jooby
equals
jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java
34856a738829d8fedca4ed27bd6ff413af87186f
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting Supplier<ActionTransition> createShareAction(Context context, Resources r, Uri uri) { return () -> { ActionTransition transition = mSharedElementTransition.get(); // Note: Both the share and edit actions are proxied through ActionProxyReceiver in // or...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createShareAction File: packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35676
HIGH
7.8
android
createShareAction
packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
109e58b62dc9fedcee93983678ef9d4931e72afa
0
Analyze the following code function for security vulnerabilities
static final void indent(Writer writer, int indent) throws IOException { for (int i = 0; i < indent; i += 1) { writer.write(' '); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: indent File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
indent
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public static void addFileToZip(String path, String srcFile, ZipOutputStream zip, String ignore) throws Exception { File folder = new File(srcFile); if (folder.isDirectory()) { addFolderToZip(path, srcFile, zip, ignore); } else { byte[] buf = new byte[1024]; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addFileToZip File: src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java Repository: Konloch/bytecode-viewer The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-21675
MEDIUM
6.8
Konloch/bytecode-viewer
addFileToZip
src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java
1ec02658fe6858162f5e6a24f97928de6696c5cb
0
Analyze the following code function for security vulnerabilities
Integer getUserByOrgCodeTotal(@Param("orgCode") String orgCode, @Param("userParams") SysUser userParams);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByOrgCodeTotal File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByOrgCodeTotal
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public static int getOffsetAfterScheme(String uri) { Matcher m = uriSchemePattern.matcher(uri); if (m.matches()) { return m.group(1).length(); } return -1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOffsetAfterScheme File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
getOffsetAfterScheme
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
public int getPackageScreenCompatMode(String packageName) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageScreenCompatMode File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getPackageScreenCompatMode
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
static void assertIsInserted(long instanceId) { Assert.assertThat("Not inserted", instanceId, is(not(NOT_PERSISTED))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assertIsInserted File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
assertIsInserted
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
protected NotificationData.Entry createNotificationViews(StatusBarNotification sbn) throws InflationException { if (DEBUG) { Log.d(TAG, "createNotificationViews(notification=" + sbn); } NotificationData.Entry entry = new NotificationData.Entry(sbn); Dependency.get...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNotificationViews File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
createNotificationViews
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private static void handle(CompletableFuture<?> future, AsyncMethodCallback resultHandler) { future.handle((res, cause) -> { if (cause != null) { resultHandler.onError(convert(cause)); } else { resultHandler.onComplete(res); } retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handle File: server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java Repository: line/centraldogma The code follows secure coding practices.
[ "CWE-862" ]
CVE-2021-38388
MEDIUM
6.5
line/centraldogma
handle
server/src/main/java/com/linecorp/centraldogma/server/internal/thrift/CentralDogmaServiceImpl.java
e83b558ef9eaa44f71b7d9236bdec9f68c85b8bd
0
Analyze the following code function for security vulnerabilities
public void onPatternCellAdded(List<Cell> pattern) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPatternCellAdded File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onPatternCellAdded
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public AwTestContainerView createDetachedAwTestContainerView( final AwContentsClient awContentsClient) { return createDetachedAwTestContainerView(awContentsClient, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDetachedAwTestContainerView File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5155
MEDIUM
4.3
chromium
createDetachedAwTestContainerView
android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6
0
Analyze the following code function for security vulnerabilities
public void processStreamAndScheduleJobs(InputStream stream, String systemId, Scheduler sched) throws ValidationException, ParserConfigurationException, SAXException, XPathException, IOException, SchedulerException, ClassNotFoundException, ParseException { prepForProcessing(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processStreamAndScheduleJobs File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
processStreamAndScheduleJobs
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
final void logAppTooSlow(ProcessRecord app, long startTime, String msg) { if (true || IS_USER_BUILD) { return; } String tracesPath = SystemProperties.get("dalvik.vm.stack-trace-file", null); if (tracesPath == null || tracesPath.length() == 0) { return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logAppTooSlow File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
logAppTooSlow
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public String getDeviceSvn() { return getDeviceSvnUsingSubId(getDefaultSubscription()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceSvn File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getDeviceSvn
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
private Account renameAccountInternal( UserAccounts accounts, Account accountToRename, String newName) { Account resultAccount = null; /* * Cancel existing notifications. Let authenticators * re-post notifications as required. But we don't know if * the authenticat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameAccountInternal File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
renameAccountInternal
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public Builder address(InetSocketAddress address) { return address(null, address); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: address File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
address
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
public Set<String> getIncludeFields() { Assert.notNull(includeFields, "Calls #toSqlWhere first"); return includeFields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIncludeFields File: src/main/java/com/rebuild/core/service/query/AdvFilterParser.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
getIncludeFields
src/main/java/com/rebuild/core/service/query/AdvFilterParser.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
public Iterator<String> getValidatorIds() { return validatorMap.keySet().iterator(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValidatorIds File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getValidatorIds
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0