instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public MediaPackage addTrack(URI uri, MediaPackageElementFlavor flavor, MediaPackage mediaPackage)
throws IOException, IngestException {
String[] tags = null;
return this.addTrack(uri, flavor, tags, mediaPackage);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addTrack
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | addTrack | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | void fadeOutMenu() {
mMenuContainer.setAlpha(0f);
mSettingsButton.setAlpha(0f);
mDismissButton.setAlpha(0f);
mEnterSplitButton.setAlpha(0f);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fadeOutMenu
File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40123 | MEDIUM | 5.5 | android | fadeOutMenu | libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java | 7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isContentDirty()
{
return this.isContentDirty;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isContentDirty
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | isContentDirty | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasCustomScmCheckoutRetryCount(){
return scmCheckoutRetryCount != null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasCustomScmCheckoutRetryCount
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | hasCustomScmCheckoutRetryCount | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isOnlyCoreApps() {
return mOnlyCore;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOnlyCoreApps
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | isOnlyCoreApps | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasPgp() {
return xmppConnectionService.getPgpEngine() != null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasPgp
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | hasPgp | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | private void resetVerticalPanelPosition() {
setVerticalPanelTranslation(0f);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetVerticalPanelPosition
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | resetVerticalPanelPosition | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean minimizeApplication() {
Intent startMain = new Intent(Intent.ACTION_MAIN);
startMain.addCategory(Intent.CATEGORY_HOME);
startMain.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
startMain.putExtra("WaitForResult", Boolean.FALSE);
getContext().startActivity(s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: minimizeApplication
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | minimizeApplication | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public int size() {
if(accumulator != null) {
return accumulator.size() + NON_BODY_SIZE;
} else {
return payload.length + NON_BODY_SIZE;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: size
File: src/main/java/com/rabbitmq/client/impl/Frame.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | size | src/main/java/com/rabbitmq/client/impl/Frame.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private void stopProfilerLocked(ProcessRecord proc, int profileType) {
if (proc == null || proc == mProfileProc) {
proc = mProfileProc;
profileType = mProfileType;
clearProfilerLocked();
}
if (proc == null) {
return;
}
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopProfilerLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | stopProfilerLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public long[] getProcessPss(int[] pids) {
enforceNotIsolatedCaller("getProcessPss");
long[] pss = new long[pids.length];
for (int i=pids.length-1; i>=0; i--) {
ProcessRecord proc;
int oomAdj;
synchronized (this) {
synchronized (mP... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessPss
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getProcessPss | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private static void trimFilename(StringBuilder res, int maxBytes) {
byte[] raw = res.toString().getBytes(StandardCharsets.UTF_8);
if (raw.length > maxBytes) {
maxBytes -= 3;
while (raw.length > maxBytes) {
res.deleteCharAt(res.length() / 2);
raw = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimFilename
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35670 | HIGH | 7.8 | android | trimFilename | src/com/android/providers/media/util/FileUtils.java | db3c69afcb0a45c8aa2f333fcde36217889899fe | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder workerGroup(int numThreads) {
checkArgument(numThreads >= 0, "numThreads: %s (expected: >= 0)", numThreads);
workerGroup(EventLoopGroups.newEventLoopGroup(numThreads), true);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: workerGroup
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | workerGroup | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public void performEnableScreen() {
synchronized(mWindowMap) {
if (DEBUG_BOOT) Slog.i(TAG, "performEnableScreen: mDisplayEnabled=" + mDisplayEnabled
+ " mForceDisplayEnabled=" + mForceDisplayEnabled
+ " mShowingBootMessages=" + mShowingBootMessages
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: performEnableScreen
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | performEnableScreen | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public void scanAvailableAsecs() {
updateExternalMediaStatusInner(true, false, false);
if (mShouldRestoreconData) {
SELinuxMMAC.setRestoreconDone();
mShouldRestoreconData = false;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanAvailableAsecs
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | scanAvailableAsecs | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private List<DhcpOption> convertToInternalDhcpOptions(List<android.net.DhcpOption> options) {
List<DhcpOption> internalOptions = new ArrayList<DhcpOption>();
for (android.net.DhcpOption option : options) {
DhcpOption internalOption = new DhcpOption();
internalOption.type = option... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertToInternalDhcpOptions
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | convertToInternalDhcpOptions | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String render(XWikiContext context) throws XWikiException
{
XWikiException e = (XWikiException) context.get("exception");
if ((e != null) && (e.getCode() == XWikiException.ERROR_XWIKI_APP_DOCUMENT_NOT_EMPTY)) {
return "docalreadyexists";
}
if ("edit"... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: render
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | render | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java | 30c52b01559b8ef5ed1035dac7c34aaf805764d5 | 0 |
Analyze the following code function for security vulnerabilities | void removeWindowInnerLocked(WindowState win) {
removeWindowInnerLocked(win, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeWindowInnerLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | removeWindowInnerLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void reject(String callId, Session.Info info) throws RemoteException {
rejectedCallIds.add(callId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reject
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | reject | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addNewIncomingCall(PhoneAccountHandle phoneAccountHandle, Bundle extras) {
synchronized (mLock) {
Log.i(this, "Adding new incoming call with phoneAccountHandle %s",
phoneAccountHandle);
if (phoneAccountHandle != null && ph... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2016-0847
- Severity: HIGH
- CVSS Score: 7.2
Description: DO NOT MERGE Check PAH in addNewIncomingCall
Check to be sure that the PhoneAccountHandle in addNewIncomingCall
corresponds to an existing registered PhoneAccount in Telecom and that
the PhoneAccount is e... | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | addNewIncomingCall | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 1 |
Analyze the following code function for security vulnerabilities | @Override
protected Closeable getInnerCloseable() {
Closeable closer = builder()
.parallel(toString(), getServices())
.close(getIoSession())
.build();
closer.addCloseFutureListener(future -> clearAttributes());
return closer;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInnerCloseable
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | getInnerCloseable | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | public String getTitle() {
return title;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTitle
File: src/main/java/cn/luischen/model/ContentDomain.java
Repository: WinterChenS/my-site
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29638 | MEDIUM | 5.4 | WinterChenS/my-site | getTitle | src/main/java/cn/luischen/model/ContentDomain.java | d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.AssetDefinition assets(final String path, final Path basedir) {
return assets(path, new AssetHandler(basedir));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: assets
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | assets | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public void setRevocationReason(Integer revocationReason) {
this.revocationReason = revocationReason;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRevocationReason
File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setRevocationReason | base/common/src/main/java/com/netscape/certsrv/cert/CertData.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCreate(Bundle icicle) {
super.onCreate(icicle);
if (icicle != null) {
if (icicle.containsKey(SAVE_ADDING_USER)) {
mAddedUserId = icicle.getInt(SAVE_ADDING_USER);
}
if (icicle.containsKey(SAVE_REMOVING_USER)) {
... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2016-3889
- Severity: HIGH
- CVSS Score: 7.2
Description: Pre-setup restrictions
- Don't let user settings run
Bug: 29194585
Change-Id: Ia9c46c7ba04ce2809304bebe8a4c5cdac2108611
Function: onCreate
File: src/com/android/settings/users/UserSettings.java
Reposi... | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | onCreate | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 1 |
Analyze the following code function for security vulnerabilities | private void migrateAllLegacySettingsIfNeeded() {
synchronized (mLock) {
final int key = makeKey(SETTINGS_TYPE_GLOBAL, UserHandle.USER_SYSTEM);
File globalFile = getSettingsFile(key);
if (globalFile.exists()) {
return;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrateAllLegacySettingsIfNeeded
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | migrateAllLegacySettingsIfNeeded | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | public static String pathOffset(String path, RoutingContext context) {
final Route route = context.currentRoute();
// cannot make any assumptions
if (route == null) {
return path;
}
if (!route.isExactPath()) {
final String rest = context.pathParam("*");
if (rest != null) {
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2023-24815
- Severity: MEDIUM
- CVSS Score: 5.3
Description: Fix the webroot escape to classpath on windows
Signed-off-by: Paulo Lopes <pmlopes@gmail.com>
Function: pathOffset
File: vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java
Repository: vert-x3/ver... | [
"CWE-22"
] | CVE-2023-24815 | MEDIUM | 5.3 | vert-x3/vertx-web | pathOffset | vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java | 9e3a783b1d1a731055e9049078b1b1494ece9c15 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String getMySQLScript() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMySQLScript
File: dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-17542 | LOW | 3.5 | dotCMS/core | getMySQLScript | dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java | 782c342b660d359a71e190c8b5110bc651736591 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private T thisT() {
return (T) this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: thisT
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | thisT | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | void startCleaningPackages() {
// reader
synchronized (mPackages) {
if (!isExternalMediaAvailable()) {
return;
}
if (mSettings.mPackagesToBeCleaned.isEmpty()) {
return;
}
}
Intent intent = new Intent(PackageM... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startCleaningPackages
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | startCleaningPackages | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public void sendLockoutReset() {
if (mCallback != null) {
try {
mCallback.onLockoutReset(mHalDeviceId);
} catch (DeadObjectException e) {
Slog.w(TAG, "Death object while invoking onLockoutReset: ", e);
mHandler.post(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendLockoutReset
File: services/core/java/com/android/server/fingerprint/FingerprintService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | sendLockoutReset | services/core/java/com/android/server/fingerprint/FingerprintService.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected float getOverExpansionAmount() {
return mNotificationStackScroller.getCurrentOverScrollAmount(true /* top */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOverExpansionAmount
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getOverExpansionAmount | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public int getSpacePreferenceAsInt(String preference, XWikiContext context)
{
return Integer.parseInt(getSpacePreference(preference, context));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpacePreferenceAsInt
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getSpacePreferenceAsInt | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CBORReadContext getParsingContext() {
return _parsingContext;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParsingContext
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | getParsingContext | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | private String join(Map<CaseInsensitiveString, Boolean> pipelinesWithThisMaterial) {
if (pipelinesWithThisMaterial == null || pipelinesWithThisMaterial.isEmpty()) {
return "";
}
StringBuilder builder = new StringBuilder();
pipelinesWithThisMaterial.forEach((key, value) -> {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: join
File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | join | config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | AudioState getAudioState() {
return mCallAudioManager.getAudioState();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAudioState
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getAudioState | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
static String parseStringAttribute(TypedXmlPullParser parser, String attribute) {
return parser.getAttributeValue(null, attribute);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseStringAttribute
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | parseStringAttribute | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private void maybeInstallDevicePolicyManagementRoleHolderInUser(int targetUserId) {
String devicePolicyManagerRoleHolderPackageName =
getDevicePolicyManagementRoleHolderPackageName(mContext);
if (devicePolicyManagerRoleHolderPackageName == null) {
Slogf.d(LOG_TAG, "No device ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeInstallDevicePolicyManagementRoleHolderInUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | maybeInstallDevicePolicyManagementRoleHolderInUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public void setRestTemplate(RestTemplate restTemplate) {
this.restTemplate = restTemplate;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRestTemplate
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | setRestTemplate | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | private static <T> void checkCompatibleConfigs(String type, Config c1, Config c2, Map<String, T> configs1,
Map<String, T> configs2, ConfigChecker<T> checker) {
Set<String> configNames = new HashSet<String>(configs1.keySet());
configNames.addAll(configs2... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkCompatibleConfigs
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | checkCompatibleConfigs | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public TopLevelSettings getMainFragment() {
return mMainFragment;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMainFragment
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | getMainFragment | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(anyOf = {
android.Manifest.permission.GRANT_RUNTIME_PERMISSIONS,
android.Manifest.permission.REVOKE_RUNTIME_PERMISSIONS
})
//@SystemApi
public void updatePermissionFlags(@NonNull String packageName, @NonNull String permissionName,
@PackageManager.Permi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePermissionFlags
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | updatePermissionFlags | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | private void setKeyguardStatusViewVisibility(int statusBarState, boolean keyguardFadingAway,
boolean goingToFullShade) {
if ((!keyguardFadingAway && mStatusBarState == StatusBarState.KEYGUARD
&& statusBarState != StatusBarState.KEYGUARD) || goingToFullShade) {
mKeyguardSt... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyguardStatusViewVisibility
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setKeyguardStatusViewVisibility | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private void readUntilEndOfEntry() throws IOException {
if (endOfEntryBuffer == null) {
endOfEntryBuffer = new byte[512];
}
//noinspection StatementWithEmptyBody
while (read(endOfEntryBuffer) != -1);
this.entryEOFReached = true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readUntilEndOfEntry
File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | readUntilEndOfEntry | src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ValueInstantiator findValueInstantiator(DeserializationContext ctxt,
BeanDescription beanDesc)
throws JsonMappingException
{
final DeserializationConfig config = ctxt.getConfig();
ValueInstantiator instantiator = null;
// Check @JsonValueInstantiator... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findValueInstantiator
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | findValueInstantiator | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | protected void setRequestId(RequestId requestId) {
this.requestId = requestId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRequestId
File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setRequestId | base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected CompletableFuture<Optional<Integer>> internalGetMaxConsumersPerSubscription() {
return getTopicPoliciesAsyncWithRetry(topicName)
.thenApply(op -> op.map(TopicPolicies::getMaxConsumersPerSubscription));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGetMaxConsumersPerSubscription
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGetMaxConsumersPerSubscription | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public JobPropertyDescriptor getJobProperty(String shortClassName) {
// combining these two lines triggers javac bug. See issue #610.
Descriptor d = findDescriptor(shortClassName, JobPropertyDescriptor.all());
return (JobPropertyDescriptor) d;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJobProperty
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getJobProperty | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public KBTemplate fetchByGroupId_First(long groupId,
OrderByComparator<KBTemplate> orderByComparator) {
List<KBTemplate> list = findByGroupId(groupId, 0, 1, orderByComparator);
if (!list.isEmpty()) {
return list.get(0);
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fetchByGroupId_First
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
Repository: brianchandotcom/liferay-portal
... | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | fetchByGroupId_First | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 0 |
Analyze the following code function for security vulnerabilities | public int addAttachments(String fieldName) throws XWikiException
{
if (!hasAccessLevel("edit")) {
java.lang.Object[] args = { this.getFullName() };
throw new XWikiException(XWikiException.MODULE_XWIKI_ACCESS, XWikiException.ERROR_XWIKI_ACCESS_DENIED,
"Access denied i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addAttachments
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | addAttachments | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | protected void internalSetReplicatedSubscriptionStatus(AsyncResponse asyncResponse, String subName,
boolean authoritative, boolean enabled) {
log.info("[{}] Attempting to change replicated subscription status to {} - {} {}", clientAppId(), enabled,
topicName, subName);
// Re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalSetReplicatedSubscriptionStatus
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalSetReplicatedSubscriptionStatus | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isSchemaDefinitionInPublishList(CmsUUID publishHistoryId) {
if (m_cms == null) {
// CmsObject not available, assume there may be a schema definition in the publish history
return true;
}
try {
List<CmsPublishedResource> publishedResources = m_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSchemaDefinitionInPublishList
File: src/org/opencms/xml/CmsXmlEntityResolver.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3312 | MEDIUM | 4 | alkacon/opencms-core | isSchemaDefinitionInPublishList | src/org/opencms/xml/CmsXmlEntityResolver.java | 92e035423aa6967822d343e54392d4291648c0ee | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("GoodTime") // reading system time without TimeSource
public static void touch(File file) throws IOException {
checkNotNull(file);
if (!file.createNewFile() && !file.setLastModified(System.currentTimeMillis())) {
throw new IOException("Unable to update modification time of " + file);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: touch
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | touch | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onNetworkTemporarilyDisabled(WifiConfiguration config, int disableReason) {
if (disableReason == DISABLED_NO_INTERNET_TEMPORARY) return;
if (config.networkId == mTargetNetworkId || config.networkId == mLastNetworkId) {
// Disconnect and let autojoin ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onNetworkTemporarilyDisabled
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | onNetworkTemporarilyDisabled | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public void setVariable(String key, Object value) {
if (nativeVideo != null && Media.VARIABLE_NATIVE_CONTRLOLS_EMBEDDED.equals(key) && value instanceof Boolean) {
setNativeController((Boolean)value);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVariable
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setVariable | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private UIComponent createComponentApplyAnnotations(FacesContext ctx, String componentType, String rendererType, boolean applyAnnotations) {
UIComponent component;
try {
component = newThing(componentType, componentMap);
} catch (Exception ex) {
if (LOGGER.isLoggable(SEV... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createComponentApplyAnnotations
File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | createComponentApplyAnnotations | impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | public String getTsConfigFile() {
return tsConfigFile;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTsConfigFile
File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
Repository: pytorch/serve
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2023-43654 | CRITICAL | 9.8 | pytorch/serve | getTsConfigFile | frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java | 391bdec3348e30de173fbb7c7277970e0b53c8ad | 0 |
Analyze the following code function for security vulnerabilities | public JSONObject accumulate(String key, Object value) throws JSONException {
testValidity(value);
Object object = this.opt(key);
if (object == null) {
this.put(key,
value instanceof JSONArray ? new JSONArray().put(value)
: value);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: accumulate
File: src/main/java/org/json/JSONObject.java
Repository: stleary/JSON-java
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2023-5072 | HIGH | 7.5 | stleary/JSON-java | accumulate | src/main/java/org/json/JSONObject.java | 661114c50dcfd53bb041aab66f14bb91e0a87c8a | 0 |
Analyze the following code function for security vulnerabilities | private void getShortcutInfoAsync(
int launcherUserId, @NonNull String packageName, @NonNull String shortcutId,
int userId, @NonNull Consumer<ShortcutInfo> cb) {
Preconditions.checkStringNotEmpty(packageName, "packageName");
Preconditions.checkStringNotEmpty(short... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShortcutInfoAsync
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getShortcutInfoAsync | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public void removeGeoFencing(final String id) {
//Display.getInstance().scheduleBackgroundTask(new Runnable() {
Thread t = new Thread(new Runnable() {
@Override
public void run() {
//wait until the client is connected, otherwise the call to
//requ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeGeoFencing
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | removeGeoFencing | Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private String parseDN(String subject, String subjectAttributeName)
{
String temp = subject;
int begin = temp.toLowerCase().indexOf(
subjectAttributeName.toLowerCase());
temp = temp.substring(begin + subjectAttributeName.length());
int end = temp.indexOf(',');
if ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseDN
File: prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-295"
] | CVE-2023-33201 | MEDIUM | 5.3 | bcgit/bc-java | parseDN | prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java | e8c409a8389c815ea3fda5e8b94c92fdfe583bcc | 0 |
Analyze the following code function for security vulnerabilities | protected final Augmentations locationAugs() {
HTMLAugmentations augs = null;
if (fAugmentations) {
fLocationItem.setValues(fBeginLineNumber, fBeginColumnNumber,
fBeginCharacterOffset, fEndLineNumber,
fEndColumnNumber, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: locationAugs
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | locationAugs | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
String encoding = request.getHeader("Accept-Encoding");
boolean supportsGzip = (encoding != null && encoding.toLowerCase().indexOf("gzip") > -1);
SessionTerminal s... | Vulnerability Classification:
- CWE: CWE-287
- CVE: CVE-2014-0121
- Severity: HIGH
- CVSS Score: 7.5
Description: Ensure we secure hawtio-karaf-terminal's /term context
Function: doPost
File: hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java
Repository: hawtio
Fixed Code:
@Ov... | [
"CWE-287"
] | CVE-2014-0121 | HIGH | 7.5 | hawtio | doPost | hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java | 5289715e4f2657562fdddcbad830a30969b96e1e | 1 |
Analyze the following code function for security vulnerabilities | @GuardedBy("getLockObject()")
private void maybeResumeDeviceWideLoggingLocked() {
boolean allUsersAffiliated = areAllUsersAffiliatedWithDeviceLocked();
boolean orgOwnedProfileDevice = isOrganizationOwnedDeviceWithManagedProfile();
mInjector.binderWithCleanCallingIdentity(() -> {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeResumeDeviceWideLoggingLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | maybeResumeDeviceWideLoggingLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onPause() {
super.onPause();
mState = STATE_PAUSED;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPause
File: src/com/android/certinstaller/CertInstaller.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2422 | HIGH | 9.3 | android | onPause | src/com/android/certinstaller/CertInstaller.java | 70dde9870e9450e10418a32206ac1bb30f036b2c | 0 |
Analyze the following code function for security vulnerabilities | private ConsoleResult execute(CommandLine hgCmd) {
return runOrBomb(hgCmd);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: execute
File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2022-29184 | MEDIUM | 6.5 | gocd | execute | domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java | 37d35115db2ada2190173f9413cfe1bc6c295ecb | 0 |
Analyze the following code function for security vulnerabilities | public void setValidationScript(String validationScript)
{
getDoc().setValidationScript(validationScript);
updateAuthor();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValidationScript
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | setValidationScript | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onHeightUpdated(float expandedHeight) {
if (!mQsExpanded || mQsExpandImmediate || mIsExpanding && mQsExpandedWhenExpandingStarted) {
positionClockAndNotifications();
}
if (mQsExpandImmediate || mQsExpanded && !mQsTracking && mQsExpansionAnimator == null
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onHeightUpdated
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onHeightUpdated | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public String getURL(DocumentReference documentReference, String action, String queryString, String anchor,
XWikiContext context)
{
// We need to serialize the space reference because the old createURL() API doesn't accept a DocumentReference.
String spaces = getLocalStringEntityReferenceSer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURL
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getURL | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public SingleButtonPanel insertNewAjaxActionButton(final AjaxCallback ajaxCallback, final int position, final String label,
final String... classnames)
{
final SingleButtonPanel result = addNewAjaxActionButton(ajaxCallback, label, classnames);
this.actionButtons.add(position, result);
return result;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertNewAjaxActionButton
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | insertNewAjaxActionButton | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 0 |
Analyze the following code function for security vulnerabilities | private void registerBroadcastReceivers() {
IntentFilter userFilter = new IntentFilter();
userFilter.addAction(Intent.ACTION_USER_REMOVED);
userFilter.addAction(Intent.ACTION_USER_STOPPED);
getContext().registerReceiver(new BroadcastReceiver() {
@Override
public ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerBroadcastReceivers
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | registerBroadcastReceivers | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isNotificationPolicyAccessGrantedForPackage(String pkg) {;
enforceSystemOrSystemUIOrSamePackage(pkg,
"request policy access status for another package");
return checkPolicyAccess(pkg);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNotificationPolicyAccessGrantedForPackage
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | isNotificationPolicyAccessGrantedForPackage | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | void disconnectAllCalls() {
Log.v(this, "disconnectAllCalls");
for (Call call : mCalls) {
disconnectCall(call);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disconnectAllCalls
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | disconnectAllCalls | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | void removeStreamSink(int streamId) {
StreamHolder existing = currentStreams.get(streamId);
if(existing == null) {
return;
}
existing.sinkClosed = true;
existing.sinkChannel = null;
if(existing.sourceClosed) {
if(streamId % 2 == (isClient() ? 1 : 0... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeStreamSink
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | removeStreamSink | core/src/main/java/io/undertow/protocols/http2/Http2Channel.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 0 |
Analyze the following code function for security vulnerabilities | @Unstable
public void readTemporaryUploadedFiles(EditForm editForm)
{
getTemporaryAttachmentManager().attachTemporaryAttachmentsInDocument(this, editForm.getTemporaryUploadedFiles());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readTemporaryUploadedFiles
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2023-29523 | HIGH | 8.8 | xwiki/xwiki-platform | readTemporaryUploadedFiles | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | 0d547181389f7941e53291af940966413823f61c | 0 |
Analyze the following code function for security vulnerabilities | public static ByteBuffer directBuffer(long memoryAddress, int size) {
if (PlatformDependent0.hasDirectBufferNoCleanerConstructor()) {
return PlatformDependent0.newDirectBuffer(memoryAddress, size);
}
throw new UnsupportedOperationException(
"sun.misc.Unsafe or java.ni... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: directBuffer
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | directBuffer | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final InputSource inputSource, final boolean validate) {
return unmarshal(clazz, inputSource, null, validate, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | public void detachStack(int stackId) {
synchronized (mWindowMap) {
TaskStack stack = mStackIdToStack.get(stackId);
if (stack != null) {
final DisplayContent displayContent = stack.getDisplayContent();
if (displayContent != null) {
if (s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: detachStack
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | detachStack | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SerializationServiceBuilder setCheckClassDefErrors(boolean checkClassDefErrors) {
this.checkClassDefErrors = checkClassDefErrors;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCheckClassDefErrors
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | setCheckClassDefErrors | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public Builder setIdleConnectionInPoolTimeoutInMs(int idleConnectionInPoolTimeoutInMs) {
this.idleConnectionInPoolTimeoutInMs = idleConnectionInPoolTimeoutInMs;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setIdleConnectionInPoolTimeoutInMs
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | setIdleConnectionInPoolTimeoutInMs | api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | public Element toDOM(Document document) {
Element pdElement = document.createElement("policyDefault");
pdElement.setAttribute("id", name);
pdElement.setAttribute("classId", classId);
if (text != null) {
Element descriptionElement = document.createElement("description");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toDOM
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toDOM | base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public void cancel(String accountName) {
if (mCurrentUpload != null && mCurrentUpload.getUser().nameEquals(accountName)) {
mCurrentUpload.cancel(ResultCode.CANCELLED);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancel
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | cancel | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void deleteByPojoFailedConnection(TestContext context) throws FieldException {
createFoo(context).delete(Future.failedFuture("bad"), FOO, new SimplePojo(), context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteByPojoFailedConnection
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | deleteByPojoFailedConnection | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | private void appendChar( StringBuffer str, int value )
{
if ( value > Character.MAX_VALUE )
{
char[] chars = Character.toChars( value );
str.append( chars, 0, chars.length );
}
else
{
str.append( (char) value );
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: appendChar
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | appendChar | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | private void removeVersion() {
for (Iterator<NodeTuple> it = getValue().iterator(); it.hasNext();) {
ScalarNode keyNode = (ScalarNode) it.next().getKeyNode();
if (keyNode.getValue().equals("version"))
it.remove();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeVersion
File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-21249 | MEDIUM | 6.5 | theonedev/onedev | removeVersion | server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java | d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66 | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder text(String value); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: text
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | text | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract String getLocation(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocation
File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | getLocation | config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | public int getMaxKeyguardNotifications() {
return getMaxKeyguardNotifications(false /* recompute */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxKeyguardNotifications
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getMaxKeyguardNotifications | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setUserAgent(String userAgent) {
userAgent = userAgent;
addDefaultHeader("User-Agent", userAgent);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserAgent
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setUserAgent | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void beginFormat(WikiFormat format)
{
WikiParameters wikiParameters = new WikiParameters(format.getParams());
if (isMetaDataElement(wikiParameters)) {
getListener().beginMetaData(createMetaData(wikiParameters));
WikiParameters cleanParameters = cleanPara... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: beginFormat
File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/parser/xhtml/wikimodel/XHTMLXWikiGeneratorListener.java
Repository: xwiki/xwiki-rendering
The code fol... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | beginFormat | xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/parser/xhtml/wikimodel/XHTMLXWikiGeneratorListener.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isInvertFilter() {
return invertFilter;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isInvertFilter
File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-39309 | MEDIUM | 6.5 | gocd | isInvertFilter | domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java | 691b479f1310034992da141760e9c5d1f5b60e8a | 0 |
Analyze the following code function for security vulnerabilities | public List<? extends Post> getQuestions(Profile authUser, Profile showUser, boolean isMyProfile, Pager itemcount) {
if (utils.postsNeedApproval() && (isMyProfile || utils.isMod(authUser))) {
List<Question> qlist = new ArrayList<>();
Pager p = new Pager(itemcount.getPage(), itemcount.getLimit());
qlist.addAl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getQuestions
File: src/main/java/com/erudika/scoold/controllers/ProfileController.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getQuestions | src/main/java/com/erudika/scoold/controllers/ProfileController.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | protected void sendSync(String content) throws IOException {
try {
// FireFox posts a "loading" state twice as well.
this.changeState(ReadyState.LOADING, 0, null, null);
URLConnection c;
synchronized (this) {
c = this.connection;
}
c.setRequestProperty("User-Agent", this.context.getUserAgent());... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendSync
File: Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | sendSync | Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | protected void setDoubleQuotedArgumentEscaped( boolean doubleQuotedArgumentEscaped )
{
this.doubleQuotedArgumentEscaped = doubleQuotedArgumentEscaped;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDoubleQuotedArgumentEscaped
File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
Repository: codehaus-plexus/plexus-utils
The code follows secure coding practices. | [
"CWE-78"
] | CVE-2017-1000487 | HIGH | 7.5 | codehaus-plexus/plexus-utils | setDoubleQuotedArgumentEscaped | src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java | b38a1b3a4352303e4312b2bb601a0d7ec6e28f41 | 0 |
Analyze the following code function for security vulnerabilities | private void initializeVelocity() {
if (velocityEngine == null) {
velocityEngine = new VelocityEngine();
Properties props = new Properties();
props.setProperty(RuntimeConstants.RUNTIME_LOG, "startup_wizard_vel.log");
// Linux requires setting logging properties to initialize Velocity Context.
props... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-23612
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix bug
Function: initializeVelocity
File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java
Repository: openmrs/openmrs-core
Fixed Code:
private void initializeVelocity() {
if (velocityEng... | [
"CWE-22"
] | CVE-2022-23612 | MEDIUM | 5 | openmrs/openmrs-core | initializeVelocity | web/src/main/java/org/openmrs/web/filter/StartupFilter.java | db8454bf19a092a78d53ee4dba2af628b730a6e7 | 1 |
Analyze the following code function for security vulnerabilities | public static <T extends Describable<T>>
Map<Descriptor<T>,T> toMap(Iterable<T> describables) {
Map<Descriptor<T>,T> m = new LinkedHashMap<Descriptor<T>,T>();
for (T d : describables) {
m.put(d.getDescriptor(),d);
}
return m;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toMap
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | toMap | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public static void extractZip(File zipFile, File destDir) throws IOException
{
byte[] buffer = new byte[1024];
if (!destDir.exists())
destDir.mkdirs();
ZipInputStream zis = new ZipInputStream(new FileInputStream(zipFile));
ZipEntry ze = zis.getNextEntry();
try
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-4494
- Severity: CRITICAL
- CVSS Score: 9.8
Description: vuln-fix: Zip Slip Vulnerability
This fixes a Zip-Slip vulnerability.
This change does one of two things. This change either
1. Inserts a guard to protect against Zip Slip.
OR
2. Replaces `dir.getCan... | [
"CWE-22"
] | CVE-2022-4494 | CRITICAL | 9.8 | bspkrs/MCPMappingViewer | extractZip | src/main/java/bspkrs/mmv/RemoteZipHandler.java | 6e602746c96b4756c271d080dae7d22ad804a1bd | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isRotationDrawingSupported() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isRotationDrawingSupported
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isRotationDrawingSupported | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void setHidden(Boolean hidden)
{
if (hidden == null) {
this.hidden = false;
} else {
this.hidden = hidden;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHidden
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setHidden | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationWithTypeInfo04() throws Exception
{
Duration duration = Duration.ofSeconds(13498L, 8374);
String prefix = "[\"" + Duration.class.getName() + "\",";
ObjectMapper mapper = newMapper();
mapper.addMixIn(TemporalAmount.class, MockObjectConfigurat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDeserializationWithTypeInfo04
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practice... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationWithTypeInfo04 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.