instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public MediaPackage addTrack(URI uri, MediaPackageElementFlavor flavor, MediaPackage mediaPackage) throws IOException, IngestException { String[] tags = null; return this.addTrack(uri, flavor, tags, mediaPackage); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addTrack File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
addTrack
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
void fadeOutMenu() { mMenuContainer.setAlpha(0f); mSettingsButton.setAlpha(0f); mDismissButton.setAlpha(0f); mEnterSplitButton.setAlpha(0f); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fadeOutMenu File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40123
MEDIUM
5.5
android
fadeOutMenu
libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
7212a4bec2d2f1a74fa54a12a04255d6a183baa9
0
Analyze the following code function for security vulnerabilities
public boolean isContentDirty() { return this.isContentDirty; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isContentDirty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
isContentDirty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public boolean hasCustomScmCheckoutRetryCount(){ return scmCheckoutRetryCount != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasCustomScmCheckoutRetryCount File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
hasCustomScmCheckoutRetryCount
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public boolean isOnlyCoreApps() { return mOnlyCore; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOnlyCoreApps File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isOnlyCoreApps
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public boolean hasPgp() { return xmppConnectionService.getPgpEngine() != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasPgp File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
hasPgp
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
private void resetVerticalPanelPosition() { setVerticalPanelTranslation(0f); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetVerticalPanelPosition File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
resetVerticalPanelPosition
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public boolean minimizeApplication() { Intent startMain = new Intent(Intent.ACTION_MAIN); startMain.addCategory(Intent.CATEGORY_HOME); startMain.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); startMain.putExtra("WaitForResult", Boolean.FALSE); getContext().startActivity(s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: minimizeApplication File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
minimizeApplication
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public int size() { if(accumulator != null) { return accumulator.size() + NON_BODY_SIZE; } else { return payload.length + NON_BODY_SIZE; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: size File: src/main/java/com/rabbitmq/client/impl/Frame.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
size
src/main/java/com/rabbitmq/client/impl/Frame.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
private void stopProfilerLocked(ProcessRecord proc, int profileType) { if (proc == null || proc == mProfileProc) { proc = mProfileProc; profileType = mProfileType; clearProfilerLocked(); } if (proc == null) { return; } try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopProfilerLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stopProfilerLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public long[] getProcessPss(int[] pids) { enforceNotIsolatedCaller("getProcessPss"); long[] pss = new long[pids.length]; for (int i=pids.length-1; i>=0; i--) { ProcessRecord proc; int oomAdj; synchronized (this) { synchronized (mP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessPss File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getProcessPss
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static void trimFilename(StringBuilder res, int maxBytes) { byte[] raw = res.toString().getBytes(StandardCharsets.UTF_8); if (raw.length > maxBytes) { maxBytes -= 3; while (raw.length > maxBytes) { res.deleteCharAt(res.length() / 2); raw = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trimFilename File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
trimFilename
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public ServerBuilder workerGroup(int numThreads) { checkArgument(numThreads >= 0, "numThreads: %s (expected: >= 0)", numThreads); workerGroup(EventLoopGroups.newEventLoopGroup(numThreads), true); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: workerGroup File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
workerGroup
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public void performEnableScreen() { synchronized(mWindowMap) { if (DEBUG_BOOT) Slog.i(TAG, "performEnableScreen: mDisplayEnabled=" + mDisplayEnabled + " mForceDisplayEnabled=" + mForceDisplayEnabled + " mShowingBootMessages=" + mShowingBootMessages ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performEnableScreen File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
performEnableScreen
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public void scanAvailableAsecs() { updateExternalMediaStatusInner(true, false, false); if (mShouldRestoreconData) { SELinuxMMAC.setRestoreconDone(); mShouldRestoreconData = false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanAvailableAsecs File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
scanAvailableAsecs
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private List<DhcpOption> convertToInternalDhcpOptions(List<android.net.DhcpOption> options) { List<DhcpOption> internalOptions = new ArrayList<DhcpOption>(); for (android.net.DhcpOption option : options) { DhcpOption internalOption = new DhcpOption(); internalOption.type = option...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToInternalDhcpOptions File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
convertToInternalDhcpOptions
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public String render(XWikiContext context) throws XWikiException { XWikiException e = (XWikiException) context.get("exception"); if ((e != null) && (e.getCode() == XWikiException.ERROR_XWIKI_APP_DOCUMENT_NOT_EMPTY)) { return "docalreadyexists"; } if ("edit"...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: render File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
render
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
30c52b01559b8ef5ed1035dac7c34aaf805764d5
0
Analyze the following code function for security vulnerabilities
void removeWindowInnerLocked(WindowState win) { removeWindowInnerLocked(win, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeWindowInnerLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
removeWindowInnerLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void reject(String callId, Session.Info info) throws RemoteException { rejectedCallIds.add(callId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reject File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
reject
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public void addNewIncomingCall(PhoneAccountHandle phoneAccountHandle, Bundle extras) { synchronized (mLock) { Log.i(this, "Adding new incoming call with phoneAccountHandle %s", phoneAccountHandle); if (phoneAccountHandle != null && ph...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-0847 - Severity: HIGH - CVSS Score: 7.2 Description: DO NOT MERGE Check PAH in addNewIncomingCall Check to be sure that the PhoneAccountHandle in addNewIncomingCall corresponds to an existing registered PhoneAccount in Telecom and that the PhoneAccount is e...
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
addNewIncomingCall
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
1
Analyze the following code function for security vulnerabilities
@Override protected Closeable getInnerCloseable() { Closeable closer = builder() .parallel(toString(), getServices()) .close(getIoSession()) .build(); closer.addCloseFutureListener(future -> clearAttributes()); return closer; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInnerCloseable File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
getInnerCloseable
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
public String getTitle() { return title; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTitle File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
getTitle
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
@Override public Route.AssetDefinition assets(final String path, final Path basedir) { return assets(path, new AssetHandler(basedir)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assets File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
assets
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void setRevocationReason(Integer revocationReason) { this.revocationReason = revocationReason; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRevocationReason File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setRevocationReason
base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void onCreate(Bundle icicle) { super.onCreate(icicle); if (icicle != null) { if (icicle.containsKey(SAVE_ADDING_USER)) { mAddedUserId = icicle.getInt(SAVE_ADDING_USER); } if (icicle.containsKey(SAVE_REMOVING_USER)) { ...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3889 - Severity: HIGH - CVSS Score: 7.2 Description: Pre-setup restrictions - Don't let user settings run Bug: 29194585 Change-Id: Ia9c46c7ba04ce2809304bebe8a4c5cdac2108611 Function: onCreate File: src/com/android/settings/users/UserSettings.java Reposi...
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
onCreate
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
1
Analyze the following code function for security vulnerabilities
private void migrateAllLegacySettingsIfNeeded() { synchronized (mLock) { final int key = makeKey(SETTINGS_TYPE_GLOBAL, UserHandle.USER_SYSTEM); File globalFile = getSettingsFile(key); if (globalFile.exists()) { return; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateAllLegacySettingsIfNeeded File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
migrateAllLegacySettingsIfNeeded
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
public static String pathOffset(String path, RoutingContext context) { final Route route = context.currentRoute(); // cannot make any assumptions if (route == null) { return path; } if (!route.isExactPath()) { final String rest = context.pathParam("*"); if (rest != null) { ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2023-24815 - Severity: MEDIUM - CVSS Score: 5.3 Description: Fix the webroot escape to classpath on windows Signed-off-by: Paulo Lopes <pmlopes@gmail.com> Function: pathOffset File: vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java Repository: vert-x3/ver...
[ "CWE-22" ]
CVE-2023-24815
MEDIUM
5.3
vert-x3/vertx-web
pathOffset
vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java
9e3a783b1d1a731055e9049078b1b1494ece9c15
1
Analyze the following code function for security vulnerabilities
@Override public String getMySQLScript() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMySQLScript File: dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-17542
LOW
3.5
dotCMS/core
getMySQLScript
dotCMS/src/main/java/com/dotmarketing/startup/runonce/Task05165CreateContentTypeWorkflowActionMappingTable.java
782c342b660d359a71e190c8b5110bc651736591
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private T thisT() { return (T) this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: thisT File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
thisT
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
void startCleaningPackages() { // reader synchronized (mPackages) { if (!isExternalMediaAvailable()) { return; } if (mSettings.mPackagesToBeCleaned.isEmpty()) { return; } } Intent intent = new Intent(PackageM...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startCleaningPackages File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
startCleaningPackages
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void sendLockoutReset() { if (mCallback != null) { try { mCallback.onLockoutReset(mHalDeviceId); } catch (DeadObjectException e) { Slog.w(TAG, "Death object while invoking onLockoutReset: ", e); mHandler.post(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendLockoutReset File: services/core/java/com/android/server/fingerprint/FingerprintService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
sendLockoutReset
services/core/java/com/android/server/fingerprint/FingerprintService.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override protected float getOverExpansionAmount() { return mNotificationStackScroller.getCurrentOverScrollAmount(true /* top */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOverExpansionAmount File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getOverExpansionAmount
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public int getSpacePreferenceAsInt(String preference, XWikiContext context) { return Integer.parseInt(getSpacePreference(preference, context)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSpacePreferenceAsInt File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getSpacePreferenceAsInt
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public CBORReadContext getParsingContext() { return _parsingContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParsingContext File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
getParsingContext
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
private String join(Map<CaseInsensitiveString, Boolean> pipelinesWithThisMaterial) { if (pipelinesWithThisMaterial == null || pipelinesWithThisMaterial.isEmpty()) { return ""; } StringBuilder builder = new StringBuilder(); pipelinesWithThisMaterial.forEach((key, value) -> { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: join File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
join
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
AudioState getAudioState() { return mCallAudioManager.getAudioState(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAudioState File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getAudioState
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Nullable static String parseStringAttribute(TypedXmlPullParser parser, String attribute) { return parser.getAttributeValue(null, attribute); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseStringAttribute File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
parseStringAttribute
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void maybeInstallDevicePolicyManagementRoleHolderInUser(int targetUserId) { String devicePolicyManagerRoleHolderPackageName = getDevicePolicyManagementRoleHolderPackageName(mContext); if (devicePolicyManagerRoleHolderPackageName == null) { Slogf.d(LOG_TAG, "No device ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeInstallDevicePolicyManagementRoleHolderInUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
maybeInstallDevicePolicyManagementRoleHolderInUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setRestTemplate(RestTemplate restTemplate) { this.restTemplate = restTemplate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRestTemplate File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setRestTemplate
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
private static <T> void checkCompatibleConfigs(String type, Config c1, Config c2, Map<String, T> configs1, Map<String, T> configs2, ConfigChecker<T> checker) { Set<String> configNames = new HashSet<String>(configs1.keySet()); configNames.addAll(configs2...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkCompatibleConfigs File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
checkCompatibleConfigs
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public TopLevelSettings getMainFragment() { return mMainFragment; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMainFragment File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
getMainFragment
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(anyOf = { android.Manifest.permission.GRANT_RUNTIME_PERMISSIONS, android.Manifest.permission.REVOKE_RUNTIME_PERMISSIONS }) //@SystemApi public void updatePermissionFlags(@NonNull String packageName, @NonNull String permissionName, @PackageManager.Permi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updatePermissionFlags File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
updatePermissionFlags
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
private void setKeyguardStatusViewVisibility(int statusBarState, boolean keyguardFadingAway, boolean goingToFullShade) { if ((!keyguardFadingAway && mStatusBarState == StatusBarState.KEYGUARD && statusBarState != StatusBarState.KEYGUARD) || goingToFullShade) { mKeyguardSt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyguardStatusViewVisibility File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setKeyguardStatusViewVisibility
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private void readUntilEndOfEntry() throws IOException { if (endOfEntryBuffer == null) { endOfEntryBuffer = new byte[512]; } //noinspection StatementWithEmptyBody while (read(endOfEntryBuffer) != -1); this.entryEOFReached = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readUntilEndOfEntry File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
readUntilEndOfEntry
src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
@Override public ValueInstantiator findValueInstantiator(DeserializationContext ctxt, BeanDescription beanDesc) throws JsonMappingException { final DeserializationConfig config = ctxt.getConfig(); ValueInstantiator instantiator = null; // Check @JsonValueInstantiator...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findValueInstantiator File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
findValueInstantiator
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
protected void setRequestId(RequestId requestId) { this.requestId = requestId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRequestId File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setRequestId
base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
protected CompletableFuture<Optional<Integer>> internalGetMaxConsumersPerSubscription() { return getTopicPoliciesAsyncWithRetry(topicName) .thenApply(op -> op.map(TopicPolicies::getMaxConsumersPerSubscription)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalGetMaxConsumersPerSubscription File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalGetMaxConsumersPerSubscription
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public JobPropertyDescriptor getJobProperty(String shortClassName) { // combining these two lines triggers javac bug. See issue #610. Descriptor d = findDescriptor(shortClassName, JobPropertyDescriptor.all()); return (JobPropertyDescriptor) d; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJobProperty File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getJobProperty
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate fetchByGroupId_First(long groupId, OrderByComparator<KBTemplate> orderByComparator) { List<KBTemplate> list = findByGroupId(groupId, 0, 1, orderByComparator); if (!list.isEmpty()) { return list.get(0); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchByGroupId_First File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal ...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
fetchByGroupId_First
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public int addAttachments(String fieldName) throws XWikiException { if (!hasAccessLevel("edit")) { java.lang.Object[] args = { this.getFullName() }; throw new XWikiException(XWikiException.MODULE_XWIKI_ACCESS, XWikiException.ERROR_XWIKI_ACCESS_DENIED, "Access denied i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
addAttachments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
protected void internalSetReplicatedSubscriptionStatus(AsyncResponse asyncResponse, String subName, boolean authoritative, boolean enabled) { log.info("[{}] Attempting to change replicated subscription status to {} - {} {}", clientAppId(), enabled, topicName, subName); // Re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalSetReplicatedSubscriptionStatus File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalSetReplicatedSubscriptionStatus
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
private boolean isSchemaDefinitionInPublishList(CmsUUID publishHistoryId) { if (m_cms == null) { // CmsObject not available, assume there may be a schema definition in the publish history return true; } try { List<CmsPublishedResource> publishedResources = m_...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSchemaDefinitionInPublishList File: src/org/opencms/xml/CmsXmlEntityResolver.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3312
MEDIUM
4
alkacon/opencms-core
isSchemaDefinitionInPublishList
src/org/opencms/xml/CmsXmlEntityResolver.java
92e035423aa6967822d343e54392d4291648c0ee
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("GoodTime") // reading system time without TimeSource public static void touch(File file) throws IOException { checkNotNull(file); if (!file.createNewFile() && !file.setLastModified(System.currentTimeMillis())) { throw new IOException("Unable to update modification time of " + file); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: touch File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
touch
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@Override public void onNetworkTemporarilyDisabled(WifiConfiguration config, int disableReason) { if (disableReason == DISABLED_NO_INTERNET_TEMPORARY) return; if (config.networkId == mTargetNetworkId || config.networkId == mLastNetworkId) { // Disconnect and let autojoin ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNetworkTemporarilyDisabled File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
onNetworkTemporarilyDisabled
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void setVariable(String key, Object value) { if (nativeVideo != null && Media.VARIABLE_NATIVE_CONTRLOLS_EMBEDDED.equals(key) && value instanceof Boolean) { setNativeController((Boolean)value); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVariable File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setVariable
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private UIComponent createComponentApplyAnnotations(FacesContext ctx, String componentType, String rendererType, boolean applyAnnotations) { UIComponent component; try { component = newThing(componentType, componentMap); } catch (Exception ex) { if (LOGGER.isLoggable(SEV...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createComponentApplyAnnotations File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
createComponentApplyAnnotations
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public String getTsConfigFile() { return tsConfigFile; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTsConfigFile File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getTsConfigFile
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
public JSONObject accumulate(String key, Object value) throws JSONException { testValidity(value); Object object = this.opt(key); if (object == null) { this.put(key, value instanceof JSONArray ? new JSONArray().put(value) : value); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: accumulate File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
accumulate
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
private void getShortcutInfoAsync( int launcherUserId, @NonNull String packageName, @NonNull String shortcutId, int userId, @NonNull Consumer<ShortcutInfo> cb) { Preconditions.checkStringNotEmpty(packageName, "packageName"); Preconditions.checkStringNotEmpty(short...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShortcutInfoAsync File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getShortcutInfoAsync
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public void removeGeoFencing(final String id) { //Display.getInstance().scheduleBackgroundTask(new Runnable() { Thread t = new Thread(new Runnable() { @Override public void run() { //wait until the client is connected, otherwise the call to //requ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeGeoFencing File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
removeGeoFencing
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private String parseDN(String subject, String subjectAttributeName) { String temp = subject; int begin = temp.toLowerCase().indexOf( subjectAttributeName.toLowerCase()); temp = temp.substring(begin + subjectAttributeName.length()); int end = temp.indexOf(','); if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDN File: prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-295" ]
CVE-2023-33201
MEDIUM
5.3
bcgit/bc-java
parseDN
prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
0
Analyze the following code function for security vulnerabilities
protected final Augmentations locationAugs() { HTMLAugmentations augs = null; if (fAugmentations) { fLocationItem.setValues(fBeginLineNumber, fBeginColumnNumber, fBeginCharacterOffset, fEndLineNumber, fEndColumnNumber, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: locationAugs File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
locationAugs
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
@Override protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { String encoding = request.getHeader("Accept-Encoding"); boolean supportsGzip = (encoding != null && encoding.toLowerCase().indexOf("gzip") > -1); SessionTerminal s...
Vulnerability Classification: - CWE: CWE-287 - CVE: CVE-2014-0121 - Severity: HIGH - CVSS Score: 7.5 Description: Ensure we secure hawtio-karaf-terminal's /term context Function: doPost File: hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java Repository: hawtio Fixed Code: @Ov...
[ "CWE-287" ]
CVE-2014-0121
HIGH
7.5
hawtio
doPost
hawtio-karaf-terminal/src/main/java/io/hawt/web/plugin/karaf/terminal/TerminalServlet.java
5289715e4f2657562fdddcbad830a30969b96e1e
1
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private void maybeResumeDeviceWideLoggingLocked() { boolean allUsersAffiliated = areAllUsersAffiliatedWithDeviceLocked(); boolean orgOwnedProfileDevice = isOrganizationOwnedDeviceWithManagedProfile(); mInjector.binderWithCleanCallingIdentity(() -> { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeResumeDeviceWideLoggingLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
maybeResumeDeviceWideLoggingLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override protected void onPause() { super.onPause(); mState = STATE_PAUSED; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPause File: src/com/android/certinstaller/CertInstaller.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
onPause
src/com/android/certinstaller/CertInstaller.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
private ConsoleResult execute(CommandLine hgCmd) { return runOrBomb(hgCmd); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2022-29184
MEDIUM
6.5
gocd
execute
domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
37d35115db2ada2190173f9413cfe1bc6c295ecb
0
Analyze the following code function for security vulnerabilities
public void setValidationScript(String validationScript) { getDoc().setValidationScript(validationScript); updateAuthor(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setValidationScript File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
setValidationScript
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override protected void onHeightUpdated(float expandedHeight) { if (!mQsExpanded || mQsExpandImmediate || mIsExpanding && mQsExpandedWhenExpandingStarted) { positionClockAndNotifications(); } if (mQsExpandImmediate || mQsExpanded && !mQsTracking && mQsExpansionAnimator == null ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onHeightUpdated File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onHeightUpdated
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public String getURL(DocumentReference documentReference, String action, String queryString, String anchor, XWikiContext context) { // We need to serialize the space reference because the old createURL() API doesn't accept a DocumentReference. String spaces = getLocalStringEntityReferenceSer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public SingleButtonPanel insertNewAjaxActionButton(final AjaxCallback ajaxCallback, final int position, final String label, final String... classnames) { final SingleButtonPanel result = addNewAjaxActionButton(ajaxCallback, label, classnames); this.actionButtons.add(position, result); return result;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: insertNewAjaxActionButton File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
insertNewAjaxActionButton
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
private void registerBroadcastReceivers() { IntentFilter userFilter = new IntentFilter(); userFilter.addAction(Intent.ACTION_USER_REMOVED); userFilter.addAction(Intent.ACTION_USER_STOPPED); getContext().registerReceiver(new BroadcastReceiver() { @Override public ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerBroadcastReceivers File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
registerBroadcastReceivers
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
@Override public boolean isNotificationPolicyAccessGrantedForPackage(String pkg) {; enforceSystemOrSystemUIOrSamePackage(pkg, "request policy access status for another package"); return checkPolicyAccess(pkg); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNotificationPolicyAccessGrantedForPackage File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
isNotificationPolicyAccessGrantedForPackage
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
void disconnectAllCalls() { Log.v(this, "disconnectAllCalls"); for (Call call : mCalls) { disconnectCall(call); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disconnectAllCalls File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
disconnectAllCalls
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
void removeStreamSink(int streamId) { StreamHolder existing = currentStreams.get(streamId); if(existing == null) { return; } existing.sinkClosed = true; existing.sinkChannel = null; if(existing.sourceClosed) { if(streamId % 2 == (isClient() ? 1 : 0...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStreamSink File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
removeStreamSink
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
@Unstable public void readTemporaryUploadedFiles(EditForm editForm) { getTemporaryAttachmentManager().attachTemporaryAttachmentsInDocument(this, editForm.getTemporaryUploadedFiles()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readTemporaryUploadedFiles File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
readTemporaryUploadedFiles
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public static ByteBuffer directBuffer(long memoryAddress, int size) { if (PlatformDependent0.hasDirectBufferNoCleanerConstructor()) { return PlatformDependent0.newDirectBuffer(memoryAddress, size); } throw new UnsupportedOperationException( "sun.misc.Unsafe or java.ni...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: directBuffer File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
directBuffer
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public static <T> T unmarshal(final Class<T> clazz, final InputSource inputSource, final boolean validate) { return unmarshal(clazz, inputSource, null, validate, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unmarshal File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
unmarshal
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
public void detachStack(int stackId) { synchronized (mWindowMap) { TaskStack stack = mStackIdToStack.get(stackId); if (stack != null) { final DisplayContent displayContent = stack.getDisplayContent(); if (displayContent != null) { if (s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detachStack File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
detachStack
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public SerializationServiceBuilder setCheckClassDefErrors(boolean checkClassDefErrors) { this.checkClassDefErrors = checkClassDefErrors; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCheckClassDefErrors File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
setCheckClassDefErrors
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public Builder setIdleConnectionInPoolTimeoutInMs(int idleConnectionInPoolTimeoutInMs) { this.idleConnectionInPoolTimeoutInMs = idleConnectionInPoolTimeoutInMs; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIdleConnectionInPoolTimeoutInMs File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setIdleConnectionInPoolTimeoutInMs
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public Element toDOM(Document document) { Element pdElement = document.createElement("policyDefault"); pdElement.setAttribute("id", name); pdElement.setAttribute("classId", classId); if (text != null) { Element descriptionElement = document.createElement("description"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDOM File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toDOM
base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public void cancel(String accountName) { if (mCurrentUpload != null && mCurrentUpload.getUser().nameEquals(accountName)) { mCurrentUpload.cancel(ResultCode.CANCELLED); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancel File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
cancel
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
@Test public void deleteByPojoFailedConnection(TestContext context) throws FieldException { createFoo(context).delete(Future.failedFuture("bad"), FOO, new SimplePojo(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteByPojoFailedConnection File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
deleteByPojoFailedConnection
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private void appendChar( StringBuffer str, int value ) { if ( value > Character.MAX_VALUE ) { char[] chars = Character.toChars( value ); str.append( chars, 0, chars.length ); } else { str.append( (char) value ); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendChar File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
appendChar
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
private void removeVersion() { for (Iterator<NodeTuple> it = getValue().iterator(); it.hasNext();) { ScalarNode keyNode = (ScalarNode) it.next().getKeyNode(); if (keyNode.getValue().equals("version")) it.remove(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeVersion File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21249
MEDIUM
6.5
theonedev/onedev
removeVersion
server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66
0
Analyze the following code function for security vulnerabilities
public abstract BaseXMLBuilder text(String value);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: text File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
text
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
protected abstract String getLocation();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocation File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
getLocation
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public int getMaxKeyguardNotifications() { return getMaxKeyguardNotifications(false /* recompute */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxKeyguardNotifications File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getMaxKeyguardNotifications
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public ApiClient setUserAgent(String userAgent) { userAgent = userAgent; addDefaultHeader("User-Agent", userAgent); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserAgent File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setUserAgent
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void beginFormat(WikiFormat format) { WikiParameters wikiParameters = new WikiParameters(format.getParams()); if (isMetaDataElement(wikiParameters)) { getListener().beginMetaData(createMetaData(wikiParameters)); WikiParameters cleanParameters = cleanPara...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginFormat File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/parser/xhtml/wikimodel/XHTMLXWikiGeneratorListener.java Repository: xwiki/xwiki-rendering The code fol...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
beginFormat
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/parser/xhtml/wikimodel/XHTMLXWikiGeneratorListener.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public boolean isInvertFilter() { return invertFilter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInvertFilter File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
isInvertFilter
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public List<? extends Post> getQuestions(Profile authUser, Profile showUser, boolean isMyProfile, Pager itemcount) { if (utils.postsNeedApproval() && (isMyProfile || utils.isMod(authUser))) { List<Question> qlist = new ArrayList<>(); Pager p = new Pager(itemcount.getPage(), itemcount.getLimit()); qlist.addAl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getQuestions File: src/main/java/com/erudika/scoold/controllers/ProfileController.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getQuestions
src/main/java/com/erudika/scoold/controllers/ProfileController.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
protected void sendSync(String content) throws IOException { try { // FireFox posts a "loading" state twice as well. this.changeState(ReadyState.LOADING, 0, null, null); URLConnection c; synchronized (this) { c = this.connection; } c.setRequestProperty("User-Agent", this.context.getUserAgent());...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendSync File: Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
sendSync
Testing/src/main/java/org/loboevolution/html/test/SimpleHttpRequest.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
protected void setDoubleQuotedArgumentEscaped( boolean doubleQuotedArgumentEscaped ) { this.doubleQuotedArgumentEscaped = doubleQuotedArgumentEscaped; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDoubleQuotedArgumentEscaped File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
setDoubleQuotedArgumentEscaped
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
private void initializeVelocity() { if (velocityEngine == null) { velocityEngine = new VelocityEngine(); Properties props = new Properties(); props.setProperty(RuntimeConstants.RUNTIME_LOG, "startup_wizard_vel.log"); // Linux requires setting logging properties to initialize Velocity Context. props...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-23612 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fix bug Function: initializeVelocity File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java Repository: openmrs/openmrs-core Fixed Code: private void initializeVelocity() { if (velocityEng...
[ "CWE-22" ]
CVE-2022-23612
MEDIUM
5
openmrs/openmrs-core
initializeVelocity
web/src/main/java/org/openmrs/web/filter/StartupFilter.java
db8454bf19a092a78d53ee4dba2af628b730a6e7
1
Analyze the following code function for security vulnerabilities
public static <T extends Describable<T>> Map<Descriptor<T>,T> toMap(Iterable<T> describables) { Map<Descriptor<T>,T> m = new LinkedHashMap<Descriptor<T>,T>(); for (T d : describables) { m.put(d.getDescriptor(),d); } return m; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toMap File: core/src/main/java/hudson/model/Descriptor.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
toMap
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public static void extractZip(File zipFile, File destDir) throws IOException { byte[] buffer = new byte[1024]; if (!destDir.exists()) destDir.mkdirs(); ZipInputStream zis = new ZipInputStream(new FileInputStream(zipFile)); ZipEntry ze = zis.getNextEntry(); try ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-4494 - Severity: CRITICAL - CVSS Score: 9.8 Description: vuln-fix: Zip Slip Vulnerability This fixes a Zip-Slip vulnerability. This change does one of two things. This change either 1. Inserts a guard to protect against Zip Slip. OR 2. Replaces `dir.getCan...
[ "CWE-22" ]
CVE-2022-4494
CRITICAL
9.8
bspkrs/MCPMappingViewer
extractZip
src/main/java/bspkrs/mmv/RemoteZipHandler.java
6e602746c96b4756c271d080dae7d22ad804a1bd
1
Analyze the following code function for security vulnerabilities
@Override public boolean isRotationDrawingSupported() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRotationDrawingSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isRotationDrawingSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setHidden(Boolean hidden) { if (hidden == null) { this.hidden = false; } else { this.hidden = hidden; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHidden File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setHidden
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationWithTypeInfo04() throws Exception { Duration duration = Duration.ofSeconds(13498L, 8374); String prefix = "[\"" + Duration.class.getName() + "\","; ObjectMapper mapper = newMapper(); mapper.addMixIn(TemporalAmount.class, MockObjectConfigurat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationWithTypeInfo04 File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practice...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationWithTypeInfo04
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0