instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public HttpMethod getAPIMethod() {
if (this.method() != HttpMethod.GET) {
return this.method();
} else {
if (this.hasQueryStringParam("method_override")) {
final String qs_method = this.getQueryStringParam("method_override");
if (qs_method == null || qs_method.isEmpty()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAPIMethod
File: src/tsd/HttpQuery.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-25827 | MEDIUM | 6.1 | OpenTSDB/opentsdb | getAPIMethod | src/tsd/HttpQuery.java | ff02c1e95e60528275f69b31bcbf7b2ac625cea8 | 0 |
Analyze the following code function for security vulnerabilities | protected Map<String, Object> createPagerdutyEvent(InstanceEvent event, Instance instance) {
Map<String, Object> result = new HashMap<>();
result.put("service_key", serviceKey);
result.put("incident_key", instance.getRegistration().getName() + "/" + event.getInstance());
result.put("description", getDescription... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createPagerdutyEvent
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | createPagerdutyEvent | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | void onAudioStateChanged(AudioState oldAudioState, AudioState newAudioState) {
Log.v(this, "onAudioStateChanged, audioState: %s -> %s", oldAudioState, newAudioState);
for (CallsManagerListener listener : mListeners) {
listener.onAudioStateChanged(oldAudioState, newAudioState);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAudioStateChanged
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | onAudioStateChanged | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | public static void reportRenderingFeedback(Context launcher, Account account, Message message,
String body) {
launch(launcher, account, message, FORWARD,
"android-gmail-readability@google.com", body, null, null, null /* extraValues */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reportRenderingFeedback
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | reportRenderingFeedback | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public static String verifyRedirectUri(KeycloakSession session, String redirectUri, ClientModel client) {
return verifyRedirectUri(session, redirectUri, client, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyRedirectUri
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4361 | MEDIUM | 6.1 | keycloak | verifyRedirectUri | services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java | a1cfe6e24e5b34792699a00b8b4a8016a5929e3a | 0 |
Analyze the following code function for security vulnerabilities | public void callback(int dwArgc, Pointer lpszArgv) {
ServiceControl serviceControl = new ServiceControl();
serviceStatusHandle = ADVAPI_32.RegisterServiceCtrlHandlerEx(serviceName, serviceControl, null);
reportStatus(Winsvc.SERVICE_START_PENDING, WinError.NO_ERROR, 3000);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: callback
File: src/main/java/org/traccar/WindowsService.java
Repository: traccar
The code follows secure coding practices. | [
"CWE-428"
] | CVE-2021-21292 | LOW | 1.9 | traccar | callback | src/main/java/org/traccar/WindowsService.java | cc69a9907ac9878db3750aa14ffedb28626455da | 0 |
Analyze the following code function for security vulnerabilities | @LogMessage(level = Level.WARN)
@Message(id = 712, value = "Unable to dissociate context {0} when destroying request {1}", format = Format.MESSAGE_FORMAT)
void unableToDissociateContext(Context context, HttpServletRequest request); | Vulnerability Classification:
- CWE: CWE-362
- CVE: CVE-2014-8122
- Severity: MEDIUM
- CVSS Score: 4.3
Description: WELD-1802 An exception during context deactivation/dissociation should
not abort further procesing
Function: unableToDissociateContext
File: impl/src/main/java/org/jboss/weld/logging/ServletLogger.java
... | [
"CWE-362"
] | CVE-2014-8122 | MEDIUM | 4.3 | weld/core | unableToDissociateContext | impl/src/main/java/org/jboss/weld/logging/ServletLogger.java | 8e413202fa1af08c09c580f444e4fd16874f9c65 | 1 |
Analyze the following code function for security vulnerabilities | public boolean releaseActivityInstance(IBinder token) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: releaseActivityInstance
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | releaseActivityInstance | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public @Nullable String getValue() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValue
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getValue | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onAccountAccessed(String token) throws RemoteException {
final int uid = Binder.getCallingUid();
if (UserHandle.getAppId(uid) == Process.SYSTEM_UID) {
return;
}
final int userId = UserHandle.getCallingUserId();
final long identity = Binder.cl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAccountAccessed
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | onAccountAccessed | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasAccessLevel(String level)
{
return hasAccessLevel(level, getXWikiContext().getUser(), getXWikiContext().getDoc().getFullName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasAccessLevel
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | hasAccessLevel | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public PageReference getPageReference()
{
if (this.pageReferenceCache == null) {
this.pageReferenceCache = intern(getPageReferenceResolver().resolve(getDocumentReference()));
}
return this.pageReferenceCache;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageReference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getPageReference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void setClassLoader(ClassLoader classLoader) {
this.classLoader = classLoader;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClassLoader
File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
Repository: apache/incubator-kie-drools
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-8125 | HIGH | 7.5 | apache/incubator-kie-drools | setClassLoader | drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java | c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3 | 0 |
Analyze the following code function for security vulnerabilities | void releaseSoundPool() {
synchronized (this) {
if (mSoundPool != null) {
mSoundPool.release();
mSoundPool = null;
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: releaseSoundPool
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | releaseSoundPool | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | void showPausedNotification() {
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) {
createChannel();
}
NotificationCompat.Builder builder = MediaStyleHelper.from(this, mMediaSessionCompat);
if( builder == null ) {
return;
}
builder.addAction(new... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showPausedNotification
File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | showPausedNotification | Ports/Android/src/com/codename1/media/BackgroundAudioService.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public static double safeParseDouble(String dirty) throws NumberFormatException {
String clean = ILLEGAL_IN_FLOAT.matcher(dirty).replaceAll("");
return Double.parseDouble(clean);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: safeParseDouble
File: core/lib/src/main/java/org/opennms/core/utils/WebSecurityUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2016-6555 | MEDIUM | 4.3 | OpenNMS/opennms | safeParseDouble | core/lib/src/main/java/org/opennms/core/utils/WebSecurityUtils.java | 29007e7aeeb792aa73d45fafb16ae9ef19e78a18 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void restart() {
if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Requires permission "
+ android.Manifest.permission.SET_ACTIVITY_WATCHER);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: restart
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | restart | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static <T> T unmarshal(final Class<T> clazz, final Resource resource) {
return unmarshal(clazz, resource, VALIDATE_IF_POSSIBLE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unmarshal
File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2023-0871 | MEDIUM | 6.1 | OpenNMS/opennms | unmarshal | core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java | 3c17231714e3d55809efc580a05734ed530f9ad4 | 0 |
Analyze the following code function for security vulnerabilities | private WifiLinkLayerStats updateLinkLayerStatsRssiSpeedFrequencyCapabilities(long txBytes,
long rxBytes) {
WifiLinkLayerStats stats = getWifiLinkLayerStats();
WifiNl80211Manager.SignalPollResult pollResult = mWifiNative.signalPoll(mInterfaceName);
if (pollResult == null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateLinkLayerStatsRssiSpeedFrequencyCapabilities
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | updateLinkLayerStatsRssiSpeedFrequencyCapabilities | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private void endOfCompressedDataReached() throws IOException {
//With inflater, without knowing the compressed or uncompressed size, we over read necessary data
//In such cases, we have to push back the inputstream to the end of data
decompressedInputStream.pushBackInputStreamIfNecessary(inputStream);
... | Vulnerability Classification:
- CWE: CWE-346
- CVE: CVE-2023-22899
- Severity: MEDIUM
- CVSS Score: 5.9
Description: #485 Calculate AES mac with cache and push back functionality
Function: endOfCompressedDataReached
File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
Repository: srikanth-lingala/... | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | endOfCompressedDataReached | src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 1 |
Analyze the following code function for security vulnerabilities | public static SortDirection fromOptionalString(Optional<String> direction) {
if ("DESC".equalsIgnoreCase(direction.orElse(null)))
return DESC;
return ASC;
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2019-15569
- Severity: HIGH
- CVSS Score: 7.5
Description: style fix
Function: fromOptionalString
File: src/main/java/uk/gov/hmcts/ccd/data/casedetails/search/SortDirection.java
Repository: hmcts/ccd-data-store-api
Fixed Code:
public static SortDirection fromOpt... | [
"CWE-89"
] | CVE-2019-15569 | HIGH | 7.5 | hmcts/ccd-data-store-api | fromOptionalString | src/main/java/uk/gov/hmcts/ccd/data/casedetails/search/SortDirection.java | f151e694307dd59dc0f111d44bbd329276ab0004 | 1 |
Analyze the following code function for security vulnerabilities | public WebMarkupContainer getMainContainer()
{
return mainContainer;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMainContainer
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | getMainContainer | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 0 |
Analyze the following code function for security vulnerabilities | public void updateDoubleTapSupport(boolean supportsDoubleTap) {
if (mNativeContentViewCore == 0) return;
nativeSetDoubleTapSupportEnabled(mNativeContentViewCore, supportsDoubleTap);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateDoubleTapSupport
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | updateDoubleTapSupport | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public static String generateValidVHDLLabel(String initialLabel,
String suffix) {
assert (initialLabel != null);
// As a default, trim whitespaces at the beginning and at the end
// of a label (no risks with that potentially, therefore avoid
// to append the suffix if that was the only change)
initialLabe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateValidVHDLLabel
File: src/com/cburch/logisim/file/XmlReader.java
Repository: logisim-evolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000889 | MEDIUM | 6.8 | logisim-evolution | generateValidVHDLLabel | src/com/cburch/logisim/file/XmlReader.java | 90aee8f8ceef463884cc400af4f6d1f109fb0972 | 0 |
Analyze the following code function for security vulnerabilities | private void installExistingAdminPackage(int userId, String packageName) {
try {
final int status = mContext.getPackageManager().installExistingPackageAsUser(
packageName,
userId);
if (status != PackageManager.INSTALL_SUCCEEDED) {
t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installExistingAdminPackage
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | installExistingAdminPackage | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public String getURLToLoginAsAdminAndGotoPage(final String pageURL)
{
return getURLToLoginAndGotoPage(ADMIN_CREDENTIALS.getUserName(), ADMIN_CREDENTIALS.getPassword(), pageURL);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLToLoginAsAdminAndGotoPage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding pract... | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getURLToLoginAsAdminAndGotoPage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | private String buildBaseSql(ID mainid, String relatedExpr, String q, boolean count, ID user) {
// format: Entity.Field
Entity relatedEntity = MetadataHelper.getEntity(relatedExpr.split("\\.")[0]);
String where = new ProtocolFilterParser(null).parseRelated(relatedExpr, mainid);
// @see ... | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2023-1495
- Severity: MEDIUM
- CVSS Score: 6.5
Description: H5 sync2 (#595)
* style: 目录样式gh
* style: J_new
* feat: advListFilterTabs
* feat: nav-copyto
* enh: 助记码全拼
* enh: 地图搜索选点
* enh: topnav
* list pn
* .form-line.v33
* open TAG
* ... | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | buildBaseSql | src/main/java/com/rebuild/web/general/RelatedListController.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 1 |
Analyze the following code function for security vulnerabilities | public static void encrypt(
final AEADBlockCipher cipher,
final SecretKey key,
final Nonce nonce,
final InputStream input,
final OutputStream output)
throws CryptoException, StreamException
{
final byte[] iv = nonce.generate();
final byte[] header = new CiphertextHeader(iv).encode();
... | Vulnerability Classification:
- CWE: CWE-770
- CVE: CVE-2020-7226
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Define new ciphertext header format.
New format does not allocate any memory until HMAC check passes, which
guards against untrusted input. All encryption components have been
updated to use the new hea... | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | encrypt | src/main/java/org/cryptacular/util/CipherUtil.java | 8c6c7528f1e24c6b71f3e36db0cb8a697256ce25 | 1 |
Analyze the following code function for security vulnerabilities | protected XWikiDocument getDocument(DocumentReference documentReference) throws XWikiException
{
XWikiContext xcontext = this.xcontextProvider.get();
DocumentReference documentReferenceWithoutLocale = documentReference.getLocale() == null ? documentReference
: new DocumentReference(docu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDocument
File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java
Repository:... | [
"CWE-312",
"CWE-200"
] | CVE-2023-50719 | HIGH | 7.5 | xwiki/xwiki-platform | getDocument | xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java | 3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea | 0 |
Analyze the following code function for security vulnerabilities | public boolean offerToPool(String key, Channel channel) {
return channelPool.offer(key, channel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: offerToPool
File: providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7397 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | offerToPool | providers/netty/src/main/java/org/asynchttpclient/providers/netty/channel/Channels.java | df6ed70e86c8fc340ed75563e016c8baa94d7e72 | 0 |
Analyze the following code function for security vulnerabilities | private boolean doesPackageMatchUid(String packageName, int uid) {
final int userId = UserHandle.getUserId(uid);
try {
ApplicationInfo appInfo = mIPackageManager.getApplicationInfo(packageName, 0, userId);
// Since this call goes directly to PackageManagerService a NameNotFoundEx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doesPackageMatchUid
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | doesPackageMatchUid | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isOutgoingCallPermitted(PhoneAccountHandle phoneAccountHandle,
String callingPackage) {
Log.startSession("TSI.iOCP");
try {
enforceCallingPackage(callingPackage, "isOutgoingCallPermitted");
enforcePhoneAccountHandle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOutgoingCallPermitted
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | isOutgoingCallPermitted | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | public static List<DashboardCategory> getCategories(Context context,
HashMap<Pair<String, String>, Tile> cache) {
final long startTime = System.currentTimeMillis();
ArrayList<Tile> tiles = new ArrayList<>();
UserManager userManager = UserManager.get(context);
for (UserHandle ... | Vulnerability Classification:
- CWE: CWE-264
- CVE: CVE-2016-3889
- Severity: HIGH
- CVSS Score: 7.2
Description: Pre-setup restrictions
- Prevent external tiles from system apps
- Disable help
Bug: 29194585
Change-Id: I92da498110db49f7a523d6f775f191c4b52a4ad6
Function: getCategories
File: packages/SettingsLib/s... | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | getCategories | packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java | e206f02d46ae5e38c74d138b51f6e1637e261abe | 1 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mPm.mLock")
private void disableStubPackage(DeletePackageAction action, PackageSetting deletedPs,
@NonNull int[] allUserHandles) {
final PackageSetting stubPs = mPm.mSettings.getPackageLPr(
deletedPs.getPackageName());
if (stubPs != null) {
int use... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disableStubPackage
File: services/core/java/com/android/server/pm/InstallPackageHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21257 | HIGH | 7.8 | android | disableStubPackage | services/core/java/com/android/server/pm/InstallPackageHelper.java | 1aec7feaf07e6d4568ca75d18158445dbeac10f6 | 0 |
Analyze the following code function for security vulnerabilities | public @Nonnull PropertyType getPropertyTypeOrDie(@Nonnull Object instance, @Nonnull String field) {
PropertyType propertyType = getPropertyType(instance, field);
if (propertyType != null) {
return propertyType;
} else if (instance == this) {
throw new AssertionError(getC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPropertyTypeOrDie
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getPropertyTypeOrDie | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String path() {
return path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: path
File: jooby/src/main/java/org/jooby/internal/RouteImpl.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-15477 | MEDIUM | 4.3 | jooby-project/jooby | path | jooby/src/main/java/org/jooby/internal/RouteImpl.java | 34856a738829d8fedca4ed27bd6ff413af87186f | 0 |
Analyze the following code function for security vulnerabilities | ServerBuilder routingDecorator(RouteDecoratingService routeDecoratingService) {
virtualHostTemplate.addRouteDecoratingService(routeDecoratingService);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: routingDecorator
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | routingDecorator | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public int copyWiki(String sourceWiki, String targetWiki, String locale, boolean clean, XWikiContext context)
throws XWikiException
{
int documents = copySpaceBetweenWikis(null, sourceWiki, targetWiki, locale, clean, context);
ObservationManager om = getObservationManager();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyWiki
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | copyWiki | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void exportProperty(StringBuilder output, String prefix, Property<?> p) {
addProperty(output, prefix + PROPERTY_PARAMNAME, p.getName());
addProperty(output, prefix + PROPERTY_PARAMTYPE, p.getClass().getCanonicalName());
addProperty(output, prefix + PROPERTY_PARAMVALUE, p.asString());
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportProperty
File: ff4j-config-properties/src/main/java/org/ff4j/parser/properties/PropertiesParser.java
Repository: ff4j
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | exportProperty | ff4j-config-properties/src/main/java/org/ff4j/parser/properties/PropertiesParser.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void toWriter(boolean wholeDocument, Writer writer, Properties outputProperties)
{
try {
super.toWriter(wholeDocument, writer, outputProperties);
} catch (TransformerException e) {
throw wrapExceptionAsRuntimeException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toWriter
File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | toWriter | src/main/java/com/jamesmurty/utils/XMLBuilder2.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private String quoteValue(String val, Type type) {
if (NumberUtils.isNumber(val) && isNumberType(type)) {
return val;
} else if (StringUtils.isNotBlank(val)) {
return String.format("'%s'", StringEscapeUtils.escapeSql(val));
}
return "''";
} | Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2023-1495
- Severity: MEDIUM
- CVSS Score: 6.5
Description: H5 sync2 (#595)
* style: 目录样式gh
* style: J_new
* feat: advListFilterTabs
* feat: nav-copyto
* enh: 助记码全拼
* enh: 地图搜索选点
* enh: topnav
* list pn
* .form-line.v33
* open TAG
* ... | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | quoteValue | src/main/java/com/rebuild/core/service/query/AdvFilterParser.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void setInputStream(InputStream in) {
this.in = new InputStreamWrapper(in) {
@Override
public void close() throws IOException {
}
};
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setInputStream
File: server-core/src/main/java/io/onedev/server/git/GitSshCommand.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-39205 | CRITICAL | 9.8 | theonedev/onedev | setInputStream | server-core/src/main/java/io/onedev/server/git/GitSshCommand.java | f1e97688e4e19d6de1dfa1d00e04655209d39f8e | 0 |
Analyze the following code function for security vulnerabilities | private int startWifiIPPacketOffload(int slot, KeepalivePacketData packetData,
int intervalSeconds) {
byte[] packet = null;
byte[] dstMac = null;
int proto = 0;
try {
packet = packetData.getPacket();
dstMac = getDstMacForKeepalive(packetData);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startWifiIPPacketOffload
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | startWifiIPPacketOffload | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public List<WifiScanner.ScanSettings.HiddenNetwork> retrieveHiddenNetworkList(
boolean autoJoinOnly) {
List<WifiScanner.ScanSettings.HiddenNetwork> hiddenList = new ArrayList<>();
List<WifiConfiguration> networks = getConfiguredNetworks();
// Remove any non hidden networks.
n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: retrieveHiddenNetworkList
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | retrieveHiddenNetworkList | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onConfigurationChanged(Configuration newParentConfig) {
// We want to collect the ActivityRecord if the windowing mode is changed, so that it will
// dispatch app transition finished event correctly at the end.
// Check #isVisible() because we don't want to animate for ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConfigurationChanged
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | onConfigurationChanged | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public static int defaultMaxRedirects() {
return Integer.getInteger(ASYNC_CLIENT + "maxRedirects", 5);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultMaxRedirects
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultMaxRedirects | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
final void updateProcessForegroundLocked(ProcessRecord proc, boolean isForeground,
boolean oomAdj) {
if (isForeground != proc.foregroundServices) {
proc.foregroundServices = isForeground;
ArrayList<ProcessRecord> curProcs = mForegroundPackages.get(proc.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateProcessForegroundLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | updateProcessForegroundLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String getRelativeUrlTags() throws IndexUnreachableException, DAOException, PresentationException {
if (!isRecordLoaded() || navigationHelper == null) {
return "";
}
if (logger.isTraceEnabled()) {
logger.trace("current view: {}", navigationHelper.getCurrentView());... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRelativeUrlTags
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getRelativeUrlTags | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public void addImplicitCollection(Class ownerType, String fieldName, String itemFieldName, Class itemType) {
addImplicitMap(ownerType, fieldName, itemFieldName, itemType, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addImplicitCollection
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | addImplicitCollection | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | private static String normalizeArch(String value) {
value = normalize(value);
if (value.matches("^(x8664|amd64|ia32e|em64t|x64)$")) {
return "x86_64";
}
if (value.matches("^(x8632|x86|i[3-6]86|ia32|x32)$")) {
return "x86_32";
}
if (value.matches("^... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: normalizeArch
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | normalizeArch | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | private int getAppId(String dumpPackage) {
if (dumpPackage != null) {
try {
ApplicationInfo info = mContext.getPackageManager().getApplicationInfo(
dumpPackage, 0);
return UserHandle.getAppId(info.uid);
} catch (NameNotFoundExceptio... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppId
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getAppId | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | private Setting getSecureSetting(String name, int requestingUserId) {
if (DEBUG) {
Slog.v(LOG_TAG, "getSecureSetting(" + name + ", " + requestingUserId + ")");
}
// Resolve the userId on whose behalf the call is made.
final int callingUserId = resolveCallingUserIdEnforcingPe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSecureSetting
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3876 | HIGH | 7.2 | android | getSecureSetting | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | 91fc934bb2e5ea59929bb2f574de6db9b5100745 | 0 |
Analyze the following code function for security vulnerabilities | private void tryToRemoveUserFromGroup(RosterGroup group,
RosterEntry rosterEntry) throws YaximXMPPException {
try {
group.removeEntry(rosterEntry);
} catch (XMPPException e) {
throw new YaximXMPPException("tryToRemoveUserFromGroup", e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tryToRemoveUserFromGroup
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | tryToRemoveUserFromGroup | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public void pullExternalCall(Call call) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("pullExternalCall")) {
try {
logOutgoing("pullExternalCall %s", callId);
mServiceInterface.pullExternalCa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pullExternalCall
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | pullExternalCall | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public Entry<P> addPrimitive(final P primitive, Keyset.Key key)
throws GeneralSecurityException {
if (key.getStatus() != KeyStatusType.ENABLED) {
throw new GeneralSecurityException("only ENABLED key is allowed");
}
Entry<P> entry =
new Entry<P>(
primitive,
CryptoF... | Vulnerability Classification:
- CWE: CWE-176
- CVE: CVE-2020-8929
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fixing ciphertext malleability issue in Java caused by storing the ciphertext prefix in a hashmap keyed by UTF8 encoded strings, instead of byte arrays, leading to the ability to retrieve keys with IDs t... | [
"CWE-176"
] | CVE-2020-8929 | MEDIUM | 5 | tink-crypto/tink | addPrimitive | java_src/src/main/java/com/google/crypto/tink/PrimitiveSet.java | 93d839a5865b9d950dffdc9d0bc99b71280a8899 | 1 |
Analyze the following code function for security vulnerabilities | public HashMap getNamedDestinationFromStrings() {
if (catalog.get(PdfName.NAMES) != null) {
PdfDictionary dic = (PdfDictionary)getPdfObjectRelease(catalog.get(PdfName.NAMES));
if (dic != null) {
dic = (PdfDictionary)getPdfObjectRelease(dic.get(PdfName.DESTS));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNamedDestinationFromStrings
File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
Repository: pdftk-java/pdftk
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2021-37819 | HIGH | 7.5 | pdftk-java/pdftk | getNamedDestinationFromStrings | java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java | 9b0cbb76c8434a8505f02ada02a94263dcae9247 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final IQRequestHandler unregisterIQRequestHandler(IQRequestHandler iqRequestHandler) {
return unregisterIQRequestHandler(iqRequestHandler.getElement(), iqRequestHandler.getNamespace(),
iqRequestHandler.getType());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterIQRequestHandler
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | unregisterIQRequestHandler | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | protected int getMaxKeyguardNotifications(boolean recompute) {
if (recompute) {
mMaxKeyguardNotifications = Math.max(1,
mNotificationPanel.computeMaxKeyguardNotifications(
mMaxAllowedKeyguardNotifications));
return mMaxKeyguardNotifications... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxKeyguardNotifications
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getMaxKeyguardNotifications | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private CharSequence processTextSpans(CharSequence text) {
if (mInNightMode) {
return ContrastColorUtil.clearColorSpans(text);
}
return text;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processTextSpans
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | processTextSpans | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private boolean isAllowedVAADINBuildUrl(String filenameWithPath) {
// Check that we target VAADIN/build
return filenameWithPath.startsWith("/" + VAADIN_BUILD_FILES_PATH);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAllowedVAADINBuildUrl
File: flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | isAllowedVAADINBuildUrl | flow-server/src/main/java/com/vaadin/flow/server/StaticFileServer.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | public static void writeFallBackSettingsFiles(List<String> filePaths) {
final int numFiles = filePaths.size();
for (int i = 0; i < numFiles; i++) {
final String filePath = filePaths.get(i);
final File originalFile = new File(filePath);
if (SettingsState.stateFileExist... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeFallBackSettingsFiles
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | writeFallBackSettingsFiles | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | public void sendSetRinging(String id) throws Exception {
mConnectionById.get(id).state = Connection.STATE_RINGING;
for (IConnectionServiceAdapter a : mConnectionServiceAdapters) {
a.setRinging(id, null /*Session.Info*/);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendSetRinging
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | sendSetRinging | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | private void preloadRecentApps() {
mPreloadedRecentApps = true;
try {
IStatusBarService statusbar = getStatusBarService();
if (statusbar != null) {
statusbar.preloadRecentApps();
}
} catch (RemoteException e) {
Slog.e(TAG, "RemoteEx... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: preloadRecentApps
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | preloadRecentApps | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | private String getInnerQuerySql()
{
return "select " +
T_ALIAS + ".uid, " +
T_ALIAS + ".sharing, " +
"array_agg(ou.uid) agg_ou_uid " +
"from " + getBaseTableName() + " " + T_ALIAS +
" left join " + getRelationshipTableName() + " " + REL_TABLE_ALIAS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInnerQuerySql
File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java
Repository: dhis2/dhis2-core
The code follows secure coding p... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | getInnerQuerySql | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java | ef04483a9b177d62e48dcf4e498b302a11f95e7d | 0 |
Analyze the following code function for security vulnerabilities | public java.lang.Object parseGroovyFromPage(String fullname) throws XWikiException
{
XWikiDocument doc = this.xwiki.getDocument(fullname, getXWikiContext());
if (this.xwiki.getRightService().hasProgrammingRights(doc, getXWikiContext())) {
return this.xwiki.parseGroovyFromString(doc.getCo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseGroovyFromPage
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | parseGroovyFromPage | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public boolean existSameField(String fieldString) {
String[] arr = fieldString.split(",");
for (String exp : fields) {
for (String config : arr) {
if (exp.equals(config)) {
// 非常明确的列直接比较
log.warn("sql黑名单校验,表【"+na... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: existSameField
File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-34602 | HIGH | 7.5 | jeecgboot/jeecg-boot | existSameField | jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java | dd7bf104e7ed59142909567ecd004335c3442ec5 | 0 |
Analyze the following code function for security vulnerabilities | public boolean setNetworkCandidateScanResult(int networkId, ScanResult scanResult, int score,
SecurityParams params) {
if (mVerboseLoggingEnabled) {
Log.v(TAG, "Set network candidate scan result " + scanResult + " for " + networkId
+ " with security params " + params)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNetworkCandidateScanResult
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | setNetworkCandidateScanResult | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private StackTraceElement getCallingMethod() {
try {
throw new RuntimeException("Stacktrace Dummy Exception");
}
catch (RuntimeException e) {
try {
final String prefix = this.getClass().getPackage().getName();
for (StackTraceElement element... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCallingMethod
File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
Repository: spacewalkproject/spacewalk
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2016-3079 | MEDIUM | 4.3 | spacewalkproject/spacewalk | getCallingMethod | java/code/src/com/redhat/rhn/common/localization/LocalizationService.java | 7b9ff9ad | 0 |
Analyze the following code function for security vulnerabilities | boolean updateConfigurationLocked(Configuration values, ActivityRecord starting,
boolean initLocale, boolean deferResume) {
// pass UserHandle.USER_NULL as userId because we don't persist configuration for any user
return updateConfigurationLocked(values, starting, initLocale, false /* persi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateConfigurationLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | updateConfigurationLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public XMLBuilder d(String data) {
return cdata(data);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: d
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | d | src/main/java/com/jamesmurty/utils/XMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isCrossProfileQuickContactDisabled(@UserIdInt int userId) {
return getCrossProfileCallerIdDisabledForUser(userId)
&& getCrossProfileContactsSearchDisabledForUser(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCrossProfileQuickContactDisabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isCrossProfileQuickContactDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | private String map(String libName) {
/*
* libraries in the Macintosh use the extension .jnilib but the some
* VMs map to .dylib.
*/
libName = System.mapLibraryName(libName);
String ext = ".dylib";
if (libName.endsWith(ext)) {
libName = libName.subs... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: map
File: hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java
Repository: fusesource/hawtjni
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2013-2035 | MEDIUM | 4.4 | fusesource/hawtjni | map | hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java | 92c266170ce98edc200c656bd034a237098b8aa5 | 0 |
Analyze the following code function for security vulnerabilities | public void addCustomParam(final String key, final String value) {
this.customParams.put(key, value);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCustomParam
File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
Repository: pac4j
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-44878 | MEDIUM | 5 | pac4j | addCustomParam | pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java | 22b82ffd702a132d9f09da60362fc6264fc281ae | 0 |
Analyze the following code function for security vulnerabilities | private void updateHomepageAppBar() {
if (!mIsEmbeddingActivityEnabled) {
return;
}
updateAppBarMinHeight();
if (mIsTwoPane) {
findViewById(R.id.homepage_app_bar_regular_phone_view).setVisibility(View.GONE);
findViewById(R.id.homepage_app_bar_two_pane_... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateHomepageAppBar
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | updateHomepageAppBar | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void notifyPinnedStackAnimationEnded() {
mTaskChangeNotificationController.notifyPinnedStackAnimationEnded();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyPinnedStackAnimationEnded
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | notifyPinnedStackAnimationEnded | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static Map<String, Object> updateUserLoginSecurity(DispatchContext ctx, Map<String, ?> context) {
Map<String, Object> result = new LinkedHashMap<>();
Delegator delegator = ctx.getDelegator();
Security security = ctx.getSecurity();
GenericValue loggedInUserLogin = (GenericValue) c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateUserLoginSecurity
File: framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java
Repository: apache/ofbiz-framework
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2021-25958 | MEDIUM | 5 | apache/ofbiz-framework | updateUserLoginSecurity | framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java | 2f5b8d33e32c4d9a48243cf9e503236acd5aec5c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void checkPermission(Permission perm) {
var permName = perm.getName();
var permActions = perm.getActions();
var permString = String.valueOf(perm);
try {
if (enterPublicInterface())
return;
// for files: read, readlink, write, delete
// for threads: modifyThread
// for preferenc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkPermission
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | checkPermission | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | protected void handleCloseEvent(final AjaxRequestTarget target)
{
} | Vulnerability Classification:
- CWE: CWE-352
- CVE: CVE-2013-7251
- Severity: MEDIUM
- CVSS Score: 6.8
Description: CSRF protection.
Function: handleCloseEvent
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
Fixed Code:
protected void handleCloseEvent(final ... | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | handleCloseEvent | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 1 |
Analyze the following code function for security vulnerabilities | boolean errorDetected() {
return errorDetected_;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: errorDetected
File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
Repository: HtmlUnit/htmlunit
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-2798 | HIGH | 7.5 | HtmlUnit/htmlunit | errorDetected | src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java | 940dc7fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getUserPrettyName(Serializable user) {
return user.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserPrettyName
File: portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java
Repository: ManyDesigns/Portofino
The code follows secure coding practices. | [
"CWE-347"
] | CVE-2021-29451 | MEDIUM | 6.4 | ManyDesigns/Portofino | getUserPrettyName | portofino-core/src/main/java/com/manydesigns/portofino/shiro/AbstractPortofinoRealm.java | 8c754a0ad234555e813dcbf9e57d637f9f23d8fb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public java.util.Collection<Part> getParts() {
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParts
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | getParts | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private Map<String, CWLElement> getStepInputsOutputs(JsonNode inOut) {
Map<String, CWLElement> returnMap = new HashMap<>();
if (inOut.getClass() == ArrayNode.class) {
// array<WorkflowStepInput>
for (JsonNode inOutNode : inOut) {
if (inOutNode.getClass() == Objec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStepInputsOutputs
File: src/main/java/org/commonwl/view/cwl/CWLService.java
Repository: common-workflow-language/cwlviewer
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-41110 | HIGH | 7.5 | common-workflow-language/cwlviewer | getStepInputsOutputs | src/main/java/org/commonwl/view/cwl/CWLService.java | f6066f09edb70033a2ce80200e9fa9e70a5c29de | 0 |
Analyze the following code function for security vulnerabilities | protected void quickEdit(String previousValue, @StringRes int hint, OnValueEdited callback, boolean permitEmpty) {
quickEdit(previousValue, callback, hint, false, permitEmpty);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: quickEdit
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | quickEdit | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isThirdPartTemplate(Project project) {
return project.getThirdPartTemplate() != null
&& project.getThirdPartTemplate()
&& PlatformPluginService.isPluginPlatform(project.getPlatform());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isThirdPartTemplate
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | isThirdPartTemplate | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public String getSystemMessage() {
return systemMessage;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemMessage
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getSystemMessage | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | void pauseRotationLocked() {
mDeferredRotationPauseCount += 1;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseRotationLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | pauseRotationLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String setValue(String value) {
throw new UnsupportedOperationException("read-only");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setValue
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | setValue | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | protected void engineInit(
int opmode,
Key key,
AlgorithmParameterSpec params,
SecureRandom random)
throws InvalidKeyException, InvalidAlgorithmParameterException
{
CipherParameters param;
if (params == null || params instanceof OAEPParameterS... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: engineInit
File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-361"
] | CVE-2016-1000345 | MEDIUM | 4.3 | bcgit/bc-java | engineInit | prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/CipherSpi.java | 21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35 | 0 |
Analyze the following code function for security vulnerabilities | public static PSystemVersion createTestDot(UmlSource source) throws IOException {
final List<String> strings = new ArrayList<>();
strings.add(Version.fullDescription());
GraphvizUtils.addDotStatus(strings, true);
return new PSystemVersion(source, false, strings);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createTestDot
File: src/net/sourceforge/plantuml/version/PSystemVersion.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | createTestDot | src/net/sourceforge/plantuml/version/PSystemVersion.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | boolean isObscuringDisplay() {
Task task = getTask();
if (task != null && task.getRootTask() != null && !task.getRootTask().fillsParent()) {
return false;
}
return isOpaqueDrawn() && fillsDisplay();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isObscuringDisplay
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | isObscuringDisplay | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | public final R getSomeBuildWithWorkspace() {
int cnt=0;
for (R b = getLastBuild(); cnt<5 && b!=null; b=b.getPreviousBuild()) {
FilePath ws = b.getWorkspace();
if (ws!=null) return b;
}
return null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSomeBuildWithWorkspace
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getSomeBuildWithWorkspace | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | <T> void processQuery(
SQLConnection connection, QueryHelper queryHelper, Integer total, String statMethod,
Function<TotaledResults, T> resultSetMapper, Handler<AsyncResult<T>> replyHandler
) {
long start = System.nanoTime();
log.debug("Attempting query: " + queryHelper.selectQuery);
connection.qu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processQuery
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | processQuery | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isLaunchTransitionFadingAway() {
return mLaunchTransitionFadingAway;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isLaunchTransitionFadingAway
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | isLaunchTransitionFadingAway | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected AbstractSelect createCompatibleSelect(
Class<? extends AbstractSelect> fieldType) {
if (anySelect(fieldType)) {
return super.createCompatibleSelect(ComboBox.class);
}
return super.createCompatibleSelect(fieldType);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createCompatibleSelect
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | createCompatibleSelect | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean jsFunction_isSelfSignupEnabledForTenant(Context cx,
Scriptable thisObj, Object[] args, Function funObj) {
boolean status = false;
if (!isStringArray(args)) {
return status;
}
String tenantDomain = args[0].toString();
try {
UserRegist... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_isSelfSignupEnabledForTenant
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follo... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_isSelfSignupEnabledForTenant | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | private void _skipSpaces () throws JsonParseException
{
final JsonStringBuilder aStrSpaces = m_aSB1.reset ();
while (true)
{
final int c = _readChar ();
// Check for comment
if (c == '/')
{
final int c2 = _readChar ();
if (c2 == '*')
{
if (aStrSp... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _skipSpaces
File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java
Repository: phax/ph-commons
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-34612 | HIGH | 7.5 | phax/ph-commons | _skipSpaces | ph-json/src/main/java/com/helger/json/parser/JsonParser.java | 02a4d034dcfb2b6e1796b25f519bf57a6796edce | 0 |
Analyze the following code function for security vulnerabilities | private void handleIPv4Failure() {
// TODO: Move this to provisioning failure, not DHCP failure.
// DHCPv4 failure is expected on an IPv6-only network.
mWifiDiagnostics.triggerBugReportDataCapture(WifiDiagnostics.REPORT_REASON_DHCP_FAILURE);
if (mVerboseLoggingEnabled) {
int ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleIPv4Failure
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | handleIPv4Failure | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private String createRuntimeSource(RuntimeModel model, String baseClassName, boolean scriptInDocs) {
if (scriptInDocs) {
throw new RuntimeException("Do no know how to clean the block comments yet");
}
SourceWriter writer = new SourceWriter(model);
writer.setScript(stripComme... | Vulnerability Classification:
- CWE: CWE-94
- CVE: CVE-2022-24816
- Severity: HIGH
- CVSS Score: 7.5
Description: Validate Jiffle input variable names according to grammar, escape javadocs when including Jiffle sources in output
Function: createRuntimeSource
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolu... | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | createRuntimeSource | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 1 |
Analyze the following code function for security vulnerabilities | @Override
public ParceledListSlice<ProviderInfo> queryContentProviders(String processName,
int uid, int flags) {
ArrayList<ProviderInfo> finalList = null;
// reader
synchronized (mPackages) {
final Iterator<PackageParser.Provider> i = mProviders.mProviders.values().it... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryContentProviders
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | queryContentProviders | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private native int nativeGetCurrentRenderProcessId(long nativeContentViewCoreImpl); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeGetCurrentRenderProcessId
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | nativeGetCurrentRenderProcessId | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.