instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static DevModeHandlerImpl start(int runningPort, Lookup lookup, File npmFolder, CompletableFuture<Void> waitFor) { ApplicationConfiguration configuration = lookup .lookup(ApplicationConfiguration.class); if (configuration.isProductionMode() || !configur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: start File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-172" ]
CVE-2021-33604
LOW
1.2
vaadin/flow
start
vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc
0
Analyze the following code function for security vulnerabilities
public void setIgnoreTextChangesForAutocomplete(boolean ignoreAutocomplete) { assert mUrlBarDelegate != null; mIgnoreAutocomplete = ignoreAutocomplete; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIgnoreTextChangesForAutocomplete File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
setIgnoreTextChangesForAutocomplete
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_KEYGUARD, conditional = true) public void setKeyguardDisabledFeatures(@Nullable ComponentName admin, int which) { if (mService != null) { try { mService.setKeyguardDisabledFeatures( admin, mContext.getPackag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyguardDisabledFeatures File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setKeyguardDisabledFeatures
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private Syntax getDefaultDocumentSyntax() { Syntax syntax = Utils.getComponent(CoreConfiguration.class).getDefaultDocumentSyntax(); if (syntax == null || (!Utils.getComponentManager().hasComponent(Parser.class, syntax.toIdString()) && !Syntax.XWIKI_2_1.equals(syntax))) { LOG...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDocumentSyntax File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getDefaultDocumentSyntax
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Column(name = "sort", nullable = false) public int getSort() { return this.sort; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSort File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-18927
LOW
3.5
sanluan/PublicCMS
getSort
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java
2b411dc2821c69539138aaf7632b938b659a58fa
0
Analyze the following code function for security vulnerabilities
public static String convertAlternativeFilename(String id) { String convertedId = id; if(id != null) { if(id.endsWith(WIKI_DOT_FILE_SUFFIX)) { convertedId = convertAlternativeFilename(id, WIKI_DOT_FILE_SUFFIX); } else if(id.endsWith(WIKI_DOT_PROPERTIES_SUFFIX)) { convertedId = convertAlternativeFilena...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertAlternativeFilename File: src/main/java/org/olat/modules/wiki/WikiManager.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
convertAlternativeFilename
src/main/java/org/olat/modules/wiki/WikiManager.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
private void editScenario(ApiTestImportRequest request, ScenarioImport apiImport) { SqlSession sqlSession = sqlSessionFactory.openSession(ExecutorType.BATCH); ApiScenarioMapper batchMapper = sqlSession.getMapper(ApiScenarioMapper.class); List<ApiScenarioWithBLOBs> data = apiImport.getData(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: editScenario File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
editScenario
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
@Override public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception { if (!isIgnorableException(cause)) { LOGGER.error("", cause); if (ctx.channel().isActive()) { sendError(ctx, HttpResponseStatus.INTERNAL_SERVER_ERROR); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exceptionCaught File: ratpack-core/src/main/java/ratpack/server/internal/NettyHandlerAdapter.java Repository: ratpack The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-17513
MEDIUM
5
ratpack
exceptionCaught
ratpack-core/src/main/java/ratpack/server/internal/NettyHandlerAdapter.java
efb910d38a96494256f36675ef0e5061097dd77d
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void setTitle(String title) { getContentViewClient().onUpdateTitle(title); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTitle File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
setTitle
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public String getUserPreferenceFromCookie(String prefname, XWikiContext context) { Cookie[] cookies = context.getRequest().getCookies(); if (cookies == null) { return null; } for (Cookie cookie : cookies) { String name = cookie.getName(); if (name....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserPreferenceFromCookie File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getUserPreferenceFromCookie
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
ComponentName startServiceInPackage(int uid, Intent service, String resolvedType, int userId) { synchronized(this) { if (DEBUG_SERVICE) Slog.v(TAG, "startServiceInPackage: " + service + " type=" + resolvedType); final long origId = Binder.clearCallingIdentity(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startServiceInPackage File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startServiceInPackage
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public void config(final OServerNetworkListener iListener, final OServer iServer, final Socket iSocket, final OContextConfiguration iConfiguration) throws IOException { configuration = iConfiguration; registerStatelessCommands(iListener); final String addHeaders = iConfiguration.getValueA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: config File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
config
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
@Override protected void finalize() throws Throwable { try { close(); } finally { super.finalize(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalize File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
finalize
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
@Override public Future<Void> close() { Promise<Void> promise = Promise.promise(); close(promise); return promise.future(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java Repository: vert-x3/vertx-stomp The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-32081
MEDIUM
6.5
vert-x3/vertx-stomp
close
src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java
0de4bc5a44ddb57e74d92c445f16456fa03f265b
0
Analyze the following code function for security vulnerabilities
private static int findNonSPLenient(AppendableCharSequence sb, int offset) { for (int result = offset; result < sb.length(); ++result) { char c = sb.charAtUnsafe(result); // See https://tools.ietf.org/html/rfc7230#section-3.5 if (isSPLenient(c)) { continue; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findNonSPLenient File: codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
findNonSPLenient
codec-http/src/main/java/io/netty/handler/codec/http/HttpObjectDecoder.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
@Override public MergeTarget newEmptyTargetForField( Descriptors.FieldDescriptor descriptor, Message defaultInstance) { throw new UnsupportedOperationException("newEmptyTargetForField() called on FieldSet object"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newEmptyTargetForField File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
newEmptyTargetForField
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
public static BigDecimal toBigDecimal(long seconds, int nanoseconds) { if (nanoseconds == 0L) { // 14-Mar-2015, tatu: Let's retain one zero to avoid interpretation // as integral number if (seconds == 0L) { // except for "0.0" where it can not be done without scientifi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toBigDecimal File: datetime/src/main/java/com/fasterxml/jackson/datatype/jsr310/DecimalUtils.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
toBigDecimal
datetime/src/main/java/com/fasterxml/jackson/datatype/jsr310/DecimalUtils.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
@Override public void onRefresh() { startSync(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRefresh File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onRefresh
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
public boolean isPopup() { return Boolean.valueOf(getParamIsPopup()).booleanValue(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPopup File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
isPopup
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
private void notifyStatusChanged(int moveId, int status, long estMillis) { Slog.v(TAG, "Move " + moveId + " status " + status); final SomeArgs args = SomeArgs.obtain(); args.argi1 = moveId; args.argi2 = status; args.arg3 = estMillis; obtainMessage...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyStatusChanged File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
notifyStatusChanged
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void clearFingerprintRecognized() { mUserFingerprintAuthenticated.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearFingerprintRecognized File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
clearFingerprintRecognized
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private float getFadeoutAlpha() { float alpha = (getNotificationsTopY() + mNotificationStackScroller.getFirstItemMinHeight()) / mQsMinExpansionHeight; alpha = Math.max(0, Math.min(alpha, 1)); alpha = (float) Math.pow(alpha, 0.75); return alpha; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFadeoutAlpha File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getFadeoutAlpha
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public boolean isProvidersListEmpty() { return mProviders.isEmpty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isProvidersListEmpty File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
isProvidersListEmpty
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
public static String getTestStr(String teststr) throws BadFormDesignException { if (StringUtils.isBlank(teststr)) throw new BadFormDesignException("Can't extract the test expression from " + teststr); //get the text inside the quotes, i.e the expression String[] actualExpression = S...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTestStr File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getTestStr
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
public void dump(PrintWriter pw) { pw.println("Dump of PasspointManager"); pw.println("mEnabled: " + mEnabled); pw.println("PasspointManager - Providers Begin ---"); for (Map.Entry<String, PasspointProvider> entry : mProviders.entrySet()) { pw.println(entry.getValue()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dump File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
dump
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private boolean llcpActivated(NfcDepEndpoint device) { Log.d(TAG, "LLCP Activation message"); if (device.getMode() == NfcDepEndpoint.MODE_P2P_TARGET) { if (DBG) Log.d(TAG, "NativeP2pDevice.MODE_P2P_TARGET"); if (device.connect()) { /* Check LL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: llcpActivated File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
llcpActivated
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
public void setEatPrefix(String argEatPrefix) { this.eatPrefix = argEatPrefix; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEatPrefix File: src/main/java/emissary/pickup/WorkBundle.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
setEatPrefix
src/main/java/emissary/pickup/WorkBundle.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
static public InputStream tryOpenAsCompressedFile(File file, String mimeType) { return tryOpenAsCompressedFile(file, mimeType, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryOpenAsCompressedFile File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
tryOpenAsCompressedFile
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
@Deprecated public void saveAllAttachments(boolean updateParent, boolean transaction, XWikiContext context) throws XWikiException { for (XWikiAttachment attachment : this.attachmentList) { saveAttachmentContent(attachment, false, transaction, context); } // Save the ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAllAttachments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
saveAllAttachments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void handleTimeout(int token, Object obj) { // Notify any synchronous waiters Operation op = null; synchronized (mCurrentOpLock) { op = mCurrentOperations.get(token); if (MORE_DEBUG) { if (op == null) Slog.w(TAG, "Timeout of token " + Integer.toHexString(t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleTimeout File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
handleTimeout
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
IPackageManager getPackageManager() { return AppGlobals.getPackageManager(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageManager File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getPackageManager
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public int[] getRunningUserIds() { if (checkCallingPermission(INTERACT_ACROSS_USERS) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: isUserRunning() from pid=" + Binder.getCallingPid() + ", uid=" + Binder....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRunningUserIds File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
getRunningUserIds
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setMetaDataDirty(boolean metaDataDirty) { this.isMetaDataDirty = metaDataDirty; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMetaDataDirty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setMetaDataDirty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override protected <RemoteInterfaceType, RemoteCallResponseType> Map<String, CallResult<RemoteCallResponseType>> requestOnAllNodes( Class<RemoteInterfaceType> interfaceClass, Function<RemoteInterfaceType, Call<RemoteCallResponseType>> fn, Duration timeout) { return super.requestOnAl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestOnAllNodes File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
requestOnAllNodes
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
public void sendConfirmationMail(String xwikiname, String password, String email, String add_message, String contentfield) throws XWikiException { if (hasProgrammingRights()) { this.xwiki.sendConfirmationEmail(xwikiname, password, email, add_message, contentfield, getXWikiContext()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendConfirmationMail File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
sendConfirmationMail
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private String getAttributeValue(Node n, String name) { NamedNodeMap nm = n.getAttributes(); for (int i = 0; i < nm.getLength(); i++) { Node node = nm.item(i); if (name.equals(node.getNodeName())) { return node.getNodeValue(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeValue File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
getAttributeValue
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImport.java
56e76049185bbd87c994128a9d77735ad7af0199
0
Analyze the following code function for security vulnerabilities
@Override public void removeTemplateItem(Context context, Collection collection) throws SQLException, AuthorizeException, IOException { // Check authorisation AuthorizeUtil.authorizeManageTemplateItem(context, collection); Item template = collection.getTemplateItem(); if (t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeTemplateItem File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
removeTemplateItem
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private String[] populateNonExemptAndExemptFromPolicyApps(String[] packageNames, Set<String> outputExemptApps) { Preconditions.checkArgument(outputExemptApps.isEmpty(), "outputExemptApps is not empty"); List<String> exemptAppsList = listPolicyExemptAppsUnchecked(mContext); if (exempt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populateNonExemptAndExemptFromPolicyApps File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
populateNonExemptAndExemptFromPolicyApps
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int getGlobalPrivateDnsMode(@NonNull ComponentName who) { if (!mHasFeature) { return PRIVATE_DNS_MODE_UNKNOWN; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAut...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGlobalPrivateDnsMode File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getGlobalPrivateDnsMode
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public boolean checkPassword(String password, int userId) throws RequestThrottledException { throwIfCalledOnMainThread(); try { VerifyCredentialResponse response = getLockSettings().checkPassword(password, userId); if (response.getResponseCode() == VerifyCrede...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3908 - Severity: MEDIUM - CVSS Score: 4.3 Description: Fix vulnerability in LockSettings service Fixes bug 30003944 Change-Id: I8700d4424c6186c8d5e71d2fdede0223ad86904d (cherry picked from commit 2d71384a139ae27cbc7b57f06662bf6ee2010f2b) Function: checkP...
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
checkPassword
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
1
Analyze the following code function for security vulnerabilities
public void setUsageStatsManager(UsageStatsManagerInternal usageStatsManager) { synchronized (mGlobalLock) { mUsageStatsInternal = usageStatsManager; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUsageStatsManager File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
setUsageStatsManager
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private void repostDelayedHide(int delay) { int recommendedTimeout = mAccessibilityManager.getRecommendedTimeoutMillis(delay, FLAG_CONTENT_ICONS | FLAG_CONTENT_CONTROLS); mMainExecutor.removeCallbacks(mHideMenuRunnable); mMainExecutor.executeDelayed(mHideMenuRunnable, recommended...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: repostDelayedHide File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40123
MEDIUM
5.5
android
repostDelayedHide
libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
7212a4bec2d2f1a74fa54a12a04255d6a183baa9
0
Analyze the following code function for security vulnerabilities
private void setQuery(String rawQuery) { Map<String, String> parameters = new HashMap<>(); // parsing the query parameters try { for (String param : rawQuery.split("&")) { String[] pair = param.split("="); String key = URLDecoder.decode(pair[0], "US-AS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setQuery File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setQuery
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getGlobalNodeProperties() { return globalNodeProperties; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGlobalNodeProperties File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getGlobalNodeProperties
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public void registerUidObserver(IUidObserver observer) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerUidObserver File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
registerUidObserver
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private boolean endCallInternal() { // Always operate on the foreground call if one exists, otherwise get the first call in // priority order by call-state. Call call = mCallsManager.getForegroundCall(); if (call == null) { call = mCallsManager.getFirstCallWithState( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endCallInternal File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
endCallInternal
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
private String marshalSP(ServiceProvider serviceProvider, String tenantDomain) throws IdentityApplicationManagementException { try { JAXBContext jaxbContext = JAXBContext.newInstance(ServiceProvider.class); Marshaller marshaller = jaxbContext.createMarshaller(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshalSP File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framewor...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
marshalSP
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("resource") // Clears warning about RandomAccessFile not // being closed. It is closed in operationComplete(). public void sendFile(final HttpResponseStatus status, final String path, final int max_age) throws IOException { if (max_age < 0) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendFile File: src/tsd/HttpQuery.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
sendFile
src/tsd/HttpQuery.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public ClientConfig getDefaultClientConfig() { ClientConfig clientConfig = new ClientConfig(); clientConfig.register(MultiPartFeature.class); clientConfig.register(json); clientConfig.register(JacksonFeature.class); clientConfig.property(HttpUrlConnectorProvider.SET_METHOD_WORKAROUND, true); // ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultClientConfig File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secu...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getDefaultClientConfig
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected void internalResetCursor(AsyncResponse asyncResponse, String subName, long timestamp, boolean authoritative) { if (topicName.isGlobal()) { try { validateGlobalNamespaceOwnership(namespaceName); } catch (Exception e) { log.warn("[{}][{...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalResetCursor File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalResetCursor
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
@Override public void onPackagesSuspendedChanged(String[] packages, boolean suspended, int userId) { synchronized (mGlobalLock) { mRecentTasks.onPackagesSuspendedChanged(packages, suspended, userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPackagesSuspendedChanged File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
onPackagesSuspendedChanged
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public Group findByName(Context context, String name) throws SQLException { if (name == null) { return null; } return groupDAO.findByName(context, name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByName File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
findByName
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private String getTitle(XWikiRequest request, XWikiDocument newDocument, boolean isSpace) { String title = request.getParameter("title"); if (StringUtils.isEmpty(title)) { if (isSpace) { title = newDocument.getDocumentReference().getLastSpaceReference().getName(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTitle File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
getTitle
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/CreateAction.java
30c52b01559b8ef5ed1035dac7c34aaf805764d5
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<Project> getProjects() { return Util.createSubList(items.values(),Project.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProjects File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getProjects
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public static boolean moduloPredicateImpl(URI input, int readerNumber, int numReaders) { int hash = input.hashCode(); if (hash == Integer.MIN_VALUE) { hash = 0; // Math.abs(Integer.MIN_VALUE) == Integer.MIN_VALUE } return Math.abs(hash) % numReaders == ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moduloPredicateImpl File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
moduloPredicateImpl
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
private static void printModule(MapValue module, int dateColWidth, int versionColWidth, int authorsColWidth, int nameColWidth, int descColWidth, int minDescColWidth) { String orgName = module.getStringValue("orgName"); String packageName = module.getStringValue("name"); printInCLI("|...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: printModule File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
printModule
cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
@Nullable private String remove0(int h, int i, CharSequence name) { HeaderEntry e = entries[i]; if (e == null) { return null; } String value = null; HeaderEntry next = e.next; while (next != null) { if (next.hash == h && keyEquals(next.key, na...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: remove0 File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
remove0
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public void setContent(ByteBuf buffer) throws IOException { ObjectUtil.checkNotNull(buffer, "buffer"); try { size = buffer.readableBytes(); checkSize(size); if (definedSize > 0 && definedSize < size) { throw new IOException("Out of size: ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContent File: codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
setContent
codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
private static boolean installForwardLocked(int installFlags) { return (installFlags & PackageManager.INSTALL_FORWARD_LOCK) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installForwardLocked File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
installForwardLocked
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public int sendIntentSender(IIntentSender target, IBinder whitelistToken, int code, Intent intent, String resolvedType, IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) { if (target instanceof PendingIntentRecord) { return ((PendingIn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
sendIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void endList(ListType type, Map<String, String> parameters) { if (type == ListType.BULLETED) { getXHTMLWikiPrinter().printXMLEndElement("ul"); } else { getXHTMLWikiPrinter().printXMLEndElement("ol"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endList File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
endList
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public LlcpServerSocket createLlcpServerSocket(int sap, String sn, int miu, int rw, int linearBufferLength) throws LlcpException { return mDeviceHost.createLlcpServerSocket(sap, sn, miu, rw, linearBufferLength); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createLlcpServerSocket File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
createLlcpServerSocket
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
boolean isRestoring() { return isRestoring; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRestoring File: Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/ArchivePlugin.java Repository: NationalSecurityAgency/ghidra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-13623
MEDIUM
6.8
NationalSecurityAgency/ghidra
isRestoring
Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/ArchivePlugin.java
6c0171c9200b4490deb94abf3c92d1b3da59f9bf
0
Analyze the following code function for security vulnerabilities
@Nullable @Override public CharSequence getPageTitle(int position) { switch (position) { case 0: return getResources().getString(R.string.contacts); case 1: return getResources().getString(R.string.conferences); default: return super.getPageTitle(position); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPageTitle File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
getPageTitle
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public void onSaveInstanceState(Bundle b) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSaveInstanceState File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onSaveInstanceState
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private String localizePlainOrKey(String key, Object... parameters) { return StringUtils.defaultString(getLocalization().getTranslationPlain(key, parameters), key); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: localizePlainOrKey File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
localizePlainOrKey
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
protected Lock getSessionLock(WrappedSession wrappedSession) { Object lock = wrappedSession.getAttribute(getLockAttributeName()); if (lock instanceof ReentrantLock) { return (ReentrantLock) lock; } if (lock == null) { return null; } throw new Ru...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionLock File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
getSessionLock
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
@Override public void init(Application application) { prettyPrint = application.getPippoSettings().isDev(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java Repository: pippo-java/pippo The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20059
HIGH
7.5
pippo-java/pippo
init
pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java
9f36e5891c0b11f840e1e1561ae96d83ba9ce759
0
Analyze the following code function for security vulnerabilities
@Override public void addSyncStanzaListener(StanzaListener packetListener, StanzaFilter packetFilter) { if (packetListener == null) { throw new NullPointerException("Packet listener is null."); } ListenerWrapper wrapper = new ListenerWrapper(packetListener, packetFilter); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addSyncStanzaListener File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
addSyncStanzaListener
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasForegroundServiceNotification(String pkg, int userId, String channelId) { synchronized (ActivityManagerService.this) { return mServices.hasForegroundServiceNotificationLocked(pkg, userId, channelId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasForegroundServiceNotification File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
hasForegroundServiceNotification
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private void moveDoPoliciesToProfileParentAdminLocked( ActiveAdmin doAdmin, ActiveAdmin parentAdmin) { // The following policies can be already controlled via parent instance, skip if so. if (parentAdmin.mPasswordPolicy.quality == PASSWORD_QUALITY_UNSPECIFIE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveDoPoliciesToProfileParentAdminLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
moveDoPoliciesToProfileParentAdminLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void ensureNotImmutable(@NonNull String id, boolean ignoreInvisible) { ensureNotImmutable(findShortcutById(id), ignoreInvisible); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureNotImmutable File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
ensureNotImmutable
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
public void setIp(String ip) { this.ip = ip; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIp File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogOperate.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setIp
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogOperate.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
public String detail() { return detail(convertRequestParam(getPara())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detail File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
detail
web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
public static String getValue(Map<String, String[]> parameterMap, String key) { String[] values = parameterMap.get(key); if (CommonUtils.notEmpty(values)) { return values[0]; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValue File: publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getValue
publiccms-parent/publiccms-common/src/main/java/com/publiccms/common/tools/RequestUtils.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@Override protected void runTeardown() { Assert.assertTrue("HTTP connection is not allowed", messagedAccessDenied); }
Vulnerability Classification: - CWE: CWE-862 - CVE: CVE-2019-10648 - Severity: HIGH - CVSS Score: 7.5 Description: Bug-406: DNS interaction is not blocked by Robocode's security manager + test(s) to verify the fix Function: runTeardown File: robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java...
[ "CWE-862" ]
CVE-2019-10648
HIGH
7.5
robo-code/robocode
runTeardown
robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java
836c84635e982e74f2f2771b2c8640c3a34221bd
1
Analyze the following code function for security vulnerabilities
private long getFadeOutDuration(@AnimationType int animationType) { switch (animationType) { case ANIM_TYPE_NONE: return ANIMATION_NONE_DURATION_MS; case ANIM_TYPE_HIDE: return ANIMATION_HIDE_DURATION_MS; case ANIM_TYPE_DISMISS: ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFadeOutDuration File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40123
MEDIUM
5.5
android
getFadeOutDuration
libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
7212a4bec2d2f1a74fa54a12a04255d6a183baa9
0
Analyze the following code function for security vulnerabilities
public boolean isFingerprintDetectionRunning() { return mFingerprintRunningState == FINGERPRINT_STATE_RUNNING; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFingerprintDetectionRunning File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
isFingerprintDetectionRunning
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting boolean injectIsLowRamDevice() { return ActivityManager.isLowRamDeviceStatic(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectIsLowRamDevice File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectIsLowRamDevice
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public void rename(DocumentReference newReference) throws XWikiException { if (hasAccessLevel("delete") && this.context.getWiki().checkAccess("edit", this.context.getWiki().getDocument(newReference, this.context), this.context)) { this.getDoc().rename(newReference, getXWikiContext())...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rename File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
rename
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (getClass() != obj.getClass()) return false; CertRetrievalRequest other = (CertRetrievalRequest) obj; return Objects.equals(certId...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
equals
base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public Bundle getActivityOptions(IBinder token) { final long origId = Binder.clearCallingIdentity(); try { synchronized (this) { final ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r != null) { final ActivityOp...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActivityOptions File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getActivityOptions
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void logAppCompatState() { mTaskSupervisor.getActivityMetricsLogger().logAppCompatState(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logAppCompatState File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
logAppCompatState
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private void configureRandomizedMacAddress(WifiConfiguration config) { if (config == null) { Log.e(getTag(), "No config to change MAC address to"); return; } String currentMacString = mWifiNative.getMacAddress(mInterfaceName); MacAddress currentMac = getMacAddress...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configureRandomizedMacAddress File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
configureRandomizedMacAddress
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
protected void setFiles(VFSContainer rootContainer, List<VFSLeaf> files) { StringBuilder subjectSb = new StringBuilder(); if (StringHelper.containsNonWhitespace(subjectElement.getValue())) { subjectSb.append(subjectElement.getValue()).append('\n').append('\n'); } StringBuilder bodySb = new StringBuilder(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFiles File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
setFiles
src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
private Configuration populateConfig(Set<TemplateDescriptorEntity> templates, List<GlobalFunctionEntity> globalFunctionTemplates, AMWTemplateExceptionHandler templateExceptionHandler) { Configuration cfg = getConfiguration(templateExceptionHandler); StringTemplat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populateConfig File: AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java Repository: liimaorg/liima The code follows secure coding practices.
[ "CWE-917" ]
CVE-2023-26092
CRITICAL
9.8
liimaorg/liima
populateConfig
AMW_business/src/main/java/ch/puzzle/itc/mobiliar/business/generator/control/extracted/templates/BaseTemplateProcessor.java
78ba2e198c615dc8858e56eee3290989f0362686
0
Analyze the following code function for security vulnerabilities
void columnReorder(ColumnReorderEvent event);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: columnReorder File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
columnReorder
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public String getIccSerialNumberForSubscriber(int subId) { PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(subId); if (phoneSubInfoProxy != null) { return phoneSubInfoProxy.getIccSerialNumber(); } else { Rlog.e(TAG,"getIccSerialNumber phoneSubInfoProxy is" + ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIccSerialNumberForSubscriber File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getIccSerialNumberForSubscriber
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthCredentials(String clientId, String clientSecret) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setCredentials(clientId, clientSecret, isDebugging()); return this; } } throw new RuntimeException("No O...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthCredentials File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding pract...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthCredentials
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected void prepForProcessing() { clearValidationExceptions(); setOverWriteExistingData(true); setIgnoreDuplicates(false); jobGroupsToDelete.clear(); jobsToDelete.clear(); triggerGroupsToDelete.clear(); triggersToDelete.clear(); l...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: prepForProcessing File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
prepForProcessing
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
@Override public void roundToIncrement(BigDecimal roundingIncrement, MathContext mathContext) { // TODO(13701): Avoid this check on every call to roundToIncrement(). BigDecimal stripped = roundingIncrement.stripTrailingZeros(); if (stripped.unscaledValue().compareTo(BigInteger.valueOf(5)) ==...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: roundToIncrement File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
roundToIncrement
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder2 text(String value) { return this.text(value, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: text File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
text
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
protected void toggleKeyboardShortcuts(int deviceId) { KeyboardShortcuts.toggle(mContext, deviceId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toggleKeyboardShortcuts File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
toggleKeyboardShortcuts
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static Response createCorrectVariant(String responseObj, HttpHeaders headers, javax.ws.rs.core.Response.Status status) { Response.ResponseBuilder responseBuilder = null; Variant v = getVariant(headers); if( status != null ) { responseBuilder = Response.status(status).entity(r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createCorrectVariant File: kie-server-parent/kie-server-controller/kie-server-controller-rest/src/main/java/org/kie/server/controller/rest/ControllerUtils.java Repository: kiegroup/droolsjbpm-integration The code foll...
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
createCorrectVariant
kie-server-parent/kie-server-controller/kie-server-controller-rest/src/main/java/org/kie/server/controller/rest/ControllerUtils.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
0
Analyze the following code function for security vulnerabilities
public TMap readMapBegin() throws TException { return new TMap(readByte(), readByte(), readI32()); }
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2019-11938 - Severity: MEDIUM - CVSS Score: 5.0 Description: Java: Check the size of the remaining frame before deserializing collection Summary: In order to avoid over-allocating memory for malformed or truncated frame, we ensure that we have enough data (we on...
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readMapBegin
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
71c97ffdcb61cccf1f8267774e873e21ebd3ebd3
1
Analyze the following code function for security vulnerabilities
@Override public void onEmptySpaceClicked(float x, float y) { onEmptySpaceClick(x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEmptySpaceClicked File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onEmptySpaceClicked
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public boolean isControllerAMonkey() { synchronized (mGlobalLock) { return mController != null && mControllerIsAMonkey; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isControllerAMonkey File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
isControllerAMonkey
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public void resetThrottling() { enforceSystemOrShell(); resetThrottlingInner(getCallingUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetThrottling File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
resetThrottling
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public int getLastSelectedNetwork() { return mLastSelectedNetworkId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastSelectedNetwork File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getLastSelectedNetwork
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public Column<T, ?> addColumn(String propertyName, AbstractRenderer<? super T, ?> renderer) { Objects.requireNonNull(propertyName, "Property name cannot be null"); Objects.requireNonNull(renderer, "Renderer cannot be null"); if (getColumn(propertyName) != null) { throw n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumn
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0