instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public void setAccountManagementDisabled(ComponentName who, String accountType,
boolean disabled, boolean parent) {
if (!mHasFeature) {
return;
}
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(wh... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2023-21284
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Ensure policy has no absurdly long strings
The following APIs now enforce limits and throw IllegalArgumentException
when limits are violated:
* DPM.setTrustAgentConfiguration() limits agent packgage nam... | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setAccountManagementDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 1 |
Analyze the following code function for security vulnerabilities | public List<Diagnostic> doDiagnostics(DOMDocument xmlDocument, CancelChecker monitor,
XMLValidationSettings validationSettings) {
return diagnostics.doDiagnostics(xmlDocument, monitor, validationSettings);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doDiagnostics
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-18212 | MEDIUM | 4 | eclipse/lemminx | doDiagnostics | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java | e37c399aa266be1b7a43061d4afc43dc230410d2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCreateContextMenu(ContextMenu menu, View v, ContextMenuInfo menuInfo) {
synchronized (this.messageList) {
super.onCreateContextMenu(menu, v, menuInfo);
AdapterView.AdapterContextMenuInfo acmi = (AdapterContextMenuInfo) menuInfo;
this.selectedMessag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreateContextMenu
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onCreateContextMenu | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | private static void securityXmlGenerator(XmlGenerator gen, Config config) {
SecurityConfig c = config.getSecurityConfig();
if (c == null) {
return;
}
gen.open("security", "enabled", c.isEnabled())
.node("client-block-unmapped-actions", c.getClientBlockUnmappedActi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: securityXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | securityXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public String getPreviousDocstructUrl() throws IndexUnreachableException, PresentationException, DAOException, ViewerConfigurationException {
// logger.trace("getPreviousDocstructUrl");
if (viewManager == null) {
return null;
}
List<String> docstructTypes =
Da... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPreviousDocstructUrl
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | getPreviousDocstructUrl | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | public ResourceInfo findResource(String libraryName, String resourceName, String contentType, boolean isViewResource, FacesContext ctx) {
String localePrefix = getLocalePrefix(ctx);
List<String> contracts = getResourceLibraryContracts(ctx);
ResourceInfo info = getFromCache(reso... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findResource
File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | findResource | impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | void tearDownAgentAndKill(ApplicationInfo app) {
try {
// unbind and tidy up even on timeout or failure, just in case
mActivityManager.unbindBackupAgent(app);
// The agent was running with a stub Application object, so shut it down.
// !!! We hardcode the confirm... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tearDownAgentAndKill
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | tearDownAgentAndKill | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | public void setImageToShow(String imageToShow) {
synchronized (lock) {
this.imageToShow = imageToShow;
if (viewManager != null) {
viewManager.setDropdownSelected(String.valueOf(imageToShow));
}
// Reset LOGID (the LOGID setter is called later by Pr... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-29014
- Severity: MEDIUM
- CVSS Score: 6.1
Description: Only allow setting logId to a value matching [\w-]+
refs #24571
Function: setImageToShow
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/... | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | setImageToShow | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 1 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public <P extends ParaObject> P populate(HttpServletRequest req, P pobj, String... paramName) {
if (pobj == null || paramName == null) {
return pobj;
}
Map<String, Object> data = new LinkedHashMap<String, Object>();
if (isApiRequest(req)) {
try {
data = (Map<String, Obj... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: populate
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | populate | src/main/java/com/erudika/scoold/utils/ScooldUtils.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public File downloadFileFromResponse(Response response) throws ApiException {
try {
File file = prepareDownloadFile(response);
Files.copy(response.readEntity(InputStream.class), file.toPath(), StandardCopyOption.REPLACE_EXISTING);
return file;
} catch (IOException e) {
throw new ApiExcep... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: downloadFileFromResponse
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | downloadFileFromResponse | samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public List<IFileAsset> fromContentletsI(List<Contentlet> cons) {
List<IFileAsset> fas = new ArrayList<IFileAsset>();
for (Contentlet con : cons) {
fas.add(fromContentlet(con));
}
return fas;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fromContentletsI
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | fromContentletsI | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | ab2bb2e00b841d131b8734227f9106e3ac31bb99 | 0 |
Analyze the following code function for security vulnerabilities | private List<? extends Post> getPostsForUser(String type, Pager pager) {
pager.setSortby("votes");
return client().findTerms(type, Collections.singletonMap(Config._CREATORID, getId()), true, pager);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPostsForUser
File: src/main/java/com/erudika/scoold/core/Profile.java
Repository: Erudika/scoold
The code follows secure coding practices. | [
"CWE-130"
] | CVE-2022-1543 | MEDIUM | 6.5 | Erudika/scoold | getPostsForUser | src/main/java/com/erudika/scoold/core/Profile.java | 62a0e92e1486ddc17676a7ead2c07ff653d167ce | 0 |
Analyze the following code function for security vulnerabilities | public static Map<Object,Object> getSystemProperties(VirtualChannel channel) throws IOException, InterruptedException {
if(channel==null)
return Collections.<Object,Object>singletonMap("N/A","N/A");
return channel.call(new GetSystemProperties());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemProperties
File: core/src/main/java/hudson/util/RemotingDiagnostics.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-2068 | LOW | 3.5 | jenkinsci/jenkins | getSystemProperties | core/src/main/java/hudson/util/RemotingDiagnostics.java | 0530a6645aac10fec005614211660e98db44b5eb | 0 |
Analyze the following code function for security vulnerabilities | private List<ResolveInfo> collectReceiverComponents(Intent intent, String resolvedType,
int callingUid, int[] users) {
// TODO: come back and remove this assumption to triage all broadcasts
int pmFlags = STOCK_PM_FLAGS | MATCH_DEBUG_TRIAGED_MISSING;
List<ResolveInfo> receivers = nul... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: collectReceiverComponents
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | collectReceiverComponents | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static long estimateMaxDirectMemory() {
long maxDirectMemory = 0;
ClassLoader systemClassLoader = null;
try {
systemClassLoader = getSystemClassLoader();
// When using IBM J9 / Eclipse OpenJ9 we should not use VM.maxDirectMemory() as it not reflects the
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: estimateMaxDirectMemory
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | estimateMaxDirectMemory | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | private void scheduleSaveBaseState() {
scheduleSaveInner(UserHandle.USER_NULL); // Special case -- use USER_NULL for base state.
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleSaveBaseState
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | scheduleSaveBaseState | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public void reload(boolean checkForRepost) {
mAccessibilityInjector.addOrRemoveAccessibilityApisIfNecessary();
if (mNativeContentViewCore != 0) {
nativeReload(mNativeContentViewCore, checkForRepost);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: reload
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | reload | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private void addNewJar(final JARDesc desc, UpdatePolicy updatePolicy) {
available.add(desc);
tracker.addResource(desc.getLocation(),
desc.getVersion(),
null,
updatePolicy
);
// Give read permissions to the cached jar file
AccessC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addNewJar
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | addNewJar | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | private void quitRoom(String room) {
Log.d(TAG, "Leaving MUC " + room);
MultiUserChat muc = multiUserChats.get(room);
muc.leave();
multiUserChats.remove(room);
mucLastPong.remove(room);
mContentResolver.delete(RosterProvider.CONTENT_URI, "jid = ?", new String[] {room});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: quitRoom
File: src/org/yaxim/androidclient/service/SmackableImp.java
Repository: ge0rg/yaxim
The code follows secure coding practices. | [
"CWE-20",
"CWE-346"
] | CVE-2017-5589 | MEDIUM | 4.3 | ge0rg/yaxim | quitRoom | src/org/yaxim/androidclient/service/SmackableImp.java | 65a38dc77545d9568732189e86089390f0ceaf9f | 0 |
Analyze the following code function for security vulnerabilities | void adjustStartingWindowFlags() {
if (mAttrs.type == TYPE_BASE_APPLICATION && mActivityRecord != null
&& mActivityRecord.mStartingWindow != null) {
// Special handling of starting window over the base
// window of the app: propagate lock screen flags to it,
/... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: adjustStartingWindowFlags
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | adjustStartingWindowFlags | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private static void memberAddressProviderConfigXmlGenerator(XmlGenerator gen, NetworkConfig netCfg) {
MemberAddressProviderConfig memberAddressProviderConfig = netCfg.getMemberAddressProviderConfig();
if (memberAddressProviderConfig == null) {
return;
}
String className = cla... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: memberAddressProviderConfigXmlGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | memberAddressProviderConfigXmlGenerator | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public boolean equals(
Object obj)
{
if (!(obj instanceof DHPublicKeyParameters))
{
return false;
}
DHPublicKeyParameters other = (DHPublicKeyParameters)obj;
return other.getY().equals(y) && super.equals(obj);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equals
File: core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2016-1000339 | MEDIUM | 5 | bcgit/bc-java | equals | core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java | 413b42f4d770456508585c830cfcde95f9b0e93b | 0 |
Analyze the following code function for security vulnerabilities | private static boolean isCompatible(HotRestartConfig c1, HotRestartConfig c2) {
boolean c1Disabled = c1 == null || !c1.isEnabled();
boolean c2Disabled = c2 == null || !c2.isEnabled();
return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.isFsync(), c2.isF... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCompatible
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | isCompatible | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public WifiEnterpriseConfig createFromParcel(Parcel in) {
WifiEnterpriseConfig enterpriseConfig = new WifiEnterpriseConfig();
int count = in.readInt();
for (int i = 0; i < count; i++) {
String key = in.readString();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createFromParcel
File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3897 | MEDIUM | 4.3 | android | createFromParcel | wifi/java/android/net/wifi/WifiEnterpriseConfig.java | 81be4e3aac55305cbb5c9d523cf5c96c66604b39 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onError(Exception exception) {
error = true;
errorException = exception;
if (paused) {
if (FileDownloadLog.NEED_LOG) {
FileDownloadLog.d(this, "the task[%d] has already been paused, so pass the"
+ " error callback", m... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onError
File: library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java
Repository: lingochamp/FileDownloader
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-11248 | HIGH | 7.5 | lingochamp/FileDownloader | onError | library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java | b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
private void finishForceStopPackageLocked(final String packageName, int uid) {
Intent intent = new Intent(Intent.ACTION_PACKAGE_RESTARTED,
Uri.fromParts("package", packageName, null));
if (!mProcessesReady) {
intent.addFlags(Intent.FLAG_RECEIVER_REGISTE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: finishForceStopPackageLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | finishForceStopPackageLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static JSONObject toJSONObject(Reader reader, XMLParserConfiguration config) throws JSONException {
JSONObject jo = new JSONObject();
XMLTokener x = new XMLTokener(reader);
while (x.more()) {
x.skipPast("<");
if(x.more()) {
parse(x, jo, null, config... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2022-45688
- Severity: HIGH
- CVSS Score: 7.5
Description: fix: limit the nesting depth
Function: toJSONObject
File: src/main/java/org/json/XML.java
Repository: stleary/JSON-java
Fixed Code:
public static JSONObject toJSONObject(Reader reader, XMLParserConfigur... | [
"CWE-787"
] | CVE-2022-45688 | HIGH | 7.5 | stleary/JSON-java | toJSONObject | src/main/java/org/json/XML.java | f566a1d9ee1f8139357017dc6c7def1da19cd8d4 | 1 |
Analyze the following code function for security vulnerabilities | @Nullable
private FileInput toFileInput(String fileUri, Settings withClauseOptions) {
URI uri = toURI(fileUri);
FileInputFactory fileInputFactory = fileInputFactories.get(uri.getScheme());
if (fileInputFactory != null) {
try {
return fileInputFactory.create(uri, w... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2024-24565
- Severity: MEDIUM
- CVSS Score: 6.5
Description: Restrict `COPY FROM` using local files to superuser
Fixing a security issue where any user could read/import content
of any file on the host system, the CrateDB process user has read
access to.
Functio... | [
"CWE-22"
] | CVE-2024-24565 | MEDIUM | 6.5 | crate | toFileInput | server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java | 4e857d675683095945dd524d6ba03e692c70ecd6 | 1 |
Analyze the following code function for security vulnerabilities | private void applyConfiguredHeaders(MutableHttpHeaders headers) {
if (serverConfiguration.isDateHeader() && !headers.contains("Date")) {
headers.date(LocalDateTime.now());
}
serverConfiguration.getServerHeader().ifPresent((server) -> {
if (!headers.contains("Server")) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: applyConfiguredHeaders
File: http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | applyConfiguredHeaders | http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public SaReactorFilter addInclude(String... paths) {
includeList.addAll(Arrays.asList(paths));
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addInclude
File: sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | addInclude | sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | protected long indexCount(String query) {
String qq=findAndReplaceQueryDates(translateQuery(query, null).getQuery());
// we check the query to figure out wich indexes to hit
String indexToHit;
IndiciesInfo info;
try {
info=APILocator.getIndiciesAPI().loadIndicies();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: indexCount
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | indexCount | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | private int getAccountVisibilityFromCache(Account account, String packageName,
UserAccounts accounts) {
synchronized (accounts.cacheLock) {
Map<String, Integer> accountVisibility =
getPackagesAndVisibilityForAccountLocked(account, accounts);
Integer visibi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAccountVisibilityFromCache
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | getAccountVisibilityFromCache | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | KeyMapper<Object> getKeyMapper() {
return datasourceExtension.getKeyMapper();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getKeyMapper
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getKeyMapper | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
private HashMap<String, String> getExtraPropertyValues(HttpServletRequest request) {
// process extra properties
HashMap<String, String> properties = new HashMap<>();
Enumeration<String> parameters = request.getParameterNames();
while (parameters.hasMoreElements()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getExtraPropertyValues
File: core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | getExtraPropertyValues | core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | @PermissionCheckerManager.PermissionResult
@RequiresPermission(value = Manifest.permission.UPDATE_APP_OPS_STATS, conditional = true)
public int checkPermissionForStartDataDelivery(@NonNull String permission,
@NonNull AttributionSource attributionSource, @Nullable String message) {
return Per... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkPermissionForStartDataDelivery
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | checkPermissionForStartDataDelivery | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getRobotNames() {
return "tested.robots.HttpAttack,sample.Target";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRobotNames
File: robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java
Repository: robo-code/robocode
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2019-10648 | HIGH | 7.5 | robo-code/robocode | getRobotNames | robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java | 836c84635e982e74f2f2771b2c8640c3a34221bd | 0 |
Analyze the following code function for security vulnerabilities | public static Version getVersion() {
return VERSION;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVersion
File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
Repository: geotools
The code follows secure coding practices. | [
"CWE-917"
] | CVE-2022-24818 | HIGH | 7.5 | geotools | getVersion | modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java | 4f70fa3234391dd0cda883a20ab0ec75688cba49 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected FooterRow createRow() {
return new FooterRow(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createRow
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | createRow | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public String getRootUrlFromRequest() {
StaplerRequest req = Stapler.getCurrentRequest();
StringBuilder buf = new StringBuilder();
buf.append(req.getScheme()+"://");
buf.append(req.getServerName());
if(req.getServerPort()!=80)
buf.append(':').append(req.getServerPort(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRootUrlFromRequest
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getRootUrlFromRequest | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public static String getTagText(Element element, String tag) {
try {
// From root element, identify first with tag, then find the
// first child under that, which we treat as a TEXT node.
Element firstElt = getFirstTag(element, tag);
if (firstElt == null) return "";
return getEltText(f... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTagText
File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
Repository: stanfordnlp/CoreNLP
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-3878 | HIGH | 7.5 | stanfordnlp/CoreNLP | getTagText | src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java | e5bbe135a02a74b952396751ed3015e8b8252e99 | 0 |
Analyze the following code function for security vulnerabilities | private void revisitSequenceFlows(Definitions def, String orig) {
try {
Map<String, Map<String, String>> sequenceFlowMapping = new HashMap<String, Map<String,String>>();
XMLInputFactory factory = XMLInputFactory.newInstance();
XMLStreamReader reader = factory.createXMLStreamR... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: revisitSequenceFlows
File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
Repository: kiegroup/jbpm-designer
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2017-7545 | MEDIUM | 4 | kiegroup/jbpm-designer | revisitSequenceFlows | jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java | a143f3b92a6a5a527d929d68c02a0c5d914ab81d | 0 |
Analyze the following code function for security vulnerabilities | String getName(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getName
File: ethereum/api/src/main/java/org/hyperledger/besu/ethereum/api/jsonrpc/internal/methods/JsonRpcMethod.java
Repository: hyperledger/besu
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-21369 | MEDIUM | 4 | hyperledger/besu | getName | ethereum/api/src/main/java/org/hyperledger/besu/ethereum/api/jsonrpc/internal/methods/JsonRpcMethod.java | 06e35a58c07a30c0fbdc0aae45a3e8b06b53c022 | 0 |
Analyze the following code function for security vulnerabilities | public void setClientKeyId(String clientKeyId) {
attributes.put(CLIENT_KEY_ID, clientKeyId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClientKeyId
File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setClientKeyId | base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static void zipFolder(String srcFolder, String destZipFile, String ignore) throws Exception {
try (FileOutputStream fileWriter = new FileOutputStream(destZipFile);
ZipOutputStream zip = new ZipOutputStream(fileWriter)){
addFolderToZip("", srcFolder, zip, ignore);
zip.... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-21675
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Mitigate Zip Slip exlpoit
Function: zipFolder
File: src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java
Repository: Konloch/bytecode-viewer
Fixed Code:
public static void zipFolder(String... | [
"CWE-22"
] | CVE-2022-21675 | MEDIUM | 6.8 | Konloch/bytecode-viewer | zipFolder | src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java | c968e94b2c93da434a4ecfac6d08eda162d615d0 | 1 |
Analyze the following code function for security vulnerabilities | @Select("delete from sys_dict where id = #{id}")
public void deleteOneById(@Param("id") String id); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteOneById
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45207 | CRITICAL | 9.8 | jeecgboot/jeecg-boot | deleteOneById | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java | 8632a835c23f558dfee3584d7658cc6a13ccec6f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public WorkflowInstance ingest(MediaPackage mp, String wd, Map<String, String> properties)
throws IngestException, NotFoundException {
try {
return ingest(mp, wd, properties, null);
} catch (UnauthorizedException e) {
throw new IllegalStateException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ingest
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | ingest | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void stopLockTaskModeOnCurrent() throws RemoteException {
enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
"stopLockTaskModeOnCurrent");
long ident = Binder.clearCallingIdentity();
try {
stopLockTaskMode();
} fi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopLockTaskModeOnCurrent
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | stopLockTaskModeOnCurrent | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Nullable public WifiConfiguration getConnectedWifiConfiguration() {
if (!isConnected()) return null;
return getConnectedWifiConfigurationInternal();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConnectedWifiConfiguration
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | getConnectedWifiConfiguration | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private boolean deliverPreBootCompleted(final Runnable onFinishCallback,
ArrayList<ComponentName> doneReceivers, int userId) {
boolean waitingUpdate = false;
Intent intent = new Intent(Intent.ACTION_PRE_BOOT_COMPLETED);
List<ResolveInfo> ris = null;
try {
ris = Ap... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deliverPreBootCompleted
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | deliverPreBootCompleted | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public AppointmentService getAppointmentService() {
return appointmentService;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppointmentService
File: api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java
Repository: openmrs/openmrs-module-appointmentscheduling
The code follows secure coding pr... | [
"CWE-79"
] | CVE-2020-36635 | MEDIUM | 5.4 | openmrs/openmrs-module-appointmentscheduling | getAppointmentService | api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java | 34213c3f6ea22df427573076fb62744694f601d8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void abortPulsing() {
mDozeScrimController.abortPulsing();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: abortPulsing
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | abortPulsing | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static Traverser<File> fileTraverser() {
return Traverser.forTree(FILE_TREE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fileTraverser
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | fileTraverser | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getTagForIntentSender(IIntentSender pendingResult, String prefix) {
if (!(pendingResult instanceof PendingIntentRecord)) {
return null;
}
try {
PendingIntentRecord res = (PendingIntentRecord)pendingResult;
Intent intent = res.key.re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTagForIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getTagForIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
@Override
public T deserialize(JsonParser parser, DeserializationContext context) throws IOException
{
//NOTE: Timestamps contain no timezone info, and are always in configured TZ. Only
//string values have to be adjusted to the configured TZ.
switch (p... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2018-1000873
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Avoid latency problems converting decimal to time.
Fixes https://github.com/FasterXML/jackson-databind/issues/2141
Function: deserialize
File: datetime/src/main/java/com/fasterxml/jackson/datatype/js... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | deserialize | datetime/src/main/java/com/fasterxml/jackson/datatype/jsr310/deser/InstantDeserializer.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 1 |
Analyze the following code function for security vulnerabilities | static long parseLongAttribute(TypedXmlPullParser parser, String attribute) {
return parseLongAttribute(parser, attribute, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseLongAttribute
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | parseLongAttribute | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setHttpClient(Client httpClient) {
this.httpClient = httpClient;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHttpClient
File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setHttpClient | samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Nonnull
public Long getTranslationCachesExpireAfterWriteInMinutes() {
return myTranslationCachesExpireAfterWriteInMinutes;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTranslationCachesExpireAfterWriteInMinutes
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | getTranslationCachesExpireAfterWriteInMinutes | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | protected void extendLink(EntityReference reference, Set<String> linksExtended)
{
for (EntityReference parent =
reference.getParameters().isEmpty() ? reference : new EntityReference(reference.getName(),
reference.getType(), reference.getParent(), null); parent != null; parent = p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extendLink
File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java
Repository: ... | [
"CWE-312",
"CWE-200"
] | CVE-2023-50719 | HIGH | 7.5 | xwiki/xwiki-platform | extendLink | xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java | 3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea | 0 |
Analyze the following code function for security vulnerabilities | OortComet createOortComet(String cometURL) {
return _membership.createOortComet(cometURL);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createOortComet
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | createOortComet | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public FileVisitResult visitFile(Path file, BasicFileAttributes attrs)
throws IOException {
Path relativeFile = source.relativize(file);
final Path destFile = Paths.get(destDir.toString(), relativeFile.toString());
if(filter.matches(file)) {
String filename = file.getFileName().toString();
if... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2021-39180
- Severity: HIGH
- CVSS Score: 9.0
Description: OO-5549: check parent by unzip
Function: visitFile
File: src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java
Repository: OpenOLAT
Fixed Code:
@Override
public FileVisitResult... | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | visitFile | src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java | 5668a41ab3f1753102a89757be013487544279d5 | 1 |
Analyze the following code function for security vulnerabilities | Library findLibrary(String lib_name) throws XmlReaderException {
if (lib_name == null || lib_name.equals("")) {
return file;
}
Library ret = libs.get(lib_name);
if (ret == null) {
throw new XmlReaderException(StringUtil.format(
Strings.get("libMissingError"), lib_name));
} else {
retur... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findLibrary
File: src/com/cburch/logisim/file/XmlReader.java
Repository: logisim-evolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000889 | MEDIUM | 6.8 | logisim-evolution | findLibrary | src/com/cburch/logisim/file/XmlReader.java | 90aee8f8ceef463884cc400af4f6d1f109fb0972 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void destroy() {
LOGGER.debug("(XssFilter) destroy");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroy
File: sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java
Repository: shopizer-ecommerce/shopizer
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-33561 | LOW | 3.5 | shopizer-ecommerce/shopizer | destroy | sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java | 197f8c78c8f673b957e41ca2c823afc654c19271 | 0 |
Analyze the following code function for security vulnerabilities | private String getRequestPath(HttpServletRequest request) {
String path = request.getRequestURI();
if (path.startsWith(request.getContextPath())) {
path = path.substring(request.getContextPath().length());
}
return path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestPath
File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | getRequestPath | core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | public HashMap<String, String> toParams() {
HashMap<String, String> ret = new HashMap<>();
ret.put("isRenewal", Boolean.valueOf(renewal).toString());
if (profileId != null) ret.put(PROFILE_ID, profileId);
if (serialNum != null) ret.put(SERIAL_NUM, serialNum.toHexString());
if (re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toParams
File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | toParams | base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected boolean sendGlobalRedirect(XWikiResponse response, String url, XWikiContext context) throws Exception
{
if ("1".equals(context.getWiki().Param("xwiki.preferences.redirect"))) {
// Note: This implementation is not performant at all and will slow down the wiki as the number
/... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendGlobalRedirect
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-23617 | MEDIUM | 4 | xwiki/xwiki-platform | sendGlobalRedirect | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java | b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isAssistDataAllowedOnCurrentActivity() throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(IS_SCREEN_CAPTURE_ALLOWED_ON_CURRENT_ACTIVITY_TRANSACTION, data, reply, 0)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAssistDataAllowedOnCurrentActivity
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | isAssistDataAllowedOnCurrentActivity | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public String getTextPage(final String userID) throws IOException {
return getContactServiceProvider(userID, ContactType.textPage.toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTextPage
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | getTextPage | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | private void handleOnDetach() {
assert isAttached();
// Ensure detach change is sent
markAsDirty();
owner.unregister(this);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleOnDetach
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | handleOnDetach | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | boolean attachedToProcess() {
return hasProcess() && app.hasThread();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachedToProcess
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | attachedToProcess | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | boolean isDreaming() {
return mDreaming;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDreaming
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | isDreaming | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public static void copyFromCursorToContentValues(@NonNull String column, @NonNull Cursor cursor,
@NonNull ContentValues values) {
final int index = cursor.getColumnIndex(column);
if (index != -1) {
if (cursor.isNull(index)) {
values.putNull(column);
} ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyFromCursorToContentValues
File: src/com/android/providers/media/util/DatabaseUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-35683 | MEDIUM | 5.5 | android | copyFromCursorToContentValues | src/com/android/providers/media/util/DatabaseUtils.java | 23d156ed1bed6d2c2b325f0be540d0afca510c49 | 0 |
Analyze the following code function for security vulnerabilities | private ModelAndView saveGroup(HttpServletRequest request, HttpServletResponse response) throws Exception {
HttpSession session = request.getSession(false);
if (session != null) {
WebGroup newGroup = (WebGroup) session.getAttribute("group.modifyGroup.jsp");
updateGroup(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveGroup
File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352",
"CWE-79"
] | CVE-2021-25929 | LOW | 3.5 | OpenNMS/opennms | saveGroup | opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java | eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent){
String action = intent.getAction();
if (DevicePolicyManager.ACTION_DEVICE_POLICY_MANAGER_STATE_CHANGED
.equals(action)) {
enforceBeamShareActivityPolicy(context,
n... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: src/com/android/nfc/NfcService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3761 | LOW | 2.1 | android | onReceive | src/com/android/nfc/NfcService.java | 9ea802b5456a36f1115549b645b65c791eff3c2c | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void saveBatchEmpty(TestContext context) {
Async async = context.async();
List<Object> list = Collections.emptyList();
createFoo(context).saveBatch(FOO, list, res -> {
assertSuccess(context, res);
context.assertEquals(0, res.result().getRows().size());
context.assertEquals("... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveBatchEmpty
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | saveBatchEmpty | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean moveTopActivityToPinnedStack(int stackId, Rect bounds) {
enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS,
"moveTopActivityToPinnedStack()");
synchronized (this) {
if (!mSupportsPictureInPicture) {
throw new IllegalStat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTopActivityToPinnedStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | moveTopActivityToPinnedStack | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startKeyguardExitAnimation(long startTime, long fadeoutDuration) {
if (mKeyguardDelegate != null) {
if (DEBUG_KEYGUARD) Slog.d(TAG, "PWM.startKeyguardExitAnimation");
mKeyguardDelegate.startKeyguardExitAnimation(startTime, fadeoutDuration);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startKeyguardExitAnimation
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | startKeyguardExitAnimation | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int stopUser(final int userId, final IStopUserCallback callback) {
if (checkCallingPermission(INTERACT_ACROSS_USERS_FULL)
!= PackageManager.PERMISSION_GRANTED) {
String msg = "Permission Denial: switchUser() from pid="
+ Binder.getCallingPid()... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopUser
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | stopUser | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private static boolean getSettingOverrideableByRestore(Bundle args) {
return (args != null) && args.getBoolean(Settings.CALL_METHOD_OVERRIDEABLE_BY_RESTORE_KEY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSettingOverrideableByRestore
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | getSettingOverrideableByRestore | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | private void updatePersonalAppsSuspensionOnUserStart(int userHandle) {
final int profileUserHandle = getManagedUserId(userHandle);
if (profileUserHandle >= 0) {
// Given that the parent user has just started, profile should be locked.
updatePersonalAppsSuspension(profileUserHandl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePersonalAppsSuspensionOnUserStart
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | updatePersonalAppsSuspensionOnUserStart | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("posts/{messageKey}")
@Operation(summary = "Put posts",
description = "Creates a new reply in the forum of the course node.")
@ApiResponse(responseCode = "200", description = "Ok.",
content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = MessageVO.class)),
@Co... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replyToPost
File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | replyToPost | src/main/java/org/olat/modules/fo/restapi/ForumWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
void suppressFitsSystemWindows() {
binding.controllerCallLayout.setFitsSystemWindows(false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: suppressFitsSystemWindows
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | suppressFitsSystemWindows | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | @CalledByNative
private void onSmartClipDataExtracted(String text, String html, Rect clipRect) {
// Translate the positions by the offsets introduced by location bar. Note that the
// coordinates are in dp scale, and that this definitely has the potential to be
// different from the offsets ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSmartClipDataExtracted
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | onSmartClipDataExtracted | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
String userID = request.getParameter("userID");
String newID = request.getParameter("newID");
// now save to the xml file
try {
UserManager userF... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2021-25933
- Severity: LOW
- CVSS Score: 3.5
Description: NMS-13125: user ID and group ID must not contain any HTML markup
Function: doPost
File: opennms-webapp/src/main/java/org/opennms/web/admin/users/RenameUserServlet.java
Repository: OpenNMS/opennms
Fixed Co... | [
"CWE-79"
] | CVE-2021-25933 | LOW | 3.5 | OpenNMS/opennms | doPost | opennms-webapp/src/main/java/org/opennms/web/admin/users/RenameUserServlet.java | 8a97e6869d6e49da18b208c837438ace80049c01 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException {
try {
// 执行全局过滤器
beforeAuth.run(null);
SaRouter.match(includeList).notMatch(excludeList).check(r -> {
auth.run(null);
});
} catch (StopMatchException e) ... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-44794
- Severity: CRITICAL
- CVSS Score: 9.8
Description: 修复路由拦截鉴权可被绕过的问题 fix #515
Function: doFilter
File: sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java
Repository: dromara/Sa-Token
Fixed Code:
... | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | doFilter | sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 1 |
Analyze the following code function for security vulnerabilities | private void sendMessage(String iface, int what, int arg1, int arg2, Object obj) {
sendMessage(iface, Message.obtain(null, what, arg1, arg2, obj));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendMessage
File: service/java/com/android/server/wifi/WifiMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | sendMessage | service/java/com/android/server/wifi/WifiMonitor.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | private void setup(byte[] ad) throws InvalidKeyException, InvalidAlgorithmParameterException
{
// Check for nonce wrap-around.
if (n == -1L)
throw new IllegalStateException("Nonce has wrapped around");
// Format the counter/IV block for AES/CTR/NoPadding.
iv[0] = 0;
iv[1] = 0;
iv[2] = 0;
iv[3] = 0;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setup
File: src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | setup | src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Analyze the following code function for security vulnerabilities | public void aliasSystemAttribute(String alias, String systemAttributeName) {
if (systemAttributeAliasingMapper == null) {
throw new com.thoughtworks.xstream.InitializationException("No "
+ SystemAttributeAliasingMapper.class.getName()
+ " available");
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: aliasSystemAttribute
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | aliasSystemAttribute | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ParceledListSlice getShareTargets(String packageName,
IntentFilter filter, @UserIdInt int userId) {
Preconditions.checkStringNotEmpty(packageName, "packageName");
Objects.requireNonNull(filter, "intentFilter");
if (!isCallerChooserActivity()) {
verify... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getShareTargets
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | getShareTargets | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | protected String determineLoginType(boolean isSecure) {
String result = JBossSAMLURIConstants.AC_PASSWORD.get();
LoginConfig loginConfig = getContext().getLoginConfig();
if (loginConfig != null) {
String auth = loginConfig.getAuthMethod();
if (StringUtil.isNotNull(auth)) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: determineLoginType
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding pr... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | determineLoginType | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | public static String migrate(String xml) {
Document xmlDoc;
try {
xmlDoc = new SAXReader().read(new StringReader(xml));
} catch (DocumentException e) {
throw new RuntimeException(e);
}
List<NodeTuple> tuples = new ArrayList<>();
Node keyNode = new ScalarNode(Tag.STR, "version");
Node valueNode = ... | Vulnerability Classification:
- CWE: CWE-538
- CVE: CVE-2021-21250
- Severity: MEDIUM
- CVSS Score: 4.0
Description: Fix XXE injection attack by disabling XML DTD handling
Function: migrate
File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
Repository: theonedev/onedev
Fixed Code:
p... | [
"CWE-538"
] | CVE-2021-21250 | MEDIUM | 4 | theonedev/onedev | migrate | server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java | 9196fd795e87dab069b4260a3590a0ea886e770f | 1 |
Analyze the following code function for security vulnerabilities | @Override
public final void activityIdle(IBinder token, Configuration config, boolean stopProfiling) {
final long origId = Binder.clearCallingIdentity();
synchronized (this) {
ActivityStack stack = ActivityRecord.getStackLocked(token);
if (stack != null) {
Act... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityIdle
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | activityIdle | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | void onUiSelection(UserSelectionDialogResult selection); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUiSelection
File: services/credentials/java/com/android/server/credentials/CredentialManagerUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40076 | MEDIUM | 5.5 | android | onUiSelection | services/credentials/java/com/android/server/credentials/CredentialManagerUi.java | 9b68987df85b681f9362a3cadca6496796d23bbc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateApplicationByResourceId(String resourceId, ServiceProvider updatedApp, String tenantDomain,
String username) throws IdentityApplicationManagementException {
validateApplicationConfigurations(updatedApp, tenantDomain, username);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateApplicationByResourceId
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carb... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | updateApplicationByResourceId | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | public abstract Set<String> getAlwaysUsedExtensions(XWikiContext context); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAlwaysUsedExtensions
File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
Repository: xwiki/xwiki-platform
The code follo... | [
"CWE-79"
] | CVE-2023-29206 | MEDIUM | 5.4 | xwiki/xwiki-platform | getAlwaysUsedExtensions | xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java | fe65bc35d5672dd2505b7ac4ec42aec57d500fbb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setRenderThread(int tid) {
synchronized (mProcLock) {
ProcessRecord proc;
int pid = Binder.getCallingPid();
if (pid == Process.myPid()) {
demoteSystemServerRenderThread(tid);
return;
}
synchroni... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRenderThread
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | setRenderThread | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy(anyOf = {"this", "mProcLock"})
private boolean uidOnBackgroundAllowlistLOSP(final int uid) {
final int appId = UserHandle.getAppId(uid);
final int[] allowlist = mBackgroundAppIdAllowlist;
for (int i = 0, len = allowlist.length; i < len; i++) {
if (appId == allowlist[i]... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: uidOnBackgroundAllowlistLOSP
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | uidOnBackgroundAllowlistLOSP | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | static String renderNavItem(JSONObject item, String activeNav) {
final String navType = item.getString("type");
final boolean isUrlType = "URL".equals(navType);
String navName = item.getString("value");
String navUrl = item.getString("value");
String navEntity = null;
b... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: renderNavItem
File: src/main/java/com/rebuild/core/configuration/NavBuilder.java
Repository: getrebuild/rebuild
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-1495 | MEDIUM | 6.5 | getrebuild/rebuild | renderNavItem | src/main/java/com/rebuild/core/configuration/NavBuilder.java | c9474f84e5f376dd2ade2078e3039961a9425da7 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void deregisterHandler(String iface, int what, Handler handler) {
SparseArray<Set<Handler>> ifaceHandlers = mHandlerMap.get(iface);
if (ifaceHandlers == null) {
return;
}
Set<Handler> ifaceWhatHandlers = ifaceHandlers.get(what);
if (ifaceWhatHandle... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deregisterHandler
File: service/java/com/android/server/wifi/WifiMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | deregisterHandler | service/java/com/android/server/wifi/WifiMonitor.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public void setShowBackURL(boolean showBackURL) {
_showBackURL = showBackURL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShowBackURL
File: util-taglib/src/com/liferay/taglib/ui/HeaderTag.java
Repository: brianchandotcom/liferay-portal
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | setShowBackURL | util-taglib/src/com/liferay/taglib/ui/HeaderTag.java | bd92daa70ab77a40eff0eb18e8e91f3e095694e1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int startVoiceActivity(String callingPackage, String callingFeatureId, int callingPid,
int callingUid, Intent intent, String resolvedType, IVoiceInteractionSession session,
IVoiceInteractor interactor, int startFlags, ProfilerInfo profilerInfo,
Bundle bOptions, i... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startVoiceActivity
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | startVoiceActivity | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.