instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | public List<Locale> getTranslationLocales() throws XWikiException
{
return this.doc.getTranslationLocales(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTranslationLocales
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-648"
] | CVE-2023-29507 | HIGH | 7.2 | xwiki/xwiki-platform | getTranslationLocales | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 905cdd7c421dbf8c565557cdc773ab1aa9028f83 | 0 |
Analyze the following code function for security vulnerabilities | private SpTemplate getSpTemplateFromDB(String templateName, String tenantDomain,
ServiceProviderTemplateCacheKey templateCacheKey)
throws IdentityApplicationManagementException {
ApplicationTemplateDAO applicationTemplateDAO = ApplicationMgtSystemConfig.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSpTemplateFromDB
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-identit... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getSpTemplateFromDB | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | protected final ScheduledFuture<?> schedule(Runnable runnable, long delay, TimeUnit unit) {
return removeCallbacksService.schedule(runnable, delay, unit);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: schedule
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | schedule | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public static Element getCanonicalElement(Node node) {
try {
Canonicalizer c14n = Canonicalizer.getInstance(
"http://www.w3.org/TR/2001/REC-xml-c14n-20010315");
byte outputBytes[] = c14n.canonicalizeSubtree(node);
DocumentBuilder documentBuilder =
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCanonicalElement
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | getCanonicalElement | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | public void showScreenPinningRequest(int taskId, boolean allowCancel) {
mScreenPinningRequest.showPrompt(taskId, allowCancel);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showScreenPinningRequest
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | showScreenPinningRequest | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void showBootMessage(final CharSequence msg, final boolean always) {
mHandler.post(new Runnable() {
@Override public void run() {
if (mBootMsgDialog == null) {
int theme;
if (mContext.getPackageManager().hasSystemFeature(
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showBootMessage
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | showBootMessage | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setMagnificationCallbacks(MagnificationCallbacks callbacks) {
synchronized (mWindowMap) {
if (mAccessibilityController == null) {
mAccessibilityController = new AccessibilityController(
WindowManagerService.this);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMagnificationCallbacks
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | setMagnificationCallbacks | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getAutosaveKey() {
if (state.mode == Mode.ADD) {
return String.format("autosave:addBlob:%d:%s:%s",
getProject().getId(), state.blobIdent.revision, getNewPath());
} else if (state.mode == Mode.EDIT) {
return String.format("autosave:editBlob:%d:%s:%s:%s",
getProject().getId(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAutosaveKey
File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2021-21245 | HIGH | 7.5 | theonedev/onedev | getAutosaveKey | server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java | 0c060153fb97c0288a1917efdb17cc426934dacb | 0 |
Analyze the following code function for security vulnerabilities | protected Object convert(final Object value, final Class targetType) {
Class valueClass = value.getClass();
if (valueClass == targetType) {
return value;
}
if (value instanceof Map) {
if (targetType == Map.class) {
return value;
}
return map2bean((Map) value, targetType);
}
try {
retu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convert
File: jodd-json/src/main/java/jodd/json/MapToBean.java
Repository: oblac/jodd
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2018-21234 | HIGH | 7.5 | oblac/jodd | convert | jodd-json/src/main/java/jodd/json/MapToBean.java | 9bffc3913aeb8472c11bb543243004b4b4376f16 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Node getParentNode() {
return doc.getParentNode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParentNode
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | getParentNode | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | protected void shareBookmarkUri(int position) {
Bookmark bookmark = (Bookmark) conferences.get(position);
Intent shareIntent = new Intent();
shareIntent.setAction(Intent.ACTION_SEND);
shareIntent.putExtra(Intent.EXTRA_TEXT, "xmpp:" + bookmark.getJid().asBareJid().toEscapedString() + "?join");
shareIntent.setT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shareBookmarkUri
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | shareBookmarkUri | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Exported
public Collection<View> getViews() {
return viewGroupMixIn.getViews();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getViews
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getViews | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | private boolean transferStartingWindow(@NonNull ActivityRecord fromActivity) {
final WindowState tStartingWindow = fromActivity.mStartingWindow;
if (tStartingWindow != null && fromActivity.mStartingSurface != null) {
if (tStartingWindow.getParent() == null) {
// The window ha... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: transferStartingWindow
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | transferStartingWindow | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public XWikiAttachment getAttachment()
{
return this.attachment;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttachment
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getAttachment | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<IAppTask> getAppTasks(String callingPackage) {
int callingUid = Binder.getCallingUid();
long ident = Binder.clearCallingIdentity();
synchronized(this) {
ArrayList<IAppTask> list = new ArrayList<IAppTask>();
try {
if (localLOGV) S... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAppTasks
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | getAppTasks | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onVideoStateChanged(Call call) {
for (CallsManagerListener listener : mListeners) {
listener.onVideoStateChanged(call);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onVideoStateChanged
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | onVideoStateChanged | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | public boolean exists(PageReference reference) throws XWikiException
{
return this.xwiki.exists(reference, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exists
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | exists | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | private int getInboxLayoutResource() {
return R.layout.notification_template_material_inbox;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInboxLayoutResource
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getInboxLayoutResource | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public void setErrorStatusCode(int statusCode) {
this.errorStatusCode = new Integer(statusCode);
this.statusCode = statusCode;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setErrorStatusCode
File: src/java/winstone/WinstoneResponse.java
Repository: jenkinsci/winstone
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2011-4344 | LOW | 2.6 | jenkinsci/winstone | setErrorStatusCode | src/java/winstone/WinstoneResponse.java | 410ed3001d51c689cf59085b7417466caa2ded7b | 0 |
Analyze the following code function for security vulnerabilities | public ObjectEditPage editObjects(String space, String page)
{
gotoPage(space, page, "edit", "editor=object");
return new ObjectEditPage();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: editObjects
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | editObjects | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void setContentViewClient(ContentViewClient client) {
if (client == null) {
throw new IllegalArgumentException("The client can't be null.");
}
mContentViewClient = client;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContentViewClient
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | setContentViewClient | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | public <T> void saveBatch(String table, List<T> entities,
Handler<AsyncResult<ResultSet>> replyHandler) {
client.getConnection(conn -> saveBatch(conn, table, entities, closeAndHandleResult(conn, replyHandler)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveBatch
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | saveBatch | domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public int getLength()
{
return this.length;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLength
File: src/main/java/org/cryptacular/CiphertextHeader.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | getLength | src/main/java/org/cryptacular/CiphertextHeader.java | 8c6c7528f1e24c6b71f3e36db0cb8a697256ce25 | 0 |
Analyze the following code function for security vulnerabilities | void binderRestoreCallingIdentity(long token) {
Binder.restoreCallingIdentity(token);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: binderRestoreCallingIdentity
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | binderRestoreCallingIdentity | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isPluginPlatform(String platform) {
if (StringUtils.equalsAnyIgnoreCase(platform,
IssuesManagePlatform.Tapd.name(), IssuesManagePlatform.AzureDevops.name(),
IssuesManagePlatform.Zentao.name(), IssuesManagePlatform.Local.name())) {
return false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPluginPlatform
File: test-track/backend/src/main/java/io/metersphere/service/PlatformPluginService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | isPluginPlatform | test-track/backend/src/main/java/io/metersphere/service/PlatformPluginService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void startDocument() throws SAXException {
tagQueue = new LinkedList<>();
labelList = new ArrayList<>();
labelType = null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDocument
File: src/main/java/org/codelibs/fess/util/GsaConfigParser.java
Repository: codelibs/fess
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000822 | HIGH | 7.5 | codelibs/fess | startDocument | src/main/java/org/codelibs/fess/util/GsaConfigParser.java | faa265b8d8f1c71e1bf3229fba5f8cc58a5611b7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public HttpHeaders set(HttpHeaders headers) {
if (headers instanceof DefaultHttpHeaders) {
this.headers.set(((DefaultHttpHeaders) headers).headers);
return this;
} else {
return super.set(headers);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: set
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | set | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | private void executeCallback(AndroidFuture<Boolean> future,
@CallbackExecutor @NonNull Executor executor,
Consumer<Boolean> callback) {
future.whenComplete((result, error) -> executor.execute(() -> {
final long token = Binder.clearCallingIdentity();
try {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeCallback
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | executeCallback | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public PropertyType getGlobalPropertyType(String field) {
if(globalPropertyTypes==null)
globalPropertyTypes = buildPropertyTypes(getClass());
return globalPropertyTypes.get(field);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalPropertyType
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getGlobalPropertyType | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public void resolvePalette(Context ctx, int rawColor,
boolean isColorized, boolean nightMode) {
if (mPaletteIsForRawColor == rawColor
&& mPaletteIsForColorized == isColorized
&& mPaletteIsForNightMode == nightMode) {
return;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolvePalette
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | resolvePalette | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private void makeAppNotRespondingLocked(ProcessRecord app,
String activity, String shortMsg, String longMsg) {
app.notResponding = true;
app.notRespondingReport = generateProcessError(app,
ActivityManager.ProcessErrorStateInfo.NOT_RESPONDING,
activity, shortMs... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeAppNotRespondingLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | makeAppNotRespondingLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public static SocketFactory getSocketFactory(Properties info) throws PSQLException {
// Socket factory
String socketFactoryClassName = PGProperty.SOCKET_FACTORY.get(info);
if (socketFactoryClassName == null) {
return SocketFactory.getDefault();
}
try {
return (SocketFactory) ObjectFactor... | Vulnerability Classification:
- CWE: CWE-665
- CVE: CVE-2022-21724
- Severity: HIGH
- CVSS Score: 7.5
Description: Merge pull request from GHSA-v7wg-cpwc-24m4
This ensures arbitrary classes can't be passed instead of
AuthenticationPlugin, SocketFactory, SSLSocketFactory, CallbackHandler, HostnameVerifier
Function: g... | [
"CWE-665"
] | CVE-2022-21724 | HIGH | 7.5 | pgjdbc | getSocketFactory | pgjdbc/src/main/java/org/postgresql/core/SocketFactoryFactory.java | f4d0ed69c0b3aae8531d83d6af4c57f22312c813 | 1 |
Analyze the following code function for security vulnerabilities | public ServerBuilder withRoute(Consumer<? super ServiceBindingBuilder> customizer) {
final ServiceBindingBuilder serviceBindingBuilder = new ServiceBindingBuilder(this);
customizer.accept(serviceBindingBuilder);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withRoute
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | withRoute | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | private native void nativeSelectPopupMenuItems(long nativeContentViewCoreImpl,
long nativeSelectPopupSourceFrame, int[] indices); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeSelectPopupMenuItems
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | nativeSelectPopupMenuItems | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | public PendingIntent getDeleteIntent() {
return mDeleteIntent;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeleteIntent
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getDeleteIntent | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | void layoutLetterbox(WindowState winHint) {
mLetterboxUiController.layoutLetterbox(winHint);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: layoutLetterbox
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | layoutLetterbox | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | private void saveVoiceMailAndForwardingNumberStage2() {
mForwardingChangeResults = null;
mVoicemailChangeResult = null;
resetForwardingChangeState();
for (int i = 0; i < mNewFwdSettings.length; i++) {
CallForwardInfo fi = mNewFwdSettings[i];
CallForwardInfo fiFor... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveVoiceMailAndForwardingNumberStage2
File: src/com/android/phone/settings/VoicemailSettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | saveVoiceMailAndForwardingNumberStage2 | src/com/android/phone/settings/VoicemailSettingsActivity.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | protected void _releaseBuffers() throws IOException
{
if (_bufferRecyclable) {
byte[] buf = _inputBuffer;
if (buf != null) {
_inputBuffer = null;
_ioContext.releaseReadIOBuffer(buf);
}
}
_textBuffer.releaseBuffers();... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _releaseBuffers
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _releaseBuffers | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | private LengthSolrInputDocument getSolrDocument(EntityReference reference)
throws SolrIndexerException, IllegalArgumentException, ExecutionContextException
{
SolrMetadataExtractor metadataExtractor = getMetadataExtractor(reference.getType());
// If the entity type is supported, use the extr... | Vulnerability Classification:
- CWE: CWE-312, CWE-200
- CVE: CVE-2023-50719
- Severity: HIGH
- CVSS Score: 7.5
Description: XWIKI-20371: Consider mail obfuscation settings in the Solr indexer
* Introduce a new event GeneralMailConfigurationUpdatedEvent to notify
the indexer when the mail configuration changed.
* Do... | [
"CWE-312",
"CWE-200"
] | CVE-2023-50719 | HIGH | 7.5 | xwiki/xwiki-platform | getSolrDocument | xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/DefaultSolrIndexer.java | 3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea | 1 |
Analyze the following code function for security vulnerabilities | public List<Subscription> getSubscriptions() {
return new ArrayList<>(subscriptions.values());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSubscriptions
File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java
Repository: eclipse/milo
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2022-25897 | HIGH | 7.5 | eclipse/milo | getSubscriptions | opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java | 4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5 | 0 |
Analyze the following code function for security vulnerabilities | private void doPreAddApplicationChecks(ServiceProvider serviceProvider, String tenantDomain,
String username) throws IdentityApplicationManagementException {
String appName = serviceProvider.getApplicationName();
if (StringUtils.isBlank(appName)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doPreAddApplicationChecks
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-i... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | doPreAddApplicationChecks | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | private static void awakenDreams() {
IDreamManager dreamManager = getDreamManager();
if (dreamManager != null) {
try {
dreamManager.awaken();
} catch (RemoteException e) {
// fine, stay asleep then
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: awakenDreams
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | awakenDreams | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | protected void validateAdminAndClientPermission() {
try {
validateAdminAccessForTenant(topicName.getTenant());
} catch (Exception ve) {
try {
checkAuthorization(pulsar(), topicName, clientAppId(), clientAuthData());
} catch (RestException re) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateAdminAndClientPermission
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | validateAdminAndClientPermission | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | private void onLaunchTransitionTimeout() {
Log.w(TAG, "Launch transition: Timeout!");
mNotificationPanel.onAffordanceLaunchEnded();
releaseGestureWakeLock();
mNotificationPanel.resetViews();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLaunchTransitionTimeout
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onLaunchTransitionTimeout | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public static void visit(ThreadGroup group, int level) {
// Get threads in `group'
int numThreads = group.activeCount();
Thread[] threads = new Thread[numThreads*2];
numThreads = group.enumerate(threads, false);
// Enumerate each thread in `group'
for (int i=0; i<numThre... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visit
File: src/main/java/org/lemsml/jlems/io/util/JUtil.java
Repository: LEMS/jLEMS
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-4583 | HIGH | 8.8 | LEMS/jLEMS | visit | src/main/java/org/lemsml/jlems/io/util/JUtil.java | 8c224637d7d561076364a9e3c2c375daeaf463dc | 0 |
Analyze the following code function for security vulnerabilities | protected X509KeyManager getX509KeyManager() {
return x509KeyManager;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getX509KeyManager
File: src/main/java/org/conscrypt/SSLParametersImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3840 | HIGH | 10 | android | getX509KeyManager | src/main/java/org/conscrypt/SSLParametersImpl.java | 5af5e93463f4333187e7e35f3bd2b846654aa214 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(value = MANAGE_DEVICE_POLICY_CERTIFICATES, conditional = true)
public boolean installKeyPair(@Nullable ComponentName admin, @NonNull PrivateKey privKey,
@NonNull Certificate cert, @NonNull String alias) {
return installKeyPair(admin, privKey, new Certificate[] {cert}, alias, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installKeyPair
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | installKeyPair | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getRuleInstanceCount(ComponentName owner) throws RemoteException {
Preconditions.checkNotNull(owner, "Owner is null");
enforceSystemOrSystemUI("getRuleInstanceCount");
return mZenModeHelper.getCurrentInstanceCount(owner);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRuleInstanceCount
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | getRuleInstanceCount | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | private <T> T wrapInTCCLSwitch(Callable<T> callable) {
try {
if (classLoader == null) {
return callable.call();
} else {
final ClassLoader original = Thread.currentThread().getContextClassLoader();
try {
Thread.currentThread().setContextClassLoader(classLoader);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: wrapInTCCLSwitch
File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
Repository: vert-x3/vertx-web
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-12542 | HIGH | 7.5 | vert-x3/vertx-web | wrapInTCCLSwitch | vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java | 57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b | 0 |
Analyze the following code function for security vulnerabilities | private void visitorPermission(String target, HttpServletRequest request, HttpServletResponse response) throws IOException, InstantiationException {
if (!accessPlugin(target.replace("/plugin", "").replace("/p", ""), request, response)) {
response.sendError(403);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visitorPermission
File: web/src/main/java/com/zrlog/web/handler/PluginHandler.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-19005 | LOW | 3.5 | 94fzb/zrlog | visitorPermission | web/src/main/java/com/zrlog/web/handler/PluginHandler.java | b2b4415e2e59b6f18b0a62b633e71c96d63c43ba | 0 |
Analyze the following code function for security vulnerabilities | ProcessRecord handleApplicationWtfInner(int callingUid, int callingPid, IBinder app, String tag,
final ApplicationErrorReport.CrashInfo crashInfo) {
final ProcessRecord r = findAppProcess(app, "WTF");
final String processName = app == null ? "system_server"
: (r == null ? "un... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleApplicationWtfInner
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | handleApplicationWtfInner | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | protected final String _parseString(JsonParser p, DeserializationContext ctxt) throws IOException
{
if (p.hasToken(JsonToken.VALUE_STRING)) {
return p.getText();
}
// 07-Nov-2019, tatu: [databind#2535] Need to support byte[]->Base64 same as `StringDeserializer`
if (p.hasT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _parseString
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42003 | HIGH | 7.5 | FasterXML/jackson-databind | _parseString | src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java | d78d00ee7b5245b93103fef3187f70543d67ca33 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Route.Collection patch(final String path1, final String path2,
final Route.Filter filter) {
return new Route.Collection(
new Route.Definition[]{patch(path1, filter), patch(path2, filter)});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: patch
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | patch | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTopActivityImmersive() throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTopActivityImmersive
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | isTopActivityImmersive | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private DependResult calculateConditionResult() {
DependResult conditionResult = DependResult.SUCCESS;
List<SwitchResultVo> switchResultVos = taskParameters.getDependTaskList();
SwitchResultVo switchResultVo = new SwitchResultVo();
switchResultVo.setNextNode(taskParameters.getNextNode(... | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2023-49299
- Severity: HIGH
- CVSS Score: 8.8
Description: fix switch condition
Function: calculateConditionResult
File: dolphinscheduler-master/src/main/java/org/apache/dolphinscheduler/server/master/runner/task/switchtask/SwitchLogicTask.java
Repository: apache... | [
"CWE-20"
] | CVE-2023-49299 | HIGH | 8.8 | apache/dolphinscheduler | calculateConditionResult | dolphinscheduler-master/src/main/java/org/apache/dolphinscheduler/server/master/runner/task/switchtask/SwitchLogicTask.java | d1ef54f6a851e64525f1078887520394e553b6e8 | 1 |
Analyze the following code function for security vulnerabilities | private void addCall(Call call) {
Trace.beginSection("addCall");
Log.v(this, "addCall(%s)", call);
call.addListener(this);
mCalls.add(call);
// TODO: Update mForegroundCall prior to invoking
// onCallAdded for calls which immediately take the foreground (like the first c... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCall
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | addCall | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | private CompletableFuture<Topic> topicNotFoundReasonAsync(TopicName topicName) {
if (!topicName.isPartitioned()) {
return FutureUtil.failedFuture(new RestException(Status.NOT_FOUND, "Topic not found"));
}
return getPartitionedTopicMetadataAsync(
TopicName.get(topicNa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: topicNotFoundReasonAsync
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | topicNotFoundReasonAsync | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | private Widget lookupWidgetLocked(int appWidgetId, int uid, String packageName) {
final int N = mWidgets.size();
for (int i = 0; i < N; i++) {
Widget widget = mWidgets.get(i);
if (widget.appWidgetId == appWidgetId
&& mSecurityPolicy.canAccessAppWidget(widget, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lookupWidgetLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | lookupWidgetLocked | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | @Override // CommandQueue
public void setSystemUiVisibility(int vis, int fullscreenStackVis, int dockedStackVis,
int mask, Rect fullscreenStackBounds, Rect dockedStackBounds) {
final int oldVal = mSystemUiVisibility;
final int newVal = (oldVal&~mask) | (vis&mask);
final int diff ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSystemUiVisibility
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setSystemUiVisibility | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getIsEqualsToConditionSQL(String column, Object param) {
if (param == null) {
return getIsNullConditionSQL(column);
} else {
String paramStr = getParameterSQL(param);
return column + " = " + paramStr;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIsEqualsToConditionSQL
File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
Repository: dashbuilder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4999 | HIGH | 7.5 | dashbuilder | getIsEqualsToConditionSQL | dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java | 8574899e3b6455547b534f570b2330ff772e524b | 0 |
Analyze the following code function for security vulnerabilities | public void setAttributes(List<ProfileAttribute> attributes) {
this.attributes = attributes;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAttributes
File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setAttributes | base/common/src/main/java/com/netscape/certsrv/profile/PolicyDefault.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public void initializeUsageHelper() {
if (mUsageHelper == null) {
mUsageHelper = new PermissionUsageHelper(mContext);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initializeUsageHelper
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | initializeUsageHelper | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | private void cleanUp() {
if (DEBUG_SD_INSTALL) Slog.i(TAG, "cleanUp");
// Destroy secure container
PackageHelper.destroySdDir(cid);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanUp
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | cleanUp | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public InputStream getInputStream(String path, Map<String, ?> queryParams) throws Exception
{
return getInputStream(getBaseURL(), path, queryParams);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInputStream
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getInputStream | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public void setVersion(String version)
{
if (!StringUtils.isEmpty(version)) {
this.version = new Version(version);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVersion
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | setVersion | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | private X509Certificate[] cleanupCertChainAndFindTrustAnchors(X509Certificate[] chain,
Set<TrustAnchor> trustAnchors) {
X509Certificate[] original = chain;
// 1. Clean the received certificates chain.
int currIndex;
// St... | Vulnerability Classification:
- CWE: CWE-254, CWE-345
- CVE: CVE-2016-0818
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Cache intermediate CA separately
Intermediate CAs are cached in order to support servers that fail to
sent a complete chain to a root. These certificates should be cached to
support these serve... | [
"CWE-254",
"CWE-345"
] | CVE-2016-0818 | MEDIUM | 4.3 | android | cleanupCertChainAndFindTrustAnchors | src/platform/java/org/conscrypt/TrustManagerImpl.java | c4ab1b959280413fb11bf4fd7f6b4c2ba38bd779 | 1 |
Analyze the following code function for security vulnerabilities | private static native @Nullable String nativeGetResourcePackageName(long ptr,
@AnyRes int resid); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeGetResourcePackageName
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeGetResourcePackageName | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | private Set<Integer> intArrayToSet(int[] array) {
Set<Integer> set = new ArraySet<>();
for (int item : array) {
set.add(item);
}
return set;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: intArrayToSet
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | intArrayToSet | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | void silence(Call call) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("silence")) {
try {
logOutgoing("silence %s", callId);
mServiceInterface.silence(callId, Log.getExternalSession(TELECOM_ABBREVIATION));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: silence
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | silence | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public void toggleTruncation() {
mIsShowingTruncatedText = !mIsShowingTruncatedText;
updateMaxLines();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toggleTruncation
File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2015-1261 | MEDIUM | 5 | chromium | toggleTruncation | chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java | 5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f | 0 |
Analyze the following code function for security vulnerabilities | private String[] populateNonExemptAndExemptFromPolicyApps(String[] packageNames,
Set<String> outputExemptApps) {
Preconditions.checkArgument(outputExemptApps.isEmpty(), "outputExemptApps is not empty");
List<String> exemptAppsList = listPolicyExemptAppsUnchecked();
if (exemptAppsList... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: populateNonExemptAndExemptFromPolicyApps
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | populateNonExemptAndExemptFromPolicyApps | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Path("/job-context")
@Produces(MediaType.APPLICATION_OCTET_STREAM)
@GET
public byte[] getJobContext() {
JobContext context = jobManager.getJobContext(getJobToken(), true);
Map<String, Object> contextMap = new HashMap<>();
contextMap.put("commands", context.getCommands());
contextMap.put("retrieveSourc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getJobContext
File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesResource.java
Repository: theonedev/onedev
The code follows secure coding practic... | [
"CWE-502"
] | CVE-2021-21243 | HIGH | 7.5 | theonedev/onedev | getJobContext | server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesResource.java | 9637fc8fa461c5777282a0021c3deb1e7a48f137 | 0 |
Analyze the following code function for security vulnerabilities | private BeanReferring handleUnresolvedReference(DeserializationContext ctxt,
SettableBeanProperty prop, PropertyValueBuffer buffer,
UnresolvedForwardReference reference)
throws JsonMappingException
{
BeanReferring referring = new BeanReferring(ctxt, reference,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleUnresolvedReference
File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2022-42004 | HIGH | 7.5 | FasterXML/jackson-databind | handleUnresolvedReference | src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java | 063183589218fec19a9293ed2f17ec53ea80ba88 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setAccessToken(String accessToken) {
for (Authentication auth : authentications.values()) {
if (auth instanceof OAuth) {
((OAuth) auth).setAccessToken(accessToken);
return this;
}
}
throw new RuntimeException("No OAuth2 authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAccessToken
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setAccessToken | samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | public String getUserAgent(){
return userAgent;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserAgent
File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getUserAgent | samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setTime(ComponentName who, long millis) {
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuthorization(
isDefaultDeviceOwner(caller) || isProfileOwnerOfOrganizationOw... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTime
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setTime | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
final boolean canGcNowLocked() {
for (BroadcastQueue q : mBroadcastQueues) {
if (!q.mParallelBroadcasts.isEmpty() || !q.mDispatcher.isIdle()) {
return false;
}
}
return mAtmInternal.canGcNow();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canGcNowLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | canGcNowLocked | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void showAuthStatus() {
if (mAuthStatusView != null) {
if (mAuthStatusIcon == NO_ICON && EMPTY_STRING.equals(mAuthStatusText)) {
mAuthStatusView.setVisibility(View.INVISIBLE);
} else {
mAuthStatusView.setText(mAuthStatusText);
mAuth... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showAuthStatus
File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-248"
] | CVE-2021-32694 | MEDIUM | 4.3 | nextcloud/android | showAuthStatus | src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java | 9343bdd85d70625a90e0c952897957a102c2421b | 0 |
Analyze the following code function for security vulnerabilities | public static String sanitizeString(String raw, boolean allowHTML)
{
if (raw==null || raw.length()==0) {
return raw;
}
Matcher scriptMatcher = scriptPattern.matcher(raw);
String next = scriptMatcher.replaceAll("script");
Matcher imgOnErrorMatcher = imgOnErr... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2016-6555
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Change WebSecurityUtils to use OWASP Java Encoder
Function: sanitizeString
File: core/lib/src/main/java/org/opennms/core/utils/WebSecurityUtils.java
Repository: OpenNMS/opennms
Fixed Code:
public static... | [
"CWE-79"
] | CVE-2016-6555 | MEDIUM | 4.3 | OpenNMS/opennms | sanitizeString | core/lib/src/main/java/org/opennms/core/utils/WebSecurityUtils.java | 7caadc77be5d0c6a4d0dc78a4ab9ab84a7e1d75b | 1 |
Analyze the following code function for security vulnerabilities | private void disallowAddUser() {
if (!isHeadlessFlagEnabled() || mIsAutomotive) {
// Auto still enables adding users due to the communal nature of those devices
if (mInjector.userManagerIsHeadlessSystemUserMode()) {
Slogf.i(LOG_TAG, "Not setting DISALLOW_ADD_USER on headl... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disallowAddUser
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | disallowAddUser | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private int getFalsingThreshold() {
float factor = mStatusBar.isWakeUpComingFromTouch() ? 1.5f : 1.0f;
return (int) (mQsFalsingThreshold * factor);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFalsingThreshold
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | getFalsingThreshold | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | public void setReturnTo(String returnTo) {
try {
this.returnToUrlEncode = Utils.urlEncode(returnTo);
}
catch(UnsupportedEncodingException e) {
throw new OpenIdException(e);
}
this.returnTo = returnTo;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setReturnTo
File: JOpenId/src/org/expressme/openid/OpenIdManager.java
Repository: michaelliao/jopenid
The code follows secure coding practices. | [
"CWE-208"
] | CVE-2010-10006 | LOW | 1.4 | michaelliao/jopenid | setReturnTo | JOpenId/src/org/expressme/openid/OpenIdManager.java | c9baaa976b684637f0d5a50268e91846a7a719ab | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasParticipant(User user) {
for( R build = getLastBuild(); build!=null; build=build.getPreviousBuild())
if(build.hasParticipant(user))
return true;
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasParticipant
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | hasParticipant | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private void moveAttachment(EntityReference source, AttachmentReference destination, boolean autoRedirect,
XWiki wiki)
{
try {
XWikiDocument sourceDocument = wiki.getDocument(source.getParent(), this.xcontextProvider.get());
XWikiDocument targetDocument = wiki.getDocument(des... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveAttachment
File: xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-api/src/main/java/org/xwiki/attachment/internal/refactoring/job/MoveAttachmentJob.java
Repository: xwiki/xwiki-platform
The ... | [
"CWE-862"
] | CVE-2023-37910 | HIGH | 8.1 | xwiki/xwiki-platform | moveAttachment | xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-api/src/main/java/org/xwiki/attachment/internal/refactoring/job/MoveAttachmentJob.java | d7720219d60d7201c696c3196c9d4a86d0881325 | 0 |
Analyze the following code function for security vulnerabilities | public void sendValidationEmail(String xwikiname, String password, String email, String addfieldname,
String addfieldvalue, String contentfield, XWikiContext context) throws XWikiException
{
MailSenderConfiguration configuration = Utils.getComponent(MailSenderConfiguration.class);
String se... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendValidationEmail
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | sendValidationEmail | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public String getAttachmentURL(AttachmentReference attachmentReference, String action, String queryString,
XWikiContext context)
{
DocumentReference documentReference = attachmentReference.getDocumentReference();
SpaceReference spaceReference = documentReference.getLastSpaceReference();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttachmentURL
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getAttachmentURL | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void parseUnitPlacement(final List<Element> elements) throws GameParseException {
for (final Element current : elements) {
final Territory territory = getTerritory(current, "territory", true);
final UnitType type = getUnitType(current, "unitType", true);
final String ownerString = current.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseUnitPlacement
File: game-core/src/main/java/games/strategy/engine/data/GameParser.java
Repository: triplea-game/triplea
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000546 | MEDIUM | 6.8 | triplea-game/triplea | parseUnitPlacement | game-core/src/main/java/games/strategy/engine/data/GameParser.java | 0f23875a4c6e166218859a63c884995f15c53895 | 0 |
Analyze the following code function for security vulnerabilities | private static byte[] hmac(final byte[] input, final int offset, final int length)
{
final HMac hmac = new HMac(new SHA256Digest());
final byte[] output = new byte[HMAC_SIZE];
hmac.update(input, offset, length);
hmac.doFinal(output, 0);
return output;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hmac
File: src/main/java/org/cryptacular/CiphertextHeaderV2.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | hmac | src/main/java/org/cryptacular/CiphertextHeaderV2.java | 00395c232cdc62d4292ce27999c026fc1f076b1d | 0 |
Analyze the following code function for security vulnerabilities | int getUid() {
return info.applicationInfo.uid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUid
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | getUid | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @RequiresPermission(MANAGE_FINGERPRINT)
public long preEnroll() {
long result = 0;
if (mService != null) try {
result = mService.preEnroll(mToken);
} catch (RemoteException e) {
throw e.rethrowFromSystemServer();
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: preEnroll
File: core/java/android/hardware/fingerprint/FingerprintManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | preEnroll | core/java/android/hardware/fingerprint/FingerprintManager.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public Connection connect() {
try {
Class.forName("org.postgresql.Driver");
} catch (ClassNotFoundException e) {
System.out.println("Driver not found");
System.exit(0);
}
System.out.println("PostgreSQL driver registered.");
Connection dbConn ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connect
File: src/Model.java
Repository: ChrisMcMStone/gmail-servlet
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2014-125075 | MEDIUM | 5.2 | ChrisMcMStone/gmail-servlet | connect | src/Model.java | 5d72753c2e95bb373aa86824939397dc25f679ea | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void draw(Canvas canvas) {
canvas.drawColor(mColor, PorterDuff.Mode.SRC);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: draw
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | draw | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | private RuntimeException getCause(Throwable exception) {
if (exception instanceof CompletionException) {
return getCause(exception.getCause());
} else if (exception instanceof RuntimeException) {
return (RuntimeException) exception;
} else {
return new Illegal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCause
File: flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | getCause | flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java | 6ae6460ca4f3a9b50bd46fbf49c807fe67718307 | 0 |
Analyze the following code function for security vulnerabilities | public void stopFreezingAllLocked() {
int i = activities.size();
while (i > 0) {
i--;
activities.get(i).stopFreezingScreenLocked(true);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopFreezingAllLocked
File: services/core/java/com/android/server/am/ProcessRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | stopFreezingAllLocked | services/core/java/com/android/server/am/ProcessRecord.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | private Schema loadSchema(Resource[] resources, String schemaLanguage) throws IOException, SAXException {
if (logger.isDebugEnabled()) {
logger.debug("Setting validation schema to " +
StringUtils.arrayToCommaDelimitedString(this.schemaResources));
}
Assert.notEmpty(resources, "No resources given");
Asse... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadSchema
File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
Repository: spring-projects/spring-framework
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-4152 | MEDIUM | 6.8 | spring-projects/spring-framework | loadSchema | spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java | 2843b7d2ee12e3f9c458f6f816befd21b402e3b9 | 0 |
Analyze the following code function for security vulnerabilities | protected String getRefreshTokenCookie(String refreshToken, String tokenCookieVal, String accessToken)
{
return refreshToken;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRefreshTokenCookie
File: src/main/java/com/mxgraph/online/AbsAuthServlet.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-601",
"CWE-918"
] | CVE-2022-1767 | MEDIUM | 5 | jgraph/drawio | getRefreshTokenCookie | src/main/java/com/mxgraph/online/AbsAuthServlet.java | c63f3a04450f30798df47f9badbc74eb8a69fbdf | 0 |
Analyze the following code function for security vulnerabilities | @DeviceOwnerType
private int getDeviceOwnerTypeLocked(String packageName) {
return mOwners.getDeviceOwnerType(packageName);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerTypeLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getDeviceOwnerTypeLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isProvisioningAllowed(String action, String packageName) {
Objects.requireNonNull(packageName);
final CallerIdentity caller = getCallerIdentity();
final long ident = mInjector.binderClearCallingIdentity();
try {
final List<String> callerUidPackag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isProvisioningAllowed
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isProvisioningAllowed | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAsyncStarted() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAsyncStarted
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | isAsyncStarted | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setNonce(long nonce) {
n = nonce;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNonce
File: src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | setNonce | src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.