instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private void validateApplicationConfigurations(ServiceProvider application,
String tenantDomain,
String username) throws IdentityApplicationManagementException {
try {
applicationValidatorManager.v... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validateApplicationConfigurations
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | validateApplicationConfigurations | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public <T> T lookup(Class<T> serviceClass) {
ServiceReference<T> reference = getWebAppBundle().getBundleContext()
.getServiceReference(serviceClass);
if (reference == null) {
LoggerFactory.getLogger(OsgiLookupImpl.class)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lookup
File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
Repository: vaadin/osgi
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-31407 | MEDIUM | 5 | vaadin/osgi | lookup | flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java | 3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onAttachedToWindow() {
super.onAttachedToWindow();
if (mNavigationButton != null) mNavigationButton.addOnLayoutChangeListener(this);
if (mUrlBar != null) mUrlBar.addOnLayoutChangeListener(this);
if (mLocationBar != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onAttachedToWindow
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | onAttachedToWindow | chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public boolean getValidation() {
return isValidating();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValidation
File: core/src/java/org/jdom2/input/SAXBuilder.java
Repository: hunterhacker/jdom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33813 | MEDIUM | 5 | hunterhacker/jdom | getValidation | core/src/java/org/jdom2/input/SAXBuilder.java | bd3ab78370098491911d7fe9d7a43b97144a234e | 0 |
Analyze the following code function for security vulnerabilities | public static void downloadFile(Activity activity, Message message) {
ConversationFragment fragment = findConversationFragment(activity);
if (fragment != null) {
fragment.startDownloadable(message);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: downloadFile
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | downloadFile | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onPreferenceClick(Preference pref) {
if (pref == mMePreference) {
if (mUserCaps.mIsGuest) {
showDialog(DIALOG_CONFIRM_EXIT_GUEST);
return true;
}
// If this is a limited user, launch the user info settings instead o... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onPreferenceClick
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | onPreferenceClick | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | public void showInstallPgpDialog() {
Builder builder = new AlertDialog.Builder(this);
builder.setTitle(getString(R.string.openkeychain_required));
builder.setIconAttribute(android.R.attr.alertDialogIcon);
builder.setMessage(getText(R.string.openkeychain_required_long));
builder.setNegativeButton(getString(R.s... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showInstallPgpDialog
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | showInstallPgpDialog | src/main/java/eu/siacs/conversations/ui/XmppActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onReceive(Context context, Intent intent) {
if (DEBUG || DEBUG_REBOOT) {
Slog.d(TAG, "Shutdown broadcast received.");
}
// Since it cleans up the shortcut directory and rewrite the ShortcutPackageItems
// in odrder during save... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onReceive
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | onReceive | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public Object getEditedItemId() {
return editedItemId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEditedItemId
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getEditedItemId | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getAuthToken() {
return authToken;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAuthToken
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/TelegramNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | getAuthToken | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/TelegramNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
private Action makeNegativeAction() {
if (mDeclineIntent == null) {
return makeAction(R.drawable.ic_call_decline,
R.string.call_notification_hang_up_action,
mDeclineButtonColor, R.color.call_notification_decline_color,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeNegativeAction
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeNegativeAction | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CompletionStage<Void> write(byte[] data) {
CompletableFuture<Void> ret = new CompletableFuture<>();
response.write(Buffer.buffer(data), new Handler<AsyncResult<Void>>() {
@Override
public void handle(AsyncResult<Void> event) {
if (event.failed... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
Repository: quarkusio/quarkus
The code follows secure cod... | [
"CWE-863"
] | CVE-2022-0981 | MEDIUM | 6.5 | quarkusio/quarkus | write | independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java | 96c64fd8f09c02a497e2db366c64dd9196582442 | 0 |
Analyze the following code function for security vulnerabilities | private void updateStartedUserArrayLocked() {
int num = 0;
for (int i=0; i<mStartedUsers.size(); i++) {
UserStartedState uss = mStartedUsers.valueAt(i);
// This list does not include stopping users.
if (uss.mState != UserStartedState.STATE_STOPPING
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateStartedUserArrayLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | updateStartedUserArrayLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | void injectPostToHandler(Runnable r) {
mHandler.post(r);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectPostToHandler
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | injectPostToHandler | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | public String displayView(PropertyClass pclass, String prefix, BaseCollection object, XWikiContext context)
{
return (pclass == null) ? "" : pclass.displayView(pclass.getName(), prefix, object, context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: displayView
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | displayView | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | static private byte[] flattenBundle(Bundle bundle) {
byte[] flatData = null;
Parcel parcel = Parcel.obtain();
try {
bundle.writeToParcel(parcel, 0);
flatData = parcel.marshall();
} finally {
parcel.recycle();
}
return flatData;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flattenBundle
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | flattenBundle | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public RemoteTransition getRemoteTransition() {
return mRemoteTransition;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRemoteTransition
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | getRemoteTransition | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public static Map<String, Object> userLogin(DispatchContext ctx, Map<String, ?> context) {
LocalDispatcher dispatcher = ctx.getDispatcher();
Locale locale = (Locale) context.get("locale");
Delegator delegator = ctx.getDelegator();
// load the external auth modules -- note: this will onl... | Vulnerability Classification:
- CWE: CWE-209
- CVE: CVE-2021-25958
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fixed: UserLoginHistory failed the store operation with large password (OFBIZ-12287)
Backport 2aa68dc4de8892e8a7cbb38c10a3a3dd65d233e5 from trunk
When you have a user with long password (greater than ... | [
"CWE-209"
] | CVE-2021-25958 | MEDIUM | 5 | apache/ofbiz-framework | userLogin | framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java | 2f5b8d33e32c4d9a48243cf9e503236acd5aec5c | 1 |
Analyze the following code function for security vulnerabilities | private BigDecimal scaleBigDecimal(BigDecimal val, int scale) throws PSQLException {
if (scale == -1) {
return val;
}
try {
return val.setScale(scale);
} catch (ArithmeticException e) {
throw new PSQLException(
GT.tr("Bad value for type {0} : {1}", "BigDecimal", val),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scaleBigDecimal
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | scaleBigDecimal | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void saveBatchJsonFail(TestContext context) {
JsonArray array = new JsonArray()
.add("{ \"x\" : \"a\" }")
.add("{ \"y\" : \"'\" }");
createFoo(context).saveBatch(BAR, array, context.asyncAssertFailure());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveBatchJsonFail
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | saveBatchJsonFail | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public int getLineForVertical(int vertical) {
int high = getLineCount(), low = -1, guess;
while (high - low > 1) {
guess = (high + low) / 2;
if (getLineTop(guess) > vertical)
high = guess;
else
low = guess;
}
if (low ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLineForVertical
File: core/java/android/text/Layout.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9452 | MEDIUM | 4.3 | android | getLineForVertical | core/java/android/text/Layout.java | 3b6f84b77c30ec0bab5147b0cffc192c86ba2634 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isTts() {
return tts;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isTts
File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
Repository: codecentric/spring-boot-admin
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-46166 | CRITICAL | 9.8 | codecentric/spring-boot-admin | isTts | spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java | c14c3ec12533f71f84de9ce3ce5ceb7991975f75 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public JsonDeserializer<?> createContextual(DeserializationContext ctxt,
BeanProperty property) throws JsonMappingException
{
// 14-Jun-2017, tatu: [databind#1625]: may want to block merging, for root value
boolean preventMerge = (property == null)
&& Boolea... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2020-36518
- Severity: MEDIUM
- CVSS Score: 5.0
Description: Fix #3473 (re-implementation of #2816 for 2.14)
Function: createContextual
File: src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java
Repository: FasterXML/jackson-data... | [
"CWE-787"
] | CVE-2020-36518 | MEDIUM | 5 | FasterXML/jackson-databind | createContextual | src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java | 8238ab41d0350fb915797c89d46777b4496b74fd | 1 |
Analyze the following code function for security vulnerabilities | @Override
public KieServerSetup connect(KieServerInfo serverInfo) {
KieServerState currentState = context.getStateRepository().load(KieServerEnvironment.getServerId());
Set<String> controllers = currentState.getControllers();
KieServerConfig config = currentState.getConfiguration();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connect
File: kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/DefaultRestControllerImpl.java
Repository: kiegroup/droolsjbpm-integration
The code ... | [
"CWE-260"
] | CVE-2016-7043 | MEDIUM | 5 | kiegroup/droolsjbpm-integration | connect | kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/DefaultRestControllerImpl.java | e916032edd47aa46d15f3a11909b4804ee20a7e8 | 0 |
Analyze the following code function for security vulnerabilities | protected void DoGetResumable(HttpServletRequest request, HttpServletResponse response)
throws IOException
{
if (ConfigurationManager.getProperty("upload.temp.dir") != null)
{
tempDir = ConfigurationManager.getProperty("upload.temp.dir");
}
else
{
... | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2022-31194
- Severity: HIGH
- CVSS Score: 7.2
Description: [DS-4132] JPSUI resumable upload dir validation
Function: DoGetResumable
File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java
Repository: DSpace
Fixed Code:
protected v... | [
"CWE-22"
] | CVE-2022-31194 | HIGH | 7.2 | DSpace | DoGetResumable | dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java | d1dd7d23329ef055069759df15cfa200c8e3 | 1 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
protected void readDesign(Element design, DesignContext designContext) {
Attributes attributes = design.attributes();
if (design.hasAttr("sortable")) {
setSortable(DesignAttributeHandler.readAttribute("sortable",
att... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readDesign
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | readDesign | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public static byte[] hexStringToByteArray(String hexString) {
int read = hexString.length();
byte[] byteArray = new byte[read/2];
for (int i=0, j=0; i < read; i++, j++) {
String part = hexString.substring(i,i+2);
byteArray[j] =
new Short(Integer.toString(Integ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hexStringToByteArray
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | hexStringToByteArray | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void dismissLowBatteryWarning() {
if (DEBUG) Slog.d(TAG, "dismissing low battery warning: level=" + mBatteryLevel);
dismissLowBatteryNotification();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dismissLowBatteryWarning
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | dismissLowBatteryWarning | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | public static final void createNewFile(File file) throws IOException
{
if (!file.createNewFile())
{
throw new IOException("Failed to create new file");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createNewFile
File: src/main/java/net/sf/mpxj/common/FileHelper.java
Repository: joniles/mpxj
The code follows secure coding practices. | [
"CWE-377",
"CWE-200"
] | CVE-2022-41954 | LOW | 3.3 | joniles/mpxj | createNewFile | src/main/java/net/sf/mpxj/common/FileHelper.java | ae0af24345d79ad45705265d9927fe55e94a5721 | 0 |
Analyze the following code function for security vulnerabilities | ActivityStarter setErrorCallbackToken(@Nullable IBinder errorCallbackToken) {
mRequest.errorCallbackToken = errorCallbackToken;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setErrorCallbackToken
File: services/core/java/com/android/server/wm/ActivityStarter.java
Repository: android
The code follows secure coding practices. | [
"CWE-269"
] | CVE-2023-21269 | HIGH | 7.8 | android | setErrorCallbackToken | services/core/java/com/android/server/wm/ActivityStarter.java | 70ec64dc5a2a816d6aa324190a726a85fd749b30 | 0 |
Analyze the following code function for security vulnerabilities | protected Buffer encode(Buffer buffer) throws IOException {
try {
// Check that the packet has some free space for the header
int curPos = buffer.rpos();
int cmd = buffer.rawByte(curPos) & 0xFF; // usually the 1st byte is an SSH opcode
Buffer nb = preProcessEncode... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encode
File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
Repository: apache/mina-sshd
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | apache/mina-sshd | encode | sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java | 6b0fd46f64bcb75eeeee31d65f10242660aad7c1 | 0 |
Analyze the following code function for security vulnerabilities | private DocumentReferenceResolver<String> getCurrentMixedDocumentReferenceResolver()
{
if (this.currentMixedDocumentReferenceResolver == null) {
this.currentMixedDocumentReferenceResolver =
Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "currentmixed");
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentMixedDocumentReferenceResolver
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getCurrentMixedDocumentReferenceResolver | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public static Map<String,String> getServiceProperties(Context a) {
if (serviceProperties == null) {
InputStream i = null;
try {
serviceProperties = new HashMap<String,String>();
try {
i = a.openFileInput("CN1$AndroidServiceProperties");... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getServiceProperties
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getServiceProperties | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getKeyLength() {
return 32;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getKeyLength
File: src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | getKeyLength | src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Analyze the following code function for security vulnerabilities | private void mergeMediaPackageElements(MediaPackage mp, MediaPackage scheduledMp) {
// drop catalogs sent by the capture agent in favor of Opencast's own metadata
if (skipCatalogs) {
for (MediaPackageElement element : mp.getCatalogs()) {
if (!element.getFlavor().equals(MediaPackageElements.SMIL)) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergeMediaPackageElements
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-29237 | MEDIUM | 5.5 | opencast | mergeMediaPackageElements | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java | 8d5ec1614eed109b812bc27b0c6d3214e456d4e7 | 0 |
Analyze the following code function for security vulnerabilities | final WindowState windowForClientLocked(Session session, IBinder client,
boolean throwOnError) {
WindowState win = mWindowMap.get(client);
if (localLOGV) Slog.v(
TAG, "Looking up client " + client + ": " + win);
if (win == null) {
RuntimeException ex = new Ill... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: windowForClientLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | windowForClientLocked | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder t(String value); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: t
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | t | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | private void suspendAutohide() {
mHandler.removeCallbacks(mAutohide);
mHandler.removeCallbacks(mCheckBarModes);
mAutohideSuspended = (mSystemUiVisibility & STATUS_OR_NAV_TRANSIENT) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: suspendAutohide
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | suspendAutohide | packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setApplicationRestrictions(ComponentName who, String callerPackage,
String packageName, Bundle settings) {
final CallerIdentity caller = getCallerIdentity(who, callerPackage);
Preconditions.checkCallAuthorization((caller.hasAdminComponent()
&& (isPro... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApplicationRestrictions
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | setApplicationRestrictions | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | protected void initIdentityServer() {
IDPType idpConfiguration = getIdpConfiguration();
// The Identity Server on the servlet context gets set
// in the implementation of IdentityServer
// Create an Identity Server and set it on the context
IdentityServer identityServer = (Ident... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initIdentityServer
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding pr... | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | initIdentityServer | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getApplicationHiddenSettingAsUser(String packageName, int userId) {
mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USERS, null);
enforceCrossUserPermission(Binder.getCallingUid(), userId, true,
false, "getApplicationHidden for user... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationHiddenSettingAsUser
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | getApplicationHiddenSettingAsUser | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public VFSStatus canVersion() {
return VFSRepositoryModule.canVersion(getBasefile());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canVersion
File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | canVersion | src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java | 336d5ce80681be61a0bbf4f73d2af5d1ff67e93a | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
@Override
public IIntentSender getIntentSender(int type,
String packageName, IBinder token, String resultWho,
int requestCode, Intent[] intents, String[] resolvedTypes,
int flags, Bundle bOptions, int userId) {
return getIntentSenderWithFeature(type, packa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | getIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public String getAcceptType() {
return acceptType;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAcceptType
File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
Repository: Bedework/bw-webdav
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-20000 | MEDIUM | 5 | Bedework/bw-webdav | getAcceptType | src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java | 67283fb8b9609acdb1a8d2e7fefe195b4a261062 | 0 |
Analyze the following code function for security vulnerabilities | protected String getSystemIdForFileName(String fileName) {
InputStream fileInputStream = null;
try {
String urlPath = null;
File file = new File(fileName); // files in filesystem
if (!file.exists()) {
URL url = getURL(fileName);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSystemIdForFileName
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-13990 | HIGH | 7.5 | quartz-scheduler/quartz | getSystemIdForFileName | quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java | a1395ba118df306c7fe67c24fb0c9a95a4473140 | 0 |
Analyze the following code function for security vulnerabilities | protected void convertNumberToBigInteger() throws IOException
{
if ((_numTypesValid & NR_BIGDECIMAL) != 0) {
// here it'll just get truncated, no exceptions thrown
_numberBigInt = _numberBigDecimal.toBigInteger();
} else if ((_numTypesValid & NR_LONG) != 0) {
_num... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertNumberToBigInteger
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | convertNumberToBigInteger | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean setCountryCode(String countryCode) {
return mWifiNative.setStaCountryCode(mInterfaceName, countryCode);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCountryCode
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | setCountryCode | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | void updateUnlockMethodAndFinish(int quality, boolean disabled, boolean chooseLockSkipped) {
// Sanity check. We should never get here without confirming user's existing password.
if (!mPasswordConfirmed) {
throw new IllegalStateException("Tried to update password without confirm... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateUnlockMethodAndFinish
File: src/com/android/settings/password/ChooseLockGeneric.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | updateUnlockMethodAndFinish | src/com/android/settings/password/ChooseLockGeneric.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public User getUser() throws IllegalStateException {
Organization org = getOrganization();
if (org == null)
throw new IllegalStateException("No organization is set in security context");
User delegatedUser = delegatedUserHolder.get();
if (delegatedUser != null) {
return delegat... | Vulnerability Classification:
- CWE: CWE-287
- CVE: CVE-2020-5206
- Severity: MEDIUM
- CVSS Score: 6.4
Description: Authentication Bypass For Endpoints With Anonymous Access
Using a remember-me cookie with an arbitrary username can cause Opencast
to assume proper authentication for that user even if the remember-me
c... | [
"CWE-287"
] | CVE-2020-5206 | MEDIUM | 6.4 | opencast | getUser | modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java | b157e1fb3b35991ca7bf59f0730329fbe7ce82e8 | 1 |
Analyze the following code function for security vulnerabilities | private boolean canDPCManagedUserUseLockTaskLocked(int userId) {
if (isUserAffiliatedWithDeviceLocked(userId)) {
return true;
}
// Unaffiliated profile owners are not allowed to use lock when there is a device owner.
if (mOwners.hasDeviceOwner()) {
return false;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canDPCManagedUserUseLockTaskLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | canDPCManagedUserUseLockTaskLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String getStatus() {
return status;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatus
File: src/main/java/cn/luischen/model/ContentDomain.java
Repository: WinterChenS/my-site
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29638 | MEDIUM | 5.4 | WinterChenS/my-site | getStatus | src/main/java/cn/luischen/model/ContentDomain.java | d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed | 0 |
Analyze the following code function for security vulnerabilities | public SocketConfigurator getSocketConfigurator() {
return socketConf;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSocketConfigurator
File: src/main/java/com/rabbitmq/client/ConnectionFactory.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | getSocketConfigurator | src/main/java/com/rabbitmq/client/ConnectionFactory.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | public AssetHandler lastModified(final boolean enabled) {
this.lastModified = enabled;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lastModified
File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | lastModified | jooby/src/main/java/org/jooby/handlers/AssetHandler.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | public void addIntCreator(AnnotatedWithParams creator, boolean explicit) {
verifyNonDup(creator, C_INT, explicit);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addIntCreator
File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | addIntCreator | src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | private byte[] getPasswordVerifier() throws IOException {
byte[] pvBytes = new byte[2];
readRaw(pvBytes);
return pvBytes;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPasswordVerifier
File: src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | getPasswordVerifier | src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | public void addChunkLoad(int cx, int cz) {
if (world == null) {
return;
}
world.checkLoadedChunk(BlockVector3.at(cx << 4, 0, cz << 4));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addChunkLoad
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | addChunkLoad | worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int countTotal(Context context) throws SQLException {
return collectionDAO.countRows(context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: countTotal
File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41189 | HIGH | 9 | DSpace | countTotal | dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java | 277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasBacklinks() throws XWikiException
{
return this.xwiki.hasBacklinks(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasBacklinks
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | hasBacklinks | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | protected LogHandler createLogHandler(ServletConfig pServletConfig, final boolean pDebug) {
return new LogHandler() {
/** {@inheritDoc} */
public void debug(String message) {
if (pDebug) {
log(message);
}
}
/** ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createLogHandler
File: agent/core/src/main/java/org/jolokia/http/AgentServlet.java
Repository: jolokia
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2014-0168 | MEDIUM | 6.8 | jolokia | createLogHandler | agent/core/src/main/java/org/jolokia/http/AgentServlet.java | 2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364 | 0 |
Analyze the following code function for security vulnerabilities | private GHResponse calcRoute(List<Double> favoredHeadings, List<GHPoint> requestPoints, String profileStr,
String localeStr, boolean enableInstructions, double minPathPrecision) {
GHRequest request;
if (favoredHeadings.size() > 0) {
request = new GHRequest(re... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: calcRoute
File: navigation/src/main/java/com/graphhopper/navigation/NavigateResource.java
Repository: graphhopper
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-29506 | MEDIUM | 4 | graphhopper | calcRoute | navigation/src/main/java/com/graphhopper/navigation/NavigateResource.java | eb189be1fa7443ebf4ae881e737a18f818c95f41 | 0 |
Analyze the following code function for security vulnerabilities | private void closeInactiveUIs(VaadinSession session) {
final String sessionId = session.getSession().getId();
for (final UI ui : session.getUIs()) {
if (!isUIActive(ui) && !ui.isClosing()) {
ui.accessSynchronously(() -> {
getLogger().log(Level.FINE,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeInactiveUIs
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | closeInactiveUIs | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | public static void move(File from, File to) throws IOException {
checkNotNull(from);
checkNotNull(to);
checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to);
if (!from.renameTo(to)) {
copy(from, to);
if (!from.delete()) {
if (!to.delete()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: move
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | move | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setNearbyNotificationStreamingPolicy(int policy) {
if (!mHasFeature) {
return;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isDefaultDeviceOwner(caller) || isProfileOwner(caller));
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNearbyNotificationStreamingPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setNearbyNotificationStreamingPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent() {
assertCountQuery("select distinct m.genre from Media m where m.user = ?1 OrDer By m.genre ASC",
"select count(distinct m.genre) from Media m where m.user = ?1");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent
File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
Repository: spring-projects/spring-data-jpa
The code follows sec... | [
"CWE-89"
] | CVE-2016-6652 | MEDIUM | 6.8 | spring-projects/spring-data-jpa | removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent | src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java | b8e7fe | 0 |
Analyze the following code function for security vulnerabilities | public void updateNCharacterStream(@Positive int columnIndex,
@Nullable Reader x, long length) throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(),
"updateNCharacterStream(int, Reader, long)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNCharacterStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateNCharacterStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @DeleteMapping("/{modelId}")
@Authorize(action = Permission.ACTION_DELETE)
public ResponseMessage<Void> delete(@PathVariable String modelId) {
repositoryService.deleteModel(modelId);
return ResponseMessage.ok();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: delete
File: hsweb-system/hsweb-system-workflow/hsweb-system-workflow-local/src/main/java/org/hswebframework/web/workflow/web/FlowableModelManagerController.java
Repository: hs-web/hsweb-framework
The code follows sec... | [
"CWE-79"
] | CVE-2018-20594 | MEDIUM | 4.3 | hs-web/hsweb-framework | delete | hsweb-system/hsweb-system-workflow/hsweb-system-workflow-local/src/main/java/org/hswebframework/web/workflow/web/FlowableModelManagerController.java | b72a2275ed21240296c6539bae1049c56abb542f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public KBTemplate updateImpl(KBTemplate kbTemplate) {
kbTemplate = toUnwrappedModel(kbTemplate);
boolean isNew = kbTemplate.isNew();
KBTemplateModelImpl kbTemplateModelImpl = (KBTemplateModelImpl)kbTemplate;
if (Validator.isNull(kbTemplate.getUuid())) {
String uuid = PortalUUIDUtil.generate();
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2017-12647
- Severity: MEDIUM
- CVSS Score: 4.3
Description: LPS-72090 Sanitize content to prevent XSS
Function: updateImpl
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersis... | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | updateImpl | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 1 |
Analyze the following code function for security vulnerabilities | private static native @Nullable String nativeGetLastResourceResolution(long ptr); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeGetLastResourceResolution
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | nativeGetLastResourceResolution | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean refresh() {
highlighters.clear();
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refresh
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | refresh | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | void recordPssSampleLocked(ProcessRecord proc, int procState, long pss, long uss, long now) {
EventLogTags.writeAmPss(proc.pid, proc.uid, proc.processName, pss * 1024, uss * 1024);
proc.lastPssTime = now;
proc.baseProcessTracker.addPss(pss, uss, true, proc.pkgList);
if (DEBUG_PSS) Slog.d... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recordPssSampleLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | recordPssSampleLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setServers(List<ServerConfiguration> servers) {
this.servers = servers;
updateBasePath();
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setServers
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setServers | samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void toggleBackupServiceActive(int userId, boolean makeActive) {
long ident = mInjector.binderClearCallingIdentity();
try {
if (mInjector.getIBackupManager() != null) {
mInjector.getIBackupManager()
.setBackupServiceActive(userId, makeActive);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toggleBackupServiceActive
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | toggleBackupServiceActive | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean check(SerializationConfig c1, SerializationConfig c2) {
return c1 == c2 || !(c1 == null || c2 == null)
&& nullSafeEqual(c1.getPortableVersion(), c2.getPortableVersion())
&& nullSafeEqual(c1.getDataSerializableFactoryClasses(), c2.getDataSeria... | Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2016-10750
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Add basic protection against untrusted deserialization.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
Fixed Code:
@Override
... | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void channelConnected(final ChannelHandlerContext ctx, final ChannelStateEvent e) throws Exception {
if (issueHandshake) {
// issue and handshake and add a listener to it which will fire an exception event if
// an exception was thrown while doing the handshake
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: channelConnected
File: src/main/java/org/jboss/netty/handler/ssl/SslHandler.java
Repository: netty
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2014-3488 | MEDIUM | 5 | netty | channelConnected | src/main/java/org/jboss/netty/handler/ssl/SslHandler.java | 2fa9400a59d0563a66908aba55c41e7285a04994 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public IPage<SysUser> getUserByRoleId(Page<SysUser> page, String roleId, String username) {
return userMapper.getUserByRoleId(page,roleId,username);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserByRoleId
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-45208 | MEDIUM | 4.3 | jeecgboot/jeecg-boot | getUserByRoleId | jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java | 51e2227bfe54f5d67b09411ee9a336750164e73d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void configConstant(Constants con) {
con.setDevMode(BlogBuildInfoUtil.isDev());
con.setViewType(ViewType.JSP);
con.setEncoding("utf-8");
con.setI18nDefaultBaseName(com.zrlog.common.Constants.I18N);
con.setI18nDefaultLocale("zh_CN");
con.setError404Vie... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2019-16643
- Severity: LOW
- CVSS Score: 3.5
Description: Upgrade jar version & fix #54
Signed-off-by: xiaochun <xchun90@163.com>
Function: configConstant
File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
Repository: 94fzb/zrlog
Fixed Code:
@Overrid... | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | configConstant | web/src/main/java/com/zrlog/web/config/ZrLogConfig.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 1 |
Analyze the following code function for security vulnerabilities | private void encrypt(byte[] plaintext, int plaintextOffset,
byte[] ciphertext, int ciphertextOffset, int length) {
while (length > 0) {
int tempLen = 64;
if (tempLen > length)
tempLen = length;
ChaChaCore.hash(output, input);
xorBlock(plaintext, plaintextOffset, ciphertext, ciphertextOffset, tempLe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: encrypt
File: src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java
Repository: rweather/noise-java
The code follows secure coding practices. | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | encrypt | src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 0 |
Analyze the following code function for security vulnerabilities | private AttributedString highlight(
Integer width, SyntaxHighlighter highlighter, String object, boolean doValueHighlight) {
AttributedString out;
AttributedStringBuilder asb = new AttributedStringBuilder();
String val = object;
if (highlighter != null && doValueHighlight) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: highlight
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-50572 | MEDIUM | 5.5 | jline/jline3 | highlight | console/src/main/java/org/jline/console/impl/DefaultPrinter.java | f3c60a3e6255e8e0c20d5043a4fe248446f292bb | 0 |
Analyze the following code function for security vulnerabilities | protected synchronized boolean isIngestLimitEnabled() {
return ingestLimit >= 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isIngestLimitEnabled
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
Repository: opencast
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2020-5230 | MEDIUM | 5 | opencast | isIngestLimitEnabled | modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java | bbb473f34ab95497d6c432c81285efb0c739f317 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setPendingIntentAllowlistDuration(IIntentSender target, IBinder allowlistToken,
long duration, int type, @ReasonCode int reasonCode, @Nullable String reason) {
mPendingIntentController.setPendingIntentAllowlistDuration(target, allowlistToken,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPendingIntentAllowlistDuration
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | setPendingIntentAllowlistDuration | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | private void updateContact() {
if (DBG) log("updateContact");
final String name = getNameFromTextField();
final String number = PhoneNumberUtils.convertAndStrip(getNumberFromTextField());
if (!isValidNumber(number)) {
handleResult(false, true);
return;
}... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateContact
File: src/com/android/phone/settings/fdn/EditFdnContactScreen.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | updateContact | src/com/android/phone/settings/fdn/EditFdnContactScreen.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | public boolean canDelete(View view) {
return viewGroupMixIn.canDelete(view);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canDelete
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | canDelete | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isIgnored() {
return mIgnored;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isIgnored
File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | isIgnored | src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java | 41d882324288085fd32ae0bb70dc85f5fd0e2be7 | 0 |
Analyze the following code function for security vulnerabilities | private void mergeFrom(ApkSigResult source) {
switch (source.signatureSchemeVersion) {
case ApkSigningBlockUtils.VERSION_SOURCE_STAMP:
mSourceStampVerified = source.verified;
if (!source.mSigners.isEmpty()) {
mSourceStampInfo = ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergeFrom
File: src/main/java/com/android/apksig/ApkVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | mergeFrom | src/main/java/com/android/apksig/ApkVerifier.java | 039f815895f62c9f8af23df66622b66246f3f61e | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setHideSmartReplies(boolean hideSmartReplies) {
mN.extras.putBoolean(EXTRA_HIDE_SMART_REPLIES, hideSmartReplies);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHideSmartReplies
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setHideSmartReplies | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public JiffleDirectRuntime getRuntimeInstance() throws
it.geosolutions.jaiext.jiffle.JiffleException {
return (JiffleDirectRuntime) getRuntimeInstance(RuntimeModel.DIRECT);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRuntimeInstance
File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
Repository: geosolutions-it/jai-ext
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2022-24816 | HIGH | 7.5 | geosolutions-it/jai-ext | getRuntimeInstance | jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java | cb1d6565d38954676b0a366da4f965fef38da1cb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getStringProperty(String name) throws JMSException {
Object o = this.getObjectProperty(name);
if (o == null)
return null;
else if (o instanceof String)
return (String) o;
else
return o.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStringProperty
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | getStringProperty | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void verify(Record record) {
// 自动只读字段忽略非空检查
final Set<String> autoReadonlyFields = EasyMetaFactory.getAutoReadonlyFields(entity.getName());
List<String> notNulls = new ArrayList<>(); // 非空
List<String> notWells = new ArrayList<>(); // 格式
// 新建
if... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-1613
- Severity: MEDIUM
- CVSS Score: 4.0
Description: fix: #596
Function: verify
File: src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java
Repository: getrebuild/rebuild
Fixed Code:
@Override
public void verify(Record record) {
// ... | [
"CWE-79"
] | CVE-2023-1613 | MEDIUM | 4 | getrebuild/rebuild | verify | src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java | d422c1b9c0f6970bf7af0257a2c6b0f8be535963 | 1 |
Analyze the following code function for security vulnerabilities | private void handleProtocolVersionMismatch() throws IOException {
// Probably an AMQP.... header indicating a version mismatch
// Otherwise meaningless, so try to read the version,
// and throw an exception, whether we read the version
// okay or not.
// Try to read everything fr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleProtocolVersionMismatch
File: src/main/java/com/rabbitmq/client/impl/nio/FrameBuilder.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | handleProtocolVersionMismatch | src/main/java/com/rabbitmq/client/impl/nio/FrameBuilder.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@Deprecated(since = "14.8RC1")
public void deleteLinks(long docId, XWikiContext inputxcontext, boolean bTransaction) throws XWikiException
{
executeWrite(inputxcontext, session -> {
try {
Query<?> query = session.createQuery("delete from XWikiLink as link where ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteLinks
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | deleteLinks | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onVerbatim(String content, boolean inline, Map<String, String> parameters)
{
if (inline) {
// Note: We generate a tt element rather than a pre element since pre elements cannot be located inside
// paragraphs for example. There also no tag in XHTML that has ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onVerbatim
File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
Repository: xwiki/xwiki-rendering
The code follows secure cod... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | onVerbatim | xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isSchema() {
return schema;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSchema
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java
Repository: eclipse/lemminx
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-18213 | MEDIUM | 6.5 | eclipse/lemminx | isSchema | org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java | c8bf3245a72cace50ee2aae5eee69538c58ce056 | 0 |
Analyze the following code function for security vulnerabilities | static public synchronized void initialize(File dir) {
if (singleton != null) {
logger.warn("Overwriting singleton already set: " + singleton);
}
logger.info("Using workspace directory: {}", dir.getAbsolutePath());
singleton = new FileProjectManager(dir);
// This need... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initialize
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | initialize | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | private InstallArgs createInstallArgsForExisting(int installFlags, String codePath,
String resourcePath, String[] instructionSets) {
final boolean isInAsec;
if (installOnExternalAsec(installFlags)) {
/* Apps on SD card are always in ASEC containers. */
isInAsec = true... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createInstallArgsForExisting
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | createInstallArgsForExisting | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public String escapeString(String str) {
try {
return URLEncoder.encode(str, "utf8").replaceAll("\\+", "%20");
} catch (UnsupportedEncodingException e) {
return str;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escapeString
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding ... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | escapeString | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private boolean pushOutExcessShortcuts() {
final ShortcutService service = mShortcutUser.mService;
final int maxShortcuts = service.getMaxActivityShortcuts();
boolean changed = false;
final ArrayMap<ComponentName, ArrayList<ShortcutInfo>> all =
sortShortcutsToActivities... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pushOutExcessShortcuts
File: services/core/java/com/android/server/pm/ShortcutPackage.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40075 | MEDIUM | 5.5 | android | pushOutExcessShortcuts | services/core/java/com/android/server/pm/ShortcutPackage.java | ae768fbb9975fdab267f525831cb52f485ab0ecc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setJMSReplyTo(Destination replyTo) throws JMSException {
this.setObjectProperty(JMS_MESSAGE_REPLY_TO, replyTo);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setJMSReplyTo
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | setJMSReplyTo | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | private void adminPermission(Invocation ai) {
Controller controller = ai.getController();
AdminTokenVO adminTokenVO = adminTokenService.getAdminTokenVO(controller.getRequest());
if (adminTokenVO != null) {
try {
User user = new User().findById(adminTokenVO.getUserId()... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2019-16643
- Severity: LOW
- CVSS Score: 3.5
Description: Upgrade jar version & fix #54
Signed-off-by: xiaochun <xchun90@163.com>
Function: adminPermission
File: web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java
Repository: 94fzb/zrlog
Fixed Cod... | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | adminPermission | web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 1 |
Analyze the following code function for security vulnerabilities | @GuardedBy("getLockObject()")
private void enforceCanSetDeviceOwnerLocked(
CallerIdentity caller, @Nullable ComponentName owner, @UserIdInt int deviceOwnerUserId,
boolean hasIncompatibleAccountsOrNonAdb) {
boolean showComponentOnError = false;
if (!isAdb(caller)) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceCanSetDeviceOwnerLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | enforceCanSetDeviceOwnerLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private boolean canUserModifyAccountsForType(int userId, String accountType, int callingUid) {
// the managing app can always modify accounts
if (isProfileOwner(callingUid)) {
return true;
}
DevicePolicyManager dpm = (DevicePolicyManager) mContext
.getSystemSe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canUserModifyAccountsForType
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | canUserModifyAccountsForType | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.