instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void validateApplicationConfigurations(ServiceProvider application, String tenantDomain, String username) throws IdentityApplicationManagementException { try { applicationValidatorManager.v...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateApplicationConfigurations File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
validateApplicationConfigurations
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Override public <T> T lookup(Class<T> serviceClass) { ServiceReference<T> reference = getWebAppBundle().getBundleContext() .getServiceReference(serviceClass); if (reference == null) { LoggerFactory.getLogger(OsgiLookupImpl.class) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lookup File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java Repository: vaadin/osgi The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-31407
MEDIUM
5
vaadin/osgi
lookup
flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8
0
Analyze the following code function for security vulnerabilities
@Override protected void onAttachedToWindow() { super.onAttachedToWindow(); if (mNavigationButton != null) mNavigationButton.addOnLayoutChangeListener(this); if (mUrlBar != null) mUrlBar.addOnLayoutChangeListener(this); if (mLocationBar != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAttachedToWindow File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onAttachedToWindow
chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Deprecated public boolean getValidation() { return isValidating(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValidation File: core/src/java/org/jdom2/input/SAXBuilder.java Repository: hunterhacker/jdom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33813
MEDIUM
5
hunterhacker/jdom
getValidation
core/src/java/org/jdom2/input/SAXBuilder.java
bd3ab78370098491911d7fe9d7a43b97144a234e
0
Analyze the following code function for security vulnerabilities
public static void downloadFile(Activity activity, Message message) { ConversationFragment fragment = findConversationFragment(activity); if (fragment != null) { fragment.startDownloadable(message); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: downloadFile File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
downloadFile
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public boolean onPreferenceClick(Preference pref) { if (pref == mMePreference) { if (mUserCaps.mIsGuest) { showDialog(DIALOG_CONFIRM_EXIT_GUEST); return true; } // If this is a limited user, launch the user info settings instead o...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPreferenceClick File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
onPreferenceClick
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
public void showInstallPgpDialog() { Builder builder = new AlertDialog.Builder(this); builder.setTitle(getString(R.string.openkeychain_required)); builder.setIconAttribute(android.R.attr.alertDialogIcon); builder.setMessage(getText(R.string.openkeychain_required_long)); builder.setNegativeButton(getString(R.s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showInstallPgpDialog File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
showInstallPgpDialog
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent) { if (DEBUG || DEBUG_REBOOT) { Slog.d(TAG, "Shutdown broadcast received."); } // Since it cleans up the shortcut directory and rewrite the ShortcutPackageItems // in odrder during save...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
onReceive
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public Object getEditedItemId() { return editedItemId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditedItemId File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getEditedItemId
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Nullable public String getAuthToken() { return authToken; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthToken File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/TelegramNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
getAuthToken
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/TelegramNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@NonNull private Action makeNegativeAction() { if (mDeclineIntent == null) { return makeAction(R.drawable.ic_call_decline, R.string.call_notification_hang_up_action, mDeclineButtonColor, R.color.call_notification_decline_color, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeNegativeAction File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
makeNegativeAction
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public CompletionStage<Void> write(byte[] data) { CompletableFuture<Void> ret = new CompletableFuture<>(); response.write(Buffer.buffer(data), new Handler<AsyncResult<Void>>() { @Override public void handle(AsyncResult<Void> event) { if (event.failed...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follows secure cod...
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
write
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
private void updateStartedUserArrayLocked() { int num = 0; for (int i=0; i<mStartedUsers.size(); i++) { UserStartedState uss = mStartedUsers.valueAt(i); // This list does not include stopping users. if (uss.mState != UserStartedState.STATE_STOPPING ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateStartedUserArrayLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
updateStartedUserArrayLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
void injectPostToHandler(Runnable r) { mHandler.post(r); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectPostToHandler File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectPostToHandler
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public String displayView(PropertyClass pclass, String prefix, BaseCollection object, XWikiContext context) { return (pclass == null) ? "" : pclass.displayView(pclass.getName(), prefix, object, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayView File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
displayView
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
static private byte[] flattenBundle(Bundle bundle) { byte[] flatData = null; Parcel parcel = Parcel.obtain(); try { bundle.writeToParcel(parcel, 0); flatData = parcel.marshall(); } finally { parcel.recycle(); } return flatData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flattenBundle File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
flattenBundle
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
public RemoteTransition getRemoteTransition() { return mRemoteTransition; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRemoteTransition File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getRemoteTransition
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public static Map<String, Object> userLogin(DispatchContext ctx, Map<String, ?> context) { LocalDispatcher dispatcher = ctx.getDispatcher(); Locale locale = (Locale) context.get("locale"); Delegator delegator = ctx.getDelegator(); // load the external auth modules -- note: this will onl...
Vulnerability Classification: - CWE: CWE-209 - CVE: CVE-2021-25958 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fixed: UserLoginHistory failed the store operation with large password (OFBIZ-12287) Backport 2aa68dc4de8892e8a7cbb38c10a3a3dd65d233e5 from trunk When you have a user with long password (greater than ...
[ "CWE-209" ]
CVE-2021-25958
MEDIUM
5
apache/ofbiz-framework
userLogin
framework/common/src/main/java/org/apache/ofbiz/common/login/LoginServices.java
2f5b8d33e32c4d9a48243cf9e503236acd5aec5c
1
Analyze the following code function for security vulnerabilities
private BigDecimal scaleBigDecimal(BigDecimal val, int scale) throws PSQLException { if (scale == -1) { return val; } try { return val.setScale(scale); } catch (ArithmeticException e) { throw new PSQLException( GT.tr("Bad value for type {0} : {1}", "BigDecimal", val), ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scaleBigDecimal File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
scaleBigDecimal
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Test public void saveBatchJsonFail(TestContext context) { JsonArray array = new JsonArray() .add("{ \"x\" : \"a\" }") .add("{ \"y\" : \"'\" }"); createFoo(context).saveBatch(BAR, array, context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveBatchJsonFail File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
saveBatchJsonFail
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public int getLineForVertical(int vertical) { int high = getLineCount(), low = -1, guess; while (high - low > 1) { guess = (high + low) / 2; if (getLineTop(guess) > vertical) high = guess; else low = guess; } if (low ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLineForVertical File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getLineForVertical
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
public boolean isTts() { return tts; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTts File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
isTts
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public JsonDeserializer<?> createContextual(DeserializationContext ctxt, BeanProperty property) throws JsonMappingException { // 14-Jun-2017, tatu: [databind#1625]: may want to block merging, for root value boolean preventMerge = (property == null) && Boolea...
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2020-36518 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fix #3473 (re-implementation of #2816 for 2.14) Function: createContextual File: src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java Repository: FasterXML/jackson-data...
[ "CWE-787" ]
CVE-2020-36518
MEDIUM
5
FasterXML/jackson-databind
createContextual
src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java
8238ab41d0350fb915797c89d46777b4496b74fd
1
Analyze the following code function for security vulnerabilities
@Override public KieServerSetup connect(KieServerInfo serverInfo) { KieServerState currentState = context.getStateRepository().load(KieServerEnvironment.getServerId()); Set<String> controllers = currentState.getControllers(); KieServerConfig config = currentState.getConfiguration(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connect File: kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/DefaultRestControllerImpl.java Repository: kiegroup/droolsjbpm-integration The code ...
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
connect
kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/DefaultRestControllerImpl.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
0
Analyze the following code function for security vulnerabilities
protected void DoGetResumable(HttpServletRequest request, HttpServletResponse response) throws IOException { if (ConfigurationManager.getProperty("upload.temp.dir") != null) { tempDir = ConfigurationManager.getProperty("upload.temp.dir"); } else { ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-31194 - Severity: HIGH - CVSS Score: 7.2 Description: [DS-4132] JPSUI resumable upload dir validation Function: DoGetResumable File: dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java Repository: DSpace Fixed Code: protected v...
[ "CWE-22" ]
CVE-2022-31194
HIGH
7.2
DSpace
DoGetResumable
dspace-jspui/src/main/java/org/dspace/app/webui/servlet/SubmissionController.java
d1dd7d23329ef055069759df15cfa200c8e3
1
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") protected void readDesign(Element design, DesignContext designContext) { Attributes attributes = design.attributes(); if (design.hasAttr("sortable")) { setSortable(DesignAttributeHandler.readAttribute("sortable", att...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readDesign File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
readDesign
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public static byte[] hexStringToByteArray(String hexString) { int read = hexString.length(); byte[] byteArray = new byte[read/2]; for (int i=0, j=0; i < read; i++, j++) { String part = hexString.substring(i,i+2); byteArray[j] = new Short(Integer.toString(Integ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hexStringToByteArray File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
hexStringToByteArray
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
@Override public void dismissLowBatteryWarning() { if (DEBUG) Slog.d(TAG, "dismissing low battery warning: level=" + mBatteryLevel); dismissLowBatteryNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissLowBatteryWarning File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
dismissLowBatteryWarning
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
public static final void createNewFile(File file) throws IOException { if (!file.createNewFile()) { throw new IOException("Failed to create new file"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNewFile File: src/main/java/net/sf/mpxj/common/FileHelper.java Repository: joniles/mpxj The code follows secure coding practices.
[ "CWE-377", "CWE-200" ]
CVE-2022-41954
LOW
3.3
joniles/mpxj
createNewFile
src/main/java/net/sf/mpxj/common/FileHelper.java
ae0af24345d79ad45705265d9927fe55e94a5721
0
Analyze the following code function for security vulnerabilities
ActivityStarter setErrorCallbackToken(@Nullable IBinder errorCallbackToken) { mRequest.errorCallbackToken = errorCallbackToken; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setErrorCallbackToken File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setErrorCallbackToken
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
protected Buffer encode(Buffer buffer) throws IOException { try { // Check that the packet has some free space for the header int curPos = buffer.rpos(); int cmd = buffer.rawByte(curPos) & 0xFF; // usually the 1st byte is an SSH opcode Buffer nb = preProcessEncode...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encode File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
encode
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
private DocumentReferenceResolver<String> getCurrentMixedDocumentReferenceResolver() { if (this.currentMixedDocumentReferenceResolver == null) { this.currentMixedDocumentReferenceResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "currentmixed"); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentMixedDocumentReferenceResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getCurrentMixedDocumentReferenceResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public static Map<String,String> getServiceProperties(Context a) { if (serviceProperties == null) { InputStream i = null; try { serviceProperties = new HashMap<String,String>(); try { i = a.openFileInput("CN1$AndroidServiceProperties");...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServiceProperties File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getServiceProperties
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public int getKeyLength() { return 32; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeyLength File: src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java Repository: rweather/noise-java The code follows secure coding practices.
[ "CWE-125", "CWE-787" ]
CVE-2020-25021
HIGH
7.5
rweather/noise-java
getKeyLength
src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java
18e86b6f8bea7326934109aa9ffa705ebf4bde90
0
Analyze the following code function for security vulnerabilities
private void mergeMediaPackageElements(MediaPackage mp, MediaPackage scheduledMp) { // drop catalogs sent by the capture agent in favor of Opencast's own metadata if (skipCatalogs) { for (MediaPackageElement element : mp.getCatalogs()) { if (!element.getFlavor().equals(MediaPackageElements.SMIL)) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeMediaPackageElements File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
mergeMediaPackageElements
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
final WindowState windowForClientLocked(Session session, IBinder client, boolean throwOnError) { WindowState win = mWindowMap.get(client); if (localLOGV) Slog.v( TAG, "Looking up client " + client + ": " + win); if (win == null) { RuntimeException ex = new Ill...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: windowForClientLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
windowForClientLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public abstract BaseXMLBuilder t(String value);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: t File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
t
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
private void suspendAutohide() { mHandler.removeCallbacks(mAutohide); mHandler.removeCallbacks(mCheckBarModes); mAutohideSuspended = (mSystemUiVisibility & STATUS_OR_NAV_TRANSIENT) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: suspendAutohide File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
suspendAutohide
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void setApplicationRestrictions(ComponentName who, String callerPackage, String packageName, Bundle settings) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isPro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApplicationRestrictions File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setApplicationRestrictions
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void initIdentityServer() { IDPType idpConfiguration = getIdpConfiguration(); // The Identity Server on the servlet context gets set // in the implementation of IdentityServer // Create an Identity Server and set it on the context IdentityServer identityServer = (Ident...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initIdentityServer File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding pr...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
initIdentityServer
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public boolean getApplicationHiddenSettingAsUser(String packageName, int userId) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USERS, null); enforceCrossUserPermission(Binder.getCallingUid(), userId, true, false, "getApplicationHidden for user...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApplicationHiddenSettingAsUser File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getApplicationHiddenSettingAsUser
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public VFSStatus canVersion() { return VFSRepositoryModule.canVersion(getBasefile()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canVersion File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
canVersion
src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
336d5ce80681be61a0bbf4f73d2af5d1ff67e93a
0
Analyze the following code function for security vulnerabilities
@Deprecated @Override public IIntentSender getIntentSender(int type, String packageName, IBinder token, String resultWho, int requestCode, Intent[] intents, String[] resolvedTypes, int flags, Bundle bOptions, int userId) { return getIntentSenderWithFeature(type, packa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String getAcceptType() { return acceptType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAcceptType File: src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java Repository: Bedework/bw-webdav The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20000
MEDIUM
5
Bedework/bw-webdav
getAcceptType
src/main/java/org/bedework/webdav/servlet/common/PostRequestPars.java
67283fb8b9609acdb1a8d2e7fefe195b4a261062
0
Analyze the following code function for security vulnerabilities
protected String getSystemIdForFileName(String fileName) { InputStream fileInputStream = null; try { String urlPath = null; File file = new File(fileName); // files in filesystem if (!file.exists()) { URL url = getURL(fileName); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSystemIdForFileName File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
getSystemIdForFileName
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
protected void convertNumberToBigInteger() throws IOException { if ((_numTypesValid & NR_BIGDECIMAL) != 0) { // here it'll just get truncated, no exceptions thrown _numberBigInt = _numberBigDecimal.toBigInteger(); } else if ((_numTypesValid & NR_LONG) != 0) { _num...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertNumberToBigInteger File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
convertNumberToBigInteger
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@Override public boolean setCountryCode(String countryCode) { return mWifiNative.setStaCountryCode(mInterfaceName, countryCode); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCountryCode File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
setCountryCode
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
void updateUnlockMethodAndFinish(int quality, boolean disabled, boolean chooseLockSkipped) { // Sanity check. We should never get here without confirming user's existing password. if (!mPasswordConfirmed) { throw new IllegalStateException("Tried to update password without confirm...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUnlockMethodAndFinish File: src/com/android/settings/password/ChooseLockGeneric.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
updateUnlockMethodAndFinish
src/com/android/settings/password/ChooseLockGeneric.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
@Override public User getUser() throws IllegalStateException { Organization org = getOrganization(); if (org == null) throw new IllegalStateException("No organization is set in security context"); User delegatedUser = delegatedUserHolder.get(); if (delegatedUser != null) { return delegat...
Vulnerability Classification: - CWE: CWE-287 - CVE: CVE-2020-5206 - Severity: MEDIUM - CVSS Score: 6.4 Description: Authentication Bypass For Endpoints With Anonymous Access Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me c...
[ "CWE-287" ]
CVE-2020-5206
MEDIUM
6.4
opencast
getUser
modules/kernel/src/main/java/org/opencastproject/kernel/security/SecurityServiceSpringImpl.java
b157e1fb3b35991ca7bf59f0730329fbe7ce82e8
1
Analyze the following code function for security vulnerabilities
private boolean canDPCManagedUserUseLockTaskLocked(int userId) { if (isUserAffiliatedWithDeviceLocked(userId)) { return true; } // Unaffiliated profile owners are not allowed to use lock when there is a device owner. if (mOwners.hasDeviceOwner()) { return false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canDPCManagedUserUseLockTaskLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
canDPCManagedUserUseLockTaskLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String getStatus() { return status; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatus File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
getStatus
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
public SocketConfigurator getSocketConfigurator() { return socketConf; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSocketConfigurator File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
getSocketConfigurator
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public AssetHandler lastModified(final boolean enabled) { this.lastModified = enabled; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lastModified File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
lastModified
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void addIntCreator(AnnotatedWithParams creator, boolean explicit) { verifyNonDup(creator, C_INT, explicit); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addIntCreator File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
addIntCreator
src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
private byte[] getPasswordVerifier() throws IOException { byte[] pvBytes = new byte[2]; readRaw(pvBytes); return pvBytes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordVerifier File: src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
getPasswordVerifier
src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
public void addChunkLoad(int cx, int cz) { if (world == null) { return; } world.checkLoadedChunk(BlockVector3.at(cx << 4, 0, cz << 4)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addChunkLoad File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
addChunkLoad
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
@Override public int countTotal(Context context) throws SQLException { return collectionDAO.countRows(context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countTotal File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
countTotal
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
public boolean hasBacklinks() throws XWikiException { return this.xwiki.hasBacklinks(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasBacklinks File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
hasBacklinks
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
protected LogHandler createLogHandler(ServletConfig pServletConfig, final boolean pDebug) { return new LogHandler() { /** {@inheritDoc} */ public void debug(String message) { if (pDebug) { log(message); } } /** ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createLogHandler File: agent/core/src/main/java/org/jolokia/http/AgentServlet.java Repository: jolokia The code follows secure coding practices.
[ "CWE-352" ]
CVE-2014-0168
MEDIUM
6.8
jolokia
createLogHandler
agent/core/src/main/java/org/jolokia/http/AgentServlet.java
2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364
0
Analyze the following code function for security vulnerabilities
private GHResponse calcRoute(List<Double> favoredHeadings, List<GHPoint> requestPoints, String profileStr, String localeStr, boolean enableInstructions, double minPathPrecision) { GHRequest request; if (favoredHeadings.size() > 0) { request = new GHRequest(re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: calcRoute File: navigation/src/main/java/com/graphhopper/navigation/NavigateResource.java Repository: graphhopper The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-29506
MEDIUM
4
graphhopper
calcRoute
navigation/src/main/java/com/graphhopper/navigation/NavigateResource.java
eb189be1fa7443ebf4ae881e737a18f818c95f41
0
Analyze the following code function for security vulnerabilities
private void closeInactiveUIs(VaadinSession session) { final String sessionId = session.getSession().getId(); for (final UI ui : session.getUIs()) { if (!isUIActive(ui) && !ui.isClosing()) { ui.accessSynchronously(() -> { getLogger().log(Level.FINE, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeInactiveUIs File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
closeInactiveUIs
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
public static void move(File from, File to) throws IOException { checkNotNull(from); checkNotNull(to); checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to); if (!from.renameTo(to)) { copy(from, to); if (!from.delete()) { if (!to.delete()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: move File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
move
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@Override public void setNearbyNotificationStreamingPolicy(int policy) { if (!mHasFeature) { return; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwner(caller)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNearbyNotificationStreamingPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setNearbyNotificationStreamingPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Test public void removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent() { assertCountQuery("select distinct m.genre from Media m where m.user = ?1 OrDer By m.genre ASC", "select count(distinct m.genre) from Media m where m.user = ?1"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java Repository: spring-projects/spring-data-jpa The code follows sec...
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
removesOrderByInGeneratedCountQueryFromOriginalQueryIfPresent
src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public void updateNCharacterStream(@Positive int columnIndex, @Nullable Reader x, long length) throws SQLException { throw org.postgresql.Driver.notImplemented(this.getClass(), "updateNCharacterStream(int, Reader, long)"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNCharacterStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateNCharacterStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@DeleteMapping("/{modelId}") @Authorize(action = Permission.ACTION_DELETE) public ResponseMessage<Void> delete(@PathVariable String modelId) { repositoryService.deleteModel(modelId); return ResponseMessage.ok(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: hsweb-system/hsweb-system-workflow/hsweb-system-workflow-local/src/main/java/org/hswebframework/web/workflow/web/FlowableModelManagerController.java Repository: hs-web/hsweb-framework The code follows sec...
[ "CWE-79" ]
CVE-2018-20594
MEDIUM
4.3
hs-web/hsweb-framework
delete
hsweb-system/hsweb-system-workflow/hsweb-system-workflow-local/src/main/java/org/hswebframework/web/workflow/web/FlowableModelManagerController.java
b72a2275ed21240296c6539bae1049c56abb542f
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate updateImpl(KBTemplate kbTemplate) { kbTemplate = toUnwrappedModel(kbTemplate); boolean isNew = kbTemplate.isNew(); KBTemplateModelImpl kbTemplateModelImpl = (KBTemplateModelImpl)kbTemplate; if (Validator.isNull(kbTemplate.getUuid())) { String uuid = PortalUUIDUtil.generate(); ...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2017-12647 - Severity: MEDIUM - CVSS Score: 4.3 Description: LPS-72090 Sanitize content to prevent XSS Function: updateImpl File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersis...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
updateImpl
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
1
Analyze the following code function for security vulnerabilities
private static native @Nullable String nativeGetLastResourceResolution(long ptr);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetLastResourceResolution File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetLastResourceResolution
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public boolean refresh() { highlighters.clear(); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refresh File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
refresh
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
void recordPssSampleLocked(ProcessRecord proc, int procState, long pss, long uss, long now) { EventLogTags.writeAmPss(proc.pid, proc.uid, proc.processName, pss * 1024, uss * 1024); proc.lastPssTime = now; proc.baseProcessTracker.addPss(pss, uss, true, proc.pkgList); if (DEBUG_PSS) Slog.d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recordPssSampleLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
recordPssSampleLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public ApiClient setServers(List<ServerConfiguration> servers) { this.servers = servers; updateBasePath(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServers File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setServers
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void toggleBackupServiceActive(int userId, boolean makeActive) { long ident = mInjector.binderClearCallingIdentity(); try { if (mInjector.getIBackupManager() != null) { mInjector.getIBackupManager() .setBackupServiceActive(userId, makeActive); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toggleBackupServiceActive File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
toggleBackupServiceActive
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override boolean check(SerializationConfig c1, SerializationConfig c2) { return c1 == c2 || !(c1 == null || c2 == null) && nullSafeEqual(c1.getPortableVersion(), c2.getPortableVersion()) && nullSafeEqual(c1.getDataSerializableFactoryClasses(), c2.getDataSeria...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2016-10750 - Severity: MEDIUM - CVSS Score: 6.8 Description: Add basic protection against untrusted deserialization. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast Fixed Code: @Override ...
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
1
Analyze the following code function for security vulnerabilities
@Override public void channelConnected(final ChannelHandlerContext ctx, final ChannelStateEvent e) throws Exception { if (issueHandshake) { // issue and handshake and add a listener to it which will fire an exception event if // an exception was thrown while doing the handshake ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: channelConnected File: src/main/java/org/jboss/netty/handler/ssl/SslHandler.java Repository: netty The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-3488
MEDIUM
5
netty
channelConnected
src/main/java/org/jboss/netty/handler/ssl/SslHandler.java
2fa9400a59d0563a66908aba55c41e7285a04994
0
Analyze the following code function for security vulnerabilities
@Override public IPage<SysUser> getUserByRoleId(Page<SysUser> page, String roleId, String username) { return userMapper.getUserByRoleId(page,roleId,username); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByRoleId File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByRoleId
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/service/impl/SysUserServiceImpl.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
@Override public void configConstant(Constants con) { con.setDevMode(BlogBuildInfoUtil.isDev()); con.setViewType(ViewType.JSP); con.setEncoding("utf-8"); con.setI18nDefaultBaseName(com.zrlog.common.Constants.I18N); con.setI18nDefaultLocale("zh_CN"); con.setError404Vie...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-16643 - Severity: LOW - CVSS Score: 3.5 Description: Upgrade jar version & fix #54 Signed-off-by: xiaochun <xchun90@163.com> Function: configConstant File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java Repository: 94fzb/zrlog Fixed Code: @Overrid...
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
configConstant
web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
4a91c83af669e31a22297c14f089d8911d353fa1
1
Analyze the following code function for security vulnerabilities
private void encrypt(byte[] plaintext, int plaintextOffset, byte[] ciphertext, int ciphertextOffset, int length) { while (length > 0) { int tempLen = 64; if (tempLen > length) tempLen = length; ChaChaCore.hash(output, input); xorBlock(plaintext, plaintextOffset, ciphertext, ciphertextOffset, tempLe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encrypt File: src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java Repository: rweather/noise-java The code follows secure coding practices.
[ "CWE-125", "CWE-787" ]
CVE-2020-25021
HIGH
7.5
rweather/noise-java
encrypt
src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java
18e86b6f8bea7326934109aa9ffa705ebf4bde90
0
Analyze the following code function for security vulnerabilities
private AttributedString highlight( Integer width, SyntaxHighlighter highlighter, String object, boolean doValueHighlight) { AttributedString out; AttributedStringBuilder asb = new AttributedStringBuilder(); String val = object; if (highlighter != null && doValueHighlight) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: highlight File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
highlight
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
protected synchronized boolean isIngestLimitEnabled() { return ingestLimit >= 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isIngestLimitEnabled File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
isIngestLimitEnabled
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
@Override public void setPendingIntentAllowlistDuration(IIntentSender target, IBinder allowlistToken, long duration, int type, @ReasonCode int reasonCode, @Nullable String reason) { mPendingIntentController.setPendingIntentAllowlistDuration(target, allowlistToken, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPendingIntentAllowlistDuration File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setPendingIntentAllowlistDuration
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void updateContact() { if (DBG) log("updateContact"); final String name = getNameFromTextField(); final String number = PhoneNumberUtils.convertAndStrip(getNumberFromTextField()); if (!isValidNumber(number)) { handleResult(false, true); return; }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateContact File: src/com/android/phone/settings/fdn/EditFdnContactScreen.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
updateContact
src/com/android/phone/settings/fdn/EditFdnContactScreen.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
public boolean canDelete(View view) { return viewGroupMixIn.canDelete(view); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canDelete File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
canDelete
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public boolean isIgnored() { return mIgnored; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isIgnored File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
isIgnored
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
private void mergeFrom(ApkSigResult source) { switch (source.signatureSchemeVersion) { case ApkSigningBlockUtils.VERSION_SOURCE_STAMP: mSourceStampVerified = source.verified; if (!source.mSigners.isEmpty()) { mSourceStampInfo = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeFrom File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
mergeFrom
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setHideSmartReplies(boolean hideSmartReplies) { mN.extras.putBoolean(EXTRA_HIDE_SMART_REPLIES, hideSmartReplies); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHideSmartReplies File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setHideSmartReplies
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public JiffleDirectRuntime getRuntimeInstance() throws it.geosolutions.jaiext.jiffle.JiffleException { return (JiffleDirectRuntime) getRuntimeInstance(RuntimeModel.DIRECT); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRuntimeInstance File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
getRuntimeInstance
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
@Override public String getStringProperty(String name) throws JMSException { Object o = this.getObjectProperty(name); if (o == null) return null; else if (o instanceof String) return (String) o; else return o.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStringProperty File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
getStringProperty
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public void verify(Record record) { // 自动只读字段忽略非空检查 final Set<String> autoReadonlyFields = EasyMetaFactory.getAutoReadonlyFields(entity.getName()); List<String> notNulls = new ArrayList<>(); // 非空 List<String> notWells = new ArrayList<>(); // 格式 // 新建 if...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-1613 - Severity: MEDIUM - CVSS Score: 4.0 Description: fix: #596 Function: verify File: src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java Repository: getrebuild/rebuild Fixed Code: @Override public void verify(Record record) { // ...
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
verify
src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java
d422c1b9c0f6970bf7af0257a2c6b0f8be535963
1
Analyze the following code function for security vulnerabilities
private void handleProtocolVersionMismatch() throws IOException { // Probably an AMQP.... header indicating a version mismatch // Otherwise meaningless, so try to read the version, // and throw an exception, whether we read the version // okay or not. // Try to read everything fr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleProtocolVersionMismatch File: src/main/java/com/rabbitmq/client/impl/nio/FrameBuilder.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
handleProtocolVersionMismatch
src/main/java/com/rabbitmq/client/impl/nio/FrameBuilder.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
@Override @Deprecated(since = "14.8RC1") public void deleteLinks(long docId, XWikiContext inputxcontext, boolean bTransaction) throws XWikiException { executeWrite(inputxcontext, session -> { try { Query<?> query = session.createQuery("delete from XWikiLink as link where ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteLinks File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
deleteLinks
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public void onVerbatim(String content, boolean inline, Map<String, String> parameters) { if (inline) { // Note: We generate a tt element rather than a pre element since pre elements cannot be located inside // paragraphs for example. There also no tag in XHTML that has ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onVerbatim File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure cod...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
onVerbatim
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public boolean isSchema() { return schema; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSchema File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-18213
MEDIUM
6.5
eclipse/lemminx
isSchema
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/settings/XMLValidationSettings.java
c8bf3245a72cace50ee2aae5eee69538c58ce056
0
Analyze the following code function for security vulnerabilities
static public synchronized void initialize(File dir) { if (singleton != null) { logger.warn("Overwriting singleton already set: " + singleton); } logger.info("Using workspace directory: {}", dir.getAbsolutePath()); singleton = new FileProjectManager(dir); // This need...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initialize File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
initialize
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
private InstallArgs createInstallArgsForExisting(int installFlags, String codePath, String resourcePath, String[] instructionSets) { final boolean isInAsec; if (installOnExternalAsec(installFlags)) { /* Apps on SD card are always in ASEC containers. */ isInAsec = true...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createInstallArgsForExisting File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
createInstallArgsForExisting
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public String escapeString(String str) { try { return URLEncoder.encode(str, "utf8").replaceAll("\\+", "%20"); } catch (UnsupportedEncodingException e) { return str; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeString File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding ...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
escapeString
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private boolean pushOutExcessShortcuts() { final ShortcutService service = mShortcutUser.mService; final int maxShortcuts = service.getMaxActivityShortcuts(); boolean changed = false; final ArrayMap<ComponentName, ArrayList<ShortcutInfo>> all = sortShortcutsToActivities...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushOutExcessShortcuts File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
pushOutExcessShortcuts
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
@Override public void setJMSReplyTo(Destination replyTo) throws JMSException { this.setObjectProperty(JMS_MESSAGE_REPLY_TO, replyTo); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setJMSReplyTo File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
setJMSReplyTo
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
private void adminPermission(Invocation ai) { Controller controller = ai.getController(); AdminTokenVO adminTokenVO = adminTokenService.getAdminTokenVO(controller.getRequest()); if (adminTokenVO != null) { try { User user = new User().findById(adminTokenVO.getUserId()...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-16643 - Severity: LOW - CVSS Score: 3.5 Description: Upgrade jar version & fix #54 Signed-off-by: xiaochun <xchun90@163.com> Function: adminPermission File: web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java Repository: 94fzb/zrlog Fixed Cod...
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
adminPermission
web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java
4a91c83af669e31a22297c14f089d8911d353fa1
1
Analyze the following code function for security vulnerabilities
@GuardedBy("getLockObject()") private void enforceCanSetDeviceOwnerLocked( CallerIdentity caller, @Nullable ComponentName owner, @UserIdInt int deviceOwnerUserId, boolean hasIncompatibleAccountsOrNonAdb) { boolean showComponentOnError = false; if (!isAdb(caller)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceCanSetDeviceOwnerLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
enforceCanSetDeviceOwnerLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private boolean canUserModifyAccountsForType(int userId, String accountType, int callingUid) { // the managing app can always modify accounts if (isProfileOwner(callingUid)) { return true; } DevicePolicyManager dpm = (DevicePolicyManager) mContext .getSystemSe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canUserModifyAccountsForType File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
canUserModifyAccountsForType
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0