Dataset Viewer
Auto-converted to Parquet Duplicate
instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void processCacheEvict( MethodInvocationContext context, AnnotationValue<CacheInvalidate> cacheConfig, CacheOperation cacheOperation, boolean async) { String[] cacheNames = cacheOperation.getCacheInvalidateNames(cacheConfig); CacheKeyGenerator key...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processCacheEvict File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
processCacheEvict
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Override public Object getNativeGraphics(Object image) { AndroidGraphics g = new AndroidGraphics(this, new Canvas((Bitmap) image), true); g.setClip(0, 0, ((Bitmap)image).getWidth(), ((Bitmap)image).getHeight()); return g; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNativeGraphics File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getNativeGraphics
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private static Node migrateJobDependency(Element jobDependencyElement) { List<NodeTuple> tuples = new ArrayList<>(); tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "jobName"), new ScalarNode(Tag.STR, jobDependencyElement.elementText("jobName").trim()))); tuples.add(new NodeTuple( new ScalarNode(Ta...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateJobDependency File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-538" ]
CVE-2021-21250
MEDIUM
4
theonedev/onedev
migrateJobDependency
server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
9196fd795e87dab069b4260a3590a0ea886e770f
0
Analyze the following code function for security vulnerabilities
public static void init() { final Logging log = Logging.GEOTOOLS; try { log.setLoggerFactory("org.geotools.util.logging.CommonsLoggerFactory"); } catch (ClassNotFoundException commonsException) { try { log.setLoggerFactory("org.geotools.util.logging.Log4JL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
init
modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@JsonProperty(FIELD_CACHE_TTL_OVERRIDE_ENABLED) public abstract boolean cacheTTLOverrideEnabled();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cacheTTLOverrideEnabled File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
cacheTTLOverrideEnabled
graylog2-server/src/main/java/org/graylog2/lookup/adapters/DnsLookupDataAdapter.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
public boolean navigateUpTo(IBinder token, Intent destIntent, int resultCode, Intent resultData) { synchronized (this) { final ActivityStack stack = ActivityRecord.getStackLocked(token); if (stack != null) { return stack.navigateUpToLocked(token, destIntent, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: navigateUpTo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
navigateUpTo
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected void updateFooterLeftButton(Stage stage) { if (stage.leftMode == LeftButtonMode.Gone) { mSkipOrClearButton.setVisibility(View.GONE); } else { mSkipOrClearButton.setVisibility(View.VISIBLE); mSkipOrClearButton.setText(getActivity(), stage....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateFooterLeftButton File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
updateFooterLeftButton
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
private int getBigPictureLayoutResource() { return R.layout.notification_template_material_big_picture; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBigPictureLayoutResource File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getBigPictureLayoutResource
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private void invalidateChanges(CommandRunnerParams params) throws IOException { if (changesPath == null) { return; } try (FileInputStream is = new FileInputStream(changesPath)) { JsonNode responseNode = ObjectMappers.READER.readTree(is); Iterator<JsonNode> iterator = responseNode.elements(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invalidateChanges File: src/com/facebook/buck/cli/ParserCacheCommand.java Repository: facebook/buck The code follows secure coding practices.
[ "CWE-502" ]
CVE-2018-6331
HIGH
7.5
facebook/buck
invalidateChanges
src/com/facebook/buck/cli/ParserCacheCommand.java
8c5500981812564877bd122c0f8fab48d3528ddf
0
Analyze the following code function for security vulnerabilities
public void addPermission(TypePermission permission) { if (securityMapper != null) { securityMapper.addPermission(permission); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPermission File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
addPermission
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private static final boolean shouldShowDialogs(Configuration config) { return !(config.keyboard == Configuration.KEYBOARD_NOKEYS && config.touchscreen == Configuration.TOUCHSCREEN_NOTOUCH); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldShowDialogs File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
shouldShowDialogs
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public int getCameraLensCoverState() { int sw = mInputManager.getSwitchState(-1, InputDevice.SOURCE_ANY, InputManagerService.SW_CAMERA_LENS_COVER); if (sw > 0) { // Switch state: AKEY_STATE_DOWN or AKEY_STATE_VIRTUAL. return CAMERA_LENS_COVERED; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCameraLensCoverState File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getCameraLensCoverState
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private @PackageManagerService.ScanFlags int adjustScanFlags( @PackageManagerService.ScanFlags int scanFlags, PackageSetting pkgSetting, PackageSetting disabledPkgSetting, UserHandle user, AndroidPackage pkg) { scanFlags = ScanPackageUtils.adjustScanFlagsWithPackageSetting(sc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: adjustScanFlags File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
adjustScanFlags
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
@Provides @Singleton Signer signer(ClientSideSessionConfig config) { byte[] token = config.getSecretToken().getBytes(CharsetUtil.UTF_8); return new DefaultSigner(new SecretKeySpec(token, config.getMacAlgorithm())); }
Vulnerability Classification: - CWE: CWE-312 - CVE: CVE-2021-29481 - Severity: MEDIUM - CVSS Score: 5.0 Description: Encrypt client side session cookies by default Function: signer File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionModule.java Repository: ratpack Fixed Code: @Provides ...
[ "CWE-312" ]
CVE-2021-29481
MEDIUM
5
ratpack
signer
ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionModule.java
d7d240c06536a8b89a917e4ac842c337f7ea31f0
1
Analyze the following code function for security vulnerabilities
@Override public int update(final Uri uri, final ContentValues values, final String where, final String[] whereArgs) { Helpers.validateSelection(where, sAppReadableColumnsSet); SQLiteDatabase db = mOpenHelper.getWritableDatabase(); int count; boolean startService = fal...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
update
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
public String getUserName(String user) { return this.xwiki.getUserName(user, null, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getUserName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
void finishSurfaceBehindRemoteAnimation(boolean cancelled) { if (!mSurfaceBehindRemoteAnimationRunning) { return; } mSurfaceBehindRemoteAnimationRunning = false; if (mSurfaceBehindRemoteAnimationFinishedCallback != null) { try { mSurfaceBehindRem...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishSurfaceBehindRemoteAnimation File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
finishSurfaceBehindRemoteAnimation
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
void dispatchUserSwitch(final UserState uss, final int oldUserId, final int newUserId) { final int N = mUserSwitchObservers.beginBroadcast(); if (N > 0) { final IRemoteCallback callback = new IRemoteCallback.Stub() { int mCount = 0; @Override ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchUserSwitch File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
dispatchUserSwitch
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override public synchronized void onCmdResponse(CatResponseMessage resMsg) { if (resMsg == null) { return; } // queue a response message. Message msg = obtainMessage(MSG_ID_RESPONSE, resMsg); msg.sendToTarget(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCmdResponse File: src/java/com/android/internal/telephony/cat/CatService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3843
HIGH
9.3
android
onCmdResponse
src/java/com/android/internal/telephony/cat/CatService.java
b48581401259439dc5ef6dcf8b0f303e4cbefbe9
0
Analyze the following code function for security vulnerabilities
public boolean equals(PendingOperation other) { return target.matchesSpec(other.target); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
equals
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
boolean cancelDiscovery() { enforceCallingOrSelfPermission(BLUETOOTH_ADMIN_PERM, "Need BLUETOOTH ADMIN permission"); return cancelDiscoveryNative(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelDiscovery File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
cancelDiscovery
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
private Task getOrCreateRootTask(ActivityRecord r, int launchFlags, Task task, ActivityOptions aOptions) { final boolean onTop = (aOptions == null || !aOptions.getAvoidMoveToFront()) && !mLaunchTaskBehind; final Task sourceTask = mSourceRecord != null ? mSourceRecord.getTask(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrCreateRootTask File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
getOrCreateRootTask
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
@Override public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException { if (!authConfigs.isAuthEnabled()) { chain.doFilter(request, response); return; } HttpServletRequest...
Vulnerability Classification: - CWE: CWE-290 - CVE: CVE-2021-29441 - Severity: HIGH - CVSS Score: 7.5 Description: Fix #4701 Function: doFilter File: core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java Repository: alibaba/nacos Fixed Code: @Override public void doFilter(ServletRequest request, Servlet...
[ "CWE-290" ]
CVE-2021-29441
HIGH
7.5
alibaba/nacos
doFilter
core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java
91d16023d91ea21a5e58722c751485a0b9bbeeb3
1
Analyze the following code function for security vulnerabilities
public static @NonNull File getVolumePath(@NonNull Context context, @NonNull String volumeName) throws FileNotFoundException { switch (volumeName) { case MediaStore.VOLUME_INTERNAL: case MediaStore.VOLUME_EXTERNAL: throw new FileNotFoundException(volumeName + ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVolumePath File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
getVolumePath
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public static boolean isXMLContentType(String contentType) { return contentType.contains("application/xml") || contentType.contains("text/xml") || contentType.contains("+xml"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isXMLContentType File: vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java Repository: vert-x3/vertx-web The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-24815
MEDIUM
5.3
vert-x3/vertx-web
isXMLContentType
vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java
9e3a783b1d1a731055e9049078b1b1494ece9c15
0
Analyze the following code function for security vulnerabilities
@Override public void startInPlaceAnimationOnFrontMostApplication(ActivityOptions options) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); if (options == null) { dat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startInPlaceAnimationOnFrontMostApplication File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startInPlaceAnimationOnFrontMostApplication
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
void dumpPolicyLocked(PrintWriter pw, String[] args, boolean dumpAll) { pw.println("WINDOW MANAGER POLICY STATE (dumpsys window policy)"); mPolicy.dump(" ", pw, args); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpPolicyLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dumpPolicyLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public static int getIntValue(String value, int defaultValue, String key) { int result; try { result = Integer.valueOf(value).intValue(); } catch (Exception e) { if (LOG.isDebugEnabled()) { LOG.debug(Messages.get().getBundle().key(Messages.ERR_UNABLE_TO_P...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntValue File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getIntValue
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public int countMediaPackages() throws SearchServiceDatabaseException { EntityManager em = emf.createEntityManager(); Query query = em.createNamedQuery("Search.getCount"); try { Long total = (Long) query.getSingleResult(); return total.intValue(); } catch (Exception e) { lo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countMediaPackages File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
countMediaPackages
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
public static String getNodeText(Node node, String... nodePath) { List<Node> nodes = getNodes(node, nodePath); if (nodes != null && nodes.size() > 0) { return nodes.get(0).getTextContent(); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNodeText File: src/edu/stanford/nlp/time/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
getNodeText
src/edu/stanford/nlp/time/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
@Override public String buildInvalidTestingRedirectAuthnRequest(AuthenticationRequest request, String relayState, boolean sign, PrivateKey key, Algorithm algorithm) throws SAMLException { AuthnRequestType authnRequest = toAuthnRequest(request, "bad"); re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildInvalidTestingRedirectAuthnRequest File: src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java Repository: FusionAuth/fusionauth-samlv2 The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-27736
MEDIUM
4
FusionAuth/fusionauth-samlv2
buildInvalidTestingRedirectAuthnRequest
src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
c66fb689d50010662f705d5b585c6388ce555dbd
0
Analyze the following code function for security vulnerabilities
public void handleLogEntry(SVNLogEntry logEntry) throws SVNException { if (filter.isIncluded(logEntry)) { changesFound = true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleLogEntry File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
handleLogEntry
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
@Override public String getDisplayName() { return name == null ? getUriForDisplay() : CaseInsensitiveString.str(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisplayName File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
getDisplayName
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
@Override public void configure(ServletContextHandler context) { context.setContextPath("/"); context.getSessionHandler().setMaxInactiveInterval(serverConfig.getSessionTimeout()); context.setInitParameter(EnvironmentLoader.ENVIRONMENT_CLASS_PARAM, DefaultWebEnvironment.class.getName()); context.addEventL...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2021-21242 - Severity: HIGH - CVSS Score: 7.5 Description: Do not use deserialized AttachmentSupport from client side to avoid security vulnerabilities Function: configure File: server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.jav...
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
configure
server-product/src/main/java/io/onedev/server/product/ProductServletConfigurator.java
f864053176c08f59ef2d97fea192ceca46a4d9be
1
Analyze the following code function for security vulnerabilities
public String toString() { return "'this' reference (XThis) to Bsh object: " + namespace; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: src/bsh/XThis.java Repository: beanshell The code follows secure coding practices.
[ "CWE-19" ]
CVE-2016-2510
MEDIUM
6.8
beanshell
toString
src/bsh/XThis.java
1ccc66bb693d4e46a34a904db8eeff07808d2ced
0
Analyze the following code function for security vulnerabilities
void notifyTaskPersisterLocked(TaskRecord task, boolean flush) { if (task != null && task.stack != null && task.stack.isHomeStack()) { // Never persist the home stack. return; } mTaskPersister.wakeup(task, flush); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyTaskPersisterLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
notifyTaskPersisterLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected void setDefaultClassLoader() { try { setClassLoader( VaadinServiceClassLoaderUtil.findDefaultClassLoader()); } catch (SecurityException e) { getLogger().log(Level.SEVERE, Constants.CANNOT_ACQUIRE_CLASSLOADER_SEVERE, e); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDefaultClassLoader File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
setDefaultClassLoader
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
public boolean convertSyntax(String targetSyntaxId) throws XWikiException { try { getDoc().convertSyntax(targetSyntaxId, this.context); } catch (Exception ex) { LOGGER.error( "Failed to convert document [" + getPrefixedFullName() + "] to syntax [" + targetSynt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertSyntax File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
convertSyntax
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public int getKeyguardStoredPasswordQuality(int userHandle) { return (int) getLong(PASSWORD_TYPE_KEY, DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED, userHandle); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeyguardStoredPasswordQuality File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getKeyguardStoredPasswordQuality
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
public ApiClient setServerVariables(Map<String, String> serverVariables) { this.serverVariables = serverVariables; updateBasePath(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServerVariables File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure co...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setServerVariables
samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public void pollUiThread(final Callable<Boolean> callable) throws Exception { pollInstrumentationThread(new Callable<Boolean>() { @Override public Boolean call() throws Exception { return runTestOnUiThreadAndGetResult(callable); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pollUiThread File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5155
MEDIUM
4.3
chromium
pollUiThread
android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6
0
Analyze the following code function for security vulnerabilities
public OUser getAccount() { return account; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccount File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
getAccount
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
private void registerSerializerHooks(InternalSerializationService ss) { SerializerHookLoader serializerHookLoader = new SerializerHookLoader(config, classLoader); Map<Class, Object> serializers = serializerHookLoader.getSerializers(); for (Map.Entry<Class, Object> entry : serializers.entrySet())...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerSerializerHooks File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
registerSerializerHooks
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); mIsEmbeddingActivityEnabled = ActivityEmbeddingUtils.isEmbeddingActivityEnabled(this); if (mIsEmbeddingActivityEnabled) { final UserManager um = getSystemService(UserManager.class)...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21256 - Severity: HIGH - CVSS Score: 7.8 Description: Refine permission check process of 2-pane deep link - Check the deep link activity instance before redirecting to the internal activity for the managed profile invocation, so the caller can't bypas...
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
onCreate
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
1
Analyze the following code function for security vulnerabilities
@Override public int read() throws IOException { int readLen = read(singleByteBuffer); if (readLen == -1) { return -1; } return singleByteBuffer[0]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
read
src/main/java/net/lingala/zip4j/io/inputstream/AesCipherInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
private void tryToShallowUpdateSubmodules() { if (updateSubmoduleWithDepth(1)) { return; } LOG.warn("git submodule update with --depth=1 failed. Attempting again with --depth={}", UNSHALLOW_TRYOUT_STEP); if (updateSubmoduleWithDepth(UNSHALLOW_TRYOUT_STEP)) { retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryToShallowUpdateSubmodules File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
tryToShallowUpdateSubmodules
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public void setXObjectsToRemove(List<BaseObject> objectsToRemove) { this.xObjectsToRemove = objectsToRemove; setMetaDataDirty(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setXObjectsToRemove File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setXObjectsToRemove
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private Provider findProviderLocked(ComponentName componentName, int userId) { final int providerCount = mProviders.size(); for (int i = 0; i < providerCount; i++) { Provider provider = mProviders.get(i); if (provider.getUserId() == userId ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findProviderLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
findProviderLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public int compareTo(SvnInfo that) { int r = this.url.compareTo(that.url); if(r!=0) return r; if(this.revision<that.revision) return -1; if(this.revision>that.revision) return +1; return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compareTo File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
compareTo
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
private static String hash(String s) { return Base64.getEncoder().encodeToString(SHA256.digest(s.getBytes(StandardCharsets.UTF_8))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hash File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
hash
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
private void doStartDevModeServer(ApplicationConfiguration config) throws ExecutionFailedException { // If port is defined, means that webpack is already running if (port > 0) { if (!checkWebpackConnection()) { throw new IllegalStateException(format( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doStartDevModeServer File: vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-172" ]
CVE-2021-33604
LOW
1.2
vaadin/flow
doStartDevModeServer
vaadin-dev-server/src/main/java/com/vaadin/base/devserver/DevModeHandlerImpl.java
2a801c42b406a00c44f4a85b4b4e4a4c5bf89adc
0
Analyze the following code function for security vulnerabilities
public String getParaAppId() { return StringUtils.removeStart(CONF.paraAccessKey(), "app:"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParaAppId File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getParaAppId
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public void onDisplayAdded(int displayId) { mH.sendMessage(mH.obtainMessage(H.DO_DISPLAY_ADDED, displayId, 0)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDisplayAdded File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
onDisplayAdded
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private void applyStudyEventDef(MetaDataVersionBean metadata,String formVersionOID) { StudyEventDefBean studyEventDef = new StudyEventDefBean(); studyEventDef.setOid(MetadataUnit.FAKE_STUDY_EVENT_OID); studyEventDef.setName(MetadataUnit.FAKE_SE_NAME); studyEventDef.setRepeating(MetadataUnit.FAKE_SE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyStudyEventDef File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
applyStudyEventDef
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public Section getSection() { return section; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSection File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getSection
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public static Jiffle.RuntimeModel get(Class<? extends JiffleRuntime> clazz) { for (Jiffle.RuntimeModel t : Jiffle.RuntimeModel.values()) { if (t.runtimeClass.isAssignableFrom(clazz)) { return t; } } return null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
get
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
private static short[] init__puma_parser_key_offsets_0() { return new short [] { 0, 0, 8, 17, 27, 29, 30, 31, 32, 33, 34, 36, 39, 41, 44, 45, 61, 62, 78, 80, 81, 89, 97, 107, 115, 124, 132, 140, 149, 158, 167, 176, 185, 194, 203, 212, 221, 230, 2...
Vulnerability Classification: - CWE: CWE-444 - CVE: CVE-2021-41136 - Severity: LOW - CVSS Score: 3.6 Description: Merge pull request from GHSA-48w2-rm65-62xx * Fix HTTP request smuggling vulnerability See GHSA-48w2-rm65-62xx or CVE-2021-41136 for more info. * 4.3.9 release note * 5.5.1 release note * 5.5.1 Funct...
[ "CWE-444" ]
CVE-2021-41136
LOW
3.6
puma
init__puma_parser_key_offsets_0
ext/puma_http11/org/jruby/puma/Http11Parser.java
acdc3ae571dfae0e045cf09a295280127db65c7f
1
Analyze the following code function for security vulnerabilities
public Element toDOM(Document document) { Element element = document.createElement("ProfileDataInfos"); Element totalElement = document.createElement("total"); totalElement.appendChild(document.createTextNode(Integer.toString(total))); element.appendChild(totalElement); for (P...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDOM File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfos.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toDOM
base/common/src/main/java/com/netscape/certsrv/profile/ProfileDataInfos.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public Result<Map<String, String>> authenticate(String userId, String password, String extra) { Result<Map<String, String>> result = new Result<>(); User user = login(userId, password, extra); if (user == null) { if (Objects.equals(securityConfig.getType(), Authenticati...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2023-49068 - Severity: HIGH - CVSS Score: 7.5 Description: fix security issue Function: authenticate File: dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java Repository: apache/dolphinscheduler Fixed Code...
[ "CWE-200" ]
CVE-2023-49068
HIGH
7.5
apache/dolphinscheduler
authenticate
dolphinscheduler-api/src/main/java/org/apache/dolphinscheduler/api/security/impl/AbstractAuthenticator.java
359b1a7e5bb72790d2583971dc2d44a8481e3a10
1
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") @Override public String getWikiName() { return getDatabase(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWikiName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getWikiName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
private void aliasDynamically(String alias, String className) { Class type = JVM.loadClassForName(className); if (type != null) { alias(alias, type); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aliasDynamically File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
aliasDynamically
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
public String getCancelAction() { return DIALOG_CANCEL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCancelAction File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getCancelAction
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return "JENKINS-14814"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
toString
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
public final AppWidgetHostView createView(Context context, int appWidgetId, AppWidgetProviderInfo appWidget) { AppWidgetHostView view = onCreateView(context, appWidgetId, appWidget); view.setOnClickHandler(mOnClickHandler); view.setAppWidget(appWidgetId, appWidget); synchroni...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createView File: core/java/android/appwidget/AppWidgetHost.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
createView
core/java/android/appwidget/AppWidgetHost.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public boolean isUseLegacySearchBuilder() { return myUseLegacySearchBuilder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUseLegacySearchBuilder File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isUseLegacySearchBuilder
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public void setAudioOutputChannel(MagicAudioManager.AudioDevice selectedAudioDevice) { if (audioManager != null) { audioManager.selectAudioDevice(selectedAudioDevice); updateAudioOutputButton(audioManager.getCurrentAudioDevice()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAudioOutputChannel File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
setAudioOutputChannel
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
protected boolean isSnoozedPackage(StatusBarNotification sbn) { return mHeadsUpManager.isSnoozed(sbn.getPackageName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSnoozedPackage File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isSnoozedPackage
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public int getNearbyAppStreamingPolicy(final int userId) { if (!mHasFeature) { return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isProfileOwner(caller) ||...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNearbyAppStreamingPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getNearbyAppStreamingPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
boolean hasKeyPair() { return mBundle.containsKey(Credentials.EXTRA_PUBLIC_KEY) && mBundle.containsKey(Credentials.EXTRA_PRIVATE_KEY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasKeyPair File: src/com/android/certinstaller/CredentialHelper.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
hasKeyPair
src/com/android/certinstaller/CredentialHelper.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
final void dumpDbInfo(FileDescriptor fd, PrintWriter pw, String[] args) { ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, false, args); if (procs == null) { pw.println("No process found for: " + args[0]); return; } pw.println("Applications Database Info:...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpDbInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
dumpDbInfo
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private static void printTitle() { outStream.println(); outStream.println("Ballerina Central"); outStream.println("================="); outStream.println(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: printTitle File: cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
printTitle
cli/ballerina-cli-module/src/main/java/org/ballerinalang/cli/module/Search.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder reference(String name) { super.referenceImpl(name); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reference File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
reference
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
@Override public boolean isMinimized() { return getActivity() == null || ((CodenameOneActivity)getActivity()).isBackground(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMinimized File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isMinimized
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void logAddAccountExplicitlyMetrics( String callerPackage, String accountType, @Nullable Map<String, Integer> accountVisibility) { // Although this is not a 'device policy' API, enterprise is the current use case. DevicePolicyEventLogger .createEvent(Devic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logAddAccountExplicitlyMetrics File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
logAddAccountExplicitlyMetrics
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private void registerBroadcastReceiver() { // Register for configuration changes so we can update the names // of the widgets when the locale changes. IntentFilter configFilter = new IntentFilter(); configFilter.addAction(Intent.ACTION_CONFIGURATION_CHANGED); mContext.registerRec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerBroadcastReceiver File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
registerBroadcastReceiver
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public Connection getConnection(DatabaseConfiguration databaseConfiguration) throws DatabaseServiceException { try { if (connection != null) { connection.close(); } Class.forName(type.getClassPath()); String dbURL = getDatabaseUrl(databaseConfigur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnection File: extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
getConnection
extensions/database/src/com/google/refine/extension/database/sqlite/SQLiteConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { StringBuilder builder = new StringBuilder().append("ClickHouseNode [uri=").append(baseUri) .append(config.getDatabase()); if (!cluster.isEmpty()) { builder.append(", cluster=").append(cluster).append("(s").append(shardNum).append(",w")...
Vulnerability Classification: - CWE: CWE-209 - CVE: CVE-2024-23689 - Severity: HIGH - CVSS Score: 8.8 Description: Mask sensitive option in log Function: toString File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java Fixed Code: @Override public St...
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
toString
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
1
Analyze the following code function for security vulnerabilities
private Syntax getObjectDocumentSyntax(BaseCollection object, XWikiContext context) { XWikiDocument doc = getObjectDocument(object, context); return doc != null && doc.getSyntax() != null ? doc.getSyntax() : Syntax.XWIKI_1_0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObjectDocumentSyntax File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
getObjectDocumentSyntax
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
private LayoutInflater getInflater() { if (mInflater == null) { mInflater = LayoutInflater.from(mContext); } return mInflater; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInflater File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
getInflater
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public String getLogDetails(String id) { ApiScenarioWithBLOBs bloBs = apiScenarioMapper.selectByPrimaryKey(id); if (bloBs != null) { List<DetailColumn> columns = ReflexObjectUtil.getColumns(bloBs, AutomationReference.automationColumns); OperatingLogDetails details = new Operating...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogDetails File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getLogDetails
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public String getParamIsPopup() { return m_paramIsPopup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParamIsPopup File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getParamIsPopup
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override protected String getBaseCipherName() { return "AES"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseCipherName File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
getBaseCipherName
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
public void setColumnOrder(Object... propertyIds) { if (SharedUtil.containsDuplicates(propertyIds)) { throw new IllegalArgumentException( "The propertyIds array contains duplicates: " + SharedUtil.getDuplicates(propertyIds)); } List<Str...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setColumnOrder File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setColumnOrder
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public void renameRosterGroup(String group, String newGroup) { RosterGroup groupToRename = mRoster.getGroup(group); groupToRename.setName(newGroup); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameRosterGroup File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
renameRosterGroup
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public IndexEnabledEnum getIndexMissingFields() { return myIndexMissingFieldsEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIndexMissingFields File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getIndexMissingFields
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Override public Short getShort(CharSequence name) { return headers.getShort(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShort File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
getShort
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
public static boolean hasTextAhead(XMLEventReader xmlEventReader) throws ParsingException { XMLEvent event = peek(xmlEventReader); return event.getEventType() == XMLEvent.CHARACTERS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasTextAhead File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java Repository: keycloak The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-2582
MEDIUM
4
keycloak
hasTextAhead
saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
0cb5ba0f6e83162d221681f47b470c3042eef237
0
Analyze the following code function for security vulnerabilities
protected final boolean _checkNextIsEndArray() throws IOException { // We know we are in array, with length prefix, and this is where we should be: if (!_parsingContext.expectMoreValues()) { _tagValue = -1; _parsingContext = _parsingContext.getParent(); _currToken...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _checkNextIsEndArray File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_checkNextIsEndArray
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@PermissionCheckerManager.PermissionResult @RequiresPermission(value = Manifest.permission.UPDATE_APP_OPS_STATS, conditional = true) public int checkPermissionForDataDeliveryFromDataSource(@NonNull String permission, @NonNull AttributionSource attributionSource, @Nullable String message) { r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPermissionForDataDeliveryFromDataSource File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
checkPermissionForDataDeliveryFromDataSource
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public JSONObject put(String key, long value) throws JSONException { return this.put(key, Long.valueOf(value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
put
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
private static SecurityException failedVerification(String jarName, String signatureFile, Throwable e) { throw new SecurityException(jarName + " failed verification of " + signatureFile, e); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: failedVerification File: core/java/android/util/jar/StrictJarVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
failedVerification
core/java/android/util/jar/StrictJarVerifier.java
84df68840b6f2407146e722ebd95a7d8bc6e3529
0
Analyze the following code function for security vulnerabilities
public BaseObject addXObjectFromRequest(DocumentReference classReference, int num, XWikiContext context) throws XWikiException { return addXObjectFromRequest(classReference, "", num, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addXObjectFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addXObjectFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void updateUserConfigurationLocked() { Configuration configuration = new Configuration(mConfiguration); Settings.System.adjustConfigurationForUser(mContext.getContentResolver(), configuration, mUserController.getCurrentUserIdLocked(), Settings.System.canWrite(mContext)); updateCo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUserConfigurationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
updateUserConfigurationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("deprecation") @Override public void fixAfterFastMode(Iterable<BlockVector2> chunks) { World world = getWorld(); for (BlockVector2 chunkPos : chunks) { world.refreshChunk(chunkPos.getBlockX(), chunkPos.getBlockZ()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fixAfterFastMode File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
fixAfterFastMode
worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
private boolean handleConfigStoreFailure(boolean onlyUserStore) { // On eng/userdebug builds, return failure to leave the device in a debuggable state. if (!mBuildProperties.isUserBuild()) return false; // On user builds, ignore the failure and let the user create new networks. Log.w(TA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleConfigStoreFailure File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleConfigStoreFailure
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public String getValidNotBeforeTo() { return validNotBeforeTo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValidNotBeforeTo File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getValidNotBeforeTo
base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public boolean isDeleteEnabled() { return myDeleteEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDeleteEnabled File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isDeleteEnabled
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public List<ProcedureArgument> getProcedureArguments(String packageName, String procedureName, String overLoadNo) { return jdbcTemplate.query( GET_PROCEDURE_ARGUMENTS, new Object[]{packageName, procedureName, overLoadNo}, (resultSet, i) -> new ProcedureArgument( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcedureArguments File: obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java Repository: karsany/obridge The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-25075
MEDIUM
4
karsany/obridge
getProcedureArguments
obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java
52eca4ad05f3c292aed3178b2f58977686ffa376
0
Analyze the following code function for security vulnerabilities
public IssuesDao getZentaoAssignedAndBuilds(IssuesDao issue) { Map zentaoIssue = (Map) zentaoClient.getBugById(issue.getPlatformId()); String assignedTo = zentaoIssue.get("assignedTo").toString(); String openedBuild = zentaoIssue.get("openedBuild").toString(); List<String> zentaoBuilds =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getZentaoAssignedAndBuilds File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getZentaoAssignedAndBuilds
test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void registerDataSerializableFactories(Map<Integer, DataSerializableFactory> dataSerializableFactories, SerializationConfig config) { for (Map.Entry<Integer, DataSerializableFactory> entry : config.getDataSerializableFactories().entrySet()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerDataSerializableFactories File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
registerDataSerializableFactories
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
115