instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public void onChildItemClicked(long idFeed, Long optional_folder_id) {
if (binding.drawerLayout != null)
binding.drawerLayout.closeDrawer(GravityCompat.START);
updateDetailFragment(idFeed, false, optional_folder_id, true);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onChildItemClicked
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
The code follows secure coding practices. | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | onChildItemClicked | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
public PastePopupMenu getPastePopupForTest() {
return getPastePopup();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPastePopupForTest
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-1021"
] | CVE-2015-1241 | MEDIUM | 4.3 | chromium | getPastePopupForTest | content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java | 9d343ad2ea6ec395c377a4efa266057155bfa9c1 | 0 |
Analyze the following code function for security vulnerabilities | private int getVisibleDatasetsMaxCount() {
if (AutofillManagerService.getVisibleDatasetsMaxCount() > 0) {
final int maxCount = AutofillManagerService.getVisibleDatasetsMaxCount();
if (sVerbose) {
Slog.v(TAG, "overriding maximum visible datasets to " + maxCount);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVisibleDatasetsMaxCount
File: services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-610"
] | CVE-2023-40133 | MEDIUM | 5.5 | android | getVisibleDatasetsMaxCount | services/autofill/java/com/android/server/autofill/ui/DialogFillUi.java | 08becc8c600f14c5529115cc1a1e0c97cd503f33 | 0 |
Analyze the following code function for security vulnerabilities | public String getSentTo() {
return sentTo;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSentTo
File: src/main/java/emissary/pickup/WorkBundle.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | getSentTo | src/main/java/emissary/pickup/WorkBundle.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public String getMobilePhone(final User user) throws IOException {
return getContactInfo(user, ContactType.mobilePhone.toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMobilePhone
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | getMobilePhone | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void putValue(String name, Object value) {
if (name == null) {
throw new NullPointerException("name");
}
if (value == null) {
throw new NullPointerException("value");
}
Map<String, Object> values = this.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: putValue
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | putValue | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | private static void visitIconUri(@NonNull Consumer<Uri> visitor, @Nullable Icon icon) {
if (icon == null) return;
final int iconType = icon.getType();
if (iconType == TYPE_URI || iconType == TYPE_URI_ADAPTIVE_BITMAP) {
visitor.accept(icon.getUri());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: visitIconUri
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | visitIconUri | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private EntityReferenceSerializer<String> getDefaultEntityReferenceSerializer()
{
if (this.defaultEntityReferenceSerializer == null) {
this.defaultEntityReferenceSerializer = Utils.getComponent(EntityReferenceSerializer.TYPE_STRING);
}
return this.defaultEntityReferenceSerialize... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultEntityReferenceSerializer
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getDefaultEntityReferenceSerializer | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public int checkGrantUriPermission(int callingUid, String targetPkg,
Uri uri, int modeFlags, int userId) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeInt(callingUid);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkGrantUriPermission
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | checkGrantUriPermission | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public static int copyRestricted(InputStream in, OutputStream out) throws IOException
{
return copy(in, out, IO_BUFFER_SIZE, MAX_SIZE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyRestricted
File: src/main/java/com/mxgraph/online/Utils.java
Repository: jgraph/drawio
The code follows secure coding practices. | [
"CWE-284",
"CWE-79"
] | CVE-2022-3065 | HIGH | 7.5 | jgraph/drawio | copyRestricted | src/main/java/com/mxgraph/online/Utils.java | 59887e45b36f06c8dd4919a32bacd994d9f084da | 0 |
Analyze the following code function for security vulnerabilities | private SSLEngineResult.HandshakeStatus getHandshakeStatus(int pending) {
// Check if we are in the initial handshake phase or shutdown phase
return needPendingStatus() ? pendingStatus(pending) : NOT_HANDSHAKING;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHandshakeStatus
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2016-4970 | HIGH | 7.8 | netty | getHandshakeStatus | handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java | bc8291c80912a39fbd2303e18476d15751af0bf1 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate101(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
if (file.getName().startsWith("Settings.xml")) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element: dom.getRootElement().elements()) {
String key = element.elementTextTrim("... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate101
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate101 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | private void backupInputDatas(String val, BulkAssessmentDatas datas, VFSContainer tmpDir) {
VFSLeaf inputFile = null;
if(StringHelper.containsNonWhitespace(datas.getDataBackupFile())) {
inputFile = VFSManager.olatRootLeaf(datas.getDataBackupFile());
}
if(inputFile == null) {
String inputFilename = UUID.ra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: backupInputDatas
File: src/main/java/org/olat/course/assessment/bulk/DataStepForm.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | backupInputDatas | src/main/java/org/olat/course/assessment/bulk/DataStepForm.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | public OutputPrefixType getOutputPrefixType() {
return outputPrefixType;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOutputPrefixType
File: java_src/src/main/java/com/google/crypto/tink/PrimitiveSet.java
Repository: tink-crypto/tink
The code follows secure coding practices. | [
"CWE-176"
] | CVE-2020-8929 | MEDIUM | 5 | tink-crypto/tink | getOutputPrefixType | java_src/src/main/java/com/google/crypto/tink/PrimitiveSet.java | 93d839a5865b9d950dffdc9d0bc99b71280a8899 | 0 |
Analyze the following code function for security vulnerabilities | private CompletableFuture<Void> buildInvalidateFutures(String[] cacheNames, Object key) {
List<CompletableFuture<Boolean>> futures = new ArrayList<>();
for (String cacheName : cacheNames) {
AsyncCache<?> asyncCache = cacheManager.getCache(cacheName).async();
futures.add(asyncCach... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildInvalidateFutures
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | buildInvalidateFutures | runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | private void notifyMinimumRequiredWifiSecurityLevelChanged(int level) {
mInjector.binderWithCleanCallingIdentity(
() -> mInjector.getWifiManager()
.notifyMinimumRequiredWifiSecurityLevelChanged(level));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: notifyMinimumRequiredWifiSecurityLevelChanged
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | notifyMinimumRequiredWifiSecurityLevelChanged | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | public abstract BaseXMLBuilder ns(String prefix, String namespaceURI); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ns
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2014-125087 | MEDIUM | 5.2 | jmurty/java-xmlbuilder | ns | src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java | e6fddca201790abab4f2c274341c0bb8835c3e73 | 0 |
Analyze the following code function for security vulnerabilities | final void setDouble(CharSequence name, double value) {
set(name, String.valueOf(value));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDouble
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | setDouble | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setVr2dDisplayId(int vr2dDisplayId) {
if (DEBUG_STACK) {
Slog.d(TAG, "setVr2dDisplayId called for: " +
vr2dDisplayId);
}
synchronized (ActivityManagerService.this) {
mVr2dDisplayId = vr2dDisplayId;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVr2dDisplayId
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | setVr2dDisplayId | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | boolean checkAdminPassword(String password) {
if (adminPassword == null) {
return false;
}
byte[] salt = Arrays.copyOf(adminPassword, 32);
byte[] hash = new byte[32];
System.arraycopy(adminPassword, 32, hash, 0, 32);
return Utils.compareSecure(hash, SHA256.get... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAdminPassword
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | checkAdminPassword | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | private String showStatusPage(HttpServletRequest request, HttpServletResponse response) {
Map<String, String> modelMap = new HashMap<>();
modelMap.put("REPLACED_BY_GO:application.css", railsAssetsService.getAssetPath("application.css"));
modelMap.put("REPLACED_BY_GO:patterns/application.css", ra... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showStatusPage
File: server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2021-43287 | MEDIUM | 5 | gocd | showStatusPage | server/src/main/java/com/thoughtworks/go/addon/businesscontinuity/standby/controller/DashBoardController.java | 41abc210ac4e8cfa184483c9ff1c0cc04fb3511c | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setLocalOnly(boolean localOnly) {
setFlag(FLAG_LOCAL_ONLY, localOnly);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLocalOnly
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setLocalOnly | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public User getUser()
{
return this.xwiki.getUser(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUser
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getUser | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | void onMagnificationChanged(@NonNull MagnificationController controller,
@NonNull Region region, float scale, float centerX, float centerY); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onMagnificationChanged
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3923 | MEDIUM | 4.3 | android | onMagnificationChanged | core/java/android/accessibilityservice/AccessibilityService.java | 5f256310187b4ff2f13a7abb9afed9126facd7bc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onVolumeForgotten(String fsUuid) {
if (TextUtils.isEmpty(fsUuid)) {
Slog.w(TAG, "Forgetting internal storage is probably a mistake; ignoring");
return;
}
// Remove any apps installed on the forgotten volume
sy... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onVolumeForgotten
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | onVolumeForgotten | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isAdmin(HttpServletRequest request) {
return request.isUserInRole(Config.DEFAULT_ADMIN_ROLE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAdmin
File: src/main/java/com/openkm/servlet/admin/BaseServlet.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-3628 | LOW | 3.5 | openkm/document-management-system | isAdmin | src/main/java/com/openkm/servlet/admin/BaseServlet.java | c96f2e33adab3bbf550977b1b62acaa54f86fa03 | 0 |
Analyze the following code function for security vulnerabilities | public ValueInstantiator constructValueInstantiator(DeserializationContext ctxt)
throws JsonMappingException
{
final DeserializationConfig config = ctxt.getConfig();
final JavaType delegateType = _computeDelegateType(ctxt,
_creators[C_DELEGATE], _delegateArgs);
final ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: constructValueInstantiator
File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | constructValueInstantiator | src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void serviceInit(ServiceInitEvent event) {
VaadinService service = event.getSource();
VaadinContext context = service.getContext();
checkLicense(service.getDeploymentConfiguration());
// associate servlet context with Vaadin servlet/service
context.setAttri... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serviceInit
File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/OSGiVaadinInitialization.java
Repository: vaadin/osgi
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-31407 | MEDIUM | 5 | vaadin/osgi | serviceInit | flow-osgi/src/main/java/com/vaadin/flow/osgi/support/OSGiVaadinInitialization.java | 0b82a606eeafdf56a129630f00b9c55a5177b64b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isSafeOperation(@OperationSafetyReason int reason) {
if (VERBOSE_LOG) {
Slogf.v(LOG_TAG, "checking isSafeOperation(%s) using mSafetyChecker %s",
DevicePolicyManager.operationSafetyReasonToString(reason), mSafetyChecker);
}
return mSafe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSafeOperation
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | isSafeOperation | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getActivityStackId(IBinder token) throws RemoteException {
synchronized (this) {
ActivityStack stack = ActivityRecord.getStackLocked(token);
if (stack == null) {
return INVALID_STACK_ID;
}
return stack.mStackId;
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActivityStackId
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | getActivityStackId | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public ACL getACL() {
return Jenkins.getInstance().getACL();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getACL
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | getACL | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | public void enforceSystemHasVrFeature() {
if (!mContext.getPackageManager().hasSystemFeature(
PackageManager.FEATURE_VR_MODE_HIGH_PERFORMANCE)) {
throw new UnsupportedOperationException("VR mode not supported on this device!");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceSystemHasVrFeature
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | enforceSystemHasVrFeature | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public void addCustomDhcpOptions(@NonNull WifiSsid ssid, @NonNull byte[] oui,
@NonNull List<DhcpOption> options) {
mCustomDhcpOptions.put(new NetworkIdentifier(ssid, oui), options);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCustomDhcpOptions
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | addCustomDhcpOptions | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isEditorActive() {
return editorActive;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isEditorActive
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | isEditorActive | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public boolean releaseActivityInstance(IBinder token) throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
mRemote.transact(RELEASE_ACTIVITY_INSTANCE_TRANSACTI... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: releaseActivityInstance
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | releaseActivityInstance | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public Document toXMLDocument(boolean bWithObjects, boolean bWithRendering, boolean bWithAttachmentContent,
boolean bWithVersions, XWikiContext context) throws XWikiException
{
Document doc = new DOMDocument();
DOMXMLWriter wr = new DOMXMLWriter(doc, new OutputFormat("", true... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toXMLDocument
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | toXMLDocument | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public void setVersion(String version) {
this.version = version;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setVersion
File: base/common/src/main/java/org/dogtagpki/common/Info.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setVersion | base/common/src/main/java/org/dogtagpki/common/Info.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | public static boolean getBooleanAttributeValue(StartElement startElement, String tag, boolean defaultValue) {
String result = null;
Attribute attr = startElement.getAttributeByName(new QName(tag));
if (attr != null)
result = getAttributeValue(attr);
if (result == null) return... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBooleanAttributeValue
File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
Repository: keycloak
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2017-2582 | MEDIUM | 4 | keycloak | getBooleanAttributeValue | saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java | 0cb5ba0f6e83162d221681f47b470c3042eef237 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isDrawShadowFast() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDrawShadowFast
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isDrawShadowFast | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void clearApplicationUserData(@NonNull ComponentName admin,
@NonNull String packageName, @NonNull @CallbackExecutor Executor executor,
@NonNull OnClearApplicationUserDataListener listener) {
throwIfParentInstance("clearAppData");
Objects.requireNonNull(executor);
O... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearApplicationUserData
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | clearApplicationUserData | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @UnstableApi
public ServerBuilder idleTimeout(Duration idleTimeout, boolean keepAliveOnPing) {
requireNonNull(idleTimeout, "idleTimeout");
idleTimeoutMillis = validateIdleTimeoutMillis(idleTimeout.toMillis());
this.keepAliveOnPing = keepAliveOnPing;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: idleTimeout
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | idleTimeout | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public String getURLToDeletePage(EntityReference reference, boolean affectChildren)
{
String queryString = "confirm=1&async=false";
if (affectChildren) {
queryString += "&affectChildren=true";
}
return getURL(reference, "delete", queryString);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLToDeletePage
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | getURLToDeletePage | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | public long readI64() throws TException {
return zigzagToLong(readVarint64());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readI64
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readI64 | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | public void updatePersistentConfiguration(Configuration values) {
enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
"updateConfiguration()");
enforceWriteSettingsPermission("updateConfiguration()");
if (values == null) {
throw new NullPointerE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updatePersistentConfiguration
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | updatePersistentConfiguration | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void registerPush(Hashtable metaData, boolean noFallback) {
if (getActivity() == null) {
return;
}
boolean has = hasAndroidMarket();
if (!has) {
Log.d("Codename One", "Device doesn't have Android market/google play can't register for push!");
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerPush
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | registerPush | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void userPresent(int userId) {
checkWritePermission(userId);
mStrongAuth.reportUnlock(userId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: userPresent
File: services/core/java/com/android/server/LockSettingsService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | userPresent | services/core/java/com/android/server/LockSettingsService.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void test(TestData testData, TaskLogger jobLogger) {
JobLogManager logManager = OneDev.getInstance(JobLogManager.class);
String jobToken = UUID.randomUUID().toString();
logManager.registerLogger(jobToken, jobLogger);
try {
AgentQuery parsedQeury = AgentQuery.parse(agentQuery, true);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: test
File: server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExecutor.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-610"
] | CVE-2022-39206 | CRITICAL | 9.9 | theonedev/onedev | test | server-plugin/server-plugin-executor-remotedocker/src/main/java/io/onedev/server/plugin/executor/remotedocker/RemoteDockerExecutor.java | 0052047a5b5095ac6a6b4a73a522d0272fec3a22 | 0 |
Analyze the following code function for security vulnerabilities | private void logRecord(String action, String tableName, long accountId,
UserAccounts userAccount, int callingUid) {
class LogRecordTask implements Runnable {
private final String action;
private final String tableName;
private final long accountId;
pr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logRecord
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | logRecord | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder defaultServiceNaming(ServiceNaming defaultServiceNaming) {
virtualHostTemplate.defaultServiceNaming(defaultServiceNaming);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultServiceNaming
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | defaultServiceNaming | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | private void connectToNetwork(WifiConfiguration config) {
if ((config != null) && mWifiNative.connectToNetwork(mInterfaceName, config)) {
// Update the internal config once the connection request is accepted.
mWifiConfigManager.setNetworkLastUsedSecurityParams(config.networkId,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connectToNetwork
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | connectToNetwork | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @JsonProperty("preferences")
protected void setPreferences(PreferenceStore preferences) {
if (preferences != null) {
_preferenceStore = preferences;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPreferences
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-37476 | HIGH | 7.8 | OpenRefine | setPreferences | main/src/com/google/refine/io/FileProjectManager.java | e9c1e65d58b47aec8cd676bd5c07d97b002f205e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onSaveInstanceState(Bundle savedInstanceState) {
Intent pendingIntent = pendingViewIntent.peek();
savedInstanceState.putParcelable("intent", pendingIntent != null ? pendingIntent : getIntent());
if (mMenuSearchView != null && mMenuSearchView.isActionViewExpanded()) {
savedInstanceState.p... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onSaveInstanceState
File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | onSaveInstanceState | src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onBouncerShowingChanged() {
synchronized (KeyguardViewMediator.this) {
if (mKeyguardStateController.isBouncerShowing()) {
mPendingPinLock = false;
}
adjustStatusBarLocked(mKeyguardStateController.isBouncerShowi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onBouncerShowingChanged
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | onBouncerShowingChanged | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | boolean updateConfigurationLocked(Configuration values, ActivityRecord starting,
boolean initLocale) {
return updateConfigurationLocked(values, starting, initLocale, false /* deferResume */);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateConfigurationLocked
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | updateConfigurationLocked | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | protected void receiveMessage(Map<String, Object> message) {
String userId = (String)message.get(SetiMessage.USER_ID_FIELD);
String channel = (String)message.get(SetiMessage.CHANNEL_FIELD);
Object data = message.get(SetiMessage.DATA_FIELD);
Set<Location> copy = new HashSet<>();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: receiveMessage
File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
Repository: cometd
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-24721 | MEDIUM | 5.5 | cometd | receiveMessage | cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java | bb445a143fbf320f17c62e340455cd74acfb5929 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int decryptWithAd(byte[] ad, byte[] ciphertext,
int ciphertextOffset, byte[] plaintext, int plaintextOffset,
int length) throws ShortBufferException, BadPaddingException {
int space;
if (ciphertextOffset > ciphertext.length)
space = 0;
else
space = ciphertext.length - ciphertextOffse... | Vulnerability Classification:
- CWE: CWE-125, CWE-787
- CVE: CVE-2020-25021
- Severity: HIGH
- CVSS Score: 7.5
Description: Improve array bounds checks in CipherState implementations
Thanks to Pietro Oliva for identifying these issues.
Function: decryptWithAd
File: src/main/java/com/southernstorm/noise/protocol/ChaC... | [
"CWE-125",
"CWE-787"
] | CVE-2020-25021 | HIGH | 7.5 | rweather/noise-java | decryptWithAd | src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java | 18e86b6f8bea7326934109aa9ffa705ebf4bde90 | 1 |
Analyze the following code function for security vulnerabilities | public void clearAllBackoffsLocked(SyncQueue syncQueue) {
boolean changed = false;
synchronized (mAuthorities) {
// Clear backoff for all sync adapters.
for (AccountInfo accountInfo : mAccounts.values()) {
for (AuthorityInfo authorityInfo : accountInfo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearAllBackoffsLocked
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | clearAllBackoffsLocked | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testSerializationWithTypeInfo01() throws Exception
{
Instant date = Instant.ofEpochSecond(123456789L, 183917322);
ObjectMapper m = newMapper()
.configure(SerializationFeature.WRITE_DATES_AS_TIMESTAMPS, true)
.configure(SerializationFeature.WRITE_DATE_TIM... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testSerializationWithTypeInfo01
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testSerializationWithTypeInfo01 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | public boolean optBoolean(int index) {
return optBoolean(index, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optBoolean
File: src/main/java/org/codehaus/jettison/json/JSONArray.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | optBoolean | src/main/java/org/codehaus/jettison/json/JSONArray.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | public synchronized Http2HeadersStreamSinkChannel createInitialUpgradeResponseStream() {
if (lastGoodStreamId != 0) {
throw new IllegalStateException();
}
updateStreamIdsCountersInHeaders(1);
Http2HeadersStreamSinkChannel stream = new Http2HeadersStreamSinkChannel(this, 1);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createInitialUpgradeResponseStream
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | createInitialUpgradeResponseStream | core/src/main/java/io/undertow/protocols/http2/Http2Channel.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public final int startActivityAsCaller(IApplicationThread caller, String callingPackage,
Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode,
int startFlags, ProfilerInfo profilerInfo, Bundle options, int userId) {
// This is very danger... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startActivityAsCaller
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | startActivityAsCaller | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | protected String getStudyMeasurementUnitsSql(int studyId) {
return "select distinct mu.oc_oid as mu_oid, mu.name from event_definition_crf edc, crf_version cv, versioning_map vm, item, measurement_unit mu"
+ " where edc.study_id =" + studyId + " and edc.crf_id = cv.crf_id" + " and cv.crf_version_id ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStudyMeasurementUnitsSql
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | getStudyMeasurementUnitsSql | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | final void setFocusedActivityLocked(ActivityRecord r, String reason) {
if (mFocusedActivity != r) {
if (DEBUG_FOCUS) Slog.d(TAG, "setFocusedActivityLocked: r=" + r);
mFocusedActivity = r;
if (r.task != null && r.task.voiceInteractor != null) {
startRunningVoic... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setFocusedActivityLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | setFocusedActivityLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | private void handleGetDefaultLauncher() throws CommandException {
synchronized (mLock) {
parseOptionsLocked(/* takeUser =*/ true);
final String defaultLauncher = getDefaultLauncher(mUserId);
if (defaultLauncher == null) {
throw new Command... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleGetDefaultLauncher
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | handleGetDefaultLauncher | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @POST
@Operation(summary = "Post attachment", description = "Upload the attachment of a message, as parameter.")
@ApiResponse(responseCode = "200", description = "Ok.")
@ApiResponse(responseCode = "404", description = " The identity or the portrait not found")
@Path("posts/{messageKey}/attachments")
@Consumes(Medi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: replyToPostAttachment
File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | replyToPostAttachment | src/main/java/org/olat/modules/fo/restapi/ForumWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean jsFunction_isRatingActivated() throws APIManagementException {
boolean ratingActivated = false;
APIManagerConfiguration config =
ServiceReferenceHolder.getInstance()
.getAPIManagerConfigurationService()
.getAPIManager... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jsFunction_isRatingActivated
File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
Repository: wso2/carbon-apimgt
The code follows secure c... | [
"CWE-79"
] | CVE-2018-20736 | LOW | 3.5 | wso2/carbon-apimgt | jsFunction_isRatingActivated | components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java | 490f2860822f89d745b7c04fa9570bd86bef4236 | 0 |
Analyze the following code function for security vulnerabilities | public void addUserRestrictionGlobally(@NonNull @UserManager.UserRestrictionKey String key) {
throwIfParentInstance("addUserRestrictionGlobally");
if (mService != null) {
try {
mService.setUserRestrictionGlobally(mContext.getPackageName(), key);
} catch (RemoteExc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addUserRestrictionGlobally
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | addUserRestrictionGlobally | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public String getContactServiceProvider(final String userID, final String command) throws IOException {
update();
m_readLock.lock();
try {
final User user = m_users.get(userID);
return _getContactServiceProvider(user, command);
} finally {
m_readLock.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getContactServiceProvider
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | getContactServiceProvider | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | public void closeSystemDialogs(String reason) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: closeSystemDialogs
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | closeSystemDialogs | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isKeyguardServiceEnabled() {
try {
return mContext.getPackageManager().getServiceInfo(
new ComponentName(mContext, KeyguardService.class), 0).isEnabled();
} catch (NameNotFoundException e) {
return true;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isKeyguardServiceEnabled
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | isKeyguardServiceEnabled | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private String getDefaultEditModeInternal(XWikiContext context) throws XWikiException
{
String editModeProperty = "defaultEditMode";
DocumentReference editModeClass =
getCurrentReferenceDocumentReferenceResolver().resolve(XWikiConstant.EDIT_MODE_CLASS);
// check if the current do... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultEditModeInternal
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getDefaultEditModeInternal | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public int port() {
if (port == Defaults.DEFAULT_PORT) {
if (protocol == null) {
return 80;
}
if (protocol.equalsIgnoreCase("https")) {
return 443;
}
return 80;
}
return port;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: port
File: src/main/java/jodd/http/HttpRequest.java
Repository: oblac/jodd-http
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2022-29631 | MEDIUM | 5 | oblac/jodd-http | port | src/main/java/jodd/http/HttpRequest.java | e50f573c8f6a39212ade68c6eb1256b2889fa8a6 | 0 |
Analyze the following code function for security vulnerabilities | public String getXWikiPreference(String prefname, XWikiContext context)
{
return getXWikiPreference(prefname, "", context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXWikiPreference
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getXWikiPreference | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void addDisabledHints(ManagedServiceInfo info, int hints) {
if ((hints & HINT_HOST_DISABLE_EFFECTS) != 0) {
addDisabledHint(info, HINT_HOST_DISABLE_EFFECTS);
}
if ((hints & HINT_HOST_DISABLE_NOTIFICATION_EFFECTS) != 0) {
addDisabledHint(info, HINT_HOST_DISABLE_NO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addDisabledHints
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | addDisabledHints | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | public static <T extends Enum<T>> String[] enumNameToStringArray(T[] values) {
int i = 0;
String[] result = new String[values.length];
for (T value : values) {
result[i++] = value.name();
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enumNameToStringArray
File: src/org/opencms/util/CmsStringUtil.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | enumNameToStringArray | src/org/opencms/util/CmsStringUtil.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | public ArraySet<String> getFixedImeApps() {
return mFixedImeApps;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFixedImeApps
File: services/core/java/com/android/server/SystemConfig.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | getFixedImeApps | services/core/java/com/android/server/SystemConfig.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationWithTypeInfo02() throws Exception
{
String prefix = "[\"" + Duration.class.getName() + "\",";
ObjectMapper mapper = newMapper();
mapper.configure(DeserializationFeature.READ_DATE_TIMESTAMPS_AS_NANOSECONDS, true);
mapper.addMixIn(TemporalAmoun... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDeserializationWithTypeInfo02
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practice... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationWithTypeInfo02 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | private void createEmbeddedCache() {
GlobalConfigurationBuilder globalBuilder;
if (cacheMode.isClustered()) {
globalBuilder = new GlobalConfigurationBuilder();
globalBuilder.transport().defaultTransport();
} else {
globalBuilder = new GlobalConfigurationBuilder().nonCluster... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createEmbeddedCache
File: integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java
Repository: infinispan
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2017-15089 | MEDIUM | 6.5 | infinispan | createEmbeddedCache | integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java | 69be66141eee7abb1c47d46f0a6b74b079709f4b | 0 |
Analyze the following code function for security vulnerabilities | @Override public String toString() {
StringBuilder sb = new StringBuilder();
sb.append("Frame(type=").append(type).append(", channel=").append(channel).append(", ");
if (accumulator == null) {
sb.append(payload.length).append(" bytes of payload)");
} else {
sb.app... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/com/rabbitmq/client/impl/Frame.java
Repository: rabbitmq/rabbitmq-java-client
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-46120 | HIGH | 7.5 | rabbitmq/rabbitmq-java-client | toString | src/main/java/com/rabbitmq/client/impl/Frame.java | 714aae602dcae6cb4b53cadf009323ebac313cc8 | 0 |
Analyze the following code function for security vulnerabilities | private BigInteger calculateE(BigInteger n, byte[] message)
{
if (n.bitLength() >= message.length * 8)
{
return new BigInteger(1, message);
}
else
{
byte[] trunc = new byte[n.bitLength() / 8];
System.arraycopy(message, 0, trunc, 0, trunc.l... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: calculateE
File: core/src/main/java/org/bouncycastle/crypto/signers/DSASigner.java
Repository: bcgit/bc-java
The code follows secure coding practices. | [
"CWE-361"
] | CVE-2016-1000341 | MEDIUM | 4.3 | bcgit/bc-java | calculateE | core/src/main/java/org/bouncycastle/crypto/signers/DSASigner.java | acaac81f96fec91ab45bd0412beaf9c3acd8defa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public IActivityContainer createActivityContainer(IBinder parentActivityToken,
IActivityContainerCallback callback) throws RemoteException {
enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
"createActivityContainer()");
synchronized (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createActivityContainer
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | createActivityContainer | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | protected void fillInPartJars(List<JARDesc> jars) {
//can not use iterator, will rise ConcurrentModificationException on jars.add(jar);
for (int x = 0; x < jars.size(); x++) {
String part = jars.get(x).getPart();
// "available" field can be affected by two different threads
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fillInPartJars
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | fillInPartJars | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | private static final void resetAndCopyProperties(Path file, Path destFile) {
Properties props = new Properties();
try (InputStream inStream = Files.newInputStream(file);
OutputStream outStream = Files.newOutputStream(destFile)) {
props.load(inStream);
props.setProperty(VERSION, "0");
props.setProperty(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetAndCopyProperties
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | resetAndCopyProperties | src/main/java/org/olat/modules/wiki/WikiManager.java | 699490be8e931af0ef1f135c55384db1f4232637 | 0 |
Analyze the following code function for security vulnerabilities | private static ReplyFromAccount getDefaultReplyFromAccount(final Account account) {
for (final ReplyFromAccount from : account.getReplyFroms()) {
if (from.isDefault) {
return from;
}
}
return new ReplyFromAccount(account, account.uri, account.getEmailAddre... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultReplyFromAccount
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | getDefaultReplyFromAccount | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasRefSpec() {
return RefSpecHelper.hasRefSpec(branch);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasRefSpec
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | hasRefSpec | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
final int prime = 31;
int result = super.hashCode();
result = prime * result + ((keyURL == null) ? 0 : keyURL.hashCode());
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | hashCode | base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | protected boolean showHomeBanner() {
String menuId = (String)getRequestParameter("menuId");
String homeMenuId = getUserview().getPropertyString("homeMenuId");
String pwaStartUrl = "index";
boolean showHomeBanner = (menuId == null || homeMenuId.equals(menuId) || pwaStartUrl.equals(menuId)... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showHomeBanner
File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
Repository: jogetworkflow/jw-community
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2022-4560 | MEDIUM | 6.1 | jogetworkflow/jw-community | showHomeBanner | wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java | ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b | 0 |
Analyze the following code function for security vulnerabilities | protected UserDTO.PlatformInfo getUserPlatInfo(String workspaceId) {
return userService.getCurrentPlatformInfo(workspaceId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserPlatInfo
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getUserPlatInfo | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public void setScmCheckoutStrategy(SCMCheckoutStrategy scmCheckoutStrategy) throws IOException {
this.scmCheckoutStrategy = scmCheckoutStrategy;
save();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setScmCheckoutStrategy
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | setScmCheckoutStrategy | core/src/main/java/hudson/model/AbstractProject.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | private void writeStyles(CellReference cell, JsonObject styles) {
if (cellStyleGenerator != null) {
String style = cellStyleGenerator.getStyle(cell);
put(columnKeys.key(cell.getPropertyId()), style, styles);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeStyles
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | writeStyles | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void saveTrans5(TestContext context) {
String id = randomUuid();
postgresClient = createFoo(context);
postgresClient.startTx(asyncAssertTx(context, trans -> {
postgresClient.save(trans, FOO, id, xPojo, context.asyncAssertSuccess(save -> {
postgresClient.endTx(trans, context.asyn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveTrans5
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15534 | HIGH | 7.5 | folio-org/raml-module-builder | saveTrans5 | domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java | b7ef741133e57add40aa4cb19430a0065f378a94 | 0 |
Analyze the following code function for security vulnerabilities | public int getTimeout() {
return timeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTimeout
File: src/main/java/dev/hypera/dragonfly/Dragonfly.java
Repository: HyperaDev/Dragonfly
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-41967 | HIGH | 7.5 | HyperaDev/Dragonfly | getTimeout | src/main/java/dev/hypera/dragonfly/Dragonfly.java | 9661375e1135127ca6cdb5712e978bec33cc06b3 | 0 |
Analyze the following code function for security vulnerabilities | final void setObject(Iterable<? extends Entry<? extends CharSequence, ?>> headers) {
requireNonNull(headers, "headers");
if (headers == this) {
return;
}
for (Entry<? extends CharSequence, ?> e : headers) {
remove(e.getKey());
}
if (!addFast(head... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setObject
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2019-16771 | MEDIUM | 5 | line/armeria | setObject | core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java | b597f7a865a527a84ee3d6937075cfbb4470ed20 | 0 |
Analyze the following code function for security vulnerabilities | protected final XmlFile getConfigFile() {
return new XmlFile(new File(Jenkins.getInstance().getRootDir(),getId()+".xml"));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfigFile
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | getConfigFile | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isValid() {
// ::revert when __CORE__
return owner != null && System.currentTimeMillis() <= this.expirationDate;
// return false;
// ::done
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isValid
File: src/net/sourceforge/plantuml/version/LicenseInfo.java
Repository: plantuml
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2023-3431 | MEDIUM | 5.3 | plantuml | isValid | src/net/sourceforge/plantuml/version/LicenseInfo.java | fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object getObjectProperty(String name) throws JMSException {
if (name.startsWith(PREFIX))
return this.rmqProperties.get(name);
else
return this.userJmsProperties.get(name);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getObjectProperty
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | getObjectProperty | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | protected void
do_parse() throws SAXException, IOException
{
parser.parse(getInputSource());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: do_parse
File: ext/java/nokogiri/XmlSaxParserContext.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-241"
] | CVE-2022-29181 | MEDIUM | 6.4 | sparklemotion/nokogiri | do_parse | ext/java/nokogiri/XmlSaxParserContext.java | db05ba9a1bd4b90aa6c76742cf6102a7c7297267 | 0 |
Analyze the following code function for security vulnerabilities | private String[] resolveCacheNames(AnnotationValue<CacheConfig> defaultConfig, AnnotationValue<Cacheable> cacheConfig) {
String[] cacheNames = cacheConfig.get(MEMBER_CACHE_NAMES, String[].class).orElse(null);
if (ArrayUtils.isEmpty(cacheNames)) {
cacheNames = defaultConfig.get(MEMBER_CACHE_N... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveCacheNames
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-21700 | MEDIUM | 5 | micronaut-projects/micronaut-core | resolveCacheNames | runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java | b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onInterceptTouchEvent(MotionEvent event) {
if (mBlockTouches || mQs.isCustomizing()) {
return false;
}
initDownStates(event);
if (mHeadsUpTouchHelper.onInterceptTouchEvent(event)) {
mIsExpansionFromHeadsUp = true;
MetricsLo... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onInterceptTouchEvent
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onInterceptTouchEvent | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object ckeditorUploadToolFile(HttpServletRequest request) {
String token = request.getParameter(SysConf.TOKEN);
// 从Redis中获取系统配置【需要传入token】
Map<String, String> qiNiuResultMap = feignUtil.getSystemConfigMap(token);
SystemConfig systemConfig = feignUtil.getSystemConfig... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ckeditorUploadToolFile
File: mogu_picture/src/main/java/com/moxi/mogublog/picture/service/impl/FileServiceImpl.java
Repository: moxi624/mogu_blog_v2
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2022-27047 | HIGH | 7.5 | moxi624/mogu_blog_v2 | ckeditorUploadToolFile | mogu_picture/src/main/java/com/moxi/mogublog/picture/service/impl/FileServiceImpl.java | 2d9eb941cda8fd168f9447cd6b4262f31f074d92 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.