instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | protected static ByteBuffer toBuffer(ByteBuffer... payload) {
if (payload.length == 1) {
return payload[0];
}
int size = (int) Buffers.remaining(payload);
if (size == 0) {
return Buffers.EMPTY_BYTE_BUFFER;
}
ByteBuffer buffer = ByteBuffer.allocate(... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toBuffer
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | toBuffer | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | @PUT
@Path("test/{nodeId}/configuration")
@Operation(summary = "Attach the run-time configuration", description = "This attaches the run-time configuration onto a given survey element")
@ApiResponse(responseCode = "200", description = "The test node configuration", content = {
@Content(mediaType = "application/js... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addTestConfiguration
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-41242 | HIGH | 7.9 | OpenOLAT | addTestConfiguration | src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java | c450df7d7ffe6afde39ebca6da9136f1caa16ec4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setCallback(Callback qsPanelCallback) {
mHeaderQsPanel.setCallback(qsPanelCallback);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCallback
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3886 | HIGH | 7.2 | android | setCallback | packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java | 6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<SplitPermissionInfoParcelable> getSplitPermissions() {
return mPermissionManagerServiceImpl.getSplitPermissions();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSplitPermissions
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getSplitPermissions | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | private void UpdateListView() {
getNewsReaderDetailFragment().notifyDataSetChangedOnAdapter();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: UpdateListView
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
The code follows secure coding practices. | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | UpdateListView | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 0 |
Analyze the following code function for security vulnerabilities | private void dispatchNextRestore() {
UnifiedRestoreState nextState = UnifiedRestoreState.FINAL;
try {
mRestoreDescription = mTransport.nextRestorePackage();
final String pkgName = (mRestoreDescription != null)
? mRestoreDescription.getPacka... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchNextRestore
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | dispatchNextRestore | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | void setAdminPassword(String password) {
if (password == null || password.isEmpty()) {
adminPassword = null;
return;
}
if (password.length() == 128) {
try {
adminPassword = StringUtils.convertHexToBytes(password);
return;
... | Vulnerability Classification:
- CWE: CWE-312
- CVE: CVE-2022-45868
- Severity: HIGH
- CVSS Score: 7.8
Description: Disallow plain webAdminPassword values to force usage of hashes
Function: setAdminPassword
File: h2/src/main/org/h2/server/web/WebServer.java
Repository: h2database
Fixed Code:
void setAdminPassword(Str... | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | setAdminPassword | h2/src/main/org/h2/server/web/WebServer.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 1 |
Analyze the following code function for security vulnerabilities | private void checkThread() {
if (Thread.currentThread() != currentThread && currentThread != null) {
throw new UnsupportedOperationException(
"This class must be used from a single thread. Use multiple queues for concurrent operations");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkThread
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-35925 | MEDIUM | 5.5 | IntellectualSites/FastAsyncWorldEdit | checkThread | worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java | 3a8dfb4f7b858a439c35f7af1d56d21f796f61f5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void disconnect(DisconnectReason reason) {
disconnect(reason, "");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: disconnect
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | disconnect | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | public String extractText(InputStream stream, String type, String encoding) throws IOException {
try {
CharArrayWriter writer = new CharArrayWriter();
ExtractorHandler handler = new ExtractorHandler(writer);
// TODO: Use a pull parser to avoid the memory overhead
SAXParserFactory factory = SAXParserFacto... | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2021-33950
- Severity: HIGH
- CVSS Score: 7.5
Description: XXE injection security vulnerability
Fix #287
Function: extractText
File: src/main/java/com/openkm/extractor/XMLTextExtractor.java
Repository: openkm/document-management-system
Fixed Code:
public Strin... | [
"CWE-611"
] | CVE-2021-33950 | HIGH | 7.5 | openkm/document-management-system | extractText | src/main/java/com/openkm/extractor/XMLTextExtractor.java | ce1d82329615aea6aa9f2cc6508c1fe7891e34b5 | 1 |
Analyze the following code function for security vulnerabilities | public void setExpungeBatchSize(int theExpungeBatchSize) {
myExpungeBatchSize = theExpungeBatchSize;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setExpungeBatchSize
File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
Repository: hapifhir/hapi-fhir
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-32053 | MEDIUM | 5 | hapifhir/hapi-fhir | setExpungeBatchSize | hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java | f2934b229c491235ab0e7782dea86b324521082a | 0 |
Analyze the following code function for security vulnerabilities | private void dispatchProcessDied(int pid, int uid) {
int i = mProcessObservers.beginBroadcast();
while (i > 0) {
i--;
final IProcessObserver observer = mProcessObservers.getBroadcastItem(i);
if (observer != null) {
try {
observer.on... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchProcessDied
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | dispatchProcessDied | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static String defaultUserAgent() {
return System.getProperty(ASYNC_CLIENT + "userAgent", "NING/1.0");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultUserAgent
File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices. | [
"CWE-345"
] | CVE-2013-7398 | MEDIUM | 4.3 | AsyncHttpClient/async-http-client | defaultUserAgent | src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java | a894583921c11c3b01f160ada36a8bb9d5158e96 | 0 |
Analyze the following code function for security vulnerabilities | void initPrivateFields(ObjectStreamClass desc) {
methodWriteReplace = desc.methodWriteReplace;
methodReadResolve = desc.methodReadResolve;
methodWriteObject = desc.methodWriteObject;
methodReadObject = desc.methodReadObject;
methodReadObjectNoData = desc.methodReadObjectNoData;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initPrivateFields
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | initPrivateFields | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | public boolean unpublishRecording(File destDir, String recordingId, File recordingDir, String format) {
File metadataXml = recordingServiceHelper.getMetadataXmlLocation(recordingDir.getPath());
RecordingMetadata r = recordingServiceHelper.getRecordingMetadata(metadataXml);
if (r != null) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unpublishRecording
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | unpublishRecording | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | public void serviceTransportException(IOException e) {
BrokerService bService = connector.getBrokerService();
if (bService.isShutdownOnSlaveFailure()) {
if (brokerInfo != null) {
if (brokerInfo.isSlaveBroker()) {
LOG.error("Slave has exception: {} shutting... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serviceTransportException
File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
Repository: apache/activemq
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-3576 | MEDIUM | 5 | apache/activemq | serviceTransportException | activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java | 00921f2 | 0 |
Analyze the following code function for security vulnerabilities | private KeyguardInputViewController<KeyguardInputView> changeSecurityMode(
SecurityMode securityMode) {
mCurrentSecurityMode = securityMode;
return getCurrentSecurityController();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: changeSecurityMode
File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21245 | HIGH | 7.8 | android | changeSecurityMode | packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java | a33159e8cb297b9eee6fa5c63c0e343d05fad622 | 0 |
Analyze the following code function for security vulnerabilities | public void SetClientCert(X509Certificate cert) throws IllegalArgumentException {
if (!(cert instanceof PK11Cert)) {
throw new IllegalArgumentException("Unable to cast given certificate to PK11Cert: " + cert.getClass().getName());
}
clientCert = (PK11Cert)cert;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: SetClientCert
File: src/main/java/org/mozilla/jss/nss/SSLFDProxy.java
Repository: dogtagpki/jss
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-4213 | HIGH | 7.5 | dogtagpki/jss | SetClientCert | src/main/java/org/mozilla/jss/nss/SSLFDProxy.java | 5922560a78d0dee61af8a33cc9cfbf4cfa291448 | 0 |
Analyze the following code function for security vulnerabilities | public List<IssuesWithBLOBs> getIssuesByPlatformIds(List<String> platformIds, String projectId) {
if (CollectionUtils.isEmpty(platformIds)) return new ArrayList<>();
IssuesExample example = new IssuesExample();
example.createCriteria()
.andPlatformIdIn(platformIds)
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIssuesByPlatformIds
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getIssuesByPlatformIds | test-track/backend/src/main/java/io/metersphere/service/IssuesService.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public ApiClient setApiKey(String apiKey) {
for (Authentication auth : authentications.values()) {
if (auth instanceof ApiKeyAuth) {
((ApiKeyAuth) auth).setApiKey(apiKey);
return this;
}
}
throw new RuntimeException("No API key authentication configured!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setApiKey
File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | setApiKey | samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Pure
public @Nullable Blob getBlob(int i) throws SQLException {
byte[] value = getRawValue(i);
if (value == null) {
return null;
}
return makeBlob(getLong(i));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBlob
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getBlob | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isGroupConversation() {
// When target SDK version is < P, a non-null conversation title dictates if this is
// as group conversation.
if (mBuilder != null
&& mBuilder.mContext.getApplicationInfo().targetSdkVersion
< Buil... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isGroupConversation
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | isGroupConversation | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public int startVoiceActivity(String callingPackage, int callingPid, int callingUid,
Intent intent, String resolvedType, IVoiceInteractionSession session,
IVoiceInteractor interactor, int startFlags, ProfilerInfo profilerInfo,
Bundle options, int userId) throws RemoteException {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startVoiceActivity
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | startVoiceActivity | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public Button getNextButton() {
return mNextButton;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNextButton
File: src/com/android/settings/SettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2018-9501 | HIGH | 7.2 | android | getNextButton | src/com/android/settings/SettingsActivity.java | 5e43341b8c7eddce88f79c9a5068362927c05b54 | 0 |
Analyze the following code function for security vulnerabilities | public void addImplicitCollection(Class ownerType, String fieldName, Class itemType) {
addImplicitCollection(ownerType, fieldName, null, itemType);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addImplicitCollection
File: xstream/src/java/com/thoughtworks/xstream/XStream.java
Repository: x-stream/xstream
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2021-43859 | MEDIUM | 5 | x-stream/xstream | addImplicitCollection | xstream/src/java/com/thoughtworks/xstream/XStream.java | e8e88621ba1c85ac3b8620337dd672e0c0c3a846 | 0 |
Analyze the following code function for security vulnerabilities | private void grantRequestedRuntimePermissionsForUser(PackageParser.Package pkg, int userId,
String[] grantedPermissions) {
SettingBase sb = (SettingBase) pkg.mExtras;
if (sb == null) {
return;
}
synchronized (mPackages) {
for (String permission : pkg.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantRequestedRuntimePermissionsForUser
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | grantRequestedRuntimePermissionsForUser | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isJSDispatchThread() {
if (useJSDispatchThread()) {
return jsDispatchThread().isThisIt();
} else {
return (Looper.getMainLooper().getThread() == Thread.currentThread());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isJSDispatchThread
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | isJSDispatchThread | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | public void updateBlob(String columnName, @Nullable InputStream inputStream, long length)
throws SQLException {
updateBlob(findColumn(columnName), inputStream, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBlob
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateBlob | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onTransferProgress(
long progressRate,
long totalTransferredSoFar,
long totalToTransfer,
String filePath
) {
int percent = (int) (100.0 * ((double) totalTransferredSoFar) / ((double) totalToTransfer));
if (percent != mLastPercent) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTransferProgress
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | onTransferProgress | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | public void onLeServiceUp() {
Message m = mAdapterStateMachine.obtainMessage(AdapterState.USER_TURN_ON);
mAdapterStateMachine.sendMessage(m);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLeServiceUp
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | onLeServiceUp | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | public static void setResponseNoCacheHeaders(
BiConsumer<String, String> headerSetter,
BiConsumer<String, Long> longHeaderSetter) {
headerSetter.accept("Cache-Control", "no-cache, no-store");
headerSetter.accept("Pragma", "no-cache");
longHeaderSetter.accept("Expires", 0L... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setResponseNoCacheHeaders
File: flow-server/src/main/java/com/vaadin/flow/server/HandlerHelper.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-36321 | MEDIUM | 5 | vaadin/flow | setResponseNoCacheHeaders | flow-server/src/main/java/com/vaadin/flow/server/HandlerHelper.java | e0dcaf86b63dbcab3adbbe107d1c49d490ead8eb | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void handleClick(@Nullable View view) {
ActivityLaunchAnimator.Controller animationController =
view == null ? null : ActivityLaunchAnimator.Controller.fromView(view,
InteractionJankMonitor.CUJ_SHADE_APP_LAUNCH_FROM_QS_TILE);
mUiHandler.po... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleClick
File: packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21289 | MEDIUM | 5.5 | android | handleClick | packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java | 7a5e51c918b7097be3c7e669e1825a4d159c4185 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void removePacketCollector(PacketCollector collector) {
collectors.remove(collector);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removePacketCollector
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | removePacketCollector | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | private boolean isFwdChangeSuccess() {
if (mForwardingChangeResults == null) {
return true;
}
for (AsyncResult result : mForwardingChangeResults.values()) {
Throwable exception = result.exception;
if (exception != null) {
String msg = exceptio... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFwdChangeSuccess
File: src/com/android/phone/settings/VoicemailSettingsActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-862"
] | CVE-2023-35665 | HIGH | 7.8 | android | isFwdChangeSuccess | src/com/android/phone/settings/VoicemailSettingsActivity.java | 674039e70e1c5bf29b808899ac80c709acc82290 | 0 |
Analyze the following code function for security vulnerabilities | protected CompletableFuture<DispatchRate> internalGetSubscriptionDispatchRate(boolean applied) {
return getTopicPoliciesAsyncWithRetry(topicName)
.thenApply(op -> op.map(TopicPolicies::getSubscriptionDispatchRate)
.orElseGet(() -> {
if (applied) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: internalGetSubscriptionDispatchRate
File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
Repository: apache/pulsar
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-41571 | MEDIUM | 4 | apache/pulsar | internalGetSubscriptionDispatchRate | pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java | 5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52 | 0 |
Analyze the following code function for security vulnerabilities | public static int hashCodeAscii(byte[] bytes, int startPos, int length) {
return !hasUnsafe() || !unalignedAccess() ?
hashCodeAsciiSafe(bytes, startPos, length) :
PlatformDependent0.hashCodeAscii(bytes, startPos, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCodeAscii
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | hashCodeAscii | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void serializeWithType(Object bean, JsonGenerator gen,
SerializerProvider provider, TypeSerializer typeSer)
throws IOException
{
if (_objectIdWriter != null) {
gen.setCurrentValue(bean); // [databind#631]
_serializeWithObjectId(bean, gen, prov... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: serializeWithType
File: src/main/java/com/fasterxml/jackson/databind/ser/std/BeanSerializerBase.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | serializeWithType | src/main/java/com/fasterxml/jackson/databind/ser/std/BeanSerializerBase.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder gracefulShutdownTimeout(Duration quietPeriod, Duration timeout) {
requireNonNull(quietPeriod, "quietPeriod");
requireNonNull(timeout, "timeout");
gracefulShutdownQuietPeriod = validateNonNegative(quietPeriod, "quietPeriod");
gracefulShutdownTimeout = validateNonNegat... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: gracefulShutdownTimeout
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | gracefulShutdownTimeout | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | private void unloadPrivatePackagesInner(VolumeInfo vol) {
final ArrayList<ApplicationInfo> unloaded = new ArrayList<>();
synchronized (mInstallLock) {
synchronized (mPackages) {
final List<PackageSetting> packages = mSettings.getVolumePackagesLPr(vol.fsUuid);
for (Package... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unloadPrivatePackagesInner
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | unloadPrivatePackagesInner | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | private void saveRequestMap() {
// TODO: store the request map in user preferences.
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveRequestMap
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2425 | MEDIUM | 4.3 | android | saveRequestMap | src/com/android/mail/compose/ComposeActivity.java | 0d9dfd649bae9c181e3afc5d571903f1eb5dc46f | 0 |
Analyze the following code function for security vulnerabilities | public void readFieldEnd() throws TException {} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFieldEnd
File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
Repository: facebook/fbthrift
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2019-11938 | MEDIUM | 5 | facebook/fbthrift | readFieldEnd | thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java | 08c2d412adb214c40bb03be7587057b25d053030 | 0 |
Analyze the following code function for security vulnerabilities | void setShellArgs( String[] shellArgs )
{
this.shellArgs.clear();
this.shellArgs.addAll( Arrays.asList( shellArgs ) );
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setShellArgs
File: src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java
Repository: apache/maven-shared-utils
The code follows secure coding practices. | [
"CWE-116"
] | CVE-2022-29599 | HIGH | 7.5 | apache/maven-shared-utils | setShellArgs | src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java | 2735facbbbc2e13546328cb02dbb401b3776eea3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setEncoding(String encoding) {
fEncoding = encoding;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setEncoding
File: ext/java/nokogiri/XmlSchema.java
Repository: sparklemotion/nokogiri
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2020-26247 | MEDIUM | 4 | sparklemotion/nokogiri | setEncoding | ext/java/nokogiri/XmlSchema.java | 9c87439d9afa14a365ff13e73adc809cb2c3d97b | 0 |
Analyze the following code function for security vulnerabilities | public void flushBuffer() throws IOException {
if (this.outputWriter != null) {
this.outputWriter.flush();
}
try {
this.outputStream.flush();
} catch (ClientSocketException e) {
// ignore this error as it's not interesting enough to log
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flushBuffer
File: src/java/winstone/WinstoneResponse.java
Repository: jenkinsci/winstone
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2011-4344 | LOW | 2.6 | jenkinsci/winstone | flushBuffer | src/java/winstone/WinstoneResponse.java | 410ed3001d51c689cf59085b7417466caa2ded7b | 0 |
Analyze the following code function for security vulnerabilities | @CalledByNative
public boolean addMessageToConsole(int level, String message, int lineNumber,
String sourceId) {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addMessageToConsole
File: components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java
Repository: chromium
The code follows secure co... | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | addMessageToConsole | components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | private static void copyDirectory(File source, File target) {
if (target.exists() && !target.isDirectory()) {
throw new IllegalArgumentException("Cannot copy source directory since the target already exists,"
+ " but it is not a directory");
}
final File targetSub... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyDirectory
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | copyDirectory | hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected Contentlet findContentletForLanguage(long languageId, Identifier identifier) throws DotDataException {
return findContentletByIdentifier(identifier.getId(), false, languageId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findContentletForLanguage
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | findContentletForLanguage | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | public String[] getParticipants() {
return mParticipants;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParticipants
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | getParticipants | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public String toString() {
return " at character " + this.myIndex + " of " + this.mySource;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: src/main/java/org/codehaus/jettison/json/JSONTokener.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | toString | src/main/java/org/codehaus/jettison/json/JSONTokener.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Class<?> findClass(String name) throws ClassNotFoundException {
// Calls JNLPClassLoader#findClass which may call into this.findClassNonRecursive
Class<?> c = getParentJNLPClassLoader().findClass(name);
parentJNLPClassLoader.checkPartialSigningWithUser();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findClass
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | findClass | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | public void dump(IndentingPrintWriter pw) {
mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
if (mCalls != null) {
pw.println("mCalls: ");
pw.increaseIndent();
for (Call call : mCalls) {
pw.println(call);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dump
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | dump | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void endElement(final String uri, final String localName, final String name) throws SAXException {
if (localName.equals("EventID")) {
final String id = content.toString().trim();
if (idSet.contains(id)) {
duplicate = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: endElement
File: stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | endElement | stroom-pipeline/src/test/java/stroom/util/UniqueXMLEvents.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | public List<Pair> parameterToPairs(String collectionFormat, String name, Object value){
List<Pair> params = new ArrayList<Pair>();
// preconditions
if (name == null || name.isEmpty() || value == null) return params;
Collection valueCollection;
if (value instanceof Collection) {
valueCollecti... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parameterToPairs
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure cod... | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | parameterToPairs | samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | private void initCache(Controller baseController) {
BaseDataInitVO cacheInit = (BaseDataInitVO) JFinal.me().getServletContext().getAttribute(Constants.CACHE_KEY);
if (cacheInit == null) {
cacheInit = new BaseDataInitVO();
Map<String, Object> website = new WebSite().getWebSite();
... | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2019-16643
- Severity: LOW
- CVSS Score: 3.5
Description: Upgrade jar version & fix #54
Signed-off-by: xiaochun <xchun90@163.com>
Function: initCache
File: web/src/main/java/com/zrlog/web/cache/CacheService.java
Repository: 94fzb/zrlog
Fixed Code:
private void ... | [
"CWE-79"
] | CVE-2019-16643 | LOW | 3.5 | 94fzb/zrlog | initCache | web/src/main/java/com/zrlog/web/cache/CacheService.java | 4a91c83af669e31a22297c14f089d8911d353fa1 | 1 |
Analyze the following code function for security vulnerabilities | public void setNullValueCVsTypesExpected() {
this.unsetTypeExpected();
int i = 1;
this.setTypeExpected(i, TypeNames.STRING); // study_event_definition oc_oid
++i;
this.setTypeExpected(i, TypeNames.STRING); // crf_version oc_oid
++i;
this.setTypeExpected(i, TypeNa... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNullValueCVsTypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | setNullValueCVsTypesExpected | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | public void writeStringResponse(VaadinResponse response, String contentType,
String responseString) throws IOException {
response.setContentType(contentType);
final OutputStream out = response.getOutputStream();
try (PrintWriter outWriter = new PrintWriter(
new Buff... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeStringResponse
File: server/src/main/java/com/vaadin/server/VaadinService.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31403 | LOW | 1.9 | vaadin/framework | writeStringResponse | server/src/main/java/com/vaadin/server/VaadinService.java | d852126ab6f0c43f937239305bd0e9594834fe34 | 0 |
Analyze the following code function for security vulnerabilities | public void stopSyncEvent(long historyId, long elapsedTime, String resultMessage,
long downstreamActivity, long upstreamActivity) {
synchronized (mAuthorities) {
if (Log.isLoggable(TAG, Log.VERBOSE)) {
Log.v(TAG, "stopSyncEvent: historyId=" + historyId);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopSyncEvent
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2016-2424 | HIGH | 7.1 | android | stopSyncEvent | services/core/java/com/android/server/content/SyncStorageEngine.java | d3383d5bfab296ba3adbc121ff8a7b542bde4afb | 0 |
Analyze the following code function for security vulnerabilities | public int getReadTimeout() {
return readTimeout;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getReadTimeout
File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2021-21430 | LOW | 2.1 | OpenAPITools/openapi-generator | getReadTimeout | samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java | 2c576483f26f85b3979c6948a131f585c237109a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Object getValue(ELContext context, Object base, Object property) {
Object result = super.getValue(context, base, validatePropertyName(property));
return result instanceof Class ? null : result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getValue
File: src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java
Repository: HubSpot/jinjava
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-12668 | MEDIUM | 6.8 | HubSpot/jinjava | getValue | src/main/java/com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java | 5dfa5b87318744a4d020b66d5f7747acc36b213b | 0 |
Analyze the following code function for security vulnerabilities | protected void maybeThrowValidationException() throws ValidationException {
if (validationExceptions.size() > 0) {
throw new ValidationException("Encountered " + validationExceptions.size() + " validation exceptions.", validationExceptions);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: maybeThrowValidationException
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2019-13990 | HIGH | 7.5 | quartz-scheduler/quartz | maybeThrowValidationException | quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java | a1395ba118df306c7fe67c24fb0c9a95a4473140 | 0 |
Analyze the following code function for security vulnerabilities | public void fireSessionDestroy(VaadinSession vaadinSession) {
final VaadinSession session = vaadinSession;
session.access(() -> {
if (session.getState() == VaadinSessionState.CLOSED) {
return;
}
if (session.getState() == VaadinSessionState.OPEN) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fireSessionDestroy
File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31404 | LOW | 1.9 | vaadin/flow | fireSessionDestroy | flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java | 621ef1b322737d963bee624b2d2e38cd739903d9 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.