instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public int getMask() { return _mask; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMask File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
getMask
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
private Optional<Session> getActiveSessionForID(Serializable sessionId) { final SessionManager sessionManager = securityManager.getSessionManager(); // Using the session manager to get the session instead of getting it directly from the SessionDAO // because the session manager wraps it in a DelegatingSession that might do additional cleanup. try { return Optional.ofNullable(sessionManager.getSession(new DefaultSessionKey(sessionId))); } catch (ExpiredSessionException e) { return Optional.empty(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveSessionForID File: graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
getActiveSessionForID
graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
@Override public void destroy() { aes.destroy(); ghash.destroy(); Noise.destroy(hashKey); Noise.destroy(iv); Noise.destroy(enciv); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java Repository: rweather/noise-java The code follows secure coding practices.
[ "CWE-125", "CWE-787" ]
CVE-2020-25021
HIGH
7.5
rweather/noise-java
destroy
src/main/java/com/southernstorm/noise/protocol/AESGCMFallbackCipherState.java
18e86b6f8bea7326934109aa9ffa705ebf4bde90
0
Analyze the following code function for security vulnerabilities
private void removeClosedUIs(final VaadinSession session) { List<UI> uis = new ArrayList<>(session.getUIs()); for (final UI ui : uis) { if (ui.isClosing()) { ui.accessSynchronously(() -> { getLogger().debug("Removing closed UI {}", ui.getUIId()); session.removeUI(ui); }); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeClosedUIs File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
removeClosedUIs
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
private static String replacePlus(String toReplace) { return toReplace.replace("+", "%2B"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: replacePlus File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
replacePlus
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void launchLeftAffordance() { if (mLeftIsVoiceAssist) { launchVoiceAssist(); } else { launchPhone(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchLeftAffordance File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
launchLeftAffordance
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private boolean hasUsageStatsPermission(String callingPackage) { return hasUsageStatsPermission(callingPackage, Binder.getCallingUid(), Binder.getCallingPid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasUsageStatsPermission File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
hasUsageStatsPermission
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void build(File outFile) throws BrutException { LOGGER.info("Using Apktool " + ApktoolProperties.getVersion() + " with " + mConfig.jobs + " thread(s)."); try { mWorker = new BackgroundWorker(mConfig.jobs); mApkInfo = ApkInfo.load(mApkDir); if (mApkInfo.getSdkInfo() != null && mApkInfo.getSdkInfo().get("minSdkVersion") != null) { String minSdkVersion = mApkInfo.getSdkInfo().get("minSdkVersion"); mMinSdkVersion = mApkInfo.getMinSdkVersionFromAndroidCodename(minSdkVersion); } if (outFile == null) { String outFileName = mApkInfo.apkFileName; outFile = new File(mApkDir, "dist" + File.separator + (outFileName == null ? "out.apk" : outFileName)); } //noinspection ResultOfMethodCallIgnored new File(mApkDir, APK_DIRNAME).mkdirs(); File manifest = new File(mApkDir, "AndroidManifest.xml"); File manifestOriginal = new File(mApkDir, "AndroidManifest.xml.orig"); scheduleBuildDexFiles(); backupManifestFile(manifest, manifestOriginal); buildResources(); copyLibs(); copyOriginalFilesIfEnabled(); mWorker.waitForFinish(); if (mBuildError.get() != null) { throw mBuildError.get(); } buildApk(outFile); // we copied the AndroidManifest.xml to AndroidManifest.xml.orig so we can edit it // lets restore the unedited one, to not change the original if (manifest.isFile() && manifest.exists() && manifestOriginal.isFile()) { try { if (new File(mApkDir, "AndroidManifest.xml").delete()) { FileUtils.moveFile(manifestOriginal, manifest); } } catch (IOException ex) { throw new AndrolibException(ex.getMessage()); } } LOGGER.info("Built apk into: " + outFile.getPath()); } finally { mWorker.shutdownNow(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build File: brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
build
brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
static public void zipFiles(List<Path> filesToZip, File zipFile) throws IOException { BufferedOutputStream fileOutputStream = new BufferedOutputStream(new FileOutputStream(zipFile)); ZipOutputStream out = new ZipOutputStream(fileOutputStream); for (Path file : filesToZip) { if (Files.exists(file)) addToZip(out, file.getFileName(), file); } out.flush(); out.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: zipFiles File: modules/common/app/utils/common/ZipUtil.java Repository: JATOS The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4878
MEDIUM
5.2
JATOS
zipFiles
modules/common/app/utils/common/ZipUtil.java
2b42519f309d8164e8811392770ce604cdabb5da
0
Analyze the following code function for security vulnerabilities
private static <T> void checkCompatibleConfigs(String type, T c1, T c2, ConfigChecker<T> checker) { if (!checker.check(c1, c2)) { throw new HazelcastException(format("Incompatible " + type + " config :\n{0}\n vs \n{1}", c1, c2)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkCompatibleConfigs File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
checkCompatibleConfigs
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public String getAttachmentURL(String fullname, String filename) throws XWikiException { if (StringUtils.isAnyEmpty(fullname, filename)) { return ""; } return this.xwiki.getAttachmentURL(fullname, filename, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getAttachmentURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private static int getSendSmsFlag(@Nullable PendingIntent deliveryIntent) { if (deliveryIntent == null) { return 0; } return CarrierMessagingService.SEND_FLAG_REQUEST_DELIVERY_STATUS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSendSmsFlag File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3883
MEDIUM
4.3
android
getSendSmsFlag
src/java/com/android/internal/telephony/SMSDispatcher.java
b2c89e6f8962dc7aff88cb38aa3ee67d751edda9
0
Analyze the following code function for security vulnerabilities
private EntityReference getFullReference(EntityReference reference) { return reference != null ? this.resolver.resolve(reference, reference.getType()) : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFullReference File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContextualAuthorizationManager.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
getFullReference
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContextualAuthorizationManager.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
static String computeTaskAffinity(String affinity, int uid, int launchMode) { final String uidStr = Integer.toString(uid); if (affinity != null && !affinity.startsWith(uidStr)) { affinity = uidStr + (launchMode == LAUNCH_SINGLE_INSTANCE ? "-si:" : ":") + affinity; } return affinity; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeTaskAffinity File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
computeTaskAffinity
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public WinstoneRequest getRequest() { return this.req; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequest File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
getRequest
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition options(final String path, final Route.Handler handler) { return appendDefinition(OPTIONS, path, handler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: options File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
options
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void clearSelection() { mImeAdapter.unselect(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearSelection File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
clearSelection
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private void clearVibrateLocked() { mVibrateNotificationKey = null; long identity = Binder.clearCallingIdentity(); try { mVibrator.cancel(); } finally { Binder.restoreCallingIdentity(identity); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearVibrateLocked File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
clearVibrateLocked
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public Iterator keys() { return this.myHashMap.keySet().iterator(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: keys File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
keys
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
@SystemApi public boolean isMacRandomizationEnabled() { return mIsMacRandomizationEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMacRandomizationEnabled File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
isMacRandomizationEnabled
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private PublicKey getIssuerPublicKey(Request request, String issuer) throws ConfigurationException, ProcessingException { String issuerHost = null; PublicKey issuerPublicKey = null; try { issuerHost = new URL(issuer).getHost(); } catch (MalformedURLException e) { logger.trace("Token issuer is not a valid URL: " + issuer, e); issuerHost = issuer; } logger.trace("Trying to find a PK for issuer: " + issuerHost); try { issuerPublicKey = CoreConfigUtil.getValidatingKey(keyManager, issuerHost); } catch (IllegalStateException ise) { logger.trace("Token issuer is not found for: " + issuer, ise); } if (issuerPublicKey == null) { issuerHost = request.getRemoteAddr(); logger.trace("Trying to find a PK for issuer " + issuerHost); issuerPublicKey = CoreConfigUtil.getValidatingKey(keyManager, issuerHost); } logger.trace("Using Validating Alias=" + issuerHost + " to check signatures."); return issuerPublicKey; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIssuerPublicKey File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
getIssuerPublicKey
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
public String makeAdjReason() { if (adjSource != null || adjTarget != null) { StringBuilder sb = new StringBuilder(128); sb.append(' '); if (adjTarget instanceof ComponentName) { sb.append(((ComponentName)adjTarget).flattenToShortString()); } else if (adjTarget != null) { sb.append(adjTarget.toString()); } else { sb.append("{null}"); } sb.append("<="); if (adjSource instanceof ProcessRecord) { sb.append("Proc{"); sb.append(((ProcessRecord)adjSource).toShortString()); sb.append("}"); } else if (adjSource != null) { sb.append(adjSource.toString()); } else { sb.append("{null}"); } return sb.toString(); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeAdjReason File: services/core/java/com/android/server/am/ProcessRecord.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
makeAdjReason
services/core/java/com/android/server/am/ProcessRecord.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
protected void addHeaders(WebClient.Builder webClientBuilder, List<Property> headers) { headers.stream() .filter(header -> isNotEmpty(header.getKey())) .forEach(header -> webClientBuilder.defaultHeader(header.getKey(), (String) header.getValue())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addHeaders File: app/server/appsmith-interfaces/src/main/java/com/appsmith/external/helpers/restApiUtils/helpers/TriggerUtils.java Repository: appsmithorg/appsmith The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-4096
MEDIUM
6.5
appsmithorg/appsmith
addHeaders
app/server/appsmith-interfaces/src/main/java/com/appsmith/external/helpers/restApiUtils/helpers/TriggerUtils.java
769719ccfe667f059fe0b107a19ec9feb90f2e40
0
Analyze the following code function for security vulnerabilities
public ModalDialog setCloseButtonLabel(final String closeButtonLabel) { this.closeButtonLabel = closeButtonLabel; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCloseButtonLabel File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
setCloseButtonLabel
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
@Override public StaticHandler setMaxAgeSeconds(long maxAgeSeconds) { if (maxAgeSeconds < 0) { throw new IllegalArgumentException("timeout must be >= 0"); } this.maxAgeSeconds = maxAgeSeconds; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaxAgeSeconds File: vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java Repository: vert-x3/vertx-web The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-12542
HIGH
7.5
vert-x3/vertx-web
setMaxAgeSeconds
vertx-web/src/main/java/io/vertx/ext/web/handler/impl/StaticHandlerImpl.java
57a65dce6f4c5aa5e3ce7288685e7f3447eb8f3b
0
Analyze the following code function for security vulnerabilities
@Override public void sendIqWithResponseCallback(IQ iqRequest, StanzaListener callback) throws NotConnectedException, InterruptedException { sendIqWithResponseCallback(iqRequest, callback, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendIqWithResponseCallback File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendIqWithResponseCallback
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
static final void dumpMemItems(PrintWriter pw, String prefix, String tag, ArrayList<MemItem> items, boolean sort, boolean isCompact) { if (sort && !isCompact) { Collections.sort(items, new Comparator<MemItem>() { @Override public int compare(MemItem lhs, MemItem rhs) { if (lhs.pss < rhs.pss) { return 1; } else if (lhs.pss > rhs.pss) { return -1; } return 0; } }); } for (int i=0; i<items.size(); i++) { MemItem mi = items.get(i); if (!isCompact) { pw.print(prefix); pw.printf("%7d kB: ", mi.pss); pw.println(mi.label); } else if (mi.isProc) { pw.print("proc,"); pw.print(tag); pw.print(","); pw.print(mi.shortLabel); pw.print(","); pw.print(mi.id); pw.print(","); pw.print(mi.pss); pw.println(mi.hasActivities ? ",a" : ",e"); } else { pw.print(tag); pw.print(","); pw.print(mi.shortLabel); pw.print(","); pw.println(mi.pss); } if (mi.subitems != null) { dumpMemItems(pw, prefix + " ", mi.shortLabel, mi.subitems, true, isCompact); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpMemItems File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
dumpMemItems
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
synchronized public void load() { if( loaded ) { return; } doLoad(); loaded = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: load File: hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java Repository: fusesource/hawtjni The code follows secure coding practices.
[ "CWE-94" ]
CVE-2013-2035
MEDIUM
4.4
fusesource/hawtjni
load
hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java
92c266170ce98edc200c656bd034a237098b8aa5
0
Analyze the following code function for security vulnerabilities
private boolean isRemovedPackage(String changedPackage, String targetPackage, int userHandle) { try { return targetPackage != null && (changedPackage == null || changedPackage.equals(targetPackage)) && mIPackageManager.getPackageInfo(targetPackage, 0, userHandle) == null; } catch (RemoteException e) { // Shouldn't happen } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRemovedPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isRemovedPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@GetMapping("{sheetId:\\d+}/comments/top_view") public Page<CommentWithHasChildrenVO> listTopComments(@PathVariable("sheetId") Integer sheetId, @RequestParam(name = "page", required = false, defaultValue = "0") int page, @SortDefault(sort = "createTime", direction = DESC) Sort sort) { Page<CommentWithHasChildrenVO> result = sheetCommentService.pageTopCommentsBy(sheetId, CommentStatus.PUBLISHED, PageRequest.of(page, optionService.getCommentPageSize(), sort)); return sheetCommentService.filterIpAddress(result); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listTopComments File: src/main/java/run/halo/app/controller/content/api/SheetController.java Repository: halo-dev/halo The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-19007
LOW
3.5
halo-dev/halo
listTopComments
src/main/java/run/halo/app/controller/content/api/SheetController.java
d6b3d6cb5d681c7d8d64fd48de6c7c99b696bb8b
0
Analyze the following code function for security vulnerabilities
static int extract(String scheme, int port, ClickHouseProtocol protocol, Map<String, String> params) { if (port < MIN_PORT_NUM || port > MAX_PORT_NUM) { port = MIN_PORT_NUM; } if (protocol != ClickHouseProtocol.POSTGRESQL && scheme.charAt(scheme.length() - 1) == 's') { params.putIfAbsent(ClickHouseClientOption.SSL.getKey(), Boolean.TRUE.toString()); params.putIfAbsent(ClickHouseClientOption.SSL_MODE.getKey(), ClickHouseSslMode.STRICT.name()); } if (protocol != ClickHouseProtocol.ANY && port == MIN_PORT_NUM) { if (Boolean.TRUE.toString().equals(params.get(ClickHouseClientOption.SSL.getKey()))) { port = protocol.getDefaultSecurePort(); } else { port = protocol.getDefaultPort(); } } return port; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extract File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
extract
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
private static boolean hasCommonComparableBaseType(Object a, Object b) { if (a instanceof Comparable<?> && b instanceof Comparable<?>) { Class<?> aClass = a.getClass(); Class<?> bClass = b.getClass(); if (aClass == bClass) { return true; } Class<?> baseType = ReflectTools.findCommonBaseType(aClass, bClass); if (Comparable.class.isAssignableFrom(baseType)) { return true; } } if ((a == null && b instanceof Comparable<?>) || (b == null && a instanceof Comparable<?>)) { return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasCommonComparableBaseType File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
hasCommonComparableBaseType
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
private void streamCopy() { finish(handleStreamCopy(inputStreamGetter.get(getBuildContext()), outputStreamGetter.get(getBuildContext()))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: streamCopy File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
streamCopy
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public void injectPKIXParameters(PKIXParameters params) { mInjectedPKIXParameters = params; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectPKIXParameters File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
injectPKIXParameters
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
public boolean isDeviceAccessibilityScriptInjectionEnabled() { try { // On JellyBean and higher, native accessibility is the default so script // injection is only allowed if enabled via a flag. if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.JELLY_BEAN && !CommandLine.getInstance().hasSwitch( ContentSwitches.ENABLE_ACCESSIBILITY_SCRIPT_INJECTION)) { return false; } if (!mContentSettings.getJavaScriptEnabled()) { return false; } int result = getContext().checkCallingOrSelfPermission( android.Manifest.permission.INTERNET); if (result != PackageManager.PERMISSION_GRANTED) { return false; } Field field = Settings.Secure.class.getField("ACCESSIBILITY_SCRIPT_INJECTION"); field.setAccessible(true); String accessibilityScriptInjection = (String) field.get(null); ContentResolver contentResolver = getContext().getContentResolver(); if (mAccessibilityScriptInjectionObserver == null) { ContentObserver contentObserver = new ContentObserver(new Handler()) { @Override public void onChange(boolean selfChange, Uri uri) { setAccessibilityState(mAccessibilityManager.isEnabled()); } }; contentResolver.registerContentObserver( Settings.Secure.getUriFor(accessibilityScriptInjection), false, contentObserver); mAccessibilityScriptInjectionObserver = contentObserver; } return Settings.Secure.getInt(contentResolver, accessibilityScriptInjection, 0) == 1; } catch (NoSuchFieldException e) { // Do nothing, default to false. } catch (IllegalAccessException e) { // Do nothing, default to false. } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDeviceAccessibilityScriptInjectionEnabled File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
isDeviceAccessibilityScriptInjectionEnabled
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
@GuardedBy("secureSettings.mLock") private void ensureSecureSettingAndroidIdSetLocked(SettingsState secureSettings) { Setting value = secureSettings.getSettingLocked(Settings.Secure.ANDROID_ID); if (!value.isNull()) { return; } final int userId = getUserIdFromKey(secureSettings.mKey); final UserInfo user; final long identity = Binder.clearCallingIdentity(); try { user = mUserManager.getUserInfo(userId); } finally { Binder.restoreCallingIdentity(identity); } if (user == null) { // Can happen due to races when deleting users - treat as benign. return; } String androidId = Long.toHexString(new SecureRandom().nextLong()); secureSettings.insertSettingLocked(Settings.Secure.ANDROID_ID, androidId, null, true, SettingsState.SYSTEM_PACKAGE_NAME); Slog.d(LOG_TAG, "Generated and saved new ANDROID_ID [" + androidId + "] for user " + userId); // Write a drop box entry if it's a restricted profile if (user.isRestricted()) { DropBoxManager dbm = (DropBoxManager) getContext().getSystemService( Context.DROPBOX_SERVICE); if (dbm != null && dbm.isTagEnabled(DROPBOX_TAG_USERLOG)) { dbm.addText(DROPBOX_TAG_USERLOG, System.currentTimeMillis() + "," + DROPBOX_TAG_USERLOG + "," + androidId + "\n"); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureSecureSettingAndroidIdSetLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
ensureSecureSettingAndroidIdSetLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public final void removeProvider(PackageParser.Provider p) { mProviders.remove(p.getComponentName()); if (DEBUG_SHOW_INFO) { Log.v(TAG, " " + (p.info.nonLocalizedLabel != null ? p.info.nonLocalizedLabel : p.info.name) + ":"); Log.v(TAG, " Class=" + p.info.name); } final int NI = p.intents.size(); int j; for (j = 0; j < NI; j++) { PackageParser.ProviderIntentInfo intent = p.intents.get(j); if (DEBUG_SHOW_INFO) { Log.v(TAG, " IntentFilter:"); intent.dump(new LogPrinter(Log.VERBOSE, TAG), " "); } removeFilter(intent); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeProvider File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
removeProvider
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public void onUidProcAdjChanged(int uid) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUidProcAdjChanged File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
onUidProcAdjChanged
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = "/repository/restful/artifact/GET/json", method = RequestMethod.GET) public ModelAndView getArtifactAsJson(@RequestParam("pipelineName") String pipelineName, @RequestParam("pipelineCounter") String pipelineCounter, @RequestParam("stageName") String stageName, @RequestParam(value = "stageCounter", required = false) String stageCounter, @RequestParam("buildName") String buildName, @RequestParam("filePath") String filePath, @RequestParam(value = "sha1", required = false) String sha ) throws Exception { return getArtifact(filePath, jsonViewFactory, pipelineName, pipelineCounter, stageName, stageCounter, buildName, sha, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getArtifactAsJson File: server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java Repository: gocd The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-43289
MEDIUM
5
gocd
getArtifactAsJson
server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java
4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595
0
Analyze the following code function for security vulnerabilities
public int getMaxResponseSize() { return getIntProperty(TS_MAX_RESPONSE_SIZE, 6553500); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxResponseSize File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getMaxResponseSize
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
private static String getCorrelationId(HttpServletRequest request) { String correlationId = filterCorrelationIdCharacters(request.getHeader(CORRELATION_ID_HEADER)); if (StringUtils.isEmpty(correlationId)) { correlationId = UUID.randomUUID().toString(); } return correlationId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCorrelationId File: frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java Repository: oVirt/ovirt-engine The code follows secure coding practices.
[ "CWE-287" ]
CVE-2024-0822
HIGH
7.5
oVirt/ovirt-engine
getCorrelationId
frontend/webadmin/modules/frontend/src/main/java/org/ovirt/engine/ui/frontend/server/gwt/GenericApiGWTServiceImpl.java
036f617316f6d7077cd213eb613eb4816e33d1fc
0
Analyze the following code function for security vulnerabilities
public final Date getExpirationDate() { return new Date(expirationDate); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExpirationDate File: src/net/sourceforge/plantuml/version/LicenseInfo.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getExpirationDate
src/net/sourceforge/plantuml/version/LicenseInfo.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public void badRequest(final BadRequestException exception) { logWarn("Bad Request on " + request().getUri() + ": " + exception.getMessage()); if (this.api_version > 0) { // always default to the latest version of the error formatter since we // need to return something switch (this.api_version) { case 1: default: sendReply(exception.getStatus(), serializer.formatErrorV1(exception)); } return; } if (hasQueryStringParam("json")) { final StringBuilder buf = new StringBuilder(10 + exception.getDetails().length()); buf.append("{\"err\":\""); HttpQuery.escapeJson(exception.getMessage(), buf); buf.append("\"}"); sendReply(HttpResponseStatus.BAD_REQUEST, buf); } else { sendReply(HttpResponseStatus.BAD_REQUEST, makePage("Bad Request", "Looks like it's your fault this time", "<blockquote>" + "<h1>Bad Request</h1>" + "Sorry but your request was rejected as being" + " invalid.<br/><br/>" + "The reason provided was:<blockquote>" + exception.getMessage() + "</blockquote></blockquote>")); } }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-25827 - Severity: MEDIUM - CVSS Score: 6.1 Description: Fix for #2269 and #2267 XSS vulnerability. Escaping the user supplied input when outputing the HTML for the old BadRequest HTML handlers should help. Thanks to the reporters. Fixes CVE-2018-13003. Function: badRequest File: src/tsd/HttpQuery.java Repository: OpenTSDB/opentsdb Fixed Code: @Override public void badRequest(final BadRequestException exception) { logWarn("Bad Request on " + request().getUri() + ": " + exception.getMessage()); if (this.api_version > 0) { // always default to the latest version of the error formatter since we // need to return something switch (this.api_version) { case 1: default: sendReply(exception.getStatus(), serializer.formatErrorV1(exception)); } return; } if (hasQueryStringParam("json")) { final StringBuilder buf = new StringBuilder(10 + exception.getDetails().length()); buf.append("{\"err\":\""); HttpQuery.escapeJson(exception.getMessage(), buf); buf.append("\"}"); sendReply(HttpResponseStatus.BAD_REQUEST, buf); } else { String response = ""; if (exception.getMessage() != null) { response = HtmlEscapers.htmlEscaper().escape(exception.getMessage()); } sendReply(HttpResponseStatus.BAD_REQUEST, makePage("Bad Request", "Looks like it's your fault this time", "<blockquote>" + "<h1>Bad Request</h1>" + "Sorry but your request was rejected as being" + " invalid.<br/><br/>" + "The reason provided was:<blockquote>" + response + "</blockquote></blockquote>")); } }
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
badRequest
src/tsd/HttpQuery.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
1
Analyze the following code function for security vulnerabilities
private void handleTimeUpdate() { if (DEBUG) Log.d(TAG, "handleTimeUpdate"); for (int i = 0; i < mCallbacks.size(); i++) { KeyguardUpdateMonitorCallback cb = mCallbacks.get(i).get(); if (cb != null) { cb.onTimeChanged(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleTimeUpdate File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
handleTimeUpdate
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public ServerHttpResponse setStatusCode(int code) { if (!response.headWritten()) { response.setStatusCode(code); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatusCode File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
setStatusCode
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition use(final String verb, final String path, final Route.Filter filter) { return appendDefinition(verb, path, filter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: use File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
use
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void addBehavior(String behaviorId, String behaviorClass) { notNull("behaviorId", behaviorId); notNull("behaviorClass", behaviorClass); if (LOGGER.isLoggable(FINE) && behaviorMap.containsKey(behaviorId)) { LOGGER.log(FINE, "behaviorId {0} has already been registered. Replacing existing behavior class type {1} with {2}.", new Object[] { behaviorId, behaviorMap.get(behaviorId), behaviorClass }); } behaviorMap.put(behaviorId, behaviorClass); if (LOGGER.isLoggable(FINE)) { LOGGER.fine(MessageFormat.format("added behavior of type ''{0}'' class ''{1}''", behaviorId, behaviorClass)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addBehavior File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
addBehavior
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
@Override public DOMImplementation getImplementation() { return doc.getImplementation(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImplementation File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
getImplementation
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
private void processSelection(HttpServletRequest request, JobDomainPeasSessionController jobDomainSC) { String selectedIds = request.getParameter("Pagination_SelectedIds"); String notSelectedIds = request.getParameter("Pagination_NotSelectedIds"); List<String> memSelected = jobDomainSC.getListSelectedUsers(); StringTokenizer st = new StringTokenizer(selectedIds, ","); while (st.hasMoreTokens()) { String id = st.nextToken(); memSelected.add(id); } st = new StringTokenizer(notSelectedIds, ","); while (st.hasMoreTokens()) { String id = st.nextToken(); memSelected.remove(id); } jobDomainSC.setListSelectedUsers(memSelected); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processSelection File: core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
processSelection
core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public String getCipherName() { return "ChaChaPoly"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCipherName File: src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java Repository: rweather/noise-java The code follows secure coding practices.
[ "CWE-125", "CWE-787" ]
CVE-2020-25021
HIGH
7.5
rweather/noise-java
getCipherName
src/main/java/com/southernstorm/noise/protocol/ChaChaPolyCipherState.java
18e86b6f8bea7326934109aa9ffa705ebf4bde90
0
Analyze the following code function for security vulnerabilities
public int engineGetOutputSize(int inputLen) { int len1, len2, len3; if (key == null) { throw new IllegalStateException("cipher not initialised"); } len1 = engine.getMac().getMacSize(); if (otherKeyParameter == null) { len2 = 1 + 2 * (((DHKeyParameters)key).getParameters().getP().bitLength() + 7) / 8; } else { len2 = 0; } if (engine.getCipher() == null) { len3 = inputLen; } else if (state == Cipher.ENCRYPT_MODE || state == Cipher.WRAP_MODE) { len3 = engine.getCipher().getOutputSize(inputLen); } else if (state == Cipher.DECRYPT_MODE || state == Cipher.UNWRAP_MODE) { len3 = engine.getCipher().getOutputSize(inputLen - len1 - len2); } else { throw new IllegalStateException("cipher not initialised"); } if (state == Cipher.ENCRYPT_MODE || state == Cipher.WRAP_MODE) { return buffer.size() + len1 + len2 + len3; } else if (state == Cipher.DECRYPT_MODE || state == Cipher.UNWRAP_MODE) { return buffer.size() - len1 - len2 + len3; } else { throw new IllegalStateException("IESCipher not initialised"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineGetOutputSize File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/IESCipher.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-361" ]
CVE-2016-1000345
MEDIUM
4.3
bcgit/bc-java
engineGetOutputSize
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/IESCipher.java
21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35
0
Analyze the following code function for security vulnerabilities
@Override public Route.Collection put(final String path1, final String path2, final Route.Filter filter) { return new Route.Collection( new Route.Definition[]{put(path1, filter), put(path2, filter)}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
put
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void registerCancelListenerLocked(IResultReceiver receiver) { if (mCancelCallbacks == null) { mCancelCallbacks = new RemoteCallbackList<>(); } mCancelCallbacks.register(receiver); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerCancelListenerLocked File: services/core/java/com/android/server/am/PendingIntentRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
registerCancelListenerLocked
services/core/java/com/android/server/am/PendingIntentRecord.java
8418e3a017428683d173c0c82b0eb02d5b923a4e
0
Analyze the following code function for security vulnerabilities
@Override public List<Service> getAllBrowserServices(long startTimestamp, long endTimestamp) throws IOException { StringBuilder sql = new StringBuilder(); List<Object> condition = new ArrayList<>(5); sql.append("select * from ").append(ServiceTraffic.INDEX_NAME).append(" where "); sql.append(ServiceTraffic.NODE_TYPE).append("=?"); condition.add(NodeType.Browser.value()); sql.append(" limit ").append(metadataQueryMaxSize); try (Connection connection = h2Client.getConnection()) { try (ResultSet resultSet = h2Client.executeQuery( connection, sql.toString(), condition.toArray(new Object[0]))) { return buildServices(resultSet); } } catch (SQLException e) { throw new IOException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllBrowserServices File: oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2MetadataQueryDAO.java Repository: apache/skywalking The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-13921
HIGH
7.5
apache/skywalking
getAllBrowserServices
oap-server/server-storage-plugin/storage-jdbc-hikaricp-plugin/src/main/java/org/apache/skywalking/oap/server/storage/plugin/jdbc/h2/dao/H2MetadataQueryDAO.java
ddb6d9a5019a9c1fe31c364485a4e4b5066fefc3
0
Analyze the following code function for security vulnerabilities
@Override public void onSendSmsComplete(int result, int messageRef) { Rlog.e(TAG, "Unexpected onSendSmsComplete call with result: " + result); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSendSmsComplete File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
onSendSmsComplete
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
@Override void setWaitingForDrawnIfResizingChanged() { if (isDragResizeChanged()) { mWmService.mRoot.mWaitingForDrawn.add(this); } super.setWaitingForDrawnIfResizingChanged(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWaitingForDrawnIfResizingChanged File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
setWaitingForDrawnIfResizingChanged
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public void removeAppToken(IBinder token) { if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, "removeAppToken()")) { throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); } AppWindowToken wtoken = null; AppWindowToken startingToken = null; boolean delayed = false; final long origId = Binder.clearCallingIdentity(); synchronized(mWindowMap) { WindowToken basewtoken = mTokenMap.remove(token); if (basewtoken != null && (wtoken=basewtoken.appWindowToken) != null) { if (DEBUG_APP_TRANSITIONS) Slog.v(TAG, "Removing app token: " + wtoken); delayed = setTokenVisibilityLocked(wtoken, null, false, AppTransition.TRANSIT_UNSET, true, wtoken.voiceInteraction); wtoken.inPendingTransaction = false; mOpeningApps.remove(wtoken); wtoken.waitingToShow = false; if (mClosingApps.contains(wtoken)) { delayed = true; } else if (mAppTransition.isTransitionSet()) { mClosingApps.add(wtoken); delayed = true; } if (DEBUG_APP_TRANSITIONS) Slog.v( TAG, "Removing app " + wtoken + " delayed=" + delayed + " animation=" + wtoken.mAppAnimator.animation + " animating=" + wtoken.mAppAnimator.animating); if (DEBUG_ADD_REMOVE || DEBUG_TOKEN_MOVEMENT) Slog.v(TAG, "removeAppToken: " + wtoken + " delayed=" + delayed + " Callers=" + Debug.getCallers(4)); final TaskStack stack = wtoken.mTask.mStack; if (delayed && !wtoken.allAppWindows.isEmpty()) { // set the token aside because it has an active animation to be finished if (DEBUG_ADD_REMOVE || DEBUG_TOKEN_MOVEMENT) Slog.v(TAG, "removeAppToken make exiting: " + wtoken); stack.mExitingAppTokens.add(wtoken); wtoken.mIsExiting = true; } else { // Make sure there is no animation running on this token, // so any windows associated with it will be removed as // soon as their animations are complete wtoken.mAppAnimator.clearAnimation(); wtoken.mAppAnimator.animating = false; wtoken.removeAppFromTaskLocked(); } wtoken.removed = true; if (wtoken.startingData != null) { startingToken = wtoken; } unsetAppFreezingScreenLocked(wtoken, true, true); if (mFocusedApp == wtoken) { if (DEBUG_FOCUS_LIGHT) Slog.v(TAG, "Removing focused app token:" + wtoken); mFocusedApp = null; updateFocusedWindowLocked(UPDATE_FOCUS_NORMAL, true /*updateInputWindows*/); mInputMonitor.setFocusedAppLw(null); } } else { Slog.w(TAG, "Attempted to remove non-existing app token: " + token); } if (!delayed && wtoken != null) { wtoken.updateReportedVisibilityLocked(); } // Will only remove if startingToken non null. scheduleRemoveStartingWindowLocked(startingToken); } Binder.restoreCallingIdentity(origId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeAppToken File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
removeAppToken
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
protected void _reportUnwrappedCreatorProperty(DeserializationContext ctxt, BeanDescription beanDesc, AnnotatedParameter param) throws JsonMappingException { ctxt.reportBadDefinition(beanDesc.getType(), String.format( "Cannot define Creator parameter %d as `@JsonUnwrapped`: combination not yet supported", param.getIndex())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _reportUnwrappedCreatorProperty File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_reportUnwrappedCreatorProperty
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public SingleButtonPanel appendNewAjaxActionButton(final AjaxCallback ajaxCallback, final String label, final String... classnames) { final SingleButtonPanel result = addNewAjaxActionButton(ajaxCallback, label, classnames); this.actionButtons.add(result); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendNewAjaxActionButton File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
appendNewAjaxActionButton
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
@Override public String getMaterialNameForEnvironmentVariable() { if (!CaseInsensitiveString.isBlank(this.name)) { return escapeEnvironmentVariable(this.name.toUpper()); } return escapeEnvironmentVariable(folder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaterialNameForEnvironmentVariable File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
getMaterialNameForEnvironmentVariable
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
@Override public String getLayout(Map<String, Object> data) { if ("true".equals(getPropertyString("horizontal_menu"))) { data.put("body_classes", data.get("body_classes").toString() + " horizontal_menu"); } else if ("horizontal_inline".equals(getPropertyString("horizontal_menu"))){ data.put("body_classes", data.get("body_classes").toString() + " horizontal_menu inline_menu"); } else if ("no".equals(getPropertyString("horizontal_menu"))) { data.put("body_classes", data.get("body_classes").toString() + " horizontal_menu no_menu"); } if (showHomeBanner()) { data.put("body_classes", data.get("body_classes").toString() + " has_home_banner"); } data.put("body_inner_before", "<div class=\"page-loader\"><div class=\"preloader pl-xl\" style=\"width:80px\"><svg class=\"pl-circular\" viewBox=\"25 25 50 50\"><circle class=\"plc-path\" cx=\"50\" cy=\"50\" r=\"20\" /></svg></div></div>"); return UserviewUtil.getTemplate(this, data, "/templates/userview/layout.ftl"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLayout File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
getLayout
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
void dumpDisplayContentsLocked(PrintWriter pw, boolean dumpAll) { pw.println("WINDOW MANAGER DISPLAY CONTENTS (dumpsys window displays)"); if (mDisplayReady) { final int numDisplays = mDisplayContents.size(); for (int displayNdx = 0; displayNdx < numDisplays; ++displayNdx) { final DisplayContent displayContent = mDisplayContents.valueAt(displayNdx); displayContent.dump(" ", pw); } } else { pw.println(" NO DISPLAY"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpDisplayContentsLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dumpDisplayContentsLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public void showInterstitialPage( String url, InterstitialPageDelegateAndroid delegate) { if (mNativeContentViewCore == 0) return; nativeShowInterstitialPage(mNativeContentViewCore, url, delegate.getNative()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showInterstitialPage File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
showInterstitialPage
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void setFeature(String name, boolean state) throws XmlPullParserException { if (FEATURE_PROCESS_NAMESPACES.equals(name) && state) { return; } if (FEATURE_REPORT_NAMESPACE_ATTRIBUTES.equals(name) && state) { return; } throw new XmlPullParserException("Unsupported feature: " + name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFeature File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
setFeature
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public Object unmarshal(HierarchicalStreamReader reader, Object root) { return unmarshal(reader, root, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unmarshal File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
unmarshal
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
public String selectHeaderContentType(String[] contentTypes) { if (contentTypes.length == 0) { return "application/json"; } for (String contentType : contentTypes) { if (isJsonMime(contentType)) { return contentType; } } return contentTypes[0]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectHeaderContentType File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
selectHeaderContentType
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public static int ensureButtonFillContrast(int color, int bg) { return isColorDark(bg) ? ContrastColorUtil.findContrastColorAgainstDark(color, bg, true, 1.3) : ContrastColorUtil.findContrastColor(color, bg, true, 1.3); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureButtonFillContrast File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
ensureButtonFillContrast
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public static DumpFilter parseFromArguments(String[] args) { final DumpFilter filter = new DumpFilter(); for (int ai = 0; ai < args.length; ai++) { final String a = args[ai]; if ("--noredact".equals(a) || "--reveal".equals(a)) { filter.redact = false; } else if ("p".equals(a) || "pkg".equals(a) || "--package".equals(a)) { if (ai < args.length-1) { ai++; filter.pkgFilter = args[ai].trim().toLowerCase(); if (filter.pkgFilter.isEmpty()) { filter.pkgFilter = null; } else { filter.filtered = true; } } } else if ("--zen".equals(a) || "zen".equals(a)) { filter.filtered = true; filter.zen = true; } else if ("--stats".equals(a)) { filter.stats = true; if (ai < args.length-1) { ai++; filter.since = Long.valueOf(args[ai]); } else { filter.since = 0; } } } return filter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseFromArguments File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
parseFromArguments
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private List<JsonArray> list1JsonArray() { return Collections.singletonList(new JsonArray()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: list1JsonArray File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
list1JsonArray
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public void removeSubmitters(Context context, Collection collection) throws SQLException, AuthorizeException { // Check authorisation - Must be an Admin to delete Submitters Group AuthorizeUtil.authorizeManageSubmittersGroup(context, collection); // just return if there is no administrative group. if (collection.getSubmitters() == null) { return; } // Remove the link to the collection table. collection.setSubmitters(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeSubmitters File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
removeSubmitters
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
@CLIMethod(name="disable-job") @RequirePOST public HttpResponse doDisable() throws IOException, ServletException { checkPermission(CONFIGURE); makeDisabled(true); return new HttpRedirect("."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doDisable File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
doDisable
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public static byte[] compress(long[] input) throws IOException { return rawCompress(input, input.length * 8); // long uses 8 bytes }
Vulnerability Classification: - CWE: CWE-190 - CVE: CVE-2023-34454 - Severity: HIGH - CVSS Score: 7.5 Description: Merge pull request from GHSA-fjpj-2g6w-x25r * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * improved error messages by adding new error enum INPUT_TOO_LARGE in SnappyErrorCode.java, and added happy and sad cases in SnappyTest.java * fixed mispelling: validArrayInputLength --> isInvalidArrayInputLength * switched SnappyError into ILLEGAL_ARGUMENT in SnappyErrorCode.java and Snappy.java and fixed a typo in error comment * Fix buffer size boundary tests * Remove negative array size tests * updated comments for unit test --------- Co-authored-by: Taro L. Saito <leo@xerial.org> Function: compress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java Fixed Code: public static byte[] compress(long[] input) throws IOException { int byteSize = input.length * 8; if (byteSize < input.length) { throw new SnappyError(SnappyErrorCode.TOO_LARGE_INPUT, "input array size is too large: " + input.length); } return rawCompress(input, byteSize); // long uses 8 bytes }
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
compress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
1
Analyze the following code function for security vulnerabilities
public Boolean getDarkmodeEnabled() { return darkmodeEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDarkmodeEnabled File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getDarkmodeEnabled
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public String getLogDetails(List<String> ids) { if (CollectionUtils.isNotEmpty(ids)) { ApiScenarioExample example = new ApiScenarioExample(); example.createCriteria().andIdIn(ids); List<ApiScenario> definitions = apiScenarioMapper.selectByExample(example); List<String> names = definitions.stream().map(ApiScenario::getName).collect(Collectors.toList()); OperatingLogDetails details = new OperatingLogDetails(JSON.toJSONString(ids), definitions.get(0).getProjectId(), String.join(",", names), definitions.get(0).getCreateUser(), new LinkedList<>()); return JSON.toJSONString(details); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogDetails File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getLogDetails
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public boolean isSecure() { return isSecure(KeyguardUpdateMonitor.getCurrentUser()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecure File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
isSecure
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@Override public boolean setAlwaysOnVpnPackage(ComponentName who, String vpnPackage, boolean lockdown, List<String> lockdownAllowlist) throws SecurityException { Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwner(caller)); checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_ALWAYS_ON_VPN_PACKAGE); if (vpnPackage == null) { final String prevVpnPackage; synchronized (getLockObject()) { prevVpnPackage = getProfileOwnerOrDeviceOwnerLocked( caller.getUserId()).mAlwaysOnVpnPackage; // If the admin is clearing VPN package but hasn't configure any VPN previously, // ignore it so that it doesn't interfere with user-configured VPNs. if (TextUtils.isEmpty(prevVpnPackage)) { return true; } } revokeVpnAuthorizationForPackage(prevVpnPackage, caller.getUserId()); } final int userId = caller.getUserId(); mInjector.binderWithCleanCallingIdentity(() -> { if (vpnPackage != null && !isPackageInstalledForUser(vpnPackage, userId)) { Slogf.w(LOG_TAG, "Non-existent VPN package specified: " + vpnPackage); throw new ServiceSpecificException( DevicePolicyManager.ERROR_VPN_PACKAGE_NOT_FOUND, vpnPackage); } if (vpnPackage != null && lockdown && lockdownAllowlist != null) { for (String packageName : lockdownAllowlist) { if (!isPackageInstalledForUser(packageName, userId)) { Slogf.w(LOG_TAG, "Non-existent package in VPN allowlist: " + packageName); throw new ServiceSpecificException( DevicePolicyManager.ERROR_VPN_PACKAGE_NOT_FOUND, packageName); } } } // If some package is uninstalled after the check above, it will be ignored by CM. if (!mInjector.getVpnManager().setAlwaysOnVpnPackageForUser( userId, vpnPackage, lockdown, lockdownAllowlist)) { throw new UnsupportedOperationException(); } }); DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_ALWAYS_ON_VPN_PACKAGE) .setAdmin(caller.getComponentName()) .setStrings(vpnPackage) .setBoolean(lockdown) .setInt(lockdownAllowlist != null ? lockdownAllowlist.size() : 0) .write(); synchronized (getLockObject()) { ActiveAdmin admin = getProfileOwnerOrDeviceOwnerLocked(caller.getUserId()); if (!TextUtils.equals(vpnPackage, admin.mAlwaysOnVpnPackage) || lockdown != admin.mAlwaysOnVpnLockdown) { admin.mAlwaysOnVpnPackage = vpnPackage; admin.mAlwaysOnVpnLockdown = lockdown; saveSettingsLocked(userId); } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAlwaysOnVpnPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setAlwaysOnVpnPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void sendMessage(String iface, Message message) { SparseArray<Set<Handler>> ifaceHandlers = mHandlerMap.get(iface); if (iface != null && ifaceHandlers != null) { if (isMonitoring(iface)) { Set<Handler> ifaceWhatHandlers = ifaceHandlers.get(message.what); if (ifaceWhatHandlers != null) { for (Handler handler : ifaceWhatHandlers) { if (handler != null) { sendMessage(iface, handler, Message.obtain(message)); } } } } else { if (mVerboseLoggingEnabled) { Log.d(TAG, "Dropping event because (" + iface + ") is stopped"); } } } else { if (mVerboseLoggingEnabled) { Log.d(TAG, "Sending to all monitors because there's no matching iface"); } for (Map.Entry<String, SparseArray<Set<Handler>>> entry : mHandlerMap.entrySet()) { iface = entry.getKey(); if (isMonitoring(iface)) { Set<Handler> ifaceWhatHandlers = entry.getValue().get(message.what); if (ifaceWhatHandlers == null) continue; for (Handler handler : ifaceWhatHandlers) { if (handler != null) { sendMessage(iface, handler, Message.obtain(message)); } } } } } message.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendMessage File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
sendMessage
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_PACKAGE_STATE, conditional = true) @NonNull public String[] setPackagesSuspended(@Nullable ComponentName admin, @NonNull String[] packageNames, boolean suspended) { throwIfParentInstance("setPackagesSuspended"); if (mService != null) { try { return mService.setPackagesSuspended(admin, mContext.getPackageName(), packageNames, suspended); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } } return packageNames; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackagesSuspended File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setPackagesSuspended
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int start() { IFingerprintDaemon daemon = getFingerprintDaemon(); if (daemon == null) { Slog.w(TAG, "start authentication: no fingeprintd!"); return ERROR_ESRCH; } try { final int result = daemon.authenticate(mOpId, getGroupId()); if (result != 0) { Slog.w(TAG, "startAuthentication failed, result=" + result); onError(FingerprintManager.FINGERPRINT_ERROR_HW_UNAVAILABLE); return result; } if (DEBUG) Slog.w(TAG, "client " + getOwnerString() + " is authenticating..."); } catch (RemoteException e) { Slog.e(TAG, "startAuthentication failed", e); return ERROR_ESRCH; } return 0; // success }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: start File: services/core/java/com/android/server/fingerprint/AuthenticationClient.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
start
services/core/java/com/android/server/fingerprint/AuthenticationClient.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public void setJMSExpiration(long expiration) throws JMSException { this.setLongProperty(JMS_MESSAGE_EXPIRATION, expiration); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setJMSExpiration File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
setJMSExpiration
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
public void updateArray(@Positive int columnIndex, @Nullable Array x) throws SQLException { updateObject(columnIndex, x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateArray File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateArray
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
protected void redirectToChangeRequest(ChangeRequest changeRequest) throws IOException { this.redirectToChangeRequest(changeRequest, "view"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: redirectToChangeRequest File: application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java Repository: xwiki-contrib/application-changerequest The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-49280
MEDIUM
6.5
xwiki-contrib/application-changerequest
redirectToChangeRequest
application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java
ff0f5368ea04f0e4aa7b33821c707dc68a8c5ca8
0
Analyze the following code function for security vulnerabilities
@NonNull @Override public ArrayList<PermissionInfo> getAllPermissionsWithProtectionFlags( @PermissionInfo.ProtectionFlags int protectionFlags) { return mPermissionManagerServiceImpl .getAllPermissionsWithProtectionFlags(protectionFlags); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllPermissionsWithProtectionFlags File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getAllPermissionsWithProtectionFlags
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public void findAll(@NonNull List<ShortcutInfo> result, @Nullable Predicate<ShortcutInfo> filter, int cloneFlag, @Nullable String callingLauncher, int launcherUserId, boolean getPinnedByAnyLauncher) { if (getPackageInfo().isShadow()) { // Restored and the app not installed yet, so don't return any. return; } final ShortcutService s = mShortcutUser.mService; // Set of pinned shortcuts by the calling launcher. final ArraySet<String> pinnedByCallerSet = (callingLauncher == null) ? null : s.getLauncherShortcutsLocked(callingLauncher, getPackageUserId(), launcherUserId) .getPinnedShortcutIds(getPackageName(), getPackageUserId()); forEachShortcut(si -> filter(result, filter, cloneFlag, callingLauncher, pinnedByCallerSet, getPinnedByAnyLauncher, si)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAll File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
findAll
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
public Object update(Task queryVO) { taskMapper.updateByPrimaryKey(queryVO); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
update
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
private Document parseAppStrings(ResContainer appStrings) { String content = appStrings.getText().getCodeStr(); return parseXml(content); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseAppStrings File: jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java Repository: skylot/jadx The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-0219
MEDIUM
4.3
skylot/jadx
parseAppStrings
jadx-core/src/main/java/jadx/core/export/ExportGradleProject.java
d22db30166e7cb369d72be41382bb63ac8b81c52
0
Analyze the following code function for security vulnerabilities
public GetMethod executeGet(Object resourceUri, Map<String, Object[]> queryParams, Object... elements) throws Exception { // Build URI String uri = createUri(resourceUri, queryParams, elements).toString(); return this.testUtils.executeGet(uri); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeGet File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
executeGet
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@RequestMapping("click") @ResponseBody public int click(@RequestAttribute SysSite site, Long id, HttpServletRequest request) { CmsContentStatistics contentStatistics = statisticsComponent.contentClicks(site, id); if (null != contentStatistics && site.getId().equals(contentStatistics.getSiteId())) { return contentStatistics.getClicks() + contentStatistics.getClicks(); } return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: click File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/web/cms/ContentController.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
click
publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/web/cms/ContentController.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
protected List<AnnotationValue<CachePut>> putOperations(MethodInvocationContext context) { return context.getAnnotationValuesByType(CachePut.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: putOperations File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
putOperations
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Column(name = "account_type", nullable = false, length = 20) public String getAccountType() { return this.accountType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountType File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getAccountType
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
public static String makeHiddenTags(final HttpServletRequest request, final Map<String,Object> additions, final String[] ignores) { return (makeHiddenTags(request, additions, ignores, IgnoreType.BOTH)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeHiddenTags File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-0869
MEDIUM
6.1
OpenNMS/opennms
makeHiddenTags
opennms-web-api/src/main/java/org/opennms/web/api/Util.java
66b4ba96a18b9952f25a350bbccc2a7e206238d1
0
Analyze the following code function for security vulnerabilities
@Override public boolean disableNdefPush() throws RemoteException { NfcPermissions.enforceAdminPermissions(mContext); synchronized (NfcService.this) { if (!mIsNdefPushEnabled) { return true; } Log.i(TAG, "disabling NDEF Push"); mPrefsEditor.putBoolean(PREF_NDEF_PUSH_ON, false); mPrefsEditor.apply(); mIsNdefPushEnabled = false; setBeamShareActivityState(false); if (isNfcEnabled()) { mP2pLinkManager.enableDisable(false, true); } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableNdefPush File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
disableNdefPush
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Override public Boolean batchUpdateSellStatus(Long[] ids, int sellStatus) { return goodsMapper.batchUpdateSellStatus(ids, sellStatus) > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: batchUpdateSellStatus File: src/main/java/ltd/newbee/mall/service/impl/NewBeeMallGoodsServiceImpl.java Repository: newbee-ltd/newbee-mall The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-27476
MEDIUM
4.3
newbee-ltd/newbee-mall
batchUpdateSellStatus
src/main/java/ltd/newbee/mall/service/impl/NewBeeMallGoodsServiceImpl.java
0d1ff1b9f4aedc0ccdac5d22014a351554dfb81e
0
Analyze the following code function for security vulnerabilities
@Deprecated @InlineMe( replacement = "Files.asCharSource(file, charset).readLines(callback)", imports = "com.google.common.io.Files") @CanIgnoreReturnValue // some processors won't return a useful result @ParametricNullness public static <T extends @Nullable Object> T readLines( File file, Charset charset, LineProcessor<T> callback) throws IOException { return asCharSource(file, charset).readLines(callback); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readLines File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
readLines
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
private void setOnAnimationFinishedListener(final Handler handler, final OnAnimationFinishedListener listener) { if (listener != null) { mAnimationFinishedListener = new IRemoteCallback.Stub() { @Override public void sendResult(Bundle data) throws RemoteException { final long elapsedRealtime = SystemClock.elapsedRealtime(); handler.post(new Runnable() { @Override public void run() { listener.onAnimationFinished(elapsedRealtime); } }); } }; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOnAnimationFinishedListener File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setOnAnimationFinishedListener
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
protected void hideToast() { if (mToast != null) { mToast.cancel(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hideToast File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
hideToast
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public void setParamCloseLink(String value) { // ensure decoded chars are re-encoded again properly m_paramCloseLink = value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setParamCloseLink File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
setParamCloseLink
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void run() { boolean needUpdate = (mOptimisticVolume != mCurrentVolume); mOptimisticVolume = -1; if (needUpdate) { pushVolumeUpdate(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
run
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
private static void parseSettings(final XmlPullParser parser, final HostAuth hostAuth) throws XmlPullParserException, IOException { while (true) { final int type = parser.next(); if (type == XmlPullParser.END_TAG && parser.getName().equals(ELEMENT_NAME_SETTINGS)) { break; } else if (type == XmlPullParser.START_TAG) { final String name = parser.getName(); if (name.equals(ELEMENT_NAME_SERVER)) { parseServer(parser, hostAuth); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseSettings File: src/com/android/exchange/eas/EasAutoDiscover.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2415
HIGH
7.1
android
parseSettings
src/com/android/exchange/eas/EasAutoDiscover.java
0d1a38b1755efe7ed4e8d7302a24186616bba9b2
0
Analyze the following code function for security vulnerabilities
private static void parseResponse(final XmlPullParser parser, final HostAuth hostAuth) throws XmlPullParserException, IOException { while (true) { final int type = parser.next(); if (type == XmlPullParser.END_TAG && parser.getName().equals(ELEMENT_NAME_RESPONSE)) { break; } else if (type == XmlPullParser.START_TAG) { final String name = parser.getName(); if (name.equals(ELEMENT_NAME_USER)) { parseUser(parser, hostAuth); } else if (name.equals(ELEMENT_NAME_ACTION)) { parseAction(parser, hostAuth); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseResponse File: src/com/android/exchange/eas/EasAutoDiscover.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2415
HIGH
7.1
android
parseResponse
src/com/android/exchange/eas/EasAutoDiscover.java
0d1a38b1755efe7ed4e8d7302a24186616bba9b2
0