instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public void setDetailsGenerator(DetailsGenerator detailsGenerator) throws IllegalArgumentException { detailComponentManager.setDetailsGenerator(detailsGenerator); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDetailsGenerator File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setDetailsGenerator
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public void setConfigFile(String configFile) { this.configFile = configFile; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConfigFile File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
setConfigFile
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
private void handleSetOccluded(boolean isOccluded, boolean animate) { Trace.beginSection("KeyguardViewMediator#handleSetOccluded"); synchronized (KeyguardViewMediator.this) { if (mHiding && isOccluded) { // We're in the process of going away but WindowManager wants to show a // SHOW_WHEN_LOCKED activity instead. // TODO(bc-unlock): Migrate to remote animation. startKeyguardExitAnimation(0, 0); } if (mOccluded != isOccluded) { mOccluded = isOccluded; mUpdateMonitor.setKeyguardOccluded(isOccluded); mKeyguardViewControllerLazy.get().setOccluded(isOccluded, animate && mDeviceInteractive); adjustStatusBarLocked(); } } Trace.endSection(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSetOccluded File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
handleSetOccluded
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@TestApi public @NonNull String[] getApkPaths() { synchronized (this) { if (mOpen) { String[] paths = new String[mApkAssets.length]; final int count = mApkAssets.length; for (int i = 0; i < count; i++) { paths[i] = mApkAssets[i].getAssetPath(); } return paths; } } return new String[0]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApkPaths File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getApkPaths
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
private boolean isNumber(String str) { return str.matches("-?\\d+(\\.\\d+)?"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNumber File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
isNumber
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
@Override public Intent getIntent() { KeyguardUpdateMonitor updateMonitor = KeyguardUpdateMonitor.getInstance(mContext); boolean canSkipBouncer = updateMonitor.getUserCanSkipBouncer( KeyguardUpdateMonitor.getCurrentUser()); boolean secure = mLockPatternUtils.isSecure(KeyguardUpdateMonitor.getCurrentUser()); return (secure && !canSkipBouncer) ? SECURE_CAMERA_INTENT : INSECURE_CAMERA_INTENT; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntent File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getIntent
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private int runSetInstallLocation() { int loc; String arg = nextArg(); if (arg == null) { System.err.println("Error: no install location specified."); return 1; } try { loc = Integer.parseInt(arg); } catch (NumberFormatException e) { System.err.println("Error: install location has to be a number."); return 1; } try { if (!mPm.setInstallLocation(loc)) { System.err.println("Error: install location has to be a number."); return 1; } return 0; } catch (RemoteException e) { System.err.println(e.toString()); System.err.println(PM_NOT_RUNNING_ERR); return 1; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runSetInstallLocation File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runSetInstallLocation
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
public boolean isRedirectEnabled() { return redirectEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRedirectEnabled File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
isRedirectEnabled
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public ViewAndroidDelegate getViewAndroidDelegate() { return new ViewAndroidDelegate() { @Override public View acquireAnchorView() { View anchorView = new View(getContext()); mContainerView.addView(anchorView); return anchorView; } @Override @SuppressWarnings("deprecation") // AbsoluteLayout public void setAnchorViewPosition( View view, float x, float y, float width, float height) { assert view.getParent() == mContainerView; float scale = (float) DeviceDisplayInfo.create(getContext()).getDIPScale(); // The anchor view should not go outside the bounds of the ContainerView. int leftMargin = Math.round(x * scale); int topMargin = Math.round(mRenderCoordinates.getContentOffsetYPix() + y * scale); int scaledWidth = Math.round(width * scale); // ContentViewCore currently only supports these two container view types. if (mContainerView instanceof FrameLayout) { if (scaledWidth + leftMargin > mContainerView.getWidth()) { scaledWidth = mContainerView.getWidth() - leftMargin; } FrameLayout.LayoutParams lp = new FrameLayout.LayoutParams( scaledWidth, Math.round(height * scale)); lp.leftMargin = leftMargin; lp.topMargin = topMargin; view.setLayoutParams(lp); } else if (mContainerView instanceof android.widget.AbsoluteLayout) { // This fixes the offset due to a difference in // scrolling model of WebView vs. Chrome. // TODO(sgurun) fix this to use mContainerView.getScroll[X/Y]() // as it naturally accounts for scroll differences between // these models. leftMargin += mRenderCoordinates.getScrollXPixInt(); topMargin += mRenderCoordinates.getScrollYPixInt(); android.widget.AbsoluteLayout.LayoutParams lp = new android.widget.AbsoluteLayout.LayoutParams( scaledWidth, (int) (height * scale), leftMargin, topMargin); view.setLayoutParams(lp); } else { Log.e(TAG, "Unknown layout " + mContainerView.getClass().getName()); } } @Override public void releaseAnchorView(View anchorView) { mContainerView.removeView(anchorView); } }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getViewAndroidDelegate File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getViewAndroidDelegate
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void animateCallControls(boolean show, long startDelay) { if (isVoiceOnlyCall) { if (spotlightView != null && spotlightView.getVisibility() != View.GONE) { spotlightView.setVisibility(View.GONE); } } else if (!isPTTActive) { float alpha; long duration; if (show) { callControlHandler.removeCallbacksAndMessages(null); callInfosHandler.removeCallbacksAndMessages(null); cameraSwitchHandler.removeCallbacksAndMessages(null); alpha = 1.0f; duration = 1000; if (binding.callControls.getVisibility() != View.VISIBLE) { binding.callControls.setAlpha(0.0f); binding.callControls.setVisibility(View.VISIBLE); binding.callInfosLinearLayout.setAlpha(0.0f); binding.callInfosLinearLayout.setVisibility(View.VISIBLE); binding.switchSelfVideoButton.setAlpha(0.0f); if (videoOn) { binding.switchSelfVideoButton.setVisibility(View.VISIBLE); } } else { callControlHandler.postDelayed(() -> animateCallControls(false, 0), 5000); return; } } else { alpha = 0.0f; duration = 1000; } binding.callControls.setEnabled(false); binding.callControls.animate() .translationY(0) .alpha(alpha) .setDuration(duration) .setStartDelay(startDelay) .setListener(new AnimatorListenerAdapter() { @Override public void onAnimationEnd(Animator animation) { super.onAnimationEnd(animation); if (!show) { binding.callControls.setVisibility(View.GONE); if (spotlightView != null && spotlightView.getVisibility() != View.GONE) { spotlightView.setVisibility(View.GONE); } } else { callControlHandler.postDelayed(new Runnable() { @Override public void run() { if (!isPTTActive) { animateCallControls(false, 0); } } }, 7500); } binding.callControls.setEnabled(true); } }); binding.callInfosLinearLayout.setEnabled(false); binding.callInfosLinearLayout.animate() .translationY(0) .alpha(alpha) .setDuration(duration) .setStartDelay(startDelay) .setListener(new AnimatorListenerAdapter() { @Override public void onAnimationEnd(Animator animation) { super.onAnimationEnd(animation); if (!show) { binding.callInfosLinearLayout.setVisibility(View.GONE); } else { callInfosHandler.postDelayed(new Runnable() { @Override public void run() { if (!isPTTActive) { animateCallControls(false, 0); } } }, 7500); } binding.callInfosLinearLayout.setEnabled(true); } }); binding.switchSelfVideoButton.setEnabled(false); binding.switchSelfVideoButton.animate() .translationY(0) .alpha(alpha) .setDuration(duration) .setStartDelay(startDelay) .setListener(new AnimatorListenerAdapter() { @Override public void onAnimationEnd(Animator animation) { super.onAnimationEnd(animation); if (!show) { binding.switchSelfVideoButton.setVisibility(View.GONE); } binding.switchSelfVideoButton.setEnabled(true); } }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: animateCallControls File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
animateCallControls
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
@Override protected void event(UserRequest ureq, Component source, Event event) { // no events to catch }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: event File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
event
src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
public boolean consume(HttpServletRequest httpRequest, HttpServletResponse httpResponse) throws IOException { if (consumeWithFileResourceHandlers(httpRequest, httpResponse)) { return true; } if (consumeWithJarResourceHandler(httpRequest, httpResponse)) { return true; } return false; }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2016-9177 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fix for #700 - Arbitrary File Read Vulnerability Function: consume File: src/main/java/spark/staticfiles/StaticFilesConfiguration.java Repository: perwendel/spark Fixed Code: public boolean consume(HttpServletRequest httpRequest, HttpServletResponse httpResponse) throws IOException { try { if (consumeWithFileResourceHandlers(httpRequest, httpResponse)) { return true; } if (consumeWithJarResourceHandler(httpRequest, httpResponse)) { return true; } } catch (DirectoryTraversal.DirectoryTraversalDetection directoryTraversalDetection) { LOG.warn("directoryTraversalDetection for path: " + httpRequest.getPathInfo()); } return false; }
[ "CWE-22" ]
CVE-2016-9177
MEDIUM
5
perwendel/spark
consume
src/main/java/spark/staticfiles/StaticFilesConfiguration.java
26b57d0596ee73c14c558463943ef0857e53b91f
1
Analyze the following code function for security vulnerabilities
public Date getDate() { return this.doc.getDate(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getDate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public void setApplicationRestrictions(ComponentName who, String callerPackage, String packageName, Bundle restrictions) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_APPLICATION_RESTRICTIONS); if (isUnicornFlagEnabled()) { EnforcingAdmin enforcingAdmin = enforcePermissionAndGetEnforcingAdmin( who, MANAGE_DEVICE_POLICY_APP_RESTRICTIONS, caller.getPackageName(), caller.getUserId() ); // This check is eventually made in UMS, checking here to fail early. String validationResult = FrameworkParsingPackageUtils.validateName(packageName, false, false); if (validationResult != null) { throw new IllegalArgumentException("Invalid package name: " + validationResult); } if (restrictions == null || restrictions.isEmpty()) { mDevicePolicyEngine.removeLocalPolicy( PolicyDefinition.APPLICATION_RESTRICTIONS(packageName), enforcingAdmin, caller.getUserId()); } else { mDevicePolicyEngine.setLocalPolicy( PolicyDefinition.APPLICATION_RESTRICTIONS(packageName), enforcingAdmin, new BundlePolicyValue(restrictions), caller.getUserId()); } setBackwardsCompatibleAppRestrictions( caller, packageName, restrictions, caller.getUserHandle()); } else { Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isProfileOwner(caller) || isDefaultDeviceOwner(caller))) || (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_APP_RESTRICTIONS))); mInjector.binderWithCleanCallingIdentity(() -> { mUserManager.setApplicationRestrictions(packageName, restrictions, caller.getUserHandle()); }); } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_APPLICATION_RESTRICTIONS) .setAdmin(caller.getPackageName()) .setBoolean(/* isDelegate */ isCallerDelegate(caller)) .setStrings(packageName) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApplicationRestrictions File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setApplicationRestrictions
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
default Map<String, V> asMap() { Map<String, V> newMap = new LinkedHashMap<>(); for (Map.Entry<String, V> entry : this) { String key = entry.getKey(); newMap.put(key, entry.getValue()); } return newMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: asMap File: core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
asMap
core/src/main/java/io/micronaut/core/convert/value/ConvertibleValues.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
public void enableScreenAfterBoot() { synchronized(mWindowMap) { if (DEBUG_BOOT) { RuntimeException here = new RuntimeException("here"); here.fillInStackTrace(); Slog.i(TAG, "enableScreenAfterBoot: mDisplayEnabled=" + mDisplayEnabled + " mForceDisplayEnabled=" + mForceDisplayEnabled + " mShowingBootMessages=" + mShowingBootMessages + " mSystemBooted=" + mSystemBooted, here); } if (mSystemBooted) { return; } mSystemBooted = true; hideBootMessagesLocked(); // If the screen still doesn't come up after 30 seconds, give // up and turn it on. mH.sendEmptyMessageDelayed(H.BOOT_TIMEOUT, 30*1000); } mPolicy.systemBooted(); performEnableScreen(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableScreenAfterBoot File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
enableScreenAfterBoot
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { StringBuilder builder = new StringBuilder(); builder.append("UpdateIdentifier: ").append(mUpdateIdentifier).append("\n"); builder.append("CredentialPriority: ").append(mCredentialPriority).append("\n"); builder.append("SubscriptionCreationTime: ").append( mSubscriptionCreationTimeInMillis != Long.MIN_VALUE ? new Date(mSubscriptionCreationTimeInMillis) : "Not specified").append("\n"); builder.append("SubscriptionExpirationTime: ").append( mSubscriptionExpirationTimeMillis != Long.MIN_VALUE ? new Date(mSubscriptionExpirationTimeMillis) : "Not specified").append("\n"); builder.append("UsageLimitStartTime: ").append(mUsageLimitStartTimeInMillis != Long.MIN_VALUE ? new Date(mUsageLimitStartTimeInMillis) : "Not specified").append("\n"); builder.append("UsageTimePeriod: ").append(mUsageLimitUsageTimePeriodInMinutes) .append("\n"); builder.append("UsageLimitDataLimit: ").append(mUsageLimitDataLimit).append("\n"); builder.append("UsageLimitTimeLimit: ").append(mUsageLimitTimeLimitInMinutes).append("\n"); builder.append("Provisioned by a subscription server: ") .append(isOsuProvisioned() ? "Yes" : "No").append("\n"); if (mHomeSp != null) { builder.append("HomeSP Begin ---\n"); builder.append(mHomeSp); builder.append("HomeSP End ---\n"); } if (mCredential != null) { builder.append("Credential Begin ---\n"); builder.append(mCredential); builder.append("Credential End ---\n"); } if (mPolicy != null) { builder.append("Policy Begin ---\n"); builder.append(mPolicy); builder.append("Policy End ---\n"); } if (mSubscriptionUpdate != null) { builder.append("SubscriptionUpdate Begin ---\n"); builder.append(mSubscriptionUpdate); builder.append("SubscriptionUpdate End ---\n"); } if (mTrustRootCertList != null) { builder.append("TrustRootCertServers: ").append(mTrustRootCertList.keySet()) .append("\n"); } if (mAaaServerTrustedNames != null) { builder.append("AAAServerTrustedNames: ") .append(String.join(";", mAaaServerTrustedNames)).append("\n"); } if (mServiceFriendlyNames != null) { builder.append("ServiceFriendlyNames: ").append(mServiceFriendlyNames); } builder.append("CarrierId:" + mCarrierId); builder.append("SubscriptionId:" + mSubscriptionId); builder.append("IsAutojoinEnabled:" + mIsAutojoinEnabled); builder.append("mIsMacRandomizationEnabled:" + mIsMacRandomizationEnabled); builder.append("mIsNonPersistentMacRandomizationEnabled:" + mIsNonPersistentMacRandomizationEnabled); builder.append("mMeteredOverride:" + mMeteredOverride); builder.append("mIsCarrierMerged:" + mIsCarrierMerged); builder.append("mIsOemPaid:" + mIsOemPaid); builder.append("mIsOemPrivate:" + mIsOemPrivate); builder.append("mDecoratedUsernamePrefix:" + mDecoratedIdentityPrefix); builder.append("mSubscriptionGroup:" + mSubscriptionGroup); return builder.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
toString
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private void updateColorTransform() { if (mSurfaceControl != null && mLastAppSaturationInfo != null) { getPendingTransaction().setColorTransform(mSurfaceControl, mLastAppSaturationInfo.mMatrix, mLastAppSaturationInfo.mTranslation); mWmService.scheduleAnimationLocked(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateColorTransform File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
updateColorTransform
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition isNotEmpty() { return getOnGoingLogicalCondition(new IsNotEmptyCondition(selector)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNotEmpty File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
isNotEmpty
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
public void onCompleted(GestureDescription gestureDescription) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCompleted File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
onCompleted
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
private void makeSpaceVisible(SpaceReference spaceReference, Session session) { XWikiSpace space = loadXWikiSpace(spaceReference, session); makeSpaceVisible(space, session); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeSpaceVisible File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
makeSpaceVisible
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public void setManagedProfileMaximumTimeOff(ComponentName who, long timeoutMillis) { Objects.requireNonNull(who, "ComponentName is null"); Preconditions.checkArgumentNonnegative(timeoutMillis, "Timeout must be non-negative."); final CallerIdentity caller = getCallerIdentity(who); // DO shouldn't be able to use this method. Preconditions.checkCallAuthorization(isProfileOwnerOfOrganizationOwnedDevice(caller)); Preconditions.checkState(canHandleCheckPolicyComplianceIntent(caller)); final int userId = caller.getUserId(); synchronized (getLockObject()) { final ActiveAdmin admin = getProfileOwnerLocked(caller); // Ensure the timeout is long enough to avoid having bad user experience. if (timeoutMillis > 0 && timeoutMillis < MANAGED_PROFILE_MAXIMUM_TIME_OFF_THRESHOLD && !isAdminTestOnlyLocked(who, userId)) { timeoutMillis = MANAGED_PROFILE_MAXIMUM_TIME_OFF_THRESHOLD; } if (admin.mProfileMaximumTimeOffMillis == timeoutMillis) { return; } admin.mProfileMaximumTimeOffMillis = timeoutMillis; saveSettingsLocked(userId); } mInjector.binderWithCleanCallingIdentity( () -> updatePersonalAppsSuspension(userId, mUserManager.isUserUnlocked())); DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_MANAGED_PROFILE_MAXIMUM_TIME_OFF) .setAdmin(caller.getComponentName()) .setTimePeriod(timeoutMillis) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManagedProfileMaximumTimeOff File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setManagedProfileMaximumTimeOff
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Test public void save4idNull(TestContext context) { postgresClient = createFoo(context); postgresClient.save(FOO, /* id */ null, xPojo, context.asyncAssertSuccess(save -> { String id = save; postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> { context.assertEquals("x", get.getString("key")); })); })); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save4idNull File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
save4idNull
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public static boolean jsFunction_isCommentActivated() throws APIManagementException { boolean commentActivated; APIManagerConfiguration config = ServiceReferenceHolder.getInstance() .getAPIManagerConfigurationService() .getAPIManagerConfiguration(); commentActivated = Boolean.valueOf(config.getFirstProperty(APIConstants.API_STORE_DISPLAY_COMMENTS)); return commentActivated; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_isCommentActivated File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_isCommentActivated
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
URI uri() { final String uri; final String path = path(); if (isAbsoluteUri(path)) { uri = path; } else { final String scheme = scheme(); checkState(scheme != null, ":scheme header does not exist."); final String authority = authority(); checkState(authority != null, ":authority header does not exist."); uri = scheme + "://" + authority + path; } try { return new URI(uri); } catch (URISyntaxException e) { throw new IllegalStateException("not a valid URI: " + uri, e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uri File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
uri
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
public void setupHost(final QSTileHost host) { mHost = host; host.setHeaderView(mExpandIndicator); mHeaderQsPanel.setQSPanelAndHeader(mQsPanel, this); mHeaderQsPanel.setHost(host, null /* No customization in header */); setUserInfoController(host.getUserInfoController()); setBatteryController(host.getBatteryController()); setNextAlarmController(host.getNextAlarmController()); final boolean isAPhone = mHost.getNetworkController().hasVoiceCallingFeature(); if (isAPhone) { mHost.getNetworkController().addEmergencyListener(this); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setupHost File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3886
HIGH
7.2
android
setupHost
packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
0
Analyze the following code function for security vulnerabilities
private static long getLongSafe(byte[] bytes, int offset) { if (BIG_ENDIAN_NATIVE_ORDER) { return (long) bytes[offset] << 56 | ((long) bytes[offset + 1] & 0xff) << 48 | ((long) bytes[offset + 2] & 0xff) << 40 | ((long) bytes[offset + 3] & 0xff) << 32 | ((long) bytes[offset + 4] & 0xff) << 24 | ((long) bytes[offset + 5] & 0xff) << 16 | ((long) bytes[offset + 6] & 0xff) << 8 | (long) bytes[offset + 7] & 0xff; } return (long) bytes[offset] & 0xff | ((long) bytes[offset + 1] & 0xff) << 8 | ((long) bytes[offset + 2] & 0xff) << 16 | ((long) bytes[offset + 3] & 0xff) << 24 | ((long) bytes[offset + 4] & 0xff) << 32 | ((long) bytes[offset + 5] & 0xff) << 40 | ((long) bytes[offset + 6] & 0xff) << 48 | (long) bytes[offset + 7] << 56; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLongSafe File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
getLongSafe
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
private ArrayList<String> getLocalClaimURIs(List<LocalClaim> localClaims) { // Using Java 8 streams to do the mapping will result in breaking at the axis level thus using the following // approach. ArrayList<String> localClaimsArray = new ArrayList<String>(); for (LocalClaim localClaim : localClaims) { localClaimsArray.add(localClaim.getClaimURI()); } return localClaimsArray; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalClaimURIs File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framework The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
getLocalClaimURIs
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { String str; switch (operation) { case INDEX: str = "INDEX " + this.reference; break; case DELETE: str = "DELETE " + this.deleteQuery; break; case STOP: str = "STOP"; break; default: str = ""; break; } return str; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/DefaultSolrIndexer.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-312", "CWE-200" ]
CVE-2023-50719
HIGH
7.5
xwiki/xwiki-platform
toString
xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/DefaultSolrIndexer.java
3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea
0
Analyze the following code function for security vulnerabilities
public void serviceDoneExecuting(IBinder token, int type, int startId, int res) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serviceDoneExecuting File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
serviceDoneExecuting
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public String getAuthzAcl() { return authzAcl; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthzAcl File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getAuthzAcl
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static boolean isDownloaderProcess(final Context context) { if (isDownloaderProcess != null) { return isDownloaderProcess; } boolean result = false; do { if (FileDownloadProperties.getImpl().processNonSeparate) { result = true; break; } int pid = android.os.Process.myPid(); final ActivityManager activityManager = (ActivityManager) context. getSystemService(Context.ACTIVITY_SERVICE); if (activityManager == null) { FileDownloadLog.w(FileDownloadUtils.class, "fail to get the activity manager!"); return false; } final List<ActivityManager.RunningAppProcessInfo> runningAppProcessInfoList = activityManager.getRunningAppProcesses(); if (null == runningAppProcessInfoList || runningAppProcessInfoList.isEmpty()) { FileDownloadLog .w(FileDownloadUtils.class, "The running app process info list from" + " ActivityManager is null or empty, maybe current App is not " + "running."); return false; } for (ActivityManager.RunningAppProcessInfo processInfo : runningAppProcessInfoList) { if (processInfo.pid == pid) { result = processInfo.processName.endsWith(":filedownloader"); break; } } } while (false); isDownloaderProcess = result; return isDownloaderProcess; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDownloaderProcess File: library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
isDownloaderProcess
library/src/main/java/com/liulishuo/filedownloader/util/FileDownloadUtils.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
Tool toTool(Element elt) throws XmlReaderException { Library lib = findLibrary(elt.getAttribute("lib")); String name = elt.getAttribute("name"); if (name == null || name.equals("")) { throw new XmlReaderException(Strings.get("toolNameMissing")); } Tool tool = lib.getTool(name); if (tool == null) { throw new XmlReaderException(Strings.get("toolNotFound")); } return tool; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toTool File: src/com/cburch/logisim/file/XmlReader.java Repository: logisim-evolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000889
MEDIUM
6.8
logisim-evolution
toTool
src/com/cburch/logisim/file/XmlReader.java
90aee8f8ceef463884cc400af4f6d1f109fb0972
0
Analyze the following code function for security vulnerabilities
boolean isDummyMainActivity(@Nullable ComponentName name) { return name != null && DUMMY_MAIN_ACTIVITY.equals(name.getClassName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDummyMainActivity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
isDummyMainActivity
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void onClientRemoved(String clientUUID) { int num = 0; StorageId clientStorageId = new StorageId(clientUUID); if (clientStorageId.isLocal()) { num = em.createNamedQuery("deleteClientSessionsByClient").setParameter("clientId", clientUUID).executeUpdate(); } else { num = em.createNamedQuery("deleteClientSessionsByExternalClient") .setParameter("clientStorageProvider", clientStorageId.getProviderId()) .setParameter("externalClientId", clientStorageId.getExternalId()) .executeUpdate(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onClientRemoved File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java Repository: keycloak The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-6563
HIGH
7.7
keycloak
onClientRemoved
model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
11eb952e1df7cbb95b1e2c101dfd4839a2375695
0
Analyze the following code function for security vulnerabilities
@Override protected void setOverExpansion(float overExpansion, boolean isPixels) { if (mConflictingQsExpansionGesture || mQsExpandImmediate) { return; } if (mStatusBar.getBarState() != StatusBarState.KEYGUARD) { mNotificationStackScroller.setOnHeightChangedListener(null); if (isPixels) { mNotificationStackScroller.setOverScrolledPixels( overExpansion, true /* onTop */, false /* animate */); } else { mNotificationStackScroller.setOverScrollAmount( overExpansion, true /* onTop */, false /* animate */); } mNotificationStackScroller.setOnHeightChangedListener(this); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOverExpansion File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setOverExpansion
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void initialize() throws InitializationException { CacheConfiguration cacheConfig = new CacheConfiguration(); cacheConfig.setConfigurationId("diff.html.dataURI"); LRUEvictionConfiguration lru = new LRUEvictionConfiguration(); lru.setMaxEntries(100); cacheConfig.put(LRUEvictionConfiguration.CONFIGURATIONID, lru); try { this.cache = this.cacheManager.createNewCache(cacheConfig); } catch (Exception e) { throw new InitializationException("Failed to create the Data URI cache.", e); } }
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2023-48240 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20818: Improve data URI converter * Cache failures * Properly dispose the caches * Only send requests to trusted domains * Only embed actual images * Limit responses to 1MB * Introduce configuration options for timeout, maximum size and if the feature is enabled at all * Add a UI test that checks that attachment embedding is working in general * Move to httpclient5 * Expose the cookie domains configuration in AuthenticationConfiguration Function: initialize File: xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java Repository: xwiki/xwiki-platform Fixed Code: @Override public void initialize() throws InitializationException { if (!this.configuration.isEnabled()) { return; } CacheConfiguration cacheConfig = new CacheConfiguration(); cacheConfig.setConfigurationId("diff.html.dataURI"); LRUEvictionConfiguration lru = new LRUEvictionConfiguration(); lru.setMaxEntries(100); cacheConfig.put(EntryEvictionConfiguration.CONFIGURATIONID, lru); CacheConfiguration failureCacheConfiguration = new CacheConfiguration(); failureCacheConfiguration.setConfigurationId("diff.html.dataURIFailureCache"); LRUEvictionConfiguration failureLRU = new LRUEvictionConfiguration(); failureLRU.setMaxEntries(1000); // Cache failures for an hour. This is to avoid hammering the server with requests for images that don't // exist or are inaccessible or too large. failureLRU.setLifespan(3600); failureCacheConfiguration.put(EntryEvictionConfiguration.CONFIGURATIONID, failureLRU); try { this.cache = this.cacheManager.createNewCache(cacheConfig); this.failureCache = this.cacheManager.createNewCache(failureCacheConfiguration); } catch (Exception e) { // Dispose the cache if it has been created. if (this.cache != null) { this.cache.dispose(); } throw new InitializationException("Failed to create the Data URI cache.", e); } }
[ "CWE-918" ]
CVE-2023-48240
HIGH
8.8
xwiki/xwiki-platform
initialize
xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java
bff0203e739b6e3eb90af5736f04278c73c2a8bb
1
Analyze the following code function for security vulnerabilities
public static XMLBuilder parse(String xmlString) throws ParserConfigurationException, SAXException, IOException { return XMLBuilder.parse(new InputSource(new StringReader(xmlString))); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2014-125087 - Severity: MEDIUM - CVSS Score: 5.2 Description: Disable external entities by default to prevent XXE injection attacks, re #6 XML Builder classes now explicitly enable or disable 'external-general-entities' and 'external-parameter-entities' features of the DocumentBuilderFactory when #create or #parse methods are used. To prevent XML External Entity (XXE) injection attacks, these features are disabled by default. They can only be enabled by passing a true boolean value to new versions of the #create and #parse methods that accept a flag for this feature. Function: parse File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder Fixed Code: public static XMLBuilder parse(String xmlString) throws ParserConfigurationException, SAXException, IOException { return XMLBuilder.parse(xmlString, false); }
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
parse
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
1
Analyze the following code function for security vulnerabilities
public TokenValidator getTokenValidator() { return tokenValidator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTokenValidator File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java Repository: pac4j The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-44878
MEDIUM
5
pac4j
getTokenValidator
pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
22b82ffd702a132d9f09da60362fc6264fc281ae
0
Analyze the following code function for security vulnerabilities
@Nullable public String getSplashScreenThemeResName() { return mSplashScreenThemeResName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSplashScreenThemeResName File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getSplashScreenThemeResName
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message msg) { switch (msg.what) { case DISMISS_DIALOG_UI_MSG: { final Dialog d = (Dialog) msg.obj; d.dismiss(); break; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
handleMessage
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private void appendElement(StringBuilder breadcrumb, BrowseBarElement element) { if (breadcrumb.length() > 0) { breadcrumb.append(CONNECTOR); } if (StringUtil.isDefined(element.getLink())) { breadcrumb.append("<a href=\"").append(element.getLink()).append("\""); } else { breadcrumb.append("<span"); } breadcrumb.append(" class=\"element\""); if (StringUtil.isDefined(element.getId())) { breadcrumb.append(" id=\"").append(element.getId()).append("\""); } breadcrumb.append(">"); breadcrumb.append(WebEncodeHelper.javaStringToHtmlString(element.getLabel())); if (StringUtil.isDefined(element.getLink())) { breadcrumb.append("</a>"); } else { breadcrumb.append("</span>"); } }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-47324 - Severity: MEDIUM - CVSS Score: 5.4 Description: Bug #13811: fixing stored XSS leading to full account takeover * making HTML sanitize processing accessible for JSTL instructions * sanitizing user notification title and contents on registering * sanitizing user notification title and contents on rendering * sanitizing browse bar parts * modifying the user and group saving action names in order to get the user token verifications * applying the token validation from component request router abstraction Function: appendElement File: core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java Repository: Silverpeas/Silverpeas-Core Fixed Code: private void appendElement(StringBuilder breadcrumb, BrowseBarElement element) { if (breadcrumb.length() > 0) { breadcrumb.append(CONNECTOR); } if (StringUtil.isDefined(element.getLink())) { breadcrumb.append("<a href=\"").append(element.getLink()).append("\""); } else { breadcrumb.append("<span"); } breadcrumb.append(" class=\"element\""); if (StringUtil.isDefined(element.getId())) { breadcrumb.append(" id=\"").append(element.getId()).append("\""); } breadcrumb.append(">"); breadcrumb.append(element.getLabel()); if (StringUtil.isDefined(element.getLink())) { breadcrumb.append("</a>"); } else { breadcrumb.append("</span>"); } }
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
appendElement
core-web/src/main/java/org/silverpeas/core/web/util/viewgenerator/html/browsebars/BrowseBarComplete.java
9a55728729a3b431847045c674b3e883507d1e1a
1
Analyze the following code function for security vulnerabilities
public int getBeginCharacterOffset() { return fBeginCharacterOffset; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBeginCharacterOffset File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
getBeginCharacterOffset
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting protected boolean bindGuts(final ExpandableNotificationRow row, NotificationMenuRowPlugin.MenuItem item) { NotificationEntry entry = row.getEntry(); row.setGutsView(item); row.setTag(entry.getSbn().getPackageName()); row.getGuts().setClosedListener((NotificationGuts g) -> { row.onGutsClosed(); if (!g.willBeRemoved() && !row.isRemoved()) { mListContainer.onHeightChanged( row, !mPresenter.isPresenterFullyCollapsed() /* needsAnimation */); } if (mNotificationGutsExposed == g) { mNotificationGutsExposed = null; mGutsMenuItem = null; } if (mGutsListener != null) { mGutsListener.onGutsClose(entry); } String key = entry.getKey(); if (key.equals(mKeyToRemoveOnGutsClosed)) { mKeyToRemoveOnGutsClosed = null; if (mNotificationLifetimeFinishedCallback != null) { mNotificationLifetimeFinishedCallback.onSafeToRemove(key); } } }); View gutsView = item.getGutsView(); try { if (gutsView instanceof NotificationSnooze) { initializeSnoozeView(row, (NotificationSnooze) gutsView); } else if (gutsView instanceof NotificationInfo) { initializeNotificationInfo(row, (NotificationInfo) gutsView); } else if (gutsView instanceof NotificationConversationInfo) { initializeConversationNotificationInfo( row, (NotificationConversationInfo) gutsView); } else if (gutsView instanceof PartialConversationInfo) { initializePartialConversationNotificationInfo(row, (PartialConversationInfo) gutsView); } else if (gutsView instanceof FeedbackInfo) { initializeFeedbackInfo(row, (FeedbackInfo) gutsView); } return true; } catch (Exception e) { Log.e(TAG, "error binding guts", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindGuts File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
bindGuts
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationGutsManager.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
public ApiClient setConnectTimeout(int connectionTimeout) { this.connectionTimeout = connectionTimeout; httpClient.property(ClientProperties.CONNECT_TIMEOUT, connectionTimeout); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectTimeout File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setConnectTimeout
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private String getOwnerPackageNameForUserLocked(int userId) { return mOwners.getDeviceOwnerUserId() == userId ? mOwners.getDeviceOwnerPackageName() : mOwners.getProfileOwnerPackage(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOwnerPackageNameForUserLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getOwnerPackageNameForUserLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private JsonObject readObject(boolean objectWithoutBraces) throws IOException { return this.readObject(objectWithoutBraces, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readObject File: src/main/org/hjson/HjsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readObject
src/main/org/hjson/HjsonParser.java
00e3b1325cb6c2b80b347dbec9181fd17ce0a599
0
Analyze the following code function for security vulnerabilities
@UnsupportedAppUsage public static native int getGlobalAssetCount();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGlobalAssetCount File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getGlobalAssetCount
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public void setSpace(String spaces) { if (spaces != null) { DocumentReference reference = getDocumentReference(); EntityReference spaceReference = getRelativeEntityReferenceResolver().resolve(spaces, EntityType.SPACE); spaceReference = spaceReference.appendParent(getDocumentReference().getWikiReference()); setDocumentReferenceInternal( new DocumentReference(reference.getName(), new SpaceReference(spaceReference))); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSpace File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
setSpace
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public @Nullable Time getTime( int i, java.util.@Nullable Calendar cal) throws SQLException { byte[] value = getRawValue(i); if (value == null) { return null; } if (cal == null) { cal = getDefaultCalendar(); } if (isBinary(i)) { int col = i - 1; int oid = fields[col].getOID(); TimeZone tz = cal.getTimeZone(); if (oid == Oid.TIME || oid == Oid.TIMETZ) { return getTimestampUtils().toTimeBin(tz, value); } else if (oid == Oid.TIMESTAMP || oid == Oid.TIMESTAMPTZ) { // If backend provides just TIMESTAMP, we use "cal" timezone // If backend provides TIMESTAMPTZ, we ignore "cal" as we know true instant value Timestamp timestamp = getTimestamp(i, cal); if (timestamp == null) { return null; } long timeMillis = timestamp.getTime(); if (oid == Oid.TIMESTAMPTZ) { // time zone == UTC since BINARY "timestamp with time zone" is always sent in UTC // So we truncate days return new Time(timeMillis % TimeUnit.DAYS.toMillis(1)); } // Here we just truncate date part return getTimestampUtils().convertToTime(timeMillis, tz); } else { throw new PSQLException( GT.tr("Cannot convert the column of type {0} to requested type {1}.", Oid.toString(oid), "time"), PSQLState.DATA_TYPE_MISMATCH); } } String string = getString(i); return getTimestampUtils().toTime(cal, string); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTime File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getTime
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private void maybeClearLockTaskPolicyLocked() { mInjector.binderWithCleanCallingIdentity(() -> { final List<UserInfo> userInfos = mUserManager.getAliveUsers(); for (int i = userInfos.size() - 1; i >= 0; i--) { int userId = userInfos.get(i).id; if (canDPCManagedUserUseLockTaskLocked(userId)) { continue; } if (isPolicyEngineForFinanceFlagEnabled()) { Map<EnforcingAdmin, PolicyValue<LockTaskPolicy>> policies = mDevicePolicyEngine.getLocalPoliciesSetByAdmins( PolicyDefinition.LOCK_TASK, userId); Set<EnforcingAdmin> admins = new HashSet<>(policies.keySet()); for (EnforcingAdmin admin : admins) { if (admin.hasAuthority(EnforcingAdmin.DPC_AUTHORITY)) { mDevicePolicyEngine.removeLocalPolicy( PolicyDefinition.LOCK_TASK, admin, userId); } } } else { final List<String> lockTaskPackages = getUserData(userId).mLockTaskPackages; // TODO(b/278438525): handle in the policy engine if (!lockTaskPackages.isEmpty()) { Slogf.d(LOG_TAG, "User id " + userId + " not affiliated. Clearing lock task packages"); setLockTaskPackagesLocked(userId, Collections.<String>emptyList()); } final int lockTaskFeatures = getUserData(userId).mLockTaskFeatures; if (lockTaskFeatures != DevicePolicyManager.LOCK_TASK_FEATURE_NONE) { Slogf.d(LOG_TAG, "User id " + userId + " not affiliated. Clearing lock task features"); setLockTaskFeaturesLocked(userId, DevicePolicyManager.LOCK_TASK_FEATURE_NONE); } } } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeClearLockTaskPolicyLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
maybeClearLockTaskPolicyLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static void setCachePathSetting(String cachePathSetting) { if (StringUtils.isEmpty(cachePathSetting)) { FilesUtils.cachePathSetting = null; } else { FilesUtils.cachePathSetting = cachePathSetting; } resetDeployPath(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCachePathSetting File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
setCachePathSetting
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
protected void launchOpenKeyChain(long keyId) { PgpEngine pgp = XmppActivity.this.xmppConnectionService.getPgpEngine(); try { startIntentSenderForResult( pgp.getIntentForKey(keyId).getIntentSender(), 0, null, 0, 0, 0); } catch (Throwable e) { Toast.makeText(XmppActivity.this, R.string.openpgp_error, Toast.LENGTH_SHORT).show(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchOpenKeyChain File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
launchOpenKeyChain
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
void sendPing(byte[] data, final ChannelExceptionHandler<AbstractHttp2StreamSinkChannel> exceptionHandler, boolean ack) { Http2PingStreamSinkChannel ping = new Http2PingStreamSinkChannel(this, data, ack); try { ping.shutdownWrites(); if (!ping.flush()) { ping.getWriteSetter().set(ChannelListeners.flushingChannelListener(null, exceptionHandler)); ping.resumeWrites(); } } catch (IOException e) { if(exceptionHandler != null) { exceptionHandler.handleException(ping, e); } else { UndertowLogger.REQUEST_LOGGER.debug("Failed to send ping and no exception handler set", e); } } catch (Throwable t) { if(exceptionHandler != null) { exceptionHandler.handleException(ping, new IOException(t)); } else { UndertowLogger.REQUEST_LOGGER.debug("Failed to send ping and no exception handler set", t); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendPing File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
sendPing
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
@Override public void onClick(DialogInterface dialog, int which) { AsyncTask.execute(new Runnable() { @Override public void run() { setSaverMode(true); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onClick File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
onClick
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
@Override public void checkAccept(String host, int port) { try { if (enterPublicInterface()) return; if (isConnectionAllowed(host, port)) return; throw new SecurityException(formatLocalized("security.error_network_accept", host, port)); //$NON-NLS-1$ } finally { exitPublicInterface(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAccept File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
checkAccept
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
@Override public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException { Path tokenZero = file.getName(0); if("__MACOSX".equals(tokenZero.toString()) || Files.isHidden(file)) { //ignore } else if(rootFound == null) { if(Files.isRegularFile(file)) { if(file.getNameCount() > 1) { root = tokenZero; rootFound = Boolean.TRUE; } else { rootFound = Boolean.FALSE; } } } else if(rootFound.booleanValue() && !root.equals(tokenZero)) { rootFound = Boolean.FALSE; return FileVisitResult.TERMINATE; } return FileVisitResult.CONTINUE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: visitFile File: src/main/java/org/olat/fileresource/types/FileResource.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
visitFile
src/main/java/org/olat/fileresource/types/FileResource.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
public void setEngineContext(XWikiEngineContext engine_context) { this.engine_context = engine_context; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEngineContext File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setEngineContext
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void getSelectionPath(int start, int end, Path dest) { dest.reset(); if (start == end) return; if (end < start) { int temp = end; end = start; start = temp; } int startline = getLineForOffset(start); int endline = getLineForOffset(end); int top = getLineTop(startline); int bottom = getLineBottom(endline); if (startline == endline) { addSelection(startline, start, end, top, bottom, dest); } else { final float width = mWidth; addSelection(startline, start, getLineEnd(startline), top, getLineBottom(startline), dest); if (getParagraphDirection(startline) == DIR_RIGHT_TO_LEFT) dest.addRect(getLineLeft(startline), top, 0, getLineBottom(startline), Path.Direction.CW); else dest.addRect(getLineRight(startline), top, width, getLineBottom(startline), Path.Direction.CW); for (int i = startline + 1; i < endline; i++) { top = getLineTop(i); bottom = getLineBottom(i); dest.addRect(0, top, width, bottom, Path.Direction.CW); } top = getLineTop(endline); bottom = getLineBottom(endline); addSelection(endline, getLineStart(endline), end, top, bottom, dest); if (getParagraphDirection(endline) == DIR_RIGHT_TO_LEFT) dest.addRect(width, top, getLineRight(endline), bottom, Path.Direction.CW); else dest.addRect(0, top, getLineLeft(endline), bottom, Path.Direction.CW); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSelectionPath File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getSelectionPath
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
private boolean hasFeatureManagedUsers() { try { return mIPackageManager.hasSystemFeature(PackageManager.FEATURE_MANAGED_USERS, 0); } catch (RemoteException e) { return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasFeatureManagedUsers File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
hasFeatureManagedUsers
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private boolean canUseFingerprint(String opPackageName, boolean foregroundOnly, int uid, int pid) { checkPermission(USE_FINGERPRINT); if (isKeyguard(opPackageName)) { return true; // Keyguard is always allowed } if (!isCurrentUserOrProfile(UserHandle.getCallingUserId())) { Slog.w(TAG,"Rejecting " + opPackageName + " ; not a current user or profile"); return false; } if (mAppOps.noteOp(AppOpsManager.OP_USE_FINGERPRINT, uid, opPackageName) != AppOpsManager.MODE_ALLOWED) { Slog.w(TAG, "Rejecting " + opPackageName + " ; permission denied"); return false; } if (foregroundOnly && !isForegroundActivity(uid, pid)) { Slog.w(TAG, "Rejecting " + opPackageName + " ; not in foreground"); return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canUseFingerprint File: services/core/java/com/android/server/fingerprint/FingerprintService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
canUseFingerprint
services/core/java/com/android/server/fingerprint/FingerprintService.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public synchronized void closeInbound() throws SSLException { if (isInboundDone) { return; } isInboundDone = true; engineClosed = true; shutdown(); if (handshakeState != HandshakeState.NOT_STARTED && !receivedShutdown) { throw new SSLException( "Inbound closed before receiving peer's close_notify: possible truncation attack?"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeInbound File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
closeInbound
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Unstable public String getRenderedContent(String text, Syntax sourceSyntaxId, boolean restrictedTransformationContext, XWikiDocument sDocument, boolean isolated, XWikiContext context) { return getRenderedContent(text, sourceSyntaxId, getOutputSyntax(), restrictedTransformationContext, sDocument, isolated, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@NonNull private Action makeAction(@DrawableRes int icon, @StringRes int title, @ColorInt Integer colorInt, @ColorRes int defaultColorRes, PendingIntent intent) { if (colorInt == null || !mBuilder.isCallActionColorCustomizable()) { colorInt = mBuilder.mContext.getColor(defaultColorRes); } Action action = new Action.Builder(Icon.createWithResource("", icon), new SpannableStringBuilder().append(mBuilder.mContext.getString(title), new ForegroundColorSpan(colorInt), SpannableStringBuilder.SPAN_INCLUSIVE_INCLUSIVE), intent).build(); action.getExtras().putBoolean(KEY_ACTION_PRIORITY, true); return action; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeAction File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
makeAction
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void setContentInode(String contentInode) { this.contentInode = contentInode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContentInode File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setContentInode
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
public void resetUserExpandedStates() { ArrayList<Entry> activeNotifications = mNotificationData.getActiveNotifications(); final int notificationCount = activeNotifications.size(); for (int i = 0; i < notificationCount; i++) { NotificationData.Entry entry = activeNotifications.get(i); if (entry.row != null) { entry.row.resetUserExpansion(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetUserExpandedStates File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
resetUserExpandedStates
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public int sendWithResult(int code, Intent intent, String resolvedType, IBinder allowlistToken, IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) { return sendInner(code, intent, resolvedType, allowlistToken, finishedReceiver, requiredPermission, null, null, 0, 0, 0, options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendWithResult File: services/core/java/com/android/server/am/PendingIntentRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
sendWithResult
services/core/java/com/android/server/am/PendingIntentRecord.java
8418e3a017428683d173c0c82b0eb02d5b923a4e
0
Analyze the following code function for security vulnerabilities
private void doSetVisibilityInternal(final boolean visible) { if (getActivity() == null) { return; } getActivity().runOnUiThread(new Runnable() { public void run() { currentVisible = visible ? View.VISIBLE : View.INVISIBLE; v.setVisibility(currentVisible); if (visible) { v.bringToFront(); } } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doSetVisibilityInternal File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
doSetVisibilityInternal
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setPublishedDir(String dir) { publishedDir = dir; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPublishedDir File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
setPublishedDir
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
private void addDownloadLinkToJson( final HttpServletRequest httpServletRequest, final String ref, final JSONWriter json) { String downloadURL = getBaseUrl(httpServletRequest) + REPORT_URL + "/" + ref; json.key(JSON_DOWNLOAD_LINK).value(downloadURL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDownloadLinkToJson File: core/src/main/java/org/mapfish/print/servlet/MapPrinterServlet.java Repository: mapfish/mapfish-print The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-15231
MEDIUM
4.3
mapfish/mapfish-print
addDownloadLinkToJson
core/src/main/java/org/mapfish/print/servlet/MapPrinterServlet.java
89155f2506b9cee822e15ce60ccae390a1419d5e
0
Analyze the following code function for security vulnerabilities
private void registerMessageListener() { // do not register multiple packet listeners if (mPacketListener != null) mXMPPConnection.removePacketListener(mPacketListener); PacketTypeFilter filter = new PacketTypeFilter(Message.class); mPacketListener = new PacketListener() { public void processPacket(Packet packet) { try { if (packet instanceof Message) { Message msg = (Message) packet; String[] fromJID = getJabberID(msg.getFrom()); int direction = ChatConstants.INCOMING; Carbon cc = CarbonManager.getCarbon(msg); // extract timestamp long ts; DelayInfo timestamp = (DelayInfo)msg.getExtension("delay", "urn:xmpp:delay"); if (timestamp == null) timestamp = (DelayInfo)msg.getExtension("x", "jabber:x:delay"); if (cc != null) // Carbon timestamp overrides packet timestamp timestamp = cc.getForwarded().getDelayInfo(); if (timestamp != null) ts = timestamp.getStamp().getTime(); else ts = System.currentTimeMillis(); // try to extract a carbon if (cc != null) { Log.d(TAG, "carbon: " + cc.toXML()); msg = (Message)cc.getForwarded().getForwardedPacket(); // outgoing carbon: fromJID is actually chat peer's JID if (cc.getDirection() == Carbon.Direction.sent) { fromJID = getJabberID(msg.getTo()); direction = ChatConstants.OUTGOING; } else { fromJID = getJabberID(msg.getFrom()); // hook off carbonated delivery receipts DeliveryReceipt dr = (DeliveryReceipt)msg.getExtension( DeliveryReceipt.ELEMENT, DeliveryReceipt.NAMESPACE); if (dr != null) { Log.d(TAG, "got CC'ed delivery receipt for " + dr.getId()); changeMessageDeliveryStatus(dr.getId(), ChatConstants.DS_ACKED); } } // ignore carbon copies of OTR messages sent by broken clients if (msg.getBody() != null && msg.getBody().startsWith("?OTR")) { Log.i(TAG, "Ignoring OTR carbon from " + msg.getFrom() + " to " + msg.getTo()); return; } } // check for jabber MUC invitation if(direction == ChatConstants.INCOMING && handleMucInvitation(msg)) { sendReceiptIfRequested(packet); return; } String chatMessage = msg.getBody(); // display error inline if (msg.getType() == Message.Type.error) { if (changeMessageDeliveryStatus(msg.getPacketID(), ChatConstants.DS_FAILED)) mServiceCallBack.notifyMessage(fromJID, msg.getError().toString(), (cc != null), Message.Type.error); else if (mucJIDs.contains(msg.getFrom())) { handleKickedFromMUC(msg.getFrom(), false, null, msg.getError().toString()); } return; // we do not want to add errors as "incoming messages" } // ignore empty messages if (chatMessage == null) { if (msg.getSubject() != null && msg.getType() == Message.Type.groupchat && mucJIDs.contains(fromJID[0])) { // this is a MUC subject, update our DB ContentValues cvR = new ContentValues(); cvR.put(RosterProvider.RosterConstants.STATUS_MESSAGE, msg.getSubject()); cvR.put(RosterProvider.RosterConstants.STATUS_MODE, StatusMode.available.ordinal()); Log.d(TAG, "MUC subject for " + fromJID[0] + " set to: " + msg.getSubject()); upsertRoster(cvR, fromJID[0]); return; } Log.d(TAG, "empty message."); return; } // obtain Last Message Correction, if present Replace replace = (Replace)msg.getExtension(Replace.NAMESPACE); String replace_id = (replace != null) ? replace.getId() : null; // carbons are old. all others are new int is_new = (cc == null) ? ChatConstants.DS_NEW : ChatConstants.DS_SENT_OR_READ; if (msg.getType() == Message.Type.error) is_new = ChatConstants.DS_FAILED; boolean is_muc = (msg.getType() == Message.Type.groupchat); boolean is_from_me = (direction == ChatConstants.OUTGOING) || (is_muc && fromJID[1].equals(getMyMucNick(fromJID[0]))); // handle MUC-PMs: messages from a nick from a known MUC or with // an <x> element MUCUser muc_x = (MUCUser)msg.getExtension("x", "http://jabber.org/protocol/muc#user"); boolean is_muc_pm = !is_muc && !TextUtils.isEmpty(fromJID[1]) && (muc_x != null || mucJIDs.contains(fromJID[0])); // TODO: ignoring 'received' MUC-PM carbons, until XSF sorts out shit: // - if yaxim is in the MUC, it will receive a non-carbonated copy of // incoming messages, but not of outgoing ones // - if yaxim isn't in the MUC, it can't respond anyway if (is_muc_pm && !is_from_me && cc != null) return; if (is_muc_pm) { // store MUC-PMs under the participant's full JID, not bare //is_from_me = fromJID[1].equals(getMyMucNick(fromJID[0])); fromJID[0] = fromJID[0] + "/" + fromJID[1]; fromJID[1] = null; Log.d(TAG, "MUC-PM: " + fromJID[0] + " d=" + direction + " fromme=" + is_from_me); } // Carbons and MUC history are 'silent' by default boolean is_silent = (cc != null) || (is_muc && timestamp != null); if (!is_muc || checkAddMucMessage(msg, msg.getPacketID(), fromJID, timestamp)) { addChatMessageToDB(direction, fromJID, chatMessage, is_new, ts, msg.getPacketID(), replace_id); // only notify on private messages or when MUC notification requested boolean need_notify = !is_muc || mConfig.needMucNotification(getMyMucNick(fromJID[0]), chatMessage); // outgoing carbon -> clear notification by signalling 'null' message if (is_from_me) { mServiceCallBack.notifyMessage(fromJID, null, true, msg.getType()); // TODO: MUC PMs ChatHelper.markAsRead(mService, fromJID[0]); } else if (direction == ChatConstants.INCOMING && need_notify) mServiceCallBack.notifyMessage(fromJID, chatMessage, is_silent, msg.getType()); } sendReceiptIfRequested(packet); } } catch (Exception e) { // SMACK silently discards exceptions dropped from processPacket :( Log.e(TAG, "failed to process packet:"); e.printStackTrace(); } } }; mXMPPConnection.addPacketListener(mPacketListener, filter); }
Vulnerability Classification: - CWE: CWE-20, CWE-346 - CVE: CVE-2017-5589 - Severity: MEDIUM - CVSS Score: 4.3 Description: Smackable: improved carbon checks Function: registerMessageListener File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim Fixed Code: private void registerMessageListener() { // do not register multiple packet listeners if (mPacketListener != null) mXMPPConnection.removePacketListener(mPacketListener); PacketTypeFilter filter = new PacketTypeFilter(Message.class); mPacketListener = new PacketListener() { public void processPacket(Packet packet) { try { if (packet instanceof Message) { Message msg = (Message) packet; String[] fromJID = getJabberID(msg.getFrom()); int direction = ChatConstants.INCOMING; Carbon cc = CarbonManager.getCarbon(msg); if (cc != null && !msg.getFrom().equalsIgnoreCase(mConfig.jabberID)) { Log.w(TAG, "Received illegal carbon from " + msg.getFrom() + ": " + cc.toXML()); cc = null; } // extract timestamp long ts; DelayInfo timestamp = (DelayInfo)msg.getExtension("delay", "urn:xmpp:delay"); if (timestamp == null) timestamp = (DelayInfo)msg.getExtension("x", "jabber:x:delay"); if (cc != null) // Carbon timestamp overrides packet timestamp timestamp = cc.getForwarded().getDelayInfo(); if (timestamp != null) ts = timestamp.getStamp().getTime(); else ts = System.currentTimeMillis(); // try to extract a carbon if (cc != null) { Log.d(TAG, "carbon: " + cc.toXML()); msg = (Message)cc.getForwarded().getForwardedPacket(); // outgoing carbon: fromJID is actually chat peer's JID if (cc.getDirection() == Carbon.Direction.sent) { fromJID = getJabberID(msg.getTo()); direction = ChatConstants.OUTGOING; } else { fromJID = getJabberID(msg.getFrom()); // hook off carbonated delivery receipts DeliveryReceipt dr = (DeliveryReceipt)msg.getExtension( DeliveryReceipt.ELEMENT, DeliveryReceipt.NAMESPACE); if (dr != null) { Log.d(TAG, "got CC'ed delivery receipt for " + dr.getId()); changeMessageDeliveryStatus(dr.getId(), ChatConstants.DS_ACKED); } } // ignore carbon copies of OTR messages sent by broken clients if (msg.getBody() != null && msg.getBody().startsWith("?OTR")) { Log.i(TAG, "Ignoring OTR carbon from " + msg.getFrom() + " to " + msg.getTo()); return; } } // check for jabber MUC invitation if(direction == ChatConstants.INCOMING && handleMucInvitation(msg)) { sendReceiptIfRequested(packet); return; } String chatMessage = msg.getBody(); // display error inline if (msg.getType() == Message.Type.error) { if (changeMessageDeliveryStatus(msg.getPacketID(), ChatConstants.DS_FAILED)) mServiceCallBack.notifyMessage(fromJID, msg.getError().toString(), (cc != null), Message.Type.error); else if (mucJIDs.contains(msg.getFrom())) { handleKickedFromMUC(msg.getFrom(), false, null, msg.getError().toString()); } return; // we do not want to add errors as "incoming messages" } // ignore empty messages if (chatMessage == null) { if (msg.getSubject() != null && msg.getType() == Message.Type.groupchat && mucJIDs.contains(fromJID[0])) { // this is a MUC subject, update our DB ContentValues cvR = new ContentValues(); cvR.put(RosterProvider.RosterConstants.STATUS_MESSAGE, msg.getSubject()); cvR.put(RosterProvider.RosterConstants.STATUS_MODE, StatusMode.available.ordinal()); Log.d(TAG, "MUC subject for " + fromJID[0] + " set to: " + msg.getSubject()); upsertRoster(cvR, fromJID[0]); return; } Log.d(TAG, "empty message."); return; } // obtain Last Message Correction, if present Replace replace = (Replace)msg.getExtension(Replace.NAMESPACE); String replace_id = (replace != null) ? replace.getId() : null; // carbons are old. all others are new int is_new = (cc == null) ? ChatConstants.DS_NEW : ChatConstants.DS_SENT_OR_READ; if (msg.getType() == Message.Type.error) is_new = ChatConstants.DS_FAILED; boolean is_muc = (msg.getType() == Message.Type.groupchat); boolean is_from_me = (direction == ChatConstants.OUTGOING) || (is_muc && fromJID[1].equals(getMyMucNick(fromJID[0]))); // handle MUC-PMs: messages from a nick from a known MUC or with // an <x> element MUCUser muc_x = (MUCUser)msg.getExtension("x", "http://jabber.org/protocol/muc#user"); boolean is_muc_pm = !is_muc && !TextUtils.isEmpty(fromJID[1]) && (muc_x != null || mucJIDs.contains(fromJID[0])); // TODO: ignoring 'received' MUC-PM carbons, until XSF sorts out shit: // - if yaxim is in the MUC, it will receive a non-carbonated copy of // incoming messages, but not of outgoing ones // - if yaxim isn't in the MUC, it can't respond anyway if (is_muc_pm && !is_from_me && cc != null) return; if (is_muc_pm) { // store MUC-PMs under the participant's full JID, not bare //is_from_me = fromJID[1].equals(getMyMucNick(fromJID[0])); fromJID[0] = fromJID[0] + "/" + fromJID[1]; fromJID[1] = null; Log.d(TAG, "MUC-PM: " + fromJID[0] + " d=" + direction + " fromme=" + is_from_me); } // Carbons and MUC history are 'silent' by default boolean is_silent = (cc != null) || (is_muc && timestamp != null); if (!is_muc || checkAddMucMessage(msg, msg.getPacketID(), fromJID, timestamp)) { addChatMessageToDB(direction, fromJID, chatMessage, is_new, ts, msg.getPacketID(), replace_id); // only notify on private messages or when MUC notification requested boolean need_notify = !is_muc || mConfig.needMucNotification(getMyMucNick(fromJID[0]), chatMessage); // outgoing carbon -> clear notification by signalling 'null' message if (is_from_me) { mServiceCallBack.notifyMessage(fromJID, null, true, msg.getType()); // TODO: MUC PMs ChatHelper.markAsRead(mService, fromJID[0]); } else if (direction == ChatConstants.INCOMING && need_notify) mServiceCallBack.notifyMessage(fromJID, chatMessage, is_silent, msg.getType()); } sendReceiptIfRequested(packet); } } catch (Exception e) { // SMACK silently discards exceptions dropped from processPacket :( Log.e(TAG, "failed to process packet:"); e.printStackTrace(); } } }; mXMPPConnection.addPacketListener(mPacketListener, filter); }
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
registerMessageListener
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
1
Analyze the following code function for security vulnerabilities
public static synchronized LicenseInfo retrieveNamedSlow() { cache = LicenseInfo.NONE; if (OptionFlags.ALLOW_INCLUDE == false) return cache; final String key = prefs.get("license", ""); if (key.length() > 0) { cache = setIfValid(retrieveNamed(key), cache); if (cache.isValid()) return cache; } for (SFile f : fileCandidates()) { try { if (f.exists() && f.canRead()) { final LicenseInfo result = retrieve(f); if (result == null) return null; cache = setIfValid(result, cache); if (cache.isValid()) return cache; } } catch (IOException e) { Log.info("Error " + e); // Logme.error(e); } } return cache; }
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-3431 - Severity: MEDIUM - CVSS Score: 5.3 Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead https://github.com/plantuml/plantuml-server/issues/232 Function: retrieveNamedSlow File: src/net/sourceforge/plantuml/version/LicenseInfo.java Repository: plantuml Fixed Code: public static synchronized LicenseInfo retrieveNamedSlow() { cache = LicenseInfo.NONE; // if (OptionFlags.ALLOW_INCLUDE == false) // return cache; final String key = prefs.get("license", ""); if (key.length() > 0) { cache = setIfValid(retrieveNamed(key), cache); if (cache.isValid()) return cache; } for (SFile f : fileCandidates()) { try { if (f.exists() && f.canRead()) { final LicenseInfo result = retrieve(f); if (result == null) return null; cache = setIfValid(result, cache); if (cache.isValid()) return cache; } } catch (IOException e) { Log.info("Error " + e); // Logme.error(e); } } return cache; }
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
retrieveNamedSlow
src/net/sourceforge/plantuml/version/LicenseInfo.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
1
Analyze the following code function for security vulnerabilities
public void bind(final AjaxRequestTarget target) { actionButtons.render(); mainSubContainer.setVisible(true); target.appendJavaScript(getJavaScriptAction()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bind File: src/main/java/org/projectforge/web/dialog/ModalDialog.java Repository: micromata/projectforge-webapp The code follows secure coding practices.
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
bind
src/main/java/org/projectforge/web/dialog/ModalDialog.java
422de35e3c3141e418a73bfb39b430d5fd74077e
0
Analyze the following code function for security vulnerabilities
@Override public void visit(MaterialRevision revision) { this.revision = revision; modificationsJson = new ArrayList(); materialJson = new LinkedHashMap(); materialJson.put("revision", revision.getRevision().getRevision()); materialJson.put("revision_href", revision.getRevision().getRevisionUrl()); materialJson.put("user", revision.buildCausedBy()); materialJson.put("date", formatISO8601(revision.getDateOfLatestModification())); materialJson.put("changed", valueOf(revision.isChanged())); materialJson.put("modifications", modificationsJson); materials.add(materialJson); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-28629 - Severity: MEDIUM - CVSS Score: 5.4 Description: Improve escaping on legacy Freemarker templates Function: visit File: server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java Repository: gocd Fixed Code: @Override public void visit(MaterialRevision revision) { this.revision = revision; modificationsJson = new ArrayList<>(); materialJson = new LinkedHashMap<>(); materialJson.put("revision", revision.getRevision().getRevision()); materialJson.put("revision_href", revision.getRevision().getRevisionUrl()); materialJson.put("user", revision.buildCausedBy()); materialJson.put("date", formatISO8601(revision.getDateOfLatestModification())); materialJson.put("changed", valueOf(revision.isChanged())); materialJson.put("modifications", modificationsJson); materials.add(materialJson); }
[ "CWE-79" ]
CVE-2023-28629
MEDIUM
5.4
gocd
visit
server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java
95f758229d419411a38577608709d8552cccf193
1
Analyze the following code function for security vulnerabilities
void removeChildActivityContainers(ActivityRecord parentActivity) { final ArrayList<ActivityContainer> childStacks = parentActivity.mChildContainers; for (int containerNdx = childStacks.size() - 1; containerNdx >= 0; --containerNdx) { ActivityContainer container = childStacks.remove(containerNdx); if (DEBUG_CONTAINERS) Slog.d(TAG_CONTAINERS, "removeChildActivityContainers: removing " + container); container.release(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeChildActivityContainers File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
removeChildActivityContainers
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
private void resetConfigSetting(int mode, String prefix) { if (DEBUG) { Slog.v(LOG_TAG, "resetConfigSetting(" + mode + ", " + prefix + ")"); } mutateConfigSetting(null, null, prefix, false, MUTATION_OPERATION_RESET, mode); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetConfigSetting File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
resetConfigSetting
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public void createConnectionFailed(final Call call) { Log.d(this, "createConnectionFailed(%s) via %s.", call, getComponentName()); BindCallback callback = new BindCallback() { @Override public void onSuccess() { final String callId = mCallIdMapper.getCallId(call); // If still bound, tell the connection service create connection has failed. if (callId != null && isServiceValid("createConnectionFailed")) { Log.addEvent(call, LogUtils.Events.CREATE_CONNECTION_FAILED, Log.piiHandle(call.getHandle())); try { logOutgoing("createConnectionFailed %s", callId); mServiceInterface.createConnectionFailed( call.getConnectionManagerPhoneAccount(), callId, new ConnectionRequest( call.getTargetPhoneAccount(), call.getHandle(), call.getIntentExtras(), call.getVideoState(), callId, false), call.isIncoming(), Log.getExternalSession(TELECOM_ABBREVIATION)); call.setDisconnectCause(new DisconnectCause(DisconnectCause.CANCELED)); call.disconnect(); } catch (RemoteException e) { } } } @Override public void onFailure() { // Binding failed. Oh no. Log.w(this, "onFailure - could not bind to CS for call %s", call.getId()); } }; mBinder.bind(callback, call); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createConnectionFailed File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
createConnectionFailed
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public String getNamespaceURI() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNamespaceURI File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getNamespaceURI
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
public void setMinRoamingDownlinkBandwidth(long minRoamingDownlinkBandwidth) { mMinRoamingDownlinkBandwidth = minRoamingDownlinkBandwidth; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMinRoamingDownlinkBandwidth File: framework/java/android/net/wifi/hotspot2/pps/Policy.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21240
MEDIUM
5.5
android
setMinRoamingDownlinkBandwidth
framework/java/android/net/wifi/hotspot2/pps/Policy.java
69119d1d3102e27b6473c785125696881bce9563
0
Analyze the following code function for security vulnerabilities
private void cleanAllUnversionedFiles(ConsoleOutputStreamConsumer outputStreamConsumer) { log(outputStreamConsumer, "Cleaning all unversioned files in working copy"); cleanUnversionedFilesInAllSubmodules(); cleanUnversionedFiles(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanAllUnversionedFiles File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
cleanAllUnversionedFiles
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting protected void setVarTextTemplate(final Template varTextTemplate) { this.varTextTemplate = varTextTemplate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVarTextTemplate File: varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
setVarTextTemplate
varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
private static boolean isSystemApp(PackageSetting ps) { return (ps.pkgFlags & ApplicationInfo.FLAG_SYSTEM) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSystemApp File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isSystemApp
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public boolean enableMacRandomization(@NonNull String fqdn, boolean enable) { ArrayList<PasspointProvider> passpointProviders = new ArrayList<>(mProviders.values()); boolean found = false; // Loop through all profiles with matching FQDN for (PasspointProvider provider : passpointProviders) { if (TextUtils.equals(provider.getConfig().getHomeSp().getFqdn(), fqdn)) { boolean settingChanged = provider.setMacRandomizationEnabled(enable); if (settingChanged) { mWifiMetrics.logUserActionEvent(enable ? UserActionEvent.EVENT_CONFIGURE_MAC_RANDOMIZATION_ON : UserActionEvent.EVENT_CONFIGURE_MAC_RANDOMIZATION_OFF, provider.isFromSuggestion(), true); mWifiConfigManager.removePasspointConfiguredNetwork( provider.getWifiConfig().getProfileKey()); } found = true; } } if (found) { mWifiConfigManager.saveToStore(true); } return found; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableMacRandomization File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
enableMacRandomization
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private boolean isCurrentUserDemo() { if (UserManager.isDeviceInDemoMode(mContext)) { final int userId = mInjector.userHandleGetCallingUserId(); return mInjector.binderWithCleanCallingIdentity( () -> mUserManager.getUserInfo(userId).isDemo()); } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCurrentUserDemo File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isCurrentUserDemo
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void sendResult(List<ChooserTarget> targets) throws RemoteException { synchronized (mLock) { if (mChooserActivity == null) { Log.e(TAG, "destroyed ChooserTargetServiceConnection received result from " + mConnectedComponent + "; ignoring..."); return; } mChooserActivity.filterServiceTargets( mOriginalTarget.getResolveInfo().activityInfo.packageName, targets); final Message msg = Message.obtain(); msg.what = CHOOSER_TARGET_SERVICE_RESULT; msg.obj = new ServiceResultInfo(mOriginalTarget, targets, ChooserTargetServiceConnection.this); mChooserActivity.mChooserHandler.sendMessage(msg); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendResult File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
sendResult
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public <T> T deserialize(Response response, GenericType<T> returnType) throws ApiException { if (response == null || returnType == null) { return null; } if ("byte[]".equals(returnType.toString())) { // Handle binary response (byte array). return (T) response.readEntity(byte[].class); } else if (returnType.getRawType() == File.class) { // Handle file downloading. T file = (T) downloadFileFromResponse(response); return file; } String contentType = null; List<Object> contentTypes = response.getHeaders().get("Content-Type"); if (contentTypes != null && !contentTypes.isEmpty()) contentType = String.valueOf(contentTypes.get(0)); // read the entity stream multiple times response.bufferEntity(); return response.readEntity(returnType); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deserialize File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
deserialize
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void clearPackagePersistentPreferredActivities(String packageName, int userId) { int callingUid = Binder.getCallingUid(); if (callingUid != Process.SYSTEM_UID) { throw new SecurityException( "clearPackagePersistentPreferredActivities can only be run by the system"); } ArrayList<PersistentPreferredActivity> removed = null; boolean changed = false; synchronized (mPackages) { for (int i=0; i<mSettings.mPersistentPreferredActivities.size(); i++) { final int thisUserId = mSettings.mPersistentPreferredActivities.keyAt(i); PersistentPreferredIntentResolver ppir = mSettings.mPersistentPreferredActivities .valueAt(i); if (userId != thisUserId) { continue; } Iterator<PersistentPreferredActivity> it = ppir.filterIterator(); while (it.hasNext()) { PersistentPreferredActivity ppa = it.next(); // Mark entry for removal only if it matches the package name. if (ppa.mComponent.getPackageName().equals(packageName)) { if (removed == null) { removed = new ArrayList<PersistentPreferredActivity>(); } removed.add(ppa); } } if (removed != null) { for (int j=0; j<removed.size(); j++) { PersistentPreferredActivity ppa = removed.get(j); ppir.removeFilter(ppa); } changed = true; } } if (changed) { scheduleWritePackageRestrictionsLocked(userId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearPackagePersistentPreferredActivities File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clearPackagePersistentPreferredActivities
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public List<String> getAllCrossProfilePackages() { if (!mHasFeature) { return Collections.emptyList(); } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isSystemUid(caller) || isRootUid(caller) || hasCallingPermission( permission.INTERACT_ACROSS_USERS) || hasCallingPermission( permission.INTERACT_ACROSS_USERS_FULL) || hasPermissionForPreflight( caller, permission.INTERACT_ACROSS_PROFILES)); synchronized (getLockObject()) { final List<ActiveAdmin> admins = getProfileOwnerAdminsForCurrentProfileGroup(); final List<String> packages = getCrossProfilePackagesForAdmins(admins); packages.addAll(getDefaultCrossProfilePackages()); return packages; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllCrossProfilePackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAllCrossProfilePackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void processConfiguration() throws LifecycleException { initIDPConfiguration(); initSTSConfiguration(); initKeyManager(); initHandlersChain(); initIdentityServer(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processConfiguration File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
processConfiguration
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public void setActive(String callId, Session.Info sessionInfo) { Log.startSession(sessionInfo, LogUtils.Sessions.CSW_SET_ACTIVE, mPackageAbbreviation); long token = Binder.clearCallingIdentity(); try { synchronized (mLock) { logIncoming("setActive %s", callId); Call call = mCallIdMapper.getCall(callId); if (call != null) { mCallsManager.markCallAsActive(call); } else { // Log.w(this, "setActive, unknown call id: %s", msg.obj); } } } catch (Throwable t) { Log.e(ConnectionServiceWrapper.this, t, ""); throw t; } finally { Binder.restoreCallingIdentity(token); Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setActive File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
setActive
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public Set<String> getPackagesSuspendedByAdmin(@UserIdInt int userId) { return DevicePolicyManagerService.this.getPackagesSuspendedByAdmin(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackagesSuspendedByAdmin File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPackagesSuspendedByAdmin
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void preserveSelectionOnNextLossOfFocus() { mPreserveSelectionOnNextLossOfFocus = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: preserveSelectionOnNextLossOfFocus File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
preserveSelectionOnNextLossOfFocus
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private void testPathEquals(final String xPath, final String value, final SAXEventRecorder steppingFilter) throws Exception { final XPathFilter xPathFilter = new XPathFilter(); xPathFilter.setXPath(xPath); xPathFilter.setMatchType(MatchType.EQUALS); xPathFilter.setValue(value); Assert.assertTrue(match(xPathFilter, steppingFilter)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testPathEquals File: stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
testPathEquals
stroom-pipeline/src/test/java/stroom/pipeline/server/filter/TestXPathFilter.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
public String displayForm(String className, String header, String format) { return this.doc.displayForm(className, header, format, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayForm File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
displayForm
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public static UserManagerService getInstance() { synchronized (UserManagerService.class) { return sInstance; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
getInstance
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
public SwitchBar getSwitchBar() { return mSwitchBar; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSwitchBar File: src/com/android/settings/SettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
getSwitchBar
src/com/android/settings/SettingsActivity.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { final int prime = 31; int result = 1; result = prime * result + ((classId == null) ? 0 : classId.hashCode()); result = prime * result + ((constraints == null) ? 0 : constraints.hashCode()); result = prime * result + ((name == null) ? 0 : name.hashCode()); result = prime * result + ((text == null) ? 0 : text.hashCode()); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
hashCode
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraint.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public String getMetricsMode() { return getProperty(TS_METRICS_MODE, "log"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricsMode File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getMetricsMode
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
@Test public void setSmoothParams() throws Exception { assertPlotParam("smooth", "unique"); assertPlotParam("smooth", "frequency"); assertPlotParam("smooth", "fnormal"); assertPlotParam("smooth", "cumulative"); assertPlotParam("smooth", "cnormal"); assertPlotParam("smooth", "bins"); assertPlotParam("smooth", "csplines"); assertPlotParam("smooth", "acsplines"); assertPlotParam("smooth", "mcsplines"); assertPlotParam("smooth", "bezier"); assertPlotParam("smooth", "sbezier"); assertPlotParam("smooth", "unwrap"); assertPlotParam("smooth", "zsort"); assertInvalidPlotParam("smooth", "[33:system(%20"); }
Vulnerability Classification: - CWE: CWE-78 - CVE: CVE-2023-25826 - Severity: CRITICAL - CVSS Score: 9.8 Description: Improved fix for #2261. Regular expressions wouldn't catch the newlines or possibly other control characters. Now we'll use the TAG validation code to make sure the inputs are only plain ASCII printables first. Fixes CVE-2018-12972, CVE-2020-35476 Function: setSmoothParams File: test/tsd/TestGraphHandler.java Repository: OpenTSDB/opentsdb Fixed Code: @Test public void setSmoothParams() throws Exception { assertPlotParam("smooth", "unique"); assertPlotParam("smooth", "frequency"); assertPlotParam("smooth", "fnormal"); assertPlotParam("smooth", "cumulative"); assertPlotParam("smooth", "cnormal"); assertPlotParam("smooth", "bins"); assertPlotParam("smooth", "csplines"); assertPlotParam("smooth", "acsplines"); assertPlotParam("smooth", "mcsplines"); assertPlotParam("smooth", "bezier"); assertPlotParam("smooth", "sbezier"); assertPlotParam("smooth", "unwrap"); assertPlotParam("smooth", "zsort"); assertInvalidPlotParam("smooth", "bezier%20system(%20"); assertInvalidPlotParam("smooth", "fnormal%0asystem(%20"); }
[ "CWE-78" ]
CVE-2023-25826
CRITICAL
9.8
OpenTSDB/opentsdb
setSmoothParams
test/tsd/TestGraphHandler.java
26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25
1
Analyze the following code function for security vulnerabilities
protected String findUserDN(LdapContext ctx) throws LoginException { if (baseCtxDN == null) { return getIdentity().getName(); } try { NamingEnumeration results = null; Object[] filterArgs = {getIdentity().getName()}; LdapContext ldapCtx = ctx; boolean referralsLeft = true; SearchResult sr = null; while (referralsLeft) { try { results = ldapCtx.search(baseCtxDN, baseFilter, filterArgs, userSearchControls); while (results.hasMore()) { sr = (SearchResult) results.next(); break; } referralsLeft = false; } catch (ReferralException e) { ldapCtx = (LdapContext) e.getReferralContext(); if (results != null) { results.close(); } } } if (sr == null) { results.close(); throw new LoginException("Search of baseDN(" + baseCtxDN + ") found no matches"); } String name = sr.getName(); String userDN = null; if (sr.isRelative() == true) { userDN = new CompositeName(name).get(0) + "," + baseCtxDN; } else { userDN = sr.getName(); } results.close(); results = null; if (trace) { log.trace("findUserDN - " + userDN); } return userDN; } catch (NamingException e) { LoginException le = new LoginException("Unable to find user DN"); le.initCause(e); throw le; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findUserDN File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java Repository: wildfly-security/jboss-negotiation The code follows secure coding practices.
[ "CWE-200" ]
CVE-2015-1849
MEDIUM
4.3
wildfly-security/jboss-negotiation
findUserDN
jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e
0