instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void enforceCanManageCaCerts(ComponentName who, String callerPackage) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization(canManageCaCerts(caller)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceCanManageCaCerts File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
enforceCanManageCaCerts
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void createHeadersTable(SQLiteDatabase db) { db.execSQL("DROP TABLE IF EXISTS " + Downloads.Impl.RequestHeaders.HEADERS_DB_TABLE); db.execSQL("CREATE TABLE " + Downloads.Impl.RequestHeaders.HEADERS_DB_TABLE + "(" + "id INTEGER PRIMARY KEY AUTOINCREMENT," + Downloads.Impl.RequestHeaders.COLUMN_DOWNLOAD_ID + " INTEGER NOT NULL," + Downloads.Impl.RequestHeaders.COLUMN_HEADER + " TEXT NOT NULL," + Downloads.Impl.RequestHeaders.COLUMN_VALUE + " TEXT NOT NULL" + ");"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createHeadersTable File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
createHeadersTable
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
public static Materials hgMaterials(String url) { return hgMaterials(url, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hgMaterials File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
hgMaterials
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public abstract boolean getLineContainsTab(int line);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLineContainsTab File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getLineContainsTab
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
public int getPixel(int dp) { DisplayMetrics metrics = getResources().getDisplayMetrics(); return ((int) (dp * metrics.density)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPixel File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
getPixel
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public @Nullable SystemUpdateInfo getPendingSystemUpdate(@NonNull ComponentName admin) { throwIfParentInstance("getPendingSystemUpdate"); try { return mService.getPendingSystemUpdate(admin); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPendingSystemUpdate File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPendingSystemUpdate
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected Object readItem(Class type, HierarchicalStreamReader reader, UnmarshallingContext context, Object current) { String className = HierarchicalStreams.readClassAttribute(reader, mapper()); Class itemType = className == null ? type : mapper().realClass(className); if (Mapper.Null.class.equals(itemType)) { return null; } else { return context.convertAnother(current, itemType); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readItem File: xstream/src/java/com/thoughtworks/xstream/converters/extended/NamedMapConverter.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
readItem
xstream/src/java/com/thoughtworks/xstream/converters/extended/NamedMapConverter.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
@Override protected void loge(String s) { Rlog.e(LOG_TAG, "[CdmaSST] " + s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loge File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
loge
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
@Nullable private static <T extends Parcelable> T[] getParcelableArrayFromBundle( Bundle bundle, String key, Class<T> itemClass) { final Parcelable[] array = bundle.getParcelableArray(key); final Class<?> arrayClass = Array.newInstance(itemClass, 0).getClass(); if (arrayClass.isInstance(array) || array == null) { return (T[]) array; } final T[] typedArray = (T[]) Array.newInstance(itemClass, array.length); for (int i = 0; i < array.length; i++) { typedArray[i] = (T) array[i]; } bundle.putParcelableArray(key, typedArray); return typedArray; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParcelableArrayFromBundle File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getParcelableArrayFromBundle
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public int getLockTaskFeatures(ComponentName who) { Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); final int userHandle = caller.getUserId(); synchronized (getLockObject()) { enforceCanCallLockTaskLocked(caller); return getUserData(userHandle).mLockTaskFeatures; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockTaskFeatures File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getLockTaskFeatures
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
void cleanUp(boolean cleanServices, boolean setState) { getTaskFragment().cleanUpActivityReferences(this); clearLastParentBeforePip(); // Clean up the splash screen if it was still displayed. cleanUpSplashScreen(); deferRelaunchUntilPaused = false; frozenBeforeDestroy = false; if (setState) { setState(DESTROYED, "cleanUp"); if (DEBUG_APP) Slog.v(TAG_APP, "Clearing app during cleanUp for activity " + this); detachFromProcess(); } // Inform supervisor the activity has been removed. mTaskSupervisor.cleanupActivity(this); // Remove any pending results. if (finishing && pendingResults != null) { for (WeakReference<PendingIntentRecord> apr : pendingResults) { PendingIntentRecord rec = apr.get(); if (rec != null) { mAtmService.mPendingIntentController.cancelIntentSender(rec, false /* cleanActivity */); } } pendingResults = null; } if (cleanServices) { cleanUpActivityServices(); } // Get rid of any pending idle timeouts. removeTimeouts(); // Clean-up activities are no longer relaunching (e.g. app process died). Notify window // manager so it can update its bookkeeping. clearRelaunching(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanUp File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
cleanUp
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void startLockTaskMode(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startLockTaskMode File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startLockTaskMode
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public void setWebsite(String website) { this.website = website; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWebsite File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setWebsite
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
static boolean isDocumentLaunchesIntoExisting(int flags) { return (flags & Intent.FLAG_ACTIVITY_NEW_DOCUMENT) != 0 && (flags & Intent.FLAG_ACTIVITY_MULTIPLE_TASK) == 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDocumentLaunchesIntoExisting File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
isDocumentLaunchesIntoExisting
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
@ApiOperation(value = "修改页面", notes = "修改页面") @GetMapping("/edit/{id}") @RequiresPermissions("novel:friendLink:edit") String edit(@PathVariable("id") Integer id, Model model) { FriendLinkDO friendLink = friendLinkService.get(id); model.addAttribute("friendLink", friendLink); return "novel/friendLink/edit"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: edit File: novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java Repository: 201206030/novel-plus The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-7171
LOW
3.3
201206030/novel-plus
edit
novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java
d6093d8182362422370d7eaf6c53afde9ee45215
0
Analyze the following code function for security vulnerabilities
@Beta @Deprecated public static void copy(File from, Charset charset, Appendable to) throws IOException { asCharSource(from, charset).copyTo(to); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
copy
android/guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
@Override public void updateLastModified(Context context, Group dso) { //Not needed. }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLastModified File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
updateLastModified
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
ParcelFileDescriptor createSocketChannel(int type, String serviceName, ParcelUuid uuid, int port, int flag) { enforceCallingOrSelfPermission(BLUETOOTH_PERM, "Need BLUETOOTH permission"); int fd = createSocketChannelNative(type, serviceName, Utils.uuidToByteArray(uuid), port, flag); if (fd < 0) { errorLog("Failed to create socket channel"); return null; } return ParcelFileDescriptor.adoptFd(fd); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createSocketChannel File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
createSocketChannel
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
@Override public void beginTableCell(Map<String, String> parameters) { getXHTMLWikiPrinter().setStandalone(); getXHTMLWikiPrinter().printXMLStartElement("td", parameters); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginTableCell File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
beginTableCell
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
@Test public void detectsAliassesInPlainJoins() { String query = "select p from Customer c join c.productOrder p where p.delayed = true"; Sort sort = new Sort("p.lineItems"); assertThat(applySorting(query, sort, "c"), endsWith("order by p.lineItems asc")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detectsAliassesInPlainJoins File: src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
detectsAliassesInPlainJoins
src/test/java/org/springframework/data/jpa/repository/query/QueryUtilsUnitTests.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public String getRelativeAssetPath(FileAsset fa) { String _inode = fa.getInode(); return getRelativeAssetPath(_inode, fa.getFileName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRelativeAssetPath File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
getRelativeAssetPath
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
public void onReceive(Context ctx, Intent i) { sendServerPing(); // ping all MUCs. if no ping was received since last attempt, /cycle Iterator<MultiUserChat> muc_it = multiUserChats.values().iterator(); long ts = System.currentTimeMillis(); ContentValues cvR = new ContentValues(); cvR.put(RosterProvider.RosterConstants.STATUS_MESSAGE, mService.getString(R.string.conn_ping_timeout)); cvR.put(RosterProvider.RosterConstants.STATUS_MODE, StatusMode.offline.ordinal()); cvR.put(RosterProvider.RosterConstants.GROUP, RosterProvider.RosterConstants.MUCS); while (muc_it.hasNext()) { MultiUserChat muc = muc_it.next(); if (!muc.isJoined()) continue; Long lastPong = mucLastPong.get(muc.getRoom()); if (mucLastPing > 0 && (lastPong == null || lastPong < mucLastPing)) { debugLog("Ping timeout from " + muc.getRoom()); muc.leave(); upsertRoster(cvR, muc.getRoom()); } else { Ping ping = new Ping(); ping.setType(Type.GET); String jid = muc.getRoom() + "/" + muc.getNickname(); ping.setTo(jid); mPingID = ping.getPacketID(); debugLog("Ping: sending ping to " + jid); mXMPPConnection.sendPacket(ping); } } syncDbRooms(); mucLastPing = ts; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
onReceive
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
private boolean hasOnlyWhiteSpaceSenders() { for (int i = 0; i < mMessages.size(); i++) { Message m = mMessages.get(i); Person sender = m.getSenderPerson(); if (sender != null && !isWhiteSpace(sender.getName())) { return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasOnlyWhiteSpaceSenders File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
hasOnlyWhiteSpaceSenders
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public boolean more() throws JSONException { if(this.usePrevious) { return true; } try { this.reader.mark(1); } catch (IOException e) { throw new JSONException("Unable to preserve stream position", e); } try { // -1 is EOF, but next() can not consume the null character '\0' if(this.reader.read() <= 0) { this.eof = true; return false; } this.reader.reset(); } catch (IOException e) { throw new JSONException("Unable to read the next character from the stream", e); } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: more File: src/main/java/org/json/JSONTokener.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2022-45690
HIGH
7.5
stleary/JSON-java
more
src/main/java/org/json/JSONTokener.java
7a124d857dc8da1165c87fa788e53359a317d0f7
0
Analyze the following code function for security vulnerabilities
public void aliasField(String alias, Class definedIn, String fieldName) { if (fieldAliasingMapper == null) { throw new com.thoughtworks.xstream.InitializationException("No " + FieldAliasingMapper.class.getName() + " available"); } fieldAliasingMapper.addFieldAlias(alias, definedIn, fieldName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aliasField File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
aliasField
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
public void setFilterIds(IssuesRequest request) { List<String> issueIds = new ArrayList<>(); if (request.getThisWeekUnClosedTestPlanIssue()) { issueIds = extIssuesMapper.getTestPlanThisWeekIssue(request.getProjectId()); } else if (request.getAllTestPlanIssue() || request.getUnClosedTestPlanIssue()) { issueIds = extIssuesMapper.getTestPlanIssue(request.getProjectId()); } else { issueIds = Collections.EMPTY_LIST; } Map<String, String> statusMap = customFieldIssuesService.getIssueStatusMap(issueIds, request.getProjectId()); if (MapUtils.isEmpty(statusMap) && CollectionUtils.isNotEmpty(issueIds)) { // 未找到自定义字段状态, 则获取平台状态 IssuesRequest issuesRequest = new IssuesRequest(); issuesRequest.setProjectId(SessionUtils.getCurrentProjectId()); issuesRequest.setFilterIds(issueIds); List<IssuesDao> issues = extIssuesMapper.getIssues(issuesRequest); statusMap = issues.stream().collect(Collectors.toMap(IssuesDao::getId, i -> Optional.ofNullable(i.getPlatformStatus()).orElse("new"))); } if (MapUtils.isEmpty(statusMap)) { request.setFilterIds(issueIds); } else { if (request.getThisWeekUnClosedTestPlanIssue() || request.getUnClosedTestPlanIssue()) { CustomField customField = baseCustomFieldService.getCustomFieldByName(SessionUtils.getCurrentProjectId(), SystemCustomField.ISSUE_STATUS); JSONArray statusArray = JSONArray.parseArray(customField.getOptions()); Map<String, String> tmpStatusMap = statusMap; List<String> unClosedIds = issueIds.stream() .filter(id -> !StringUtils.equals(tmpStatusMap.getOrDefault(id, StringUtils.EMPTY).replaceAll("\"", StringUtils.EMPTY), "closed")) .collect(Collectors.toList()); Iterator<String> iterator = unClosedIds.iterator(); while (iterator.hasNext()) { String unClosedId = iterator.next(); String status = statusMap.getOrDefault(unClosedId, StringUtils.EMPTY).replaceAll("\"", StringUtils.EMPTY); IssueStatus statusEnum = IssueStatus.getEnumByName(status); if (statusEnum == null) { boolean exist = false; for (int i = 0; i < statusArray.size(); i++) { JSONObject statusObj = (JSONObject) statusArray.get(i); if (StringUtils.equals(status, statusObj.get("value").toString())) { exist = true; } } if (!exist) { iterator.remove(); } } } request.setFilterIds(unClosedIds); } else { request.setFilterIds(issueIds); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFilterIds File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
setFilterIds
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
PackageManager getPackageManager(int userId) { return mContext .createContextAsUser(UserHandle.of(userId), 0 /* flags */).getPackageManager(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageManager File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPackageManager
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void performBootDexOpt(PackageParser.Package pkg, int curr, int total) { if (DEBUG_DEXOPT) { Log.i(TAG, "Optimizing app " + curr + " of " + total + ": " + pkg.packageName); } if (!isFirstBoot()) { try { ActivityManagerNative.getDefault().showBootMessage( mContext.getResources().getString(R.string.android_upgrading_apk, curr, total), true); } catch (RemoteException e) { } } PackageParser.Package p = pkg; synchronized (mInstallLock) { mPackageDexOptimizer.performDexOpt(p, null /* instruction sets */, false /* force dex */, false /* defer */, true /* include dependencies */, false /* boot complete */); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performBootDexOpt File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
performBootDexOpt
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Test public void selectStreamTxFailed(TestContext context) { postgresClient().selectStream(Future.failedFuture("failed"), "SELECT 1", context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectStreamTxFailed File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
selectStreamTxFailed
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void attachFile(String space, String page, String name, InputStream is, boolean failIfExists, UsernamePasswordCredentials credentials) throws Exception { attachFile(Collections.singletonList(space), page, name, is, failIfExists, credentials); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachFile File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
attachFile
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
int bindListen() { int ret; if (mSocketState == SocketState.CLOSED) return EBADFD; IBluetooth bluetoothProxy = BluetoothAdapter.getDefaultAdapter().getBluetoothService(null); if (bluetoothProxy == null) { Log.e(TAG, "bindListen fail, reason: bluetooth is off"); return -1; } try { mPfd = bluetoothProxy.createSocketChannel(mType, mServiceName, mUuid, mPort, getSecurityFlags()); } catch (RemoteException e) { Log.e(TAG, Log.getStackTraceString(new Throwable())); return -1; } // read out port number try { synchronized(this) { if (DBG) Log.d(TAG, "bindListen(), SocketState: " + mSocketState + ", mPfd: " + mPfd); if(mSocketState != SocketState.INIT) return EBADFD; if(mPfd == null) return -1; FileDescriptor fd = mPfd.getFileDescriptor(); if (DBG) Log.d(TAG, "bindListen(), new LocalSocket "); mSocket = new LocalSocket(fd); if (DBG) Log.d(TAG, "bindListen(), new LocalSocket.getInputStream() "); mSocketIS = mSocket.getInputStream(); mSocketOS = mSocket.getOutputStream(); } if (DBG) Log.d(TAG, "bindListen(), readInt mSocketIS: " + mSocketIS); int channel = readInt(mSocketIS); synchronized(this) { if(mSocketState == SocketState.INIT) mSocketState = SocketState.LISTENING; } if (DBG) Log.d(TAG, "channel: " + channel); if (mPort == -1) { mPort = channel; } // else ASSERT(mPort == channel) ret = 0; } catch (IOException e) { if (mPfd != null) { try { mPfd.close(); } catch (IOException e1) { Log.e(TAG, "bindListen, close mPfd: " + e1); } mPfd = null; } Log.e(TAG, "bindListen, fail to get port number, exception: " + e); return -1; } return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindListen File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
bindListen
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
public String getFileName() { return file.toAbsolutePath().toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileName File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getFileName
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@Override public void deleteApplicationTemplate(String templateName, String tenantDomain) throws IdentityApplicationManagementException { doDeleteApplicationTemplate(templateName, tenantDomain); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteApplicationTemplate File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framework The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
deleteApplicationTemplate
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@NonNull @Override public Dialog onCreateDialog(Bundle savedInstanceState) { int primaryColor = ThemeColorUtils.primaryColor(getContext()); user = getArguments().getParcelable(ARG_USER); arbitraryDataProvider = new ArbitraryDataProvider(getContext().getContentResolver()); // Inflate the layout for the dialog LayoutInflater inflater = getActivity().getLayoutInflater(); // Setup layout View v = inflater.inflate(R.layout.setup_encryption_dialog, null); textView = v.findViewById(R.id.encryption_status); passphraseTextView = v.findViewById(R.id.encryption_passphrase); passwordField = v.findViewById(R.id.encryption_passwordInput); passwordField.getBackground().setColorFilter(primaryColor, PorterDuff.Mode.SRC_ATOP); Drawable wrappedDrawable = DrawableCompat.wrap(passwordField.getBackground()); DrawableCompat.setTint(wrappedDrawable, primaryColor); passwordField.setBackgroundDrawable(wrappedDrawable); return createDialog(v); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateDialog File: src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-212" ]
CVE-2021-32658
LOW
2.1
nextcloud/android
onCreateDialog
src/main/java/com/owncloud/android/ui/dialog/SetupEncryptionDialogFragment.java
355f3c745b464b741b20a3b96597303490c26333
0
Analyze the following code function for security vulnerabilities
public Document getDocumentAsAuthor(String fullName) throws XWikiException { DocumentReference reference; // We ignore the passed full name if it's null to match behavior of getDocument if (fullName != null) { // Note: We use the CurrentMixed Resolver since we want to use the default page name if the page isn't // specified in the passed string, rather than use the current document's page name. reference = getCurrentMixedDocumentReferenceResolver().resolve(fullName); } else { reference = getDefaultDocumentReferenceResolver().resolve(""); } return getDocumentAsAuthor(reference); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDocumentAsAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getDocumentAsAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public static int rawUncompress(byte[] input, int inputOffset, int inputLength, Object output, int outputOffset) throws IOException { if (input == null || output == null) { throw new NullPointerException("input or output is null"); } return impl.rawUncompress(input, inputOffset, inputLength, output, outputOffset); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rawUncompress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
rawUncompress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
@Override public Descriptors.Descriptor getDescriptorForType() { throw new UnsupportedOperationException("getDescriptorForType() called on FieldSet object"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDescriptorForType File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
getDescriptorForType
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
public String formatDate(Date date, String format, XWikiContext context) { if (date == null) { return ""; } String xformat = format; String defaultFormat = "yyyy/MM/dd HH:mm"; if (format == null) { xformat = getXWikiPreference("dateformat", defaultFormat, context); } try { DateFormatSymbols formatSymbols = null; try { String language = getLanguagePreference(context); formatSymbols = new DateFormatSymbols(new Locale(language)); } catch (Exception e2) { String language = getXWikiPreference("default_language", context); if ((language != null) && (!language.equals(""))) { formatSymbols = new DateFormatSymbols(new Locale(language)); } } SimpleDateFormat sdf; if (formatSymbols != null) { sdf = new SimpleDateFormat(xformat, formatSymbols); } else { sdf = new SimpleDateFormat(xformat); } try { sdf.setTimeZone(TimeZone.getTimeZone(getUserTimeZone(context))); } catch (Exception e) { } return sdf.format(date); } catch (Exception e) { LOGGER.info("Failed to format date [" + date + "] with pattern [" + xformat + "]: " + e.getMessage()); if (format == null) { if (xformat.equals(defaultFormat)) { return date.toString(); } else { return formatDate(date, defaultFormat, context); } } else { return formatDate(date, null, context); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatDate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
formatDate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void setAll(boolean all) { this.all = all; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAll File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34602
HIGH
7.5
jeecgboot/jeecg-boot
setAll
jeecg-boot-base-core/src/main/java/org/jeecg/common/util/security/AbstractQueryBlackListHandler.java
dd7bf104e7ed59142909567ecd004335c3442ec5
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAntiAliasingSupported() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAntiAliasingSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isAntiAliasingSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void enforceShortcutCountsBeforeOperation(List<ShortcutInfo> newList, @ShortcutOperation int operation) { final ShortcutService service = mShortcutUser.mService; // Current # of dynamic / manifest shortcuts for each activity. // (If it's for update, then don't count dynamic shortcuts, since they'll be replaced // anyway.) final ArrayMap<ComponentName, Integer> counts = new ArrayMap<>(4); forEachShortcut(shortcut -> { if (shortcut.isManifestShortcut()) { incrementCountForActivity(counts, shortcut.getActivity(), 1); } else if (shortcut.isDynamic() && (operation != ShortcutService.OPERATION_SET)) { incrementCountForActivity(counts, shortcut.getActivity(), 1); } }); for (int i = newList.size() - 1; i >= 0; i--) { final ShortcutInfo newShortcut = newList.get(i); final ComponentName newActivity = newShortcut.getActivity(); if (newActivity == null) { if (operation != ShortcutService.OPERATION_UPDATE) { service.wtf("Activity must not be null at this point"); continue; // Just ignore this invalid case. } continue; // Activity can be null for update. } final ShortcutInfo original = findShortcutById(newShortcut.getId()); if (original == null) { if (operation == ShortcutService.OPERATION_UPDATE) { continue; // When updating, ignore if there's no target. } // Add() or set(), and there's no existing shortcut with the same ID. We're // simply publishing (as opposed to updating) this shortcut, so just +1. incrementCountForActivity(counts, newActivity, 1); continue; } if (original.isFloating() && (operation == ShortcutService.OPERATION_UPDATE)) { // Updating floating shortcuts doesn't affect the count, so ignore. continue; } // If it's add() or update(), then need to decrement for the previous activity. // Skip it for set() since it's already been taken care of by not counting the original // dynamic shortcuts in the first loop. if (operation != ShortcutService.OPERATION_SET) { final ComponentName oldActivity = original.getActivity(); if (!original.isFloating()) { incrementCountForActivity(counts, oldActivity, -1); } } incrementCountForActivity(counts, newActivity, 1); } // Then make sure none of the activities have more than the max number of shortcuts. for (int i = counts.size() - 1; i >= 0; i--) { service.enforceMaxActivityShortcuts(counts.valueAt(i)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceShortcutCountsBeforeOperation File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
enforceShortcutCountsBeforeOperation
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
void scheduleNextFullBackupJob(long transportMinLatency) { synchronized (mQueueLock) { if (mFullBackupQueue.size() > 0) { // schedule the next job at the point in the future when the least-recently // backed up app comes due for backup again; or immediately if it's already // due. final long upcomingLastBackup = mFullBackupQueue.get(0).lastBackup; final long timeSinceLast = System.currentTimeMillis() - upcomingLastBackup; final long appLatency = (timeSinceLast < MIN_FULL_BACKUP_INTERVAL) ? (MIN_FULL_BACKUP_INTERVAL - timeSinceLast) : 0; final long latency = Math.max(transportMinLatency, appLatency); Runnable r = new Runnable() { @Override public void run() { FullBackupJob.schedule(mContext, latency); } }; mBackupHandler.postDelayed(r, 2500); } else { if (DEBUG_SCHEDULING) { Slog.i(TAG, "Full backup queue empty; not scheduling"); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleNextFullBackupJob File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
scheduleNextFullBackupJob
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override public List<KBTemplate> findAll() { return findAll(QueryUtil.ALL_POS, QueryUtil.ALL_POS, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAll File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findAll
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public void persistentlyCacheResult(String cacheName, String tableName, CQLWrapper filter, Handler<AsyncResult<Integer>> replyHandler){ String where = ""; if(filter != null){ where = filter.toString(); } String q = "SELECT * FROM " + schemaName + DOT + tableName + SPACE + where; persistentlyCacheResult(cacheName, q, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: persistentlyCacheResult File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
persistentlyCacheResult
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private void pushAllMeteredRestrictedPackages() { synchronized (getLockObject()) { final List<UserInfo> users = mUserManager.getUsers(); for (int i = users.size() - 1; i >= 0; --i) { final int userId = users.get(i).id; mInjector.getNetworkPolicyManagerInternal().setMeteredRestrictedPackagesAsync( getMeteredDisabledPackages(userId), userId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushAllMeteredRestrictedPackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
pushAllMeteredRestrictedPackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private static int safeSubtract(int a, int b) { int diff = a - b; if (b < 0 && diff < a) return Integer.MAX_VALUE; if (b > 0 && diff > a) return Integer.MIN_VALUE; return diff; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: safeSubtract File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
safeSubtract
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
public void setIndexMissingFields(IndexEnabledEnum theIndexMissingFields) { Validate.notNull(theIndexMissingFields, "theIndexMissingFields must not be null"); myIndexMissingFieldsEnabled = theIndexMissingFields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIndexMissingFields File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setIndexMissingFields
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public void dispatchStartedGoingToSleep(int why) { mHandler.sendMessage(mHandler.obtainMessage(MSG_STARTED_GOING_TO_SLEEP, why, 0)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchStartedGoingToSleep File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
dispatchStartedGoingToSleep
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private static WeakHashMap<Class<?>, ObjectStreamClass> getCache() { ThreadLocal<WeakHashMap<Class<?>, ObjectStreamClass>> tls = storage.get(); if (tls == null) { tls = new ThreadLocal<WeakHashMap<Class<?>, ObjectStreamClass>>() { public WeakHashMap<Class<?>, ObjectStreamClass> initialValue() { return new WeakHashMap<Class<?>, ObjectStreamClass>(); } }; storage = new SoftReference<ThreadLocal<WeakHashMap<Class<?>, ObjectStreamClass>>>(tls); } return tls.get(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCache File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
getCache
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void initExecuteTimes() { List<String> apiScenarioIds = extApiScenarioMapper.selectIdsByExecuteTimeIsNull(); Map<String, Long> scenarioIdMap = new HashMap<>(); List<ApiReportCountDTO> reportCount = apiScenarioReportService.countByApiScenarioId(); for (ApiReportCountDTO dto : reportCount) { scenarioIdMap.put(dto.getId(), dto.getCountNum()); } for (String id : apiScenarioIds) { int count = 0; if (scenarioIdMap.containsKey(id)) { Long countNum = scenarioIdMap.get(id); if (countNum != null) { count = countNum.intValue(); } } ApiScenarioWithBLOBs apiScenario = new ApiScenarioWithBLOBs(); apiScenario.setId(id); apiScenario.setExecuteTimes(count); apiScenarioMapper.updateByPrimaryKeySelective(apiScenario); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initExecuteTimes File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
initExecuteTimes
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice<ResolveInfo> queryIntentComponentsForIntentSender( IIntentSender pendingResult, int matchFlags) { enforceCallingPermission(Manifest.permission.GET_INTENT_SENDER_INTENT, "queryIntentComponentsForIntentSender()"); Objects.requireNonNull(pendingResult); final PendingIntentRecord res; try { res = (PendingIntentRecord) pendingResult; } catch (ClassCastException e) { return null; } final Intent intent = res.key.requestIntent; if (intent == null) { return null; } final int userId = res.key.userId; final int uid = res.uid; final String resolvedType = res.key.requestResolvedType; switch (res.key.type) { case ActivityManager.INTENT_SENDER_ACTIVITY: return new ParceledListSlice<>(mPackageManagerInt.queryIntentActivities( intent, resolvedType, matchFlags, uid, userId)); case ActivityManager.INTENT_SENDER_SERVICE: case ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE: return new ParceledListSlice<>(mPackageManagerInt.queryIntentServices( intent, matchFlags, uid, userId)); case ActivityManager.INTENT_SENDER_BROADCAST: return new ParceledListSlice<>(mPackageManagerInt.queryIntentReceivers( intent, resolvedType, matchFlags, uid, userId, false)); default: // ActivityManager.INTENT_SENDER_ACTIVITY_RESULT throw new IllegalStateException("Unsupported intent sender type: " + res.key.type); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryIntentComponentsForIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
queryIntentComponentsForIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void realDownloadWithMultiConnectionFromResume(final int connectionCount, List<ConnectionModel> modelList) throws InterruptedException { if (connectionCount <= 1 || modelList.size() != connectionCount) { throw new IllegalArgumentException(); } fetchWithMultipleConnection(modelList, model.getTotal()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: realDownloadWithMultiConnectionFromResume File: library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
realDownloadWithMultiConnectionFromResume
library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
public boolean isParameterized() { return getProperty(ParametersDefinitionProperty.class) != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isParameterized File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
isParameterized
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") int getUidStateLocked(int uid) { return mProcessList.getUidProcStateLOSP(uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidStateLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getUidStateLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@GuardedBy({"this", "mProcLock"}) final void setUidTempAllowlistStateLSP(int uid, boolean onAllowlist) { mOomAdjuster.setUidTempAllowlistStateLSP(uid, onAllowlist); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUidTempAllowlistStateLSP File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setUidTempAllowlistStateLSP
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void setBookshelfBean(BookmarkBean bookshelfBean) { this.bookmarkBean = bookshelfBean; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBookshelfBean File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
setBookshelfBean
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public static void merge(@NonNull Bundle dest, @Nullable Bundle in) { Preconditions.checkNotNull(dest); Preconditions.checkArgument(dest != in); if (in == null) { return; } for (String key : in.keySet()) { if (in.getBoolean(key, false)) { dest.putBoolean(key, true); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: merge File: services/core/java/com/android/server/pm/UserRestrictionsUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
merge
services/core/java/com/android/server/pm/UserRestrictionsUtils.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
@Override public List<Group> getEmptyGroups(Context context) throws SQLException { return groupDAO.getEmptyGroups(context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEmptyGroups File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
getEmptyGroups
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
@Override public int getFrontActivityScreenCompatMode() { enforceNotIsolatedCaller("getFrontActivityScreenCompatMode"); synchronized (mGlobalLock) { final Task rootTask = getTopDisplayFocusedRootTask(); final ActivityRecord r = rootTask != null ? rootTask.topRunningActivity() : null; if (r == null) { return ActivityManager.COMPAT_MODE_UNKNOWN; } return mCompatModePackages.computeCompatModeLocked(r.info.applicationInfo); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFrontActivityScreenCompatMode File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getFrontActivityScreenCompatMode
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public XWikiLock loadLock(long docId, XWikiContext inputxcontext, boolean bTransaction) throws XWikiException { return executeRead(inputxcontext, session -> { try { XWikiLock lock = null; Query<Long> query = session .createQuery("select lock.docId from XWikiLock as lock where lock.docId = :docId", Long.class); query.setParameter("docId", docId); if (query.uniqueResult() != null) { lock = new XWikiLock(); session.load(lock, Long.valueOf(docId)); } return lock; } catch (Exception e) { throw new XWikiException(XWikiException.MODULE_XWIKI_STORE, XWikiException.ERROR_XWIKI_STORE_HIBERNATE_LOADING_LOCK, "Exception while loading lock", e); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadLock File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
loadLock
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Pure public @Nullable InputStream getUnicodeStream(@Positive int columnIndex) throws SQLException { connection.getLogger().log(Level.FINEST, " getUnicodeStream columnIndex: {0}", columnIndex); byte[] value = getRawValue(columnIndex); if (value == null) { return null; } // Version 7.2 supports AsciiStream for all the PG text types // As the spec/javadoc for this method indicate this is to be used for // large text values (i.e. LONGVARCHAR) PG doesn't have a separate // long string datatype, but with toast the text datatype is capable of // handling very large values. Thus the implementation ends up calling // getString() since there is no current way to stream the value from the server String stringValue = castNonNull(getString(columnIndex)); return new ByteArrayInputStream(stringValue.getBytes(StandardCharsets.UTF_8)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUnicodeStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getUnicodeStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private Pair<Integer, String> verifyReplacingVersionCodeForApex(PackageInfoLite pkgLite, long requiredInstalledVersionCode, int installFlags) { String packageName = pkgLite.packageName; final PackageInfo activePackage = mApexManager.getPackageInfo(packageName, ApexManager.MATCH_ACTIVE_PACKAGE); if (activePackage == null) { String errorMsg = "Attempting to install new APEX package " + packageName; Slog.w(TAG, errorMsg); return Pair.create(PackageManager.INSTALL_FAILED_PACKAGE_CHANGED, errorMsg); } final long activeVersion = activePackage.getLongVersionCode(); if (requiredInstalledVersionCode != PackageManager.VERSION_CODE_HIGHEST && activeVersion != requiredInstalledVersionCode) { String errorMsg = "Installed version of APEX package " + packageName + " does not match required. Active version: " + activeVersion + " required: " + requiredInstalledVersionCode; Slog.w(TAG, errorMsg); return Pair.create(PackageManager.INSTALL_FAILED_WRONG_INSTALLED_VERSION, errorMsg); } final boolean isAppDebuggable = (activePackage.applicationInfo.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0; final long newVersionCode = pkgLite.getLongVersionCode(); if (!PackageManagerServiceUtils.isDowngradePermitted(installFlags, isAppDebuggable) && newVersionCode < activeVersion) { String errorMsg = "Downgrade of APEX package " + packageName + " is not allowed. Active version: " + activeVersion + " attempted: " + newVersionCode; Slog.w(TAG, errorMsg); return Pair.create(PackageManager.INSTALL_FAILED_VERSION_DOWNGRADE, errorMsg); } return Pair.create(PackageManager.INSTALL_SUCCEEDED, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyReplacingVersionCodeForApex File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
verifyReplacingVersionCodeForApex
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
void dispatchWallpaperVisibility(final WindowState wallpaper, final boolean visible) { // Only send notification if the visibility actually changed and we are not trying to hide // the wallpaper when we are deferring hiding of the wallpaper. if (wallpaper.mWallpaperVisible != visible && (mDeferredHideWallpaper == null || visible)) { wallpaper.mWallpaperVisible = visible; try { if (DEBUG_VISIBILITY || DEBUG_WALLPAPER_LIGHT) Slog.v(TAG, "Updating vis of wallpaper " + wallpaper + ": " + visible + " from:\n" + Debug.getCallers(4, " ")); wallpaper.mClient.dispatchAppVisibility(visible); } catch (RemoteException e) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchWallpaperVisibility File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dispatchWallpaperVisibility
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@NonNull XmlBlock openXmlBlockAsset(int cookie, @NonNull String fileName) throws IOException { Objects.requireNonNull(fileName, "fileName"); synchronized (this) { ensureOpenLocked(); final long xmlBlock = nativeOpenXmlAsset(mObject, cookie, fileName); if (xmlBlock == 0) { throw new FileNotFoundException("Asset XML file: " + fileName); } final XmlBlock block = new XmlBlock(this, xmlBlock); incRefsLocked(block.hashCode()); return block; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openXmlBlockAsset File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
openXmlBlockAsset
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public ActivityImpl[] insertTasksBefore(String procDefId, String procInsId, String targetTaskDefinitionKey, Map<String, Object> variables, String... assignees) { ProcessDefinitionEntity procDef = (ProcessDefinitionEntity)repositoryService.getProcessDefinition(procDefId); return cloneAndMakeChain(procDef, procInsId, targetTaskDefinitionKey, targetTaskDefinitionKey, variables, assignees); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: insertTasksBefore File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
insertTasksBefore
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0
Analyze the following code function for security vulnerabilities
void setHoldScreenLocked(final Session newHoldScreen) { final boolean hold = newHoldScreen != null; if (hold && mHoldingScreenOn != newHoldScreen) { mHoldingScreenWakeLock.setWorkSource(new WorkSource(newHoldScreen.mUid)); } mHoldingScreenOn = newHoldScreen; final boolean state = mHoldingScreenWakeLock.isHeld(); if (hold != state) { if (hold) { mHoldingScreenWakeLock.acquire(); mPolicy.keepScreenOnStartedLw(); } else { mPolicy.keepScreenOnStoppedLw(); mHoldingScreenWakeLock.release(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHoldScreenLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setHoldScreenLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private void upgradeIfNecessaryLocked() { int userVersion = mUserVersion; if (userVersion < 1) { // Assign a proper name for the owner, if not initialized correctly before UserInfo user = mUsers.get(UserHandle.USER_OWNER); if ("Primary".equals(user.name)) { user.name = mContext.getResources().getString(com.android.internal.R.string.owner_name); scheduleWriteUserLocked(user); } userVersion = 1; } if (userVersion < 2) { // Owner should be marked as initialized UserInfo user = mUsers.get(UserHandle.USER_OWNER); if ((user.flags & UserInfo.FLAG_INITIALIZED) == 0) { user.flags |= UserInfo.FLAG_INITIALIZED; scheduleWriteUserLocked(user); } userVersion = 2; } if (userVersion < 4) { userVersion = 4; } if (userVersion < 5) { initDefaultGuestRestrictions(); userVersion = 5; } if (userVersion < USER_VERSION) { Slog.w(LOG_TAG, "User version " + mUserVersion + " didn't upgrade as expected to " + USER_VERSION); } else { mUserVersion = userVersion; writeUserListLocked(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: upgradeIfNecessaryLocked File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
upgradeIfNecessaryLocked
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("ResultOfMethodCallIgnored") private static File toDirectory(String path) { if (path == null) { return null; } File f = new File(path); f.mkdirs(); if (!f.isDirectory()) { return null; } try { return f.getAbsoluteFile(); } catch (Exception ignored) { return f; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDirectory File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
toDirectory
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting public InsertionHandleController getInsertionHandleControllerForTest() { return mInsertionHandleController; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInsertionHandleControllerForTest File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getInsertionHandleControllerForTest
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void attachImeAdapter() { if (mImeAdapter != null && mNativeContentViewCore != 0) { mImeAdapter.attach(nativeGetNativeImeAdapter(mNativeContentViewCore)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachImeAdapter File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
attachImeAdapter
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void resetSimNetworks() { if (mVerboseLoggingEnabled) localLog("resetSimNetworks"); for (WifiConfiguration config : getInternalConfiguredNetworks()) { if (config.enterpriseConfig == null || !config.enterpriseConfig.isAuthenticationSimBased()) { continue; } if (config.enterpriseConfig.getEapMethod() == WifiEnterpriseConfig.Eap.PEAP) { Pair<String, String> currentIdentity = mWifiCarrierInfoManager.getSimIdentity(config); if (mVerboseLoggingEnabled) { Log.d(TAG, "New identity for config " + config + ": " + currentIdentity); } // Update the loaded config if (currentIdentity == null) { Log.d(TAG, "Identity is null"); } else { config.enterpriseConfig.setIdentity(currentIdentity.first); } // do not reset anonymous identity since it may be dependent on user-entry // (i.e. cannot re-request on every reboot/SIM re-entry) } else { // reset identity as well: supplicant will ask us for it config.enterpriseConfig.setIdentity(""); if (!WifiCarrierInfoManager.isAnonymousAtRealmIdentity( config.enterpriseConfig.getAnonymousIdentity())) { config.enterpriseConfig.setAnonymousIdentity(""); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetSimNetworks File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
resetSimNetworks
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void initDownStates(MotionEvent event) { if (event.getActionMasked() == MotionEvent.ACTION_DOWN) { mOnlyAffordanceInThisMotion = false; mQsTouchAboveFalsingThreshold = mQsFullyExpanded; mDozingOnDown = isDozing(); mCollapsedOnDown = isFullyCollapsed(); mListenForHeadsUp = mCollapsedOnDown && mHeadsUpManager.hasPinnedHeadsUp(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initDownStates File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
initDownStates
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void updatePersistentConfiguration(Configuration values) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updatePersistentConfiguration File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
updatePersistentConfiguration
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public List getCookies() { return this.cookies; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCookies File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
getCookies
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
public static List<String> checkLockedFileBeforeUnzipNonStrict(VFSLeaf zipLeaf, VFSContainer targetDir, Identity identity) { List<String> lockedFiles = new ArrayList<>(); VFSLockManager vfsLockManager = CoreSpringFactory.getImpl(VFSLockManager.class); try(InputStream in = zipLeaf.getInputStream(); net.sf.jazzlib.ZipInputStream oZip = new net.sf.jazzlib.ZipInputStream(in);) { // unzip files net.sf.jazzlib.ZipEntry oEntr = oZip.getNextEntry(); while (oEntr != null) { if (oEntr.getName() != null && !oEntr.getName().startsWith(DIR_NAME__MACOSX)) { if (oEntr.isDirectory()) { // skip MacOSX specific metadata directory // directories aren't locked oZip.closeEntry(); oEntr = oZip.getNextEntry(); continue; } else { // search file VFSContainer createIn = targetDir; String name = oEntr.getName(); // check if entry has directories which did not show up as // directories above int dirSepIndex = name.lastIndexOf('/'); if (dirSepIndex == -1) { // try it windows style, backslash is also valid format dirSepIndex = name.lastIndexOf('\\'); } if (dirSepIndex > 0) { // get subdirs createIn = getAllSubdirs(targetDir, name.substring(0, dirSepIndex), identity, false); if (createIn == null) { //sub directories don't exist, and aren't locked oZip.closeEntry(); oEntr = oZip.getNextEntry(); continue; } name = name.substring(dirSepIndex + 1); } VFSLeaf newEntry = (VFSLeaf)createIn.resolve(name); if(vfsLockManager.isLockedForMe(newEntry, identity, VFSLockApplicationType.vfs, null)) { lockedFiles.add(name); } } } oZip.closeEntry(); oEntr = oZip.getNextEntry(); } } catch (IOException e) { return null; } return lockedFiles; }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-39180 - Severity: HIGH - CVSS Score: 9.0 Description: OO-5549: check parent by unzip Function: checkLockedFileBeforeUnzipNonStrict File: src/main/java/org/olat/core/util/ZipUtil.java Repository: OpenOLAT Fixed Code: public static List<String> checkLockedFileBeforeUnzipNonStrict(VFSLeaf zipLeaf, VFSContainer targetDir, Identity identity) { List<String> lockedFiles = new ArrayList<>(); VFSLockManager vfsLockManager = CoreSpringFactory.getImpl(VFSLockManager.class); try(InputStream in = zipLeaf.getInputStream(); net.sf.jazzlib.ZipInputStream oZip = new net.sf.jazzlib.ZipInputStream(in);) { // unzip files net.sf.jazzlib.ZipEntry oEntr = oZip.getNextEntry(); while (oEntr != null) { if (oEntr.getName() != null && !oEntr.getName().startsWith(DIR_NAME__MACOSX)) { if (oEntr.isDirectory()) { // skip MacOSX specific metadata directory // directories aren't locked oZip.closeEntry(); oEntr = oZip.getNextEntry();//TODO zip continue; } else { // search file VFSContainer createIn = targetDir; String name = oEntr.getName(); // check if entry has directories which did not show up as // directories above int dirSepIndex = name.lastIndexOf('/'); if (dirSepIndex == -1) { // try it windows style, backslash is also valid format dirSepIndex = name.lastIndexOf('\\'); } if (dirSepIndex > 0) { // get subdirs createIn = getAllSubdirs(targetDir, name.substring(0, dirSepIndex), identity, false); if (createIn == null) { //sub directories don't exist, and aren't locked oZip.closeEntry(); oEntr = oZip.getNextEntry(); continue; } name = name.substring(dirSepIndex + 1); } VFSLeaf newEntry = (VFSLeaf)createIn.resolve(name); if(vfsLockManager.isLockedForMe(newEntry, identity, VFSLockApplicationType.vfs, null)) { lockedFiles.add(name); } } } oZip.closeEntry(); oEntr = oZip.getNextEntry(); } } catch (IOException e) { return null; } return lockedFiles; }
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
checkLockedFileBeforeUnzipNonStrict
src/main/java/org/olat/core/util/ZipUtil.java
5668a41ab3f1753102a89757be013487544279d5
1
Analyze the following code function for security vulnerabilities
TaskRecord anyTaskForIdLocked(int id, boolean restoreFromRecents) { int numDisplays = mActivityDisplays.size(); for (int displayNdx = 0; displayNdx < numDisplays; ++displayNdx) { ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks; for (int stackNdx = stacks.size() - 1; stackNdx >= 0; --stackNdx) { ActivityStack stack = stacks.get(stackNdx); TaskRecord task = stack.taskForIdLocked(id); if (task != null) { return task; } } } // Don't give up! Look in recents. if (DEBUG_RECENTS) Slog.v(TAG_RECENTS, "Looking for task id=" + id + " in recents"); TaskRecord task = mRecentTasks.taskForIdLocked(id); if (task == null) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "\tDidn't find task id=" + id + " in recents"); return null; } if (!restoreFromRecents) { return task; } if (!restoreRecentTaskLocked(task)) { if (DEBUG_RECENTS) Slog.w(TAG_RECENTS, "Couldn't restore task id=" + id + " found in recents"); return null; } if (DEBUG_RECENTS) Slog.w(TAG_RECENTS, "Restored task id=" + id + " from in recents"); return task; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: anyTaskForIdLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
anyTaskForIdLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public static long getLong(long[] data, long index) { return PlatformDependent0.getLong(data, index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLong File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
getLong
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public void setSubtitleTitle(final String subtitleTitle) { m_subtitle.setTitle(subtitleTitle); m_subtitle.setTitleGenerator(new I_TitleGenerator() { public String getTitle(String originalText) { return subtitleTitle; } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSubtitleTitle File: src-gwt/org/opencms/ade/galleries/client/ui/CmsResultItemWidget.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-31544
MEDIUM
5.4
alkacon/opencms-core
setSubtitleTitle
src-gwt/org/opencms/ade/galleries/client/ui/CmsResultItemWidget.java
21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e
0
Analyze the following code function for security vulnerabilities
private String getAcquiredString(int acquireInfo) { switch (acquireInfo) { case FINGERPRINT_ACQUIRED_GOOD: return null; case FINGERPRINT_ACQUIRED_PARTIAL: return mContext.getString( com.android.internal.R.string.fingerprint_acquired_partial); case FINGERPRINT_ACQUIRED_INSUFFICIENT: return mContext.getString( com.android.internal.R.string.fingerprint_acquired_insufficient); case FINGERPRINT_ACQUIRED_IMAGER_DIRTY: return mContext.getString( com.android.internal.R.string.fingerprint_acquired_imager_dirty); case FINGERPRINT_ACQUIRED_TOO_SLOW: return mContext.getString( com.android.internal.R.string.fingerprint_acquired_too_slow); case FINGERPRINT_ACQUIRED_TOO_FAST: return mContext.getString( com.android.internal.R.string.fingerprint_acquired_too_fast); default: if (acquireInfo >= FINGERPRINT_ACQUIRED_VENDOR_BASE) { int msgNumber = acquireInfo - FINGERPRINT_ACQUIRED_VENDOR_BASE; String[] msgArray = mContext.getResources().getStringArray( com.android.internal.R.array.fingerprint_acquired_vendor); if (msgNumber < msgArray.length) { return msgArray[msgNumber]; } } return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAcquiredString File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getAcquiredString
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override void detachActivitiesLocked(ActivityStack stack) { super.detachActivitiesLocked(stack); if (mVirtualDisplay != null) { mVirtualDisplay.release(); mVirtualDisplay = null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: detachActivitiesLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
detachActivitiesLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public void setPackageLicense(String packageLicense) { this.packageLicense = packageLicense; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageLicense File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
setPackageLicense
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public Object construct(Node node) { return ((OneConstructor)constructor).construct(node); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: construct File: server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21249
MEDIUM
6.5
theonedev/onedev
construct
server-core/src/main/java/io/onedev/server/migration/VersionedYamlDoc.java
d6fc4212b1ac1e9bbe3ce444e95f9af1e3ab8b66
0
Analyze the following code function for security vulnerabilities
public static String absPath(Class<?> base, String pckgname) { String rcnm = base.getName(); rcnm = rcnm.substring(0, rcnm.lastIndexOf(".")); String ppath = rcnm.replace(".", "/"); String path = ppath + "/" + pckgname; if (path.endsWith("/.")) { path = path.substring(0, path.length()-2); } return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: absPath File: src/main/java/org/lemsml/jlems/io/util/JUtil.java Repository: LEMS/jLEMS The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4583
HIGH
8.8
LEMS/jLEMS
absPath
src/main/java/org/lemsml/jlems/io/util/JUtil.java
8c224637d7d561076364a9e3c2c375daeaf463dc
0
Analyze the following code function for security vulnerabilities
ActiveAdmin getDefaultDeviceOwnerLocked(@UserIdInt int userId) { ensureLocked(); ComponentName doComponent = mOwners.getDeviceOwnerComponent(); if (mOwners.getDeviceOwnerType(doComponent.getPackageName()) == DEFAULT_DEVICE_OWNER) { ActiveAdmin doAdmin = getUserData(userId).mAdminMap.get(doComponent); return doAdmin; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDeviceOwnerLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getDefaultDeviceOwnerLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static @Nullable String extractVolumePath(@Nullable String data) { if (data == null) return null; final Matcher matcher = PATTERN_RELATIVE_PATH.matcher(data); if (matcher.find()) { return data.substring(0, matcher.end()); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractVolumePath File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
extractVolumePath
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
@Override public void onUserInfoChanged(int userId) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserInfoChanged File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onUserInfoChanged
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public void onFocusChange(View view, boolean bln) { if (bln) { /** * whenever the base view receives focus we automatically block * possible native subviews from gaining focus. */ blockNativeFocusAll(true); if (this.lastDirectionalKeyEventReceivedByWrapper != 0) { /** * because we also consume any key event in the OnKeyListener of * the native wrappers, we have to simulate key events to make * Codename One move the focus to the next component. */ if (myView == null) { return; } if (!myView.getAndroidView().isInTouchMode()) { switch (lastDirectionalKeyEventReceivedByWrapper) { case AndroidImplementation.DROID_IMPL_KEY_LEFT: case AndroidImplementation.DROID_IMPL_KEY_RIGHT: case AndroidImplementation.DROID_IMPL_KEY_UP: case AndroidImplementation.DROID_IMPL_KEY_DOWN: Display.getInstance().keyPressed(lastDirectionalKeyEventReceivedByWrapper); Display.getInstance().keyReleased(lastDirectionalKeyEventReceivedByWrapper); break; default: Log.d("Codename One", "unexpected keycode: " + lastDirectionalKeyEventReceivedByWrapper); break; } } else { Log.d("Codename One", "base view gained focus but no key event to process."); } lastDirectionalKeyEventReceivedByWrapper = 0; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFocusChange File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onFocusChange
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public static RequestHeaders toArmeria(ChannelHandlerContext ctx, HttpRequest in, ServerConfig cfg) throws URISyntaxException { final URI requestTargetUri = toUri(in); final io.netty.handler.codec.http.HttpHeaders inHeaders = in.headers(); final RequestHeadersBuilder out = RequestHeaders.builder(); out.sizeHint(inHeaders.size()); out.add(HttpHeaderNames.METHOD, in.method().name()); out.add(HttpHeaderNames.PATH, toHttp2Path(requestTargetUri)); addHttp2Scheme(inHeaders, requestTargetUri, out); if (!isOriginForm(requestTargetUri) && !isAsteriskForm(requestTargetUri)) { // Attempt to take from HOST header before taking from the request-line final String host = inHeaders.getAsString(HttpHeaderNames.HOST); addHttp2Authority(host == null || host.isEmpty() ? requestTargetUri.getAuthority() : host, out); } if (out.authority() == null) { final String defaultHostname = cfg.defaultVirtualHost().defaultHostname(); final int port = ((InetSocketAddress) ctx.channel().localAddress()).getPort(); out.add(HttpHeaderNames.AUTHORITY, defaultHostname + ':' + port); } // Add the HTTP headers which have not been consumed above toArmeria(inHeaders, out); return out.build(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toArmeria File: core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
toArmeria
core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public String getAlwaysOnVpnPackage(ComponentName admin) throws SecurityException { Objects.requireNonNull(admin, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(admin); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || isProfileOwner(caller)); return mInjector.binderWithCleanCallingIdentity( () -> mInjector.getVpnManager().getAlwaysOnVpnPackageForUser(caller.getUserId())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAlwaysOnVpnPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAlwaysOnVpnPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public Pipeline rescheduleTestPipeline(String pipelineName, String stageName, String userName) throws SQLException { String[] jobConfigNames = new String[]{}; PipelineConfig pipelineConfig = configurePipeline(pipelineName, stageName, jobConfigNames); BuildCause buildCause = BuildCause.createManualForced(modifyOneFile(new MaterialConfigConverter().toMaterials(pipelineConfig.materialConfigs()), ModificationsMother.currentRevision()), Username.ANONYMOUS); Pipeline pipeline = instanceFactory.createPipelineInstance(pipelineConfig, buildCause, new DefaultSchedulingContext( GoConstants.DEFAULT_APPROVED_BY), md5, new TimeProvider()); return savePipelineWithStagesAndMaterials(pipeline); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rescheduleTestPipeline File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
rescheduleTestPipeline
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
public Endpoint lookupEndpoint(String nameOrUrl) { String url = null; String alias = null; if (nameOrUrl.startsWith("http://") || nameOrUrl.startsWith("https://")) url = nameOrUrl; else { url = shortName.lookupUrlByName(nameOrUrl); if (url==null) throw new OpenIdException("Cannot find OP URL by name: " + nameOrUrl); alias = shortName.lookupAliasByName(nameOrUrl); } Endpoint endpoint = endpointCache.get(url); if (endpoint!=null && !endpoint.isExpired()) return endpoint; endpoint = requestEndpoint(url, alias==null ? Endpoint.DEFAULT_ALIAS : alias); endpointCache.put(url, endpoint); return endpoint; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lookupEndpoint File: JOpenId/src/org/expressme/openid/OpenIdManager.java Repository: michaelliao/jopenid The code follows secure coding practices.
[ "CWE-208" ]
CVE-2010-10006
LOW
1.4
michaelliao/jopenid
lookupEndpoint
JOpenId/src/org/expressme/openid/OpenIdManager.java
c9baaa976b684637f0d5a50268e91846a7a719ab
0
Analyze the following code function for security vulnerabilities
public void broadcastQosPolicyRequestEvent(String iface, int qosPolicyRequestId, List<QosPolicyRequest> qosPolicyData) { sendMessage(iface, QOS_POLICY_REQUEST_EVENT, qosPolicyRequestId, 0, qosPolicyData); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: broadcastQosPolicyRequestEvent File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
broadcastQosPolicyRequestEvent
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public static void uploadUpdateFile( Context context, Account account, OCFile[] existingFiles, Integer behaviour, NameCollisionPolicy nameCollisionPolicy, boolean disableRetries ) { Intent intent = new Intent(context, FileUploader.class); intent.putExtra(FileUploader.KEY_ACCOUNT, account); intent.putExtra(FileUploader.KEY_FILE, existingFiles); intent.putExtra(FileUploader.KEY_LOCAL_BEHAVIOUR, behaviour); intent.putExtra(FileUploader.KEY_NAME_COLLISION_POLICY, nameCollisionPolicy); intent.putExtra(FileUploader.KEY_DISABLE_RETRIES, disableRetries); if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) { context.startForegroundService(intent); } else { context.startService(intent); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uploadUpdateFile File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
uploadUpdateFile
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice<ActivityManager.RecentTaskInfo> getRecentTasks(int maxNum, int flags, int userId) { final int callingUid = Binder.getCallingUid(); userId = mUserController.handleIncomingUser(Binder.getCallingPid(), callingUid, userId, false, ALLOW_FULL_ONLY, "getRecentTasks", null); final boolean includeProfiles = (flags & ActivityManager.RECENT_INCLUDE_PROFILES) != 0; final boolean withExcluded = (flags&ActivityManager.RECENT_WITH_EXCLUDED) != 0; synchronized (this) { final boolean allowed = isGetTasksAllowed("getRecentTasks", Binder.getCallingPid(), callingUid); final boolean detailed = checkCallingPermission( android.Manifest.permission.GET_DETAILED_TASKS) == PackageManager.PERMISSION_GRANTED; if (!isUserRunning(userId, ActivityManager.FLAG_AND_UNLOCKED)) { Slog.i(TAG, "user " + userId + " is still locked. Cannot load recents"); return ParceledListSlice.emptyList(); } mRecentTasks.loadUserRecentsLocked(userId); final int recentsCount = mRecentTasks.size(); ArrayList<ActivityManager.RecentTaskInfo> res = new ArrayList<>(maxNum < recentsCount ? maxNum : recentsCount); final Set<Integer> includedUsers; if (includeProfiles) { includedUsers = mUserController.getProfileIds(userId); } else { includedUsers = new HashSet<>(); } includedUsers.add(Integer.valueOf(userId)); for (int i = 0; i < recentsCount && maxNum > 0; i++) { TaskRecord tr = mRecentTasks.get(i); // Only add calling user or related users recent tasks if (!includedUsers.contains(Integer.valueOf(tr.userId))) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, not user: " + tr); continue; } if (tr.realActivitySuspended) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, activity suspended: " + tr); continue; } // Return the entry if desired by the caller. We always return // the first entry, because callers always expect this to be the // foreground app. We may filter others if the caller has // not supplied RECENT_WITH_EXCLUDED and there is some reason // we should exclude the entry. if (i == 0 || withExcluded || (tr.intent == null) || ((tr.intent.getFlags() & Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS) == 0)) { if (!allowed) { // If the caller doesn't have the GET_TASKS permission, then only // allow them to see a small subset of tasks -- their own and home. if (!tr.isHomeTask() && tr.effectiveUid != callingUid) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, not allowed: " + tr); continue; } } if ((flags & ActivityManager.RECENT_IGNORE_HOME_STACK_TASKS) != 0) { if (tr.stack != null && tr.stack.isHomeStack()) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, home stack task: " + tr); continue; } } if ((flags & ActivityManager.RECENT_INGORE_DOCKED_STACK_TOP_TASK) != 0) { final ActivityStack stack = tr.stack; if (stack != null && stack.isDockedStack() && stack.topTask() == tr) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, top task in docked stack: " + tr); continue; } } if ((flags & ActivityManager.RECENT_INGORE_PINNED_STACK_TASKS) != 0) { if (tr.stack != null && tr.stack.isPinnedStack()) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, pinned stack task: " + tr); continue; } } if (tr.autoRemoveRecents && tr.getTopActivity() == null) { // Don't include auto remove tasks that are finished or finishing. if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, auto-remove without activity: " + tr); continue; } if ((flags&ActivityManager.RECENT_IGNORE_UNAVAILABLE) != 0 && !tr.isAvailable) { if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, unavail real act: " + tr); continue; } if (!tr.mUserSetupComplete) { // Don't include task launched while user is not done setting-up. if (DEBUG_RECENTS) Slog.d(TAG_RECENTS, "Skipping, user setup not complete: " + tr); continue; } ActivityManager.RecentTaskInfo rti = createRecentTaskInfoFromTaskRecord(tr); if (!detailed) { rti.baseIntent.replaceExtras((Bundle)null); } res.add(rti); maxNum--; } } return new ParceledListSlice<>(res); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecentTasks File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
getRecentTasks
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
void reportFocusChangedSerialized(boolean focused) { if (mFocusCallbacks != null) { final int N = mFocusCallbacks.beginBroadcast(); for (int i=0; i<N; i++) { IWindowFocusObserver obs = mFocusCallbacks.getBroadcastItem(i); try { if (focused) { obs.focusGained(mWindowId.asBinder()); } else { obs.focusLost(mWindowId.asBinder()); } } catch (RemoteException e) { } } mFocusCallbacks.finishBroadcast(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportFocusChangedSerialized File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
reportFocusChangedSerialized
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private void migrate95(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("GpgKeys.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { Element contentElement = element.element("content"); byte[] bytes = contentElement.getText().getBytes(StandardCharsets.UTF_8); contentElement.setText(JVM.getBase64Codec().encode(bytes)); } dom.writeToFile(file, false); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate95 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate95
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public final void setRenew(final boolean renew) { this.renew = renew; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRenew File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
setRenew
cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition post(final String path, final Route.Filter filter) { return appendDefinition(POST, path, filter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: post File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
post
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
private void _assertSaltAcceptable(final User details) throws Exception { if (!m_allowUnsalted) { final Password p = details.getPassword(); if (p != null) { if (!p.getSalt()) { throw new IllegalStateException("org.opennms.users.allowUnsaltedPasswords=false, but " + details.getUserId() + " contains an unsalted password."); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _assertSaltAcceptable File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
_assertSaltAcceptable
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
private Either<Exception, AccountBO> getAccountById(final String accountId) { final Optional<AccountBO> account = accountsService.getById(accountId); return account .<Either<Exception, AccountBO>>map(Either::right) .orElseGet(() -> Either.left(new ServiceAuthorizationException(ErrorCode.ACCOUNT_DOES_NOT_EXIST, "Account " + accountId + " does not exist"))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountById File: basic-auth/src/main/java/com/nexblocks/authguard/basic/BasicAuthProvider.java Repository: AuthGuard The code follows secure coding practices.
[ "CWE-287" ]
CVE-2021-45890
HIGH
7.5
AuthGuard
getAccountById
basic-auth/src/main/java/com/nexblocks/authguard/basic/BasicAuthProvider.java
9783b1143da6576028de23e15a1f198b1f937b82
0