instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public boolean optBoolean(String key, boolean defaultValue) { Object o = opt(key); if (o == null) { return defaultValue; } else { try { return doGetBoolean(key, o); } catch (JSONException ex) { throw new RuntimeException(ex); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optBoolean File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optBoolean
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
@Override public void preloadRecentApps() { int msg = MSG_PRELOAD_RECENT_APPS; mHandler.removeMessages(msg); mHandler.sendEmptyMessage(msg); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: preloadRecentApps File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
preloadRecentApps
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private DocumentReferenceResolver<String> getCurrentMixedDocumentReferenceResolver() { if (this.currentMixedDocumentReferenceResolver == null) { this.currentMixedDocumentReferenceResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "currentmixed"); } return this.currentMixedDocumentReferenceResolver; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentMixedDocumentReferenceResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getCurrentMixedDocumentReferenceResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
static android.location.Location extractLocationFromIntent(Intent intent) { if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) { LocationResult locationResult = LocationResult.extractResult(intent); if (locationResult == null) { return null; } return locationResult.getLastLocation(); } else { return intent.getParcelableExtra(FusedLocationProviderApi.KEY_LOCATION_CHANGED); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractLocationFromIntent File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
extractLocationFromIntent
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private int getCredentialOwner(final int userHandle, final boolean parent) { return mInjector.binderWithCleanCallingIdentity(() -> { int effectiveUserHandle = userHandle; if (parent) { UserInfo parentProfile = mUserManager.getProfileParent(userHandle); if (parentProfile != null) { effectiveUserHandle = parentProfile.id; } } return mUserManager.getCredentialOwnerProfile(effectiveUserHandle); }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCredentialOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getCredentialOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void enforceCrossUserPermission(int userHandle, String message) { final int callingUser = UserHandle.getCallingUserId(); if (callingUser != userHandle) { mContext.enforceCallingOrSelfPermission( Manifest.permission.INTERACT_ACROSS_USERS_FULL, message); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceCrossUserPermission File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
enforceCrossUserPermission
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@SuppressLint("NullableCollection") @RequiresPermission(value = MANAGE_DEVICE_POLICY_SECURITY_LOGGING, conditional = true) public @Nullable List<SecurityEvent> retrieveSecurityLogs(@Nullable ComponentName admin) { throwIfParentInstance("retrieveSecurityLogs"); try { ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs( admin, mContext.getPackageName()); if (list != null) { return list.getList(); } else { // Rate limit exceeded. return null; } } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retrieveSecurityLogs File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
retrieveSecurityLogs
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public WifiConfiguration getSavedNetworkForScanDetail(ScanDetail scanDetail) { ScanResult scanResult = scanDetail.getScanResult(); if (scanResult == null) { Log.e(TAG, "No scan result found in scan detail"); return null; } return getSavedNetworkForScanResult(scanResult); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSavedNetworkForScanDetail File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getSavedNetworkForScanDetail
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
protected ID[] checkoutN2NReferenceValue(Field field, Cell cell) { final String val = cell.asString(); Set<ID> ids = new LinkedHashSet<>(); for (String s : val.split(MVAL_SPLIT)) { ID id = checkoutReferenceValue(field, new Cell(s, cell.getRowNo(), cell.getColumnNo())); if (id != null) ids.add(id); } return ids.toArray(new ID[0]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkoutN2NReferenceValue File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
checkoutN2NReferenceValue
src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
Pair<Integer, String> verifyReplacingVersionCode(PackageInfoLite pkgLite, long requiredInstalledVersionCode, int installFlags) { if ((installFlags & PackageManager.INSTALL_APEX) != 0) { return verifyReplacingVersionCodeForApex( pkgLite, requiredInstalledVersionCode, installFlags); } String packageName = pkgLite.packageName; synchronized (mPm.mLock) { // Package which currently owns the data that the new package will own if installed. // If an app is uninstalled while keeping data (e.g. adb uninstall -k), installedPkg // will be null whereas dataOwnerPkg will contain information about the package // which was uninstalled while keeping its data. AndroidPackage dataOwnerPkg = mPm.mPackages.get(packageName); PackageSetting dataOwnerPs = mPm.mSettings.getPackageLPr(packageName); if (dataOwnerPkg == null) { if (dataOwnerPs != null) { dataOwnerPkg = dataOwnerPs.getPkg(); } } if (requiredInstalledVersionCode != PackageManager.VERSION_CODE_HIGHEST) { if (dataOwnerPkg == null) { String errorMsg = "Required installed version code was " + requiredInstalledVersionCode + " but package is not installed"; Slog.w(TAG, errorMsg); return Pair.create( PackageManager.INSTALL_FAILED_WRONG_INSTALLED_VERSION, errorMsg); } if (dataOwnerPkg.getLongVersionCode() != requiredInstalledVersionCode) { String errorMsg = "Required installed version code was " + requiredInstalledVersionCode + " but actual installed version is " + dataOwnerPkg.getLongVersionCode(); Slog.w(TAG, errorMsg); return Pair.create( PackageManager.INSTALL_FAILED_WRONG_INSTALLED_VERSION, errorMsg); } } if (dataOwnerPkg != null && !dataOwnerPkg.isSdkLibrary()) { if (!PackageManagerServiceUtils.isDowngradePermitted(installFlags, dataOwnerPkg.isDebuggable())) { // Downgrade is not permitted; a lower version of the app will not be allowed try { PackageManagerServiceUtils.checkDowngrade(dataOwnerPkg, pkgLite); } catch (PackageManagerException e) { String errorMsg = "Downgrade detected: " + e.getMessage(); Slog.w(TAG, errorMsg); return Pair.create( PackageManager.INSTALL_FAILED_VERSION_DOWNGRADE, errorMsg); } } else if (dataOwnerPs.isSystem()) { // Downgrade is permitted, but system apps can't be downgraded below // the version preloaded onto the system image final PackageSetting disabledPs = mPm.mSettings.getDisabledSystemPkgLPr( dataOwnerPs); if (disabledPs != null) { dataOwnerPkg = disabledPs.getPkg(); } if (!Build.IS_DEBUGGABLE && !dataOwnerPkg.isDebuggable()) { // Only restrict non-debuggable builds and non-debuggable version of the app try { PackageManagerServiceUtils.checkDowngrade(dataOwnerPkg, pkgLite); } catch (PackageManagerException e) { String errorMsg = "System app: " + packageName + " cannot be downgraded to" + " older than its preloaded version on the system" + " image. " + e.getMessage(); Slog.w(TAG, errorMsg); return Pair.create( PackageManager.INSTALL_FAILED_VERSION_DOWNGRADE, errorMsg); } } } } } return Pair.create(PackageManager.INSTALL_SUCCEEDED, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyReplacingVersionCode File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
verifyReplacingVersionCode
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
public String getIdentifier() { return identifier; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIdentifier File: flow-server/src/main/java/com/vaadin/flow/server/HandlerHelper.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
getIdentifier
flow-server/src/main/java/com/vaadin/flow/server/HandlerHelper.java
e0dcaf86b63dbcab3adbbe107d1c49d490ead8eb
0
Analyze the following code function for security vulnerabilities
@Override public void kill(@NotNull Throwable throwable) { killed = throwable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: kill File: server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java Repository: crate The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
kill
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
0
Analyze the following code function for security vulnerabilities
public Attachment getAttachment(String filename) { XWikiAttachment attach = this.getDoc().getAttachment(filename); if (attach == null) { return null; } else { return new Attachment(this, attach, getXWikiContext()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getAttachment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
protected final synchronized <T extends Describable<T>> void addToList( T item, List<T> collection ) throws IOException { for( int i=0; i<collection.size(); i++ ) { if(collection.get(i).getDescriptor()==item.getDescriptor()) { // replace collection.set(i,item); save(); return; } } // add collection.add(item); save(); updateTransientActions(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addToList File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
addToList
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public static KeyRequestInfo fromXML(String xml) throws Exception { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); DocumentBuilder builder = factory.newDocumentBuilder(); Document document = builder.parse(new InputSource(new StringReader(xml))); Element element = document.getDocumentElement(); return fromDOM(element); }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-2414 - Severity: HIGH - CVSS Score: 7.5 Description: Disable access to external entities when parsing XML This reduces the vulnerability of XML parsers to XXE (XML external entity) injection. The best way to prevent XXE is to stop using XML altogether, which we do plan to do. Until that happens I consider it worthwhile to tighten the security here though. Function: fromXML File: base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java Repository: dogtagpki/pki Fixed Code: public static KeyRequestInfo fromXML(String xml) throws Exception { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); DocumentBuilder builder = factory.newDocumentBuilder(); Document document = builder.parse(new InputSource(new StringReader(xml))); Element element = document.getDocumentElement(); return fromDOM(element); }
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
fromXML
base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
1
Analyze the following code function for security vulnerabilities
public void updateNClob(String columnName, @Nullable Reader reader) throws SQLException { updateNClob(findColumn(columnName), reader); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNClob File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateNClob
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public boolean isStoreSourceUri() { return myStoreSourceUri; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isStoreSourceUri File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isStoreSourceUri
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
void callHideTextEditor() { super.hideTextEditor(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: callHideTextEditor File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
callHideTextEditor
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void deselectAll() { getSelectionModel().deselectAll(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deselectAll File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
deselectAll
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public boolean onOptionsItemSelected(MenuItem item) { final int itemId = item.getItemId(); if (itemId == MENU_REMOVE_USER) { onRemoveUserClicked(UserHandle.myUserId()); return true; } else { return super.onOptionsItemSelected(item); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onOptionsItemSelected File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
onOptionsItemSelected
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
private List<SFile> includePath() { // ::comment when __CORE__ return SecurityUtils.getPath(SecurityUtils.PATHS_INCLUDES); // ::done // ::uncomment when __CORE__ // return Collections.emptyList(); // ::done }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: includePath File: src/net/sourceforge/plantuml/preproc/ImportedFiles.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
includePath
src/net/sourceforge/plantuml/preproc/ImportedFiles.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public void setCrossProfileCallerIdDisabled(ComponentName who, boolean disabled) { if (!mHasFeature) { return; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization(isProfileOwner(caller)); synchronized (getLockObject()) { ActiveAdmin admin = getProfileOwnerLocked(caller); if (admin.disableCallerId != disabled) { admin.disableCallerId = disabled; saveSettingsLocked(caller.getUserId()); } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_CROSS_PROFILE_CALLER_ID_DISABLED) .setAdmin(who) .setBoolean(disabled) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCrossProfileCallerIdDisabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setCrossProfileCallerIdDisabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void processAnnotations(final Class type) { processAnnotations(new Class[]{type}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAnnotations File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
processAnnotations
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private PollingResult pollWithWorkspace(TaskListener listener, SCM scm, R lb, FilePath ws, WorkspaceList l) throws InterruptedException, IOException { // if doing non-concurrent build, acquire a workspace in a way that causes builds to block for this workspace. // this prevents multiple workspaces of the same job --- the behavior of Hudson < 1.319. // // OTOH, if a concurrent build is chosen, the user is willing to create a multiple workspace, // so better throughput is achieved over time (modulo the initial cost of creating that many workspaces) // by having multiple workspaces WorkspaceList.Lease lease = l.acquire(ws, !concurrentBuild); Launcher launcher = ws.createLauncher(listener).decorateByEnv(getEnvironment(lb.getBuiltOn(),listener)); try { LOGGER.fine("Polling SCM changes of " + getName()); if (pollingBaseline==null) // see NOTE-NO-BASELINE above calcPollingBaseline(lb,launcher,listener); PollingResult r = scm.poll(this, launcher, ws, listener, pollingBaseline); pollingBaseline = r.remote; return r; } finally { lease.release(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pollWithWorkspace File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
pollWithWorkspace
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public boolean isInSettings() { return mQsExpanded; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInSettings File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isInSettings
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private void enforceSystemOrSystemUIOrSamePackage(String pkg, String message) { try { checkCallerIsSystemOrSameApp(pkg); } catch (SecurityException e) { getContext().enforceCallingPermission( android.Manifest.permission.STATUS_BAR_SERVICE, message); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceSystemOrSystemUIOrSamePackage File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
enforceSystemOrSystemUIOrSamePackage
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public static Map<String, String> buildHttpHeaders(String url, String appId, String secret) { long currentTimeMillis = System.currentTimeMillis(); String timestamp = String.valueOf(currentTimeMillis); String pathWithQuery = url2PathWithQuery(url); String signature = signature(timestamp, pathWithQuery, secret); Map<String, String> headers = Maps.newHashMap(); headers.put(HTTP_HEADER_AUTHORIZATION, String.format(AUTHORIZATION_FORMAT, appId, signature)); headers.put(HTTP_HEADER_TIMESTAMP, timestamp); return headers; }
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2020-15170 - Severity: MEDIUM - CVSS Score: 6.8 Description: add access control support for admin service Function: buildHttpHeaders File: apollo-core/src/main/java/com/ctrip/framework/apollo/core/signature/Signature.java Repository: apolloconfig/apollo Fixed Code: public static Map<String, String> buildHttpHeaders(String url, String appId, String secret) { long currentTimeMillis = System.currentTimeMillis(); String timestamp = String.valueOf(currentTimeMillis); String pathWithQuery = url2PathWithQuery(url); String signature = signature(timestamp, pathWithQuery, secret); Map<String, String> headers = Maps.newHashMap(); headers.put(HttpHeaders.AUTHORIZATION, String.format(AUTHORIZATION_FORMAT, appId, signature)); headers.put(HTTP_HEADER_TIMESTAMP, timestamp); return headers; }
[ "CWE-20" ]
CVE-2020-15170
MEDIUM
6.8
apolloconfig/apollo
buildHttpHeaders
apollo-core/src/main/java/com/ctrip/framework/apollo/core/signature/Signature.java
ae9ba6cfd32ed80469f162e5e3583e2477862ddf
1
Analyze the following code function for security vulnerabilities
@Override public void setServiceForeground(ComponentName className, IBinder token, int id, Notification notification, int flags, int foregroundServiceType) { synchronized(this) { mServices.setServiceForegroundLocked(className, token, id, notification, flags, foregroundServiceType); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServiceForeground File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setServiceForeground
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void notifyUiVisibilityChanged(int vis) { try { if (mLastDispatchedSystemUiVisibility != vis) { mWindowManagerService.statusBarVisibilityChanged(vis); mLastDispatchedSystemUiVisibility = vis; } } catch (RemoteException ex) { } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyUiVisibilityChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
notifyUiVisibilityChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static void addEnvParamsFromAssertion(Map envParameters, Assertion assertion, com.sun.identity.saml.assertion.Subject subject) { Set statements = assertion.getStatement(); Statement statement = null; Iterator stmtIter = null; List attrs = null; Iterator attrIter = null; Attribute attribute = null; Element attrValue = null; List attrValues = null; String attrName = null; String attrValueString = null; if ((statements != null) && (!statements.isEmpty())) { stmtIter = statements.iterator(); while (stmtIter.hasNext()) { statement = (Statement) stmtIter.next(); if (statement.getStatementType() == Statement.ATTRIBUTE_STATEMENT) { // check for subject if (!subject.equals( ((AttributeStatement)statement).getSubject())) { continue; } attrs = ((AttributeStatement) statement).getAttribute(); attrIter = attrs.iterator(); while (attrIter.hasNext()) { attribute = (Attribute) attrIter.next(); try { attrValues = attribute.getAttributeValue(); } catch (Exception e) { debug.error("SAMLUtils.addEnvParamsFromAssertion:"+ " cannot obtain attribute value:", e); continue; } attrName = attribute.getAttributeName(); List attrValueList = null; for(Iterator avIter = attrValues.iterator(); avIter.hasNext(); ) { attrValue = (Element) avIter.next(); if (!XMLUtils.hasElementChild(attrValue)) { attrValueString = XMLUtils.getElementValue(attrValue); if (attrValueList == null) { attrValueList = new ArrayList(); } attrValueList.add(attrValueString); } } if (attrValueList != null) { if (debug.messageEnabled()) { debug.message( "SAMLUtils.addEnvParamsFromAssertion:" + " attrName = " + attrName + " attrValue = " + attrValueList); } String[] attrValueStrs = (String[])attrValueList. toArray(new String[attrValueList.size()]); try { envParameters.put(attrName, attrValueStrs); } catch (Exception ex) { if (debug.messageEnabled()) { debug.message( "SAMLUtils.addEnvParamsFromAssertion:", ex); } } } else if (debug.messageEnabled()) { if (debug.messageEnabled()) { debug.message( "SAMLUtils.addEnvParamsFromAssertion:" + " attrName = " + attrName + " has no value"); } } } } // if it's an attribute statement } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addEnvParamsFromAssertion File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
addEnvParamsFromAssertion
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
protected void layoutPeer(){ if (getActivity() == null) { return; } if(!superPeerMode) { // called by Codename One EDT to position the native component. activity.runOnUiThread(new Runnable() { public void run() { if (layoutWrapper != null) { if (v.getVisibility() == View.VISIBLE) { RelativeLayout.LayoutParams layoutParams = layoutWrapper.createMyLayoutParams( AndroidImplementation.AndroidPeer.this.getAbsoluteX(), AndroidImplementation.AndroidPeer.this.getAbsoluteY(), AndroidImplementation.AndroidPeer.this.getWidth(), AndroidImplementation.AndroidPeer.this.getHeight()); layoutWrapper.setLayoutParams(layoutParams); if (AndroidImplementation.this.relativeLayout != null) { AndroidImplementation.this.relativeLayout.requestLayout(); } } } } }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: layoutPeer File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
layoutPeer
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public VerifyCredentialResponse verifyPattern(String pattern, long challenge, int userId) throws RemoteException { return doVerifyPattern(pattern, true, challenge, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyPattern File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
verifyPattern
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
public void close() { this.closed.set(true); if (reconnectThread != null) { reconnectThread.interrupt(); } try { this.messageHandler = null; session.close(); } catch (IOException e) { logger.warn("Unexpected error while closing Web Socket connection to controller", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/WebSocketKieServerControllerClient.java Repository: kiegroup/droolsjbpm-integration The code follows secure coding practices.
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
close
kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/WebSocketKieServerControllerClient.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
0
Analyze the following code function for security vulnerabilities
private void setDisplayNamesOfLocalAuthenticators(ServiceProvider serviceProvider, String tenantDomain) throws IdentityApplicationManagementException { // Set displayName of local authenticators if displayNames are null. LocalAuthenticatorConfig[] localAuthenticatorConfigs = getAllLocalAuthenticators(tenantDomain); if (serviceProvider.getLocalAndOutBoundAuthenticationConfig() == null || localAuthenticatorConfigs == null) { return; } AuthenticationStep[] authSteps = serviceProvider.getLocalAndOutBoundAuthenticationConfig().getAuthenticationSteps(); if (CollectionUtils.isEmpty(Arrays.asList(authSteps))) { return; } for (AuthenticationStep authStep : authSteps) { if (CollectionUtils.isEmpty(Arrays.asList(authStep.getLocalAuthenticatorConfigs()))) { return; } for (LocalAuthenticatorConfig localAuthenticator : authStep.getLocalAuthenticatorConfigs()) { if (localAuthenticator.getDisplayName() == null) { Arrays.stream(localAuthenticatorConfigs).forEach(config -> { if (StringUtils.equals(localAuthenticator.getName(), config.getName())) { localAuthenticator.setDisplayName(config.getDisplayName()); } }); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDisplayNamesOfLocalAuthenticators File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framework The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
setDisplayNamesOfLocalAuthenticators
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
public static List<ProviderStub> getProviderStubs(Collection<Provider> providers,String searchParam, MatchMode mode) { if(mode != null) { org.openmrs.module.htmlformentry.util.Transformer<Provider, ProviderStub> transformer = new ProviderTransformer(); switch (mode) { case START: return (List<ProviderStub>) transformer.transform(providers, startsWith(searchParam)); case END: return (List<ProviderStub>) transformer.transform(providers, endsWith(searchParam)); default: return getProviderStubs(providers); } } return getProviderStubs(providers); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProviderStubs File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getProviderStubs
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
@Override public void serviceException(Throwable e) { // are we a transport exception such as not being able to dispatch // synchronously to a transport if (e instanceof IOException) { serviceTransportException((IOException) e); } else if (e.getClass() == BrokerStoppedException.class) { // Handle the case where the broker is stopped // But the client is still connected. if (!stopping.get()) { SERVICELOG.debug("Broker has been stopped. Notifying client and closing his connection."); ConnectionError ce = new ConnectionError(); ce.setException(e); dispatchSync(ce); // Record the error that caused the transport to stop this.stopError = e; // Wait a little bit to try to get the output buffer to flush // the exception notification to the client. try { Thread.sleep(500); } catch (InterruptedException ie) { Thread.currentThread().interrupt(); } // Worst case is we just kill the connection before the // notification gets to him. stopAsync(); } } else if (!stopping.get() && !inServiceException) { inServiceException = true; try { SERVICELOG.warn("Async error occurred: ", e); ConnectionError ce = new ConnectionError(); ce.setException(e); if (pendingStop) { dispatchSync(ce); } else { dispatchAsync(ce); } } finally { inServiceException = false; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serviceException File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
serviceException
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Provides JavaSessionSerializer javaSessionSerializer() { return new JavaBuiltinSessionSerializer(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: javaSessionSerializer File: ratpack-session/src/main/java/ratpack/session/SessionModule.java Repository: ratpack The code follows secure coding practices.
[ "CWE-338" ]
CVE-2019-11808
MEDIUM
4.3
ratpack
javaSessionSerializer
ratpack-session/src/main/java/ratpack/session/SessionModule.java
f2b63eb82dd71194319fd3945f5edf29b8f3a42d
0
Analyze the following code function for security vulnerabilities
public void removeConnectChoiceFromAllNetworks(String connectChoiceConfigKey) { if (mVerboseLoggingEnabled) { Log.v(TAG, "Removing connect choice from all networks " + connectChoiceConfigKey); } if (connectChoiceConfigKey == null) { return; } for (WifiConfiguration config : getInternalConfiguredNetworks()) { WifiConfiguration.NetworkSelectionStatus status = config.getNetworkSelectionStatus(); String connectChoice = status.getConnectChoice(); if (TextUtils.equals(connectChoice, connectChoiceConfigKey)) { Log.d(TAG, "remove connect choice:" + connectChoice + " from " + config.SSID + " : " + config.networkId); clearConnectChoiceInternal(config); } } for (OnNetworkUpdateListener listener : mListeners) { listener.onConnectChoiceRemoved(connectChoiceConfigKey); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeConnectChoiceFromAllNetworks File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
removeConnectChoiceFromAllNetworks
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public String displayForm(String className, XWikiContext context) { return displayForm(resolveClassReference(className), context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayForm File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
displayForm
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public Long getReuseCachedSearchResultsForMillis() { return myReuseCachedSearchResultsForMillis; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getReuseCachedSearchResultsForMillis File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getReuseCachedSearchResultsForMillis
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@TestApi @RequiresPermission(value = MANAGE_DEVICE_ADMINS) public @NonNull Set<String> getPolicyExemptApps() { if (mService == null) return Collections.emptySet(); try { return new HashSet<>(mService.listPolicyExemptApps()); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPolicyExemptApps File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getPolicyExemptApps
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean accepts(String url) { return isNotBlank(url) && url.startsWith("jdbc:mysql:"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: accepts File: db-support/db-support-mysql/src/main/java/com/thoughtworks/go/server/database/mysql/MySQLBackupProcessor.java Repository: gocd The code follows secure coding practices.
[ "CWE-532" ]
CVE-2023-28630
MEDIUM
4.4
gocd
accepts
db-support/db-support-mysql/src/main/java/com/thoughtworks/go/server/database/mysql/MySQLBackupProcessor.java
6545481e7b36817dd6033bf614585a8db242070d
0
Analyze the following code function for security vulnerabilities
public Boolean getPublicClient() { return publicClient; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPublicClient File: services/src/main/java/org/keycloak/services/managers/ClientManager.java Repository: keycloak The code follows secure coding practices.
[ "CWE-798" ]
CVE-2019-14837
MEDIUM
6.4
keycloak
getPublicClient
services/src/main/java/org/keycloak/services/managers/ClientManager.java
9a7c1a91a59ab85e7f8889a505be04a71580777f
0
Analyze the following code function for security vulnerabilities
public void setPulsing(boolean pulsing) { mKeyguardStatusView.setPulsing(pulsing); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPulsing File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setPulsing
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void resetClientKeyEntry() { mClientPrivateKey = null; mClientCertificate = null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetClientKeyEntry File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
resetClientKeyEntry
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
public void importXar(File file) throws Exception { // attach file attachFile("XWiki", "Import", file.getName(), file, false); // import file executeGet( getBaseBinURL() + "import/XWiki/Import?historyStrategy=add&importAsBackup=true&ajax&action=import&name=" + escapeURL(file.getName()), Status.OK.getStatusCode()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: importXar File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
importXar
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private Map<String, Object> getResourceURLCacheParameters(URL resourceUrl) { Map<String, Object> parameters = new LinkedHashMap<>(); if (getURLConfiguration().useResourceLastModificationDate()) { try { Path resourcePath = Paths.get(resourceUrl.toURI()); FileTime lastModifiedTime = Files.getLastModifiedTime(resourcePath); parameters.put(CACHE_VERSION, String.valueOf(lastModifiedTime.toMillis())); } catch (Exception e) { LOGGER.debug("Error when trying to access properties of resource URL [{}]", resourceUrl, e); parameters.put(CACHE_VERSION, getVersion()); } } else { parameters.put(CACHE_VERSION, getVersion()); } return parameters; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResourceURLCacheParameters File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getResourceURLCacheParameters
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public boolean getHintContentIntentLaunchesActivity() { return (mFlags & FLAG_HINT_CONTENT_INTENT_LAUNCHES_ACTIVITY) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHintContentIntentLaunchesActivity File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getHintContentIntentLaunchesActivity
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
protected void throwNotConnectedExceptionIfAppropriate() throws NotConnectedException { throwNotConnectedExceptionIfAppropriate(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: throwNotConnectedExceptionIfAppropriate File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
throwNotConnectedExceptionIfAppropriate
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
@ManagedAttribute(value = "The Oort of this Seti", readonly = true) public Oort getOort() { return _oort; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOort File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
getOort
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Seti.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
@Pure public short getShort(String columnName) throws SQLException { return getShort(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShort File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getShort
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public BrowseElement getNextHit() throws PresentationException, IndexUnreachableException, DAOException, ViewerConfigurationException { if (nextHit == null && searchBean != null) { nextHit = searchBean.getNextElement(); } return nextHit; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNextHit File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getNextHit
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public String getCanonicalXPath() { throw new RuntimeException("Method getCanonicalXPath() not implemented for nodes of type " + getNodeType()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCanonicalXPath File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getCanonicalXPath
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private String addPadding(String str, int width) { AttributedStringBuilder sb = new AttributedStringBuilder(); for (int i = str.length(); i < width; i++) { sb.append(" "); } sb.append(str); return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPadding File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
addPadding
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
@Override public void sendLostModeLocationUpdate(AndroidFuture<Boolean> future) { if (!mHasFeature) { future.complete(false); return; } Preconditions.checkCallAuthorization( hasCallingOrSelfPermission(permission.TRIGGER_LOST_MODE)); synchronized (getLockObject()) { final ActiveAdmin admin = getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked( UserHandle.USER_SYSTEM); Preconditions.checkState(admin != null, "Lost mode location updates can only be sent on an organization-owned device."); mInjector.binderWithCleanCallingIdentity(() -> { String[] providers = {LocationManager.FUSED_PROVIDER, LocationManager.NETWORK_PROVIDER, LocationManager.GPS_PROVIDER}; tryRetrieveAndSendLocationUpdate(admin, future, providers, /* index= */ 0); }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendLostModeLocationUpdate File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
sendLostModeLocationUpdate
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setIp(String ip) { this.ip = ip; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIp File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogUpload.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setIp
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogUpload.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
protected DocumentReferenceResolver<String> getCurrentDocumentReferenceResolver() { if (this.currentDocumentReferenceResolver == null) { this.currentDocumentReferenceResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_STRING, "current"); } return this.currentDocumentReferenceResolver; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentDocumentReferenceResolver File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
getCurrentDocumentReferenceResolver
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@Override public String[] getEnabledCipherSuites() { final String[] enabled; synchronized (this) { if (!isDestroyed()) { enabled = SSL.getCiphers(ssl); } else { return EmptyArrays.EMPTY_STRINGS; } } if (enabled == null) { return EmptyArrays.EMPTY_STRINGS; } else { for (int i = 0; i < enabled.length; i++) { String mapped = toJavaCipherSuite(enabled[i]); if (mapped != null) { enabled[i] = mapped; } } return enabled; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEnabledCipherSuites File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
getEnabledCipherSuites
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public String getLabel() { return "User Profile"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLabel File: wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4859
MEDIUM
4
jogetworkflow/jw-community
getLabel
wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java
9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice<PermissionGroupInfo> getAllPermissionGroups(int flags) { return new ParceledListSlice<>(mPermissionManagerServiceImpl.getAllPermissionGroups(flags)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllPermissionGroups File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getAllPermissionGroups
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
@ManagedAttribute(value = "URLs of known Oorts in the cluster", readonly = true) public Set<String> getKnownComets() { return _membership.getKnownComets(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKnownComets File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
getKnownComets
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent) { //if( mMediaPlayer != null && mMediaPlayer.isPlaying() ) { if( RemoteControlCallback.isPlaying() ) { RemoteControlCallback.pause(); initMediaSession(); showPausedNotification(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: Ports/Android/src/com/codename1/media/BackgroundAudioService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onReceive
Ports/Android/src/com/codename1/media/BackgroundAudioService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override protected String getDriverClassName() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDriverClassName File: modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getDriverClassName
modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override public boolean leaderOnly() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: leaderOnly File: graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
leaderOnly
graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
private ApplicationInfo getCallingApplicationInfoOrThrow() { // We always use the callingUid for this lookup. This means that if hypothetically an // app was installed in user A with cross user and in user B as an Instant App // the app in A would be able to see all the settings in user B. However since cross // user is a system permission and the app must be uninstalled in B and then installed as // an Instant App that situation is not realistic or supported. ApplicationInfo ai = null; final String callingPackage = getCallingPackage(); try { ai = mPackageManager.getApplicationInfo(callingPackage, 0 , UserHandle.getCallingUserId()); } catch (RemoteException ignored) { } if (ai == null) { throw new IllegalStateException("Failed to lookup info for package " + callingPackage); } return ai; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCallingApplicationInfoOrThrow File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getCallingApplicationInfoOrThrow
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public boolean startDisappearAnimation(Runnable onFinishRunnable) { if (mCurrentSecurityMode != SecurityMode.None) { mView.startDisappearAnimation(mCurrentSecurityMode); return getCurrentSecurityController().startDisappearAnimation(onFinishRunnable); } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startDisappearAnimation File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
startDisappearAnimation
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
public static String getFileResource(String path, String fnm) throws ContentError { String sp = path.replaceAll("\\.", fileSep) + fileSep + fnm; return getResource(sp); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileResource File: src/main/java/org/lemsml/jlems/io/util/JUtil.java Repository: LEMS/jLEMS The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4583
HIGH
8.8
LEMS/jLEMS
getFileResource
src/main/java/org/lemsml/jlems/io/util/JUtil.java
8c224637d7d561076364a9e3c2c375daeaf463dc
0
Analyze the following code function for security vulnerabilities
public void setBarState(int state) { // If we're visible and switched to SHADE_LOCKED (the user dragged // down on the lockscreen), clear notification LED, vibration, // ringing. // Other transitions are covered in handleVisibleToUserChanged(). if (state != mState && mVisible && (state == StatusBarState.SHADE_LOCKED || (state == StatusBarState.SHADE && isGoingToNotificationShade()))) { clearNotificationEffects(); } if (state == StatusBarState.KEYGUARD) { removeRemoteInputEntriesKeptUntilCollapsed(); maybeEscalateHeadsUp(); } mState = state; mGroupManager.setStatusBarState(state); mHeadsUpManager.setStatusBarState(state); mFalsingManager.setStatusBarState(state); mStatusBarWindowManager.setStatusBarState(state); mStackScroller.setStatusBarState(state); updateReportRejectedTouchVisibility(); updateDozing(); mNotificationShelf.setStatusBarState(state); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBarState File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setBarState
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition connect(final String path, final Route.Handler handler) { return appendDefinition(CONNECT, path, handler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connect File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
connect
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@NonNull public List<ResourcesLoader> getLoaders() { return mLoaders == null ? Collections.emptyList() : Arrays.asList(mLoaders); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLoaders File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getLoaders
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void convertSyntax(Syntax targetSyntax, XWikiContext context) throws XWikiException { // convert content setContent(performSyntaxConversion(getContent(), getDocumentReference(), getSyntax(), targetSyntax)); // convert objects Map<DocumentReference, List<BaseObject>> objectsByClass = getXObjects(); for (List<BaseObject> objects : objectsByClass.values()) { for (BaseObject bobject : objects) { if (bobject != null) { BaseClass bclass = bobject.getXClass(context); for (Object fieldClass : bclass.getProperties()) { if (fieldClass instanceof TextAreaClass && ((TextAreaClass) fieldClass).isWikiContent()) { TextAreaClass textAreaClass = (TextAreaClass) fieldClass; PropertyInterface field = bobject.getField(textAreaClass.getName()); // Make sure the field is the right type (might happen while a document is being migrated) if (field instanceof LargeStringProperty) { LargeStringProperty largeField = (LargeStringProperty) field; largeField.setValue(performSyntaxConversion(largeField.getValue(), getDocumentReference(), getSyntax(), targetSyntax)); } } } } } } // change syntax setSyntax(targetSyntax); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertSyntax File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
convertSyntax
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void removeReceiverLocked(ReceiverList rl) { mRegisteredReceivers.remove(rl.receiver.asBinder()); int N = rl.size(); for (int i=0; i<N; i++) { mReceiverResolver.removeFilter(rl.get(i)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeReceiverLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
removeReceiverLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Beta @Deprecated public static void write(CharSequence from, File to, Charset charset) throws IOException { asCharSink(to, charset).write(from); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
write
android/guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
public static Intent getMarketSearchIntent(Context context, String query) { try { Intent intent = Intent.parseUri(context.getString(R.string.market_search_intent), 0); if (!TextUtils.isEmpty(query)) { intent.setData( intent.getData().buildUpon().appendQueryParameter("q", query).build()); } return intent; } catch (URISyntaxException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMarketSearchIntent File: src/com/android/launcher3/util/PackageManagerHelper.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-40097
HIGH
7.8
android
getMarketSearchIntent
src/com/android/launcher3/util/PackageManagerHelper.java
6c9a41117d5a9365cf34e770bbb00138f6bf997e
0
Analyze the following code function for security vulnerabilities
private BaseProperty getTagProperty(XWikiContext context) { BaseObject tags = getObject(XWikiConstant.TAG_CLASS); return tags != null ? ((BaseProperty) tags.safeget(XWikiConstant.TAG_CLASS_PROP_TAGS)) : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTagProperty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getTagProperty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
protected void loadRoleByRoleNameAttributeID(LdapContext searchContext, String roleDN) { String[] returnAttribute = {roleNameAttributeID}; if (trace) { log.trace("Using roleDN: " + roleDN); } try { Attributes result2 = searchContext.getAttributes(roleDN, returnAttribute); Attribute roles2 = result2.get(roleNameAttributeID); if (roles2 != null) { for (int m = 0; m < roles2.size(); m++) { String roleName = (String) roles2.get(m); addRole(roleName); } } } catch (NamingException e) { if (trace) { log.trace("Failed to query roleNameAttrName", e); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadRoleByRoleNameAttributeID File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java Repository: wildfly-security/jboss-negotiation The code follows secure coding practices.
[ "CWE-200" ]
CVE-2015-1849
MEDIUM
4.3
wildfly-security/jboss-negotiation
loadRoleByRoleNameAttributeID
jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e
0
Analyze the following code function for security vulnerabilities
Rect getLetterboxInsets() { return mLetterboxUiController.getLetterboxInsets(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLetterboxInsets File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getLetterboxInsets
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "4.1M2") public void addToZip(ZipOutputStream zos, XWikiContext context) throws XWikiException, IOException { addToZip(zos, true, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addToZip File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
addToZip
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public String getSecretKey() { return secretKey; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecretKey File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getSecretKey
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public String getStringForUser(ContentResolver resolver, String name, int userHandle) { return Settings.Secure.getStringForUser(resolver, name, userHandle); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStringForUser File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
getStringForUser
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public static @PolyNull BigDecimal toBigDecimal(@PolyNull String s) throws SQLException { if (s == null) { return null; } try { s = s.trim(); return new BigDecimal(s); } catch (NumberFormatException e) { throw new PSQLException(GT.tr("Bad value for type {0} : {1}", "BigDecimal", s), PSQLState.NUMERIC_VALUE_OUT_OF_RANGE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toBigDecimal File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
toBigDecimal
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private void terminateSessionsForUser(User user) { try { final Set<String> sessionIds = getSessionIDsForUser(user); for (final String sessionId : sessionIds) { getActiveSessionForID(sessionId).ifPresent(session -> { LOG.info("Terminating session for user <{}/{}>", user.getName(), user.getId()); session.stop(); }); } } catch (Exception e) { LOG.error("Couldn't terminate session for user <{}/{}>", user.getName(), user.getId(), e); } }
Vulnerability Classification: - CWE: CWE-613 - CVE: CVE-2023-41041 - Severity: LOW - CVSS Score: 3.1 Description: Merge pull request from GHSA-3fqm-frhg-7c85 - Clear session from cache on all nodes after deletion - Add changelog Co-authored-by: Othello Maurer <othello@graylog.com> Function: terminateSessionsForUser File: graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java Repository: Graylog2/graylog2-server Fixed Code: private void terminateSessionsForUser(User user) { try { for (final Session session : getActiveSessionsForUser(user)) { LOG.info("Terminating session for user <{}/{}>", user.getName(), user.getId()); session.stop(); } } catch (Exception e) { LOG.error("Couldn't terminate session for user <{}/{}>", user.getName(), user.getId(), e); } }
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
terminateSessionsForUser
graylog2-server/src/main/java/org/graylog2/security/UserSessionTerminationService.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
1
Analyze the following code function for security vulnerabilities
@Override boolean check(DiscoveryConfig c1, DiscoveryConfig c2) { boolean c1Disabled = c1 == null || !c1.isEnabled(); boolean c2Disabled = c2 == null || !c2.isEnabled(); return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.getNodeFilterClass(), c2.getNodeFilterClass()) && nullSafeEqual(c1.getDiscoveryServiceProvider(), c2.getDiscoveryServiceProvider()) && isCollectionCompatible(c1.getDiscoveryStrategyConfigs(), c2.getDiscoveryStrategyConfigs(), new DiscoveryStrategyConfigChecker())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
private static void sqlConfig(XmlGenerator gen, Config config) { SqlConfig sqlConfig = config.getSqlConfig(); gen.open("sql") .node("statement-timeout-millis", sqlConfig.getStatementTimeoutMillis()) .close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sqlConfig File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
sqlConfig
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
private void saveAttachmentModuleRelation(Platform platform, String issueId, String fileName, String fileKey, AttachmentModuleRelationMapper batchAttachmentModuleRelationMapper) { try { byte[] content = platform.getAttachmentContent(fileKey); if (content == null) { return; } FileAttachmentMetadata fileAttachmentMetadata = attachmentService .saveAttachmentByBytes(content, AttachmentType.ISSUE.type(), issueId, fileName); AttachmentModuleRelation attachmentModuleRelation = new AttachmentModuleRelation(); attachmentModuleRelation.setAttachmentId(fileAttachmentMetadata.getId()); attachmentModuleRelation.setRelationId(issueId); attachmentModuleRelation.setRelationType(AttachmentType.ISSUE.type()); batchAttachmentModuleRelationMapper.insert(attachmentModuleRelation); } catch (Exception e) { LogUtil.error(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAttachmentModuleRelation File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
saveAttachmentModuleRelation
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public XDOM getXDOM() { return this.doc.getXDOM(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXDOM File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getXDOM
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public int update(Uri arg0, ContentValues arg1, String arg2, String[] arg3) { // TODO Auto-generated method stub return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java Repository: hgzojer/vocabletrainer The code follows secure coding practices.
[ "CWE-22" ]
CVE-2017-20181
MEDIUM
4.3
hgzojer/vocabletrainer
update
src/at/hgz/vocabletrainer/VocableTrainerProvider.java
accf6838078f8eb105cfc7865aba5c705fb68426
0
Analyze the following code function for security vulnerabilities
private boolean isImage(String fileName) { boolean isImage = false; String ext = ""; int pos = fileName.lastIndexOf("."); if (pos > 1 && pos != fileName.length()) { ext = fileName.substring(pos + 1); isImage = contains(getConfig("images"), ext); } return isImage; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isImage File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java Repository: jflyfox/jfinal_cms The code follows secure coding practices.
[ "CWE-74" ]
CVE-2021-37262
MEDIUM
5
jflyfox/jfinal_cms
isImage
src/main/java/com/jflyfox/modules/filemanager/FileManager.java
e7fd0fe9362464c4d2bd308318eecc89a847b116
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setPasswordMinimumUpperCase(@NonNull ComponentName admin, int length) { if (mService != null) { try { mService.setPasswordMinimumUpperCase(admin, length, mParentInstance); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPasswordMinimumUpperCase File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setPasswordMinimumUpperCase
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public HotwordDetectionServiceProvider getHotwordDetectionServiceProvider() { return mHotwordDetectionServiceProvider; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHotwordDetectionServiceProvider File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getHotwordDetectionServiceProvider
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public SearchTotalModeEnum getDefaultTotalMode() { return myDefaultTotalMode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultTotalMode File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getDefaultTotalMode
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void mergexWikiClass(XWikiDocument templatedoc) { mergeXClass(templatedoc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergexWikiClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
mergexWikiClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
protected abstract void onClose(AjaxRequestTarget target);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onClose File: server-core/src/main/java/io/onedev/server/web/component/markdown/InsertUrlPanel.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
onClose
server-core/src/main/java/io/onedev/server/web/component/markdown/InsertUrlPanel.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
public ApiClient setClientConfig(ClientConfig clientConfig) { this.clientConfig = clientConfig; // Rebuild HTTP Client according to the new "clientConfig" value. this.httpClient = buildHttpClient(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClientConfig File: samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setClientConfig
samples/openapi3/client/extensions/x-auth-id-alias/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void onBackPressed() { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBackPressed File: packages/VpnDialogs/src/com/android/vpndialogs/ConfirmDialog.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21251
HIGH
7.3
android
onBackPressed
packages/VpnDialogs/src/com/android/vpndialogs/ConfirmDialog.java
57946e2bb73850e817b3c01fa5350d705e178e39
0
Analyze the following code function for security vulnerabilities
public void onCleanupUser(int userId) { hideEncryptionNotification(new UserHandle(userId)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCleanupUser File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
onCleanupUser
services/core/java/com/android/server/LockSettingsService.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Override public void onFingerprintRunningStateChanged(boolean running) { mLockIcon.update(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFingerprintRunningStateChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onFingerprintRunningStateChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public String[] listFiles(String directory) throws IOException { directory = removeFilePrefix(directory); return new File(directory).list(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listFiles File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
listFiles
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
void makeVisibleIfNeeded(ActivityRecord starting, boolean reportToClient) { // This activity is not currently visible, but is running. Tell it to become visible. if ((mState == RESUMED && mVisibleRequested) || this == starting) { if (DEBUG_VISIBILITY) Slog.d(TAG_VISIBILITY, "Not making visible, r=" + this + " state=" + mState + " starting=" + starting); return; } // If this activity is paused, tell it to now show its window. if (DEBUG_VISIBILITY) Slog.v(TAG_VISIBILITY, "Making visible and scheduling visibility: " + this); final Task rootTask = getRootTask(); try { if (rootTask.mTranslucentActivityWaiting != null) { updateOptionsLocked(returningOptions); rootTask.mUndrawnActivitiesBelowTopTranslucent.add(this); } setVisibility(true); app.postPendingUiCleanMsg(true); if (reportToClient) { mClientVisibilityDeferred = false; makeActiveIfNeeded(starting); } else { mClientVisibilityDeferred = true; } // The activity may be waiting for stop, but that is no longer appropriate for it. mTaskSupervisor.mStoppingActivities.remove(this); } catch (Exception e) { // Just skip on any failure; we'll make it visible when it next restarts. Slog.w(TAG, "Exception thrown making visible: " + intent.getComponent(), e); } handleAlreadyVisible(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeVisibleIfNeeded File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
makeVisibleIfNeeded
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public int stopService(IApplicationThread caller, Intent service, String resolvedType, int userId) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(caller != null ? caller.asBinder() : null); service.writeToParcel(data, 0); data.writeString(resolvedType); data.writeInt(userId); mRemote.transact(STOP_SERVICE_TRANSACTION, data, reply, 0); reply.readException(); int res = reply.readInt(); reply.recycle(); data.recycle(); return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopService File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
stopService
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0