instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public Object[] toElements(org.xwiki.rest.model.jaxb.Object obj, boolean onlyDocument) { List<Object> elements = new ArrayList<>(); // Add wiki if (obj.getWiki() != null) { elements.add(obj.getWiki()); } else { elements.add(this.testUtils.getCurrentWiki()); } // Add spaces elements.add(toSpaceElement(obj.getSpace())); // Add name elements.add(obj.getPageName()); if (!onlyDocument) { // Add class elements.add(obj.getClassName()); // Add number elements.add(obj.getNumber()); } return elements.toArray(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toElements File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
toElements
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public Boolean canExecute(String url) { try { Intent it = createIntentForURL(url); if(it == null) { return false; } final PackageManager mgr = getContext().getPackageManager(); List<ResolveInfo> list = mgr.queryIntentActivities(it, PackageManager.MATCH_DEFAULT_ONLY); return list.size() > 0; } catch(Exception err) { com.codename1.io.Log.e(err); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canExecute File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
canExecute
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override protected void onFinishInflate() { super.onFinishInflate(); mKeyguardStatusBar = findViewById(R.id.keyguard_header); mKeyguardStatusView = findViewById(R.id.keyguard_status_view); mClockView = findViewById(R.id.clock_view); mNotificationContainerParent = (NotificationsQuickSettingsContainer) findViewById(R.id.notification_container_parent); mNotificationStackScroller = (NotificationStackScrollLayout) findViewById(R.id.notification_stack_scroller); mNotificationStackScroller.setOnHeightChangedListener(this); mNotificationStackScroller.setOverscrollTopChangedListener(this); mNotificationStackScroller.setOnEmptySpaceClickListener(this); mKeyguardBottomArea = findViewById(R.id.keyguard_bottom_area); mQsNavbarScrim = findViewById(R.id.qs_navbar_scrim); mAffordanceHelper = new KeyguardAffordanceHelper(this, getContext()); mKeyguardBottomArea.setAffordanceHelper(mAffordanceHelper); mLastOrientation = getResources().getConfiguration().orientation; mQsFrame = findViewById(R.id.qs_frame); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFinishInflate File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onFinishInflate
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setUser(User user) { this.user = user; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUser File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
setUser
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
ActivityStack getLastStack() { return mLastFocusedStack; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastStack File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
getLastStack
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@POST @Path("test") @Operation(summary = "Update a Test Element onto a given course", description = "This attaches a Test Element onto a given course. The element will be\n" + " inserted underneath the supplied parentNodeId") @ApiResponse(responseCode = "200", description = "The test node metadatas", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class)), @Content(mediaType = "application/xml", schema = @Schema(implementation = CourseNodeVO.class)) }) @ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient") @ApiResponse(responseCode = "404", description = "course, parentNode or test not found") @Consumes(MediaType.APPLICATION_FORM_URLENCODED) @Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) public Response attachTestPost(@PathParam("courseId") Long courseId, @FormParam("parentNodeId") String parentNodeId, @FormParam("shortTitle") @DefaultValue("undefined") String shortTitle, @FormParam("position") Integer position, @FormParam("longTitle") @DefaultValue("undefined") String longTitle, @FormParam("objectives") @DefaultValue("undefined") String objectives, @FormParam("visibilityExpertRules") String visibilityExpertRules, @FormParam("accessExpertRules") String accessExpertRules, @FormParam("testResourceableId") Long testResourceableId, @Context HttpServletRequest request) { return attachTest(courseId, parentNodeId, position, shortTitle, longTitle, objectives, visibilityExpertRules, accessExpertRules, testResourceableId, request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachTestPost File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
attachTestPost
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
private void maybeUpdateProviderUsageStatsLocked(ProcessRecord app, String providerPkgName, String authority) { if (app == null) return; if (app.curProcState <= ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND) { UserState userState = mUserController.getStartedUserStateLocked(app.userId); if (userState == null) return; final long now = SystemClock.elapsedRealtime(); Long lastReported = userState.mProviderLastReportedFg.get(authority); if (lastReported == null || lastReported < now - 60 * 1000L) { mUsageStatsService.reportContentProviderUsage( authority, providerPkgName, app.userId); userState.mProviderLastReportedFg.put(authority, now); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeUpdateProviderUsageStatsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
maybeUpdateProviderUsageStatsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setContent(String content) { this.content = content; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContent File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
setContent
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
public boolean pointsTo(Run<?,?> r) { return r.getNumber()==upstreamBuild && pointsTo(r.getParent()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pointsTo File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
pointsTo
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
@Override protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { handle(httpPostHandler,req,resp); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doPost File: agent/core/src/main/java/org/jolokia/http/AgentServlet.java Repository: jolokia The code follows secure coding practices.
[ "CWE-352" ]
CVE-2014-0168
MEDIUM
6.8
jolokia
doPost
agent/core/src/main/java/org/jolokia/http/AgentServlet.java
2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364
0
Analyze the following code function for security vulnerabilities
public void requestFocus(int pos) { if (fragments.length > pos) { fragments[pos].getListView().requestFocus(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestFocus File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
requestFocus
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public SaServletFilter addExclude(String... paths) { excludeList.addAll(Arrays.asList(paths)); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addExclude File: sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
addExclude
sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
@Override public void rejectWithReason(java.lang.String callId, int rejectReason, android.telecom.Logging.Session.Info sessionInfo) throws RemoteException { rejectedCallIds.add(callId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rejectWithReason File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
rejectWithReason
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private String getTextContentOld(final Node node) { final Node child = node.getFirstChild(); if (child != null) { final Node next = child.getNextSibling(); if (next == null) { return hasTextContent(child) ? child.getNodeValue() : ""; } final StringBuilder buf = new StringBuilder(); appendTextContents(node, buf); return buf.toString(); } return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextContentOld File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
getTextContentOld
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void reset() { // Only needed if a full reset is not pending. if (!reset) { if (getParent() instanceof ComboBox) { beforeClientResponse(true); } // Soft reset through client-side re-request. getClientRpc().reset(getDataProviderSize()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reset File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
reset
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
public boolean hasCustomMappings() { return getHibernateConfiguration().hasCustomMappings(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasCustomMappings File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
hasCustomMappings
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void loginAsAdmin() { login(ADMIN_CREDENTIALS.getUserName(), ADMIN_CREDENTIALS.getPassword()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loginAsAdmin File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
loginAsAdmin
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private final List<ProviderInfo> generateApplicationProvidersLocked(ProcessRecord app) { List<ProviderInfo> providers = null; try { providers = AppGlobals.getPackageManager() .queryContentProviders(app.processName, app.uid, STOCK_PM_FLAGS | PackageManager.GET_URI_PERMISSION_PATTERNS | MATCH_DEBUG_TRIAGED_MISSING) .getList(); } catch (RemoteException ex) { } if (DEBUG_MU) Slog.v(TAG_MU, "generateApplicationProvidersLocked, app.info.uid = " + app.uid); int userId = app.userId; if (providers != null) { int N = providers.size(); app.pubProviders.ensureCapacity(N + app.pubProviders.size()); for (int i=0; i<N; i++) { // TODO: keep logic in sync with installEncryptionUnawareProviders ProviderInfo cpi = (ProviderInfo)providers.get(i); boolean singleton = isSingleton(cpi.processName, cpi.applicationInfo, cpi.name, cpi.flags); if (singleton && UserHandle.getUserId(app.uid) != UserHandle.USER_SYSTEM) { // This is a singleton provider, but a user besides the // default user is asking to initialize a process it runs // in... well, no, it doesn't actually run in this process, // it runs in the process of the default user. Get rid of it. providers.remove(i); N--; i--; continue; } ComponentName comp = new ComponentName(cpi.packageName, cpi.name); ContentProviderRecord cpr = mProviderMap.getProviderByClass(comp, userId); if (cpr == null) { cpr = new ContentProviderRecord(this, cpi, app.info, comp, singleton); mProviderMap.putProviderByClass(comp, cpr); } if (DEBUG_MU) Slog.v(TAG_MU, "generateApplicationProvidersLocked, cpi.uid = " + cpr.uid); app.pubProviders.put(cpi.name, cpr); if (!cpi.multiprocess || !"android".equals(cpi.packageName)) { // Don't add this if it is a platform component that is marked // to run in multiple processes, because this is actually // part of the framework so doesn't make sense to track as a // separate apk in the process. app.addPackage(cpi.applicationInfo.packageName, cpi.applicationInfo.versionCode, mProcessStats); } notifyPackageUse(cpi.applicationInfo.packageName, PackageManager.NOTIFY_PACKAGE_USE_CONTENT_PROVIDER); } } return providers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateApplicationProvidersLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
generateApplicationProvidersLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public int getExitCoordinatorKey() { return mExitCoordinatorIndex; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExitCoordinatorKey File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getExitCoordinatorKey
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public void enableSafeDebugLogging(int port) { debug_port = port; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableSafeDebugLogging File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java Repository: dogtagpki/jss The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-4213
HIGH
7.5
dogtagpki/jss
enableSafeDebugLogging
src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
5922560a78d0dee61af8a33cc9cfbf4cfa291448
0
Analyze the following code function for security vulnerabilities
public void noteWakeupAlarm(IIntentSender sender, int sourceUid, String sourcePkg, String tag) { if (!(sender instanceof PendingIntentRecord)) { return; } final PendingIntentRecord rec = (PendingIntentRecord)sender; final BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); synchronized (stats) { if (mBatteryStatsService.isOnBattery()) { mBatteryStatsService.enforceCallingPermission(); int MY_UID = Binder.getCallingUid(); int uid = rec.uid == MY_UID ? Process.SYSTEM_UID : rec.uid; BatteryStatsImpl.Uid.Pkg pkg = stats.getPackageStatsLocked(sourceUid >= 0 ? sourceUid : uid, sourcePkg != null ? sourcePkg : rec.key.packageName); pkg.noteWakeupAlarmLocked(tag); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteWakeupAlarm File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
noteWakeupAlarm
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public void cleanThumbnailsFromContentlet(Contentlet contentlet) { if (contentlet.getStructure().getStructureType() == Structure.STRUCTURE_TYPE_FILEASSET) { this.cleanThumbnailsFromFileAsset(APILocator.getFileAssetAPI().fromContentlet( contentlet)); return; } Logger.warn(this, "Contentlet parameter is NOT a fileasset."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanThumbnailsFromContentlet File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
cleanThumbnailsFromContentlet
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
public static void compactOrClear(ByteBuffer bb) { if (bb.hasRemaining()) { bb.compact(); } else { bb.clear(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: compactOrClear File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
compactOrClear
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public void setName(String name) { if (name != null) { DocumentReference reference = getDocumentReference(); // TODO: ensure that other parameters are copied properly setDocumentReferenceInternal( new DocumentReference(name, new SpaceReference(reference.getParent()), reference.getLocale())); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
setName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
private void addLabels(Node node, String labels) { if (labels==null) return; labels = labels.trim(); if (labels.isEmpty()) return; String[] parts = labels.split(LABEL_SPLIT); for (String part : parts) { if (part.trim().isEmpty()) continue; node.addLabel(Label.label(part.trim())); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addLabels File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
addLabels
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
private void launchChooseLockscreen() { Intent chooseLockIntent = new Intent(DevicePolicyManager.ACTION_SET_NEW_PASSWORD); chooseLockIntent.putExtra(ChooseLockGeneric.ChooseLockGenericFragment.MINIMUM_QUALITY_KEY, DevicePolicyManager.PASSWORD_QUALITY_SOMETHING); startActivityForResult(chooseLockIntent, REQUEST_CHOOSE_LOCK); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchChooseLockscreen File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
launchChooseLockscreen
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
private void readUserListLocked() { if (!mUserListFile.exists()) { fallbackToSingleUserLocked(); return; } FileInputStream fis = null; AtomicFile userListFile = new AtomicFile(mUserListFile); try { fis = userListFile.openRead(); XmlPullParser parser = Xml.newPullParser(); parser.setInput(fis, StandardCharsets.UTF_8.name()); int type; while ((type = parser.next()) != XmlPullParser.START_TAG && type != XmlPullParser.END_DOCUMENT) { ; } if (type != XmlPullParser.START_TAG) { Slog.e(LOG_TAG, "Unable to read user list"); fallbackToSingleUserLocked(); return; } mNextSerialNumber = -1; if (parser.getName().equals(TAG_USERS)) { String lastSerialNumber = parser.getAttributeValue(null, ATTR_NEXT_SERIAL_NO); if (lastSerialNumber != null) { mNextSerialNumber = Integer.parseInt(lastSerialNumber); } String versionNumber = parser.getAttributeValue(null, ATTR_USER_VERSION); if (versionNumber != null) { mUserVersion = Integer.parseInt(versionNumber); } } while ((type = parser.next()) != XmlPullParser.END_DOCUMENT) { if (type == XmlPullParser.START_TAG) { final String name = parser.getName(); if (name.equals(TAG_USER)) { String id = parser.getAttributeValue(null, ATTR_ID); UserInfo user = readUserLocked(Integer.parseInt(id)); if (user != null) { mUsers.put(user.id, user); if (mNextSerialNumber < 0 || mNextSerialNumber <= user.id) { mNextSerialNumber = user.id + 1; } } } else if (name.equals(TAG_GUEST_RESTRICTIONS)) { while ((type = parser.next()) != XmlPullParser.END_DOCUMENT && type != XmlPullParser.END_TAG) { if (type == XmlPullParser.START_TAG) { if (parser.getName().equals(TAG_RESTRICTIONS)) { readRestrictionsLocked(parser, mGuestRestrictions); } break; } } } } } updateUserIdsLocked(); upgradeIfNecessaryLocked(); } catch (IOException ioe) { fallbackToSingleUserLocked(); } catch (XmlPullParserException pe) { fallbackToSingleUserLocked(); } finally { if (fis != null) { try { fis.close(); } catch (IOException e) { } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readUserListLocked File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
readUserListLocked
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
private static Node migrateService(Element serviceElement) { List<NodeTuple> tuples = new ArrayList<>(); tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "name"), new ScalarNode(Tag.STR, serviceElement.elementText("name").trim()))); tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "image"), new ScalarNode(Tag.STR, serviceElement.elementText("image").trim()))); Element argumentsElement = serviceElement.element("arguments"); if (argumentsElement != null) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "arguments"), new ScalarNode(Tag.STR, argumentsElement.getText().trim()))); } List<Node> envVarNodes = new ArrayList<>(); for (Element envVarElement: serviceElement.element("envVars").elements()) { List<NodeTuple> envVarTuples = new ArrayList<>(); envVarTuples.add(new NodeTuple( new ScalarNode(Tag.STR, "name"), new ScalarNode(Tag.STR, envVarElement.elementText("name").trim()))); envVarTuples.add(new NodeTuple( new ScalarNode(Tag.STR, "value"), new ScalarNode(Tag.STR, envVarElement.elementText("value").trim()))); envVarNodes.add(new MappingNode(Tag.MAP, envVarTuples, FlowStyle.BLOCK)); } if (!envVarNodes.isEmpty()) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "envVars"), new SequenceNode(Tag.SEQ, envVarNodes, FlowStyle.BLOCK))); } tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "readinessCheckCommand"), new ScalarNode(Tag.STR, serviceElement.elementText("readinessCheckCommand").trim()))); tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "cpuRequirement"), new ScalarNode(Tag.STR, serviceElement.elementText("cpuRequirement").trim()))); tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "memoryRequirement"), new ScalarNode(Tag.STR, serviceElement.elementText("memoryRequirement").trim()))); return new MappingNode(Tag.MAP, tuples, FlowStyle.BLOCK); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateService File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-538" ]
CVE-2021-21250
MEDIUM
4
theonedev/onedev
migrateService
server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
9196fd795e87dab069b4260a3590a0ea886e770f
0
Analyze the following code function for security vulnerabilities
public ClientConfig getClientConfig() { return clientConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientConfig File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getClientConfig
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public int getSupportsTypeConstant() { return Constants.GROUP; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSupportsTypeConstant File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
getSupportsTypeConstant
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private static X509KeyManager getDefaultX509KeyManager() throws KeyManagementException { X509KeyManager result = defaultX509KeyManager; if (result == null) { // single-check idiom defaultX509KeyManager = result = createDefaultX509KeyManager(); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultX509KeyManager File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getDefaultX509KeyManager
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
@Override public boolean onTouchEvent(MotionEvent ev) { // Do just a bit of our own falsing. People should only be tapping on the input, not // swiping. if (ev.getActionMasked() == MotionEvent.ACTION_DOWN) { // If we're in one handed mode, the user can tap on the opposite side of the screen // to move the bouncer across. In that case, inhibit the falsing (otherwise the taps // to move the bouncer to each screen side can end up closing it instead). if (mView.getMode() == KeyguardSecurityContainer.MODE_ONE_HANDED) { boolean isLeftAligned = mView.isOneHandedModeLeftAligned(); if ((isLeftAligned && ev.getX() > mView.getWidth() / 2f) || (!isLeftAligned && ev.getX() <= mView.getWidth() / 2f)) { mFalsingCollector.avoidGesture(); } } if (mTouchDown != null) { mTouchDown.recycle(); mTouchDown = null; } mTouchDown = MotionEvent.obtain(ev); } else if (mTouchDown != null) { if (ev.getActionMasked() == MotionEvent.ACTION_UP || ev.getActionMasked() == MotionEvent.ACTION_CANCEL) { mTouchDown.recycle(); mTouchDown = null; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTouchEvent File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
onTouchEvent
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
protected <U> JsonValue encode(U value, Class<U> type) { return JsonCodec .encode(value, null, type, getUI().getConnectorTracker()) .getEncodedValue(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encode File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
encode
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private static String aHref(String url, String text, String target) { HtmlTag a = new HtmlTag("a"); if (target != null && !target.equals("")) { a.setAttribute("target", target); } a.setAttribute("href", url); a.addBody(text); return a.render(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aHref File: java/code/src/com/redhat/rhn/frontend/nav/DialognavRenderer.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
aHref
java/code/src/com/redhat/rhn/frontend/nav/DialognavRenderer.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
public Pipeline savePipelineWithStagesAndMaterials(Pipeline pipeline) { saveRevs(pipeline.getBuildCause().getMaterialRevisions()); return save(pipeline); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: savePipelineWithStagesAndMaterials File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
savePipelineWithStagesAndMaterials
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
@AnyRes public int getSourceResId() { return nativeGetSourceResId(mParseState); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSourceResId File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getSourceResId
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@JsonProperty("IssuerDN") public String getIssuerDN() { return issuerDN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIssuerDN File: base/common/src/main/java/com/netscape/certsrv/cert/CertData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getIssuerDN
base/common/src/main/java/com/netscape/certsrv/cert/CertData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public boolean getPackageAskScreenCompat(String packageName) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageAskScreenCompat File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getPackageAskScreenCompat
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public Operation.OperationResult executeFixedCostOperation( final MessageFrame frame, final EVM evm) { Bytes shiftAmount = frame.popStackItem(); final Bytes value = leftPad(frame.popStackItem()); final boolean negativeNumber = value.get(0) < 0; if (shiftAmount.size() > 4 && (shiftAmount = shiftAmount.trimLeadingZeros()).size() > 4) { frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO); } else { final int shiftAmountInt = shiftAmount.toInt(); if (shiftAmountInt >= 256) { frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO); } else { // first perform standard shift right. Bytes result = value.shiftRight(shiftAmountInt); // if a negative number, carry through the sign. if (negativeNumber) { final Bytes32 significantBits = ALL_BITS.shiftLeft(256 - shiftAmountInt); result = result.or(significantBits); } frame.pushStackItem(result); } } return successResponse; }
Vulnerability Classification: - CWE: CWE-681 - CVE: CVE-2021-41272 - Severity: MEDIUM - CVSS Score: 5.0 Description: Shift Optimization (#3039) Reduce shift calculations to shifts that may have an actual result. Signed-off-by: Danno Ferrin <danno.ferrin@gmail.com> Function: executeFixedCostOperation File: evm/src/main/java/org/hyperledger/besu/evm/operation/SarOperation.java Repository: hyperledger/besu Fixed Code: @Override public Operation.OperationResult executeFixedCostOperation( final MessageFrame frame, final EVM evm) { Bytes shiftAmount = frame.popStackItem(); final Bytes value = leftPad(frame.popStackItem()); final boolean negativeNumber = value.get(0) < 0; if (shiftAmount.size() > 4 && (shiftAmount = shiftAmount.trimLeadingZeros()).size() > 4) { frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO); } else { final int shiftAmountInt = shiftAmount.toInt(); if (shiftAmountInt >= 256 || shiftAmountInt < 0) { frame.pushStackItem(negativeNumber ? ALL_BITS : UInt256.ZERO); } else { // first perform standard shift right. Bytes result = value.shiftRight(shiftAmountInt); // if a negative number, carry through the sign. if (negativeNumber) { final Bytes32 significantBits = ALL_BITS.shiftLeft(256 - shiftAmountInt); result = result.or(significantBits); } frame.pushStackItem(result); } } return successResponse; }
[ "CWE-681" ]
CVE-2021-41272
MEDIUM
5
hyperledger/besu
executeFixedCostOperation
evm/src/main/java/org/hyperledger/besu/evm/operation/SarOperation.java
4170524ac3b45185704fcfbdeeb71b0b05dfa0a1
1
Analyze the following code function for security vulnerabilities
public int getReadTimeout() { return readTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getReadTimeout File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getReadTimeout
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public CopyBuildTask outFile(Getter<File> out, boolean detectChange) { outputType = FILE; outputFile = out; if (detectChange && (inputType == FILE || inputType == STREAM)) { populateStreamsForFiles(); orChangeNoticer((new ChecksumChangeNoticer()).sourceDestStream(inputStreamGetter, fis(out))); } orGetterChangeNoticer(out); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outFile File: APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java Repository: Calsign/APDE The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36628
CRITICAL
9.8
Calsign/APDE
outFile
APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java
c6d64cbe465348c1bfd211122d89e3117afadecf
0
Analyze the following code function for security vulnerabilities
static <T> Handler<AsyncResult<T>> closeAndHandleResult( AsyncResult<SQLConnection> conn, Handler<AsyncResult<T>> handler) { return ar -> { if (conn.failed()) { log.error("Opening SQLConnection failed: " + conn.cause().getMessage(), conn.cause()); handler.handle(ar); return; } SQLConnection sqlConnection = conn.result(); if (sqlConnection == null) { handler.handle(ar); return; } sqlConnection.close(close -> { if (close.failed()) { log.error("Closing SQLConnection failed: " + close.cause().getMessage(), close.cause()); } handler.handle(ar); }); }; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeAndHandleResult File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
closeAndHandleResult
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private DirContext connectLDAP() throws NamingException { Properties props = new Properties(); props.setProperty(Context.INITIAL_CONTEXT_FACTORY, LDAP_PROVIDER); props.setProperty(Context.BATCHSIZE, "0"); props.setProperty(Context.PROVIDER_URL, params.getLdapURL()); props.setProperty(Context.URL_PKG_PREFIXES, URL_CONTEXT_PREFIX); props.setProperty(Context.REFERRAL, REFERRALS_IGNORE); props.setProperty(Context.SECURITY_AUTHENTICATION, SEARCH_SECURITY_LEVEL); DirContext ctx = new InitialDirContext(props); return ctx; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectLDAP File: prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-295" ]
CVE-2023-33201
MEDIUM
5.3
bcgit/bc-java
connectLDAP
prov/src/main/java/org/bouncycastle/jce/provider/X509LDAPCertStoreSpi.java
e8c409a8389c815ea3fda5e8b94c92fdfe583bcc
0
Analyze the following code function for security vulnerabilities
private void continueEnterSetup(IpClientManager ipClientManager) { mIpClient = ipClientManager; setupClientMode(); IntentFilter filter = new IntentFilter(); filter.addAction(Intent.ACTION_SCREEN_ON); filter.addAction(Intent.ACTION_SCREEN_OFF); if (!mIsScreenStateChangeReceiverRegistered) { mContext.registerReceiver(mScreenStateChangeReceiver, filter); mIsScreenStateChangeReceiverRegistered = true; } // Learn the initial state of whether the screen is on. // We update this field when we receive broadcasts from the system. handleScreenStateChanged(mContext.getSystemService(PowerManager.class).isInteractive()); if (!mWifiNative.removeAllNetworks(mInterfaceName)) { loge("Failed to remove networks on entering connect mode"); } mWifiInfo.reset(); mWifiInfo.setSupplicantState(SupplicantState.DISCONNECTED); sendNetworkChangeBroadcast(DetailedState.DISCONNECTED); // Inform metrics that Wifi is Enabled (but not yet connected) mWifiMetrics.setWifiState(mInterfaceName, WifiMetricsProto.WifiLog.WIFI_DISCONNECTED); mWifiMetrics.logStaEvent(mInterfaceName, StaEvent.TYPE_WIFI_ENABLED); mWifiScoreCard.noteSupplicantStateChanged(mWifiInfo); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: continueEnterSetup File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
continueEnterSetup
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Unstable public static String escapeAttributeValue(String content) { if (content == null) { return null; } StringBuilder result = new StringBuilder((int) (content.length() * 1.1)); int length = content.length(); char c; for (int i = 0; i < length; ++i) { c = content.charAt(i); switch (c) { case '&': result.append(AMP); break; case '\'': result.append(APOS); break; case '"': result.append(QUOT); break; case '<': result.append(LT); break; case '>': result.append(GT); break; case '{': result.append(LCURL); break; default: result.append(c); } } return result.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeAttributeValue File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java Repository: xwiki/xwiki-commons The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-24898
MEDIUM
4
xwiki/xwiki-commons
escapeAttributeValue
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
947e8921ebd95462d5a7928f397dd1b64f77c7d5
0
Analyze the following code function for security vulnerabilities
@Override public String getContentType() { return HttpConstants.ContentType.APPLICATION_XML; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentType File: pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java Repository: pippo-java/pippo The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20059
HIGH
7.5
pippo-java/pippo
getContentType
pippo-content-type-parent/pippo-jaxb/src/main/java/ro/pippo/jaxb/JaxbEngine.java
9f36e5891c0b11f840e1e1561ae96d83ba9ce759
0
Analyze the following code function for security vulnerabilities
private static byte[] encrypt(final BlockCipherAdapter cipher, final byte[] header, final byte[] data) { final int outSize = header.length + cipher.getOutputSize(data.length); final byte[] output = new byte[outSize]; System.arraycopy(header, 0, output, 0, header.length); int outOff = header.length; outOff += cipher.processBytes(data, 0, data.length, output, outOff); cipher.doFinal(output, outOff); cipher.reset(); return output; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encrypt File: src/main/java/org/cryptacular/util/CipherUtil.java Repository: vt-middleware/cryptacular The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-7226
MEDIUM
5
vt-middleware/cryptacular
encrypt
src/main/java/org/cryptacular/util/CipherUtil.java
8c6c7528f1e24c6b71f3e36db0cb8a697256ce25
0
Analyze the following code function for security vulnerabilities
@Override public String getPathInfo() { return pathInfo; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPathInfo File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getPathInfo
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
final void performAppGcsLocked() { final int N = mProcessesToGc.size(); if (N <= 0) { return; } if (canGcNowLocked()) { while (mProcessesToGc.size() > 0) { ProcessRecord proc = mProcessesToGc.remove(0); if (proc.curRawAdj > ProcessList.PERCEPTIBLE_APP_ADJ || proc.reportLowMemory) { if ((proc.lastRequestedGc+GC_MIN_INTERVAL) <= SystemClock.uptimeMillis()) { // To avoid spamming the system, we will GC processes one // at a time, waiting a few seconds between each. performAppGcLocked(proc); scheduleAppGcsLocked(); return; } else { // It hasn't been long enough since we last GCed this // process... put it in the list to wait for its time. addProcessToGcListLocked(proc); break; } } } scheduleAppGcsLocked(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performAppGcsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
performAppGcsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public FieldGroupFieldFactory getEditorFieldFactory() { return editorFieldGroup.getFieldFactory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditorFieldFactory File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getEditorFieldFactory
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public Object getObject(String classname, int nb) { try { BaseObject obj = this.getDoc().getObject(classname, nb); if (obj == null) { return null; } else { return newObjectApi(obj, getXWikiContext()); } } catch (Exception e) { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public void setUpSessionTokens(SessionInfo session) { if (SecuritySettings.isWebSecurityByTokensEnabled()) { User user = session.getUserDetail() != null ? session.getUserDetail() : User.getCurrentRequester(); Token token = session.getAttribute(SESSION_TOKEN_KEY); TokenGenerator generator = TokenGeneratorProvider.getTokenGenerator(SynchronizerToken.class); if (token != null) { logger.debug("Renew the session token for the user {0} ({1})", user.getId(), user.getDisplayedName()); token = generator.renew(token); } else { logger.debug("Create the session token for the user {0} ({1})", user.getId(), user.getDisplayedName()); token = generator.generate(); } session.setAttribute(SESSION_TOKEN_KEY, token); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUpSessionTokens File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
setUpSessionTokens
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public void setAutoTimeEnabled(@Nullable ComponentName who, String callerPackageName, boolean enabled) { if (!mHasFeature) { return; } CallerIdentity caller; if (isUnicornFlagEnabled()) { caller = getCallerIdentity(who, callerPackageName); } else { caller = getCallerIdentity(who); } if (isUnicornFlagEnabled()) { // The effect of this policy is device-wide. enforcePermission(SET_TIME, caller.getPackageName(), UserHandle.USER_ALL); } else { Objects.requireNonNull(who, "ComponentName is null"); Preconditions.checkCallAuthorization(isProfileOwnerOnUser0(caller) || isProfileOwnerOfOrganizationOwnedDevice(caller) || isDefaultDeviceOwner( caller)); } mInjector.binderWithCleanCallingIdentity(() -> mInjector.settingsGlobalPutInt(Settings.Global.AUTO_TIME, enabled ? 1 : 0)); DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_AUTO_TIME) .setAdmin(caller.getPackageName()) .setBoolean(enabled) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAutoTimeEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setAutoTimeEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public List<PendingIntentStats> getPendingIntentStats() { return mPendingIntentController.dumpPendingIntentStatsForStatsd(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPendingIntentStats File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getPendingIntentStats
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void migrate39(File dataDir, Stack<Integer> versions) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate39 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate39
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public List getListValue(DocumentReference classReference, String fieldName) { BaseObject obj = getXObject(classReference); if (obj == null) { return new ArrayList(); } return obj.getListValue(fieldName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getListValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getListValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public Set<String> names() { return HeadersUtils.namesAsString(headers); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: names File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
names
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
protected PSKKeyManager getPSKKeyManager() { return pskKeyManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPSKKeyManager File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getPSKKeyManager
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
private static APIKey getKeyOfType(List<APIKey> apiKeys, String keyType) { for (APIKey key : apiKeys) { if (keyType.equals(key.getType())) { return key; } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeyOfType File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
getKeyOfType
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
protected int radioTechnologyToDataServiceState(int code) { int retVal = ServiceState.STATE_OUT_OF_SERVICE; switch(code) { case 0: case 1: case 2: case 3: case 4: case 5: break; case 6: // RADIO_TECHNOLOGY_1xRTT case 7: // RADIO_TECHNOLOGY_EVDO_0 case 8: // RADIO_TECHNOLOGY_EVDO_A case 12: // RADIO_TECHNOLOGY_EVDO_B case 13: // RADIO_TECHNOLOGY_EHRPD retVal = ServiceState.STATE_IN_SERVICE; break; default: loge("radioTechnologyToDataServiceState: Wrong radioTechnology code."); break; } return(retVal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: radioTechnologyToDataServiceState File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
radioTechnologyToDataServiceState
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private StudyEventDAO sedao() { return new StudyEventDAO(dataSource); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sedao File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
sedao
web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
public ApiClient addDefaultCookie(String key, String value) { defaultCookieMap.put(key, value); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDefaultCookie File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
addDefaultCookie
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Deprecated public int checkActive(String user, XWikiContext context) throws XWikiException { XWikiUser xWikiUser = new XWikiUser(user); return xWikiUser.isDisabled(context) ? 0 : 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkActive File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
checkActive
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public void onEnrollResult(final long deviceId, final int fingerId, final int groupId, final int remaining) { mHandler.post(new Runnable() { @Override public void run() { handleEnrollResult(deviceId, fingerId, groupId, remaining); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEnrollResult File: services/core/java/com/android/server/fingerprint/FingerprintService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onEnrollResult
services/core/java/com/android/server/fingerprint/FingerprintService.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean supportsInlineMode() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsInlineMode File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29202
CRITICAL
9
xwiki/xwiki-platform
supportsInlineMode
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03
0
Analyze the following code function for security vulnerabilities
private void addPropertyEditorIfNecessary(Class<?> targetClass) { if (!registerPropertyEditors) { return; } PropertyEditor editor = findEditor(targetClass); if (editor != null) { return; } String className = targetClass.getName(); // Don't add a PropertyEditor for the standard by-type converters. if (targetClass.isPrimitive()) { return; } for (String standardClass : STANDARD_BY_TYPE_CONVERTER_CLASSES) { if (standardClass.indexOf(className) != -1) { return; } } Class<?> editorClass = ConverterPropertyEditorFactory.getDefaultInstance().definePropertyEditorClassFor(targetClass); if (editorClass != null) { PropertyEditorManager.registerEditor(targetClass, editorClass); } else { if (LOGGER.isLoggable(WARNING)) { LOGGER.warning(MessageFormat.format("definePropertyEditorClassFor({0}) returned null.", targetClass.getName())); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPropertyEditorIfNecessary File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
addPropertyEditorIfNecessary
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public int getHeight() { return mHeight; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeight File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
getHeight
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformPerspective(Object nativeGraphics, float fovy, float aspect, float zNear, float zFar) { CN1Matrix4f m = (CN1Matrix4f)nativeGraphics; m.setPerspective(fovy, aspect, zNear, zFar); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformPerspective File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformPerspective
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private static long fieldValueSize(Object value) throws UnsupportedEncodingException { long acc = 1; // for the type tag if(value instanceof String) { acc += longStrSize((String)value); } else if(value instanceof LongString) { acc += 4 + ((LongString)value).length(); } else if(value instanceof Integer) { acc += 4; } else if(value instanceof BigDecimal) { acc += 5; } else if(value instanceof Date) { acc += 8; } else if(value instanceof Map) { @SuppressWarnings("unchecked") Map<String,Object> map = (Map<String,Object>) value; acc += 4 + tableSize(map); } else if (value instanceof Byte) { acc += 1; } else if(value instanceof Double) { acc += 8; } else if(value instanceof Float) { acc += 4; } else if(value instanceof Long) { acc += 8; } else if(value instanceof Short) { acc += 2; } else if(value instanceof Boolean) { acc += 1; } else if(value instanceof byte[]) { acc += 4 + ((byte[])value).length; } else if(value instanceof List) { acc += 4 + arraySize((List<?>)value); } else if(value instanceof Object[]) { acc += 4 + arraySize((Object[])value); } else if(value == null) { } else { throw new IllegalArgumentException("invalid value in table"); } return acc; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fieldValueSize File: src/main/java/com/rabbitmq/client/impl/Frame.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
fieldValueSize
src/main/java/com/rabbitmq/client/impl/Frame.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
ActivityStarter setOriginatingPendingIntent(PendingIntentRecord originatingPendingIntent) { mRequest.originatingPendingIntent = originatingPendingIntent; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOriginatingPendingIntent File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setOriginatingPendingIntent
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
public final void removeActivity(PackageParser.Activity a, String type) { mActivities.remove(a.getComponentName()); if (DEBUG_SHOW_INFO) { Log.v(TAG, " " + type + " " + (a.info.nonLocalizedLabel != null ? a.info.nonLocalizedLabel : a.info.name) + ":"); Log.v(TAG, " Class=" + a.info.name); } final int NI = a.intents.size(); for (int j=0; j<NI; j++) { PackageParser.ActivityIntentInfo intent = a.intents.get(j); if (DEBUG_SHOW_INFO) { Log.v(TAG, " IntentFilter:"); intent.dump(new LogPrinter(Log.VERBOSE, TAG), " "); } removeFilter(intent); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeActivity File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
removeActivity
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public boolean isJacksonCompatible() { return jacksonCompatible; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isJacksonCompatible File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java Repository: alibaba/fastjson The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-25845
MEDIUM
6.8
alibaba/fastjson
isJacksonCompatible
src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
8f3410f81cbd437f7c459f8868445d50ad301f15
0
Analyze the following code function for security vulnerabilities
@Override public void setTaskResizeable(int taskId, int resizeableMode) { synchronized (this) { final TaskRecord task = mStackSupervisor.anyTaskForIdLocked( taskId, !RESTORE_FROM_RECENTS, INVALID_STACK_ID); if (task == null) { Slog.w(TAG, "setTaskResizeable: taskId=" + taskId + " not found"); return; } if (task.mResizeMode != resizeableMode) { task.mResizeMode = resizeableMode; mWindowManager.setTaskResizeable(taskId, resizeableMode); mStackSupervisor.ensureActivitiesVisibleLocked(null, 0, !PRESERVE_WINDOWS); mStackSupervisor.resumeFocusedStackTopActivityLocked(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTaskResizeable File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
setTaskResizeable
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
void activitySleptLocked(ActivityRecord r) { mGoingToSleepActivities.remove(r); checkReadyForSleepLocked(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activitySleptLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
activitySleptLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@SuppressJava6Requirement(reason = "Usage guarded by java version check") public static <C> Deque<C> newConcurrentDeque() { if (javaVersion() < 7) { return new LinkedBlockingDeque<C>(); } else { return new ConcurrentLinkedDeque<C>(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newConcurrentDeque File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
newConcurrentDeque
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@Deprecated public void addObject(String className, BaseObject object) { addXObject(resolveClassReference(className), object); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
addObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private UserInfo findCurrentGuestUserLocked() { final int size = mUsers.size(); for (int i = 0; i < size; i++) { final UserInfo user = mUsers.valueAt(i); if (user.isGuest() && !user.guestToRemove && !mRemovingUserIds.get(user.id)) { return user; } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findCurrentGuestUserLocked File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
findCurrentGuestUserLocked
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
private boolean inEphemeralUserSession() { for (UserInfo userInfo : mUserManager.getUsers()) { if (mInjector.getUserManager().isUserEphemeral(userInfo.id)) { return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inEphemeralUserSession File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
inEphemeralUserSession
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Deprecated public void querySyncProviders(List<String> outNames, List<ProviderInfo> outInfo) { // reader synchronized (mPackages) { final Iterator<Map.Entry<String, PackageParser.Provider>> i = mProvidersByAuthority .entrySet().iterator(); final int userId = UserHandle.getCallingUserId(); while (i.hasNext()) { Map.Entry<String, PackageParser.Provider> entry = i.next(); PackageParser.Provider p = entry.getValue(); PackageSetting ps = mSettings.mPackages.get(p.owner.packageName); if (ps != null && p.syncable && (!mSafeMode || (p.info.applicationInfo.flags &ApplicationInfo.FLAG_SYSTEM) != 0)) { ProviderInfo info = PackageParser.generateProviderInfo(p, 0, ps.readUserState(userId), userId); if (info != null) { outNames.add(entry.getKey()); outInfo.add(info); } } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: querySyncProviders File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
querySyncProviders
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override protected String getCipherName(int keySize, Mode mode) { return "rc4"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCipherName File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
getCipherName
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
@Override public String getContentContainer(Map<String, Object> data) { if (!getPropertyString("horizontal_menu").isEmpty()) { data.put("hide_nav", true); } if (showHomeBanner()) { data.put("main_container_before", "<div class=\"home_banner\"><div class=\"home_banner_inner\">"+getPropertyString("homeAttractBanner")+"</div></div>"); } data.put("main_container_classes", "container-fluid-full"); data.put("main_container_inner_classes", "row-fluid"); data.put("sidebar_classes", "span2"); if (((Boolean) data.get("embed")) || ((Boolean) data.get("hide_nav"))) { data.put("content_classes", "span12"); } else { data.put("content_classes", "span10"); } String ContentInnerBefore = getBreadcrumb(data); if (getPropertyString("fontControl").equalsIgnoreCase("true")) { ContentInnerBefore += getFontSizeController(data); } data.put("content_inner_before", ContentInnerBefore); return super.getContentContainer(data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentContainer File: wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
getContentContainer
wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
final int userHandleGetCallingUserId() { return UserHandle.getUserId(binderGetCallingUid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userHandleGetCallingUserId File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
userHandleGetCallingUserId
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void service() throws ONetworkProtocolException, IOException { ++connection.data.totalRequests; connection.data.commandInfo = null; connection.data.commandDetail = null; final String callbackF; if ((request.parameters != null) && request.parameters.containsKey(OHttpUtils.CALLBACK_PARAMETER_NAME)) callbackF = request.parameters.get(OHttpUtils.CALLBACK_PARAMETER_NAME); else callbackF = null; response = new OHttpResponse(channel.outStream, request.httpVersion, additionalResponseHeaders, responseCharSet, connection.data.serverInfo, request.sessionId, callbackF, request.keepAlive, connection); response.setJsonErrorResponse(jsonResponseError); if (request.contentEncoding != null && request.contentEncoding.equals(OHttpUtils.CONTENT_ACCEPT_GZIP_ENCODED)) { response.setContentEncoding(OHttpUtils.CONTENT_ACCEPT_GZIP_ENCODED); } waitNodeIsOnline(); final long begin = System.currentTimeMillis(); boolean isChain; do { isChain = false; final String command; if (request.url.length() < 2) { command = ""; } else { command = request.url.substring(1); } final String commandString = getCommandString(command); final OServerCommand cmd = (OServerCommand) cmdManager.getCommand(commandString); Map<String, String> requestParams = cmdManager.extractUrlTokens(commandString); if (requestParams != null) { if (request.parameters == null) { request.parameters = new HashMap<String, String>(); } for (Map.Entry<String, String> entry : requestParams.entrySet()) { request.parameters.put(entry.getKey(), URLDecoder.decode(entry.getValue(), "UTF-8")); } } if (cmd != null) try { if (cmd.beforeExecute(request, response)) try { // EXECUTE THE COMMAND isChain = cmd.execute(request, response); } finally { cmd.afterExecute(request, response); } } catch (Exception e) { handleError(e); } else { try { OLogManager.instance().warn( this, "->" + channel.socket.getInetAddress().getHostAddress() + ": Command not found: " + request.httpMethod + "." + URLDecoder.decode(command, "UTF-8")); sendError(OHttpUtils.STATUS_INVALIDMETHOD_CODE, OHttpUtils.STATUS_INVALIDMETHOD_DESCRIPTION, null, OHttpUtils.CONTENT_TEXT_PLAIN, "Command not found: " + command, request.keepAlive); } catch (IOException e1) { sendShutdown(); } } } while (isChain); connection.data.lastCommandInfo = connection.data.commandInfo; connection.data.lastCommandDetail = connection.data.commandDetail; connection.data.lastCommandExecutionTime = System.currentTimeMillis() - begin; connection.data.totalCommandExecutionTime += connection.data.lastCommandExecutionTime; }
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2015-2912 - Severity: MEDIUM - CVSS Score: 6.8 Description: Fixed issue #4824 about disabling JSONP support Function: service File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java Repository: orientechnologies/orientdb Fixed Code: public void service() throws ONetworkProtocolException, IOException { ++connection.data.totalRequests; connection.data.commandInfo = null; connection.data.commandDetail = null; final String callbackF; if (OGlobalConfiguration.NETWORK_HTTP_JSONP_ENABLED.getValueAsBoolean() && request.parameters != null && request.parameters.containsKey(OHttpUtils.CALLBACK_PARAMETER_NAME)) callbackF = request.parameters.get(OHttpUtils.CALLBACK_PARAMETER_NAME); else callbackF = null; response = new OHttpResponse(channel.outStream, request.httpVersion, additionalResponseHeaders, responseCharSet, connection.data.serverInfo, request.sessionId, callbackF, request.keepAlive, connection); response.setJsonErrorResponse(jsonResponseError); if (request.contentEncoding != null && request.contentEncoding.equals(OHttpUtils.CONTENT_ACCEPT_GZIP_ENCODED)) { response.setContentEncoding(OHttpUtils.CONTENT_ACCEPT_GZIP_ENCODED); } waitNodeIsOnline(); final long begin = System.currentTimeMillis(); boolean isChain; do { isChain = false; final String command; if (request.url.length() < 2) { command = ""; } else { command = request.url.substring(1); } final String commandString = getCommandString(command); final OServerCommand cmd = (OServerCommand) cmdManager.getCommand(commandString); Map<String, String> requestParams = cmdManager.extractUrlTokens(commandString); if (requestParams != null) { if (request.parameters == null) { request.parameters = new HashMap<String, String>(); } for (Map.Entry<String, String> entry : requestParams.entrySet()) { request.parameters.put(entry.getKey(), URLDecoder.decode(entry.getValue(), "UTF-8")); } } if (cmd != null) try { if (cmd.beforeExecute(request, response)) try { // EXECUTE THE COMMAND isChain = cmd.execute(request, response); } finally { cmd.afterExecute(request, response); } } catch (Exception e) { handleError(e); } else { try { OLogManager.instance().warn( this, "->" + channel.socket.getInetAddress().getHostAddress() + ": Command not found: " + request.httpMethod + "." + URLDecoder.decode(command, "UTF-8")); sendError(OHttpUtils.STATUS_INVALIDMETHOD_CODE, OHttpUtils.STATUS_INVALIDMETHOD_DESCRIPTION, null, OHttpUtils.CONTENT_TEXT_PLAIN, "Command not found: " + command, request.keepAlive); } catch (IOException e1) { sendShutdown(); } } } while (isChain); connection.data.lastCommandInfo = connection.data.commandInfo; connection.data.lastCommandDetail = connection.data.commandDetail; connection.data.lastCommandExecutionTime = System.currentTimeMillis() - begin; connection.data.totalCommandExecutionTime += connection.data.lastCommandExecutionTime; }
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
service
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/ONetworkProtocolHttpAbstract.java
f11dbced94cb587f445cb99db08735c023921053
1
Analyze the following code function for security vulnerabilities
@Override public Enumeration<Locale> getLocales() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocales File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getLocales
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@Override public void setFocusedTask(int taskId) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "setFocusedTask()"); if (DEBUG_FOCUS) Slog.d(TAG_FOCUS, "setFocusedTask: taskId=" + taskId); final long callingId = Binder.clearCallingIdentity(); try { synchronized (this) { final TaskRecord task = mStackSupervisor.anyTaskForIdLocked(taskId); if (task == null) { return; } final ActivityRecord r = task.topRunningActivityLocked(); if (mStackSupervisor.moveFocusableActivityStackToFrontLocked(r, "setFocusedTask")) { mStackSupervisor.resumeFocusedStackTopActivityLocked(); } } } finally { Binder.restoreCallingIdentity(callingId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocusedTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setFocusedTask
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static boolean isCompatible(MapStoreConfig c1, MapStoreConfig c2) { boolean c1Disabled = c1 == null || !c1.isEnabled(); boolean c2Disabled = c2 == null || !c2.isEnabled(); return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.getClassName(), c2.getClassName()) && nullSafeEqual(c1.getFactoryClassName(), c2.getFactoryClassName()) && nullSafeEqual(c1.getProperties(), c2.getProperties())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCompatible File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
isCompatible
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@ColorInt public int getColor() { return mColor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColor File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getColor
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Deprecated public boolean getHintHideIcon() { return (mFlags & FLAG_HINT_HIDE_ICON) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHintHideIcon File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getHintHideIcon
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
void clearNetworkCachedDataIfNeeded(WifiConfiguration config, int reason) { if (config == null) return; switch(reason) { case StaIfaceReasonCode.UNSPECIFIED: case StaIfaceReasonCode.DEAUTH_LEAVING: logi("Keep PMK cache for network disconnection reason " + reason); break; default: mWifiNative.removeNetworkCachedData(config.networkId); break; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearNetworkCachedDataIfNeeded File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
clearNetworkCachedDataIfNeeded
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public void createShortcutResultIntent(String packageName, ShortcutInfo shortcut, int userId, AndroidFuture<Intent> ret) throws RemoteException { Objects.requireNonNull(shortcut); Preconditions.checkArgument(shortcut.isEnabled(), "Shortcut must be enabled"); verifyCaller(packageName, userId); verifyShortcutInfoPackage(packageName, shortcut); final Intent intent; synchronized (mLock) { throwIfUserLockedL(userId); // Send request to the launcher, if supported. intent = mShortcutRequestPinProcessor.createShortcutResultIntent(shortcut, userId); } verifyStates(); ret.complete(intent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createShortcutResultIntent File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
createShortcutResultIntent
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private static Object[] getVarArgs(InvocationOnMock invocationOnMockRender, int i) { Object[] parameters; if (invocationOnMockRender.getArguments().length > i) { Object argument = invocationOnMockRender.getArgument(i); if (argument instanceof String) { parameters = new Object[] { argument }; } else { parameters = (Object[]) argument; } } else { parameters = new Object[] {}; } return parameters; }
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2023-29213 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20291: Improved translations of logging administration Function: getVarArgs File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-page/src/main/java/org/xwiki/test/page/LocalizationSetup.java Repository: xwiki/xwiki-platform Fixed Code: private static Object[] getVarArgs(InvocationOnMock invocationOnMockRender, int i) { Object[] parameters; Object[] arguments = invocationOnMockRender.getArguments(); if (arguments.length > i) { parameters = Arrays.copyOfRange(arguments, i, arguments.length); } else { parameters = new Object[] {}; } return parameters; }
[ "CWE-352" ]
CVE-2023-29213
HIGH
8.8
xwiki/xwiki-platform
getVarArgs
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-page/src/main/java/org/xwiki/test/page/LocalizationSetup.java
49fdfd633ddfa346c522d2fe71754dc72c9496ca
1
Analyze the following code function for security vulnerabilities
@LargeTest @Test public void testTelecomManagerAcceptRingingInvalidVideoState() throws Exception { IdPair ids = startIncomingPhoneCall("650-555-1212", mPhoneAccountA0.getAccountHandle(), VideoProfile.STATE_BIDIRECTIONAL, mConnectionServiceFixtureA); assertEquals(Call.STATE_RINGING, mInCallServiceFixtureX.getCall(ids.mCallId).getState()); assertEquals(Call.STATE_RINGING, mInCallServiceFixtureY.getCall(ids.mCallId).getState()); // Use TelecomManager API to answer the ringing call; the default expected behavior is to // answer using whatever video state the ringing call requests. TelecomManager telecomManager = (TelecomManager) mComponentContextFixture.getTestDouble() .getApplicationContext().getSystemService(Context.TELECOM_SERVICE); telecomManager.acceptRingingCall(999 /* invalid videostate */); waitForHandlerAction(mTelecomSystem.getCallsManager() .getConnectionServiceFocusManager().getHandler(), TEST_TIMEOUT); // Answer video API should be called verify(mConnectionServiceFixtureA.getTestDouble(), timeout(TEST_TIMEOUT)) .answerVideo(eq(ids.mConnectionId), eq(VideoProfile.STATE_BIDIRECTIONAL), any()); mConnectionServiceFixtureA.sendSetActive(ids.mConnectionId); mInCallServiceFixtureX.mInCallAdapter.disconnectCall(ids.mCallId); }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 285211549 Fixes: 280797684 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com> (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:41042bd0c8e1e47c19dfdb2a378c70d2090b1e15) Merged-In: I69b0c64413ce3b5e8f56c4fbc5e195a5f5adb6d7 Change-Id: I69b0c64413ce3b5e8f56c4fbc5e195a5f5adb6d7 Function: testTelecomManagerAcceptRingingInvalidVideoState File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android Fixed Code: @LargeTest @Test public void testTelecomManagerAcceptRingingInvalidVideoState() throws Exception { IdPair ids = startIncomingPhoneCall("650-555-1212", mPhoneAccountA0.getAccountHandle(), VideoProfile.STATE_BIDIRECTIONAL, mConnectionServiceFixtureA, null); assertEquals(Call.STATE_RINGING, mInCallServiceFixtureX.getCall(ids.mCallId).getState()); assertEquals(Call.STATE_RINGING, mInCallServiceFixtureY.getCall(ids.mCallId).getState()); // Use TelecomManager API to answer the ringing call; the default expected behavior is to // answer using whatever video state the ringing call requests. TelecomManager telecomManager = (TelecomManager) mComponentContextFixture.getTestDouble() .getApplicationContext().getSystemService(Context.TELECOM_SERVICE); telecomManager.acceptRingingCall(999 /* invalid videostate */); waitForHandlerAction(mTelecomSystem.getCallsManager() .getConnectionServiceFocusManager().getHandler(), TEST_TIMEOUT); // Answer video API should be called verify(mConnectionServiceFixtureA.getTestDouble(), timeout(TEST_TIMEOUT)) .answerVideo(eq(ids.mConnectionId), eq(VideoProfile.STATE_BIDIRECTIONAL), any()); mConnectionServiceFixtureA.sendSetActive(ids.mConnectionId); mInCallServiceFixtureX.mInCallAdapter.disconnectCall(ids.mCallId); }
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testTelecomManagerAcceptRingingInvalidVideoState
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { HttpSession session = request.getSession(); if("get".equals(request.getParameter("cmd"))) { doFileRetrieve(session, request, response); } else { doFileUpload(session, request, response); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doPost File: dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
doPost
dotCMS/src/main/java/com/dotmarketing/servlets/AjaxFileUploadServlet.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
public void setRecordingServiceHelper(RecordingMetadataReaderHelper r) { recordingServiceHelper = r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRecordingServiceHelper File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
setRecordingServiceHelper
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
@Override public Object getObject(Object key) { Object object = delegate.getObject(key); return object == null ? null : deserialize((byte[]) object); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getObject File: src/main/java/org/apache/ibatis/cache/decorators/SerializedCache.java Repository: mybatis/mybatis-3 The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-26945
MEDIUM
5.1
mybatis/mybatis-3
getObject
src/main/java/org/apache/ibatis/cache/decorators/SerializedCache.java
9caf480e05c389548c9889362c2cb080d728b5d8
0
Analyze the following code function for security vulnerabilities
public HttpConnectionProvider connectionProvider() { return httpConnectionProvider; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectionProvider File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
connectionProvider
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
public List<Object[]> getFiles() { return files; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFiles File: core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
getFiles
core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java
2ab070cdac087bd208f64fa8138bb709f8d7680c
0
Analyze the following code function for security vulnerabilities
public int getIntValue(DocumentReference classReference, String fieldName, int defaultValue) { BaseObject obj = getXObject(classReference, 0); if (obj == null) { return defaultValue; } return obj.getIntValue(fieldName, defaultValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIntValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getIntValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void reparent(TaskFragment newTaskFrag, int position, String reason) { if (getParent() == null) { Slog.w(TAG, "reparent: Attempted to reparent non-existing app token: " + token); return; } final TaskFragment prevTaskFrag = getTaskFragment(); if (prevTaskFrag == newTaskFrag) { throw new IllegalArgumentException(reason + ": task fragment =" + newTaskFrag + " is already the parent of r=" + this); } ProtoLog.i(WM_DEBUG_ADD_REMOVE, "reparent: moving activity=%s" + " to new task fragment in task=%d at %d", this, task.mTaskId, position); reparent(newTaskFrag, position); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reparent File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
reparent
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private EntityReferenceSerializer<String> getLocalEntityReferenceSerializer() { if (this.localEntityReferenceSerializer == null) { this.localEntityReferenceSerializer = Utils.getComponent(EntityReferenceSerializer.TYPE_STRING, "local"); } return this.localEntityReferenceSerializer; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalEntityReferenceSerializer File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getLocalEntityReferenceSerializer
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0