instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public void jumpTask(String procInsId, String currentTaskId, String targetTaskDefinitionKey, Map<String, Object> variables) { jumpTask(getTaskEntity(currentTaskId), targetTaskDefinitionKey, variables); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jumpTask File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
jumpTask
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0
Analyze the following code function for security vulnerabilities
@Override public boolean isFocused() { return mForceIsFocused || super.isFocused(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFocused File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
isFocused
chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Override protected Object filterToLabel(PackageParser.ActivityIntentInfo filter) { return filter.activity; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterToLabel File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
filterToLabel
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public long inputDispatchingTimedOut(int pid, final boolean aboveSystem, String reason) { if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS) != PackageManager.PERMISSION_GRANTED) { throw new SecurityException("Requires permission " + android.Manifest.permission.FILTER_EVENTS); } ProcessRecord proc; long timeout; synchronized (this) { synchronized (mPidsSelfLocked) { proc = mPidsSelfLocked.get(pid); } timeout = getInputDispatchingTimeoutLocked(proc); } if (!inputDispatchingTimedOut(proc, null, null, aboveSystem, reason)) { return -1; } return timeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inputDispatchingTimedOut File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
inputDispatchingTimedOut
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
protected void addUserToGroup(String userName, String groupName, XWikiContext context) throws XWikiException { XWikiDocument groupDoc = getDocument(groupName, context); DocumentReference groupClassReference = getGroupClass(context).getDocumentReference(); BaseObject memberObject = groupDoc.newXObject(groupClassReference.removeParent(groupClassReference.getWikiReference()), context); memberObject.setStringValue("member", userName); this.saveDocument(groupDoc, localizePlainOrKey("core.comment.addedUserToGroup"), context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addUserToGroup File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
addUserToGroup
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setLargeStringValue(String className, String fieldName, String value) { setLargeStringValue( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), fieldName, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLargeStringValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setLargeStringValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private static void kerberosAuthenticationGenerator(XmlGenerator gen, KerberosAuthenticationConfig c) { if (c == null) { return; } XmlGenerator kerberosGen = gen.open("kerberos"); addClusterLoginElements(kerberosGen, c) .nodeIfContents("relax-flags-check", c.getRelaxFlagsCheck()) .nodeIfContents("use-name-without-realm", c.getUseNameWithoutRealm()) .nodeIfContents("security-realm", c.getSecurityRealm()) .nodeIfContents("keytab-file", c.getKeytabFile()) .nodeIfContents("principal", c.getPrincipal()); ldapAuthenticationGenerator(kerberosGen, c.getLdapAuthenticationConfig()); kerberosGen.close(); }
Vulnerability Classification: - CWE: CWE-522 - CVE: CVE-2023-33264 - Severity: MEDIUM - CVSS Score: 4.3 Description: Extend set of masked fields in ConfigXmlGenerator Function: kerberosAuthenticationGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast Fixed Code: private void kerberosAuthenticationGenerator(XmlGenerator gen, KerberosAuthenticationConfig c) { if (c == null) { return; } XmlGenerator kerberosGen = gen.open("kerberos"); addClusterLoginElements(kerberosGen, c) .nodeIfContents("relax-flags-check", c.getRelaxFlagsCheck()) .nodeIfContents("use-name-without-realm", c.getUseNameWithoutRealm()) .nodeIfContents("security-realm", c.getSecurityRealm()) .nodeIfContents("keytab-file", c.getKeytabFile()) .nodeIfContents("principal", c.getPrincipal()); ldapAuthenticationGenerator(kerberosGen, c.getLdapAuthenticationConfig()); kerberosGen.close(); }
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
kerberosAuthenticationGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
1
Analyze the following code function for security vulnerabilities
@Override public Iterable<File> successors(File file) { // check isDirectory() just because it may be faster than listFiles() on a non-directory if (file.isDirectory()) { File[] files = file.listFiles(); if (files != null) { return Collections.unmodifiableList(Arrays.asList(files)); } } return ImmutableList.of(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: successors File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
successors
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
private static void mkdirsOrThrow(File dir) throws IOException { if (!dir.exists() && !dir.mkdirs()) { throw new IOException("Failed to create directory " + dir); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mkdirsOrThrow File: pf4j/src/main/java/org/pf4j/util/Unzip.java Repository: pf4j The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-40827
HIGH
7.5
pf4j
mkdirsOrThrow
pf4j/src/main/java/org/pf4j/util/Unzip.java
ed9392069fe14c6c30d9f876710e5ad40f7ea8c1
0
Analyze the following code function for security vulnerabilities
public abstract JavaType withTypeHandler(Object h);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withTypeHandler File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
withTypeHandler
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
@Override public int checkProvisioningPrecondition(String action, String packageName) { Objects.requireNonNull(packageName, "packageName is null"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( hasCallingOrSelfPermission(MANAGE_PROFILE_AND_DEVICE_OWNERS)); long originalId = mInjector.binderClearCallingIdentity(); try { return checkProvisioningPreconditionSkipPermission( action, packageName, caller.getUserId()); } finally { mInjector.binderRestoreCallingIdentity(originalId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkProvisioningPrecondition File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
checkProvisioningPrecondition
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void removeContextFeed() { this.execution.getContext().removeProperty(FEED_PROPERTY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeContextFeed File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29202
CRITICAL
9
xwiki/xwiki-platform
removeContextFeed
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03
0
Analyze the following code function for security vulnerabilities
public boolean isPackagePreserveVersion() { return this.packagePreserveVersion; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackagePreserveVersion File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
isPackagePreserveVersion
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public boolean restrictToAdmin(XWikiDocument document) { boolean updated = false; // If some rights have already been set on the document, we consider that it has already been protected // manually. if (document.getXObjects(LOCAL_CLASS_REFERENCE).isEmpty()) { updated = initializeRights(document, XWIKI_ADMIN_GROUP_DOCUMENT_REFERENCE, List.of(VIEW, EDIT, DELETE)); } return updated; }
Vulnerability Classification: - CWE: CWE-269 - CVE: CVE-2023-34465 - Severity: HIGH - CVSS Score: 8.1 Description: XWIKI-20671: Fix Mail.MailConfig initialization Function: restrictToAdmin File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/internal/DocumentInitializerRightsManager.java Repository: xwiki/xwiki-platform Fixed Code: public boolean restrictToAdmin(XWikiDocument document) { boolean updated = false; List<Right> rights = List.of(VIEW, EDIT, DELETE); if (fixBadlyInitializedRights(document, rights)) { updated = true; } // If some rights have already been set on the document, we consider that it has already been protected // manually. if (document.getXObjects(LOCAL_CLASS_REFERENCE).isEmpty()) { updated = updated || initializeRights(document, rights); } return updated; }
[ "CWE-269" ]
CVE-2023-34465
HIGH
8.1
xwiki/xwiki-platform
restrictToAdmin
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/internal/DocumentInitializerRightsManager.java
8910b8857d3442d2e8142f655fdc0512930354d1
1
Analyze the following code function for security vulnerabilities
@Override public void cancel(@Nonnull Actor actor) { cancelAndGet(actor); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancel File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
cancel
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
private static Charset extractCharset(String contentType) { if (StringUtils.isEmpty(contentType)) return null; final Matcher matcher = Pattern.compile("(?i)\\bcharset=\\s*\"?([^\\s;\"]*)").matcher(contentType); if (matcher.find()) try { return Charset.forName(matcher.group(1)); } catch (Exception e) { Logme.error(e); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractCharset File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
extractCharset
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public void lockNow(Bundle options) { mPolicy.lockNow(options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lockNow File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
lockNow
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); mRemote.transact(GET_PROCESSES_IN_ERROR_STATE_TRANSACTION, data, reply, 0); reply.readException(); ArrayList<ActivityManager.ProcessErrorStateInfo> list = reply.createTypedArrayList(ActivityManager.ProcessErrorStateInfo.CREATOR); data.recycle(); reply.recycle(); return list; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessesInErrorState File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getProcessesInErrorState
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
void setProfileAutoConnectionPriority (BluetoothDevice device, int profileId){ if (profileId == BluetoothProfile.HEADSET) { HeadsetService hsService = HeadsetService.getHeadsetService(); List<BluetoothDevice> deviceList = hsService.getConnectedDevices(); if ((hsService != null) && (BluetoothProfile.PRIORITY_AUTO_CONNECT != hsService.getPriority(device))){ adjustOtherHeadsetPriorities(hsService, deviceList); hsService.setPriority(device,BluetoothProfile.PRIORITY_AUTO_CONNECT); } } else if (profileId == BluetoothProfile.A2DP) { A2dpService a2dpService = A2dpService.getA2dpService(); if ((a2dpService != null) && (BluetoothProfile.PRIORITY_AUTO_CONNECT != a2dpService.getPriority(device))){ adjustOtherSinkPriorities(a2dpService, device); a2dpService.setPriority(device,BluetoothProfile.PRIORITY_AUTO_CONNECT); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProfileAutoConnectionPriority File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
setProfileAutoConnectionPriority
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public Builder setHostnameVerifier(HostnameVerifier hostnameVerifier) { this.hostnameVerifier = hostnameVerifier; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHostnameVerifier File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setHostnameVerifier
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public static Materials defaultSvnMaterialsWithUrl(String svnUrl) { return new Materials(svnMaterial(svnUrl, "svnDir", null, null, false, null)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: defaultSvnMaterialsWithUrl File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
defaultSvnMaterialsWithUrl
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
private JsonValue readFalse() throws IOException { read(); readRequiredChar('a'); readRequiredChar('l'); readRequiredChar('s'); readRequiredChar('e'); return JsonValue.FALSE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readFalse File: src/main/org/hjson/JsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
readFalse
src/main/org/hjson/JsonParser.java
91bef056d56bf968451887421c89a44af1d692ff
0
Analyze the following code function for security vulnerabilities
public ApiClient setTempFolderPath(String tempFolderPath) { this.tempFolderPath = tempFolderPath; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTempFolderPath File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setTempFolderPath
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
boolean storageManagerIsFileBasedEncryptionEnabled() { return StorageManager.isFileEncrypted(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: storageManagerIsFileBasedEncryptionEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
storageManagerIsFileBasedEncryptionEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public boolean isMetaDataDirty() { return this.isMetaDataDirty; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMetaDataDirty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
isMetaDataDirty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public boolean isDebugging() { return debugging; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDebugging File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
isDebugging
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override protected void saveWorkspace() { synchronized (this) { // TODO refactor this so that we check if the save is needed before writing to the file! File tempFile = new File(_workspaceDir, "workspace.temp.json"); try { if (!saveToFile(tempFile)) { // If the save wasn't really needed, just keep what we had tempFile.delete(); logger.info("Skipping unnecessary workspace save"); return; } } catch (Exception e) { e.printStackTrace(); logger.warn("Failed to save workspace"); return; } // set the workspace to owner-only readable, because it can contain credentials tempFile.setReadable(false, false); tempFile.setReadable(true, true); File file = new File(_workspaceDir, "workspace.json"); File oldFile = new File(_workspaceDir, "workspace.old.json"); if (oldFile.exists()) { oldFile.delete(); } if (file.exists()) { file.renameTo(oldFile); } tempFile.renameTo(file); projectRemoved = false; logger.info("Saved workspace"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveWorkspace File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
saveWorkspace
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
private OnmsUser getOnmsUser(String username) { OnmsUser user = null; try { user = m_userManager.getOnmsUser(username); } catch (final Throwable t) { throw getException(Status.INTERNAL_SERVER_ERROR, t); } if (user == null) throw getException(Status.NOT_FOUND, "User {} does not exist.", username); return user; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOnmsUser File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-0872
HIGH
8
OpenNMS/opennms
getOnmsUser
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java
34ab169a74b2bc489ab06d0dbf33fee1ed94c93c
0
Analyze the following code function for security vulnerabilities
private void resetBodySelection() { int length = mBodyView.getText().length(); int signatureStartPos = getSignatureStartPosition( mSignature, mBodyView.getText().toString()); if (signatureStartPos > -1) { // In case the user deleted the newlines... mBodyView.setSelection(signatureStartPos); } else if (length >= 0) { // Move cursor to the end. mBodyView.setSelection(length); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetBodySelection File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
resetBodySelection
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public Optional<Argument<?>> getFirstTypeVariable() { if (!typeParameters.isEmpty()) { return typeParameters.values().stream().findFirst(); } return Optional.empty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstTypeVariable File: core/src/main/java/io/micronaut/core/type/DefaultArgument.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getFirstTypeVariable
core/src/main/java/io/micronaut/core/type/DefaultArgument.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition eq(Class<? extends T> value) { Condition conditionLocal = new EqualPolymorphicCondition<T>(selector, value); return getOnGoingLogicalCondition(conditionLocal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: eq File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
eq
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
private byte[] getLengthPrefix(byte[] data) { return ByteBuffer.allocate(4).putInt(data.length).array(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLengthPrefix File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getLengthPrefix
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
@Override public void setAnchorViewPosition( View view, float x, float y, float width, float height) { mAnchorViews.put(view, new Position(x, y, width, height)); doSetAnchorViewPosition(view, x, y, width, height); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAnchorViewPosition File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
setAnchorViewPosition
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
@RequiresPermissions("user:refresh_token") @GetMapping("/refreshToken") @ResponseBody public Result refreshToken(Integer id) { User user = userService.selectByIdNoCatch(id); user.setToken(StringUtil.uuid()); userService.update(user); return success(user.getToken()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshToken File: src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java Repository: atjiu/pybbs The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
refreshToken
src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
0
Analyze the following code function for security vulnerabilities
public AvatarService avatarService() { return xmppConnectionService.getAvatarService(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: avatarService File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
avatarService
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public Builder setClock(Clock clock) { this.clock = Preconditions.checkNotNull(clock); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClock File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
setClock
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
@Pure protected boolean isBinary(@Positive int column) { return fields[column - 1].getFormat() == Field.BINARY_FORMAT; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBinary File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
isBinary
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public void appendWhereEscapeString(String inWhere) { if (mWhereClause == null) { mWhereClause = new StringBuilder(inWhere.length() + 16); } if (mWhereClause.length() == 0) { mWhereClause.append('('); } DatabaseUtils.appendEscapedSQLString(mWhereClause, inWhere); }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2018-9493 - Severity: LOW - CVSS Score: 2.1 Description: DO NOT MERGE. Extend SQLiteQueryBuilder for update and delete. Developers often accept selection clauses from untrusted code, and SQLiteQueryBuilder already supports a "strict" mode to help catch SQL injection attacks. This change extends the builder to support update() and delete() calls, so that we can help secure those selection clauses too. Bug: 111085900 Test: atest packages/providers/DownloadProvider/tests/ Test: atest cts/tests/app/src/android/app/cts/DownloadManagerTest.java Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java Change-Id: Ib4fc8400f184755ee7e971ab5f2095186341730c Merged-In: Ib4fc8400f184755ee7e971ab5f2095186341730c (cherry picked from commit 506994268bc4fa07d8798b7737a2952f74b8fd04) Function: appendWhereEscapeString File: core/java/android/database/sqlite/SQLiteQueryBuilder.java Repository: android Fixed Code: public void appendWhereEscapeString(String inWhere) { if (mWhereClause == null) { mWhereClause = new StringBuilder(inWhere.length() + 16); } DatabaseUtils.appendEscapedSQLString(mWhereClause, inWhere); }
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
appendWhereEscapeString
core/java/android/database/sqlite/SQLiteQueryBuilder.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
1
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder2 comment(String comment) { super.commentImpl(comment); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: comment File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
comment
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
Object getPropertyIdByColumnId(String columnId) { return columnKeys.get(columnId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPropertyIdByColumnId File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getPropertyIdByColumnId
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private void filterHostKeyTypes(CryptoWishList cwl) { if (verifier instanceof ExtendedServerHostKeyVerifier) { ExtendedServerHostKeyVerifier extendedVerifier = (ExtendedServerHostKeyVerifier) verifier; List<String> knownAlgorithms = extendedVerifier.getKnownKeyAlgorithmsForHost(hostname, port); if (knownAlgorithms != null && knownAlgorithms.size() > 0) { ArrayList<String> filteredAlgorithms = new ArrayList<>(knownAlgorithms.size()); /* * Look at our current wish list and adjust it based on what the client already knows, but * be careful to keep it in the order desired by the wish list. */ for (String capableAlgo : cwl.serverHostKeyAlgorithms) { for (String knownAlgo : knownAlgorithms) { if (capableAlgo.equals(knownAlgo)) { filteredAlgorithms.add(knownAlgo); } } } if (filteredAlgorithms.size() > 0) { cwl.serverHostKeyAlgorithms = filteredAlgorithms.toArray(new String[0]); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterHostKeyTypes File: src/main/java/com/trilead/ssh2/transport/KexManager.java Repository: connectbot/sshlib The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
connectbot/sshlib
filterHostKeyTypes
src/main/java/com/trilead/ssh2/transport/KexManager.java
5c8b534f6e97db7ac0e0e579331213aa25c173ab
0
Analyze the following code function for security vulnerabilities
public void updateRotationUnchecked(boolean alwaysSendConfiguration, boolean forceRelayout) { if(DEBUG_ORIENTATION) Slog.v(TAG, "updateRotationUnchecked(" + "alwaysSendConfiguration=" + alwaysSendConfiguration + ")"); long origId = Binder.clearCallingIdentity(); boolean changed; synchronized(mWindowMap) { changed = updateRotationUncheckedLocked(false); if (!changed || forceRelayout) { getDefaultDisplayContentLocked().layoutNeeded = true; performLayoutAndPlaceSurfacesLocked(); } } if (changed || alwaysSendConfiguration) { sendNewConfiguration(); } Binder.restoreCallingIdentity(origId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateRotationUnchecked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
updateRotationUnchecked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public static Http2Headers toNettyHttp2(HttpHeaders in, boolean server) { final Http2Headers out = new DefaultHttp2Headers(false, in.size()); // Trailers if it does not have :status. if (server && !in.contains(HttpHeaderNames.STATUS)) { for (Entry<AsciiString, String> entry : in) { final AsciiString name = entry.getKey(); final String value = entry.getValue(); if (name.isEmpty() || isTrailerBlacklisted(name)) { continue; } out.add(name, value); } } else { in.forEach((BiConsumer<AsciiString, String>) out::add); out.remove(HttpHeaderNames.CONNECTION); out.remove(HttpHeaderNames.TRANSFER_ENCODING); } if (!out.contains(HttpHeaderNames.COOKIE)) { return out; } // Split up cookies to allow for better compression. // https://tools.ietf.org/html/rfc7540#section-8.1.2.5 final List<CharSequence> cookies = out.getAllAndRemove(HttpHeaderNames.COOKIE); for (CharSequence c : cookies) { out.add(HttpHeaderNames.COOKIE, COOKIE_SPLITTER.split(c)); } return out; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toNettyHttp2 File: core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
toNettyHttp2
core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public XWikiDocument getRevision(XWikiDocument document, String revision) throws XWikiException { return getRevision(document != null ? document.getDocumentReferenceWithLocale() : null, revision); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRevision File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-29208
HIGH
7.5
xwiki/xwiki-platform
getRevision
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java
d9e947559077e947315bf700c5703dfc7dd8a8d7
0
Analyze the following code function for security vulnerabilities
@Override public void overridePendingAppTransitionScaleUp(int startX, int startY, int startWidth, int startHeight) { synchronized(mWindowMap) { mAppTransition.overridePendingAppTransitionScaleUp(startX, startY, startWidth, startHeight); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: overridePendingAppTransitionScaleUp File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
overridePendingAppTransitionScaleUp
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override protected long getMaxTextBufferSize() { return session.getMaxTextMessageBufferSize(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxTextBufferSize File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getMaxTextBufferSize
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
IActivityManager getIActivityManager() { return ActivityManager.getService(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIActivityManager File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getIActivityManager
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public String getRecordingTextTracks(String recordId) { return recordingServiceHelper.getRecordingTextTracks(recordId, captionsDir, getCaptionFileUrlDirectory()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecordingTextTracks File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
getRecordingTextTracks
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
@Override public Stream<JsonValue> getArrayStream() { if (currentEvent != Event.START_ARRAY) { throw new IllegalStateException( JsonMessages.PARSER_GETARRAY_ERR(currentEvent)); } Spliterator<JsonValue> spliterator = new Spliterators.AbstractSpliterator<JsonValue>(Long.MAX_VALUE, Spliterator.ORDERED) { @Override public Spliterator<JsonValue> trySplit() { return null; } @Override public boolean tryAdvance(Consumer<? super JsonValue> action) { if (action == null) { throw new NullPointerException(); } if (! hasNext()) { return false; } if (next() == JsonParser.Event.END_ARRAY) { return false; } action.accept(getValue()); return true; } }; return StreamSupport.stream(spliterator, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getArrayStream File: impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java Repository: eclipse-ee4j/parsson The code follows secure coding practices.
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
getArrayStream
impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java
ab239fee273cb262910890f1a6fe666ae92cd623
0
Analyze the following code function for security vulnerabilities
@Override public void drawImage(Object graphics, Object img, int x, int y) { ((AndroidGraphics) graphics).drawImage(img, x, y); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: drawImage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
drawImage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public static String getFirstValidRedirectUri(KeycloakSession session, String rootUrl, Set<String> validRedirects) { return getFirstValidRedirectUri(resolveValidRedirects(session, rootUrl, validRedirects)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstValidRedirectUri File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java Repository: keycloak The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4361
MEDIUM
6.1
keycloak
getFirstValidRedirectUri
services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
0
Analyze the following code function for security vulnerabilities
@TestApi public @Nullable String getLastResourceResolution() { synchronized (this) { ensureValidLocked(); return nativeGetLastResourceResolution(mObject); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastResourceResolution File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getLastResourceResolution
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public boolean validate() throws XWikiException { return this.doc.validate(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
validate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting long getResetIntervalForTest() { return mResetInterval; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResetIntervalForTest File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getResetIntervalForTest
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public String getPageUrl() throws IndexUnreachableException { String pageType = null; if (StringUtils.isBlank(pageType)) { pageType = navigationHelper.getPreferredView(); } if (StringUtils.isBlank(pageType)) { pageType = navigationHelper.getCurrentView(); } return getPageUrlByType(pageType); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPageUrl File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getPageUrl
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public ClientConfig getDefaultClientConfig() { ClientConfig clientConfig = new ClientConfig(); clientConfig.register(MultiPartFeature.class); clientConfig.register(json); clientConfig.register(JacksonFeature.class); clientConfig.property(HttpUrlConnectorProvider.SET_METHOD_WORKAROUND, true); // turn off compliance validation to be able to send payloads with DELETE calls clientConfig.property(ClientProperties.SUPPRESS_HTTP_COMPLIANCE_VALIDATION, true); if (debugging) { clientConfig.register(new LoggingFeature(java.util.logging.Logger.getLogger(LoggingFeature.DEFAULT_LOGGER_NAME), java.util.logging.Level.INFO, LoggingFeature.Verbosity.PAYLOAD_ANY, 1024*50 /* Log payloads up to 50K */)); clientConfig.property(LoggingFeature.LOGGING_FEATURE_VERBOSITY, LoggingFeature.Verbosity.PAYLOAD_ANY); // Set logger to ALL java.util.logging.Logger.getLogger(LoggingFeature.DEFAULT_LOGGER_NAME).setLevel(java.util.logging.Level.ALL); } else { // suppress warnings for payloads with DELETE calls: java.util.logging.Logger.getLogger("org.glassfish.jersey.client").setLevel(java.util.logging.Level.SEVERE); } return clientConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultClientConfig File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getDefaultClientConfig
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
void setRequestedOrientation(int requestedOrientation) { setOrientation(requestedOrientation, this); // Push the new configuration to the requested app in case where it's not pushed, e.g. when // the request is handled at task level with letterbox. if (!getMergedOverrideConfiguration().equals( mLastReportedConfiguration.getMergedConfiguration())) { ensureActivityConfiguration(0 /* globalChanges */, false /* preserveWindow */); } mAtmService.getTaskChangeNotificationController().notifyActivityRequestedOrientationChanged( task.mTaskId, requestedOrientation); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRequestedOrientation File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setRequestedOrientation
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder root() { return new XMLBuilder(getDocument()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: root File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
root
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public FieldGroup getEditorFieldGroup() { return editorFieldGroup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditorFieldGroup File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getEditorFieldGroup
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public void setObject(String className, int nb, BaseObject object) { setXObject(resolveClassReference(className), nb, object); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
setObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public List<BaseObject> getXObjects(EntityReference reference) { if (reference.getType() == EntityType.DOCUMENT) { // class reference return getXObjects( getCurrentReferenceDocumentReferenceResolver().resolve(reference, getDocumentReference())); } return Collections.emptyList(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getXObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public int getSyncRandomOffset() { return mSyncRandomOffset; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSyncRandomOffset File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getSyncRandomOffset
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
void onExtrasChanged(Call call, Bundle extras) { final String callId = mCallIdMapper.getCallId(call); if (callId != null && isServiceValid("onExtrasChanged")) { try { logOutgoing("onExtrasChanged %s %s", callId, extras); mServiceInterface.onExtrasChanged(callId, extras, Log.getExternalSession(TELECOM_ABBREVIATION)); } catch (RemoteException ignored) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onExtrasChanged File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
onExtrasChanged
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public JSONObject put(String key, int value) throws JSONException { put(key, Integer.valueOf(value)); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
put
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public String removeEntry(String dn) { logger.info("SecurityDomainProcessor: Removing entry " + dn); String status = SUCCESS; LdapBoundConnFactory connFactory = null; LDAPConnection conn = null; CMSEngine engine = CMS.getCMSEngine(); EngineConfig cs = engine.getConfig(); PKISocketConfig socketConfig = cs.getSocketConfig(); try { LDAPConfig ldapConfig = cs.getInternalDBConfig(); connFactory = new LdapBoundConnFactory("UpdateDomainXML"); connFactory.init(socketConfig, ldapConfig, engine.getPasswordStore()); conn = connFactory.getConn(); conn.delete(dn); } catch (LDAPException e) { int resultCode = e.getLDAPResultCode(); if (resultCode != LDAPException.NO_SUCH_OBJECT) { status = FAILED; logger.error("SecurityDomainProcessor: Unable to delete entry: " + e.getMessage(), e); } } catch (Exception e) { logger.warn("SecurityDomainProcessor: Unable to delete entry: " + e.getMessage(), e); } finally { try { if (conn != null && connFactory != null) { logger.debug("SecurityDomainProcessor: Releasing LDAP connection"); connFactory.returnConn(conn); } } catch (Exception e) { logger.warn("SecurityDomainProcessor: Unable to release LDAP connection: " + e.getMessage(), e); } } return status; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeEntry File: base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
removeEntry
base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private List<String> optionList(String key, Map<String, Object> options) { List<String> out = new ArrayList<>(); Object option = options.get(key); if (option instanceof String) { out.addAll(Arrays.asList(((String) option).split(","))); } else if (option instanceof Collection) { out.addAll((Collection<String>) option); } else if (option != null) { throw new IllegalArgumentException( "Unsupported option list: {key: " + key + ", type: " + option.getClass() + "}"); } return out; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optionList File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
optionList
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
private void unregisterAccountListener(String[] accountTypes, String opPackageName, UserAccounts accounts) { synchronized (accounts.mReceiversForType) { if (accountTypes == null) { // null for any type accountTypes = new String[] {null}; } for (String type : accountTypes) { Map<String, Integer> receivers = accounts.mReceiversForType.get(type); if (receivers == null || receivers.get(opPackageName) == null) { throw new IllegalArgumentException("attempt to unregister wrong receiver"); } Integer cnt = receivers.get(opPackageName); if (cnt == 1) { receivers.remove(opPackageName); } else { receivers.put(opPackageName, cnt - 1); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterAccountListener File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
unregisterAccountListener
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private UserInfo getUserInfoLocked(int userId) { UserInfo ui = mUsers.get(userId); // If it is partial and not in the process of being removed, return as unknown user. if (ui != null && ui.partial && !mRemovingUserIds.get(userId)) { Slog.w(LOG_TAG, "getUserInfo: unknown user #" + userId); return null; } return ui; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserInfoLocked File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
getUserInfoLocked
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
public void syncThirdPartyIssues() { List<String> projectIds = trackProjectService.getThirdPartProjectIds(); projectIds.forEach(id -> { try { syncThirdPartyIssues(id); } catch (Exception e) { LogUtil.error(e.getMessage(), e); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: syncThirdPartyIssues File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
syncThirdPartyIssues
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public void initTargetPoC() { localPoCButton.addActionListener(e -> { JFileChooser fileChooser = new JFileChooser(); fileChooser.setFileSelectionMode(JFileChooser.FILES_ONLY); int option = fileChooser.showOpenDialog(new JFrame()); if (option == JFileChooser.APPROVE_OPTION) { File file = fileChooser.getSelectedFile(); String absPath = file.getAbsolutePath(); String[] temp = absPath.split("\\."); String suffix = temp[temp.length - 1].toLowerCase().trim(); if (!suffix.equals("yml") && !suffix.equals("yaml")) { if (LANG == CHINESE) { JOptionPane.showMessageDialog(null, "你选择的不是合法YAML文件"); } else { JOptionPane.showMessageDialog(null, "Error File Type"); } return; } localPoCText.setText(absPath); onlyUsePhantasm(absPath); if (LANG == CHINESE) { JOptionPane.showMessageDialog(null, "设置PoC成功"); } else { JOptionPane.showMessageDialog(null, "Success"); } } }); updatePocButton.addActionListener(e -> { String[] cmd = new String[]{xrayCmd.getXray(), "ws", "--list"}; InputStream is = Objects.requireNonNull(ExecUtil.exec(cmd)).getInputStream(); stop = false; execAndFresh(cmd); List<String> poc = new ArrayList<>(); String data = IOUtil.readStringFromIs(is); assert data != null; String[] temp = data.split("\n"); for (String s : temp) { s = s.trim(); if (s.endsWith("\r")) { s = s.substring(0, s.length() - 1); } if (s.contains(":")) { continue; } if (s.contains("test") && !s.contains("testrail")) { continue; } if (!s.contains("poc")) { continue; } s = s.substring(2); poc.add(s.trim()); } Poc.clear(); Poc.addAll(poc); if (LANG == CHINESE) { pocNumLabel.setText(String.format("当前共有: %s 个PoC", Poc.getPocList().size())); } else { pocNumLabel.setText(String.format("PoC Num: %s", Poc.getPocList().size())); } }); pocButton.addActionListener(e -> { String poc = usePoCText.getText(); logger.info(poc); if (!Poc.getPocList().contains(poc.trim())) { if (LANG == CHINESE) { JOptionPane.showMessageDialog(null, "PoC不存在"); } else { JOptionPane.showMessageDialog(null, "PoC Not Exist"); } return; } onlyUsePhantasm(poc); if (LANG == CHINESE) { JOptionPane.showMessageDialog(null, "设置PoC成功"); } else { JOptionPane.showMessageDialog(null, "Success"); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initTargetPoC File: src/main/java/com/chaitin/xray/form/MainForm.java Repository: 4ra1n/super-xray The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-41958
HIGH
7.8
4ra1n/super-xray
initTargetPoC
src/main/java/com/chaitin/xray/form/MainForm.java
4d0d59663596db03f39d7edd2be251d48b52dcfc
0
Analyze the following code function for security vulnerabilities
private void _readStringEscapeChar (@Nonnull final IJsonParsePosition aStartPos, @Nonnull final JsonStringBuilder aStrStringOriginalContent, @Nonnull final JsonStringBuilder aStrStringUnescapedContent) throws JsonParseException { final int c2 = _readChar (); aStrStringOriginalContent.append ((char) c2); if (c2 == '"' || c2 == '/' || c2 == '\\') aStrStringUnescapedContent.append ((char) c2); else if (c2 == 'b') aStrStringUnescapedContent.append ('\b'); else if (c2 == 'f') aStrStringUnescapedContent.append ('\f'); else if (c2 == 'n') aStrStringUnescapedContent.append ('\n'); else if (c2 == 'r') aStrStringUnescapedContent.append ('\r'); else if (c2 == 't') aStrStringUnescapedContent.append ('\t'); else if (c2 == 'u') { final int ch0 = _readChar (); final int n0 = _getHexValue (aStartPos, ch0); final int ch1 = _readChar (); final int n1 = _getHexValue (aStartPos, ch1); final int ch2 = _readChar (); final int n2 = _getHexValue (aStartPos, ch2); final int ch3 = _readChar (); final int n3 = _getHexValue (aStartPos, ch3); aStrStringOriginalContent.append ((char) ch0); aStrStringOriginalContent.append ((char) ch1); aStrStringOriginalContent.append ((char) ch2); aStrStringOriginalContent.append ((char) ch3); final int nUnescapedChar = (n0 & 0xff) << 12 | (n1 & 0xff) << 8 | (n2 & 0xff) << 4 | (n3 & 0xff); aStrStringUnescapedContent.append ((char) nUnescapedChar); } else throw _parseEx (aStartPos, "Invalid JSON String escape character " + _getPrintableChar (c2)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _readStringEscapeChar File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java Repository: phax/ph-commons The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34612
HIGH
7.5
phax/ph-commons
_readStringEscapeChar
ph-json/src/main/java/com/helger/json/parser/JsonParser.java
02a4d034dcfb2b6e1796b25f519bf57a6796edce
0
Analyze the following code function for security vulnerabilities
@Reference public void setHttpClient(TrustedHttpClient httpClient) { this.httpClient = httpClient; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHttpClient File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
setHttpClient
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
private void initAvatarView() { final ImageView avatarView = findViewById(R.id.account_avatar); final ImageView avatarTwoPaneView = findViewById(R.id.account_avatar_two_pane_version); if (AvatarViewMixin.isAvatarSupported(this)) { avatarView.setVisibility(View.VISIBLE); getLifecycle().addObserver(new AvatarViewMixin(this, avatarView)); if (mIsEmbeddingActivityEnabled) { avatarTwoPaneView.setVisibility(View.VISIBLE); getLifecycle().addObserver(new AvatarViewMixin(this, avatarTwoPaneView)); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initAvatarView File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
initAvatarView
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
@Override public void onLabelChanged(CharSequence label) { mMePreference.setTitle(label); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLabelChanged File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
onLabelChanged
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
public boolean isColumnReorderingAllowed() { return getState(false).columnReorderingAllowed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isColumnReorderingAllowed File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
isColumnReorderingAllowed
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public void onKeyguardOccludedChanged(boolean keyguardOccluded) { mNavigationBar.onKeyguardOccludedChanged(keyguardOccluded); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onKeyguardOccludedChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onKeyguardOccludedChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public int getTaskForActivity(IBinder token, boolean onlyRoot) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTaskForActivity File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getTaskForActivity
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public int getAllPhoneAccountsCount() { try { Log.startSession("TSI.gAPAC"); try { enforceModifyPermission( "getAllPhoneAccountsCount requires MODIFY_PHONE_STATE permission."); } catch (SecurityException e) { EventLog.writeEvent(0x534e4554, "62347125", Binder.getCallingUid(), "getAllPhoneAccountsCount"); throw e; } synchronized (mLock) { try { // This list is pre-filtered for the calling user. return getAllPhoneAccounts().getList().size(); } catch (Exception e) { Log.e(this, e, "getAllPhoneAccountsCount"); throw e; } } } finally { Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllPhoneAccountsCount File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
getAllPhoneAccountsCount
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public boolean hasSiblings() { try { return getCms().readResource(getParamResource(), CmsResourceFilter.ALL).getSiblingCount() > 1; } catch (CmsException e) { LOG.error(e.getLocalizedMessage(getLocale()), e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasSiblings File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
hasSiblings
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override boolean canCreateRemoteAnimationTarget() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canCreateRemoteAnimationTarget File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
canCreateRemoteAnimationTarget
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void init(IAccessibilityServiceConnection connection, int connectionId, IBinder windowToken) { Message message = mCaller.obtainMessageIOO(DO_INIT, connectionId, connection, windowToken); mCaller.sendMessage(message); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
init
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
private SQLiteStatement getStatement(boolean allowReplace) throws SQLException { if (allowReplace) { if (mReplaceStatement == null) { if (mInsertSQL == null) buildSQL(); // chop "INSERT" off the front and prepend "INSERT OR REPLACE" instead. String replaceSQL = "INSERT OR REPLACE" + mInsertSQL.substring(6); mReplaceStatement = mDb.compileStatement(replaceSQL); } return mReplaceStatement; } else { if (mInsertStatement == null) { if (mInsertSQL == null) buildSQL(); mInsertStatement = mDb.compileStatement(mInsertSQL); } return mInsertStatement; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStatement File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
getStatement
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
public void switchUserResource(WebSession session, String sign, String sourceId, UserDTO sessionUser) { // 获取最新UserDTO UserDTO user = getUserDTO(sessionUser.getId()); User newUser = new User(); if (StringUtils.equals("workspace", sign)) { user.setLastWorkspaceId(sourceId); sessionUser.setLastWorkspaceId(sourceId); List<Project> projects = getProjectListByWsAndUserId(sessionUser.getId(), sourceId); if (projects.size() > 0) { user.setLastProjectId(projects.get(0).getId()); } else { user.setLastProjectId(""); } } BeanUtils.copyProperties(user, newUser); // 切换工作空间或组织之后更新 session 里的 user session.getAttributes().put(SessionConstants.ATTR_USER, SessionUser.fromUser(user, session.getId())); session.getAttributes().put(FindByIndexNameSessionRepository.PRINCIPAL_NAME_INDEX_NAME, sessionUser.getId()); userMapper.updateByPrimaryKeySelective(newUser); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: switchUserResource File: framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-32699
MEDIUM
6.5
metersphere
switchUserResource
framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java
c59e381d368990214813085a1a4877c5ef865411
0
Analyze the following code function for security vulnerabilities
protected boolean scanPseudoAttribute(XMLAttributesImpl attributes) throws IOException { return scanAttribute(attributes,fSingleBoolean,'?'); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanPseudoAttribute File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
scanPseudoAttribute
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
void pauseChildStacks(ActivityRecord parent, boolean userLeaving, boolean uiSleeping, boolean resuming, boolean dontWait) { // TODO: Put all stacks in supervisor and iterate through them instead. for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) { ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks; for (int stackNdx = stacks.size() - 1; stackNdx >= 0; --stackNdx) { final ActivityStack stack = stacks.get(stackNdx); if (stack.mResumedActivity != null && stack.mActivityContainer.mParentActivity == parent) { stack.startPausingLocked(userLeaving, uiSleeping, resuming, dontWait); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pauseChildStacks File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
pauseChildStacks
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public void setTopControlsHeight(int topControlsHeightPix, boolean topControlsShrinkBlinkSize) { if (topControlsHeightPix == mTopControlsHeightPix && topControlsShrinkBlinkSize == mTopControlsShrinkBlinkSize) { return; } mTopControlsHeightPix = topControlsHeightPix; mTopControlsShrinkBlinkSize = topControlsShrinkBlinkSize; if (mNativeContentViewCore != 0) nativeWasResized(mNativeContentViewCore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTopControlsHeight File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
setTopControlsHeight
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private void syncPut(String[] cacheNames, Object key, Object value) { for (String cacheName : cacheNames) { SyncCache syncCache = cacheManager.getCache(cacheName); try { syncCache.put(key, value); } catch (RuntimeException e) { if (errorHandler.handlePutError(syncCache, key, value, e)) { throw e; } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: syncPut File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
syncPut
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
private static File buildFile(File parent, String name, String ext) { if (TextUtils.isEmpty(ext)) { return new File(parent, name); } else { return new File(parent, name + "." + ext); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildFile File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
buildFile
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
@Override public String getId() { return SamlProtocol.LOGIN_PROTOCOL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getId File: services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java Repository: keycloak The code follows secure coding practices.
[ "CWE-287" ]
CVE-2021-3827
MEDIUM
6.8
keycloak
getId
services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java
44000caaf5051d7f218d1ad79573bd3d175cad0d
0
Analyze the following code function for security vulnerabilities
public void setKeyLookup(final Function<String, SecretKey> keyLookup) { this.keyLookup = keyLookup; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyLookup File: src/main/java/org/cryptacular/CiphertextHeaderV2.java Repository: vt-middleware/cryptacular The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-7226
MEDIUM
5
vt-middleware/cryptacular
setKeyLookup
src/main/java/org/cryptacular/CiphertextHeaderV2.java
00395c232cdc62d4292ce27999c026fc1f076b1d
0
Analyze the following code function for security vulnerabilities
private static void createDirectory(File directory) { if (!directory.exists()) directory.mkdirs(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDirectory File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
createDirectory
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
void dumpAnimatorLocked(PrintWriter pw, String[] args, boolean dumpAll) { pw.println("WINDOW MANAGER ANIMATOR STATE (dumpsys window animator)"); mAnimator.dumpLocked(pw, " ", dumpAll); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpAnimatorLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dumpAnimatorLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private void start() { LocalServices.addService(ActivityTaskManagerInternal.class, mInternal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: start File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
start
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Test public void save4returnId(TestContext context) { postgresClient = createFoo(context); postgresClient.save(FOO, xPojo, /* returnId */ true, context.asyncAssertSuccess(save -> { String id = save; postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> { context.assertEquals("x", get.getString("key")); })); })); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save4returnId File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
save4returnId
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public static String trimUnicodeSurrogates(String text) { if (text != null) { StringBuilder sb = new StringBuilder(); for (int i = 0; i < text.length(); i++) { char ch = text.charAt(i); if (!Character.isHighSurrogate(ch) && !Character.isLowSurrogate(ch)) { sb.append(ch); } } return sb.toString(); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trimUnicodeSurrogates File: src/main/java/com/openkm/util/FormatUtil.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-40317
MEDIUM
5.4
openkm/document-management-system
trimUnicodeSurrogates
src/main/java/com/openkm/util/FormatUtil.java
870d518f7de349c3fa4c7b9883789fdca4590c4e
0
Analyze the following code function for security vulnerabilities
@Override protected ModelAndView handleRequestInternal(HttpServletRequest request, HttpServletResponse response) throws Exception { String operation = request.getParameter("operation"); if (!StringUtils.hasText(operation) && StringUtils.hasText(request.getParameter("groupName"))) { operation = "show"; } LOG.debug("!!!! Calling operation {} in GroupController", operation); if ("create".equalsIgnoreCase(operation)){ return createGroup(request, response); } else if ("addGroup".equalsIgnoreCase(operation)){ return addGroup(request, response); } else if ("show".equalsIgnoreCase(operation)){ return showGroup(request, response); } else if ("delete".equalsIgnoreCase(operation)){ return deleteGroup(request, response); } else if ("edit".equalsIgnoreCase(operation)){ return editGroup(request, response); } else if ("rename".equalsIgnoreCase(operation)){ return renameGroup(request, response); } else if ("addDutySchedules".equalsIgnoreCase(operation)){ return addDutySchedules(request, response); } else if ("removeDutySchedules".equalsIgnoreCase(operation)){ return removeDutySchedules(request, response); } else if ("save".equalsIgnoreCase(operation)) { return saveGroup(request, response); } else if ("cancel".equalsIgnoreCase(operation)){ return cancel(request, response); } else { return listGroups(request, response); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleRequestInternal File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352", "CWE-79" ]
CVE-2021-25929
LOW
3.5
OpenNMS/opennms
handleRequestInternal
opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
0
Analyze the following code function for security vulnerabilities
@Override public void onLaunchAnimationEnd(boolean launchIsFullScreen) { if (launchIsFullScreen) { mCentralSurfaces.instantCollapseNotificationPanel(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLaunchAnimationEnd File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onLaunchAnimationEnd
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
private static void ldapAuthenticationGenerator(XmlGenerator gen, LdapAuthenticationConfig c) { if (c == null) { return; } addClusterLoginElements(gen.open("ldap"), c) .node("url", c.getUrl()) .nodeIfContents("socket-factory-class-name", c.getSocketFactoryClassName()) .nodeIfContents("parse-dn", c.getParseDn()) .nodeIfContents("role-context", c.getRoleContext()) .nodeIfContents("role-filter", c.getRoleFilter()) .nodeIfContents("role-mapping-attribute", c.getRoleMappingAttribute()) .nodeIfContents("role-mapping-mode", c.getRoleMappingMode()) .nodeIfContents("role-name-attribute", c.getRoleNameAttribute()) .nodeIfContents("role-recursion-max-depth", c.getRoleRecursionMaxDepth()) .nodeIfContents("role-search-scope", c.getRoleSearchScope()) .nodeIfContents("user-name-attribute", c.getUserNameAttribute()) .nodeIfContents("system-user-dn", c.getSystemUserDn()) .nodeIfContents("system-user-password", c.getSystemUserPassword()) .nodeIfContents("system-authentication", c.getSystemAuthentication()) .nodeIfContents("security-realm", c.getSecurityRealm()) .nodeIfContents("password-attribute", c.getPasswordAttribute()) .nodeIfContents("user-context", c.getUserContext()) .nodeIfContents("user-filter", c.getUserFilter()) .nodeIfContents("user-search-scope", c.getUserSearchScope()) .nodeIfContents("skip-authentication", c.getSkipAuthentication()) .close(); }
Vulnerability Classification: - CWE: CWE-522 - CVE: CVE-2023-33264 - Severity: MEDIUM - CVSS Score: 4.3 Description: Extend set of masked fields in ConfigXmlGenerator Function: ldapAuthenticationGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast Fixed Code: private void ldapAuthenticationGenerator(XmlGenerator gen, LdapAuthenticationConfig c) { if (c == null) { return; } addClusterLoginElements(gen.open("ldap"), c) .node("url", c.getUrl()) .nodeIfContents("socket-factory-class-name", c.getSocketFactoryClassName()) .nodeIfContents("parse-dn", c.getParseDn()) .nodeIfContents("role-context", c.getRoleContext()) .nodeIfContents("role-filter", c.getRoleFilter()) .nodeIfContents("role-mapping-attribute", c.getRoleMappingAttribute()) .nodeIfContents("role-mapping-mode", c.getRoleMappingMode()) .nodeIfContents("role-name-attribute", c.getRoleNameAttribute()) .nodeIfContents("role-recursion-max-depth", c.getRoleRecursionMaxDepth()) .nodeIfContents("role-search-scope", c.getRoleSearchScope()) .nodeIfContents("user-name-attribute", c.getUserNameAttribute()) .nodeIfContents("system-user-dn", c.getSystemUserDn()) .nodeIfContents("system-user-password", getOrMaskValue(c.getSystemUserPassword())) .nodeIfContents("system-authentication", c.getSystemAuthentication()) .nodeIfContents("security-realm", c.getSecurityRealm()) .nodeIfContents("password-attribute", c.getPasswordAttribute()) .nodeIfContents("user-context", c.getUserContext()) .nodeIfContents("user-filter", c.getUserFilter()) .nodeIfContents("user-search-scope", c.getUserSearchScope()) .nodeIfContents("skip-authentication", c.getSkipAuthentication()) .close(); }
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
ldapAuthenticationGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
1
Analyze the following code function for security vulnerabilities
private void enforceSettingReadable(String settingName, int settingsType, int userId) { if (UserHandle.getAppId(Binder.getCallingUid()) < Process.FIRST_APPLICATION_UID) { return; } ApplicationInfo ai = getCallingApplicationInfoOrThrow(); if (ai.isSystemApp() || ai.isSignedWithPlatformKey()) { return; } if ((ai.flags & ApplicationInfo.FLAG_TEST_ONLY) == 0) { // Skip checking readable annotations for test_only apps checkReadableAnnotation(settingsType, settingName, ai.targetSdkVersion); } /** * some settings need additional permission check, this is to have a matching security * control from other API alternatives returning the same settings values. * note, the permission enforcement should be based on app's targetSDKlevel to better handle * app-compat. */ switch (settingName) { // missing READ_PRIVILEGED_PHONE_STATE permission protection // see alternative API {@link SubscriptionManager#getPreferredDataSubscriptionId() case Settings.Global.MULTI_SIM_DATA_CALL_SUBSCRIPTION: // app-compat handling, not break apps targeting on previous SDKs. if (CompatChanges.isChangeEnabled( ENFORCE_READ_PERMISSION_FOR_MULTI_SIM_DATA_CALL)) { getContext().enforceCallingOrSelfPermission( Manifest.permission.READ_PRIVILEGED_PHONE_STATE, "access global settings MULTI_SIM_DATA_CALL_SUBSCRIPTION"); } break; } if (!ai.isInstantApp()) { return; } if (!getInstantAppAccessibleSettings(settingsType).contains(settingName) && !getOverlayInstantAppAccessibleSettings(settingsType).contains(settingName)) { // Don't enforce the instant app whitelist for now -- its too prone to unintended // breakage in the current form. Slog.w(LOG_TAG, "Instant App " + ai.packageName + " trying to access unexposed setting, this will be an error in the future."); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceSettingReadable File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
enforceSettingReadable
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withPackageBlacklist(Collection<PackageRule> packageBlacklist) { blacklistedPackages = Set.copyOf(packageBlacklist); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPackageBlacklist File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withPackageBlacklist
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0