instruction
string | input
string | output
string | cwe_ids
list | cve_id
string | severity
string | cvss_score
float64 | repo_name
string | func_name
string | file_path
string | commit_hash
string | is_vulnerable
int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities
|
public void jumpTask(String procInsId, String currentTaskId, String targetTaskDefinitionKey, Map<String, Object> variables) {
jumpTask(getTaskEntity(currentTaskId), targetTaskDefinitionKey, variables);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: jumpTask
File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
Repository: thinkgem/jeesite
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2023-34601
|
CRITICAL
| 9.8
|
thinkgem/jeesite
|
jumpTask
|
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
|
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public boolean isFocused() {
return mForceIsFocused || super.isFocused();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFocused
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-254"
] |
CVE-2016-5163
|
MEDIUM
| 4.3
|
chromium
|
isFocused
|
chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
|
3bd33fee094e863e5496ac24714c558bd58d28ef
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected Object filterToLabel(PackageParser.ActivityIntentInfo filter) {
return filter.activity;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: filterToLabel
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-119"
] |
CVE-2016-2497
|
HIGH
| 7.5
|
android
|
filterToLabel
|
services/core/java/com/android/server/pm/PackageManagerService.java
|
a75537b496e9df71c74c1d045ba5569631a16298
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public long inputDispatchingTimedOut(int pid, final boolean aboveSystem, String reason) {
if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Requires permission "
+ android.Manifest.permission.FILTER_EVENTS);
}
ProcessRecord proc;
long timeout;
synchronized (this) {
synchronized (mPidsSelfLocked) {
proc = mPidsSelfLocked.get(pid);
}
timeout = getInputDispatchingTimeoutLocked(proc);
}
if (!inputDispatchingTimedOut(proc, null, null, aboveSystem, reason)) {
return -1;
}
return timeout;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: inputDispatchingTimedOut
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2015-3833
|
MEDIUM
| 4.3
|
android
|
inputDispatchingTimedOut
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
aaa0fee0d7a8da347a0c47cef5249c70efee209e
| 0
|
Analyze the following code function for security vulnerabilities
|
protected void addUserToGroup(String userName, String groupName, XWikiContext context) throws XWikiException
{
XWikiDocument groupDoc = getDocument(groupName, context);
DocumentReference groupClassReference = getGroupClass(context).getDocumentReference();
BaseObject memberObject =
groupDoc.newXObject(groupClassReference.removeParent(groupClassReference.getWikiReference()), context);
memberObject.setStringValue("member", userName);
this.saveDocument(groupDoc, localizePlainOrKey("core.comment.addedUserToGroup"), context);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addUserToGroup
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2021-32620
|
MEDIUM
| 4
|
xwiki/xwiki-platform
|
addUserToGroup
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
|
f9a677408ffb06f309be46ef9d8df1915d9099a4
| 0
|
Analyze the following code function for security vulnerabilities
|
@Deprecated
public void setLargeStringValue(String className, String fieldName, String value)
{
setLargeStringValue(
getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()),
fieldName, value);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setLargeStringValue
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-26470
|
HIGH
| 7.5
|
xwiki/xwiki-platform
|
setLargeStringValue
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
|
db3d1c62fc5fb59fefcda3b86065d2d362f55164
| 0
|
Analyze the following code function for security vulnerabilities
|
private static void kerberosAuthenticationGenerator(XmlGenerator gen, KerberosAuthenticationConfig c) {
if (c == null) {
return;
}
XmlGenerator kerberosGen = gen.open("kerberos");
addClusterLoginElements(kerberosGen, c)
.nodeIfContents("relax-flags-check", c.getRelaxFlagsCheck())
.nodeIfContents("use-name-without-realm", c.getUseNameWithoutRealm())
.nodeIfContents("security-realm", c.getSecurityRealm())
.nodeIfContents("keytab-file", c.getKeytabFile())
.nodeIfContents("principal", c.getPrincipal());
ldapAuthenticationGenerator(kerberosGen, c.getLdapAuthenticationConfig());
kerberosGen.close();
}
|
Vulnerability Classification:
- CWE: CWE-522
- CVE: CVE-2023-33264
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Extend set of masked fields in ConfigXmlGenerator
Function: kerberosAuthenticationGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
Fixed Code:
private void kerberosAuthenticationGenerator(XmlGenerator gen, KerberosAuthenticationConfig c) {
if (c == null) {
return;
}
XmlGenerator kerberosGen = gen.open("kerberos");
addClusterLoginElements(kerberosGen, c)
.nodeIfContents("relax-flags-check", c.getRelaxFlagsCheck())
.nodeIfContents("use-name-without-realm", c.getUseNameWithoutRealm())
.nodeIfContents("security-realm", c.getSecurityRealm())
.nodeIfContents("keytab-file", c.getKeytabFile())
.nodeIfContents("principal", c.getPrincipal());
ldapAuthenticationGenerator(kerberosGen, c.getLdapAuthenticationConfig());
kerberosGen.close();
}
|
[
"CWE-522"
] |
CVE-2023-33264
|
MEDIUM
| 4.3
|
hazelcast
|
kerberosAuthenticationGenerator
|
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
|
80a502d53cc48bf895711ab55f95e3a51e344ac1
| 1
|
Analyze the following code function for security vulnerabilities
|
@Override
public Iterable<File> successors(File file) {
// check isDirectory() just because it may be faster than listFiles() on a non-directory
if (file.isDirectory()) {
File[] files = file.listFiles();
if (files != null) {
return Collections.unmodifiableList(Arrays.asList(files));
}
}
return ImmutableList.of();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: successors
File: android/guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices.
|
[
"CWE-552"
] |
CVE-2023-2976
|
HIGH
| 7.1
|
google/guava
|
successors
|
android/guava/src/com/google/common/io/Files.java
|
feb83a1c8fd2e7670b244d5afd23cba5aca43284
| 0
|
Analyze the following code function for security vulnerabilities
|
private static void mkdirsOrThrow(File dir) throws IOException {
if (!dir.exists() && !dir.mkdirs()) {
throw new IOException("Failed to create directory " + dir);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mkdirsOrThrow
File: pf4j/src/main/java/org/pf4j/util/Unzip.java
Repository: pf4j
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2023-40827
|
HIGH
| 7.5
|
pf4j
|
mkdirsOrThrow
|
pf4j/src/main/java/org/pf4j/util/Unzip.java
|
ed9392069fe14c6c30d9f876710e5ad40f7ea8c1
| 0
|
Analyze the following code function for security vulnerabilities
|
public abstract JavaType withTypeHandler(Object h);
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withTypeHandler
File: src/main/java/com/fasterxml/jackson/databind/JavaType.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices.
|
[
"CWE-502"
] |
CVE-2019-16942
|
HIGH
| 7.5
|
FasterXML/jackson-databind
|
withTypeHandler
|
src/main/java/com/fasterxml/jackson/databind/JavaType.java
|
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public int checkProvisioningPrecondition(String action, String packageName) {
Objects.requireNonNull(packageName, "packageName is null");
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
hasCallingOrSelfPermission(MANAGE_PROFILE_AND_DEVICE_OWNERS));
long originalId = mInjector.binderClearCallingIdentity();
try {
return checkProvisioningPreconditionSkipPermission(
action, packageName, caller.getUserId());
} finally {
mInjector.binderRestoreCallingIdentity(originalId);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkProvisioningPrecondition
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40089
|
HIGH
| 7.8
|
android
|
checkProvisioningPrecondition
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
e2e05f488da6abc765a62e7faf10cb74e729732e
| 0
|
Analyze the following code function for security vulnerabilities
|
private void removeContextFeed()
{
this.execution.getContext().removeProperty(FEED_PROPERTY);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeContextFeed
File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2023-29202
|
CRITICAL
| 9
|
xwiki/xwiki-platform
|
removeContextFeed
|
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
|
5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isPackagePreserveVersion()
{
return this.packagePreserveVersion;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isPackagePreserveVersion
File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2023-27480
|
HIGH
| 7.7
|
xwiki/xwiki-platform
|
isPackagePreserveVersion
|
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
|
e3527b98fdd8dc8179c24dc55e662b2c55199434
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean restrictToAdmin(XWikiDocument document)
{
boolean updated = false;
// If some rights have already been set on the document, we consider that it has already been protected
// manually.
if (document.getXObjects(LOCAL_CLASS_REFERENCE).isEmpty()) {
updated = initializeRights(document, XWIKI_ADMIN_GROUP_DOCUMENT_REFERENCE, List.of(VIEW, EDIT, DELETE));
}
return updated;
}
|
Vulnerability Classification:
- CWE: CWE-269
- CVE: CVE-2023-34465
- Severity: HIGH
- CVSS Score: 8.1
Description: XWIKI-20671: Fix Mail.MailConfig initialization
Function: restrictToAdmin
File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/internal/DocumentInitializerRightsManager.java
Repository: xwiki/xwiki-platform
Fixed Code:
public boolean restrictToAdmin(XWikiDocument document)
{
boolean updated = false;
List<Right> rights = List.of(VIEW, EDIT, DELETE);
if (fixBadlyInitializedRights(document, rights)) {
updated = true;
}
// If some rights have already been set on the document, we consider that it has already been protected
// manually.
if (document.getXObjects(LOCAL_CLASS_REFERENCE).isEmpty()) {
updated = updated || initializeRights(document, rights);
}
return updated;
}
|
[
"CWE-269"
] |
CVE-2023-34465
|
HIGH
| 8.1
|
xwiki/xwiki-platform
|
restrictToAdmin
|
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/internal/DocumentInitializerRightsManager.java
|
8910b8857d3442d2e8142f655fdc0512930354d1
| 1
|
Analyze the following code function for security vulnerabilities
|
@Override
public void cancel(@Nonnull Actor actor) {
cancelAndGet(actor);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancel
File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java
Repository: IntellectualSites/FastAsyncWorldEdit
The code follows secure coding practices.
|
[
"CWE-400"
] |
CVE-2023-35925
|
MEDIUM
| 5.5
|
IntellectualSites/FastAsyncWorldEdit
|
cancel
|
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/preloader/AsyncPreloader.java
|
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
| 0
|
Analyze the following code function for security vulnerabilities
|
private static Charset extractCharset(String contentType) {
if (StringUtils.isEmpty(contentType))
return null;
final Matcher matcher = Pattern.compile("(?i)\\bcharset=\\s*\"?([^\\s;\"]*)").matcher(contentType);
if (matcher.find())
try {
return Charset.forName(matcher.group(1));
} catch (Exception e) {
Logme.error(e);
}
return null;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractCharset
File: src/net/sourceforge/plantuml/security/SURL.java
Repository: plantuml
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2023-3431
|
MEDIUM
| 5.3
|
plantuml
|
extractCharset
|
src/net/sourceforge/plantuml/security/SURL.java
|
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void lockNow(Bundle options) {
mPolicy.lockNow(options);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lockNow
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
lockNow
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState()
throws RemoteException {
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
mRemote.transact(GET_PROCESSES_IN_ERROR_STATE_TRANSACTION, data, reply, 0);
reply.readException();
ArrayList<ActivityManager.ProcessErrorStateInfo> list
= reply.createTypedArrayList(ActivityManager.ProcessErrorStateInfo.CREATOR);
data.recycle();
reply.recycle();
return list;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProcessesInErrorState
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3832
|
HIGH
| 8.3
|
android
|
getProcessesInErrorState
|
core/java/android/app/ActivityManagerNative.java
|
e7cf91a198de995c7440b3b64352effd2e309906
| 0
|
Analyze the following code function for security vulnerabilities
|
void setProfileAutoConnectionPriority (BluetoothDevice device, int profileId){
if (profileId == BluetoothProfile.HEADSET) {
HeadsetService hsService = HeadsetService.getHeadsetService();
List<BluetoothDevice> deviceList = hsService.getConnectedDevices();
if ((hsService != null) &&
(BluetoothProfile.PRIORITY_AUTO_CONNECT != hsService.getPriority(device))){
adjustOtherHeadsetPriorities(hsService, deviceList);
hsService.setPriority(device,BluetoothProfile.PRIORITY_AUTO_CONNECT);
}
}
else if (profileId == BluetoothProfile.A2DP) {
A2dpService a2dpService = A2dpService.getA2dpService();
if ((a2dpService != null) &&
(BluetoothProfile.PRIORITY_AUTO_CONNECT != a2dpService.getPriority(device))){
adjustOtherSinkPriorities(a2dpService, device);
a2dpService.setPriority(device,BluetoothProfile.PRIORITY_AUTO_CONNECT);
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setProfileAutoConnectionPriority
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-362",
"CWE-20"
] |
CVE-2016-3760
|
MEDIUM
| 5.4
|
android
|
setProfileAutoConnectionPriority
|
src/com/android/bluetooth/btservice/AdapterService.java
|
122feb9a0b04290f55183ff2f0384c6c53756bd8
| 0
|
Analyze the following code function for security vulnerabilities
|
public Builder setHostnameVerifier(HostnameVerifier hostnameVerifier) {
this.hostnameVerifier = hostnameVerifier;
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHostnameVerifier
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices.
|
[
"CWE-345"
] |
CVE-2013-7397
|
MEDIUM
| 4.3
|
AsyncHttpClient/async-http-client
|
setHostnameVerifier
|
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
|
df6ed70e86c8fc340ed75563e016c8baa94d7e72
| 0
|
Analyze the following code function for security vulnerabilities
|
public static Materials defaultSvnMaterialsWithUrl(String svnUrl) {
return new Materials(svnMaterial(svnUrl, "svnDir", null, null, false, null));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: defaultSvnMaterialsWithUrl
File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
Repository: gocd
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-39309
|
MEDIUM
| 6.5
|
gocd
|
defaultSvnMaterialsWithUrl
|
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
|
691b479f1310034992da141760e9c5d1f5b60e8a
| 0
|
Analyze the following code function for security vulnerabilities
|
private JsonValue readFalse() throws IOException {
read();
readRequiredChar('a');
readRequiredChar('l');
readRequiredChar('s');
readRequiredChar('e');
return JsonValue.FALSE;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: readFalse
File: src/main/org/hjson/JsonParser.java
Repository: hjson/hjson-java
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-34620
|
HIGH
| 7.5
|
hjson/hjson-java
|
readFalse
|
src/main/org/hjson/JsonParser.java
|
91bef056d56bf968451887421c89a44af1d692ff
| 0
|
Analyze the following code function for security vulnerabilities
|
public ApiClient setTempFolderPath(String tempFolderPath) {
this.tempFolderPath = tempFolderPath;
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTempFolderPath
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
setTempFolderPath
|
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
boolean storageManagerIsFileBasedEncryptionEnabled() {
return StorageManager.isFileEncrypted();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: storageManagerIsFileBasedEncryptionEnabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40089
|
HIGH
| 7.8
|
android
|
storageManagerIsFileBasedEncryptionEnabled
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
e2e05f488da6abc765a62e7faf10cb74e729732e
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isMetaDataDirty()
{
return this.isMetaDataDirty;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isMetaDataDirty
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-26470
|
HIGH
| 7.5
|
xwiki/xwiki-platform
|
isMetaDataDirty
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
|
db3d1c62fc5fb59fefcda3b86065d2d362f55164
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isDebugging() {
return debugging;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isDebugging
File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
isDebugging
|
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected void saveWorkspace() {
synchronized (this) {
// TODO refactor this so that we check if the save is needed before writing to the file!
File tempFile = new File(_workspaceDir, "workspace.temp.json");
try {
if (!saveToFile(tempFile)) {
// If the save wasn't really needed, just keep what we had
tempFile.delete();
logger.info("Skipping unnecessary workspace save");
return;
}
} catch (Exception e) {
e.printStackTrace();
logger.warn("Failed to save workspace");
return;
}
// set the workspace to owner-only readable, because it can contain credentials
tempFile.setReadable(false, false);
tempFile.setReadable(true, true);
File file = new File(_workspaceDir, "workspace.json");
File oldFile = new File(_workspaceDir, "workspace.old.json");
if (oldFile.exists()) {
oldFile.delete();
}
if (file.exists()) {
file.renameTo(oldFile);
}
tempFile.renameTo(file);
projectRemoved = false;
logger.info("Saved workspace");
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveWorkspace
File: main/src/com/google/refine/io/FileProjectManager.java
Repository: OpenRefine
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2023-37476
|
HIGH
| 7.8
|
OpenRefine
|
saveWorkspace
|
main/src/com/google/refine/io/FileProjectManager.java
|
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
| 0
|
Analyze the following code function for security vulnerabilities
|
private OnmsUser getOnmsUser(String username) {
OnmsUser user = null;
try {
user = m_userManager.getOnmsUser(username);
} catch (final Throwable t) {
throw getException(Status.INTERNAL_SERVER_ERROR, t);
}
if (user == null) throw getException(Status.NOT_FOUND, "User {} does not exist.", username);
return user;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getOnmsUser
File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java
Repository: OpenNMS/opennms
The code follows secure coding practices.
|
[
"CWE-269"
] |
CVE-2023-0872
|
HIGH
| 8
|
OpenNMS/opennms
|
getOnmsUser
|
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/UserRestService.java
|
34ab169a74b2bc489ab06d0dbf33fee1ed94c93c
| 0
|
Analyze the following code function for security vulnerabilities
|
private void resetBodySelection() {
int length = mBodyView.getText().length();
int signatureStartPos = getSignatureStartPosition(
mSignature, mBodyView.getText().toString());
if (signatureStartPos > -1) {
// In case the user deleted the newlines...
mBodyView.setSelection(signatureStartPos);
} else if (length >= 0) {
// Move cursor to the end.
mBodyView.setSelection(length);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetBodySelection
File: src/com/android/mail/compose/ComposeActivity.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-200"
] |
CVE-2016-2425
|
MEDIUM
| 4.3
|
android
|
resetBodySelection
|
src/com/android/mail/compose/ComposeActivity.java
|
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public Optional<Argument<?>> getFirstTypeVariable() {
if (!typeParameters.isEmpty()) {
return typeParameters.values().stream().findFirst();
}
return Optional.empty();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstTypeVariable
File: core/src/main/java/io/micronaut/core/type/DefaultArgument.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices.
|
[
"CWE-400"
] |
CVE-2022-21700
|
MEDIUM
| 5
|
micronaut-projects/micronaut-core
|
getFirstTypeVariable
|
core/src/main/java/io/micronaut/core/type/DefaultArgument.java
|
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public OnGoingLogicalCondition eq(Class<? extends T> value) {
Condition conditionLocal = new EqualPolymorphicCondition<T>(selector, value);
return getOnGoingLogicalCondition(conditionLocal);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: eq
File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
Repository: xjodoin/torpedoquery
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2019-11343
|
HIGH
| 7.5
|
xjodoin/torpedoquery
|
eq
|
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
|
3c20b874fba9cc2a78b9ace10208de1602b56c3f
| 0
|
Analyze the following code function for security vulnerabilities
|
private byte[] getLengthPrefix(byte[] data) {
return ByteBuffer.allocate(4).putInt(data.length).array();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLengthPrefix
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40117
|
HIGH
| 7.8
|
android
|
getLengthPrefix
|
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
|
ff86ff28cf82124f8e65833a2dd8c319aea08945
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void setAnchorViewPosition(
View view, float x, float y, float width, float height) {
mAnchorViews.put(view, new Position(x, y, width, height));
doSetAnchorViewPosition(view, x, y, width, height);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAnchorViewPosition
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-1021"
] |
CVE-2015-1241
|
MEDIUM
| 4.3
|
chromium
|
setAnchorViewPosition
|
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
|
9d343ad2ea6ec395c377a4efa266057155bfa9c1
| 0
|
Analyze the following code function for security vulnerabilities
|
@RequiresPermissions("user:refresh_token")
@GetMapping("/refreshToken")
@ResponseBody
public Result refreshToken(Integer id) {
User user = userService.selectByIdNoCatch(id);
user.setToken(StringUtil.uuid());
userService.update(user);
return success(user.getToken());
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: refreshToken
File: src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
Repository: atjiu/pybbs
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2022-23391
|
MEDIUM
| 4.3
|
atjiu/pybbs
|
refreshToken
|
src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
|
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
| 0
|
Analyze the following code function for security vulnerabilities
|
public AvatarService avatarService() {
return xmppConnectionService.getAvatarService();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: avatarService
File: src/main/java/eu/siacs/conversations/ui/XmppActivity.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices.
|
[
"CWE-200"
] |
CVE-2018-18467
|
MEDIUM
| 5
|
iNPUTmice/Conversations
|
avatarService
|
src/main/java/eu/siacs/conversations/ui/XmppActivity.java
|
7177c523a1b31988666b9337249a4f1d0c36f479
| 0
|
Analyze the following code function for security vulnerabilities
|
public Builder setClock(Clock clock) {
this.clock = Preconditions.checkNotNull(clock);
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setClock
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2020-7692
|
MEDIUM
| 6.4
|
googleapis/google-oauth-java-client
|
setClock
|
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
|
13433cd7dd06267fc261f0b1d4764f8e3432c824
| 0
|
Analyze the following code function for security vulnerabilities
|
@Pure
protected boolean isBinary(@Positive int column) {
return fields[column - 1].getFormat() == Field.BINARY_FORMAT;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBinary
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2022-31197
|
HIGH
| 8
|
pgjdbc
|
isBinary
|
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
|
739e599d52ad80f8dcd6efedc6157859b1a9d637
| 0
|
Analyze the following code function for security vulnerabilities
|
public void appendWhereEscapeString(String inWhere) {
if (mWhereClause == null) {
mWhereClause = new StringBuilder(inWhere.length() + 16);
}
if (mWhereClause.length() == 0) {
mWhereClause.append('(');
}
DatabaseUtils.appendEscapedSQLString(mWhereClause, inWhere);
}
|
Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2018-9493
- Severity: LOW
- CVSS Score: 2.1
Description: DO NOT MERGE. Extend SQLiteQueryBuilder for update and delete.
Developers often accept selection clauses from untrusted code, and
SQLiteQueryBuilder already supports a "strict" mode to help catch
SQL injection attacks. This change extends the builder to support
update() and delete() calls, so that we can help secure those
selection clauses too.
Bug: 111085900
Test: atest packages/providers/DownloadProvider/tests/
Test: atest cts/tests/app/src/android/app/cts/DownloadManagerTest.java
Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java
Change-Id: Ib4fc8400f184755ee7e971ab5f2095186341730c
Merged-In: Ib4fc8400f184755ee7e971ab5f2095186341730c
(cherry picked from commit 506994268bc4fa07d8798b7737a2952f74b8fd04)
Function: appendWhereEscapeString
File: core/java/android/database/sqlite/SQLiteQueryBuilder.java
Repository: android
Fixed Code:
public void appendWhereEscapeString(String inWhere) {
if (mWhereClause == null) {
mWhereClause = new StringBuilder(inWhere.length() + 16);
}
DatabaseUtils.appendEscapedSQLString(mWhereClause, inWhere);
}
|
[
"CWE-89"
] |
CVE-2018-9493
|
LOW
| 2.1
|
android
|
appendWhereEscapeString
|
core/java/android/database/sqlite/SQLiteQueryBuilder.java
|
ebc250d16c747f4161167b5ff58b3aea88b37acf
| 1
|
Analyze the following code function for security vulnerabilities
|
@Override
public XMLBuilder2 comment(String comment) {
super.commentImpl(comment);
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: comment
File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2014-125087
|
MEDIUM
| 5.2
|
jmurty/java-xmlbuilder
|
comment
|
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
|
e6fddca201790abab4f2c274341c0bb8835c3e73
| 0
|
Analyze the following code function for security vulnerabilities
|
Object getPropertyIdByColumnId(String columnId) {
return columnKeys.get(columnId);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPropertyIdByColumnId
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2019-25028
|
MEDIUM
| 4.3
|
vaadin/framework
|
getPropertyIdByColumnId
|
server/src/main/java/com/vaadin/ui/Grid.java
|
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
| 0
|
Analyze the following code function for security vulnerabilities
|
private void filterHostKeyTypes(CryptoWishList cwl) {
if (verifier instanceof ExtendedServerHostKeyVerifier) {
ExtendedServerHostKeyVerifier extendedVerifier = (ExtendedServerHostKeyVerifier) verifier;
List<String> knownAlgorithms = extendedVerifier.getKnownKeyAlgorithmsForHost(hostname, port);
if (knownAlgorithms != null && knownAlgorithms.size() > 0) {
ArrayList<String> filteredAlgorithms = new ArrayList<>(knownAlgorithms.size());
/*
* Look at our current wish list and adjust it based on what the client already knows, but
* be careful to keep it in the order desired by the wish list.
*/
for (String capableAlgo : cwl.serverHostKeyAlgorithms) {
for (String knownAlgo : knownAlgorithms) {
if (capableAlgo.equals(knownAlgo)) {
filteredAlgorithms.add(knownAlgo);
}
}
}
if (filteredAlgorithms.size() > 0) {
cwl.serverHostKeyAlgorithms = filteredAlgorithms.toArray(new String[0]);
}
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: filterHostKeyTypes
File: src/main/java/com/trilead/ssh2/transport/KexManager.java
Repository: connectbot/sshlib
The code follows secure coding practices.
|
[
"CWE-354"
] |
CVE-2023-48795
|
MEDIUM
| 5.9
|
connectbot/sshlib
|
filterHostKeyTypes
|
src/main/java/com/trilead/ssh2/transport/KexManager.java
|
5c8b534f6e97db7ac0e0e579331213aa25c173ab
| 0
|
Analyze the following code function for security vulnerabilities
|
public void updateRotationUnchecked(boolean alwaysSendConfiguration, boolean forceRelayout) {
if(DEBUG_ORIENTATION) Slog.v(TAG, "updateRotationUnchecked("
+ "alwaysSendConfiguration=" + alwaysSendConfiguration + ")");
long origId = Binder.clearCallingIdentity();
boolean changed;
synchronized(mWindowMap) {
changed = updateRotationUncheckedLocked(false);
if (!changed || forceRelayout) {
getDefaultDisplayContentLocked().layoutNeeded = true;
performLayoutAndPlaceSurfacesLocked();
}
}
if (changed || alwaysSendConfiguration) {
sendNewConfiguration();
}
Binder.restoreCallingIdentity(origId);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateRotationUnchecked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
updateRotationUnchecked
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
public static Http2Headers toNettyHttp2(HttpHeaders in, boolean server) {
final Http2Headers out = new DefaultHttp2Headers(false, in.size());
// Trailers if it does not have :status.
if (server && !in.contains(HttpHeaderNames.STATUS)) {
for (Entry<AsciiString, String> entry : in) {
final AsciiString name = entry.getKey();
final String value = entry.getValue();
if (name.isEmpty() || isTrailerBlacklisted(name)) {
continue;
}
out.add(name, value);
}
} else {
in.forEach((BiConsumer<AsciiString, String>) out::add);
out.remove(HttpHeaderNames.CONNECTION);
out.remove(HttpHeaderNames.TRANSFER_ENCODING);
}
if (!out.contains(HttpHeaderNames.COOKIE)) {
return out;
}
// Split up cookies to allow for better compression.
// https://tools.ietf.org/html/rfc7540#section-8.1.2.5
final List<CharSequence> cookies = out.getAllAndRemove(HttpHeaderNames.COOKIE);
for (CharSequence c : cookies) {
out.add(HttpHeaderNames.COOKIE, COOKIE_SPLITTER.split(c));
}
return out;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toNettyHttp2
File: core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java
Repository: line/armeria
The code follows secure coding practices.
|
[
"CWE-74"
] |
CVE-2019-16771
|
MEDIUM
| 5
|
line/armeria
|
toNettyHttp2
|
core/src/main/java/com/linecorp/armeria/internal/ArmeriaHttpUtil.java
|
b597f7a865a527a84ee3d6937075cfbb4470ed20
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public XWikiDocument getRevision(XWikiDocument document, String revision) throws XWikiException
{
return getRevision(document != null ? document.getDocumentReferenceWithLocale() : null, revision);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevision
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2023-29208
|
HIGH
| 7.5
|
xwiki/xwiki-platform
|
getRevision
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/doc/DeletedDocumentRevisionProvider.java
|
d9e947559077e947315bf700c5703dfc7dd8a8d7
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void overridePendingAppTransitionScaleUp(int startX, int startY, int startWidth,
int startHeight) {
synchronized(mWindowMap) {
mAppTransition.overridePendingAppTransitionScaleUp(startX, startY, startWidth,
startHeight);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: overridePendingAppTransitionScaleUp
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
overridePendingAppTransitionScaleUp
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected long getMaxTextBufferSize() {
return session.getMaxTextMessageBufferSize();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxTextBufferSize
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices.
|
[
"CWE-401"
] |
CVE-2021-3690
|
HIGH
| 7.5
|
undertow-io/undertow
|
getMaxTextBufferSize
|
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
|
c7e84a0b7efced38506d7d1dfea5902366973877
| 0
|
Analyze the following code function for security vulnerabilities
|
IActivityManager getIActivityManager() {
return ActivityManager.getService();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIActivityManager
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2023-21284
|
MEDIUM
| 5.5
|
android
|
getIActivityManager
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
ed3f25b7222d4cff471f2b7d22d1150348146957
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getRecordingTextTracks(String recordId) {
return recordingServiceHelper.getRecordingTextTracks(recordId, captionsDir, getCaptionFileUrlDirectory());
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRecordingTextTracks
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2020-12443
|
HIGH
| 7.5
|
bigbluebutton
|
getRecordingTextTracks
|
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
|
b21ca8355a57286a1e6df96984b3a4c57679a463
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public Stream<JsonValue> getArrayStream() {
if (currentEvent != Event.START_ARRAY) {
throw new IllegalStateException(
JsonMessages.PARSER_GETARRAY_ERR(currentEvent));
}
Spliterator<JsonValue> spliterator =
new Spliterators.AbstractSpliterator<JsonValue>(Long.MAX_VALUE, Spliterator.ORDERED) {
@Override
public Spliterator<JsonValue> trySplit() {
return null;
}
@Override
public boolean tryAdvance(Consumer<? super JsonValue> action) {
if (action == null) {
throw new NullPointerException();
}
if (! hasNext()) {
return false;
}
if (next() == JsonParser.Event.END_ARRAY) {
return false;
}
action.accept(getValue());
return true;
}
};
return StreamSupport.stream(spliterator, false);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getArrayStream
File: impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java
Repository: eclipse-ee4j/parsson
The code follows secure coding practices.
|
[
"CWE-834"
] |
CVE-2023-4043
|
HIGH
| 7.5
|
eclipse-ee4j/parsson
|
getArrayStream
|
impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java
|
ab239fee273cb262910890f1a6fe666ae92cd623
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void drawImage(Object graphics, Object img, int x, int y) {
((AndroidGraphics) graphics).drawImage(img, x, y);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: drawImage
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
drawImage
|
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
public static String getFirstValidRedirectUri(KeycloakSession session, String rootUrl, Set<String> validRedirects) {
return getFirstValidRedirectUri(resolveValidRedirects(session, rootUrl, validRedirects));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFirstValidRedirectUri
File: services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
Repository: keycloak
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2022-4361
|
MEDIUM
| 6.1
|
keycloak
|
getFirstValidRedirectUri
|
services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java
|
a1cfe6e24e5b34792699a00b8b4a8016a5929e3a
| 0
|
Analyze the following code function for security vulnerabilities
|
@TestApi
public @Nullable String getLastResourceResolution() {
synchronized (this) {
ensureValidLocked();
return nativeGetLastResourceResolution(mObject);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastResourceResolution
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-415"
] |
CVE-2023-40103
|
HIGH
| 7.8
|
android
|
getLastResourceResolution
|
core/java/android/content/res/AssetManager.java
|
c3bc12c484ef3bbca4cec19234437c45af5e584d
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean validate() throws XWikiException
{
return this.doc.validate(getXWikiContext());
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: validate
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2022-23615
|
MEDIUM
| 5.5
|
xwiki/xwiki-platform
|
validate
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
|
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
| 0
|
Analyze the following code function for security vulnerabilities
|
@VisibleForTesting
long getResetIntervalForTest() {
return mResetInterval;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResetIntervalForTest
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40079
|
HIGH
| 7.8
|
android
|
getResetIntervalForTest
|
services/core/java/com/android/server/pm/ShortcutService.java
|
96e0524c48c6e58af7d15a2caf35082186fc8de2
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getPageUrl() throws IndexUnreachableException {
String pageType = null;
if (StringUtils.isBlank(pageType)) {
pageType = navigationHelper.getPreferredView();
}
if (StringUtils.isBlank(pageType)) {
pageType = navigationHelper.getCurrentView();
}
return getPageUrlByType(pageType);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPageUrl
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2023-29014
|
MEDIUM
| 6.1
|
intranda/goobi-viewer-core
|
getPageUrl
|
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
|
c29efe60e745a94d03debc17681c4950f3917455
| 0
|
Analyze the following code function for security vulnerabilities
|
public ClientConfig getDefaultClientConfig() {
ClientConfig clientConfig = new ClientConfig();
clientConfig.register(MultiPartFeature.class);
clientConfig.register(json);
clientConfig.register(JacksonFeature.class);
clientConfig.property(HttpUrlConnectorProvider.SET_METHOD_WORKAROUND, true);
// turn off compliance validation to be able to send payloads with DELETE calls
clientConfig.property(ClientProperties.SUPPRESS_HTTP_COMPLIANCE_VALIDATION, true);
if (debugging) {
clientConfig.register(new LoggingFeature(java.util.logging.Logger.getLogger(LoggingFeature.DEFAULT_LOGGER_NAME), java.util.logging.Level.INFO, LoggingFeature.Verbosity.PAYLOAD_ANY, 1024*50 /* Log payloads up to 50K */));
clientConfig.property(LoggingFeature.LOGGING_FEATURE_VERBOSITY, LoggingFeature.Verbosity.PAYLOAD_ANY);
// Set logger to ALL
java.util.logging.Logger.getLogger(LoggingFeature.DEFAULT_LOGGER_NAME).setLevel(java.util.logging.Level.ALL);
} else {
// suppress warnings for payloads with DELETE calls:
java.util.logging.Logger.getLogger("org.glassfish.jersey.client").setLevel(java.util.logging.Level.SEVERE);
}
return clientConfig;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultClientConfig
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
getDefaultClientConfig
|
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
void setRequestedOrientation(int requestedOrientation) {
setOrientation(requestedOrientation, this);
// Push the new configuration to the requested app in case where it's not pushed, e.g. when
// the request is handled at task level with letterbox.
if (!getMergedOverrideConfiguration().equals(
mLastReportedConfiguration.getMergedConfiguration())) {
ensureActivityConfiguration(0 /* globalChanges */, false /* preserveWindow */);
}
mAtmService.getTaskChangeNotificationController().notifyActivityRequestedOrientationChanged(
task.mTaskId, requestedOrientation);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRequestedOrientation
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21145
|
HIGH
| 7.8
|
android
|
setRequestedOrientation
|
services/core/java/com/android/server/wm/ActivityRecord.java
|
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public XMLBuilder root() {
return new XMLBuilder(getDocument());
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: root
File: src/main/java/com/jamesmurty/utils/XMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2014-125087
|
MEDIUM
| 5.2
|
jmurty/java-xmlbuilder
|
root
|
src/main/java/com/jamesmurty/utils/XMLBuilder.java
|
e6fddca201790abab4f2c274341c0bb8835c3e73
| 0
|
Analyze the following code function for security vulnerabilities
|
public FieldGroup getEditorFieldGroup() {
return editorFieldGroup;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEditorFieldGroup
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2019-25028
|
MEDIUM
| 4.3
|
vaadin/framework
|
getEditorFieldGroup
|
server/src/main/java/com/vaadin/ui/Grid.java
|
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
| 0
|
Analyze the following code function for security vulnerabilities
|
@Deprecated(since = "2.2M1")
public void setObject(String className, int nb, BaseObject object)
{
setXObject(resolveClassReference(className), nb, object);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setObject
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-74"
] |
CVE-2023-29523
|
HIGH
| 8.8
|
xwiki/xwiki-platform
|
setObject
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
|
0d547181389f7941e53291af940966413823f61c
| 0
|
Analyze the following code function for security vulnerabilities
|
public List<BaseObject> getXObjects(EntityReference reference)
{
if (reference.getType() == EntityType.DOCUMENT) {
// class reference
return getXObjects(
getCurrentReferenceDocumentReferenceResolver().resolve(reference, getDocumentReference()));
}
return Collections.emptyList();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-26470
|
HIGH
| 7.5
|
xwiki/xwiki-platform
|
getXObjects
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
|
db3d1c62fc5fb59fefcda3b86065d2d362f55164
| 0
|
Analyze the following code function for security vulnerabilities
|
public int getSyncRandomOffset() {
return mSyncRandomOffset;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSyncRandomOffset
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2016-2424
|
HIGH
| 7.1
|
android
|
getSyncRandomOffset
|
services/core/java/com/android/server/content/SyncStorageEngine.java
|
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
| 0
|
Analyze the following code function for security vulnerabilities
|
void onExtrasChanged(Call call, Bundle extras) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("onExtrasChanged")) {
try {
logOutgoing("onExtrasChanged %s %s", callId, extras);
mServiceInterface.onExtrasChanged(callId, extras,
Log.getExternalSession(TELECOM_ABBREVIATION));
} catch (RemoteException ignored) {
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onExtrasChanged
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21283
|
MEDIUM
| 5.5
|
android
|
onExtrasChanged
|
src/com/android/server/telecom/ConnectionServiceWrapper.java
|
9b41a963f352fdb3da1da8c633d45280badfcb24
| 0
|
Analyze the following code function for security vulnerabilities
|
public JSONObject put(String key, int value) throws JSONException {
put(key, Integer.valueOf(value));
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices.
|
[
"CWE-674",
"CWE-787"
] |
CVE-2022-45693
|
HIGH
| 7.5
|
jettison-json/jettison
|
put
|
src/main/java/org/codehaus/jettison/json/JSONObject.java
|
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
| 0
|
Analyze the following code function for security vulnerabilities
|
public String removeEntry(String dn) {
logger.info("SecurityDomainProcessor: Removing entry " + dn);
String status = SUCCESS;
LdapBoundConnFactory connFactory = null;
LDAPConnection conn = null;
CMSEngine engine = CMS.getCMSEngine();
EngineConfig cs = engine.getConfig();
PKISocketConfig socketConfig = cs.getSocketConfig();
try {
LDAPConfig ldapConfig = cs.getInternalDBConfig();
connFactory = new LdapBoundConnFactory("UpdateDomainXML");
connFactory.init(socketConfig, ldapConfig, engine.getPasswordStore());
conn = connFactory.getConn();
conn.delete(dn);
} catch (LDAPException e) {
int resultCode = e.getLDAPResultCode();
if (resultCode != LDAPException.NO_SUCH_OBJECT) {
status = FAILED;
logger.error("SecurityDomainProcessor: Unable to delete entry: " + e.getMessage(), e);
}
} catch (Exception e) {
logger.warn("SecurityDomainProcessor: Unable to delete entry: " + e.getMessage(), e);
} finally {
try {
if (conn != null && connFactory != null) {
logger.debug("SecurityDomainProcessor: Releasing LDAP connection");
connFactory.returnConn(conn);
}
} catch (Exception e) {
logger.warn("SecurityDomainProcessor: Unable to release LDAP connection: " + e.getMessage(), e);
}
}
return status;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeEntry
File: base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java
Repository: dogtagpki/pki
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2022-2414
|
HIGH
| 7.5
|
dogtagpki/pki
|
removeEntry
|
base/server/src/main/java/com/netscape/cms/servlet/csadmin/SecurityDomainProcessor.java
|
16deffdf7548e305507982e246eb9fd1eac414fd
| 0
|
Analyze the following code function for security vulnerabilities
|
@SuppressWarnings("unchecked")
private List<String> optionList(String key, Map<String, Object> options) {
List<String> out = new ArrayList<>();
Object option = options.get(key);
if (option instanceof String) {
out.addAll(Arrays.asList(((String) option).split(",")));
} else if (option instanceof Collection) {
out.addAll((Collection<String>) option);
} else if (option != null) {
throw new IllegalArgumentException(
"Unsupported option list: {key: " + key + ", type: " + option.getClass() + "}");
}
return out;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optionList
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-50572
|
MEDIUM
| 5.5
|
jline/jline3
|
optionList
|
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
|
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
| 0
|
Analyze the following code function for security vulnerabilities
|
private void unregisterAccountListener(String[] accountTypes, String opPackageName,
UserAccounts accounts) {
synchronized (accounts.mReceiversForType) {
if (accountTypes == null) {
// null for any type
accountTypes = new String[] {null};
}
for (String type : accountTypes) {
Map<String, Integer> receivers = accounts.mReceiversForType.get(type);
if (receivers == null || receivers.get(opPackageName) == null) {
throw new IllegalArgumentException("attempt to unregister wrong receiver");
}
Integer cnt = receivers.get(opPackageName);
if (cnt == 1) {
receivers.remove(opPackageName);
} else {
receivers.put(opPackageName, cnt - 1);
}
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unregisterAccountListener
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other",
"CWE-502"
] |
CVE-2023-45777
|
HIGH
| 7.8
|
android
|
unregisterAccountListener
|
services/core/java/com/android/server/accounts/AccountManagerService.java
|
f810d81839af38ee121c446105ca67cb12992fc6
| 0
|
Analyze the following code function for security vulnerabilities
|
private UserInfo getUserInfoLocked(int userId) {
UserInfo ui = mUsers.get(userId);
// If it is partial and not in the process of being removed, return as unknown user.
if (ui != null && ui.partial && !mRemovingUserIds.get(userId)) {
Slog.w(LOG_TAG, "getUserInfo: unknown user #" + userId);
return null;
}
return ui;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUserInfoLocked
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-2457
|
LOW
| 2.1
|
android
|
getUserInfoLocked
|
services/core/java/com/android/server/pm/UserManagerService.java
|
12332e05f632794e18ea8c4ac52c98e82532e5db
| 0
|
Analyze the following code function for security vulnerabilities
|
public void syncThirdPartyIssues() {
List<String> projectIds = trackProjectService.getThirdPartProjectIds();
projectIds.forEach(id -> {
try {
syncThirdPartyIssues(id);
} catch (Exception e) {
LogUtil.error(e.getMessage(), e);
}
});
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncThirdPartyIssues
File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
Repository: metersphere
The code follows secure coding practices.
|
[
"CWE-918"
] |
CVE-2022-23544
|
MEDIUM
| 6.1
|
metersphere
|
syncThirdPartyIssues
|
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
|
d0f95b50737c941b29d507a4cc3545f2dc6ab121
| 0
|
Analyze the following code function for security vulnerabilities
|
public void initTargetPoC() {
localPoCButton.addActionListener(e -> {
JFileChooser fileChooser = new JFileChooser();
fileChooser.setFileSelectionMode(JFileChooser.FILES_ONLY);
int option = fileChooser.showOpenDialog(new JFrame());
if (option == JFileChooser.APPROVE_OPTION) {
File file = fileChooser.getSelectedFile();
String absPath = file.getAbsolutePath();
String[] temp = absPath.split("\\.");
String suffix = temp[temp.length - 1].toLowerCase().trim();
if (!suffix.equals("yml") && !suffix.equals("yaml")) {
if (LANG == CHINESE) {
JOptionPane.showMessageDialog(null, "你选择的不是合法YAML文件");
} else {
JOptionPane.showMessageDialog(null, "Error File Type");
}
return;
}
localPoCText.setText(absPath);
onlyUsePhantasm(absPath);
if (LANG == CHINESE) {
JOptionPane.showMessageDialog(null, "设置PoC成功");
} else {
JOptionPane.showMessageDialog(null, "Success");
}
}
});
updatePocButton.addActionListener(e -> {
String[] cmd = new String[]{xrayCmd.getXray(), "ws", "--list"};
InputStream is = Objects.requireNonNull(ExecUtil.exec(cmd)).getInputStream();
stop = false;
execAndFresh(cmd);
List<String> poc = new ArrayList<>();
String data = IOUtil.readStringFromIs(is);
assert data != null;
String[] temp = data.split("\n");
for (String s : temp) {
s = s.trim();
if (s.endsWith("\r")) {
s = s.substring(0, s.length() - 1);
}
if (s.contains(":")) {
continue;
}
if (s.contains("test") && !s.contains("testrail")) {
continue;
}
if (!s.contains("poc")) {
continue;
}
s = s.substring(2);
poc.add(s.trim());
}
Poc.clear();
Poc.addAll(poc);
if (LANG == CHINESE) {
pocNumLabel.setText(String.format("当前共有: %s 个PoC", Poc.getPocList().size()));
} else {
pocNumLabel.setText(String.format("PoC Num: %s", Poc.getPocList().size()));
}
});
pocButton.addActionListener(e -> {
String poc = usePoCText.getText();
logger.info(poc);
if (!Poc.getPocList().contains(poc.trim())) {
if (LANG == CHINESE) {
JOptionPane.showMessageDialog(null, "PoC不存在");
} else {
JOptionPane.showMessageDialog(null, "PoC Not Exist");
}
return;
}
onlyUsePhantasm(poc);
if (LANG == CHINESE) {
JOptionPane.showMessageDialog(null, "设置PoC成功");
} else {
JOptionPane.showMessageDialog(null, "Success");
}
});
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initTargetPoC
File: src/main/java/com/chaitin/xray/form/MainForm.java
Repository: 4ra1n/super-xray
The code follows secure coding practices.
|
[
"CWE-502"
] |
CVE-2022-41958
|
HIGH
| 7.8
|
4ra1n/super-xray
|
initTargetPoC
|
src/main/java/com/chaitin/xray/form/MainForm.java
|
4d0d59663596db03f39d7edd2be251d48b52dcfc
| 0
|
Analyze the following code function for security vulnerabilities
|
private void _readStringEscapeChar (@Nonnull final IJsonParsePosition aStartPos,
@Nonnull final JsonStringBuilder aStrStringOriginalContent,
@Nonnull final JsonStringBuilder aStrStringUnescapedContent) throws JsonParseException
{
final int c2 = _readChar ();
aStrStringOriginalContent.append ((char) c2);
if (c2 == '"' || c2 == '/' || c2 == '\\')
aStrStringUnescapedContent.append ((char) c2);
else
if (c2 == 'b')
aStrStringUnescapedContent.append ('\b');
else
if (c2 == 'f')
aStrStringUnescapedContent.append ('\f');
else
if (c2 == 'n')
aStrStringUnescapedContent.append ('\n');
else
if (c2 == 'r')
aStrStringUnescapedContent.append ('\r');
else
if (c2 == 't')
aStrStringUnescapedContent.append ('\t');
else
if (c2 == 'u')
{
final int ch0 = _readChar ();
final int n0 = _getHexValue (aStartPos, ch0);
final int ch1 = _readChar ();
final int n1 = _getHexValue (aStartPos, ch1);
final int ch2 = _readChar ();
final int n2 = _getHexValue (aStartPos, ch2);
final int ch3 = _readChar ();
final int n3 = _getHexValue (aStartPos, ch3);
aStrStringOriginalContent.append ((char) ch0);
aStrStringOriginalContent.append ((char) ch1);
aStrStringOriginalContent.append ((char) ch2);
aStrStringOriginalContent.append ((char) ch3);
final int nUnescapedChar = (n0 & 0xff) << 12 | (n1 & 0xff) << 8 | (n2 & 0xff) << 4 | (n3 & 0xff);
aStrStringUnescapedContent.append ((char) nUnescapedChar);
}
else
throw _parseEx (aStartPos, "Invalid JSON String escape character " + _getPrintableChar (c2));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _readStringEscapeChar
File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java
Repository: phax/ph-commons
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-34612
|
HIGH
| 7.5
|
phax/ph-commons
|
_readStringEscapeChar
|
ph-json/src/main/java/com/helger/json/parser/JsonParser.java
|
02a4d034dcfb2b6e1796b25f519bf57a6796edce
| 0
|
Analyze the following code function for security vulnerabilities
|
@Reference
public void setHttpClient(TrustedHttpClient httpClient) {
this.httpClient = httpClient;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHttpClient
File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
Repository: opencast
The code follows secure coding practices.
|
[
"CWE-287"
] |
CVE-2022-29237
|
MEDIUM
| 5.5
|
opencast
|
setHttpClient
|
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
|
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
| 0
|
Analyze the following code function for security vulnerabilities
|
private void initAvatarView() {
final ImageView avatarView = findViewById(R.id.account_avatar);
final ImageView avatarTwoPaneView = findViewById(R.id.account_avatar_two_pane_version);
if (AvatarViewMixin.isAvatarSupported(this)) {
avatarView.setVisibility(View.VISIBLE);
getLifecycle().addObserver(new AvatarViewMixin(this, avatarView));
if (mIsEmbeddingActivityEnabled) {
avatarTwoPaneView.setVisibility(View.VISIBLE);
getLifecycle().addObserver(new AvatarViewMixin(this, avatarTwoPaneView));
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initAvatarView
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21256
|
HIGH
| 7.8
|
android
|
initAvatarView
|
src/com/android/settings/homepage/SettingsHomepageActivity.java
|
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void onLabelChanged(CharSequence label) {
mMePreference.setTitle(label);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLabelChanged
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3889
|
HIGH
| 7.2
|
android
|
onLabelChanged
|
src/com/android/settings/users/UserSettings.java
|
bd5d5176c74021e8cf4970f93f273ba3023c3d72
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isColumnReorderingAllowed() {
return getState(false).columnReorderingAllowed;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isColumnReorderingAllowed
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2019-25028
|
MEDIUM
| 4.3
|
vaadin/framework
|
isColumnReorderingAllowed
|
server/src/main/java/com/vaadin/ui/Grid.java
|
c40bed109c3723b38694ed160ea647fef5b28593
| 0
|
Analyze the following code function for security vulnerabilities
|
public void onKeyguardOccludedChanged(boolean keyguardOccluded) {
mNavigationBar.onKeyguardOccludedChanged(keyguardOccluded);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onKeyguardOccludedChanged
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2017-0822
|
HIGH
| 7.5
|
android
|
onKeyguardOccludedChanged
|
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
|
c574568aaede7f652432deb7707f20ae54bbdf9a
| 0
|
Analyze the following code function for security vulnerabilities
|
public int getTaskForActivity(IBinder token, boolean onlyRoot) throws RemoteException;
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTaskForActivity
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3832
|
HIGH
| 8.3
|
android
|
getTaskForActivity
|
core/java/android/app/IActivityManager.java
|
e7cf91a198de995c7440b3b64352effd2e309906
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public int getAllPhoneAccountsCount() {
try {
Log.startSession("TSI.gAPAC");
try {
enforceModifyPermission(
"getAllPhoneAccountsCount requires MODIFY_PHONE_STATE permission.");
} catch (SecurityException e) {
EventLog.writeEvent(0x534e4554, "62347125", Binder.getCallingUid(),
"getAllPhoneAccountsCount");
throw e;
}
synchronized (mLock) {
try {
// This list is pre-filtered for the calling user.
return getAllPhoneAccounts().getList().size();
} catch (Exception e) {
Log.e(this, e, "getAllPhoneAccountsCount");
throw e;
}
}
} finally {
Log.endSession();
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllPhoneAccountsCount
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21394
|
MEDIUM
| 5.5
|
android
|
getAllPhoneAccountsCount
|
src/com/android/server/telecom/TelecomServiceImpl.java
|
68dca62035c49e14ad26a54f614199cb29a3393f
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean hasSiblings() {
try {
return getCms().readResource(getParamResource(), CmsResourceFilter.ALL).getSiblingCount() > 1;
} catch (CmsException e) {
LOG.error(e.getLocalizedMessage(getLocale()), e);
return false;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasSiblings
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2013-4600
|
MEDIUM
| 4.3
|
alkacon/opencms-core
|
hasSiblings
|
src/org/opencms/workplace/CmsDialog.java
|
72a05e3ea1cf692e2efce002687272e63f98c14a
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
boolean canCreateRemoteAnimationTarget() {
return true;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canCreateRemoteAnimationTarget
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21145
|
HIGH
| 7.8
|
android
|
canCreateRemoteAnimationTarget
|
services/core/java/com/android/server/wm/ActivityRecord.java
|
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
| 0
|
Analyze the following code function for security vulnerabilities
|
public void init(IAccessibilityServiceConnection connection, int connectionId,
IBinder windowToken) {
Message message = mCaller.obtainMessageIOO(DO_INIT, connectionId,
connection, windowToken);
mCaller.sendMessage(message);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2016-3923
|
MEDIUM
| 4.3
|
android
|
init
|
core/java/android/accessibilityservice/AccessibilityService.java
|
5f256310187b4ff2f13a7abb9afed9126facd7bc
| 0
|
Analyze the following code function for security vulnerabilities
|
private SQLiteStatement getStatement(boolean allowReplace) throws SQLException {
if (allowReplace) {
if (mReplaceStatement == null) {
if (mInsertSQL == null) buildSQL();
// chop "INSERT" off the front and prepend "INSERT OR REPLACE" instead.
String replaceSQL = "INSERT OR REPLACE" + mInsertSQL.substring(6);
mReplaceStatement = mDb.compileStatement(replaceSQL);
}
return mReplaceStatement;
} else {
if (mInsertStatement == null) {
if (mInsertSQL == null) buildSQL();
mInsertStatement = mDb.compileStatement(mInsertSQL);
}
return mInsertStatement;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStatement
File: core/java/android/database/DatabaseUtils.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-502"
] |
CVE-2023-40121
|
MEDIUM
| 5.5
|
android
|
getStatement
|
core/java/android/database/DatabaseUtils.java
|
3287ac2d2565dc96bf6177967f8e3aed33954253
| 0
|
Analyze the following code function for security vulnerabilities
|
public void switchUserResource(WebSession session, String sign, String sourceId, UserDTO sessionUser) {
// 获取最新UserDTO
UserDTO user = getUserDTO(sessionUser.getId());
User newUser = new User();
if (StringUtils.equals("workspace", sign)) {
user.setLastWorkspaceId(sourceId);
sessionUser.setLastWorkspaceId(sourceId);
List<Project> projects = getProjectListByWsAndUserId(sessionUser.getId(), sourceId);
if (projects.size() > 0) {
user.setLastProjectId(projects.get(0).getId());
} else {
user.setLastProjectId("");
}
}
BeanUtils.copyProperties(user, newUser);
// 切换工作空间或组织之后更新 session 里的 user
session.getAttributes().put(SessionConstants.ATTR_USER, SessionUser.fromUser(user, session.getId()));
session.getAttributes().put(FindByIndexNameSessionRepository.PRINCIPAL_NAME_INDEX_NAME, sessionUser.getId());
userMapper.updateByPrimaryKeySelective(newUser);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: switchUserResource
File: framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java
Repository: metersphere
The code follows secure coding practices.
|
[
"CWE-770"
] |
CVE-2023-32699
|
MEDIUM
| 6.5
|
metersphere
|
switchUserResource
|
framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java
|
c59e381d368990214813085a1a4877c5ef865411
| 0
|
Analyze the following code function for security vulnerabilities
|
protected boolean scanPseudoAttribute(XMLAttributesImpl attributes)
throws IOException {
return scanAttribute(attributes,fSingleBoolean,'?');
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanPseudoAttribute
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices.
|
[
"CWE-400"
] |
CVE-2022-24839
|
MEDIUM
| 5
|
sparklemotion/nekohtml
|
scanPseudoAttribute
|
src/org/cyberneko/html/HTMLScanner.java
|
a800fce3b079def130ed42a408ff1d09f89e773d
| 0
|
Analyze the following code function for security vulnerabilities
|
void pauseChildStacks(ActivityRecord parent, boolean userLeaving, boolean uiSleeping,
boolean resuming, boolean dontWait) {
// TODO: Put all stacks in supervisor and iterate through them instead.
for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) {
ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks;
for (int stackNdx = stacks.size() - 1; stackNdx >= 0; --stackNdx) {
final ActivityStack stack = stacks.get(stackNdx);
if (stack.mResumedActivity != null &&
stack.mActivityContainer.mParentActivity == parent) {
stack.startPausingLocked(userLeaving, uiSleeping, resuming, dontWait);
}
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: pauseChildStacks
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2016-3838
|
MEDIUM
| 4.3
|
android
|
pauseChildStacks
|
services/core/java/com/android/server/am/ActivityStackSupervisor.java
|
468651c86a8adb7aa56c708d2348e99022088af3
| 0
|
Analyze the following code function for security vulnerabilities
|
public void setTopControlsHeight(int topControlsHeightPix, boolean topControlsShrinkBlinkSize) {
if (topControlsHeightPix == mTopControlsHeightPix
&& topControlsShrinkBlinkSize == mTopControlsShrinkBlinkSize) {
return;
}
mTopControlsHeightPix = topControlsHeightPix;
mTopControlsShrinkBlinkSize = topControlsShrinkBlinkSize;
if (mNativeContentViewCore != 0) nativeWasResized(mNativeContentViewCore);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTopControlsHeight
File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-1021"
] |
CVE-2015-1241
|
MEDIUM
| 4.3
|
chromium
|
setTopControlsHeight
|
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
|
9d343ad2ea6ec395c377a4efa266057155bfa9c1
| 0
|
Analyze the following code function for security vulnerabilities
|
private void syncPut(String[] cacheNames, Object key, Object value) {
for (String cacheName : cacheNames) {
SyncCache syncCache = cacheManager.getCache(cacheName);
try {
syncCache.put(key, value);
} catch (RuntimeException e) {
if (errorHandler.handlePutError(syncCache, key, value, e)) {
throw e;
}
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: syncPut
File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
Repository: micronaut-projects/micronaut-core
The code follows secure coding practices.
|
[
"CWE-400"
] |
CVE-2022-21700
|
MEDIUM
| 5
|
micronaut-projects/micronaut-core
|
syncPut
|
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
|
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
| 0
|
Analyze the following code function for security vulnerabilities
|
private static File buildFile(File parent, String name, String ext) {
if (TextUtils.isEmpty(ext)) {
return new File(parent, name);
} else {
return new File(parent, name + "." + ext);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildFile
File: src/com/android/providers/media/util/FileUtils.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2023-35670
|
HIGH
| 7.8
|
android
|
buildFile
|
src/com/android/providers/media/util/FileUtils.java
|
db3c69afcb0a45c8aa2f333fcde36217889899fe
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public String getId() {
return SamlProtocol.LOGIN_PROTOCOL;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getId
File: services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java
Repository: keycloak
The code follows secure coding practices.
|
[
"CWE-287"
] |
CVE-2021-3827
|
MEDIUM
| 6.8
|
keycloak
|
getId
|
services/src/main/java/org/keycloak/protocol/saml/SamlProtocolFactory.java
|
44000caaf5051d7f218d1ad79573bd3d175cad0d
| 0
|
Analyze the following code function for security vulnerabilities
|
public void setKeyLookup(final Function<String, SecretKey> keyLookup)
{
this.keyLookup = keyLookup;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setKeyLookup
File: src/main/java/org/cryptacular/CiphertextHeaderV2.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices.
|
[
"CWE-770"
] |
CVE-2020-7226
|
MEDIUM
| 5
|
vt-middleware/cryptacular
|
setKeyLookup
|
src/main/java/org/cryptacular/CiphertextHeaderV2.java
|
00395c232cdc62d4292ce27999c026fc1f076b1d
| 0
|
Analyze the following code function for security vulnerabilities
|
private static void createDirectory(File directory) {
if (!directory.exists())
directory.mkdirs();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createDirectory
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2020-12443
|
HIGH
| 7.5
|
bigbluebutton
|
createDirectory
|
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
|
b21ca8355a57286a1e6df96984b3a4c57679a463
| 0
|
Analyze the following code function for security vulnerabilities
|
void dumpAnimatorLocked(PrintWriter pw, String[] args, boolean dumpAll) {
pw.println("WINDOW MANAGER ANIMATOR STATE (dumpsys window animator)");
mAnimator.dumpLocked(pw, " ", dumpAll);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpAnimatorLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
dumpAnimatorLocked
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
private void start() {
LocalServices.addService(ActivityTaskManagerInternal.class, mInternal);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: start
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40094
|
HIGH
| 7.8
|
android
|
start
|
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
|
1120bc7e511710b1b774adf29ba47106292365e7
| 0
|
Analyze the following code function for security vulnerabilities
|
@Test
public void save4returnId(TestContext context) {
postgresClient = createFoo(context);
postgresClient.save(FOO, xPojo, /* returnId */ true, context.asyncAssertSuccess(save -> {
String id = save;
postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> {
context.assertEquals("x", get.getString("key"));
}));
}));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save4returnId
File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2019-15534
|
HIGH
| 7.5
|
folio-org/raml-module-builder
|
save4returnId
|
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
|
b7ef741133e57add40aa4cb19430a0065f378a94
| 0
|
Analyze the following code function for security vulnerabilities
|
public static String trimUnicodeSurrogates(String text) {
if (text != null) {
StringBuilder sb = new StringBuilder();
for (int i = 0; i < text.length(); i++) {
char ch = text.charAt(i);
if (!Character.isHighSurrogate(ch) && !Character.isLowSurrogate(ch)) {
sb.append(ch);
}
}
return sb.toString();
} else {
return null;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: trimUnicodeSurrogates
File: src/main/java/com/openkm/util/FormatUtil.java
Repository: openkm/document-management-system
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2022-40317
|
MEDIUM
| 5.4
|
openkm/document-management-system
|
trimUnicodeSurrogates
|
src/main/java/com/openkm/util/FormatUtil.java
|
870d518f7de349c3fa4c7b9883789fdca4590c4e
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected ModelAndView handleRequestInternal(HttpServletRequest request, HttpServletResponse response) throws Exception {
String operation = request.getParameter("operation");
if (!StringUtils.hasText(operation) && StringUtils.hasText(request.getParameter("groupName"))) {
operation = "show";
}
LOG.debug("!!!! Calling operation {} in GroupController", operation);
if ("create".equalsIgnoreCase(operation)){
return createGroup(request, response);
} else if ("addGroup".equalsIgnoreCase(operation)){
return addGroup(request, response);
} else if ("show".equalsIgnoreCase(operation)){
return showGroup(request, response);
} else if ("delete".equalsIgnoreCase(operation)){
return deleteGroup(request, response);
} else if ("edit".equalsIgnoreCase(operation)){
return editGroup(request, response);
} else if ("rename".equalsIgnoreCase(operation)){
return renameGroup(request, response);
} else if ("addDutySchedules".equalsIgnoreCase(operation)){
return addDutySchedules(request, response);
} else if ("removeDutySchedules".equalsIgnoreCase(operation)){
return removeDutySchedules(request, response);
} else if ("save".equalsIgnoreCase(operation)) {
return saveGroup(request, response);
} else if ("cancel".equalsIgnoreCase(operation)){
return cancel(request, response);
} else {
return listGroups(request, response);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleRequestInternal
File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
Repository: OpenNMS/opennms
The code follows secure coding practices.
|
[
"CWE-352",
"CWE-79"
] |
CVE-2021-25929
|
LOW
| 3.5
|
OpenNMS/opennms
|
handleRequestInternal
|
opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
|
eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void onLaunchAnimationEnd(boolean launchIsFullScreen) {
if (launchIsFullScreen) {
mCentralSurfaces.instantCollapseNotificationPanel();
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onLaunchAnimationEnd
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21267
|
MEDIUM
| 5.5
|
android
|
onLaunchAnimationEnd
|
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
|
d18d8b350756b0e89e051736c1f28744ed31e93a
| 0
|
Analyze the following code function for security vulnerabilities
|
private static void ldapAuthenticationGenerator(XmlGenerator gen, LdapAuthenticationConfig c) {
if (c == null) {
return;
}
addClusterLoginElements(gen.open("ldap"), c)
.node("url", c.getUrl())
.nodeIfContents("socket-factory-class-name", c.getSocketFactoryClassName())
.nodeIfContents("parse-dn", c.getParseDn())
.nodeIfContents("role-context", c.getRoleContext())
.nodeIfContents("role-filter", c.getRoleFilter())
.nodeIfContents("role-mapping-attribute", c.getRoleMappingAttribute())
.nodeIfContents("role-mapping-mode", c.getRoleMappingMode())
.nodeIfContents("role-name-attribute", c.getRoleNameAttribute())
.nodeIfContents("role-recursion-max-depth", c.getRoleRecursionMaxDepth())
.nodeIfContents("role-search-scope", c.getRoleSearchScope())
.nodeIfContents("user-name-attribute", c.getUserNameAttribute())
.nodeIfContents("system-user-dn", c.getSystemUserDn())
.nodeIfContents("system-user-password", c.getSystemUserPassword())
.nodeIfContents("system-authentication", c.getSystemAuthentication())
.nodeIfContents("security-realm", c.getSecurityRealm())
.nodeIfContents("password-attribute", c.getPasswordAttribute())
.nodeIfContents("user-context", c.getUserContext())
.nodeIfContents("user-filter", c.getUserFilter())
.nodeIfContents("user-search-scope", c.getUserSearchScope())
.nodeIfContents("skip-authentication", c.getSkipAuthentication())
.close();
}
|
Vulnerability Classification:
- CWE: CWE-522
- CVE: CVE-2023-33264
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Extend set of masked fields in ConfigXmlGenerator
Function: ldapAuthenticationGenerator
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
Fixed Code:
private void ldapAuthenticationGenerator(XmlGenerator gen, LdapAuthenticationConfig c) {
if (c == null) {
return;
}
addClusterLoginElements(gen.open("ldap"), c)
.node("url", c.getUrl())
.nodeIfContents("socket-factory-class-name", c.getSocketFactoryClassName())
.nodeIfContents("parse-dn", c.getParseDn())
.nodeIfContents("role-context", c.getRoleContext())
.nodeIfContents("role-filter", c.getRoleFilter())
.nodeIfContents("role-mapping-attribute", c.getRoleMappingAttribute())
.nodeIfContents("role-mapping-mode", c.getRoleMappingMode())
.nodeIfContents("role-name-attribute", c.getRoleNameAttribute())
.nodeIfContents("role-recursion-max-depth", c.getRoleRecursionMaxDepth())
.nodeIfContents("role-search-scope", c.getRoleSearchScope())
.nodeIfContents("user-name-attribute", c.getUserNameAttribute())
.nodeIfContents("system-user-dn", c.getSystemUserDn())
.nodeIfContents("system-user-password", getOrMaskValue(c.getSystemUserPassword()))
.nodeIfContents("system-authentication", c.getSystemAuthentication())
.nodeIfContents("security-realm", c.getSecurityRealm())
.nodeIfContents("password-attribute", c.getPasswordAttribute())
.nodeIfContents("user-context", c.getUserContext())
.nodeIfContents("user-filter", c.getUserFilter())
.nodeIfContents("user-search-scope", c.getUserSearchScope())
.nodeIfContents("skip-authentication", c.getSkipAuthentication())
.close();
}
|
[
"CWE-522"
] |
CVE-2023-33264
|
MEDIUM
| 4.3
|
hazelcast
|
ldapAuthenticationGenerator
|
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
|
80a502d53cc48bf895711ab55f95e3a51e344ac1
| 1
|
Analyze the following code function for security vulnerabilities
|
private void enforceSettingReadable(String settingName, int settingsType, int userId) {
if (UserHandle.getAppId(Binder.getCallingUid()) < Process.FIRST_APPLICATION_UID) {
return;
}
ApplicationInfo ai = getCallingApplicationInfoOrThrow();
if (ai.isSystemApp() || ai.isSignedWithPlatformKey()) {
return;
}
if ((ai.flags & ApplicationInfo.FLAG_TEST_ONLY) == 0) {
// Skip checking readable annotations for test_only apps
checkReadableAnnotation(settingsType, settingName, ai.targetSdkVersion);
}
/**
* some settings need additional permission check, this is to have a matching security
* control from other API alternatives returning the same settings values.
* note, the permission enforcement should be based on app's targetSDKlevel to better handle
* app-compat.
*/
switch (settingName) {
// missing READ_PRIVILEGED_PHONE_STATE permission protection
// see alternative API {@link SubscriptionManager#getPreferredDataSubscriptionId()
case Settings.Global.MULTI_SIM_DATA_CALL_SUBSCRIPTION:
// app-compat handling, not break apps targeting on previous SDKs.
if (CompatChanges.isChangeEnabled(
ENFORCE_READ_PERMISSION_FOR_MULTI_SIM_DATA_CALL)) {
getContext().enforceCallingOrSelfPermission(
Manifest.permission.READ_PRIVILEGED_PHONE_STATE,
"access global settings MULTI_SIM_DATA_CALL_SUBSCRIPTION");
}
break;
}
if (!ai.isInstantApp()) {
return;
}
if (!getInstantAppAccessibleSettings(settingsType).contains(settingName)
&& !getOverlayInstantAppAccessibleSettings(settingsType).contains(settingName)) {
// Don't enforce the instant app whitelist for now -- its too prone to unintended
// breakage in the current form.
Slog.w(LOG_TAG, "Instant App " + ai.packageName
+ " trying to access unexposed setting, this will be an error in the future.");
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceSettingReadable
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40117
|
HIGH
| 7.8
|
android
|
enforceSettingReadable
|
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
|
ff86ff28cf82124f8e65833a2dd8c319aea08945
| 0
|
Analyze the following code function for security vulnerabilities
|
public ArtemisSecurityConfigurationBuilder withPackageBlacklist(Collection<PackageRule> packageBlacklist) {
blacklistedPackages = Set.copyOf(packageBlacklist);
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withPackageBlacklist
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
Repository: ls1intum/Ares
The code follows secure coding practices.
|
[
"CWE-501",
"CWE-653"
] |
CVE-2024-23682
|
HIGH
| 8.2
|
ls1intum/Ares
|
withPackageBlacklist
|
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
|
4c146ff85a0fa6022087fb0cffa6b8021d51101f
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.