instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public String display(String fieldname, BaseObject obj, XWikiContext context) { String type = null; try { type = (String) context.get("display"); } catch (Exception e) { } if (type == null) { type = "view"; } return display(fieldname,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: display File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
display
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public ByteBufferPool getByteBufferPool() { return bufferPool; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByteBufferPool File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
getByteBufferPool
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
@Override public void setUserEnabled(int userId) { checkManageUsersPermission("enable user"); synchronized (mPackagesLock) { UserInfo info = getUserInfoLocked(userId); if (info != null && !info.isEnabled()) { info.flags ^= UserInfo.FLAG_DISABLED; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserEnabled File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
setUserEnabled
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
private Charset getCharset(final String encoding) { return encoding == null || encoding.isEmpty() ? Charset.defaultCharset() : Charset.forName(encoding); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharset File: src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java Repository: jlangch/venice The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-36007
LOW
3.3
jlangch/venice
getCharset
src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java
c942c73136333bc493050910f171a48e6f575b23
0
Analyze the following code function for security vulnerabilities
@Override protected String getJDBCUrl(Map<String, ?> params) throws IOException { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJDBCUrl File: modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getJDBCUrl
modules/library/jdbc/src/main/java/org/geotools/jdbc/JDBCJNDIDataStoreFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Test public void deleteByCriterionFailedConnection(TestContext context) { createFoo(context).delete(Future.failedFuture("okapi"), FOO, new Criterion(), context.asyncAssertFailure(fail -> { context.assertTrue(fail.getMessage().contains("okapi")); })); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteByCriterionFailedConnection File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
deleteByCriterionFailedConnection
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Nullable ActiveAdmin getActiveAdminOrCheckPermissionForCallerLocked( ComponentName who, int reqPolicy, @Nullable String permission) throws SecurityException { return getActiveAdminOrCheckPermissionsForCallerLocked( who, reqPolicy, permission == null ? Set...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveAdminOrCheckPermissionForCallerLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getActiveAdminOrCheckPermissionForCallerLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public Entity<?> serialize(Object obj, Map<String, Object> formParams, String contentType, boolean isBodyNullable) throws ApiException { Entity<?> entity; if (contentType.startsWith("multipart/form-data")) { MultiPart multiPart = new MultiPart(); for (Entry<String, Object> param: formParams.entrySet...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serialize File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
serialize
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public Response processAddConsumer(ConsumerInfo info) throws Exception { SessionId sessionId = info.getConsumerId().getParentId(); ConnectionId connectionId = sessionId.getParentId(); TransportConnectionState cs = lookupConnectionState(connectionId); if (cs == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAddConsumer File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processAddConsumer
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
protected void addCustomFields(IssuesUpdateRequest issuesRequest, MultiValueMap<String, Object> paramMap) { List<CustomFieldItemDTO> customFields = issuesRequest.getRequestFields(); if (!CollectionUtils.isEmpty(customFields)) { customFields.forEach(item -> { if (StringUtils.i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCustomFields File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
addCustomFields
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
void setVisibleBehindActivity(ActivityRecord r) { mVisibleBehindActivity = r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVisibleBehindActivity File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
setVisibleBehindActivity
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override boolean showToCurrentUser() { // Child windows are evaluated based on their parent window. final WindowState win = getTopParentWindow(); if (win.mAttrs.type < FIRST_SYSTEM_WINDOW && win.mActivityRecord != null && win.mActivityRecord.mShowForAllUsers) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showToCurrentUser File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
showToCurrentUser
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public boolean updateOverrideApn(@NonNull ComponentName admin, int apnId, @NonNull ApnSetting apnSetting) { throwIfParentInstance("updateOverrideApn"); if (mService != null) { try { return mService.updateOverrideApn(admin, apnId, apnSetting); } catch (...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOverrideApn File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
updateOverrideApn
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private boolean isPrimary() { return mClientModeManager.getRole() == ROLE_CLIENT_PRIMARY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPrimary File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
isPrimary
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public Route.Collection post(final String path1, final String path2, final String path3, final Route.OneArgHandler handler) { return new Route.Collection( new Route.Definition[]{post(path1, handler), post(path2, handler), post(path3, handler)}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: post File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
post
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void readMessageEnd() {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readMessageEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readMessageEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
private void synchronizeFolder(OCFile folder) { if (mFailedResultsCounter > MAX_FAILED_RESULTS || isFinisher(mLastFailedResult)) { return; } // folder synchronization RefreshFolderOperation synchFolderOp = new RefreshFolderOperation(folder, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: synchronizeFolder File: src/main/java/com/owncloud/android/syncadapter/FileSyncAdapter.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
synchronizeFolder
src/main/java/com/owncloud/android/syncadapter/FileSyncAdapter.java
27559efb79d45782e000b762860658d49e9c35e9
0
Analyze the following code function for security vulnerabilities
public <T> ListenableFuture<T> execute(final Request request, final AsyncHandler<T> handler) throws IOException { if (clientTransport.isStopped()) { throw new IOException("AsyncHttpClient has been closed."); } final ProxyServer proxy = ProxyUtils.getProxyServer(clientConfig, request...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: providers/grizzly/src/main/java/org/asynchttpclient/providers/grizzly/GrizzlyAsyncHttpProvider.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
execute
providers/grizzly/src/main/java/org/asynchttpclient/providers/grizzly/GrizzlyAsyncHttpProvider.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public void setDescriptor(Descriptor descriptor) { this.descriptor = descriptor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDescriptor File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setDescriptor
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void sendSettingsAck() { if(!initialSettingsSent) { sendSettings(); initialSettingsSent = true; } Http2SettingsStreamSinkChannel stream = new Http2SettingsStreamSinkChannel(this); flushChannelIgnoreFailure(stream); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendSettingsAck File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
sendSettingsAck
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
@GET @Path("defaultcovariatesettings") @Produces(MediaType.APPLICATION_JSON) public String getDefaultCovariateSettings(@QueryParam("temporal") final String temporal) { boolean getTemporal = false; try { if (temporal != null && !temporal.isEmpty()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultCovariateSettings File: src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java Repository: OHDSI/WebAPI The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15563
HIGH
7.5
OHDSI/WebAPI
getDefaultCovariateSettings
src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java
b3944074a1976c95d500239cbbf0741917ed75ca
0
Analyze the following code function for security vulnerabilities
@Override protected void appendPipelineUniqueCriteria(Map<String, Object> basicCriteria) { basicCriteria.put("dest", folder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendPipelineUniqueCriteria File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
appendPipelineUniqueCriteria
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public String getURL(List<String> spaces, String page, String action, String queryString) { List<String> path = new ArrayList<>(spaces); path.add(page); return getURL(action, path.toArray(new String[] {}), queryString); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURL File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getURL
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private void resetKeyguardDonePendingLocked() { mKeyguardDonePending = false; mHandler.removeMessages(KEYGUARD_DONE_PENDING_TIMEOUT); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetKeyguardDonePendingLocked File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
resetKeyguardDonePendingLocked
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
private Map<Account, Integer> getAccountsAndVisibilityForPackage(String packageName, List<String> accountTypes, Integer callingUid, UserAccounts accounts) { if (!packageExistsForUser(packageName, accounts.userId)) { Log.d(TAG, "Package not found " + packageName); return new L...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountsAndVisibilityForPackage File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAccountsAndVisibilityForPackage
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Override public Registration addContextClickListener( ContextClickEvent.ContextClickListener listener) { return super.addContextClickListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addContextClickListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addContextClickListener
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public static String getActionUrl(String itUrl,Action action) { String urlName = action.getUrlName(); if(urlName==null) return null; // to avoid NPE and fail to render the whole page try { if (new URI(urlName).isAbsolute()) { return urlName; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActionUrl File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getActionUrl
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
final void setFloat(CharSequence name, float value) { set(name, String.valueOf(value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFloat File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
setFloat
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
public String selectHeaderAccept(String[] accepts) { if (accepts.length == 0) { return null; } for (String accept : accepts) { if (isJsonMime(accept)) { return accept; } } return StringUtil.join(accepts, ","); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectHeaderAccept File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
selectHeaderAccept
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private boolean setStatusBarDisabledInternal(boolean disabled, int userId) { long ident = mInjector.binderClearCallingIdentity(); try { IStatusBarService statusBarService = IStatusBarService.Stub.asInterface( ServiceManager.checkService(Context.STATUS_BAR_SERVICE)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatusBarDisabledInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setStatusBarDisabledInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected Map<String, List<String>> buildResponseHeaders(Response response) { Map<String, List<String>> responseHeaders = new HashMap<String, List<String>>(); for (Entry<String, List<Object>> entry: response.getHeaders().entrySet()) { List<Object> values = entry.getValue(); List<String> headers = ne...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildResponseHeaders File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practi...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
buildResponseHeaders
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private static void checkCallerIsSystem() { if (isCallerSystem()) { return; } throw new SecurityException("Disallowed call for uid " + Binder.getCallingUid()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkCallerIsSystem File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
checkCallerIsSystem
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(anyOf = { android.Manifest.permission.MANAGE_USERS, android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS }) public boolean isManagedKiosk() { throwIfParentInstance("isManagedKiosk"); if (mService != null) { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isManagedKiosk File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isManagedKiosk
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void negate() { flags ^= NEGATIVE_FLAG; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: negate File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
negate
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
public String getExpression() { return expression; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExpression File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getExpression
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
protected void initJaxbUnmarshaller(Unmarshaller unmarshaller) throws JAXBException { if (this.unmarshallerProperties != null) { for (String name : this.unmarshallerProperties.keySet()) { unmarshaller.setProperty(name, this.unmarshallerProperties.get(name)); } } if (this.unmarshallerListener != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initJaxbUnmarshaller File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
initJaxbUnmarshaller
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
public void init(final String controllerUrl, final KieServerConfig config) { this.config = config; this.controllerUrl = controllerUrl; try { if (container == null) { container = ContainerProvider.getWebSocketContainer(); } session = container.c...
Vulnerability Classification: - CWE: CWE-260 - CVE: CVE-2016-7043 - Severity: MEDIUM - CVSS Score: 5.0 Description: [RHBMS-4312] Loading pasword from a keystore Function: init File: kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/...
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
init
kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/WebSocketKieServerControllerClient.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
1
Analyze the following code function for security vulnerabilities
public XmlGraphMLReader storeNodeIds() { this.storeNodeIds = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: storeNodeIds File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
storeNodeIds
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
public void updateApkInfo(File outDir) throws AndrolibException { mResTable.initApkInfo(mApkInfo, outDir); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApkInfo File: brut.apktool/apktool-lib/src/main/java/brut/androlib/res/ResourcesDecoder.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
updateApkInfo
brut.apktool/apktool-lib/src/main/java/brut/androlib/res/ResourcesDecoder.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
String[] getCacheInvalidateNames(AnnotationValue<CacheInvalidate> cacheConfig) { return getCacheNames(cacheConfig.get(MEMBER_CACHE_NAMES, String[].class).orElse(StringUtils.EMPTY_STRING_ARRAY)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCacheInvalidateNames File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getCacheInvalidateNames
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
private Element routeToHtml(RouteData route) { String text = route.getUrl(); if (text == null || text.isEmpty()) { text = "<root>"; } if (route.getParameters().isEmpty()) { Element link = new Element(Tag.A).attr("href", route.getUrl()) .text(t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: routeToHtml File: flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25027
MEDIUM
4.3
vaadin/flow
routeToHtml
flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java
cde1389507aac2dc8aa6ae39296765c1ca457b69
0
Analyze the following code function for security vulnerabilities
public void setDataType(String dataType) { attributes.put(DATA_TYPE, dataType); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDataType File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setDataType
base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public String evaluateVelocity(String content, String name) { try { VelocityManager velocityManager = Utils.getComponent(VelocityManager.class); VelocityContext velocityContext = velocityManager.getVelocityContext(); return evaluateVelocity(content, name, velocityContext)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: evaluateVelocity File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
evaluateVelocity
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private boolean allowTaskSnapshot() { if (newIntents == null) { return true; } // Restrict task snapshot starting window to launcher start, or is same as the last // delivered intent, or there is no intent at all (eg. task being brought to front). If // the intent is...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: allowTaskSnapshot File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
allowTaskSnapshot
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public Date parseDate(String str) { try { return dateFormat.parse(str); } catch (java.text.ParseException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDate File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
parseDate
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
void powerManagerGoToSleep(long time, int reason, int flags) { mContext.getSystemService(PowerManager.class).goToSleep(time, reason, flags); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: powerManagerGoToSleep File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
powerManagerGoToSleep
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@GetMapping("nav-settings/topnav") public RespBody getsTopNav() { String s = KVStorage.getCustomValue("TopNav32"); return RespBody.ok(s == null ? null : JSON.parseArray(s)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getsTopNav File: src/main/java/com/rebuild/web/configuration/NavSettings.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
getsTopNav
src/main/java/com/rebuild/web/configuration/NavSettings.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
@Override public void writeIdentifierToProto(ProtoOutputStream proto, long fieldId) { final long token = proto.start(fieldId); proto.write(HASH_CODE, System.identityHashCode(this)); proto.write(USER_ID, mShowUserId); final CharSequence title = getWindowTag(); if (title != nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeIdentifierToProto File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
writeIdentifierToProto
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public void addStatusChangeListener(int mask, ISyncStatusObserver callback) { long identityToken = clearCallingIdentity(); try { SyncManager syncManager = getSyncManager(); if (syncManager != null && callback != null) { syncManager.getSyncStorageEngine().addStatus...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addStatusChangeListener File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
addStatusChangeListener
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
private void setDemoDeviceStateUnchecked(@UserIdInt int userId, boolean isDemoDevice) { Slogf.d(LOG_TAG, "setDemoDeviceStateUnchecked(%d, %b)", userId, isDemoDevice); if (!isDemoDevice) { return; } synchronized (getLockObject()) { mInjector.setting...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDemoDeviceStateUnchecked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setDemoDeviceStateUnchecked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean isCallerApplicationRestrictionsManagingPackage(String callerPackage) { return isCallerDelegate(callerPackage, getCallerIdentity().getUid(), DELEGATION_APP_RESTRICTIONS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCallerApplicationRestrictionsManagingPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isCallerApplicationRestrictionsManagingPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void setDataProvider(int nodesPerLevel, int depth) { grid.setDataProvider( new LazyHierarchicalDataProvider(nodesPerLevel, depth) { @Override protected Stream<HierarchicalTestBean> fetchChildrenFromBackEnd( HierarchicalQ...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2022-29567 - Severity: MEDIUM - CVSS Score: 5.0 Description: Use index and depth as an item ID Function: setDataProvider File: vaadin-grid-flow-parent/vaadin-grid-flow-integration-tests/src/main/java/com/vaadin/flow/component/treegrid/it/TreeGridPreloadPage.java...
[ "CWE-200" ]
CVE-2022-29567
MEDIUM
5
vaadin/flow-components
setDataProvider
vaadin-grid-flow-parent/vaadin-grid-flow-integration-tests/src/main/java/com/vaadin/flow/component/treegrid/it/TreeGridPreloadPage.java
57445e814e074b8f7331b3196c97d37f08a689f0
1
Analyze the following code function for security vulnerabilities
public Cliente buscarClientePorEmail(String email) throws SQLException, ClassNotFoundException { Connection con = null; PreparedStatement stmt = null; ResultSet rs = null; try { con = ConnectionFactory.getConnection(); stmt = con.prepareStatement(stmtBuscarEmailE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buscarClientePorEmail File: src/java/br/com/magazine/dao/ClienteDAO.java Repository: evandro-machado/Trabalho-Web2 The code follows secure coding practices.
[ "CWE-89" ]
CVE-2015-10061
MEDIUM
5.2
evandro-machado/Trabalho-Web2
buscarClientePorEmail
src/java/br/com/magazine/dao/ClienteDAO.java
f59ac954625d0a4f6d34f069a2e26686a7a20aeb
0
Analyze the following code function for security vulnerabilities
private void initClient() throws SSLException { debug("JSSEngine: initClient()"); if (cert != null && key != null) { // NSS uses a callback to check for the client certificate; we // assume we have knowledge of it ahead of time and set it // directly on our SSLFDProx...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initClient File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java Repository: dogtagpki/jss The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-4213
HIGH
7.5
dogtagpki/jss
initClient
src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
5922560a78d0dee61af8a33cc9cfbf4cfa291448
0
Analyze the following code function for security vulnerabilities
public String getMessage(String messageId, Locale locale) { return getMessage(messageId, locale, new Object[0]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessage File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
getMessage
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
void resetAllThrottlingInner() { synchronized (mLock) { mRawLastResetTime = injectCurrentTimeMillis(); } scheduleSaveBaseState(); Slog.i(TAG, "ShortcutManager: throttling counter reset for all users"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetAllThrottlingInner File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
resetAllThrottlingInner
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0
Analyze the following code function for security vulnerabilities
private void calculateDefaultBrowserLPw(int userId) { List<String> allBrowsers = resolveAllBrowserApps(userId); final String browserPkg = (allBrowsers.size() == 1) ? allBrowsers.get(0) : null; mSettings.setDefaultBrowserPackageNameLPw(browserPkg, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: calculateDefaultBrowserLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
calculateDefaultBrowserLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
static int procStateToImportance(int procState, int memAdj, ActivityManager.RunningAppProcessInfo currApp) { int imp = ActivityManager.RunningAppProcessInfo.procStateToImportance(procState); if (imp == ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND) { currApp.lru = m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: procStateToImportance File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
procStateToImportance
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void setLastNEnabled(boolean theLastNEnabled) { myLastNEnabled = theLastNEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLastNEnabled File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setLastNEnabled
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public @ColorInt int getSecondaryAccentColor() { return mSecondaryAccentColor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecondaryAccentColor File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getSecondaryAccentColor
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public static String uncompressString(byte[] input, int offset, int length) throws IOException { try { return uncompressString(input, offset, length, "UTF-8"); } catch (UnsupportedEncodingException e) { throw new IllegalStateException("UTF-8 decoder is not...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uncompressString File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
uncompressString
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationAsInt04() throws Exception { Duration value = READER.without(DeserializationFeature.READ_DATE_TIMESTAMPS_AS_NANOSECONDS) .readValue("13498000"); assertNotNull("The value should not be null.", value); assertEquals("The value is not cor...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationAsInt04 File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationAsInt04
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestDurationDeserialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
@Override public void crashApplication(int uid, int initialPid, String packageName, int userId, String message) { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: crash...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: crashApplication File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
crashApplication
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void closeTab(String secondTabHandle) { String currentTab = getCurrentTabHandle(); switchTab(secondTabHandle); getDriver().close(); switchTab(currentTab); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeTab File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
closeTab
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
static String getProjectName(String archivePathName) { if (archivePathName == null) { return null; } File archiveFile = new File(archivePathName); FileInputStream fileIn = null; JarInputStream jarIn = null; try { fileIn = new FileInputStream(archiveFile); jarIn = new JarInputStream(fileIn); whil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProjectName File: Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/ArchivePlugin.java Repository: NationalSecurityAgency/ghidra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-13623
MEDIUM
6.8
NationalSecurityAgency/ghidra
getProjectName
Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/ArchivePlugin.java
6c0171c9200b4490deb94abf3c92d1b3da59f9bf
0
Analyze the following code function for security vulnerabilities
private void addTextTag(final String key, final String s, final XmlSerializer serializer) throws Exception { serializer.startTag(FormulaList.XML_NS, FormulaList.XML_TERM_TAG); serializer.attribute(FormulaList.XML_NS, FormulaList.XML_PROP_KEY, key); serializer.attribute(FormulaList.XML_NS, Fo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addTextTag File: app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java Repository: mkulesh/microMathematics The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000821
HIGH
7.5
mkulesh/microMathematics
addTextTag
app/src/main/java/com/mkulesh/micromath/io/ImportFromSMathStudio.java
5c05ac8de16c569ff0a1816f20be235090d3dd9d
0
Analyze the following code function for security vulnerabilities
@Override public synchronized Response processRemoveConnection(ConnectionId id, long lastDeliveredSequenceId) throws InterruptedException { LOG.debug("remove connection id: {}", id); TransportConnectionState cs = lookupConnectionState(id); if (cs != null) { // Don't a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processRemoveConnection File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processRemoveConnection
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override public void onActivityCreated(Bundle savedInstanceState) { super.onActivityCreated(savedInstanceState); if (savedInstanceState == null) { return; } String uuid = savedInstanceState.getString(STATE_CONVERSATION_UUID); ArrayList<Attachment> attachments = s...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onActivityCreated File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onActivityCreated
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public void setSystemProcess() { try { ServiceManager.addService(Context.ACTIVITY_SERVICE, this, true); ServiceManager.addService(ProcessStats.SERVICE_NAME, mProcessStats); ServiceManager.addService("meminfo", new MemBinder(this)); ServiceManager.addService("gfxin...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSystemProcess File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
setSystemProcess
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private static Set<TrustAnchor> trustAnchors(X509Certificate[] certs) { Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(certs.length); for (X509Certificate cert : certs) { trustAnchors.add(new TrustAnchor(cert, null)); } return trustAnchors; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trustAnchors File: src/platform/java/org/conscrypt/TrustManagerImpl.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-345" ]
CVE-2016-0818
MEDIUM
4.3
android
trustAnchors
src/platform/java/org/conscrypt/TrustManagerImpl.java
c4ab1b959280413fb11bf4fd7f6b4c2ba38bd779
0
Analyze the following code function for security vulnerabilities
private <R> void getById(String table, JsonArray ids, FunctionWithException<String, R, Exception> function, Handler<AsyncResult<Map<String,R>>> replyHandler) { if (ids == null || ids.isEmpty()) { replyHandler.handle(Future.succeededFuture(Collections.emptyMap())); return; } client.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getById File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getById
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
protected abstract String getExtensionName();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExtensionName File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code foll...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
getExtensionName
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@SuppressFBWarnings("EI_EXPOSE_REP") public HtmlPage getHtmlPageOrNull() { if (page_ == null || !page_.isHtmlPage()) { return null; } return (HtmlPage) page_; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHtmlPageOrNull File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getHtmlPageOrNull
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mLock") private void cleanupDanglingBitmapDirectoriesLocked(@UserIdInt int userId) { if (DEBUG) { Slog.d(TAG, "cleanupDanglingBitmaps: userId=" + userId); } final long start = getStatStartTime(); final ShortcutUser user = getUserShortcutsLocked(userId); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanupDanglingBitmapDirectoriesLocked File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
cleanupDanglingBitmapDirectoriesLocked
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void cleanupDisabledPackageComponentsLocked( String packageName, int userId, boolean killProcess, String[] changedClasses) { Set<String> disabledClasses = null; boolean packageDisabled = false; IPackageManager pm = AppGlobals.getPackageManager(); if (changedClasses ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanupDisabledPackageComponentsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
cleanupDisabledPackageComponentsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override void resetSurfacePositionForAnimationLeash(SurfaceControl.Transaction t) { // Noop as Activity may be offset for letterbox }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetSurfacePositionForAnimationLeash File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
resetSurfacePositionForAnimationLeash
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
private String parseUuid(X509Certificate cert) { X500Principal x500 = cert.getSubjectX500Principal(); String dn = x500.getName(); Map<String, String> dnAttributes = new HashMap<>(); for (String attribute : dn.split(",")) { attribute = attribute.trim(); String[] p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseUuid File: server/src/main/java/org/candlepin/auth/SSLAuth.java Repository: candlepin The code follows secure coding practices.
[ "CWE-639" ]
CVE-2021-4142
MEDIUM
5.5
candlepin
parseUuid
server/src/main/java/org/candlepin/auth/SSLAuth.java
87bb26761cb0d563d2eb697331ebd0dd85a67e5f
0
Analyze the following code function for security vulnerabilities
@CriticalNative private static final native int nativeGetAttributeName(long state, int idx);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetAttributeName File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetAttributeName
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
protected void _addExplicitDelegatingCreator(DeserializationContext ctxt, BeanDescription beanDesc, CreatorCollector creators, CreatorCandidate candidate) throws JsonMappingException { // Somewhat simple: find injectable values, if any, ensure there is one // and just...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _addExplicitDelegatingCreator File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_addExplicitDelegatingCreator
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
private float _decodeHalfSizeFloat() throws IOException { int i16 = _decode16Bits() & 0xFFFF; boolean neg = (i16 >> 15) != 0; int e = (i16 >> 10) & 0x1F; int f = i16 & 0x03FF; if (e == 0) { float result = (float) (MATH_POW_2_NEG14 * (f / MATH_POW_2_10)); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _decodeHalfSizeFloat File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_decodeHalfSizeFloat
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public ServerBuilder withDefaultVirtualHost(Consumer<? super VirtualHostBuilder> customizer) { customizer.accept(defaultVirtualHostBuilder); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withDefaultVirtualHost File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
withDefaultVirtualHost
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
private boolean isMagnificationSettingsOn(SettingsState secureSettings) { if ("1".equals(secureSettings.getSettingLocked( Secure.ACCESSIBILITY_DISPLAY_MAGNIFICATION_ENABLED).getValue())) { return true; } final Set<String> a11yButtonTargets = trans...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMagnificationSettingsOn File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
isMagnificationSettingsOn
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
boolean installCaCertsToKeyChain(IKeyChainService keyChainService) { for (X509Certificate caCert : mCaCerts) { byte[] bytes = null; try { bytes = caCert.getEncoded(); } catch (CertificateEncodingException e) { throw new AssertionError(e); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installCaCertsToKeyChain File: src/com/android/certinstaller/CredentialHelper.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
installCaCertsToKeyChain
src/com/android/certinstaller/CredentialHelper.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
public boolean isTampered() { return tampered; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTampered File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
isTampered
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public boolean removeAllowlistedRestrictedPermission(String packageName, String permissionName, int flags, int userId) { return mPermissionManagerServiceImpl.removeAllowlistedRestrictedPermission(packageName, permissionName, flags, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeAllowlistedRestrictedPermission File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
removeAllowlistedRestrictedPermission
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public boolean addOrReplaceDynamicShortcut(@NonNull ShortcutInfo newShortcut) { Preconditions.checkArgument(newShortcut.isEnabled(), "add/setDynamicShortcuts() cannot publish disabled shortcuts"); newShortcut.addFlags(ShortcutInfo.FLAG_DYNAMIC); final ShortcutInfo oldShortcut ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addOrReplaceDynamicShortcut File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
addOrReplaceDynamicShortcut
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
@Override public boolean isEmpty() { return xObjects.isEmpty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEmpty File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
isEmpty
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public void writeSetBegin(TSet set) throws TException { writeCollectionBegin(set.elemType, set.size); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeSetBegin File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
writeSetBegin
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@Override public void stopSystemLockTaskMode() throws RemoteException { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "stopSystemLockTaskMode"); stopLockTaskModeInternal(null, true /* isSystemCaller */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopSystemLockTaskMode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stopSystemLockTaskMode
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void showImeIfNeeded() { if (mNativeContentViewCore != 0) nativeShowImeIfNeeded(mNativeContentViewCore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showImeIfNeeded File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
showImeIfNeeded
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public List<Modification> modificationsSince(Revision revision) { InMemoryStreamConsumer consumer = inMemoryConsumer(); bombUnless(pull(consumer), "Failed to run hg pull command: " + consumer.getAllOutput()); CommandLine hg = hg("log", "-r", "tip:" + revision.getRevision(), ...
Vulnerability Classification: - CWE: CWE-77 - CVE: CVE-2022-29184 - Severity: MEDIUM - CVSS Score: 6.5 Description: Improve escaping of arguments when constructing Hg command calls Function: modificationsSince File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java Repository: gocd F...
[ "CWE-77" ]
CVE-2022-29184
MEDIUM
6.5
gocd
modificationsSince
domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
37d35115db2ada2190173f9413cfe1bc6c295ecb
1
Analyze the following code function for security vulnerabilities
private int getRequestedPasswordHistoryLength(int userId) { return getDevicePolicyManager().getPasswordHistoryLength(null, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestedPasswordHistoryLength File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getRequestedPasswordHistoryLength
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
@Test public void parseQueryMTypeWRateAndDS() throws Exception { HttpQuery query = NettyMocks.getQuery(tsdb, "/api/query?start=1h-ago&m=sum:1h-avg:rate:sys.cpu.0"); TSQuery tsq = (TSQuery) parseQuery.invoke(rpc, tsdb, query, expressions); TSSubQuery sub = tsq.getQueries().get(0); assertTrue(sub....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseQueryMTypeWRateAndDS File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
parseQueryMTypeWRateAndDS
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
@Override public void cacheResult(List<KBTemplate> kbTemplates) { for (KBTemplate kbTemplate : kbTemplates) { if (entityCache.getResult( KBTemplateModelImpl.ENTITY_CACHE_ENABLED, KBTemplateImpl.class, kbTemplate.getPrimaryKey()) == null) { cacheResult(kbTemplate); } else { kbTemplate.res...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cacheResult File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
cacheResult
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public void ensureIsOpen() throws AlreadyClosedException { if (!isOpen()) { throw new AlreadyClosedException(getCloseReason()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureIsOpen File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
ensureIsOpen
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public void setCellDescriptionGenerator(CellDescriptionGenerator generator) { /* * When porting this to the v7 version in Framework 8, the default * should be changed to PREFORMATTED to preserve the more secure * default that has accidentally been used there. */ setCe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCellDescriptionGenerator File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setCellDescriptionGenerator
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") final boolean cleanUpApplicationRecordLocked(ProcessRecord app, int pid, boolean restarting, boolean allowRestart, int index, boolean replacingPid, boolean fromBinderDied) { boolean restart; synchronized (mProcLock) { if (index >= 0) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanUpApplicationRecordLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
cleanUpApplicationRecordLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void addAttachedWindowToListLocked(final WindowState win, boolean addToToken) { final WindowToken token = win.mToken; final DisplayContent displayContent = win.getDisplayContent(); if (displayContent == null) { return; } final WindowState attached = win.mAttac...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachedWindowToListLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
addAttachedWindowToListLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public static boolean copyResource(File file, String filename, File targetDirectory) { return copyResource(file, filename, targetDirectory, new YesMatcher()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyResource File: src/main/java/org/olat/fileresource/types/FileResource.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
copyResource
src/main/java/org/olat/fileresource/types/FileResource.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
public void setAltSubjectMatch(String altSubjectMatch) { setFieldValue(ALTSUBJECT_MATCH_KEY, altSubjectMatch, ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAltSubjectMatch File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
setAltSubjectMatch
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0