instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static boolean containsPriviledge(AccessControlledResource.Priviledge required, Iterable<AccessControlledResource.Priviledge> privs) { for (AccessControlledResource.Priviledge p : privs) { if (p.equals(required)) { return true; } if( containsPriviledge(required, p.contains)) { return true; } } return false; }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2015-7326 - Severity: HIGH - CVSS Score: 7.5 Description: log returning null ACL Function: containsPriviledge File: milton-api/src/main/java/io/milton/http/AclUtils.java Repository: miltonio/milton2 Fixed Code: public static boolean containsPriviledge(AccessControlledResource.Priviledge required, Iterable<AccessControlledResource.Priviledge> privs) { if( privs == null ) { return false; } for (AccessControlledResource.Priviledge p : privs) { if (p.equals(required)) { return true; } if( containsPriviledge(required, p.contains)) { return true; } } return false; }
[ "CWE-611" ]
CVE-2015-7326
HIGH
7.5
miltonio/milton2
containsPriviledge
milton-api/src/main/java/io/milton/http/AclUtils.java
b5851c1
1
Analyze the following code function for security vulnerabilities
public static OutputStream getOutputStream(String fileName) { return getOutputStream(fileName, ExportConfig.EMPTY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOutputStream File: core/src/main/java/apoc/util/FileUtils.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23532
MEDIUM
6.5
neo4j-contrib/neo4j-apoc-procedures
getOutputStream
core/src/main/java/apoc/util/FileUtils.java
01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522
0
Analyze the following code function for security vulnerabilities
private File[] getIncludeFiles() throws AndrolibException { UsesFramework usesFramework = mApkInfo.usesFramework; if (usesFramework == null) { return null; } List<Integer> ids = usesFramework.ids; if (ids == null || ids.isEmpty()) { return null; } Framework framework = new Framework(mConfig); String tag = usesFramework.tag; File[] files = new File[ids.size()]; int i = 0; for (int id : ids) { files[i++] = framework.getFrameworkApk(id, tag); } return files; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIncludeFiles File: brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
getIncludeFiles
brut.apktool/apktool-lib/src/main/java/brut/androlib/ApkBuilder.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
@Override public void endTableCell(Map<String, String> parameters) { getXHTMLWikiPrinter().printXMLEndElement("td"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endTableCell File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
endTableCell
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
private void readGrantedUriPermissionsLocked() { if (DEBUG_URI_PERMISSION) Slog.v(TAG, "readGrantedUriPermissions()"); final long now = System.currentTimeMillis(); FileInputStream fis = null; try { fis = mGrantFile.openRead(); final XmlPullParser in = Xml.newPullParser(); in.setInput(fis, null); int type; while ((type = in.next()) != END_DOCUMENT) { final String tag = in.getName(); if (type == START_TAG) { if (TAG_URI_GRANT.equals(tag)) { final int sourceUserId; final int targetUserId; final int userHandle = readIntAttribute(in, ATTR_USER_HANDLE, UserHandle.USER_NULL); if (userHandle != UserHandle.USER_NULL) { // For backwards compatibility. sourceUserId = userHandle; targetUserId = userHandle; } else { sourceUserId = readIntAttribute(in, ATTR_SOURCE_USER_ID); targetUserId = readIntAttribute(in, ATTR_TARGET_USER_ID); } final String sourcePkg = in.getAttributeValue(null, ATTR_SOURCE_PKG); final String targetPkg = in.getAttributeValue(null, ATTR_TARGET_PKG); final Uri uri = Uri.parse(in.getAttributeValue(null, ATTR_URI)); final boolean prefix = readBooleanAttribute(in, ATTR_PREFIX); final int modeFlags = readIntAttribute(in, ATTR_MODE_FLAGS); final long createdTime = readLongAttribute(in, ATTR_CREATED_TIME, now); // Sanity check that provider still belongs to source package final ProviderInfo pi = getProviderInfoLocked( uri.getAuthority(), sourceUserId); if (pi != null && sourcePkg.equals(pi.packageName)) { int targetUid = -1; try { targetUid = AppGlobals.getPackageManager() .getPackageUid(targetPkg, targetUserId); } catch (RemoteException e) { } if (targetUid != -1) { final UriPermission perm = findOrCreateUriPermissionLocked( sourcePkg, targetPkg, targetUid, new GrantUri(sourceUserId, uri, prefix)); perm.initPersistedModes(modeFlags, createdTime); } } else { Slog.w(TAG, "Persisted grant for " + uri + " had source " + sourcePkg + " but instead found " + pi); } } } } } catch (FileNotFoundException e) { // Missing grants is okay } catch (IOException e) { Slog.wtf(TAG, "Failed reading Uri grants", e); } catch (XmlPullParserException e) { Slog.wtf(TAG, "Failed reading Uri grants", e); } finally { IoUtils.closeQuietly(fis); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readGrantedUriPermissionsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
readGrantedUriPermissionsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private Behavior createCDIBehavior(String behaviorId) { if (version.isJsf23()) { return CdiUtils.createBehavior(getBeanManager(), behaviorId); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createCDIBehavior File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
createCDIBehavior
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
private void notifyAdapterStateChange(int newState) { AdapterService adapterService = mAdapterService; AdapterProperties adapterProperties = mAdapterProperties; if ((adapterService == null) || (adapterProperties == null)) { errorLog("notifyAdapterStateChange after cleanup:" + newState); return; } int oldState = adapterProperties.getState(); adapterProperties.setState(newState); infoLog("Bluetooth adapter state changed: " + oldState + "-> " + newState); adapterService.updateAdapterState(oldState, newState); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyAdapterStateChange File: src/com/android/bluetooth/btservice/AdapterState.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
notifyAdapterStateChange
src/com/android/bluetooth/btservice/AdapterState.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
private static boolean isSystemApp(PackageParser.Package pkg) { return (pkg.applicationInfo.flags & ApplicationInfo.FLAG_SYSTEM) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSystemApp File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isSystemApp
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private static String toDumpString(String s) { if (s != null) { return s; } return "{null}"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDumpString File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
toDumpString
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
private NotificationId getSigninRequiredNotificationId(UserAccounts accounts, Account account) { NotificationId nId; synchronized (accounts.signinRequiredNotificationIds) { nId = accounts.signinRequiredNotificationIds.get(account); if (nId == null) { String tag = TAG + ":" + SystemMessage.NOTE_ACCOUNT_REQUIRE_SIGNIN + ":" + account.hashCode(); int id = SystemMessage.NOTE_ACCOUNT_REQUIRE_SIGNIN; nId = new NotificationId(tag, id); accounts.signinRequiredNotificationIds.put(account, nId); } } return nId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSigninRequiredNotificationId File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getSigninRequiredNotificationId
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
default void onConnectChoiceSet(@NonNull List<WifiConfiguration> networks, String choiceKey, int rssi) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConnectChoiceSet File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
onConnectChoiceSet
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public boolean getPackageAskScreenCompat(String packageName) { enforceNotIsolatedCaller("getPackageAskScreenCompat"); synchronized (this) { return mCompatModePackages.getPackageAskCompatModeLocked(packageName); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageAskScreenCompat File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageAskScreenCompat
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return String.format("Entry [key=%s, value=%s]", key, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: src/main/java/com/gitblit/StoredUserConfig.java Repository: gitblit-org/gitblit The code follows secure coding practices.
[ "CWE-269" ]
CVE-2022-31267
HIGH
7.5
gitblit-org/gitblit
toString
src/main/java/com/gitblit/StoredUserConfig.java
9b4afad6f4be212474809533ec2c280cce86501a
0
Analyze the following code function for security vulnerabilities
public void setErasedScoreItemDataIdsTypesExpected() { this.unsetTypeExpected(); int i=1; this.setTypeExpected(i, TypeNames.INT); // item_data_id }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setErasedScoreItemDataIdsTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setErasedScoreItemDataIdsTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private void updateMediaPackageID(MediaPackage mp, URI uri) throws IOException { InputStream in = null; HttpResponse response = null; try { if (uri.toString().startsWith("http")) { HttpGet get = new HttpGet(uri); response = httpClient.execute(get); int httpStatusCode = response.getStatusLine().getStatusCode(); if (httpStatusCode != 200) { throw new IOException(uri + " returns http " + httpStatusCode); } in = response.getEntity().getContent(); } else { in = uri.toURL().openStream(); } updateMediaPackageID(mp, in); in.close(); } finally { IOUtils.closeQuietly(in); httpClient.close(response); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateMediaPackageID File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
updateMediaPackageID
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
public void destroy() { ServiceDestroyEvent event = new ServiceDestroyEvent(this); serviceDestroyListeners .forEach(listener -> listener.serviceDestroy(event)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
destroy
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isPackageForFilter(String packageName, PackageParser.ServiceIntentInfo info) { return packageName.equals(info.service.owner.packageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackageForFilter File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isPackageForFilter
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
void sendConnectionStateChange(BluetoothDevice device, int profile, int state, int prevState) { // TODO(BT) permission check? // Since this is a binder call check if Bluetooth is on still if (getState() == BluetoothAdapter.STATE_OFF) return; mAdapterProperties.sendConnectionStateChange(device, profile, state, prevState); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendConnectionStateChange File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
sendConnectionStateChange
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLogicalCondition isNotNull() { Condition conditionLocal = new IsNotNullCondition(selector); return getOnGoingLogicalCondition(conditionLocal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNotNull File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
isNotNull
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
public int getMetricTimeInterval() { return getIntProperty(METRIC_TIME_INTERVAL, 60); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricTimeInterval File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getMetricTimeInterval
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting int injectBinderCallingPid() { return getCallingPid(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectBinderCallingPid File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectBinderCallingPid
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public static void forward(Context launcher, Account account, Message message) { launch(launcher, account, message, FORWARD, null, null, null, null, null /* extraValues */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forward File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
forward
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void acknowledgeDeviceCompliant() { throwIfParentInstance("acknowledgeDeviceCompliant"); if (mService != null) { try { mService.acknowledgeDeviceCompliant(); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: acknowledgeDeviceCompliant File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
acknowledgeDeviceCompliant
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int getBaseType() { return getTopParentWindow().mAttrs.type; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseType File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getBaseType
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public List<IssueWithParams> getWarnings() { return mWarnings; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWarnings File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getWarnings
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public void setBuilder(Builder builder) { if (mBuilder != builder) { mBuilder = builder; if (mBuilder != null) { mBuilder.setStyle(this); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBuilder File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setBuilder
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void setQuery(String query) { this.query = query; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setQuery File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
setQuery
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Override public void setUseClientMode(boolean clientMode) { if (clientMode != this.clientMode) { throw new UnsupportedOperationException(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseClientMode File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
setUseClientMode
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
private static Node migrateTrigger(Element triggerElement) { List<NodeTuple> tuples = new ArrayList<>(); String classTag = getClassTag(triggerElement.getName()); List<Node> paramSupplyNodes = migrateParamSupplies(triggerElement.element("params").elements()); if (!paramSupplyNodes.isEmpty()) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "params"), new SequenceNode(Tag.SEQ, paramSupplyNodes, FlowStyle.BLOCK))); } Element branchesElement = triggerElement.element("branches"); if (branchesElement != null) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "branches"), new ScalarNode(Tag.STR, branchesElement.getText().trim()))); } Element pathsElement = triggerElement.element("paths"); if (pathsElement != null) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "paths"), new ScalarNode(Tag.STR, pathsElement.getText().trim()))); } Element tagsElement = triggerElement.element("tags"); if (tagsElement != null) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "tags"), new ScalarNode(Tag.STR, tagsElement.getText().trim()))); } return new MappingNode(new Tag(classTag), tuples, FlowStyle.BLOCK); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateTrigger File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-538" ]
CVE-2021-21250
MEDIUM
4
theonedev/onedev
migrateTrigger
server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
9196fd795e87dab069b4260a3590a0ea886e770f
0
Analyze the following code function for security vulnerabilities
public String getParentURL(XWikiContext context) throws XWikiException { XWikiDocument doc = new XWikiDocument(getParentReference()); URL url = context.getURLFactory().createURL(doc.getSpace(), doc.getName(), "view", null, null, getDatabase(), context); return context.getURLFactory().getURL(url, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParentURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getParentURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
boolean isValidJWToken(String secret, String jwt) { try { if (secret != null && jwt != null) { JWSVerifier verifier = new MACVerifier(secret); SignedJWT sjwt = SignedJWT.parse(jwt); if (sjwt.verify(verifier)) { Date referenceTime = new Date(); JWTClaimsSet claims = sjwt.getJWTClaimsSet(); Date expirationTime = claims.getExpirationTime(); Date notBeforeTime = claims.getNotBeforeTime(); String jti = claims.getJWTID(); boolean expired = expirationTime != null && expirationTime.before(referenceTime); boolean notYetValid = notBeforeTime != null && notBeforeTime.after(referenceTime); boolean jtiRevoked = isApiKeyRevoked(jti, expired); return !(expired || notYetValid || jtiRevoked); } } } catch (JOSEException e) { logger.warn(null, e); } catch (ParseException ex) { logger.warn(null, ex); } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidJWToken File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isValidJWToken
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private boolean isAppSearchEnabled() { return mShortcutUser.mService.isAppSearchEnabled(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAppSearchEnabled File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
isAppSearchEnabled
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
void makeWindowFreezingScreenIfNeededLocked(WindowState w) { // If the screen is currently frozen or off, then keep // it frozen/off until this window draws at its new // orientation. if (!okToDisplay() && mWindowsFreezingScreen != WINDOWS_FREEZING_SCREENS_TIMEOUT) { if (DEBUG_ORIENTATION) Slog.v(TAG, "Changing surface while display frozen: " + w); w.mOrientationChanging = true; w.mLastFreezeDuration = 0; mInnerFields.mOrientationChangeComplete = false; if (mWindowsFreezingScreen == WINDOWS_FREEZING_SCREENS_NONE) { mWindowsFreezingScreen = WINDOWS_FREEZING_SCREENS_ACTIVE; // XXX should probably keep timeout from // when we first froze the display. mH.removeMessages(H.WINDOW_FREEZE_TIMEOUT); mH.sendEmptyMessageDelayed(H.WINDOW_FREEZE_TIMEOUT, WINDOW_FREEZE_TIMEOUT_DURATION); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeWindowFreezingScreenIfNeededLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
makeWindowFreezingScreenIfNeededLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public String getMacroList(XWikiContext context) { String macrosmapping = ""; XWiki xwiki = context.getWiki(); try { macrosmapping = getResourceContent(MACROS_FILE); } catch (IOException e) { } macrosmapping += "\r\n" + xwiki.getXWikiPreference("macros_mapping", "", context); return macrosmapping; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMacroList File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getMacroList
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException { String filename = file.getFileName().toString(); if(IMS_MANIFEST.equals(filename)) { manifestFile = true; manifestPath = file; } return manifestFile ? FileVisitResult.TERMINATE : FileVisitResult.CONTINUE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: visitFile File: src/main/java/org/olat/fileresource/types/ImsQTI21Resource.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
visitFile
src/main/java/org/olat/fileresource/types/ImsQTI21Resource.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
public List<Locale> getAvailableLocales(XWikiContext xcontext) { String[] languages = StringUtils.split(xcontext.getWiki().getXWikiPreference("languages", xcontext), ", |"); List<Locale> locales = new ArrayList<Locale>(languages.length); for (String language : languages) { if (StringUtils.isNotBlank(language)) { try { locales.add(LocaleUtils.toLocale(language)); } catch (Exception e) { LOGGER.warn("Invalid locale [{}] listed as available in the preferences", language); } } } // Add default language in case it's not listed as available (which is wrong but it happen) Locale defaultocale = getDefaultLocale(xcontext); if (!locales.contains(defaultocale)) { locales.add(defaultocale); } return locales; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAvailableLocales File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getAvailableLocales
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void enforcePolicyAccess(int uid, String method) { if (PackageManager.PERMISSION_GRANTED == getContext().checkCallingPermission( android.Manifest.permission.MANAGE_NOTIFICATIONS)) { return; } boolean accessAllowed = false; String[] packages = getContext().getPackageManager().getPackagesForUid(uid); final int packageCount = packages.length; for (int i = 0; i < packageCount; i++) { if (checkPolicyAccess(packages[i])) { accessAllowed = true; } } if (!accessAllowed) { Slog.w(TAG, "Notification policy access denied calling " + method); throw new SecurityException("Notification policy access denied"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforcePolicyAccess File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
enforcePolicyAccess
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings({"unchecked"}) public <T extends Describable<T>,D extends Descriptor<T>> DescriptorExtensionList<T,D> getDescriptorList(Class<T> type) { return descriptorLists.get(type); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDescriptorList File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getDescriptorList
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
private void setNavGraph(Bundle args, int startDestination) { setContentView(R.layout.nav_host_fragment); NavHostFragment navHost = (NavHostFragment) getSupportFragmentManager() .findFragmentById(R.id.nav_host_fragment); NavInflater inflater = navHost.getNavController().getNavInflater(); NavGraph graph = inflater.inflate(R.navigation.nav_graph); graph.setStartDestination(startDestination); navHost.getNavController().setGraph(graph, args); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNavGraph File: PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21132
MEDIUM
6.8
android
setNavGraph
PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java
0679e4f35055729be7276536fe45fe8ec18a0453
0
Analyze the following code function for security vulnerabilities
static public void createDbFromSqlStatements( Context context, String dbName, int dbVersion, String sqlStatements) { SQLiteDatabase db = context.openOrCreateDatabase(dbName, 0, null); // TODO: this is not quite safe since it assumes that all semicolons at the end of a line // terminate statements. It is possible that a text field contains ;\n. We will have to fix // this if that turns out to be a problem. String[] statements = TextUtils.split(sqlStatements, ";\n"); for (String statement : statements) { if (TextUtils.isEmpty(statement)) continue; db.execSQL(statement); } db.setVersion(dbVersion); db.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDbFromSqlStatements File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
createDbFromSqlStatements
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
private String templatePath() { if (templatePath == null) { String file = HgCommand.class.getResource("/hg.template").getFile(); try { templatePath = URLDecoder.decode(new File(file).getAbsolutePath(), "UTF-8"); } catch (UnsupportedEncodingException e) { templatePath = URLDecoder.decode(new File(file).getAbsolutePath()); } } return templatePath; }
Vulnerability Classification: - CWE: CWE-77 - CVE: CVE-2022-29184 - Severity: MEDIUM - CVSS Score: 6.5 Description: Improve escaping of arguments when constructing Hg command calls Function: templatePath File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java Repository: gocd Fixed Code: private String templatePath() { if (templatePath == null) { String file = HgCommand.class.getResource("/hg.template").getFile(); templatePath = URLDecoder.decode(new File(file).getAbsolutePath(), StandardCharsets.UTF_8); } return templatePath; }
[ "CWE-77" ]
CVE-2022-29184
MEDIUM
6.5
gocd
templatePath
domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
37d35115db2ada2190173f9413cfe1bc6c295ecb
1
Analyze the following code function for security vulnerabilities
@Override public StompServerOptions options() { return options; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: options File: src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java Repository: vert-x3/vertx-stomp The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-32081
MEDIUM
6.5
vert-x3/vertx-stomp
options
src/main/java/io/vertx/ext/stomp/impl/StompServerImpl.java
0de4bc5a44ddb57e74d92c445f16456fa03f265b
0
Analyze the following code function for security vulnerabilities
private boolean isAllowedEmptyTag(String tagName) { return "head".equals(tagName ) || policy.getAllowedEmptyTags().matches(tagName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowedEmptyTag File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-28367
MEDIUM
4.3
nahsra/antisamy
isAllowedEmptyTag
src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
0199e7e194dba5e7d7197703f43ebe22401e61ae
0
Analyze the following code function for security vulnerabilities
public void doMark() { if (timeStamp == 0) { timeStamp = System.currentTimeMillis(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doMark File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
doMark
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
public EmissaryResponse outboundEnque(final String place, final WorkBundle path) { final String placeUrl = KeyManipulator.getServiceHostURL(place); final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientEnqueue.action"); final List<NameValuePair> nvps = new ArrayList<NameValuePair>(); nvps.add(new BasicNameValuePair(CLIENT_NAME, place)); String pathData = null; try { final ByteArrayOutputStream bos = new ByteArrayOutputStream(); final ObjectOutputStream oos = new ObjectOutputStream(bos); oos.writeObject(path); oos.close(); try { pathData = bos.toString("8859_1"); } catch (UnsupportedEncodingException e) { pathData = bos.toString(); } } catch (Exception e) { logger.error("Cannot serialize WorkBundle object", e); throw new IllegalArgumentException("Cannot serialize WorkBundle object: " + e.getMessage()); } nvps.add(new BasicNameValuePair(WORK_BUNDLE_OBJ, pathData)); logger.debug("Sending {} file names to {} as {}", path.size(), place, path); method.setEntity(new UrlEncodedFormEntity(nvps, java.nio.charset.Charset.forName("8859_1"))); return send(method); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outboundEnque File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
outboundEnque
src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public String getValidSpaceIdExcludingAll(Profile authUser, String space, HttpServletRequest req) { String s = StringUtils.isBlank(space) ? getSpaceIdFromCookie(authUser, req) : space; return isAllSpaces(s) ? DEFAULT_SPACE : s; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValidSpaceIdExcludingAll File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getValidSpaceIdExcludingAll
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public static final String trim(String str) { if (str == null) throw logger.nullArgumentError("String to trim"); return str.trim(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trim File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java Repository: keycloak The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-2582
MEDIUM
4
keycloak
trim
saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
0cb5ba0f6e83162d221681f47b470c3042eef237
0
Analyze the following code function for security vulnerabilities
@Deprecated public boolean getCrossProfileCallerIdDisabled(@NonNull ComponentName admin) { throwIfParentInstance("getCrossProfileCallerIdDisabled"); if (mService != null) { try { return mService.getCrossProfileCallerIdDisabled(admin); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCrossProfileCallerIdDisabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getCrossProfileCallerIdDisabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Deprecated @InlineMe( replacement = "Files.asCharSource(file, charset).readLines(callback)", imports = "com.google.common.io.Files") @CanIgnoreReturnValue // some processors won't return a useful result @ParametricNullness public static <T extends @Nullable Object> T readLines( File file, Charset charset, LineProcessor<T> callback) throws IOException { return asCharSource(file, charset).readLines(callback); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readLines File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
readLines
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public String displayDocument(Syntax targetSyntax, boolean restricted) throws XWikiException { return this.doc.displayDocument(targetSyntax, restricted, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
displayDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public FileMapper[] getFileMappers() { return fileMappers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileMappers File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java Repository: codehaus-plexus/plexus-archiver The code follows secure coding practices.
[ "CWE-22", "CWE-61" ]
CVE-2023-37460
CRITICAL
9.8
codehaus-plexus/plexus-archiver
getFileMappers
src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
54759839fbdf85caf8442076f001d5fd64e0dcb2
0
Analyze the following code function for security vulnerabilities
public String getPlainTitle() { return this.doc.getRenderedTitle(Syntax.PLAIN_1_0, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPlainTitle File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getPlainTitle
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public void setSafeMode(boolean safeMode) { mSafeMode = safeMode; performHapticFeedbackLw(null, safeMode ? HapticFeedbackConstants.SAFE_MODE_ENABLED : HapticFeedbackConstants.SAFE_MODE_DISABLED, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSafeMode File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
setSafeMode
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public ComponentName startService(IApplicationThread caller, Intent service, String resolvedType, String callingPackage, int userId) throws TransactionTooLargeException { enforceNotIsolatedCaller("startService"); // Refuse possible leaked file descriptors if (service != null && service.hasFileDescriptors() == true) { throw new IllegalArgumentException("File descriptors passed in Intent"); } if (callingPackage == null) { throw new IllegalArgumentException("callingPackage cannot be null"); } if (DEBUG_SERVICE) Slog.v(TAG_SERVICE, "startService: " + service + " type=" + resolvedType); synchronized(this) { final int callingPid = Binder.getCallingPid(); final int callingUid = Binder.getCallingUid(); final long origId = Binder.clearCallingIdentity(); ComponentName res = mServices.startServiceLocked(caller, service, resolvedType, callingPid, callingUid, callingPackage, userId); Binder.restoreCallingIdentity(origId); return res; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startService File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
startService
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override public void release() { synchronized (mService) { if (mContainerState == CONTAINER_STATE_FINISHING) { return; } mContainerState = CONTAINER_STATE_FINISHING; long origId = Binder.clearCallingIdentity(); try { mStack.finishAllActivitiesLocked(false); removePendingActivityLaunchesLocked(mStack); } finally { Binder.restoreCallingIdentity(origId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: release File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
release
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public Set<String> getRequestIds(String scenarioDefinition) { MsScenario msScenario = GenerateHashTreeUtil.parseScenarioDefinition(scenarioDefinition); List<MsHTTPSamplerProxy> httpSampleFromHashTree = MsHTTPSamplerProxy.findHttpSampleFromHashTree(msScenario); return httpSampleFromHashTree.stream() .map(MsHTTPSamplerProxy::getId).collect(Collectors.toSet()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestIds File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getRequestIds
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void grantUriPermission(IApplicationThread caller, String targetPkg, Uri uri, int mode, int userId) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantUriPermission File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
grantUriPermission
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public static long byteArrayBaseOffset() { return BYTE_ARRAY_BASE_OFFSET; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: byteArrayBaseOffset File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
byteArrayBaseOffset
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
private static native int nativeGetSize(long obj);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetSize File: core/java/android/content/res/StringBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeGetSize
core/java/android/content/res/StringBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void deleteAttachement(EntityReference reference) throws Exception { assertStatusCodes(executeDelete(AttachmentResource.class, toElements(reference)), true, STATUS_NO_CONTENT); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteAttachement File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
deleteAttachement
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public ApiClient setOauthScope(String scope) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setScope(scope); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthScope File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthScope
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public DownloadOption getSelectedDownloadOption() { if (selectedDownloadOptionLabel == null) { return null; } return DownloadOption.getByLabel(selectedDownloadOptionLabel); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSelectedDownloadOption File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getSelectedDownloadOption
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
private static void restApiXmlGenerator(XmlGenerator gen, NetworkConfig config) { RestApiConfig c = config.getRestApiConfig(); if (c == null) { return; } gen.open("rest-api", "enabled", c.isEnabled()); for (RestEndpointGroup group : RestEndpointGroup.values()) { gen.node("endpoint-group", null, "name", group.name(), "enabled", c.isGroupEnabled(group)); } gen.close(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: restApiXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
restApiXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
private static FileSystem getFileSystem(URI uri) throws IOException { try { return FileSystems.getFileSystem(uri); } catch (FileSystemNotFoundException e) { return FileSystems.newFileSystem(uri, Collections.<String, String>emptyMap()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileSystem File: pf4j/src/main/java/org/pf4j/util/FileUtils.java Repository: pf4j The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-40827
HIGH
7.5
pf4j
getFileSystem
pf4j/src/main/java/org/pf4j/util/FileUtils.java
ed9392069fe14c6c30d9f876710e5ad40f7ea8c1
0
Analyze the following code function for security vulnerabilities
@JsonIgnore public String getSymmetricAlgorithmParams() { return attributes.get(SYMMETRIC_ALGORITHM_PARAMS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSymmetricAlgorithmParams File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getSymmetricAlgorithmParams
base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
static public void postProcessSingleRetrievedFile(File file, ObjectNode fileRecord) { if (!fileRecord.has("format")) { JSONUtilities.safePut(fileRecord, "format", ImportingManager.getFormat( file.getName(), JSONUtilities.getString(fileRecord, "declaredMimeType", null))); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postProcessSingleRetrievedFile File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
postProcessSingleRetrievedFile
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
public FormValidation doCheckExcludedRegions(@QueryParameter String value) throws IOException, ServletException { for (String region : Util.fixNull(value).trim().split("[\\r\\n]+")) try { Pattern.compile(region); } catch (PatternSyntaxException e) { return FormValidation.error("Invalid regular expression. " + e.getMessage()); } return FormValidation.ok(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doCheckExcludedRegions File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
doCheckExcludedRegions
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public Collection<XarEntry> getEntries() { return this.entries.values(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEntries File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getEntries
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public int getStyle(Object nativeFont) { if (nativeFont == null) { return Font.STYLE_PLAIN; } return ((NativeFont) nativeFont).style; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStyle File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getStyle
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void setSuspendOptimizationsNative(int reason, boolean enabled) { if (mVerboseLoggingEnabled) { log("setSuspendOptimizationsNative: " + reason + " " + enabled + " -want " + mContext.getResources().getBoolean( R.bool.config_wifiSuspendOptimizationsEnabled) + " stack:" + Thread.currentThread().getStackTrace()[2].getMethodName() + " - " + Thread.currentThread().getStackTrace()[3].getMethodName() + " - " + Thread.currentThread().getStackTrace()[4].getMethodName() + " - " + Thread.currentThread().getStackTrace()[5].getMethodName()); } //mWifiNative.setSuspendOptimizations(enabled); if (enabled) { mSuspendOptNeedsDisabled &= ~reason; /* None of dhcp, screen or highperf need it disabled and user wants it enabled */ if (mSuspendOptNeedsDisabled == 0 && mContext.getResources().getBoolean( R.bool.config_wifiSuspendOptimizationsEnabled)) { if (mVerboseLoggingEnabled) { log("setSuspendOptimizationsNative do it " + reason + " " + enabled + " stack:" + Thread.currentThread().getStackTrace()[2].getMethodName() + " - " + Thread.currentThread().getStackTrace()[3].getMethodName() + " - " + Thread.currentThread().getStackTrace()[4].getMethodName() + " - " + Thread.currentThread().getStackTrace()[5].getMethodName()); } mWifiNative.setSuspendOptimizations(mInterfaceName, true); } } else { mSuspendOptNeedsDisabled |= reason; mWifiNative.setSuspendOptimizations(mInterfaceName, false); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSuspendOptimizationsNative File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
setSuspendOptimizationsNative
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public String getLicense(Collection collection) { String license = getMetadataFirstValue(collection, CollectionService.MD_LICENSE, Item.ANY); if (license == null || license.trim().equals("")) { // Fallback to site-wide default license = licenseService.getDefaultSubmissionLicense(); } return license; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLicense File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
getLicense
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
protected abstract void setKexSeed(byte... seed);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKexSeed File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
setKexSeed
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
@Override protected void onCancelled(Void params) { // If we are cancelled while the task is running in the background, we may get null // params. The finisher is expected to always be called back, so just use the baked-in // params from the ctor in any case. mImageData.reset(); mQuickShareData.reset(); mParams.mActionsReadyListener.onActionsReady(mImageData); if (DEBUG_CALLBACK) { Log.d(TAG, "onCancelled, calling (Consumer<Uri>) finisher.accept(null)"); } mParams.finisher.accept(null); mParams.clearImage(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCancelled File: packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35676
HIGH
7.8
android
onCancelled
packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
109e58b62dc9fedcee93983678ef9d4931e72afa
0
Analyze the following code function for security vulnerabilities
@Override public void closeContents() { mContentsClient.onCloseWindow(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: closeContents File: android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
closeContents
android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public long doCount(ISelect select) { this.pageSizeZero = true; this.pageSize = 0; select.doSelect(); return this.total; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doCount File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
doCount
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
@Test public void getInstance(TestContext context) { PostgresClient c1 = PostgresClient.getInstance(vertx); PostgresClient c2 = PostgresClient.getInstance(vertx); context.assertEquals("public", c1.getTenantId()); context.assertEquals("public", c2.getTenantId()); context.assertEquals("raml_module_builder", PostgresClient.getModuleName()); context.assertEquals("public_raml_module_builder", c1.getSchemaName()); context.assertEquals("public_raml_module_builder", c2.getSchemaName()); c1.closeClient(context.asyncAssertSuccess()); c2.closeClient(context.asyncAssertSuccess()); context.assertEquals(c1, c2, "same instance"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getInstance
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public Locale getDefaultLocale() { return this.doc.getDefaultLocale(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultLocale File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getDefaultLocale
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public static void closeSubsequentFS(Path path) { if(path != null && FileSystems.getDefault() != path.getFileSystem()) { IOUtils.closeQuietly(path.getFileSystem()); } }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-39180 - Severity: HIGH - CVSS Score: 9.0 Description: OO-5549: fix the wiki import and add some unit tests Function: closeSubsequentFS File: src/main/java/org/olat/core/util/PathUtils.java Repository: OpenOLAT Fixed Code: public static void closeSubsequentFS(Path path) { if(path != null && FileSystems.getDefault() != path.getFileSystem()) { IOUtils.closeQuietly(path.getFileSystem(), null); } }
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
closeSubsequentFS
src/main/java/org/olat/core/util/PathUtils.java
699490be8e931af0ef1f135c55384db1f4232637
1
Analyze the following code function for security vulnerabilities
void syncIssues(Project project, List<IssuesDao> tapdIssues);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: syncIssues File: framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
syncIssues
framework/sdk-parent/xpack-interface/src/main/java/io/metersphere/xpack/track/issue/IssuesPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private static @ColorInt int getColor(@Nullable TypedArray ta, int index, @ColorInt int defValue) { return ta == null ? defValue : ta.getColor(index, defValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColor File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getColor
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void enqueueRpc(RpcContinuation k) { doEnqueueRpc(() -> new RpcContinuationRpcWrapper(k)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enqueueRpc File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
enqueueRpc
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public ApiClient setServers(List<ServerConfiguration> servers) { this.servers = servers; updateBasePath(); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServers File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setServers
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void requestBugReportWithDescription(@Nullable String shareTitle, @Nullable String shareDescription, int bugreportType) { requestBugReportWithDescription(shareTitle, shareDescription, bugreportType, /*nonce*/ 0L); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReportWithDescription File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
requestBugReportWithDescription
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public boolean isSecurityLoggingEnabled(ComponentName admin, String packageName) { if (!mHasFeature) { return false; } synchronized (getLockObject()) { if (!isSystemUid(getCallerIdentity())) { final CallerIdentity caller = getCallerIdentity(admin, packageName); if (admin != null) { Preconditions.checkCallAuthorization( isProfileOwnerOfOrganizationOwnedDevice(caller) || isDefaultDeviceOwner(caller)); } else { // A delegate app passes a null admin component, which is expected Preconditions.checkCallAuthorization( isCallerDelegate(caller, DELEGATION_SECURITY_LOGGING)); } } return mInjector.securityLogGetLoggingEnabledProperty(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecurityLoggingEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isSecurityLoggingEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private static void addIntentExtras(String screenshotId, Intent intent, String actionType, boolean smartActionsEnabled) { intent .putExtra(ScreenshotController.EXTRA_ACTION_TYPE, actionType) .putExtra(ScreenshotController.EXTRA_ID, screenshotId) .putExtra(ScreenshotController.EXTRA_SMART_ACTIONS_ENABLED, smartActionsEnabled); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addIntentExtras File: packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35676
HIGH
7.8
android
addIntentExtras
packages/SystemUI/src/com/android/systemui/screenshot/SaveImageInBackgroundTask.java
109e58b62dc9fedcee93983678ef9d4931e72afa
0
Analyze the following code function for security vulnerabilities
@Override public void registerStrongAuthTracker(IStrongAuthTracker tracker) { checkPasswordReadPermission(UserHandle.USER_ALL); mStrongAuth.registerStrongAuthTracker(tracker); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerStrongAuthTracker File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
registerStrongAuthTracker
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
public WorkBundle outboundWorkSpaceTake(final String space, final String place) { final String placeUrl = KeyManipulator.getServiceHostURL(space); final HttpPost method = createHttpPost(placeUrl, CONTEXT, "/WorkSpaceClientSpaceTake.action"); final List<NameValuePair> nvps = new ArrayList<NameValuePair>(); nvps.add(new BasicNameValuePair(CLIENT_NAME, place)); nvps.add(new BasicNameValuePair(SPACE_NAME, space)); method.setEntity(new UrlEncodedFormEntity(nvps, java.nio.charset.Charset.defaultCharset())); final EmissaryResponse status = send(method); WorkBundle path = null; // TODO Look at putting this method in the EmissaryResponse if (status.getStatus() != HttpStatus.SC_OK) { logger.debug("Take from space {} was an error: {}", space, status.getContentString()); } else { path = WorkBundle.buildWorkBundle(status.getContentString()); } return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: outboundWorkSpaceTake File: src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
outboundWorkSpaceTake
src/main/java/emissary/server/mvc/adapters/WorkSpaceAdapter.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
@RequiresPermissions("topic:list") @GetMapping("/list") public String list(@RequestParam(defaultValue = "1") Integer pageNo, String startDate, String endDate, String username, Model model) { if (StringUtils.isEmpty(startDate)) startDate = null; if (StringUtils.isEmpty(endDate)) endDate = null; if (StringUtils.isEmpty(username)) username = null; MyPage<Map<String, Object>> page = topicService.selectAllForAdmin(pageNo, startDate, endDate, username); model.addAttribute("page", page); model.addAttribute("startDate", startDate); model.addAttribute("endDate", endDate); model.addAttribute("username", username); return "admin/topic/list"; }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2022-23391 - Severity: MEDIUM - CVSS Score: 4.3 Description: 修复了一部分页面上输入框的xss注入 https://github.com/atjiu/pybbs/issues/171 Function: list File: src/main/java/co/yiiu/pybbs/controller/admin/TopicAdminController.java Repository: atjiu/pybbs Fixed Code: @RequiresPermissions("topic:list") @GetMapping("/list") public String list(@RequestParam(defaultValue = "1") Integer pageNo, String startDate, String endDate, String username, Model model) { if (username != null) username = username.replace("\"", "").replace("'", ""); if (StringUtils.isEmpty(startDate)) startDate = null; if (StringUtils.isEmpty(endDate)) endDate = null; if (StringUtils.isEmpty(username)) username = null; MyPage<Map<String, Object>> page = topicService.selectAllForAdmin(pageNo, startDate, endDate, username); model.addAttribute("page", page); model.addAttribute("startDate", startDate); model.addAttribute("endDate", endDate); model.addAttribute("username", username); return "admin/topic/list"; }
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
list
src/main/java/co/yiiu/pybbs/controller/admin/TopicAdminController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
1
Analyze the following code function for security vulnerabilities
public void clear() { executable = null; workingDir = null; shell.setExecutable( null ); shell.clearArguments(); arguments.removeAllElements(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clear File: src/main/java/org/codehaus/plexus/util/cli/Commandline.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
clear
src/main/java/org/codehaus/plexus/util/cli/Commandline.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
@Override public void dispose() { checkCorrectThread(); log("ServiceStateTracker dispose"); // Unregister for all events. mCi.unregisterForAvailable(this); mCi.unregisterForRadioStateChanged(this); mCi.unregisterForVoiceNetworkStateChanged(this); if (mUiccApplcation != null) {mUiccApplcation.unregisterForReady(this);} if (mIccRecords != null) {mIccRecords.unregisterForRecordsLoaded(this);} mCi.unSetOnRestrictedStateChanged(this); mCi.unSetOnNITZTime(this); mCr.unregisterContentObserver(mAutoTimeObserver); mCr.unregisterContentObserver(mAutoTimeZoneObserver); mPhone.getContext().unregisterReceiver(mIntentReceiver); super.dispose(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispose File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
dispose
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private void tryKeyguardDone() { if (DEBUG) { Log.d(TAG, "tryKeyguardDone: pending - " + mKeyguardDonePending + ", animRan - " + mHideAnimationRun + " animRunning - " + mHideAnimationRunning); } if (!mKeyguardDonePending && mHideAnimationRun && !mHideAnimationRunning) { handleKeyguardDone(); } else if (!mHideAnimationRun) { if (DEBUG) Log.d(TAG, "tryKeyguardDone: starting pre-hide animation"); mHideAnimationRun = true; mHideAnimationRunning = true; mKeyguardViewControllerLazy.get() .startPreHideAnimation(mHideAnimationFinishedRunnable); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryKeyguardDone File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
tryKeyguardDone
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
@Override public Reader getLogReader() { return doGetLog().charStream(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLogReader File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
getLogReader
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
long getMessageId();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessageId File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
getMessageId
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void setName(String name) { this.name = name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setName File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
setName
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/Jiffle.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
public static void gzipTarToOutputStream(Project project, OutputStream os) throws IOException { GZIPOutputStream gos = new GZIPOutputStream(os); TarArchiveOutputStream tos = new TarArchiveOutputStream(gos); try { ProjectManager.singleton.exportProject(project.id, tos); } finally { tos.close(); gos.close(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gzipTarToOutputStream File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
gzipTarToOutputStream
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
WindowState getImeLayeringTarget() { final InsetsControlTarget target = getDisplayContent().getImeTarget(IME_TARGET_LAYERING); return target != null ? target.getWindow() : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImeLayeringTarget File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getImeLayeringTarget
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public void addPortForwardingEventListener(PortForwardingEventListener listener) { PortForwardingEventListener.validateListener(listener); // avoid race conditions on notifications while session is being closed if (!isOpen()) { log.warn("addPortForwardingEventListener({})[{}] ignore registration while session is closing", this, listener); return; } if (this.tunnelListeners.add(listener)) { if (log.isTraceEnabled()) { log.trace("addPortForwardingEventListener({})[{}] registered", this, listener); } } else { if (log.isTraceEnabled()) { log.trace("addPortForwardingEventListener({})[{}] ignored duplicate", this, listener); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPortForwardingEventListener File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
addPortForwardingEventListener
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
@Override public void onEvent(Event event, Object arg1, Object arg2) { loadTranslations(((WikiReadyEvent) event).getWikiId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEvent File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29510
HIGH
8.8
xwiki/xwiki-platform
onEvent
xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java
d06ff8a58480abc7f63eb1d4b8b366024d990643
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { final int prime = 31; int result = 1; result = prime * result + ((this.internalMessageID == null) ? 0 : this.internalMessageID.hashCode()); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
hashCode
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
public int read(long[] d, int off, int len) throws IOException { return rawRead(d, off * 8, len * 8); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: src/main/java/org/xerial/snappy/SnappyInputStream.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-34455
HIGH
7.5
xerial/snappy-java
read
src/main/java/org/xerial/snappy/SnappyInputStream.java
3bf67857fcf70d9eea56eed4af7c925671e8eaea
0