instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public void setValue(String value) { this.value = value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setValue File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileParameter.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setValue
base/common/src/main/java/com/netscape/certsrv/profile/ProfileParameter.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void silenceRinger(String callingPackage) { synchronized (mLock) { enforcePermissionOrPrivilegedDialer(MODIFY_PHONE_STATE, callingPackage); long token = Binder.clearCallingIdentity(); try { Log.i(this, "Silence Ringer requested by %s", callingPackage); mCallsManager.getRinger().silence(); } finally { Binder.restoreCallingIdentity(token); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: silenceRinger File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
silenceRinger
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
@Override @Deprecated public void setStatus(int arg0, String arg1) { // ignore }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatus File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
setStatus
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@GetMapping("/{id}/vote") public Result vote(@PathVariable Integer id) { User user = getApiUser(); Topic topic = topicService.selectById(id); ApiAssert.notNull(topic, "这个话题可能已经被删除了"); ApiAssert.notTrue(topic.getUserId().equals(user.getId()), "给自己话题点赞,脸皮真厚!!"); int voteCount = topicService.vote(topic, getApiUser()); return success(voteCount); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: vote File: src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java Repository: atjiu/pybbs The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
vote
src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAsyncSupported() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAsyncSupported File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
isAsyncSupported
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public BaseObject updateXObjectFromRequest(EntityReference classReference, XWikiContext context) throws XWikiException { return updateXObjectFromRequest(classReference, "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateXObjectFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
updateXObjectFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private native void nativeExitFullscreen(long nativeContentViewCoreImpl);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeExitFullscreen File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeExitFullscreen
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public TcpSlaveAgentListener getTcpSlaveAgentListener() { return tcpSlaveAgentListener; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTcpSlaveAgentListener File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getTcpSlaveAgentListener
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
private String getMatcherResultForImg(String regex, String targetStr) { String result = ""; Pattern pattern = Pattern.compile(regex); Matcher matcher = pattern.matcher(targetStr); while (matcher.find()) { result = matcher.group(1); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMatcherResultForImg File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getMatcherResultForImg
test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@Override public void updateEverything() { updateDateTimePosition(); updateVisibilities(); setClickable(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateEverything File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3886
HIGH
7.2
android
updateEverything
packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
0
Analyze the following code function for security vulnerabilities
@Override public void onLeashAnimationStarting(Transaction t, SurfaceControl leash) { if (mAnimatingActivityRegistry != null) { mAnimatingActivityRegistry.notifyStarting(this); } // If the animation needs to be cropped then an animation bounds layer is created as a // child of the root pinned task or animation layer. The leash is then reparented to this // new layer. if (mNeedsAnimationBoundsLayer) { mTmpRect.setEmpty(); if (getDisplayContent().mAppTransitionController.isTransitWithinTask( getTransit(), task)) { task.getBounds(mTmpRect); } else { final Task rootTask = getRootTask(); if (rootTask == null) { return; } // Set clip rect to root task bounds. rootTask.getBounds(mTmpRect); } mAnimationBoundsLayer = createAnimationBoundsLayer(t); // Crop to root task bounds. t.setLayer(leash, 0); t.setLayer(mAnimationBoundsLayer, getLastLayer()); // Reparent leash to animation bounds layer. t.reparent(leash, mAnimationBoundsLayer); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLeashAnimationStarting File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
onLeashAnimationStarting
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public static boolean validUTF8(byte[] input) { CharsetDecoder cd = Charset.availableCharsets().get("UTF-8").newDecoder(); try { cd.decode(ByteBuffer.wrap(input)); } catch (CharacterCodingException e) { return false; } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validUTF8 File: src/main/java/com/openkm/util/FormatUtil.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-40317
MEDIUM
5.4
openkm/document-management-system
validUTF8
src/main/java/com/openkm/util/FormatUtil.java
870d518f7de349c3fa4c7b9883789fdca4590c4e
0
Analyze the following code function for security vulnerabilities
private void dumpPerUserData(IndentingPrintWriter pw) { int userCount = mUserData.size(); for (int i = 0; i < userCount; i++) { int userId = mUserData.keyAt(i); DevicePolicyData policy = getUserData(userId); policy.dump(pw); pw.println(); if (userId == UserHandle.USER_SYSTEM) { pw.increaseIndent(); PersonalAppsSuspensionHelper.forUser(mContext, userId).dump(pw); pw.decreaseIndent(); pw.println(); } else { // pm.getUnsuspendablePackages() will fail if it's called for a different user; // as this dump is mostly useful for system user anyways, we can just ignore the // others (rather than changing the permission check in the PM method) Slogf.d(LOG_TAG, "skipping PersonalAppsSuspensionHelper.dump() for user " + userId); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpPerUserData File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
dumpPerUserData
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public boolean addCrossProfileWidgetProvider(ComponentName admin, String callerPackageName, String packageName) { CallerIdentity caller; if (isPermissionCheckFlagEnabled()) { caller = getCallerIdentity(admin, callerPackageName); } else { caller = getCallerIdentity(admin); } ActiveAdmin activeAdmin; if (isPermissionCheckFlagEnabled()) { EnforcingAdmin enforcingAdmin = enforcePermissionAndGetEnforcingAdmin( admin, MANAGE_DEVICE_POLICY_PROFILE_INTERACTION, caller.getPackageName(), caller.getUserId()); activeAdmin = enforcingAdmin.getActiveAdmin(); } else { Objects.requireNonNull(admin, "ComponentName is null"); Preconditions.checkCallAuthorization(isProfileOwner(caller)); synchronized (getLockObject()) { activeAdmin = getProfileOwnerLocked(caller.getUserId()); } } List<String> changedProviders = null; synchronized (getLockObject()) { if (activeAdmin.crossProfileWidgetProviders == null) { activeAdmin.crossProfileWidgetProviders = new ArrayList<>(); } List<String> providers = activeAdmin.crossProfileWidgetProviders; if (!providers.contains(packageName)) { providers.add(packageName); changedProviders = new ArrayList<>(providers); saveSettingsLocked(caller.getUserId()); } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.ADD_CROSS_PROFILE_WIDGET_PROVIDER) .setAdmin(caller.getPackageName()) .write(); if (changedProviders != null) { mLocalService.notifyCrossProfileProvidersChanged(caller.getUserId(), changedProviders); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCrossProfileWidgetProvider File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
addCrossProfileWidgetProvider
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
ActivityRecord findActivityLocked(Intent intent, ActivityInfo info) { for (int displayNdx = mActivityDisplays.size() - 1; displayNdx >= 0; --displayNdx) { final ArrayList<ActivityStack> stacks = mActivityDisplays.valueAt(displayNdx).mStacks; for (int stackNdx = stacks.size() - 1; stackNdx >= 0; --stackNdx) { final ActivityRecord ar = stacks.get(stackNdx).findActivityLocked(intent, info); if (ar != null) { return ar; } } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findActivityLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
findActivityLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Bean public GithubService githubService( Endpoint githubEndpoint, Client retrofitClient, RestAdapter.LogLevel retrofitLogLevel) { log.info("Github service loaded"); GithubService githubClient = new RestAdapter.Builder() .setEndpoint(githubEndpoint) .setConverter(new JacksonConverter()) .setClient(retrofitClient) .setLogLevel(RestAdapter.LogLevel.FULL) .setLog(new Slf4jRetrofitLogger(GithubService.class)) .build() .create(GithubService.class); return githubClient; }
Vulnerability Classification: - CWE: CWE-532 - CVE: CVE-2023-39348 - Severity: MEDIUM - CVSS Score: 5.3 Description: fix(gha): Fix github status log and add tests Function: githubService File: echo-notifications/src/main/groovy/com/netflix/spinnaker/echo/config/GithubConfig.java Repository: spinnaker/echo Fixed Code: @Bean public GithubService githubService( Endpoint githubEndpoint, Client retrofitClient, RestAdapter.LogLevel retrofitLogLevel) { log.info("Github service loaded"); GithubService githubClient = new RestAdapter.Builder() .setEndpoint(githubEndpoint) .setConverter(new JacksonConverter()) .setClient(retrofitClient) .setLogLevel(retrofitLogLevel != null ? retrofitLogLevel : RestAdapter.LogLevel.BASIC) .setLog(new Slf4jRetrofitLogger(GithubService.class)) .build() .create(GithubService.class); return githubClient; }
[ "CWE-532" ]
CVE-2023-39348
MEDIUM
5.3
spinnaker/echo
githubService
echo-notifications/src/main/groovy/com/netflix/spinnaker/echo/config/GithubConfig.java
bcbc7bc89a83f79d86b5c13438c8f04e581946b2
1
Analyze the following code function for security vulnerabilities
public void setHeightMode(HeightMode heightMode) { /** * This method is a workaround for the fact that Vaadin re-applies * widget dimensions (height/width) on each state change event. The * original design was to have setHeight and setHeightByRow be equals, * and whichever was called the latest was considered in effect. * * But, because of Vaadin always calling setHeight on the widget, this * approach doesn't work. */ getState().heightMode = heightMode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHeightMode File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setHeightMode
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@RequestMapping("/view") public void view(@RequestParam String filename, @RequestParam(required = false) String base, @RequestParam(required = false) Integer tailLines, HttpServletResponse response) throws IOException { securityCheck(filename); response.setContentType(MediaType.TEXT_PLAIN_VALUE); Path path = loggingPath(base); FileProvider fileProvider = getFileProvider(path); if (tailLines != null) { fileProvider.tailContent(path, filename, response.getOutputStream(), tailLines); } else { fileProvider.streamContent(path, filename, response.getOutputStream()); } }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-21234 - Severity: MEDIUM - CVSS Score: 4.0 Description: backport directory traversal vulnerability fix Function: view File: lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java Repository: lukashinsch/spring-boot-actuator-logview Fixed Code: @RequestMapping("/view") public void view(@RequestParam String filename, @RequestParam(required = false) String base, @RequestParam(required = false) Integer tailLines, HttpServletResponse response) throws IOException { Path path = loggingPath(base); securityCheck(path, filename); response.setContentType(MediaType.TEXT_PLAIN_VALUE); FileProvider fileProvider = getFileProvider(path); if (tailLines != null) { fileProvider.tailContent(path, filename, response.getOutputStream(), tailLines); } else { fileProvider.streamContent(path, filename, response.getOutputStream()); } }
[ "CWE-22" ]
CVE-2021-21234
MEDIUM
4
lukashinsch/spring-boot-actuator-logview
view
lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java
760acbb939a8d1f7d1a7dfcd51ca848eea04e772
1
Analyze the following code function for security vulnerabilities
@SuppressJava6Requirement(reason = "Usage guarded by java version check") private static boolean canExecuteExecutable(File file) throws IOException { if (PlatformDependent.javaVersion() < 7) { // Pre-JDK7, the Java API did not directly support POSIX permissions; instead of implementing a custom // work-around, assume true, which disables the check. return true; } // If we can already execute, there is nothing to do. if (file.canExecute()) { return true; } // On volumes, with noexec set, even files with the executable POSIX permissions will fail to execute. // The File#canExecute() method honors this behavior, probaby via parsing the noexec flag when initializing // the UnixFileStore, though the flag is not exposed via a public API. To find out if library is being // loaded off a volume with noexec, confirm or add executalbe permissions, then check File#canExecute(). // Note: We use FQCN to not break when netty is used in java6 Set<java.nio.file.attribute.PosixFilePermission> existingFilePermissions = java.nio.file.Files.getPosixFilePermissions(file.toPath()); Set<java.nio.file.attribute.PosixFilePermission> executePermissions = EnumSet.of(java.nio.file.attribute.PosixFilePermission.OWNER_EXECUTE, java.nio.file.attribute.PosixFilePermission.GROUP_EXECUTE, java.nio.file.attribute.PosixFilePermission.OTHERS_EXECUTE); if (existingFilePermissions.containsAll(executePermissions)) { return false; } Set<java.nio.file.attribute.PosixFilePermission> newPermissions = EnumSet.copyOf(existingFilePermissions); newPermissions.addAll(executePermissions); java.nio.file.Files.setPosixFilePermissions(file.toPath(), newPermissions); return file.canExecute(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canExecuteExecutable File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
canExecuteExecutable
common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
public void setNetworkAvailableOnUiThread(final AwContents awContents, final boolean networkUp) { getInstrumentation().runOnMainSync(new Runnable() { @Override public void run() { awContents.setNetworkAvailable(networkUp); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNetworkAvailableOnUiThread File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5155
MEDIUM
4.3
chromium
setNetworkAvailableOnUiThread
android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6
0
Analyze the following code function for security vulnerabilities
Handler getHandler(final String uri, final String localName) { SemanticModule module = this.modules.getSemanticModule( uri ); if ( module != null ) { return module.getHandler( localName ); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHandler File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java Repository: apache/incubator-kie-drools The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-8125
HIGH
7.5
apache/incubator-kie-drools
getHandler
drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3
0
Analyze the following code function for security vulnerabilities
private boolean isCallingFromPackage(String packageName, int callingUid) { return mInjector.binderWithCleanCallingIdentity(() -> { try { final int packageUid = mInjector.getPackageManager().getPackageUidAsUser( packageName, UserHandle.getUserId(callingUid)); return packageUid == callingUid; } catch (NameNotFoundException e) { Slogf.d(LOG_TAG, "Calling package not found", e); return false; } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCallingFromPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isCallingFromPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public boolean canGoForward() { return mWebContents != null && mWebContents.getNavigationController().canGoForward(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canGoForward File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
canGoForward
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void alias(String name, Class type) { if (classAliasingMapper == null) { throw new com.thoughtworks.xstream.InitializationException("No " + ClassAliasingMapper.class.getName() + " available"); } classAliasingMapper.addClassAlias(name, type); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: alias File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
alias
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private int runInstallAbandon() throws RemoteException { final int sessionId = Integer.parseInt(nextArg()); PackageInstaller.Session session = null; try { session = new PackageInstaller.Session(mInstaller.openSession(sessionId)); session.abandon(); System.out.println("Success"); return 0; } finally { IoUtils.closeQuietly(session); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runInstallAbandon File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runInstallAbandon
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
public void unbindBackupAgent(ApplicationInfo appInfo) { if (DEBUG_BACKUP) Slog.v(TAG_BACKUP, "unbindBackupAgent: " + appInfo); if (appInfo == null) { Slog.w(TAG, "unbind backup agent for null app"); return; } synchronized(this) { try { if (mBackupAppName == null) { Slog.w(TAG, "Unbinding backup agent with no active backup"); return; } if (!mBackupAppName.equals(appInfo.packageName)) { Slog.e(TAG, "Unbind of " + appInfo + " but is not the current backup target"); return; } // Not backing this app up any more; reset its OOM adjustment final ProcessRecord proc = mBackupTarget.app; updateOomAdjLocked(proc); // If the app crashed during backup, 'thread' will be null here if (proc.thread != null) { try { proc.thread.scheduleDestroyBackupAgent(appInfo, compatibilityInfoForPackageLocked(appInfo)); } catch (Exception e) { Slog.e(TAG, "Exception when unbinding backup agent:"); e.printStackTrace(); } } } finally { mBackupTarget = null; mBackupAppName = null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unbindBackupAgent File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
unbindBackupAgent
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
private SyndFeed getFeed() { return (SyndFeed) this.execution.getContext().getProperty(FEED_PROPERTY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFeed File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29202
CRITICAL
9
xwiki/xwiki-platform
getFeed
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-macros/xwiki-platform-rendering-macro-rss/src/main/java/org/xwiki/rendering/internal/macro/rss/RssMacro.java
5c7ebe47c2897e92d8f04fe2e15027e84dc3ec03
0
Analyze the following code function for security vulnerabilities
public String getName() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getName
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static NativeArray jsFunction_getSubscriptions(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws ScriptException, APIManagementException { NativeArray myn = new NativeArray(0); if (args != null && args.length != 0) { String providerName = (String) args[0]; String apiName = (String) args[1]; String version = (String) args[2]; String user = (String) args[3]; String groupingId = (String) args[4]; APIIdentifier apiIdentifier = new APIIdentifier(APIUtil.replaceEmailDomain(providerName), apiName, version); Subscriber subscriber = new Subscriber(user); APIConsumer apiConsumer = getAPIConsumer(thisObj); Set<SubscribedAPI> apis = apiConsumer.getSubscribedIdentifiers(subscriber, apiIdentifier, groupingId); int i = 0; if (apis != null) { for (SubscribedAPI api : apis) { NativeObject row = new NativeObject(); row.put("application", row, api.getApplication().getName()); row.put("applicationId", row, api.getApplication().getId()); row.put("tokenType", row, api.getApplication().getTokenType()); if (APIUtil.isMultiGroupAppSharingEnabled()) { row.put("owner", row, api.getApplication().getOwner()); } List<APIKey> keys = api.getKeys(); for (APIKey key : keys) { row.put(key.getType() + "_KEY", row, key.getAccessToken()); } myn.put(i++, myn, row); } } } return myn; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_getSubscriptions File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_getSubscriptions
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
@Override public <T> void write(String key, T payload) { if (payload == null) { LOG.debug("Payload was null. Skipping."); return; } ClusterConfig clusterConfig = ClusterConfig.create(key, payload, nodeId.getNodeId()); dbCollection.update(DBQuery.is("type", key), clusterConfig, true, false, WriteConcern.JOURNALED); ClusterConfigChangedEvent event = ClusterConfigChangedEvent.create( DateTime.now(DateTimeZone.UTC), nodeId.getNodeId(), key); clusterEventBus.post(event); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
write
graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
private Header[] applyHeaderFilters(Header[] theAllHeaders) { if (myFilterHeaders == null || myFilterHeaders.isEmpty()) { return theAllHeaders; } ArrayList<Header> retVal = new ArrayList<Header>(); for (Header next : theAllHeaders) { if (!myFilterHeaders.contains(next.getName().toLowerCase())) { retVal.add(next); } } return retVal.toArray(new Header[retVal.size()]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyHeaderFilters File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-12741
MEDIUM
4.3
hapifhir/hapi-fhir
applyHeaderFilters
hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/BaseController.java
8f41159eb147eeb964cad68b28eff97acac6ea9a
0
Analyze the following code function for security vulnerabilities
public List<Object> updateObjectsFromRequest(String className, String prefix) throws XWikiException { List<BaseObject> objs = getDoc().updateObjectsFromRequest(className, prefix, getXWikiContext()); List<Object> wrapped = new ArrayList<Object>(); for (BaseObject object : objs) { wrapped.add(new com.xpn.xwiki.api.Object(object, getXWikiContext())); } updateAuthor(); return wrapped; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateObjectsFromRequest File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
updateObjectsFromRequest
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public XMLBuilder data(String data) { return cdata(data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: data File: src/main/java/com/jamesmurty/utils/XMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
data
src/main/java/com/jamesmurty/utils/XMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
private void uninstallOrDisablePackage(String packageName, @UserIdInt int userId) { final ApplicationInfo appInfo; try { appInfo = mIPackageManager.getApplicationInfo( packageName, MATCH_DIRECT_BOOT_AWARE | MATCH_DIRECT_BOOT_UNAWARE, userId); } catch (RemoteException e) { // Shouldn't happen. Slogf.wtf(LOG_TAG, "Error getting application info", e); return; } if (appInfo == null) { Slogf.wtf(LOG_TAG, "Failed to get package info for " + packageName); return; } if ((appInfo.flags & ApplicationInfo.FLAG_SYSTEM) != 0) { Slogf.i(LOG_TAG, "Package %s is pre-installed, marking disabled until used", packageName); mContext.getPackageManager().setApplicationEnabledSetting(packageName, PackageManager.COMPONENT_ENABLED_STATE_DISABLED_UNTIL_USED, /* flags= */ 0); return; } final IIntentSender.Stub mLocalSender = new IIntentSender.Stub() { @Override public void send(int code, Intent intent, String resolvedType, IBinder allowlistToken, IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) { final int status = intent.getIntExtra( PackageInstaller.EXTRA_STATUS, PackageInstaller.STATUS_FAILURE); if (status == PackageInstaller.STATUS_SUCCESS) { Slogf.i(LOG_TAG, "Package %s uninstalled for user %d", packageName, userId); } else { Slogf.e(LOG_TAG, "Failed to uninstall %s; status: %d", packageName, status); } } }; final PackageInstaller pi = mInjector.getPackageManager(userId).getPackageInstaller(); pi.uninstall(packageName, /* flags= */ 0, new IntentSender((IIntentSender) mLocalSender)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uninstallOrDisablePackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
uninstallOrDisablePackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private static String getLBURL(String requestUrl, HttpServletRequest request) { String host = request.getHeader("host"); if (host == null) { return requestUrl; } int index = requestUrl.indexOf("//"); if (index == -1) { return requestUrl; } StringBuffer sb = new StringBuffer(200); sb.append(requestUrl.substring(0, index + 2)).append(host); String rest = requestUrl.substring(index +2, requestUrl.length()); if ((index = rest.indexOf("/")) != -1) { sb.append(rest.substring(index, rest.length())); } if (debug.messageEnabled()) { debug.message("getLBURL: LBURL = " + sb.toString()); } return sb.toString().trim(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLBURL File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
getLBURL
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
protected String getPreviousVersion(HttpServletRequest request) { String previousVersionParameter = request.getParameter(PREVIOUS_VERSION_PARAMETER); if (isFromChangeRequest(request)) { return this.fileChangeVersionManager.getFileChangeVersion(previousVersionParameter); } else { return previousVersionParameter; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreviousVersion File: application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java Repository: xwiki-contrib/application-changerequest The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-49280
MEDIUM
6.5
xwiki-contrib/application-changerequest
getPreviousVersion
application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java
ff0f5368ea04f0e4aa7b33821c707dc68a8c5ca8
0
Analyze the following code function for security vulnerabilities
private <T> T externGet(Supplier<T> supplier) { try { exitPublicInterface(); return supplier.get(); } finally { enterPublicInterface(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: externGet File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
externGet
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public String display(String fieldname, Object obj) { if (obj == null) { return ""; } return this.doc.display(fieldname, obj.getBaseObject(), getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: display File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
display
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public Messenger getMessenger() { return new Messenger(getHandler()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessenger File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getMessenger
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@UnstableApi public ServerBuilder multipartUploadsLocation(Path path) { requireNonNull(path, "path"); virtualHostTemplate.multipartUploadsLocation(path); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: multipartUploadsLocation File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
multipartUploadsLocation
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public AsyncHttpClientConfigBean setProxyServer(ProxyServer proxyServer) { this.proxyServerSelector = ProxyUtils.createProxyServerSelector(proxyServer); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProxyServer File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setProxyServer
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) @RequiresPermission(value = MANAGE_DEVICE_POLICY_RESET_PASSWORD, conditional = true) public boolean setResetPasswordToken(@Nullable ComponentName admin, byte[] token) { throwIfParentInstance("setResetPasswordToken"); if (mService != null) { try { return mService.setResetPasswordToken(admin, mContext.getPackageName(), token); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setResetPasswordToken File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setResetPasswordToken
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String getTemplate() { String templateReferenceAsString = ""; DocumentReference templateDocumentReference = this.doc.getTemplateDocumentReference(); if (templateDocumentReference != null) { templateReferenceAsString = getLocalEntityReferenceSerializer().serialize(templateDocumentReference); } return templateReferenceAsString; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTemplate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getTemplate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public Intent createAdminSupportIntent(@NonNull String restriction) { throwIfParentInstance("createAdminSupportIntent"); Intent result = null; if (mService != null) { try { result = mService.createAdminSupportIntent(restriction); if (result != null) { result.prepareToEnterProcess(LOCAL_FLAG_FROM_SYSTEM, mContext.getAttributionSource()); } } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createAdminSupportIntent File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
createAdminSupportIntent
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void deleteClusterRoleBinding(String namespace, TaskLogger jobLogger) { Commandline cmd = newKubeCtl(); cmd.addArgs("delete", "clusterrolebinding", namespace); cmd.execute(new LineConsumer() { @Override public void consume(String line) { logger.debug(line); } }, new LineConsumer() { @Override public void consume(String line) { jobLogger.error("Kubernetes: " + line); } }).checkReturnCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteClusterRoleBinding File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
deleteClusterRoleBinding
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
void dumpSessionsLocked(PrintWriter pw, boolean dumpAll) { pw.println("WINDOW MANAGER SESSIONS (dumpsys window sessions)"); for (int i=0; i<mSessions.size(); i++) { Session s = mSessions.valueAt(i); pw.print(" Session "); pw.print(s); pw.println(':'); s.dump(pw, " "); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpSessionsLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
dumpSessionsLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public Marshaller getMarshaller() { return marshaller; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMarshaller File: integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
getMarshaller
integrationtests/compatibility-mode-it/src/test/java/org/infinispan/it/compatibility/CompatibilityCacheFactory.java
69be66141eee7abb1c47d46f0a6b74b079709f4b
0
Analyze the following code function for security vulnerabilities
@Override public void placeCall(Uri handle, Bundle extras, String callingPackage, String callingFeatureId) { try { Log.startSession("TSI.pC", Log.getPackageAbbreviation(callingPackage)); enforceCallingPackage(callingPackage, "placeCall"); PhoneAccountHandle phoneAccountHandle = null; boolean clearPhoneAccountHandleExtra = false; if (extras != null) { phoneAccountHandle = extras.getParcelable( TelecomManager.EXTRA_PHONE_ACCOUNT_HANDLE); if (extras.containsKey(TelecomManager.EXTRA_IS_HANDOVER)) { // This extra is for Telecom use only so should never be passed in. extras.remove(TelecomManager.EXTRA_IS_HANDOVER); } } boolean isSelfManaged = phoneAccountHandle != null && isSelfManagedConnectionService(phoneAccountHandle); if (isSelfManaged) { try { mContext.enforceCallingOrSelfPermission( Manifest.permission.MANAGE_OWN_CALLS, "Self-managed ConnectionServices require " + "MANAGE_OWN_CALLS permission."); } catch (SecurityException e) { // Fallback to use mobile network to avoid disclosing phone account handle // package information clearPhoneAccountHandleExtra = true; } if (!clearPhoneAccountHandleExtra && !callingPackage.equals( phoneAccountHandle.getComponentName().getPackageName()) && !canCallPhone(callingPackage, callingFeatureId, "CALL_PHONE permission required to place calls.")) { // The caller is not allowed to place calls, so fallback to use mobile // network. clearPhoneAccountHandleExtra = true; } } else if (!canCallPhone(callingPackage, callingFeatureId, "placeCall")) { throw new SecurityException("Package " + callingPackage + " is not allowed to place phone calls"); } // Note: we can still get here for the default/system dialer, even if the Phone // permission is turned off. This is because the default/system dialer is always // allowed to attempt to place a call (regardless of permission state), in case // it turns out to be an emergency call. If the permission is denied and the // call is being made to a non-emergency number, the call will be denied later on // by {@link UserCallIntentProcessor}. final boolean hasCallAppOp = mAppOpsManager.noteOp(AppOpsManager.OP_CALL_PHONE, Binder.getCallingUid(), callingPackage, callingFeatureId, null) == AppOpsManager.MODE_ALLOWED; final boolean hasCallPermission = mContext.checkCallingPermission(CALL_PHONE) == PackageManager.PERMISSION_GRANTED; // The Emergency Dialer has call privileged permission and uses this to place // emergency calls. We ensure permission checks in // NewOutgoingCallIntentBroadcaster#process pass by sending this to // Telecom as an ACTION_CALL_PRIVILEGED intent (which makes sense since the // com.android.phone process has that permission). final boolean hasCallPrivilegedPermission = mContext.checkCallingPermission( CALL_PRIVILEGED) == PackageManager.PERMISSION_GRANTED; synchronized (mLock) { final UserHandle userHandle = Binder.getCallingUserHandle(); long token = Binder.clearCallingIdentity(); try { final Intent intent = new Intent(hasCallPrivilegedPermission ? Intent.ACTION_CALL_PRIVILEGED : Intent.ACTION_CALL, handle); if (extras != null) { if (clearPhoneAccountHandleExtra) { extras.remove(TelecomManager.EXTRA_PHONE_ACCOUNT_HANDLE); } extras.setDefusable(true); intent.putExtras(extras); } mUserCallIntentProcessorFactory.create(mContext, userHandle) .processIntent( intent, callingPackage, isSelfManaged || (hasCallAppOp && hasCallPermission), true /* isLocalInvocation */); } finally { Binder.restoreCallingIdentity(token); } } } finally { Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: placeCall File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
placeCall
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
private void write(OutputStream out, Object obj) throws IOException { ObjectOutputStream objectOutputStream = new ObjectOutputStream(out); if (shared) { objectOutputStream.writeObject(obj); } else { objectOutputStream.writeUnshared(obj); } // Force flush if not yet written due to internal behavior if pos < 1024 objectOutputStream.flush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
write
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public void onListRebuilt() { if (mServiceTargets != null) { pruneServiceTargets(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onListRebuilt File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
onListRebuilt
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
@Override public long getTimeMillisAndRemove(K name, long defaultValue) { Long v = getTimeMillisAndRemove(name); return v != null ? v : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTimeMillisAndRemove File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
getTimeMillisAndRemove
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
public Page<E> using(String dialect) { this.dialectClass = dialect; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: using File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
using
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
@Override public Element toDOM(Document document) { Element element = document.createElement("SymKeyGenerationRequest"); toDOM(document, element); return element; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toDOM File: base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toDOM
base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void startSipProfilesAsync( final Context context, final String sipProfileName, final boolean enableProfile) { if (VERBOSE) log("startSipProfiles, start auto registration"); new Thread(new Runnable() { @Override public void run() { startSipProfiles(context, sipProfileName, enableProfile); }} ).start(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startSipProfilesAsync File: sip/src/com/android/services/telephony/sip/SipAccountRegistry.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
startSipProfilesAsync
sip/src/com/android/services/telephony/sip/SipAccountRegistry.java
a294ae5342410431a568126183efe86261668b5d
0
Analyze the following code function for security vulnerabilities
void handleGsmAuthRequest(SimAuthRequestData requestData) { WifiConfiguration requestingWifiConfiguration = null; if (mTargetWifiConfiguration != null && mTargetWifiConfiguration.networkId == requestData.networkId) { requestingWifiConfiguration = mTargetWifiConfiguration; logd("id matches targetWifiConfiguration"); } else if (mLastNetworkId != WifiConfiguration.INVALID_NETWORK_ID && mLastNetworkId == requestData.networkId) { requestingWifiConfiguration = getConnectedWifiConfigurationInternal(); logd("id matches currentWifiConfiguration"); } if (requestingWifiConfiguration == null) { logd("GsmAuthRequest received with null target/current WifiConfiguration."); return; } /* * Try authentication in the following order. * * Standard Cellular_auth Type Command * * 1. 3GPP TS 31.102 3G_authentication [Length][RAND][Length][AUTN] * [Length][RES][Length][CK][Length][IK] and more * 2. 3GPP TS 31.102 2G_authentication [Length][RAND] * [Length][SRES][Length][Cipher Key Kc] * 3. 3GPP TS 11.11 2G_authentication [RAND] * [SRES][Cipher Key Kc] */ String response = mWifiCarrierInfoManager .getGsmSimAuthResponse(requestData.data, requestingWifiConfiguration); if (response == null) { // In case of failure, issue may be due to sim type, retry as No.2 case response = mWifiCarrierInfoManager .getGsmSimpleSimAuthResponse(requestData.data, requestingWifiConfiguration); if (response == null) { // In case of failure, issue may be due to sim type, retry as No.3 case response = mWifiCarrierInfoManager.getGsmSimpleSimNoLengthAuthResponse( requestData.data, requestingWifiConfiguration); } } if (response == null || response.length() == 0) { mWifiNative.simAuthFailedResponse(mInterfaceName); } else { logv("Supplicant Response -" + response); mWifiNative.simAuthResponse( mInterfaceName, WifiNative.SIM_AUTH_RESP_TYPE_GSM_AUTH, response); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleGsmAuthRequest File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleGsmAuthRequest
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void startElement(String namespaceURI, String localName, String rawName, Attributes atts) throws SAXException { if (rawName.startsWith("text:")) { appendChar = true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startElement File: src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33950
HIGH
7.5
openkm/document-management-system
startElement
src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java
ce1d82329615aea6aa9f2cc6508c1fe7891e34b5
0
Analyze the following code function for security vulnerabilities
@Override public DefaultJpaInstanceConfiguration autoCreate(boolean autoCreate) { this.autoCreate = autoCreate; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: autoCreate File: src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java Repository: KrailOrg/krail-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15018
MEDIUM
5.2
KrailOrg/krail-jpa
autoCreate
src/main/java/uk/q3c/krail/jpa/persist/DefaultJpaInstanceConfiguration.java
c1e848665492e21ef6cc9be443205e36b9a1f6be
0
Analyze the following code function for security vulnerabilities
@Override public boolean isConnecting() { IState state = getCurrentState(); return state == mL2ConnectingState || state == mL2ConnectedState || state == mL3ProvisioningState; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConnecting File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
isConnecting
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private boolean similarSets(final List<String> ref, final Set<String> c2, final int matchLimit) { boolean out = false; int limit = matchLimit; for (String s : ref) { if (c2.contains(s)) { limit--; if (limit == 0) { out = true; break; } } } return out; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: similarSets File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
similarSets
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
public boolean isProfileOwner(CallerIdentity caller) { synchronized (getLockObject()) { final ComponentName profileOwner = mInjector.binderWithCleanCallingIdentity(() -> getProfileOwnerAsUser(caller.getUserId())); // No profile owner. if (profileOwner == null) { return false; } // The admin ComponentName was specified, check it directly. if (caller.hasAdminComponent()) { return profileOwner.equals(caller.getComponentName()); } else { return isUidProfileOwnerLocked(caller.getUid()); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isProfileOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isProfileOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Autowired public void setoAuth2RequestService(OAuth2RequestService oAuth2RequestService) { this.oAuth2RequestService = oAuth2RequestService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setoAuth2RequestService File: hsweb-system/hsweb-system-oauth2-client/hsweb-system-oauth2-client-web/src/main/java/org/hswebframework/web/authorization/oauth2/controller/OAuth2ClientController.java Repository: hs-web/hsweb-framework The code follows secure coding practices.
[ "CWE-352" ]
CVE-2018-20595
MEDIUM
6.8
hs-web/hsweb-framework
setoAuth2RequestService
hsweb-system/hsweb-system-oauth2-client/hsweb-system-oauth2-client-web/src/main/java/org/hswebframework/web/authorization/oauth2/controller/OAuth2ClientController.java
40929e9b0d336a26281a5ed2e0e721d54dd8d2f2
0
Analyze the following code function for security vulnerabilities
@Override public void onRecipientEntryItemClicked(int charactersTyped, int position) { // Send analytics of characters typed and position in dropdown selected. Analytics.getInstance().sendEvent( "suggest_click", Integer.toString(charactersTyped), Integer.toString(position), 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRecipientEntryItemClicked File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onRecipientEntryItemClicked
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override protected List<Contentlet> findPageContentlets(String HTMLPageIdentifier, String containerIdentifier, String orderby, boolean working, long languageId) throws DotDataException, DotStateException, DotSecurityException { StringBuilder condition = new StringBuilder(); if (working) { condition.append("contentletvi.working_inode=contentlet.inode") .append(" and contentletvi.deleted = ") .append(com.dotmarketing.db.DbConnectionFactory.getDBFalse()); } else { condition.append("contentletvi.live_inode=contentlet.inode") .append(" and contentletvi.deleted = ") .append(com.dotmarketing.db.DbConnectionFactory.getDBFalse()); } if (languageId == 0) { languageId = langAPI.getDefaultLanguage().getId(); condition.append(" and contentletvi.lang = ").append(languageId); }else if(languageId == -1){ Logger.debug(this, "LanguageId is -1 so we will not use a language to pull contentlets"); }else{ condition.append(" and contentletvi.lang = ").append(languageId); } HibernateUtil hu = new HibernateUtil(com.dotmarketing.portlets.contentlet.business.Contentlet.class); if (!UtilMethods.isSet(orderby) || orderby.equals("tree_order")) { orderby = "multi_tree.tree_order"; } String query = "SELECT {contentlet.*} FROM contentlet JOIN inode contentlet_1_ ON (contentlet.inode=contentlet_1_.inode) " + " JOIN multi_tree ON (multi_tree.child = contentlet.identifier) " + " JOIN contentlet_version_info contentletvi ON (contentlet.identifier=contentletvi.identifier) " + " where multi_tree.parent1 = ? and multi_tree.parent2 = ? and " + condition.toString() + " order by " + orderby; hu.setSQLQuery(query); hu.setParam(HTMLPageIdentifier); hu.setParam(containerIdentifier); List<com.dotmarketing.portlets.contentlet.business.Contentlet> fatties = hu.list(); List<Contentlet> result = new ArrayList<Contentlet>(); for (com.dotmarketing.portlets.contentlet.business.Contentlet fatty : fatties) { Contentlet content = convertFatContentletToContentlet(fatty); cc.add(content.getInode(), content); result.add(content); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findPageContentlets File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
findPageContentlets
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public String checkMandatoryFieldsforSave(DSCompositeSolution dscs) { List<String> errorList = new ArrayList<>(); if (null == dscs.getAuthor().trim()) { errorList.add("UserID is missing"); } if (null == dscs.getSolutionName().trim()) { errorList.add("Solution Name is missing"); } if (null == dscs.getVersion()) { errorList.add("Version is missing"); } if (null == dscs.getSolutionId() && null == dscs.getcId()) { errorList.add("Either cid or Solution Id is required"); } if (!errorList.isEmpty()) { return errorList.toString(); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkMandatoryFieldsforSave File: ds-compositionengine/src/main/java/org/acumos/designstudio/ce/controller/SolutionController.java Repository: acumos/design-studio The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-25097
MEDIUM
4
acumos/design-studio
checkMandatoryFieldsforSave
ds-compositionengine/src/main/java/org/acumos/designstudio/ce/controller/SolutionController.java
0df8a5e8722188744973168648e4c74c69ce67fd
0
Analyze the following code function for security vulnerabilities
@Reference( policy = ReferencePolicy.DYNAMIC, cardinality = ReferenceCardinality.OPTIONAL, unbind = "unsetSchedulerService" ) public void setSchedulerService(SchedulerService schedulerService) { this.schedulerService = schedulerService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSchedulerService File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
setSchedulerService
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
private void collectCertificatesLI(PackageParser pp, PackageSetting ps, PackageParser.Package pkg, File srcFile, int parseFlags) throws PackageManagerException { if (ps != null && ps.codePath.equals(srcFile) && ps.timeStamp == srcFile.lastModified() && !isCompatSignatureUpdateNeeded(pkg) && !isRecoverSignatureUpdateNeeded(pkg)) { long mSigningKeySetId = ps.keySetData.getProperSigningKeySet(); KeySetManagerService ksms = mSettings.mKeySetManagerService; ArraySet<PublicKey> signingKs; synchronized (mPackages) { signingKs = ksms.getPublicKeysFromKeySetLPr(mSigningKeySetId); } if (ps.signatures.mSignatures != null && ps.signatures.mSignatures.length != 0 && signingKs != null) { // Optimization: reuse the existing cached certificates // if the package appears to be unchanged. pkg.mSignatures = ps.signatures.mSignatures; pkg.mSigningKeys = signingKs; return; } Slog.w(TAG, "PackageSetting for " + ps.name + " is missing signatures. Collecting certs again to recover them."); } else { Log.i(TAG, srcFile.toString() + " changed; collecting certs"); } try { pp.collectCertificates(pkg, parseFlags); pp.collectManifestDigest(pkg); } catch (PackageParserException e) { throw PackageManagerException.from(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: collectCertificatesLI File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
collectCertificatesLI
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static void copy(File from, File to) throws IOException { checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to); asByteSource(from).copyTo(asByteSink(to)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
copy
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public void setDefaultServerUrl(String url) { defaultServerUrl = url; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDefaultServerUrl File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
setDefaultServerUrl
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
0
Analyze the following code function for security vulnerabilities
public Builder setReadPendingIntent(PendingIntent pendingIntent) { mReadPendingIntent = pendingIntent; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setReadPendingIntent File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setReadPendingIntent
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private final void dumpApplicationMemoryUsageHeader(PrintWriter pw, long uptime, long realtime, boolean isCheckinRequest, boolean isCompact) { if (isCheckinRequest || isCompact) { // short checkin version pw.print("time,"); pw.print(uptime); pw.print(","); pw.println(realtime); } else { pw.println("Applications Memory Usage (kB):"); pw.println("Uptime: " + uptime + " Realtime: " + realtime); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpApplicationMemoryUsageHeader File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
dumpApplicationMemoryUsageHeader
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public boolean isTablet() { return (getContext().getResources().getConfiguration().screenLayout & Configuration.SCREENLAYOUT_SIZE_MASK) >= Configuration.SCREENLAYOUT_SIZE_LARGE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTablet File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isTablet
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void parseStyleAttribute(ApplContext ac, String input, String id, URL url, int lineno) { parseStyleAttribute(ac, new ByteArrayInputStream(input.getBytes()), id, url, lineno); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseStyleAttribute File: org/w3c/css/css/StyleSheetParser.java Repository: w3c/css-validator The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-4070
LOW
3.5
w3c/css-validator
parseStyleAttribute
org/w3c/css/css/StyleSheetParser.java
e5c09a9119167d3064db786d5f00d730b584a53b
0
Analyze the following code function for security vulnerabilities
public JSONObject put(String key, long value) throws JSONException { put(key, Long.valueOf(value)); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
put
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public int getEndColumnNumber() { return fEndColumnNumber; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEndColumnNumber File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
getEndColumnNumber
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
public URL getServerURL(String wikiId, XWikiContext xcontext) throws MalformedURLException { // In path based the base URL is the same for all wikis if (!xcontext.isMainWiki(wikiId) && isPathBased()) { return getServerURL(xcontext.getMainXWiki(), xcontext); } // If main wiki check the main wiki home page configuration if (xcontext.isMainWiki(wikiId)) { String homepage = getConfiguration().getProperty("xwiki.home"); if (StringUtils.isNotEmpty(homepage)) { try { return new URL(homepage); } catch (MalformedURLException e) { LOGGER.warn("Invalid main wiki home page URL [{}] configured: {}", homepage, ExceptionUtils.getRootCauseMessage(e)); } } } if (wikiId != null) { try { WikiDescriptor wikiDescriptor = getWikiDescriptorManager().getById(wikiId); if (wikiDescriptor != null) { String server = wikiDescriptor.getDefaultAlias(); if (server != null) { String protocol = getWikiProtocol(wikiDescriptor); int port = getWikiPort(wikiDescriptor, xcontext); if (protocol == null && port == -1) { // If request is a "real" one keep using the same protocol/port (if asking for the same wiki) XWikiRequest request = xcontext.getRequest(); if (request != null && wikiDescriptor.getId().equals(xcontext.getOriginalWikiId()) && !isDaemon(request)) { URL sourceURL = HttpServletUtils.getSourceBaseURL(xcontext.getRequest()); protocol = sourceURL.getProtocol(); port = sourceURL.getPort(); } else { // Default to HTTP protocol = "http"; } } return new URL(protocol != null ? protocol : (port == 443 ? "https" : "http"), server, port, ""); } } } catch (WikiManagerException e) { LOGGER.error("Failed to get descriptor for wiki [{}]", wikiId, e); } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServerURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getServerURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public AssetHandler cdn(final String cdn) { this.cdn = Strings.emptyToNull(cdn); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cdn File: jooby/src/main/java/org/jooby/handlers/AssetHandler.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
cdn
jooby/src/main/java/org/jooby/handlers/AssetHandler.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public void register() { mRm.addOnRoleHoldersChangedListenerAsUser(mExecutor, this, UserHandle.ALL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: register File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
register
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected void setExposeHeaders(List<String> exposedHeaders, MutableHttpResponse<?> response) { if (corsConfiguration.isSingleHeader()) { String headerValue = String.join(",", exposedHeaders); if (StringUtils.isNotEmpty(headerValue)) { response.header(ACCESS_CONTROL_EXPOSE_HEADERS, headerValue); } } else { exposedHeaders.forEach(header -> response.header(ACCESS_CONTROL_EXPOSE_HEADERS, header)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setExposeHeaders File: http-server/src/main/java/io/micronaut/http/server/cors/CorsFilter.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
setExposeHeaders
http-server/src/main/java/io/micronaut/http/server/cors/CorsFilter.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
public void readSetEnd() {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readSetEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readSetEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public static void copy(InputStream in, OutputStream out) throws IOException { copy(in, out, IO_BUFFER_SIZE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: src/main/java/com/mxgraph/online/Utils.java Repository: jgraph/drawio The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-3398
HIGH
7.5
jgraph/drawio
copy
src/main/java/com/mxgraph/online/Utils.java
064729fec4262f9373d9fdcafda0be47cd18dd50
0
Analyze the following code function for security vulnerabilities
@Nullable public CharSequence getConversationTitle() { return mConversationTitle; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConversationTitle File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getConversationTitle
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public static File tmpdir() { return TMPDIR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tmpdir File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
tmpdir
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public boolean isAnimatingScreenOff() { return mAnimatingScreenOff; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAnimatingScreenOff File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
isAnimatingScreenOff
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public static PdfObject getPdfObjectRelease(PdfObject obj) { PdfObject obj2 = getPdfObject(obj); releaseLastXrefPartial(obj); return obj2; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPdfObjectRelease File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
getPdfObjectRelease
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public int getConnectTimeout() { return connectionTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectTimeout File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getConnectTimeout
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private static Properties loadProperties() { Properties result = new Properties(); if (Path.hasOsConformConfig()) { result = loadPropertiesFromFile(Path.osConformConfig()); } else if (Path.hasLegacyConfig()) { result = loadPropertiesFromFile(Path.legacyConfig()); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadProperties File: umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java Repository: umlet The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000548
MEDIUM
6.8
umlet
loadProperties
umlet-swing/src/main/java/com/baselet/control/config/handler/ConfigHandler.java
e1c4cc6ae692cc8d1c367460dbf79343e996f9bd
0
Analyze the following code function for security vulnerabilities
public boolean isExpandable() { return expand && canExpand(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isExpandable File: varexport/src/main/java/com/indeed/util/varexport/Variable.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
isExpandable
varexport/src/main/java/com/indeed/util/varexport/Variable.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
@Override public void grantDefaultPermissionsToDefaultDialerApp(String packageName, int userId) { synchronized (mPackages) { mDefaultPermissionPolicy.grantDefaultPermissionsToDefaultDialerAppLPr( packageName, userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantDefaultPermissionsToDefaultDialerApp File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
grantDefaultPermissionsToDefaultDialerApp
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public void moveTaskBackwards(int task) { enforceCallingPermission(android.Manifest.permission.REORDER_TASKS, "moveTaskBackwards()"); synchronized(this) { if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(), Binder.getCallingUid(), -1, -1, "Task backwards")) { return; } final long origId = Binder.clearCallingIdentity(); moveTaskBackwardsLocked(task); Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTaskBackwards File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
moveTaskBackwards
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static void add(List<String> result, String s, boolean withTag) { if (withTag == false) s = s.replaceAll("\\</?\\w+\\>", ""); result.add(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: add File: src/net/sourceforge/plantuml/version/PSystemVersion.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
add
src/net/sourceforge/plantuml/version/PSystemVersion.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public InputStream exportAll(Map<String, Feature> mapOfFeatures, Map < String, Property<?>> mapOfProperties) throws IOException { // Create output StringBuilder sb = new StringBuilder(XML_HEADER); sb.append(exportFeaturesPart(mapOfFeatures)); sb.append(exportPropertiesPart(mapOfProperties)); sb.append(END_FF4J); return new ByteArrayInputStream(sb.toString().getBytes(ENCODING)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exportAll File: ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java Repository: ff4j The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
exportAll
ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java
991df72725f78adbc413d9b0fbb676201f1882e0
0
Analyze the following code function for security vulnerabilities
@Override public List<UserHandle> getSecondaryUsers(ComponentName who) { Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization(isDefaultDeviceOwner(caller)); return mInjector.binderWithCleanCallingIdentity(() -> { final List<UserInfo> userInfos = mInjector.getUserManager().getAliveUsers(); final List<UserHandle> userHandles = new ArrayList<>(); for (UserInfo userInfo : userInfos) { UserHandle userHandle = userInfo.getUserHandle(); if (!userHandle.isSystem() && !isManagedProfile(userHandle.getIdentifier())) { userHandles.add(userInfo.getUserHandle()); } } return userHandles; }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecondaryUsers File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getSecondaryUsers
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void createNavigationBar() { mNavigationBarView = NavigationBarFragment.create(mContext, (tag, fragment) -> { mNavigationBar = (NavigationBarFragment) fragment; if (mLightBarController != null) { mNavigationBar.setLightBarController(mLightBarController); } mNavigationBar.setCurrentSysuiVisibility(mSystemUiVisibility); }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNavigationBar File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
createNavigationBar
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void setUserControlDisabledPackages(ComponentName who, String callerPackageName, List<String> packages) { Objects.requireNonNull(packages, "packages is null"); CallerIdentity caller; if (isPolicyEngineForFinanceFlagEnabled()) { caller = getCallerIdentity(who, callerPackageName); } else { caller = getCallerIdentity(who); } checkCanExecuteOrThrowUnsafe( DevicePolicyManager.OPERATION_SET_USER_CONTROL_DISABLED_PACKAGES); if (isPolicyEngineForFinanceFlagEnabled()) { EnforcingAdmin enforcingAdmin = enforcePermissionAndGetEnforcingAdmin( who, MANAGE_DEVICE_POLICY_APPS_CONTROL, caller.getPackageName(), caller.getUserId()); Binder.withCleanCallingIdentity(() -> { if (packages.isEmpty()) { removeUserControlDisabledPackages(caller, enforcingAdmin); } else { addUserControlDisabledPackages(caller, enforcingAdmin, new HashSet<>(packages)); } }); } else { Objects.requireNonNull(who, "ComponentName is null"); Preconditions.checkCallAuthorization(isDefaultDeviceOwner(caller) || isProfileOwner(caller) || isFinancedDeviceOwner(caller)); synchronized (getLockObject()) { ActiveAdmin admin = getDeviceOrProfileOwnerAdminLocked(caller.getUserId()); if (!Objects.equals(admin.protectedPackages, packages)) { admin.protectedPackages = packages.isEmpty() ? null : packages; saveSettingsLocked(caller.getUserId()); pushUserControlDisabledPackagesLocked(caller.getUserId()); } } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_USER_CONTROL_DISABLED_PACKAGES) .setAdmin(caller.getPackageName()) .setStrings(packages.toArray(new String[packages.size()])) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserControlDisabledPackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setUserControlDisabledPackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { try { return toXML(); } catch (Exception e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toString
base/common/src/main/java/com/netscape/certsrv/key/SymKeyGenerationRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override protected DocumentBuilder initialValue() { try { final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setExpandEntityReferences(false); return factory.newDocumentBuilder(); } catch (ParserConfigurationException exc) { throw new IllegalArgumentException(exc); } }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2019-5312 - Severity: HIGH - CVSS Score: 7.5 Description: #903 disable DOCTYPE to fix XXE Vulnerability Function: initialValue File: weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java Repository: Wechat-Group/WxJava Fixed Code: @Override protected DocumentBuilder initialValue() { try { final DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); factory.setExpandEntityReferences(false); factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); return factory.newDocumentBuilder(); } catch (ParserConfigurationException exc) { throw new IllegalArgumentException(exc); } }
[ "CWE-611" ]
CVE-2019-5312
HIGH
7.5
Wechat-Group/WxJava
initialValue
weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java
8ec61d1328f50e23cd14285a950ca57a088b32b2
1
Analyze the following code function for security vulnerabilities
public void importEntitlements(Owner owner, Set<Product> products, File[] entitlements) throws IOException, SyncDataFormatException { EntitlementImporter importer = new EntitlementImporter(subCurator, csCurator, sink, i18n); Map<String, Product> productsById = new HashMap<String, Product>(); for (Product product : products) { productsById.put(product.getId(), product); } Set<Subscription> subscriptionsToImport = new HashSet<Subscription>(); for (File entitlement : entitlements) { Reader reader = null; try { log.debug("Import entitlement: " + entitlement.getName()); reader = new FileReader(entitlement); subscriptionsToImport.add(importer.importObject(mapper, reader, owner, productsById)); } finally { if (reader != null) { reader.close(); } } } importer.store(owner, subscriptionsToImport); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: importEntitlements File: src/main/java/org/candlepin/sync/Importer.java Repository: candlepin The code follows secure coding practices.
[ "CWE-264" ]
CVE-2012-6119
LOW
2.1
candlepin
importEntitlements
src/main/java/org/candlepin/sync/Importer.java
f4d93230e58b969c506b4c9778e04482a059b08c
0
Analyze the following code function for security vulnerabilities
protected static byte[] toArray(ByteBuffer... payload) { if (payload.length == 1) { ByteBuffer buf = payload[0]; if (buf.hasArray() && buf.arrayOffset() == 0 && buf.position() == 0 && buf.array().length == buf.remaining()) { return buf.array(); } } return Buffers.take(payload, 0, payload.length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toArray File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
toArray
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
public void sendCommand(String packageName, int pid, int uid, String command, Bundle args, ResultReceiver cb) { try { final String reason = TAG + ":" + command; mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(), pid, uid, packageName, reason); mCb.onCommand(packageName, pid, uid, command, args, cb); } catch (RemoteException e) { Log.e(TAG, "Remote failure in sendCommand.", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendCommand File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
sendCommand
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public ByteSource asByteSource() { return source; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: asByteSource File: android/guava/src/com/google/common/io/FileBackedOutputStream.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
asByteSource
android/guava/src/com/google/common/io/FileBackedOutputStream.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0