instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private native int nativeLoadUrl(long nativeTabAndroid, String url, String extraHeaders, byte[] postData, int transition, String referrerUrl, int referrerPolicy);
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2014-3159 - Severity: MEDIUM - CVSS Score: 6.4 Description: Use LoadURLWithParams in ChromeWebContentsDelegateAndroid Build a LoadURLParams object from the OpenURLParams and properly set all parameters on that object when calling into NavigationController. This ...
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeLoadUrl
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
1
Analyze the following code function for security vulnerabilities
private void scheduleTransferSplashScreenTimeout() { mAtmService.mH.postDelayed(mTransferSplashScreenTimeoutRunnable, TRANSFER_SPLASH_SCREEN_TIMEOUT); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleTransferSplashScreenTimeout File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
scheduleTransferSplashScreenTimeout
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void updateDeviceOwner(String packageName) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateDeviceOwner File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
updateDeviceOwner
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
float nextTab(float h) { int ns = this.mNumStops; if (ns > 0) { int[] stops = this.mStops; for (int i = 0; i < ns; ++i) { int stop = stops[i]; if (stop > h) { return stop; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nextTab File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
nextTab
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
public void setVisiblePasswordEnabled(boolean enabled, int userId) { // Update for crypto if owner if (userId != UserHandle.USER_SYSTEM) { return; } IBinder service = ServiceManager.getService("mount"); if (service == null) { Log.e(TAG, "Could not find th...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVisiblePasswordEnabled File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
setVisiblePasswordEnabled
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
private String extractBody(BaseMessage message) { return message.getMessageContent(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractBody File: notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java Repository: opendistro-for-elasticsearch/alerting The code follows secure codin...
[ "CWE-918" ]
CVE-2021-31828
MEDIUM
5.5
opendistro-for-elasticsearch/alerting
extractBody
notification/src/main/java/com/amazon/opendistroforelasticsearch/alerting/destination/client/DestinationHttpClient.java
49cc584dd6bd38ca26129eeaca5cd04e40a27f25
0
Analyze the following code function for security vulnerabilities
public abstract float get(String name, float defaultValue) throws IOException, IllegalArgumentException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
get
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override @Deprecated public boolean isRequestedSessionIdFromUrl() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRequestedSessionIdFromUrl File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
isRequestedSessionIdFromUrl
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@Override public void undeploy() { try { deployment.createThreadSetupAction(new ThreadSetupHandler.Action<Void, Object>() { @Override public Void call(HttpServerExchange exchange, Object ignore) throws ServletException { for(ServletContextListe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: undeploy File: servlet/src/main/java/io/undertow/servlet/core/DeploymentManagerImpl.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
undeploy
servlet/src/main/java/io/undertow/servlet/core/DeploymentManagerImpl.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
@Override public SessionData decode(String data) { byte[] bytes = Base64.getDecoder().decode(data); try (ByteArrayInputStream inputStream = new ByteArrayInputStream(bytes); FilteringObjectInputStream objectInputStream = new FilteringObjectInputStream(inputStream)) { return (...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2018-18628 - Severity: HIGH - CVSS Score: 10.0 Description: More fixes. Function: decode File: pippo-session-parent/pippo-session/src/main/java/ro/pippo/session/SerializationSessionDataTranscoder.java Repository: pippo-java/pippo Fixed Code: @Override publi...
[ "CWE-502" ]
CVE-2018-18628
HIGH
10
pippo-java/pippo
decode
pippo-session-parent/pippo-session/src/main/java/ro/pippo/session/SerializationSessionDataTranscoder.java
6e7176a2924fb6f900f10482de696497b55656fa
1
Analyze the following code function for security vulnerabilities
public void updateMetrics() { int numProviders = mProviders.size(); int numConnectedProviders = 0; for (Map.Entry<String, PasspointProvider> entry : mProviders.entrySet()) { if (entry.getValue().getHasEverConnected()) { numConnectedProviders++; } }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateMetrics File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
updateMetrics
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public int prepareAddWindowLw(WindowState win, WindowManager.LayoutParams attrs) { switch (attrs.type) { case TYPE_STATUS_BAR: mContext.enforceCallingOrSelfPermission( android.Manifest.permission.STATUS_BAR_SERVICE, "Phone...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: prepareAddWindowLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
prepareAddWindowLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override protected boolean canRestoreAnyVersion() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canRestoreAnyVersion File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
canRestoreAnyVersion
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
public static Object[][] queryListOfConfig(String sql, String belongEntity, String q) { if (StringUtils.isNotBlank(belongEntity) && !"$ALL$".equalsIgnoreCase(belongEntity)) { sql = sql.replace("(1=1)", "belongEntity = '" + StringEscapeUtils.escapeSql(belongEntity) + "'"); } if (Strin...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2023-1495 - Severity: MEDIUM - CVSS Score: 6.5 Description: H5 sync2 (#595) * style: 目录样式gh * style: J_new * feat: advListFilterTabs * feat: nav-copyto * enh: 助记码全拼 * enh: 地图搜索选点 * enh: topnav * list pn * .form-line.v33 * open TAG * ...
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
queryListOfConfig
src/main/java/com/rebuild/web/admin/ConfigCommons.java
c9474f84e5f376dd2ade2078e3039961a9425da7
1
Analyze the following code function for security vulnerabilities
private synchronized ServerSockets getServerSockets() { if (serverSockets == null) { serverSockets = new ServerSockets(); } return serverSockets; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getServerSockets File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getServerSockets
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setNodeSelector(List<NodeSelectorEntry> nodeSelector) { this.nodeSelector = nodeSelector; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setNodeSelector File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding pract...
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
setNodeSelector
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
private String base64(byte [] source) { return Base64.getEncoder().encodeToString(source); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: base64 File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
base64
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private static String fixProcessName(String defProcessName, String processName, int uid) { if (processName == null) { return defProcessName; } return processName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fixProcessName File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
fixProcessName
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
void resetThrottlingInner(@UserIdInt int userId) { synchronized (mLock) { if (!isUserUnlockedL(userId)) { Log.w(TAG, "User " + userId + " is locked or not running"); return; } getUserShortcutsLocked(userId).resetThrottling(); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetThrottlingInner File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
resetThrottlingInner
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
ActiveAdmin getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked(int userId) { ensureLocked(); ActiveAdmin admin = getDeviceOwnerAdminLocked(); if (admin == null) { admin = getProfileOwnerOfOrganizationOwnedDeviceLocked(userId); } return admin; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices...
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getDeviceOwnerOrProfileOwnerOfOrganizationOwnedDeviceLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private List<PluginPackageResourceFiles> parseAllPluginPackageResourceFile(PluginPackages pluginPackageEntity, String sourceZipFile, String sourceZipFileName) throws IOException { List<PluginPackageResourceFiles> pluginPackageResourceFilesEntities = new ArrayList<>(); try (ZipFile zipFile = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseAllPluginPackageResourceFile File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure cod...
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
parseAllPluginPackageResourceFile
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
private boolean updateProvidersForPackageLocked(String packageName, int userId, Set<ProviderId> removedProviders) { boolean providersUpdated = false; HashSet<ProviderId> keep = new HashSet<>(); Intent intent = new Intent(AppWidgetManager.ACTION_APPWIDGET_UPDATE); intent.setP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateProvidersForPackageLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
updateProvidersForPackageLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public ApiClient setReadTimeout(int readTimeout) { this.readTimeout = readTimeout; httpClient.property(ClientProperties.READ_TIMEOUT, readTimeout); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setReadTimeout File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setReadTimeout
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@GetMapping("related-list-config") public RespBody getDataListConfig(HttpServletRequest req, @EntityParam Entity listEntity) { JSON config = DataListManager.instance.getListFields( listEntity.getName(), getRequestUser(req), DataListManager.SYS_RELATED); return RespBody.ok(config); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDataListConfig File: src/main/java/com/rebuild/web/general/RelatedListController.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
getDataListConfig
src/main/java/com/rebuild/web/general/RelatedListController.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
public Compression getCompression() { return compression; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCompression File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
getCompression
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
@Override public WifiInfo syncRequestConnectionInfo() { return mWifiThreadRunner.call(() -> new WifiInfo(mWifiInfo), new WifiInfo()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: syncRequestConnectionInfo File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
syncRequestConnectionInfo
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public boolean checkListElements(Object value, Class<?> elementClass) { if (value instanceof List) { for (Object element: (List<?>)value) { if (element == null || element.getClass() != elementClass) return false; } return true; } else { return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkListElements File: server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-94" ]
CVE-2021-21248
MEDIUM
6.5
theonedev/onedev
checkListElements
server-core/src/main/java/io/onedev/server/model/support/inputspec/InputSpec.java
39d95ab8122c5d9ed18e69dc024870cae08d2d60
0
Analyze the following code function for security vulnerabilities
public Map getMetaData() { return this.metaData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetaData File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java Repository: apache/incubator-kie-drools The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-8125
HIGH
7.5
apache/incubator-kie-drools
getMetaData
drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3
0
Analyze the following code function for security vulnerabilities
private void updateBasePath() { if (serverIndex != null) { setBasePath(servers.get(serverIndex).URL(serverVariables)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBasePath File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateBasePath
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public String getName() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: core/src/main/java/io/micronaut/core/type/DefaultArgument.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getName
core/src/main/java/io/micronaut/core/type/DefaultArgument.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
public static void disableDefault() throws DotHibernateException { Structure defaultStructure = getDefaultStructure(); if (InodeUtils.isSet(defaultStructure.getInode())) { defaultStructure.setDefaultStructure(false); saveStructure(defaultStructure); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableDefault File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
disableDefault
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
private void resetGestureDetection() { if (mNativeContentViewCore == 0) return; nativeResetGestureDetection(mNativeContentViewCore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetGestureDetection File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
resetGestureDetection
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public int getDefaultResponseTimeout() { return Integer.parseInt(prop.getProperty(TS_DEFAULT_RESPONSE_TIMEOUT, "120")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultResponseTimeout File: frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java Repository: pytorch/serve The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43654
CRITICAL
9.8
pytorch/serve
getDefaultResponseTimeout
frontend/server/src/main/java/org/pytorch/serve/util/ConfigManager.java
391bdec3348e30de173fbb7c7277970e0b53c8ad
0
Analyze the following code function for security vulnerabilities
public void modifyIndexHtmlResponse(IndexHtmlResponse response) { indexHtmlRequestListeners.forEach( listener -> listener.modifyIndexHtmlResponse(response)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: modifyIndexHtmlResponse File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
modifyIndexHtmlResponse
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
protected void handleSimSubscriptionInfoChanged() { if (DEBUG_SIM_STATES) { Log.v(TAG, "onSubscriptionInfoChanged()"); List<SubscriptionInfo> sil = mSubscriptionManager.getActiveSubscriptionInfoList(); if (sil != null) { for (SubscriptionInfo subInfo : sil) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSimSubscriptionInfoChanged File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
handleSimSubscriptionInfoChanged
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return (key == null ? 0 : key.hashCode()) ^ (value == null ? 0 : value.hashCode()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
hashCode
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public void showGlobalActions() { mHandler.removeMessages(MSG_DISPATCH_SHOW_GLOBAL_ACTIONS); mHandler.sendEmptyMessage(MSG_DISPATCH_SHOW_GLOBAL_ACTIONS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showGlobalActions File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
showGlobalActions
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
boolean dumpProcessesToGc(FileDescriptor fd, PrintWriter pw, String[] args, int opti, boolean needSep, boolean dumpAll, String dumpPackage) { if (mProcessesToGc.size() > 0) { boolean printed = false; long now = SystemClock.uptimeMillis(); for (int i=0; i<mProcesse...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpProcessesToGc File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
dumpProcessesToGc
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public static long getInputDispatchingTimeoutLocked(ProcessRecord r) { if (r != null && (r.instr != null || r.usingWrapper)) { return INSTRUMENTATION_KEY_DISPATCHING_TIMEOUT; } return KEY_DISPATCHING_TIMEOUT; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputDispatchingTimeoutLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getInputDispatchingTimeoutLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void onAuthenticated(final long deviceId, final int fingerId, final int groupId) { mHandler.post(new Runnable() { @Override public void run() { handleAuthenticated(deviceId, fingerId, groupId); } }); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAuthenticated File: services/core/java/com/android/server/fingerprint/FingerprintService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticated
services/core/java/com/android/server/fingerprint/FingerprintService.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public String post(PageModel model, @MethodParam("getAccount") @BindParams Account account, @BindParams User user, @BindParams OtherAccountData otherAccountData, @SpringBean("userService") UserService userService, @SpringBean("messageSourceService") MessageSourceService messageSo...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2020-36636 - Severity: MEDIUM - CVSS Score: 6.1 Description: RA-1865: Fix possible xss in account setup (#57) Function: post File: omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java Repository: openmrs/op...
[ "CWE-79" ]
CVE-2020-36636
MEDIUM
6.1
openmrs/openmrs-module-adminui
post
omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java
702fbfdac7c4418f23bb5f6452482b4a88020061
1
Analyze the following code function for security vulnerabilities
@Override public ServerBuilder tls( File keyCertChainFile, File keyFile, @Nullable String keyPassword) { virtualHostTemplate.tls(keyCertChainFile, keyFile, keyPassword); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tls File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
tls
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public void removeDatatransferProgressListener( OnDatatransferProgressListener listener, User user, OCFile file ) { if (user == null || file == null || listener == null) { return; } String targetKey = buildRemoteName(user.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeDatatransferProgressListener File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
removeDatatransferProgressListener
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
private void enterSplit() { // Do not notify menu visibility when hiding the menu, the controller will do this when it // handles the message hideMenu(mController::onEnterSplit, false /* notifyMenuVisibility */, true /* resize */, ANIM_TYPE_HIDE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enterSplit File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40123
MEDIUM
5.5
android
enterSplit
libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
7212a4bec2d2f1a74fa54a12a04255d6a183baa9
0
Analyze the following code function for security vulnerabilities
protected void populateCollection(HierarchicalStreamReader reader, UnmarshallingContext context, Collection collection) { populateCollection(reader, context, collection, collection); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populateCollection File: xstream/src/java/com/thoughtworks/xstream/converters/collections/CollectionConverter.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
populateCollection
xstream/src/java/com/thoughtworks/xstream/converters/collections/CollectionConverter.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting static boolean isExternalMediaDirectory(@NonNull String path, String crossUserRoot) { final String relativePath = extractRelativePath(path); if (relativePath == null) { return false; } if (StringUtils.startsWithIgnoreCase(relativePath, "Android/media")...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isExternalMediaDirectory File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
isExternalMediaDirectory
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public boolean isPluggedIn() { return plugged == BatteryManager.BATTERY_PLUGGED_AC || plugged == BatteryManager.BATTERY_PLUGGED_USB || plugged == BatteryManager.BATTERY_PLUGGED_WIRELESS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPluggedIn File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
isPluggedIn
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
void addWarning(Issue msg, Object... parameters) { mWarnings.add(new IssueWithParams(msg, parameters)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addWarning File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
addWarning
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public static void copyToDir(Directory in, File out) throws DirectoryException { for (String fileName : in.getFiles(true)) { copyToDir(in, out, fileName); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyToDir File: brut.j.dir/src/main/java/brut/directory/DirUtil.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
copyToDir
brut.j.dir/src/main/java/brut/directory/DirUtil.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
private <T> T runAsAuthenticated( Callable<T> runnable ) { final AuthenticationInfo authInfo = AuthenticationInfo.create().principals( RoleKeys.AUTHENTICATED ).user( User.ANONYMOUS ).build(); return ContextBuilder.from( this.context.get() ). authInfo( authInfo ). repositoryId...
Vulnerability Classification: - CWE: CWE-384 - CVE: CVE-2024-23679 - Severity: CRITICAL - CVSS Score: 9.8 Description: Invalidate old session after login #9253 (cherry picked from commit 0189975691e9e6407a9fee87006f730e84f734ff) Function: runAsAuthenticated File: modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/...
[ "CWE-384" ]
CVE-2024-23679
CRITICAL
9.8
enonic/xp
runAsAuthenticated
modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java
2abac31cec8679074debc4f1fb69c25930e40842
1
Analyze the following code function for security vulnerabilities
private void renderState(FacesContext context) throws IOException { // Get the view state and write it to the response.. PartialViewContext pvc = context.getPartialViewContext(); PartialResponseWriter writer = pvc.getPartialResponseWriter(); String viewStateId = Util.getViewStateId(conte...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2019-17091 - Severity: MEDIUM - CVSS Score: 4.3 Description: Fixes #4556 : HIGH-LEVEL VULNERABILITY WITHIN MOJARRA JSF V2.2 Function: renderState File: impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java Repository: eclipse-ee4j/mojarra Fixed Co...
[ "CWE-79" ]
CVE-2019-17091
MEDIUM
4.3
eclipse-ee4j/mojarra
renderState
impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java
a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
1
Analyze the following code function for security vulnerabilities
final void rebuildAppWindowListLocked() { rebuildAppWindowListLocked(getDefaultDisplayContentLocked()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rebuildAppWindowListLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
rebuildAppWindowListLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private Map<String, String> cleanAttributes(String elementName, Map<String, String> attributes) { Map<String, String> cleanAttributes; if (this.htmlElementSanitizer == null || attributes == null) { cleanAttributes = attributes; } else { cleanAttributes = new LinkedHa...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-37908 - Severity: CRITICAL - CVSS Score: 9.6 Description: XRENDERING-697: XHTMLWikiPrinter doesn't validate generated data attributes * Strip invalid characters and make sure the data attribute is allowed. * Add tests. Function: cleanAttributes File: xwiki-...
[ "CWE-79" ]
CVE-2023-37908
CRITICAL
9.6
xwiki/xwiki-rendering
cleanAttributes
xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
f4d5acac451dccaf276e69f0b49b72221eef5d2f
1
Analyze the following code function for security vulnerabilities
private static ClientAuthenticationMethod getPreferredAuthenticationMethod(OidcConfiguration config) { final ClientAuthenticationMethod configurationMethod = config.getClientAuthenticationMethod(); if (configurationMethod == null) { return null; } if (!SUPPORTED_METHODS.contains(configurationMeth...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredAuthenticationMethod File: datahub-frontend/app/auth/sso/oidc/custom/CustomOidcAuthenticator.java Repository: datahub-project/datahub The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-25558
HIGH
8.8
datahub-project/datahub
getPreferredAuthenticationMethod
datahub-frontend/app/auth/sso/oidc/custom/CustomOidcAuthenticator.java
2a182f484677d056730d6b4e9f0143e67368359f
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAsyncEditMode() { return asyncEditMode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAsyncEditMode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isAsyncEditMode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public boolean getStrictErrorChecking() { return doc.getStrictErrorChecking(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStrictErrorChecking File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
getStrictErrorChecking
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public BigInteger bigIntegerValue() { BigDecimal bd = bigDecimalValue(); if (Math.abs(bd.scale()) <= bigIntegerScaleLimit) { return bd.toBigInteger(); } throw new UnsupportedOperationException( String.format(SCALE_LIMIT_EXCEPTION_MESSAGE, bd.scal...
Vulnerability Classification: - CWE: CWE-834 - CVE: CVE-2023-4043 - Severity: HIGH - CVSS Score: 7.5 Description: Exception message moved to messages bundle. Signed-off-by: Tomáš Kraus <tomas.kraus@oracle.com> Function: bigIntegerValue File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repository: ecli...
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
bigIntegerValue
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
84764ffbe3d0376da242b27a9a526138d0dfb8e6
1
Analyze the following code function for security vulnerabilities
boolean isSerializable() { resolveProperties(); return isSerializable; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSerializable File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
isSerializable
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public Node cloneNode(boolean deep) { return doc.cloneNode(deep); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cloneNode File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
cloneNode
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public void onPackageAdded(String name, boolean replacing) { synchronized (mGlobalLock) { mCompatModePackages.handlePackageAddedLocked(name, replacing); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPackageAdded File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
onPackageAdded
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Test public void gexpBadExpression() throws Exception { final DataPoints[] datapoints = new DataPoints[1]; datapoints[0] = new MockDataPoints().getMock(); when(query_result.runAsync()).thenReturn( Deferred.fromResult(datapoints)); final HttpQuery query = NettyMocks.getQuery(tsdb, "/a...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gexpBadExpression File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
gexpBadExpression
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public List<WifiConfiguration> getConfiguredNetworks() { return getConfiguredNetworks(false, true, Process.WIFI_UID); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfiguredNetworks File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getConfiguredNetworks
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void recacheSecretTokenWhenOnRegisterPage() { try { WebElement tokenInput = getDriver().findElement(By.xpath("//input[@name='form_token']")); this.secretToken = tokenInput.getAttribute("value"); } catch (NoSuchElementException exception) { // Something is ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recacheSecretTokenWhenOnRegisterPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding ...
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
recacheSecretTokenWhenOnRegisterPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public boolean onJobRenamed(String oldName, String newName) { // quick test if(!childProjects.contains(oldName)) return false; boolean changed = false; // we need to do this per string, since old Project object is already gone. String[] projects = childProjects.spli...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onJobRenamed File: core/src/main/java/hudson/tasks/BuildTrigger.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
onJobRenamed
core/src/main/java/hudson/tasks/BuildTrigger.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public void execute(final TSDB tsdb, final HttpQuery query) { if (!query.hasQueryStringParam("json") && !query.hasQueryStringParam("png") && !query.hasQueryStringParam("ascii")) { String uri = query.request().getUri(); if (uri.length() < 4) { // Shouldn't happen... uri = "/"; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: src/tsd/GraphHandler.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-78" ]
CVE-2023-25826
CRITICAL
9.8
OpenTSDB/opentsdb
execute
src/tsd/GraphHandler.java
26be40a5e5b6ce8b0b1e4686c4b0d7911e5d8a25
0
Analyze the following code function for security vulnerabilities
protected abstract byte getDigitPos(int position);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDigitPos File: icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java Repository: unicode-org/icu The code follows secure coding practices.
[ "CWE-190" ]
CVE-2018-18928
HIGH
7.5
unicode-org/icu
getDigitPos
icu4j/main/classes/core/src/com/ibm/icu/impl/number/DecimalQuantity_AbstractBCD.java
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
0
Analyze the following code function for security vulnerabilities
void openStream() throws SmackException, InterruptedException { // If possible, provide the receiving entity of the stream open tag, i.e. the server, as much information as // possible. The 'to' attribute is *always* available. The 'from' attribute if set by the user and no external // mechanism...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openStream File: smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
openStream
smack-tcp/src/main/java/org/jivesoftware/smack/tcp/XMPPTCPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public boolean readBool() throws TException { if (boolValue_ != null) { boolean result = boolValue_.booleanValue(); boolValue_ = null; return result; } return readByte() == Types.BOOLEAN_TRUE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readBool File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readBool
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@Override public void createApplicationTemplateFromSP(ServiceProvider serviceProvider, SpTemplate spTemplate, String tenantDomain) throws IdentityApplicationManagementException { if (serviceProvider != null) { try { val...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createApplicationTemplateFromSP File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/ca...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
createApplicationTemplateFromSP
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
private static HashMap extractPropertiesFromLevel(Element elem) { // System.err.println( "extractPropertiesFromLevel()" ); HashMap out = new HashMap(); try { NodeList nl = DomParseUtils.immediateChildElementsByTagName(elem, "property"); int len = nl.getLengt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPropertiesFromLevel File: src/java/com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java Repository: zhutougg/c3p0 The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20433
HIGH
7.5
zhutougg/c3p0
extractPropertiesFromLevel
src/java/com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java
2eb0ea97f745740b18dd45e4a909112d4685f87b
0
Analyze the following code function for security vulnerabilities
public static List<Descriptor<Builder>> getBuilderDescriptors(AbstractProject<?,?> project) { return BuildStepDescriptor.filter(Builder.all(), project.getClass()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBuilderDescriptors File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getBuilderDescriptors
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
public String getDoc() { return doc != null ? doc : ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDoc File: varexport/src/main/java/com/indeed/util/varexport/Variable.java Repository: indeedeng/util The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-36634
MEDIUM
5.4
indeedeng/util
getDoc
varexport/src/main/java/com/indeed/util/varexport/Variable.java
c0952a9db51a880e9544d9fac2a2218a6bfc9c63
0
Analyze the following code function for security vulnerabilities
protected abstract void doUpdate() throws IOException, FileNotFoundException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doUpdate File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
doUpdate
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
@Override public String unzip(String sourcedir, String zipfilename) throws IOException { File zipfile = new File(sourcedir + File.separator + zipfilename); return unzip(zipfile); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unzip File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-31195
HIGH
7.2
DSpace
unzip
dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
7af52a0883a9dbc475cf3001f04ed11b24c8a4c0
0
Analyze the following code function for security vulnerabilities
@Override public void paintComponentBackground(Object graphics, int x, int y, int width, int height, Style s) { if((!asyncView) || compatPaintMode ) { super.paintComponentBackground(graphics, x, y, width, height, s); return; } ((AndroidGraphics) graphics).paintCompone...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: paintComponentBackground File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
paintComponentBackground
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void updateToggleActions(int selectedAction, boolean userTriggered) { if (userTriggered) { TransitionSet transition = new TransitionSet(); transition.setOrdering(TransitionSet.ORDERING_TOGETHER); transition.addTransition(new Fade(Fade.OUT)) .addTra...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateToggleActions File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
updateToggleActions
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
private void revisitNodeNames(Definitions def) { List<RootElement> rootElements = def.getRootElements(); for(RootElement root : rootElements) { if(root instanceof Process) { Process process = (Process) root; List<FlowElement> flowElements = process.getFlowEle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: revisitNodeNames File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java Repository: kiegroup/jbpm-designer The code follows secure coding practices.
[ "CWE-611" ]
CVE-2017-7545
MEDIUM
4
kiegroup/jbpm-designer
revisitNodeNames
jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
a143f3b92a6a5a527d929d68c02a0c5d914ab81d
0
Analyze the following code function for security vulnerabilities
protected CompletableFuture<Void> internalRemovePersistence() { return getTopicPoliciesAsyncWithRetry(topicName) .thenCompose(op -> { if (!op.isPresent()) { return CompletableFuture.completedFuture(null); } op.get().setPersistence(n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalRemovePersistence File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalRemovePersistence
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
@Override public Execable<String, ExecWatch> usingListener(ExecListener execListener) { return new PodOperationsImpl(getContext().withExecListener(execListener)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: usingListener File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
usingListener
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
@Override public void sendStanzaWithResponseCallback(Stanza stanza, final StanzaFilter replyFilter, final StanzaListener callback, final ExceptionCallback exceptionCallback, long timeout) throws NotConnectedException, InterruptedException { Objects.requireNonNull(stan...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendStanzaWithResponseCallback File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendStanzaWithResponseCallback
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public boolean isWaitingForPermissionResult() { return waitingForPermissionResult; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isWaitingForPermissionResult File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isWaitingForPermissionResult
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public String getAppHomePath() { return addFile(getContext().getFilesDir().getAbsolutePath() + "/"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAppHomePath File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getAppHomePath
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public List<Delta> getContentDiff(String fromRev, String toRev, XWikiContext context) throws XWikiException, DifferentiationFailedException { XWikiDocument fromDoc = context.getWiki().getDocument(this, fromRev, context); XWikiDocument toDoc = context.getWiki().getDocument(this, toRev, contex...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentDiff File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getContentDiff
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public final int startActivityFromRecents(int taskId, Bundle bOptions) { enforceCallerIsRecentsOrHasPermission(START_TASKS_FROM_RECENTS, "startActivityFromRecents()"); final int callingPid = Binder.getCallingPid(); final int callingUid = Binder.getCallingUid(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityFromRecents File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startActivityFromRecents
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void parseTerritories(final List<Element> territories) { final GameMap map = data.getMap(); for (final Element current : territories) { final boolean water = current.getAttribute("water").trim().equalsIgnoreCase("true"); final String name = current.getAttribute("name"); final Territory...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseTerritories File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
parseTerritories
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
public void updateNString(String columnName, @Nullable String nString) throws SQLException { updateNString(findColumn(columnName), nString); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNString File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateNString
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasNext() { return nextNode_ != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasNext File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
hasNext
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
protected Object[] mapArrayToArray(JsonParser p, DeserializationContext ctxt) throws IOException { ObjectBuffer buffer = ctxt.leaseObjectBuffer(); Object[] values = buffer.resetAndStart(); int ptr = 0; do { Object value = deserialize(p, ctxt); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mapArrayToArray File: src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-787" ]
CVE-2020-36518
MEDIUM
5
FasterXML/jackson-databind
mapArrayToArray
src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java
8238ab41d0350fb915797c89d46777b4496b74fd
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void onSelectionChanged(String text) { mLastSelectedText = text; if (mContextualSearchClient != null) { mContextualSearchClient.onSelectionChanged(text); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSelectionChanged File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
onSelectionChanged
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private String getCompressAndParseHtml(String inputBody) throws IOException { String currentBody = inputBody; //不显示none标签 if (currentBody.endsWith(endFlag)) { currentBody = currentBody.substring(0, currentBody.length() - endFlag.length()); } HtmlCleaner htmlCleaner =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCompressAndParseHtml File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getCompressAndParseHtml
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public JSONObject getJSONObject(String key) throws JSONException { Object object = this.get(key); if (object instanceof JSONObject) { return (JSONObject) object; } throw wrongValueFormatException(key, "JSONObject", object, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJSONObject File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
getJSONObject
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public void onVoiceAssistHintStarted() { mFalsingManager.onLeftAffordanceHintStarted(); mKeyguardIndicationController.showTransientIndication(R.string.voice_hint); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onVoiceAssistHintStarted File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onVoiceAssistHintStarted
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
RecentTasks getRecentTasks() { return mRecentTasks; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecentTasks File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getRecentTasks
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void launchSettingFragment(String initialFragmentName, boolean isSubSettings, Intent intent) { if (!mIsShowingDashboard && initialFragmentName != null) { setTitleFromIntent(intent); Bundle initialArguments = intent.getBundleExtra(EXTRA_SHOW_FRAGMENT_ARGUMENTS); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchSettingFragment File: src/com/android/settings/SettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
launchSettingFragment
src/com/android/settings/SettingsActivity.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
private static String getLinkPropertiesSummary(LinkProperties lp) { List<String> attributes = new ArrayList<>(6); if (lp.hasIpv4Address()) { attributes.add("v4"); } if (lp.hasIpv4DefaultRoute()) { attributes.add("v4r"); } if (lp.hasIpv4DnsServer())...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLinkPropertiesSummary File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getLinkPropertiesSummary
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public Object decode(ByteBuf buf, State state) throws IOException { try { //set thread context class loader to be the classLoader variable as there could be reflection //done while reading from input stream which reflection will use thread class loader to lo...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2023-42809 - Severity: HIGH - CVSS Score: 8.8 Description: Feature - allowedClasses setting added to SerializationCodec https://github.com/redisson/redisson/security/code-scanning/4 Function: decode File: redisson/src/main/java/org/redisson/codec/SerializationCo...
[ "CWE-502" ]
CVE-2023-42809
HIGH
8.8
redisson
decode
redisson/src/main/java/org/redisson/codec/SerializationCodec.java
fe6a2571801656ff1599ef87bdee20f519a5d1fe
1
Analyze the following code function for security vulnerabilities
@Override public void onDisplayRemoved(int displayId) { if (DEBUG_STACK) Slog.v(TAG, "Display removed displayId=" + displayId); mHandler.sendMessage(mHandler.obtainMessage(HANDLE_DISPLAY_REMOVED, displayId, 0)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDisplayRemoved File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
onDisplayRemoved
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
ContentProviderConnection incProviderCountLocked(ProcessRecord r, final ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) { if (r != null) { for (int i=0; i<r.conProviders.size(); i++) { ContentProviderConnection conn = r.conProviders.get(i); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: incProviderCountLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
incProviderCountLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private int updateSystemUiVisibilityLw() { // If there is no window focused, there will be nobody to handle the events // anyway, so just hang on in whatever state we're in until things settle down. final WindowState win = mFocusedWindow != null ? mFocusedWindow : mTopFullscreenO...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSystemUiVisibilityLw File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
updateSystemUiVisibilityLw
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@POST @ApiOperation(value = "Create a new session", notes = "This request creates a new session for a user or reactivates an existing session: the equivalent of logging in.", response = SessionResponse.class) @NoAuditEvent("dispatches audit events in the method body") pub...
Vulnerability Classification: - CWE: CWE-384 - CVE: CVE-2024-24823 - Severity: MEDIUM - CVSS Score: 4.4 Description: Merge pull request from GHSA-3xf8-g8gr-g7rh Always create a brand-new session for an authentication attempt by ignoring any previous session ID. This avoids a potential session fixation attack. Refs h...
[ "CWE-384" ]
CVE-2024-24823
MEDIUM
4.4
Graylog2/graylog2-server
newSession
graylog2-server/src/main/java/org/graylog2/rest/resources/system/SessionsResource.java
1596b749db86368ba476662f23a0f0c5ec2b5097
1