instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void removeComponent(Object item) { Component component = activeComponents.remove(item); if (component != null) { getGrid().removeExtensionComponent(component); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeComponent File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
removeComponent
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public static File buildNonUniqueFile(File parent, String mimeType, String displayName) { final String[] parts = splitFileName(mimeType, displayName); return buildFile(parent, parts[0], parts[1]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildNonUniqueFile File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
buildNonUniqueFile
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public Builder setProxyServerSelector(ProxyServerSelector proxyServerSelector) { this.proxyServerSelector = proxyServerSelector; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProxyServerSelector File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setProxyServerSelector
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public boolean copyDocument(String docname, String targetdocname, String wikilocale) throws XWikiException { return this.copyDocument(docname, targetdocname, null, null, wikilocale, false, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
copyDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
void postWindowRemoveStartingWindowCleanup(WindowState win) { // TODO: Something smells about the code below...Is there a better way? if (mStartingWindow == win) { ProtoLog.v(WM_DEBUG_STARTING_WINDOW, "Notify removed startingWindow %s", win); removeStartingWindow(); } els...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postWindowRemoveStartingWindowCleanup File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
postWindowRemoveStartingWindowCleanup
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public String getName() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
getName
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
@Override public void startLockTaskMode(IBinder token) { synchronized (this) { final ActivityRecord r = ActivityRecord.forTokenLocked(token); if (r == null) { return; } final TaskRecord task = r.task; if (task != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startLockTaskMode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
startLockTaskMode
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
private Collection<Principal> getAllGroupsForUser( ISessionManager sessionManager, String username) throws RepositoryLoginException, RepositoryException { ArrayList<Principal> listGroups = new ArrayList<Principal>(); ISession session = sessionManager.getSession(docbase); try { String query...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllGroupsForUser File: projects/dctm-core/source/java/com/google/enterprise/connector/dctm/DctmAuthenticationManager.java Repository: AnantLabs/google-enterprise-connector-dctm The code follows secure coding practi...
[ "CWE-89" ]
CVE-2014-125083
MEDIUM
5.2
AnantLabs/google-enterprise-connector-dctm
getAllGroupsForUser
projects/dctm-core/source/java/com/google/enterprise/connector/dctm/DctmAuthenticationManager.java
6fba04f18ab7764002a1da308e7cd9712b501cb7
0
Analyze the following code function for security vulnerabilities
final Object getLockObject() { if (ENABLE_LOCK_GUARD) { final long start = mStatLogger.getTime(); LockGuard.guard(LockGuard.INDEX_DPMS); mStatLogger.logDurationStat(Stats.LOCK_GUARD_GUARD, start); } return mLockDoNoUseDirectly; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockObject File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getLockObject
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "11.8RC1") public MergeResult merge(XWikiDocument previousDocument, XWikiDocument newDocument, MergeConfiguration configuration, XWikiContext context) { MergeManager mergeManager = Utils.getComponent(MergeManager.class); MergeDocumentResult mergeDocumentResult = ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: merge File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
merge
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public float getSecondaryHorizontal(int offset, boolean clamped) { boolean trailing = primaryIsTrailingPrevious(offset); return getHorizontal(offset, !trailing, clamped); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecondaryHorizontal File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getSecondaryHorizontal
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
public static void composeMailto(Context context, Account account, Uri mailto) { final Intent intent = new Intent(Intent.ACTION_VIEW, mailto); intent.setPackage(context.getPackageName()); intent.putExtra(EXTRA_FROM_EMAIL_TASK, true); intent.putExtra(Utils.EXTRA_ACCOUNT, account); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: composeMailto File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
composeMailto
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public static ClickHouseNode of(URI uri, ClickHouseNode template) { String host = ClickHouseChecker.nonNull(uri, "URI").getHost(); String scheme = ClickHouseChecker.nonEmpty(uri.getScheme(), "Protocol"); if (template == null) { template = DEFAULT; } if (ClickHouseChec...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: of File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
of
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
public static final native void setThreadPriority(int tid, int priority) throws IllegalArgumentException, SecurityException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setThreadPriority File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
setThreadPriority
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public static Materials multipleMaterials() { Materials materials = new Materials(); materials.add(svnMaterial("http://svnurl")); materials.add(hgMaterial("http://hgurl", "hgdir")); materials.add(dependencyMaterial("cruise", "dev")); return materials; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: multipleMaterials File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
multipleMaterials
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
@Override public abstract int containedTypeCount();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containedTypeCount File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
containedTypeCount
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public boolean onlyHasDefaultChannel(String pkg, int uid) { try { return sINM.onlyHasDefaultChannel(pkg, uid); } catch (Exception e) { Log.w(TAG, "Error calling NoMan", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onlyHasDefaultChannel File: src/com/android/settings/notification/NotificationBackend.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
onlyHasDefaultChannel
src/com/android/settings/notification/NotificationBackend.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
NeededUriGrants checkGrantUriPermissionFromIntentLocked(int callingUid, String targetPkg, Intent intent, int mode, NeededUriGrants needed, int targetUserId) { if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION, "Checking URI perm to data=" + (intent != null ? intent.getData() : null...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkGrantUriPermissionFromIntentLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
checkGrantUriPermissionFromIntentLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private void migrate33(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("Projects.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { for (Element branchProtectionElement: e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate33 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate33
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public ClientConfig getClientConfig() { return clientConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientConfig File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getClientConfig
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected void commentImpl(String comment) { xmlNode.appendChild(getDocument().createComment(comment)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: commentImpl File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
commentImpl
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
protected synchronized TransportConnectionState unregisterConnectionState(ConnectionId connectionId) { return connectionStateRegister.unregisterConnectionState(connectionId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterConnectionState File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
unregisterConnectionState
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override public int getNonDecorDisplayHeight(int fullWidth, int fullHeight, int rotation) { if (mHasNavigationBar) { // For a basic navigation bar, when we are in portrait mode we place // the navigation bar to the bottom. if (!mNavigationBarCanMove || fullWidth < fullHe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNonDecorDisplayHeight File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
getNonDecorDisplayHeight
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@RequiresPermissions("user:list") @GetMapping("/list") public String list(@RequestParam(defaultValue = "1") Integer pageNo, String username, Model model) { // username= SecurityUtil.sanitizeInput(username); IPage<User> iPage = userService.selectAll(pageNo, username); model.addAttribute("p...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2022-23391 - Severity: MEDIUM - CVSS Score: 4.3 Description: 修复了一部分页面上输入框的xss注入 https://github.com/atjiu/pybbs/issues/171 Function: list File: src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java Repository: atjiu/pybbs Fixed Code: @RequiresPerm...
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
list
src/main/java/co/yiiu/pybbs/controller/admin/UserAdminController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
1
Analyze the following code function for security vulnerabilities
public void gotoPage(List<String> spaces, String page, String action, String queryString) { gotoPage(getURL(spaces, page, action, queryString)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
gotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
void setLoaders(@NonNull List<ResourcesLoader> newLoaders) { Objects.requireNonNull(newLoaders, "newLoaders"); final ArrayList<ApkAssets> apkAssets = new ArrayList<>(); for (int i = 0; i < mApkAssets.length; i++) { // Filter out the previous loader apk assets. if (!mApkA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLoaders File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
setLoaders
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public String getSkinPreference(String preference) { return this.xwiki.getSkinPreference(preference, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSkinPreference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getSkinPreference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
static boolean isPrimitiveType(char typecode) { return !(typecode == '[' || typecode == 'L'); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPrimitiveType File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
isPrimitiveType
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void setSocketConfigurator(SocketConfigurator socketConfigurator) { this.socketConf = socketConfigurator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSocketConfigurator File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setSocketConfigurator
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
boolean shouldUseAppThemeSnapshot() { return !mEnableRecentsScreenshot || forAllWindows(WindowState::isSecureLocked, true /* topToBottom */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldUseAppThemeSnapshot File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
shouldUseAppThemeSnapshot
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public boolean onTextContextMenuItem(int id) { if (id == android.R.id.paste) { ClipboardManager clipboard = (ClipboardManager) getContext() .getSystemService(Context.CLIPBOARD_SERVICE); ClipData clipData = clipboard.getPrimaryClip(); if (clip...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTextContextMenuItem File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onTextContextMenuItem
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Nullable private ShortcutUser loadUserLocked(@UserIdInt int userId) { try (ResilientAtomicFile file = getUserFile(userId)) { FileInputStream in = null; try { if (DEBUG || DEBUG_REBOOT) { Slog.d(TAG, "Loading from " + file); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadUserLocked File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
loadUserLocked
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public void cleanup(boolean closeall) { int size = fCurrentEntityStack.size(); if (size > 0) { // current entity is not the original, so close it if (fCurrentEntity != null) { fCurrentEntity.closeQuietly(); } // close remaining streams ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanup File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
cleanup
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
private void enforceDebuggable(ApplicationInfo info) { if (!Build.IS_DEBUGGABLE && (info.flags & ApplicationInfo.FLAG_DEBUGGABLE) == 0) { throw new SecurityException("Process not debuggable: " + info.packageName); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceDebuggable File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
enforceDebuggable
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Override public String nextFieldName() throws IOException { if (_parsingContext.inObject() && _currToken != JsonToken.FIELD_NAME) { _numTypesValid = NR_UNKNOWN; if (_tokenIncomplete) { _skipIncomplete(); } _tokenInputTotal = _currInputProc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nextFieldName File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
nextFieldName
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
void writeBroadcastsToProtoLocked(ProtoOutputStream proto) { if (mRegisteredReceivers.size() > 0) { Iterator it = mRegisteredReceivers.values().iterator(); while (it.hasNext()) { ReceiverList r = (ReceiverList)it.next(); r.dumpDebug(proto, ActivityManagerS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeBroadcastsToProtoLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
writeBroadcastsToProtoLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void migrate21(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("Projects.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { for (Element branchProtectionElement: e...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate21 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate21
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
@Override public Object forward(String path) { try { HttpServletResponse response = (HttpServletResponse)SaManager.getSaTokenContextOrSecond().getResponse().getSource(); request.getRequestDispatcher(path).forward(request, response); return null; } catch (ServletException | IOException e) { throw new Sa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forward File: sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
forward
sa-token-starter/sa-token-jakarta-servlet/src/main/java/cn/dev33/satoken/servlet/model/SaRequestForServlet.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
@Transactional @Override public void save(Project project) { save(project, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
save
server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
@Override public List<DocumentReference> searchDocumentReferences(String wheresql, int nb, int start, XWikiContext context) throws XWikiException { return searchDocumentReferences(wheresql, nb, start, "", context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchDocumentReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
searchDocumentReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private void updateLeftAffordanceIcon() { IconState state = mLeftButton.getIcon(); mLeftAffordanceView.setVisibility(!mDozing && state.isVisible ? View.VISIBLE : View.GONE); mLeftAffordanceView.setImageDrawable(state.drawable, state.tint); mLeftAffordanceView.setContentDescription(state....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLeftAffordanceIcon File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateLeftAffordanceIcon
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@NonNull @Deprecated public BubbleMetadata.Builder createShortcutBubble(@NonNull String shortcutId) { if (!TextUtils.isEmpty(shortcutId)) { // If shortcut id is set, we don't use these if they were previously set. mPendingIntent = null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createShortcutBubble File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
createShortcutBubble
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void setDeviceIdleWhitelist(int[] allAppids, int[] exceptIdleAppids) { synchronized (ActivityManagerService.this) { mDeviceIdleWhitelist = allAppids; mDeviceIdleExceptIdleWhitelist = exceptIdleAppids; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDeviceIdleWhitelist File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setDeviceIdleWhitelist
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public boolean isDrawFinishedLw() { return mHasSurface && !mDestroying && (mWinAnimator.mDrawState == COMMIT_DRAW_PENDING || mWinAnimator.mDrawState == READY_TO_SHOW || mWinAnimator.mDrawState == HAS_DRAWN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDrawFinishedLw File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isDrawFinishedLw
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public boolean doesFileExistAndMatchContentsWithEtcPristine(String file) { final java.nio.file.Path etcPath = ensureFileIsAllowed(file); final java.nio.file.Path etcPristinePath = etcPristineFolder.resolve(file); if (!Files.exists(etcPristinePath)) { return false; } ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-40315 - Severity: HIGH - CVSS Score: 8.0 Description: NMS-15702: Only members of ROLE_ADMIN can view/edit users.xml Function: doesFileExistAndMatchContentsWithEtcPristine File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestServic...
[ "CWE-Other" ]
CVE-2023-40315
HIGH
8
OpenNMS/opennms
doesFileExistAndMatchContentsWithEtcPristine
opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
201301e067329ababa3c0671ded5c4c43347d4a8
1
Analyze the following code function for security vulnerabilities
public static ActivityOptions makeTaskLaunchBehind() { final ActivityOptions opts = new ActivityOptions(); opts.mAnimationType = ANIM_LAUNCH_TASK_BEHIND; return opts; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeTaskLaunchBehind File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
makeTaskLaunchBehind
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public void setConnectionRecoveryTriggeringCondition(Predicate<ShutdownSignalException> connectionRecoveryTriggeringCondition) { this.connectionRecoveryTriggeringCondition = connectionRecoveryTriggeringCondition; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectionRecoveryTriggeringCondition File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setConnectionRecoveryTriggeringCondition
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
boolean performShowLocked() { if (!showToCurrentUser()) { if (DEBUG_VISIBILITY) Slog.w(TAG, "hiding " + this + ", belonging to " + mOwnerUid); clearPolicyVisibilityFlag(VISIBLE_FOR_USER); return false; } logPerformShow("performShow on "); final int d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performShowLocked File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
performShowLocked
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public int stringWidth(Object nativeFont, String str) { float w = (nativeFont == null ? this.defaultFont : (Paint) ((NativeFont) nativeFont).font).measureText(str); if (w - (int) w > 0) { return (int) (w + 1); } return (int) w; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stringWidth File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
stringWidth
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void navigationStateChanged(int flags) { if ((flags & INVALIDATE_TYPE_TITLE) != 0) { for (TabObserver observer : mObservers) observer.onTitleUpdated(Tab.this); } if ((flags & INVALIDATE_TYPE_URL) != 0) { for (TabObserver observ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: navigationStateChanged File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
navigationStateChanged
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public synchronized void updateObject( int columnIndex, @Nullable Object x, int scale) throws SQLException { this.updateObject(columnIndex, x); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateObject File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateObject
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private boolean maybeMigrateSettingsForRenamedAuthorities() { boolean writeNeeded = false; ArrayList<AuthorityInfo> authoritiesToRemove = new ArrayList<AuthorityInfo>(); final int N = mAuthorities.size(); for (int i = 0; i < N; i++) { AuthorityInfo authority = mAuthorities.v...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: maybeMigrateSettingsForRenamedAuthorities File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
maybeMigrateSettingsForRenamedAuthorities
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
public static Set<String> getSupportedClientKeyTypes(byte[] clientCertificateTypes) { Set<String> result = new HashSet<String>(clientCertificateTypes.length); for (byte keyTypeCode : clientCertificateTypes) { String keyType = getClientKeyType(keyTypeCode); if (keyType == null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSupportedClientKeyTypes File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getSupportedClientKeyTypes
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
private boolean isOperatorConsideredNonRoaming(ServiceState s) { String operatorNumeric = s.getOperatorNumeric(); String[] numericArray = mPhone.getContext().getResources().getStringArray( com.android.internal.R.array.config_operatorConsideredNonRoaming); if (numericArray.le...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOperatorConsideredNonRoaming File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
isOperatorConsideredNonRoaming
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private void writeStructure(Element design, DesignContext designContext) { if (getColumns().isEmpty()) { return; } Element tableElement = design.appendElement("table"); Element colGroup = tableElement.appendElement("colgroup"); getColumns().forEach(column -> column ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeStructure File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
writeStructure
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public Jooby port(final int port) { this.port = port; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: port File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
port
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
void updateCpuStatsNow() { synchronized (mProcessCpuTracker) { mProcessCpuMutexFree.set(false); final long now = SystemClock.uptimeMillis(); boolean haveNewCpuStats = false; if (MONITOR_CPU_USAGE && mLastCpuTime.get() < (now-MONITOR_CPU_MIN_TI...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateCpuStatsNow File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
updateCpuStatsNow
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public void setVrThread(int tid) { enforceSystemHasVrFeature(); synchronized (mGlobalLock) { final int pid = Binder.getCallingPid(); final WindowProcessController wpc = mProcessMap.getProcess(pid); mVrController.setVrThreadLocked(tid, pid, wpc); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVrThread File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
setVrThread
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public void add(final String key, final Object object) { propertyValues.computeIfAbsent(key, k -> new ArrayList<>()).add(object); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: add File: stroom-core-server/src/main/java/stroom/importexport/server/Config.java Repository: gchq/stroom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000651
HIGH
7.5
gchq/stroom
add
stroom-core-server/src/main/java/stroom/importexport/server/Config.java
ba30ffd415bd7d32ee40ba4b04035267ce80b499
0
Analyze the following code function for security vulnerabilities
@Override public final void finishHeavyWeightApp() { if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: finishHeavyWeightApp() from pid=" + Binder.getCallingPid()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishHeavyWeightApp File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
finishHeavyWeightApp
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@Test public void deleteByPojoDeleteFails(TestContext context) throws FieldException { postgresClientQueryFails().delete(FOO, new SimplePojo(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteByPojoDeleteFails File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
deleteByPojoDeleteFails
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public boolean isScrimSrcModeEnabled() { return mScrimSrcModeEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isScrimSrcModeEnabled File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isScrimSrcModeEnabled
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("javadoc") public void onAttachedToWindow() { setAccessibilityState(mAccessibilityManager.isEnabled()); ScreenOrientationListener.getInstance().addObserver(this, mContext); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAttachedToWindow File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onAttachedToWindow
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@NonNull public String getEnrollmentSpecificId() { throwIfParentInstance("getEnrollmentSpecificId"); if (mService == null) { return ""; } try { return mService.getEnrollmentSpecificId(mContext.getPackageName()); } catch (RemoteException re) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEnrollmentSpecificId File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getEnrollmentSpecificId
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected IBillingSupport createBillingSupport() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createBillingSupport File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createBillingSupport
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void onServerCertificateAvailable( int depth, byte[] subjectBytes, byte[] certHashBytes, byte[] certBytes) { synchronized (mLock) { // OpenSSL default maximum depth is 100. if (depth < 0 || depth > 100) { ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21242 - Severity: CRITICAL - CVSS Score: 9.8 Description: [TOFU] Validate full cert chains before displaying dialog When a full chain including a Root CA is provided by the server, perform a full validation of the chain before displaying the TOFU dialog. ...
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
onServerCertificateAvailable
service/java/com/android/server/wifi/SupplicantStaNetworkCallbackAidlImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
1
Analyze the following code function for security vulnerabilities
void updateOrientationListenerLp() { if (!mOrientationListener.canDetectOrientation()) { // If sensor is turned off or nonexistent for some reason return; } //Could have been invoked due to screen turning on or off or //change of the currently visible window's ori...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOrientationListenerLp File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
updateOrientationListenerLp
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public void setAccessibilityState(boolean state) { if (!state) { setInjectedAccessibility(false); mNativeAccessibilityAllowed = false; mTouchExplorationEnabled = false; } else { boolean useScriptInjection = isDeviceAccessibilityScriptInjectionEnabled(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAccessibilityState File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
setAccessibilityState
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public Date parseDate(String str) { try { return dateFormat.parse(str); } catch (java.text.ParseException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDate File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
parseDate
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
void bindPaymentServiceLocked(int userId, ComponentName service) { unbindPaymentServiceLocked(); Log.d(TAG, "Binding to payment service " + service + " for userid:" + userId); Intent intent = new Intent(HostApduService.SERVICE_INTERFACE); intent.setComponent(service); if (mConte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindPaymentServiceLocked File: src/com/android/nfc/cardemulation/HostEmulationManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35671
MEDIUM
5.5
android
bindPaymentServiceLocked
src/com/android/nfc/cardemulation/HostEmulationManager.java
745632835f3d97513a9c2a96e56e1dc06c4e4176
0
Analyze the following code function for security vulnerabilities
private static String getAppRoleName(String applicationName) { return ApplicationConstants.APPLICATION_DOMAIN + UserCoreConstants.DOMAIN_SEPARATOR + applicationName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAppRoleName File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-fra...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
getAppRoleName
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Override public final int startActivityAsUser(IApplicationThread caller, String callingPackage, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo, Bundle options, int userId) { enforceNotIsolatedCaller(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityAsUser File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
startActivityAsUser
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override public boolean setResetPasswordToken(ComponentName admin, byte[] token) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return false; } if (token == null || token.length < 32) { throw new IllegalArgumentException("token must be at least 32-...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setResetPasswordToken File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setResetPasswordToken
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams reset() { mViewType = VIEW_TYPE_UNSPECIFIED; mHeaderless = false; mHideAppName = false; mHideTitle = false; mHideSubText = false; mHideTime = false; mHideActions = false; mHideProgress = false; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reset File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
reset
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private void clearLightsLocked() { // light mLights.clear(); updateLightsLocked(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearLightsLocked File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
clearLightsLocked
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public void gotoPage(String space, String page, String action, String queryString) { gotoPage(Collections.singletonList(space), page, action, queryString); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
gotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public <V> Column<T, V> addColumn(ValueProvider<T, V> valueProvider, AbstractRenderer<? super T, ? super V> renderer) { return addColumn(valueProvider, ValueProvider.identity(), renderer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumn
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public void setDebugApp( String packageName, boolean waitForDebugger, boolean persistent) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeString(packageName); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDebugApp File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
setDebugApp
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public void setDistinct(boolean distinct) { mDistinct = distinct; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDistinct File: core/java/android/database/sqlite/SQLiteQueryBuilder.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
setDistinct
core/java/android/database/sqlite/SQLiteQueryBuilder.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
private void parseAlliances(final Element root) throws GameParseException { final AllianceTracker allianceTracker = data.getAllianceTracker(); final Collection<PlayerId> players = data.getPlayerList().getPlayers(); for (final Element current : getChildren("alliance", root)) { final PlayerId p1 = getPl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseAlliances File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
parseAlliances
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
@Test public void executePOSTDuplicates() throws Exception { final DataPoints[] datapoints = new DataPoints[1]; datapoints[0] = new MockDataPoints().getMock(); when(query_result.runAsync()).thenReturn( Deferred.fromResult(datapoints)); final HttpQuery query = NettyMocks.postQuery(tsdb,"/api/q...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executePOSTDuplicates File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
executePOSTDuplicates
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
ArrayList<ActivityRecord> getDumpActivitiesLocked(String name) { return mFocusedStack.getDumpActivitiesLocked(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDumpActivitiesLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
getDumpActivitiesLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override protected KBTemplate removeImpl(KBTemplate kbTemplate) { kbTemplate = toUnwrappedModel(kbTemplate); Session session = null; try { session = openSession(); if (!session.contains(kbTemplate)) { kbTemplate = (KBTemplate)session.get(KBTemplateImpl.class, kbTemplate.getPrimaryKeyObj()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeImpl File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code ...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
removeImpl
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
@DeleteMapping("{id}") public Result delete(@PathVariable Integer id) { User user = getApiUser(); Topic topic = topicService.selectById(id); ApiAssert.isTrue(topic.getUserId().equals(user.getId()), "谁给你的权限删除别人的话题的?"); topicService.delete(topic); return success(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java Repository: atjiu/pybbs The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-23391
MEDIUM
4.3
atjiu/pybbs
delete
src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java
7d83b97d19f5fed9f29f72e654ef3c2818021b4d
0
Analyze the following code function for security vulnerabilities
public File downloadFileFromResponse(Response response) throws ApiException { try { File file = prepareDownloadFile(response); Files.copy(response.readEntity(InputStream.class), file.toPath(), StandardCopyOption.REPLACE_EXISTING); return file; } catch (IOException e) { throw new ApiExcep...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: downloadFileFromResponse File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
downloadFileFromResponse
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override long getProtoFieldId() { return ACTIVITY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProtoFieldId File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getProtoFieldId
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public String check(Method method, HttpServletRequest request) { if (request.getUserPrincipal() != null) { return verifyAuthenticatedUser(method, request); } else { return verifyAnonymousUser(method, request); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31406
LOW
1.9
vaadin/flow
check
fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java
3fe644cab2cffa5b86316dbe71b11df1083861a9
0
Analyze the following code function for security vulnerabilities
final void dumpGraphicsHardwareUsage(FileDescriptor fd, PrintWriter pw, String[] args) { ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, false, args); if (procs == null) { pw.println("No process found for: " + args[0]); return; } long uptime ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpGraphicsHardwareUsage File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
dumpGraphicsHardwareUsage
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage, @Nullable String callingFeatureId, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo, Bundle bOptions, int userId) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityAndWait File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startActivityAndWait
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public XmlGraphMLReader source(ExportConfig.NodeConfig sourceConfig) { this.source = sourceConfig; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: source File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
source
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
boolean injectIsSafeModeEnabled() { final long token = injectClearCallingIdentity(); try { return IWindowManager.Stub .asInterface(ServiceManager.getService(Context.WINDOW_SERVICE)) .isSafeModeEnabled(); } catch (RemoteException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectIsSafeModeEnabled File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectIsSafeModeEnabled
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override protected void logd(String s) { Log.d(getTag(), s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logd File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
logd
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public DataSource createNewDataSource(Map<String, ?> params) throws IOException { String refName = (String) JNDI_REFNAME.lookUp(params); try { return (DataSource) GeoTools.getInitialContext().lookup(refName); } catch (Exception e) { throw new DataSourceExcep...
Vulnerability Classification: - CWE: CWE-917 - CVE: CVE-2022-24818 - Severity: HIGH - CVSS Score: 7.5 Description: [GEOT-7115] Streamline JNDI lookups Function: createNewDataSource File: modules/library/jdbc/src/main/java/org/geotools/data/jdbc/datasource/JNDIDataSourceFactory.java Repository: geotools Fixed Code: @...
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
createNewDataSource
modules/library/jdbc/src/main/java/org/geotools/data/jdbc/datasource/JNDIDataSourceFactory.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
1
Analyze the following code function for security vulnerabilities
@Deprecated public int createNewObject(String className, XWikiContext context) throws XWikiException { return createXObject( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNewObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
createNewObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void stopAssociationLocked(int sourceUid, String sourceProcess, int targetUid, ComponentName targetComponent) { if (!mTrackingAssociations) { return; } ArrayMap<ComponentName, SparseArray<ArrayMap<String, Association>>> components = mAssociations.get(targe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopAssociationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stopAssociationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void completeStage(final Stage stage, final JobResult jobResult) { final StageResult stageResult = completeAllJobs(stage, jobResult); updateResultInTransaction(stage, stageResult); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: completeStage File: server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java Repository: gocd The code follows secure coding practices.
[ "CWE-697" ]
CVE-2022-39308
MEDIUM
5.9
gocd
completeStage
server/src/test-shared/java/com/thoughtworks/go/server/dao/DatabaseAccessHelper.java
236d4baf92e6607f2841c151c855adcc477238b8
0
Analyze the following code function for security vulnerabilities
private void checkIfSomeAreApproved() { if (!isVoiceOnlyCall) { if (cameraEnumerator.getDeviceNames().length == 0) { binding.cameraButton.setVisibility(View.GONE); } if (cameraEnumerator.getDeviceNames().length > 1) { binding.switchSelfVideoBu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkIfSomeAreApproved File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
checkIfSomeAreApproved
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
@Nullable final PackageInfo getPackageInfoWithSignatures(String packageName, @UserIdInt int userId) { return getPackageInfo(packageName, userId, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageInfoWithSignatures File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getPackageInfoWithSignatures
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private byte[] hexToByteArray(String digits) { final int bytes = digits.length() / 2; if (2*bytes != digits.length()) { throw new IllegalArgumentException("Hex string must have an even number of digits"); } byte[] result = new byte[bytes]; for (int i = 0; i < digits....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hexToByteArray File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
hexToByteArray
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private List<DeletedDocument> wrapDeletedDocuments(XWikiDeletedDocument[] deletedDocuments) { if (deletedDocuments == null || deletedDocuments.length == 0) { return Collections.emptyList(); } List<DeletedDocument> result = new ArrayList<>(deletedDocuments.length); for (X...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wrapDeletedDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
wrapDeletedDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0