instruction
string | input
string | output
string | cwe_ids
list | cve_id
string | severity
string | cvss_score
float64 | repo_name
string | func_name
string | file_path
string | commit_hash
string | is_vulnerable
int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities
|
@SuppressWarnings("unchecked")
public static Structure getStructureByVelocityVarName(String varName)
{
if(varName ==null) return new Structure();
Structure structure = null;
String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'";
List<Structure> list = InodeFactory.getInodesOfClassByCondition(Structure.class,condition);
if (list.size() > 0)
{
structure = (Structure) list.get(0);
}
else
{
structure = new Structure();
}
return structure;
}
|
Vulnerability Classification:
- CWE: CWE-89
- CVE: CVE-2016-2355
- Severity: HIGH
- CVSS Score: 7.5
Description: fixes #8848
Function: getStructureByVelocityVarName
File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
Repository: dotCMS/core
Fixed Code:
@SuppressWarnings("unchecked")
public static Structure getStructureByVelocityVarName(String varName)
{
varName = SQLUtil.sanitizeParameter(varName);
if(!UtilMethods.isSet(varName)) return new Structure();
Structure structure = null;
String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'";
List<Structure> list = InodeFactory.getInodesOfClassByCondition(Structure.class,condition);
if (list.size() > 0)
{
structure = (Structure) list.get(0);
}
else
{
structure = new Structure();
}
return structure;
}
|
[
"CWE-89"
] |
CVE-2016-2355
|
HIGH
| 7.5
|
dotCMS/core
|
getStructureByVelocityVarName
|
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
|
897f3632d7e471b7a73aabed5b19f6f53d4e5562
| 1
|
Analyze the following code function for security vulnerabilities
|
private String convertServiceName(String packageName, String serviceName) {
if (TextUtils.isEmpty(serviceName)) {
return null;
}
final String fullName;
if (serviceName.startsWith(".")) {
// Relative to the app package. Prepend the app package name.
fullName = packageName + serviceName;
} else if (serviceName.indexOf('.') >= 0) {
// Fully qualified package name.
fullName = serviceName;
} else {
fullName = null;
}
return fullName;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertServiceName
File: core/java/com/android/internal/app/ChooserActivity.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-254",
"CWE-19"
] |
CVE-2016-3752
|
HIGH
| 7.5
|
android
|
convertServiceName
|
core/java/com/android/internal/app/ChooserActivity.java
|
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
| 0
|
Analyze the following code function for security vulnerabilities
|
private static String fromTimeMillis(long value) {
return StringValueConverter.INSTANCE.convertTimeMillis(value);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fromTimeMillis
File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
Repository: line/armeria
The code follows secure coding practices.
|
[
"CWE-74"
] |
CVE-2019-16771
|
MEDIUM
| 5
|
line/armeria
|
fromTimeMillis
|
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
|
b597f7a865a527a84ee3d6937075cfbb4470ed20
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected void initComponent() {
if(android.os.Build.VERSION.SDK_INT == 21 && web.getLayerType() != layerType){
act.runOnUiThread(new Runnable() {
@Override
public void run() {
web.setLayerType(layerType, null); //setting layer type to original state
}
});
}
super.initComponent();
blockNativeFocus(false);
setPeerImage(null);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initComponent
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
initComponent
|
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
public Registration addSelectionListener(SelectionListener<T> listener)
throws UnsupportedOperationException {
return getSelectionModel().addSelectionListener(listener);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addSelectionListener
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2019-25028
|
MEDIUM
| 4.3
|
vaadin/framework
|
addSelectionListener
|
server/src/main/java/com/vaadin/ui/Grid.java
|
c40bed109c3723b38694ed160ea647fef5b28593
| 0
|
Analyze the following code function for security vulnerabilities
|
public ApiClient addDefaultHeader(String key, String value) {
defaultHeaderMap.put(key, value);
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addDefaultHeader
File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
addDefaultHeader
|
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
@Deprecated
public void setSamlHandlerChainClass(String samlHandlerChainClass) {
logger
.warn("Option 'samlHandlerChainClass' is deprecated and should not be used. This configuration is now set in picketlink.xml.");
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSamlHandlerChainClass
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2015-3158
|
MEDIUM
| 4
|
picketlink/picketlink-bindings
|
setSamlHandlerChainClass
|
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
|
341a37aefd69e67b6b5f6d775499730d6ccaff0d
| 0
|
Analyze the following code function for security vulnerabilities
|
@SuppressWarnings("unchecked")
private void internalPrintln(Map<String, Object> options, Object object) {
if (object == null) {
return;
}
long start = new Date().getTime();
if (options.containsKey(Printer.EXCLUDE)) {
List<String> colOut = optionList(Printer.EXCLUDE, options);
List<String> colIn = optionList(Printer.COLUMNS_IN, options);
colIn.removeAll(colOut);
colOut.addAll((List<String>) options.get(Printer.COLUMNS_OUT));
options.put(Printer.COLUMNS_IN, colIn);
options.put(Printer.COLUMNS_OUT, colOut);
}
if (options.containsKey(Printer.INCLUDE)) {
List<String> colIn = optionList(Printer.INCLUDE, options);
colIn.addAll((List<String>) options.get(Printer.COLUMNS_IN));
options.put(Printer.COLUMNS_IN, colIn);
}
options.put(Printer.VALUE_STYLE, valueHighlighter((String) options.getOrDefault(Printer.VALUE_STYLE, null)));
prntStyle = Styles.prntStyle();
options.putIfAbsent(Printer.WIDTH, terminal().getSize().getColumns());
String style = (String) options.getOrDefault(Printer.STYLE, "");
options.put(Printer.STYLE, valueHighlighter(style));
int width = (int) options.get(Printer.WIDTH);
if (!style.isEmpty() && object instanceof String) {
highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), (String) object, true);
} else if (style.equalsIgnoreCase("JSON")) {
if (engine == null) {
throw new IllegalArgumentException("JSON style not supported!");
}
String json = engine.toJson(object);
highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), json, true);
} else if (options.containsKey(Printer.SKIP_DEFAULT_OPTIONS)) {
highlightAndPrint(options, object);
} else if (object instanceof Exception) {
highlightAndPrint(options, (Exception) object);
} else if (object instanceof CmdDesc) {
highlight((CmdDesc) object).println(terminal());
} else if (object instanceof String || object instanceof Number) {
String str = object.toString();
SyntaxHighlighter highlighter = (SyntaxHighlighter) options.getOrDefault(Printer.VALUE_STYLE, null);
highlightAndPrint(width, highlighter, str, doValueHighlight(options, str));
} else {
highlightAndPrint(options, object);
}
terminal().flush();
Log.debug("println: ", new Date().getTime() - start, " msec");
}
|
Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-50572
- Severity: MEDIUM
- CVSS Score: 5.5
Description: GroovyEngine.execute cause an OOM exception, fixes #909
Function: internalPrintln
File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java
Repository: jline/jline3
Fixed Code:
@SuppressWarnings("unchecked")
private void internalPrintln(Map<String, Object> options, Object object) {
if (object == null) {
return;
}
long start = new Date().getTime();
if (options.containsKey(Printer.EXCLUDE)) {
List<String> colOut = optionList(Printer.EXCLUDE, options);
List<String> colIn = optionList(Printer.COLUMNS_IN, options);
colIn.removeAll(colOut);
colOut.addAll((List<String>) options.get(Printer.COLUMNS_OUT));
options.put(Printer.COLUMNS_IN, colIn);
options.put(Printer.COLUMNS_OUT, colOut);
}
if (options.containsKey(Printer.INCLUDE)) {
List<String> colIn = optionList(Printer.INCLUDE, options);
colIn.addAll((List<String>) options.get(Printer.COLUMNS_IN));
options.put(Printer.COLUMNS_IN, colIn);
}
options.put(Printer.VALUE_STYLE, valueHighlighter((String) options.getOrDefault(Printer.VALUE_STYLE, null)));
prntStyle = Styles.prntStyle();
options.putIfAbsent(Printer.WIDTH, terminal().getSize().getColumns());
String style = (String) options.getOrDefault(Printer.STYLE, "");
options.put(Printer.STYLE, valueHighlighter(style));
int width = (int) options.get(Printer.WIDTH);
int maxrows = (int) options.get(Printer.MAXROWS);
if (!style.isEmpty() && object instanceof String) {
highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), (String) object, true, maxrows);
} else if (style.equalsIgnoreCase("JSON")) {
if (engine == null) {
throw new IllegalArgumentException("JSON style not supported!");
}
String json = engine.toJson(object);
highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), json, true, maxrows);
} else if (options.containsKey(Printer.SKIP_DEFAULT_OPTIONS)) {
highlightAndPrint(options, object);
} else if (object instanceof Exception) {
highlightAndPrint(options, (Exception) object);
} else if (object instanceof CmdDesc) {
highlight((CmdDesc) object).println(terminal());
} else if (object instanceof String || object instanceof Number) {
String str = object.toString();
SyntaxHighlighter highlighter = (SyntaxHighlighter) options.getOrDefault(Printer.VALUE_STYLE, null);
highlightAndPrint(width, highlighter, str, doValueHighlight(options, str), maxrows);
} else {
highlightAndPrint(options, object);
}
terminal().flush();
Log.debug("println: ", new Date().getTime() - start, " msec");
}
|
[
"CWE-787"
] |
CVE-2023-50572
|
MEDIUM
| 5.5
|
jline/jline3
|
internalPrintln
|
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
|
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
| 1
|
Analyze the following code function for security vulnerabilities
|
@GET
@Path("async-writer-on-worker-thread")
public AsyncWriterData asyncWriterOnWorkerThread() {
return new AsyncWriterData(false, false);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: asyncWriterOnWorkerThread
File: server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java
Repository: resteasy
The code follows secure coding practices.
|
[
"CWE-378"
] |
CVE-2023-0482
|
MEDIUM
| 5.5
|
resteasy
|
asyncWriterOnWorkerThread
|
server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java
|
807d7456f2137cde8ef7c316707211bf4e542d56
| 0
|
Analyze the following code function for security vulnerabilities
|
private void addKeysToMap(String className) {
try {
Class z = Class.forName(className);
// All the keys must exist in the en_US XML files first. The other
// languages may have subsets but no unique keys. If this is a
// problem
// refactoring will need to take place.
Enumeration<String> e = XmlMessages.getInstance().getKeys(z, Locale.US);
while (e.hasMoreElements()) {
String key = e.nextElement();
keyToBundleMap.put(key, className);
}
}
catch (ClassNotFoundException ce) {
String message = "Class not found when trying to initalize " +
"the LocalizationService: " + ce.toString();
log.error(message, ce);
throw new LocalizationException(message, ce);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addKeysToMap
File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
Repository: spacewalkproject/spacewalk
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2016-3079
|
MEDIUM
| 4.3
|
spacewalkproject/spacewalk
|
addKeysToMap
|
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
|
7b9ff9ad
| 0
|
Analyze the following code function for security vulnerabilities
|
private void updateApnDataToDatabase(Uri uri, ContentValues values) {
ThreadUtils.postOnBackgroundThread(() -> {
if (uri.equals(mCarrierUri)) {
// Add a new apn to the database
final Uri newUri = getContentResolver().insert(mCarrierUri, values);
if (newUri == null) {
Log.e(TAG, "Can't add a new apn to database " + mCarrierUri);
}
} else {
// Update the existing apn
getContentResolver().update(
uri, values, null /* where */, null /* selection Args */);
}
});
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateApnDataToDatabase
File: src/com/android/settings/network/apn/ApnEditor.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40125
|
HIGH
| 7.8
|
android
|
updateApnDataToDatabase
|
src/com/android/settings/network/apn/ApnEditor.java
|
63d464c3fa5c7b9900448fef3844790756e557eb
| 0
|
Analyze the following code function for security vulnerabilities
|
void handshakeFinished() throws SSLException {
synchronized (OpenSslEngine.this) {
if (!isDestroyed()) {
id = SSL.getSessionId(ssl);
cipher = toJavaCipherSuite(SSL.getCipherForSSL(ssl));
protocol = SSL.getVersion(ssl);
initPeerCerts();
selectApplicationProtocol();
handshakeState = HandshakeState.FINISHED;
} else {
throw new SSLException("Already closed");
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handshakeFinished
File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
Repository: netty
The code follows secure coding practices.
|
[
"CWE-835"
] |
CVE-2016-4970
|
HIGH
| 7.8
|
netty
|
handshakeFinished
|
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
|
bc8291c80912a39fbd2303e18476d15751af0bf1
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public Configuration getConfiguration() {
return configuration;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfiguration
File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
Repository: infinispan
The code follows secure coding practices.
|
[
"CWE-502"
] |
CVE-2017-15089
|
MEDIUM
| 6.5
|
infinispan
|
getConfiguration
|
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
|
efc44b7b0a5dd4f44773808840dd9785cabcf21c
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getDeviceOwnerInfo() {
return getString(LOCK_SCREEN_DEVICE_OWNER_INFO, UserHandle.USER_SYSTEM);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerInfo
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3908
|
MEDIUM
| 4.3
|
android
|
getDeviceOwnerInfo
|
core/java/com/android/internal/widget/LockPatternUtils.java
|
96daf7d4893f614714761af2d53dfb93214a32e4
| 0
|
Analyze the following code function for security vulnerabilities
|
private static String escape(String str) {
StringBuilder sb = new StringBuilder();
for (char c : str.toCharArray()) {
switch (c) {
case '(':
case ')':
case '\\':
sb.append('\\');
// intended fall-through
default:
sb.append(c);
}
}
return sb.toString();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escape
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2019-15534
|
HIGH
| 7.5
|
folio-org/raml-module-builder
|
escape
|
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
|
b7ef741133e57add40aa4cb19430a0065f378a94
| 0
|
Analyze the following code function for security vulnerabilities
|
private static String toLuceneDate(Date date) {
try {
SimpleDateFormat df = new SimpleDateFormat("yyyyMMddHHmmss");
String returnValue = df.format(date);
return returnValue;
} catch (Exception ex) {
Logger.error(ESContentFactoryImpl.class, ex.toString());
return ERROR_DATE;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toLuceneDate
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2016-2355
|
HIGH
| 7.5
|
dotCMS/core
|
toLuceneDate
|
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
|
897f3632d7e471b7a73aabed5b19f6f53d4e5562
| 0
|
Analyze the following code function for security vulnerabilities
|
@GuardedBy("this")
void tempAllowlistForPendingIntentLocked(int callerPid, int callerUid, int targetUid,
long duration, int type, @ReasonCode int reasonCode, String reason) {
if (DEBUG_ALLOWLISTS) {
Slog.d(TAG, "tempAllowlistForPendingIntentLocked(" + callerPid + ", " + callerUid + ", "
+ targetUid + ", " + duration + ", " + type + ")");
}
synchronized (mPidsSelfLocked) {
final ProcessRecord pr = mPidsSelfLocked.get(callerPid);
if (pr == null) {
Slog.w(TAG, "tempAllowlistForPendingIntentLocked() no ProcessRecord for pid "
+ callerPid);
return;
}
if (!pr.mServices.mAllowlistManager) {
if (checkPermission(CHANGE_DEVICE_IDLE_TEMP_WHITELIST, callerPid, callerUid)
!= PackageManager.PERMISSION_GRANTED
&& checkPermission(START_ACTIVITIES_FROM_BACKGROUND, callerPid, callerUid)
!= PackageManager.PERMISSION_GRANTED
&& checkPermission(START_FOREGROUND_SERVICES_FROM_BACKGROUND, callerPid,
callerUid) != PackageManager.PERMISSION_GRANTED) {
if (DEBUG_ALLOWLISTS) {
Slog.d(TAG, "tempAllowlistForPendingIntentLocked() for target " + targetUid
+ ": pid " + callerPid + " is not allowed");
}
return;
}
}
}
tempAllowlistUidLocked(targetUid, duration, reasonCode, reason, type, callerUid);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: tempAllowlistForPendingIntentLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21292
|
MEDIUM
| 5.5
|
android
|
tempAllowlistForPendingIntentLocked
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
d10b27e539f7bc91c2360d429b9d05f05274670d
| 0
|
Analyze the following code function for security vulnerabilities
|
public char getFileSystemSeparator() {
return File.separatorChar;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFileSystemSeparator
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
getFileSystemSeparator
|
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
private static CharacterStyle getColor(String color, boolean foreground) {
int c = 0xff000000;
if (!TextUtils.isEmpty(color)) {
if (color.startsWith("@")) {
Resources res = Resources.getSystem();
String name = color.substring(1);
int colorRes = res.getIdentifier(name, "color", "android");
if (colorRes != 0) {
ColorStateList colors = res.getColorStateList(colorRes, null);
if (foreground) {
return new TextAppearanceSpan(null, 0, 0, colors, null);
} else {
c = colors.getDefaultColor();
}
}
} else {
try {
c = Color.parseColor(color);
} catch (IllegalArgumentException e) {
c = Color.BLACK;
}
}
}
if (foreground) {
return new ForegroundColorSpan(c);
} else {
return new BackgroundColorSpan(c);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColor
File: core/java/android/content/res/StringBlock.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-415"
] |
CVE-2023-40103
|
HIGH
| 7.8
|
android
|
getColor
|
core/java/android/content/res/StringBlock.java
|
c3bc12c484ef3bbca4cec19234437c45af5e584d
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void setManagedProfileContactsAccessPolicy(PackagePolicy policy) {
if (!mHasFeature) {
return;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization((isProfileOwner(caller)
&& isManagedProfile(caller.getUserId())));
synchronized (getLockObject()) {
ActiveAdmin admin = getProfileOwnerLocked(caller.getUserId());
admin.disableContactsSearch = false;
admin.mManagedProfileContactsAccess = policy;
saveSettingsLocked(caller.getUserId());
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setManagedProfileContactsAccessPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40089
|
HIGH
| 7.8
|
android
|
setManagedProfileContactsAccessPolicy
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
e2e05f488da6abc765a62e7faf10cb74e729732e
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getEmail()
{
XWikiDocument userDoc;
try {
userDoc = getXWikiContext().getWiki().getDocument(this.user.getUser(), getXWikiContext());
BaseObject obj = userDoc.getObject("XWiki.XWikiUsers");
return obj.getStringValue("email");
} catch (Exception e) {
// APIs should never throw errors, as velocity cannot catch them, and scripts should be
// as robust as possible. Instead, the code using this should know that null means there
// was an error, if it really needs to report these exceptions.
return null;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEmail
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2022-41929
|
MEDIUM
| 4.9
|
xwiki/xwiki-platform
|
getEmail
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
|
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
| 0
|
Analyze the following code function for security vulnerabilities
|
protected LocallyAvailableResource entryAt(File file) {
return entryAt(RelativePathUtil.relativePath(baseDir, file));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: entryAt
File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
Repository: gradle
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2023-35946
|
MEDIUM
| 5.5
|
gradle
|
entryAt
|
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
|
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
| 0
|
Analyze the following code function for security vulnerabilities
|
private void sendPreface() {
Http2PrefaceStreamSinkChannel preface = new Http2PrefaceStreamSinkChannel(this);
flushChannelIgnoreFailure(preface);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendPreface
File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
Repository: undertow-io/undertow
The code follows secure coding practices.
|
[
"CWE-214"
] |
CVE-2021-3859
|
HIGH
| 7.5
|
undertow-io/undertow
|
sendPreface
|
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
|
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public <T> T extractPayload(Object payload, Class<T> type) {
try {
return objectMapper.convertValue(payload, type);
} catch (IllegalArgumentException e) {
LOG.error("Error while deserializing payload", e);
return null;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: extractPayload
File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2024-24824
|
HIGH
| 8.8
|
Graylog2/graylog2-server
|
extractPayload
|
graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
|
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public boolean hasManagedProfileContactsAccess(int userId, String packageName) {
Preconditions.checkArgumentNonnegative(userId, "Invalid userId");
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(hasCrossUsersPermission(caller, userId));
synchronized (getLockObject()) {
ActiveAdmin admin = getProfileOwnerAdminLocked(userId);
if (admin != null) {
if (admin.mManagedProfileContactsAccess == null) {
return !admin.disableContactsSearch;
}
return admin.mManagedProfileContactsAccess.isPackageAllowed(packageName,
mContactSystemRoleHolders);
}
}
return true;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasManagedProfileContactsAccess
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40089
|
HIGH
| 7.8
|
android
|
hasManagedProfileContactsAccess
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
e2e05f488da6abc765a62e7faf10cb74e729732e
| 0
|
Analyze the following code function for security vulnerabilities
|
private void setupBackgroundLocationRequest(LocationRequest req) {
Display d = Display.getInstance();
String priorityStr = d.getProperty("android.backgroundLocation.priority", "PRIORITY_BALANCED_POWER_ACCURACY");
String fastestIntervalStr = d.getProperty("android.backgroundLocation.fastestInterval", "5000");
String intervalStr = d.getProperty("android.backgroundLocation.interval", "10000");
String smallestDisplacementStr = d.getProperty("android.backgroundLocation.smallestDisplacement", "50");
int priority = LocationRequest.PRIORITY_BALANCED_POWER_ACCURACY;
if ("PRIORITY_HIGH_ACCURACY".equals(priorityStr)) {
priority = LocationRequest.PRIORITY_HIGH_ACCURACY;
} else if ("PRIORITY_LOW_POWER".equals(priorityStr)) {
priority = LocationRequest.PRIORITY_LOW_POWER;
} else if ("PRIORITY_NO_POWER".equals(priorityStr)) {
priority = LocationRequest.PRIORITY_NO_POWER;
}
long interval = Long.parseLong(intervalStr);
long fastestInterval = Long.parseLong(fastestIntervalStr);
int smallestDisplacement = Integer.parseInt(smallestDisplacementStr);
req.setPriority(priority)
.setFastestInterval(fastestInterval)
.setInterval(interval)
.setSmallestDisplacement(smallestDisplacement);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setupBackgroundLocationRequest
File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
setupBackgroundLocationRequest
|
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
public List<RequestFilter> getRequestFilters() {
return Collections.unmodifiableList(requestFilters);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRequestFilters
File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
Repository: AsyncHttpClient/async-http-client
The code follows secure coding practices.
|
[
"CWE-345"
] |
CVE-2013-7397
|
MEDIUM
| 4.3
|
AsyncHttpClient/async-http-client
|
getRequestFilters
|
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
|
df6ed70e86c8fc340ed75563e016c8baa94d7e72
| 0
|
Analyze the following code function for security vulnerabilities
|
public void requestBugReport(int bugreportType) {
String service = null;
switch (bugreportType) {
case ActivityManager.BUGREPORT_OPTION_FULL:
service = "bugreport";
break;
case ActivityManager.BUGREPORT_OPTION_INTERACTIVE:
service = "bugreportplus";
break;
case ActivityManager.BUGREPORT_OPTION_REMOTE:
service = "bugreportremote";
break;
}
if (service == null) {
throw new IllegalArgumentException("Provided bugreport type is not correct, value: "
+ bugreportType);
}
enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport");
SystemProperties.set("ctl.start", service);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReport
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3912
|
HIGH
| 9.3
|
android
|
requestBugReport
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
6c049120c2d749f0c0289d822ec7d0aa692f55c5
| 0
|
Analyze the following code function for security vulnerabilities
|
private native void nativeDestroyWebContents(long nativeTabAndroid, boolean deleteNative);
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeDestroyWebContents
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2014-3159
|
MEDIUM
| 6.4
|
chromium
|
nativeDestroyWebContents
|
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
|
98a50b76141f0b14f292f49ce376e6554142d5e2
| 0
|
Analyze the following code function for security vulnerabilities
|
public XWikiAttachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName)
{
XWikiContext context = this.contextProvider.get();
XWikiAttachment result = null;
try {
Part part = context.getRequest().getPart(fieldName);
if (part != null) {
result = this.temporaryAttachmentSessionsManager.uploadAttachment(documentReference, part);
}
} catch (IOException | ServletException e) {
logger.warn("Error while reading the request content part: [{}]", ExceptionUtils.getRootCauseMessage(e));
} catch (TemporaryAttachmentException e) {
logger.warn("Error while uploading the attachment: [{}]", ExceptionUtils.getRootCauseMessage(e));
}
return result;
}
|
Vulnerability Classification:
- CWE: CWE-749
- CVE: CVE-2023-26478
- Severity: HIGH
- CVSS Score: 8.1
Description: XWIKI-20180: TemporaryAttachmentsScriptService#uploadTemporaryAttachment return an XWikiAttachment instance
Function: uploadTemporaryAttachment
File: xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java
Repository: xwiki/xwiki-platform
Fixed Code:
public Attachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName)
{
XWikiContext context = this.contextProvider.get();
Optional<XWikiAttachment> result = Optional.empty();
try {
Part part = context.getRequest().getPart(fieldName);
if (part != null) {
result = Optional.of(this.temporaryAttachmentSessionsManager.uploadAttachment(documentReference, part));
}
} catch (IOException | ServletException e) {
this.logger.warn("Error while reading the request content part: [{}]", getRootCauseMessage(e));
} catch (TemporaryAttachmentException e) {
this.logger.warn("Error while uploading the attachment: [{}]", getRootCauseMessage(e));
}
return result.map(attachment -> {
Document document = Optional.ofNullable(attachment.getDoc())
.map(doc -> doc.newDocument(context))
.orElse(null);
return new Attachment(document, attachment, context);
}).orElse(null);
}
|
[
"CWE-749"
] |
CVE-2023-26478
|
HIGH
| 8.1
|
xwiki/xwiki-platform
|
uploadTemporaryAttachment
|
xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java
|
3c73c59e39b6436b1074d8834cf276916010014d
| 1
|
Analyze the following code function for security vulnerabilities
|
@Override
public void startProcess(String processName, ApplicationInfo info, boolean knownToBeDead,
boolean isTop, String hostingType, ComponentName hostingName) {
try {
if (Trace.isTagEnabled(Trace.TRACE_TAG_ACTIVITY_MANAGER)) {
Trace.traceBegin(Trace.TRACE_TAG_ACTIVITY_MANAGER, "startProcess:"
+ processName);
}
synchronized (ActivityManagerService.this) {
// If the process is known as top app, set a hint so when the process is
// started, the top priority can be applied immediately to avoid cpu being
// preempted by other processes before attaching the process of top app.
startProcessLocked(processName, info, knownToBeDead, 0 /* intentFlags */,
new HostingRecord(hostingType, hostingName, isTop),
ZYGOTE_POLICY_FLAG_LATENCY_SENSITIVE, false /* allowWhileBooting */,
false /* isolated */);
}
} finally {
Trace.traceEnd(Trace.TRACE_TAG_ACTIVITY_MANAGER);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startProcess
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21292
|
MEDIUM
| 5.5
|
android
|
startProcess
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
d10b27e539f7bc91c2360d429b9d05f05274670d
| 0
|
Analyze the following code function for security vulnerabilities
|
private static byte[] generateSignatureFile(
List<Integer> apkSignatureSchemeIds,
DigestAlgorithm manifestDigestAlgorithm,
String createdBy,
OutputManifestFile manifest) throws NoSuchAlgorithmException {
Manifest sf = new Manifest();
Attributes mainAttrs = sf.getMainAttributes();
mainAttrs.put(Attributes.Name.SIGNATURE_VERSION, ATTRIBUTE_VALUE_SIGNATURE_VERSION);
mainAttrs.put(ATTRIBUTE_NAME_CREATED_BY, createdBy);
if (!apkSignatureSchemeIds.isEmpty()) {
// Add APK Signature Scheme v2 (and newer) signature stripping protection.
// This attribute indicates that this APK is supposed to have been signed using one or
// more APK-specific signature schemes in addition to the standard JAR signature scheme
// used by this code. APK signature verifier should reject the APK if it does not
// contain a signature for the signature scheme the verifier prefers out of this set.
StringBuilder attrValue = new StringBuilder();
for (int id : apkSignatureSchemeIds) {
if (attrValue.length() > 0) {
attrValue.append(", ");
}
attrValue.append(String.valueOf(id));
}
mainAttrs.put(
SF_ATTRIBUTE_NAME_ANDROID_APK_SIGNED_NAME,
attrValue.toString());
}
// Add main attribute containing the digest of MANIFEST.MF.
MessageDigest md = getMessageDigestInstance(manifestDigestAlgorithm);
mainAttrs.putValue(
getManifestDigestAttributeName(manifestDigestAlgorithm),
Base64.getEncoder().encodeToString(md.digest(manifest.contents)));
ByteArrayOutputStream out = new ByteArrayOutputStream();
try {
SignatureFileWriter.writeMainSection(out, mainAttrs);
} catch (IOException e) {
throw new RuntimeException("Failed to write in-memory .SF file", e);
}
String entryDigestAttributeName = getEntryDigestAttributeName(manifestDigestAlgorithm);
for (Map.Entry<String, byte[]> manifestSection
: manifest.individualSectionsContents.entrySet()) {
String sectionName = manifestSection.getKey();
byte[] sectionContents = manifestSection.getValue();
byte[] sectionDigest = md.digest(sectionContents);
Attributes attrs = new Attributes();
attrs.putValue(
entryDigestAttributeName,
Base64.getEncoder().encodeToString(sectionDigest));
try {
SignatureFileWriter.writeIndividualSection(out, sectionName, attrs);
} catch (IOException e) {
throw new RuntimeException("Failed to write in-memory .SF file", e);
}
}
// A bug in the java.util.jar implementation of Android platforms up to version 1.6 will
// cause a spurious IOException to be thrown if the length of the signature file is a
// multiple of 1024 bytes. As a workaround, add an extra CRLF in this case.
if ((out.size() > 0) && ((out.size() % 1024) == 0)) {
try {
SignatureFileWriter.writeSectionDelimiter(out);
} catch (IOException e) {
throw new RuntimeException("Failed to write to ByteArrayOutputStream", e);
}
}
return out.toByteArray();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateSignatureFile
File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-400"
] |
CVE-2023-21253
|
MEDIUM
| 5.5
|
android
|
generateSignatureFile
|
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
|
41d882324288085fd32ae0bb70dc85f5fd0e2be7
| 0
|
Analyze the following code function for security vulnerabilities
|
private Token getTokenInSession(String tokenId, HttpServletRequest request, boolean pop) {
Token token = null;
HttpSession session = request.getSession(false);
if (session != null) {
token = getToken(tokenId, session, pop);
}
if (token == null) {
String sessionId = request.getHeader(UserPrivilegeValidation.HTTP_SESSIONKEY);
if (StringUtil.isDefined(sessionId)) {
SessionManagement sessionManagement = SessionManagementProvider.getSessionManagement();
SessionInfo sessionInfo = sessionManagement.getSessionInfo(sessionId);
if (sessionInfo.isDefined()) {
token = sessionInfo.getAttribute(tokenId);
if (token != null && pop) {
sessionInfo.unsetAttribute(tokenId);
}
}
}
}
return (token == null ? SynchronizerToken.NoneToken : token);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTokenInSession
File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2023-47324
|
MEDIUM
| 5.4
|
Silverpeas/Silverpeas-Core
|
getTokenInSession
|
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
|
9a55728729a3b431847045c674b3e883507d1e1a
| 0
|
Analyze the following code function for security vulnerabilities
|
@POST
@Path("externalpage")
@Operation(summary = "Update an external page building block", description = "Update an external page building block")
@ApiResponse(responseCode = "200", description = "The course node metadatas", content = {
@Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class)),
@Content(mediaType = "application/xml", schema = @Schema(implementation = CourseNodeVO.class)) })
@ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient")
@ApiResponse(responseCode = "404", description = "The course or parentNode not found")
@Consumes(MediaType.APPLICATION_FORM_URLENCODED)
@Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON})
public Response attachExternalPagePost(@PathParam("courseId") Long courseId, @QueryParam("parentNodeId") String parentNodeId,
@QueryParam("position") Integer position, @QueryParam("shortTitle") @DefaultValue("undefined") String shortTitle,
@QueryParam("longTitle") @DefaultValue("undefined") String longTitle, @QueryParam("objectives") @DefaultValue("undefined") String objectives,
@QueryParam("visibilityExpertRules") String visibilityExpertRules, @QueryParam("accessExpertRules") String accessExpertRules,
@QueryParam("url") String url, @Context HttpServletRequest request) {
return attachExternalPage(courseId, parentNodeId, position, shortTitle, longTitle, objectives, visibilityExpertRules, accessExpertRules, url, request);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: attachExternalPagePost
File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
Repository: OpenOLAT
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2021-41242
|
HIGH
| 7.9
|
OpenOLAT
|
attachExternalPagePost
|
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
|
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
| 0
|
Analyze the following code function for security vulnerabilities
|
private void writeError(PollError error, OutputStream out)
throws IOException
{
out.write(ERROR_TAG_OPEN_START);
out.write(error.getCode().getBytes());
out.write(ERROR_TAG_OPEN_END);
out.write(error.getMessage().getBytes());
out.write(ERROR_TAG_CLOSE);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: writeError
File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
Repository: seam2/jboss-seam
The code follows secure coding practices.
|
[
"CWE-264",
"CWE-200"
] |
CVE-2013-6447
|
MEDIUM
| 5
|
seam2/jboss-seam
|
writeError
|
jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
|
090aa6252affc978a96c388e3fc2c1c2688d9bb5
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void onCreate() {
super.onCreate();
debugLog("onCreate()");
mBinder = new AdapterServiceBinder(this);
mAdapterProperties = new AdapterProperties(this);
mAdapterStateMachine = AdapterState.make(this, mAdapterProperties);
mJniCallbacks = new JniCallbacks(mAdapterStateMachine, mAdapterProperties);
initNative();
mNativeAvailable=true;
mCallbacks = new RemoteCallbackList<IBluetoothCallback>();
//Load the name and address
getAdapterPropertyNative(AbstractionLayer.BT_PROPERTY_BDADDR);
getAdapterPropertyNative(AbstractionLayer.BT_PROPERTY_BDNAME);
mAlarmManager = (AlarmManager) getSystemService(Context.ALARM_SERVICE);
mPowerManager = (PowerManager) getSystemService(Context.POWER_SERVICE);
mSdpManager = SdpManager.init(this);
registerReceiver(mAlarmBroadcastReceiver, new IntentFilter(ACTION_ALARM_WAKEUP));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-362",
"CWE-20"
] |
CVE-2016-3760
|
MEDIUM
| 5.4
|
android
|
onCreate
|
src/com/android/bluetooth/btservice/AdapterService.java
|
122feb9a0b04290f55183ff2f0384c6c53756bd8
| 0
|
Analyze the following code function for security vulnerabilities
|
public void updateShowImeWithHardKeyboard() {
synchronized (mWindowMap) {
final boolean showImeWithHardKeyboard = Settings.Secure.getIntForUser(
mContext.getContentResolver(), Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0,
mCurrentUserId) == 1;
if (mShowImeWithHardKeyboard != showImeWithHardKeyboard) {
mShowImeWithHardKeyboard = showImeWithHardKeyboard;
mH.sendEmptyMessage(H.SEND_NEW_CONFIGURATION);
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateShowImeWithHardKeyboard
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
updateShowImeWithHardKeyboard
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void done() {
final int processing_time = processingTimeMillis();
httplatency.add(processing_time);
logInfo("HTTP " + request().getUri() + " done in " + processing_time + "ms");
deferred.callback(null);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: done
File: src/tsd/HttpQuery.java
Repository: OpenTSDB/opentsdb
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2023-25827
|
MEDIUM
| 6.1
|
OpenTSDB/opentsdb
|
done
|
src/tsd/HttpQuery.java
|
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean getHintDisplayActionInline() {
return (mFlags & FLAG_HINT_DISPLAY_INLINE) != 0;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHintDisplayActionInline
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-21288
|
MEDIUM
| 5.5
|
android
|
getHintDisplayActionInline
|
core/java/android/app/Notification.java
|
726247f4f53e8cc0746175265652fa415a123c0c
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void setTransformRotation(Object nativeTransform, float angle, float x, float y, float z) {
CN1Matrix4f m = (CN1Matrix4f)nativeTransform;
m.reset();
m.rotate(angle, x, y, z);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTransformRotation
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
setTransformRotation
|
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
private List<String> removeInvalidPkgsForMeteredDataRestriction(
int userId, List<String> pkgNames) {
final Set<String> activeAdmins = getActiveAdminPackagesLocked(userId);
final List<String> excludedPkgs = new ArrayList<>();
for (int i = pkgNames.size() - 1; i >= 0; --i) {
final String pkgName = pkgNames.get(i);
// If the package is an active admin, don't restrict it.
if (activeAdmins.contains(pkgName)) {
excludedPkgs.add(pkgName);
continue;
}
// If the package doesn't exist, don't restrict it.
try {
if (!mInjector.getIPackageManager().isPackageAvailable(pkgName, userId)) {
excludedPkgs.add(pkgName);
}
} catch (RemoteException e) {
// Should not happen
}
}
pkgNames.removeAll(excludedPkgs);
return excludedPkgs;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeInvalidPkgsForMeteredDataRestriction
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2023-21284
|
MEDIUM
| 5.5
|
android
|
removeInvalidPkgsForMeteredDataRestriction
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
ed3f25b7222d4cff471f2b7d22d1150348146957
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void positionTaskInStack(int taskId, int stackId, int position) {
enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "positionTaskInStack()");
if (stackId == HOME_STACK_ID) {
throw new IllegalArgumentException(
"positionTaskInStack: Attempt to change the position of task "
+ taskId + " in/to home stack");
}
synchronized (this) {
long ident = Binder.clearCallingIdentity();
try {
if (DEBUG_STACK) Slog.d(TAG_STACK,
"positionTaskInStack: positioning task=" + taskId
+ " in stackId=" + stackId + " at position=" + position);
mStackSupervisor.positionTaskInStackLocked(taskId, stackId, position);
} finally {
Binder.restoreCallingIdentity(ident);
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: positionTaskInStack
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3912
|
HIGH
| 9.3
|
android
|
positionTaskInStack
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
6c049120c2d749f0c0289d822ec7d0aa692f55c5
| 0
|
Analyze the following code function for security vulnerabilities
|
protected String getPrefixFromQualifiedName(String qualifiedName) {
int colonPos = qualifiedName.indexOf(':');
if (colonPos > 0) {
return qualifiedName.substring(0, colonPos);
} else {
return null;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPrefixFromQualifiedName
File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
Repository: jmurty/java-xmlbuilder
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2014-125087
|
MEDIUM
| 5.2
|
jmurty/java-xmlbuilder
|
getPrefixFromQualifiedName
|
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
|
e6fddca201790abab4f2c274341c0bb8835c3e73
| 0
|
Analyze the following code function for security vulnerabilities
|
public List<PeriodicSync> getPeriodicSyncs(EndPoint info) {
synchronized (mAuthorities) {
AuthorityInfo authorityInfo = getAuthorityLocked(info, "getPeriodicSyncs");
ArrayList<PeriodicSync> syncs = new ArrayList<PeriodicSync>();
if (authorityInfo != null) {
for (PeriodicSync item : authorityInfo.periodicSyncs) {
// Copy and send out. Necessary for thread-safety although it's parceled.
syncs.add(new PeriodicSync(item));
}
}
return syncs;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPeriodicSyncs
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2016-2424
|
HIGH
| 7.1
|
android
|
getPeriodicSyncs
|
services/core/java/com/android/server/content/SyncStorageEngine.java
|
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
| 0
|
Analyze the following code function for security vulnerabilities
|
private static native long nativeAssetSeek(long assetPtr, long offset, int whence);
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nativeAssetSeek
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-415"
] |
CVE-2023-40103
|
HIGH
| 7.8
|
android
|
nativeAssetSeek
|
core/java/android/content/res/AssetManager.java
|
c3bc12c484ef3bbca4cec19234437c45af5e584d
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException {
return ClassLoaderUtil.loadClass(classLoader, desc.getName());
}
|
Vulnerability Classification:
- CWE: CWE-502
- CVE: CVE-2016-10750
- Severity: MEDIUM
- CVSS Score: 6.8
Description: Add basic protection against untrusted deserialization.
Function: resolveClass
File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
Repository: hazelcast
Fixed Code:
@Override
protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException {
String name = desc.getName();
if (classFilter != null) {
classFilter.filter(name);
}
return ClassLoaderUtil.loadClass(classLoader, name);
}
|
[
"CWE-502"
] |
CVE-2016-10750
|
MEDIUM
| 6.8
|
hazelcast
|
resolveClass
|
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
|
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
| 1
|
Analyze the following code function for security vulnerabilities
|
@Override
public void createConference(
PhoneAccountHandle connectionManagerPhoneAccount,
String id,
ConnectionRequest request,
boolean isIncoming,
boolean isUnknown,
Session.Info sessionInfo) { }
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createConference
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21283
|
MEDIUM
| 5.5
|
android
|
createConference
|
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
|
9b41a963f352fdb3da1da8c633d45280badfcb24
| 0
|
Analyze the following code function for security vulnerabilities
|
void grantEphemeralAccessLocked(int userId, Intent intent,
int targetAppId, int ephemeralAppId) {
getPackageManagerInternalLocked().
grantEphemeralAccess(userId, intent, targetAppId, ephemeralAppId);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: grantEphemeralAccessLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2018-9492
|
HIGH
| 7.2
|
android
|
grantEphemeralAccessLocked
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
962fb40991f15be4f688d960aa00073683ebdd20
| 0
|
Analyze the following code function for security vulnerabilities
|
public int optInt(String key) {
return optInt(key, 0);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: optInt
File: src/main/java/org/codehaus/jettison/json/JSONObject.java
Repository: jettison-json/jettison
The code follows secure coding practices.
|
[
"CWE-674",
"CWE-787"
] |
CVE-2022-45693
|
HIGH
| 7.5
|
jettison-json/jettison
|
optInt
|
src/main/java/org/codehaus/jettison/json/JSONObject.java
|
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean copyWiki(File sourceDirectory, File targetDirectory) {
try {
Path path = sourceDirectory.toPath();
Path destDir = targetDirectory.toPath();
Files.walkFileTree(path, new CopyVisitor(path, destDir));
return true;
} catch (IOException e) {
log.error("", e);
return false;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copyWiki
File: src/main/java/org/olat/modules/wiki/WikiManager.java
Repository: OpenOLAT
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2021-39180
|
HIGH
| 9
|
OpenOLAT
|
copyWiki
|
src/main/java/org/olat/modules/wiki/WikiManager.java
|
699490be8e931af0ef1f135c55384db1f4232637
| 0
|
Analyze the following code function for security vulnerabilities
|
protected IssuesWithBLOBs insertIssues(IssuesUpdateRequest issuesRequest) {
IssuesWithBLOBs issues = new IssuesWithBLOBs();
BeanUtils.copyBean(issues, issuesRequest);
issues.setId(issuesRequest.getId());
issues.setPlatformId(issuesRequest.getPlatformId());
issues.setCreateTime(System.currentTimeMillis());
issues.setUpdateTime(System.currentTimeMillis());
issues.setNum(getNextNum(issuesRequest.getProjectId()));
issues.setPlatformStatus(issuesRequest.getPlatformStatus());
issues.setCreator(SessionUtils.getUserId());
issuesMapper.insert(issues);
return issues;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: insertIssues
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices.
|
[
"CWE-918"
] |
CVE-2022-23544
|
MEDIUM
| 6.1
|
metersphere
|
insertIssues
|
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
|
d0f95b50737c941b29d507a4cc3545f2dc6ab121
| 0
|
Analyze the following code function for security vulnerabilities
|
private void dispose(@Nullable Disposable disposable) {
if (disposable != null && !disposable.isDisposed()) {
disposable.dispose();
} else if (disposable == null) {
if (signalingDisposable != null && !signalingDisposable.isDisposed()) {
signalingDisposable.dispose();
signalingDisposable = null;
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispose
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices.
|
[
"CWE-732",
"CWE-200"
] |
CVE-2022-41926
|
MEDIUM
| 5.5
|
nextcloud/talk-android
|
dispose
|
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
|
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
| 0
|
Analyze the following code function for security vulnerabilities
|
private boolean addProviderLocked(ResolveInfo ri) {
if ((ri.activityInfo.applicationInfo.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) {
return false;
}
if (!ri.activityInfo.isEnabled()) {
return false;
}
ComponentName componentName = new ComponentName(ri.activityInfo.packageName,
ri.activityInfo.name);
ProviderId providerId = new ProviderId(ri.activityInfo.applicationInfo.uid, componentName);
Provider provider = parseProviderInfoXml(providerId, ri);
if (provider != null) {
// we might have an inactive entry for this provider already due to
// a preceding restore operation. if so, fix it up in place; otherwise
// just add this new one.
Provider existing = lookupProviderLocked(providerId);
// If the provider was not found it may be because it was restored and
// we did not know its UID so let us find if there is such one.
if (existing == null) {
ProviderId restoredProviderId = new ProviderId(UNKNOWN_UID, componentName);
existing = lookupProviderLocked(restoredProviderId);
}
if (existing != null) {
if (existing.zombie && !mSafeMode) {
// it's a placeholder that was set up during an app restore
existing.id = providerId;
existing.zombie = false;
existing.info = provider.info; // the real one filled out from the ResolveInfo
if (DEBUG) {
Slog.i(TAG, "Provider placeholder now reified: " + existing);
}
}
} else {
mProviders.add(provider);
}
return true;
}
return false;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addProviderLocked
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2015-1541
|
MEDIUM
| 4.3
|
android
|
addProviderLocked
|
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
|
0b98d304c467184602b4c6bce76fda0b0274bc07
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public int getTextLength() throws IOException
{
if (_currToken != null) { // null only before/after document
if (_tokenIncomplete) {
_finishToken();
}
if (_currToken == JsonToken.VALUE_STRING) {
return _textBuffer.size();
}
if (_currToken == JsonToken.FIELD_NAME) {
return _parsingContext.getCurrentName().length();
}
if ((_currToken == JsonToken.VALUE_NUMBER_INT)
|| (_currToken == JsonToken.VALUE_NUMBER_FLOAT)) {
return getNumberValue().toString().length();
}
return _currToken.asCharArray().length;
}
return 0;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTextLength
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices.
|
[
"CWE-770"
] |
CVE-2020-28491
|
MEDIUM
| 5
|
FasterXML/jackson-dataformats-binary
|
getTextLength
|
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
|
de072d314af8f5f269c8abec6930652af67bc8e6
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
boolean forAllWindows(ToBooleanFunction<WindowState> callback, boolean traverseTopToBottom) {
if (mChildren.isEmpty()) {
// The window has no children so we just return it.
return applyInOrderWithImeWindows(callback, traverseTopToBottom);
}
if (traverseTopToBottom) {
return forAllWindowTopToBottom(callback);
} else {
return forAllWindowBottomToTop(callback);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forAllWindows
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-35674
|
HIGH
| 7.8
|
android
|
forAllWindows
|
services/core/java/com/android/server/wm/WindowState.java
|
7428962d3b064ce1122809d87af65099d1129c9e
| 0
|
Analyze the following code function for security vulnerabilities
|
private void updateBasePath() {
if (serverIndex != null) {
setBasePath(servers.get(serverIndex).URL(serverVariables));
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateBasePath
File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
updateBasePath
|
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isBuiltinSoundAvailable(String soundIdentifier) {
return false;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isBuiltinSoundAvailable
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2022-4903
|
MEDIUM
| 5.1
|
codenameone/CodenameOne
|
isBuiltinSoundAvailable
|
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
|
dad49c9ef26a598619fc48d2697151a02987d478
| 0
|
Analyze the following code function for security vulnerabilities
|
@Deprecated // since 2.12
protected Object _coerceNullToken(DeserializationContext ctxt, boolean isPrimitive) throws JsonMappingException
{
if (isPrimitive) {
_verifyNullForPrimitive(ctxt);
}
return getNullValue(ctxt);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _coerceNullToken
File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices.
|
[
"CWE-502"
] |
CVE-2022-42003
|
HIGH
| 7.5
|
FasterXML/jackson-databind
|
_coerceNullToken
|
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
|
d78d00ee7b5245b93103fef3187f70543d67ca33
| 0
|
Analyze the following code function for security vulnerabilities
|
@SuppressWarnings("unchecked")
private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) {
Map < String, Property<?>> result = new HashMap<>();
if (null != properties) {
properties.forEach(property -> {
// Initiate with name and value
String name = (String) property.get(PROPERTY_PARAMNAME);
if (null == name) {
throw new IllegalArgumentException("Invalid YAML File: 'name' is expected for properties");
}
Object objValue = property.get(PROPERTY_PARAMVALUE);
if (null == objValue) {
throw new IllegalArgumentException("Invalid YAML File: 'value' is expected for properties");
}
// Convert as a String
String strValue = String.valueOf(objValue);
if (objValue instanceof Date) {
strValue = SIMPLE_DATE_FORMAT.format((Date) objValue);
}
Property<?> ap = new PropertyString(name, strValue);
String optionalType = (String) property.get(PROPERTY_PARAMTYPE);
// If specific type defined ?
if (null != optionalType) {
// Substitution if relevant (e.g. 'int' -> 'org.ff4j.property.PropertyInt')
optionalType = MappingUtil.mapPropertyType(optionalType);
try {
// Constructor (String, String) is mandatory in Property interface
Constructor<?> constr = Class.forName(optionalType).getConstructor(String.class, String.class);
ap = (Property<?>) constr.newInstance(name, strValue);
} catch (Exception e) {
throw new IllegalArgumentException("Cannot instantiate '" + optionalType + "' check default constructor", e);
}
}
// Description
String description = (String) property.get(PROPERTY_PARAMDESCRIPTION);
if (null != description) {
ap.setDescription(description);
}
// Fixed Values
List<Object> fixedValues = (List<Object>) property.get(PROPERTY_PARAMFIXED_VALUES);
if (null != fixedValues && fixedValues.size() > 0) {
fixedValues.stream().map(Object::toString).forEach(ap::add2FixedValueFromString);
}
// Check fixed value
if (ap.getFixedValues() != null &&
!ap.getFixedValues().isEmpty() &&
!ap.getFixedValues().contains(ap.getValue())) {
throw new IllegalArgumentException("Cannot create property <" + ap.getName() +
"> invalid value <" + ap.getValue() +
"> expected one of " + ap.getFixedValues());
}
result.put(ap.getName(), ap);
});
}
return result;
}
|
Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-44262
- Severity: CRITICAL
- CVSS Score: 9.8
Description: fix: Add assignable check to PropertiesParser, YamlParser and XmlParser (#624)
Function: parseProperties
File: ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java
Repository: ff4j
Fixed Code:
@SuppressWarnings("unchecked")
private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) {
Map < String, Property<?>> result = new HashMap<>();
if (null != properties) {
properties.forEach(property -> {
// Initiate with name and value
String name = (String) property.get(PROPERTY_PARAMNAME);
if (null == name) {
throw new IllegalArgumentException("Invalid YAML File: 'name' is expected for properties");
}
Object objValue = property.get(PROPERTY_PARAMVALUE);
if (null == objValue) {
throw new IllegalArgumentException("Invalid YAML File: 'value' is expected for properties");
}
// Convert as a String
String strValue = String.valueOf(objValue);
if (objValue instanceof Date) {
strValue = SIMPLE_DATE_FORMAT.format((Date) objValue);
}
Property<?> ap = new PropertyString(name, strValue);
String optionalType = (String) property.get(PROPERTY_PARAMTYPE);
// If specific type defined ?
if (null != optionalType) {
// Substitution if relevant (e.g. 'int' -> 'org.ff4j.property.PropertyInt')
optionalType = MappingUtil.mapPropertyType(optionalType);
try {
// Constructor (String, String) is mandatory in Property interface
Class<?> typeClass = Class.forName(optionalType);
if (!Property.class.isAssignableFrom(typeClass)) {
throw new IllegalArgumentException("Cannot create property <" + name + "> invalid type <" + optionalType + ">");
}
Constructor<?> constr = typeClass.getConstructor(String.class, String.class);
ap = (Property<?>) constr.newInstance(name, strValue);
} catch (Exception e) {
throw new IllegalArgumentException("Cannot instantiate '" + optionalType + "' check default constructor", e);
}
}
// Description
String description = (String) property.get(PROPERTY_PARAMDESCRIPTION);
if (null != description) {
ap.setDescription(description);
}
// Fixed Values
List<Object> fixedValues = (List<Object>) property.get(PROPERTY_PARAMFIXED_VALUES);
if (null != fixedValues && fixedValues.size() > 0) {
fixedValues.stream().map(Object::toString).forEach(ap::add2FixedValueFromString);
}
// Check fixed value
if (ap.getFixedValues() != null &&
!ap.getFixedValues().isEmpty() &&
!ap.getFixedValues().contains(ap.getValue())) {
throw new IllegalArgumentException("Cannot create property <" + ap.getName() +
"> invalid value <" + ap.getValue() +
"> expected one of " + ap.getFixedValues());
}
result.put(ap.getName(), ap);
});
}
return result;
}
|
[
"CWE-Other"
] |
CVE-2022-44262
|
CRITICAL
| 9.8
|
ff4j
|
parseProperties
|
ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java
|
e915c026aef46b502934cb05a825ea2ea15eb9e6
| 1
|
Analyze the following code function for security vulnerabilities
|
private boolean isCallerChooserActivity() {
// TODO(b/228975502): Migrate this check to a proper permission or role check
final int callingUid = injectBinderCallingUid();
ComponentName systemChooser = injectChooserActivity();
if (systemChooser == null) {
return false;
}
int uid = injectGetPackageUid(systemChooser.getPackageName(), UserHandle.USER_SYSTEM);
return UserHandle.getAppId(uid) == UserHandle.getAppId(callingUid);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isCallerChooserActivity
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40079
|
HIGH
| 7.8
|
android
|
isCallerChooserActivity
|
services/core/java/com/android/server/pm/ShortcutService.java
|
96e0524c48c6e58af7d15a2caf35082186fc8de2
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isOverWriteExistingData() {
return overWriteExistingData;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOverWriteExistingData
File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
Repository: quartz-scheduler/quartz
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2019-13990
|
HIGH
| 7.5
|
quartz-scheduler/quartz
|
isOverWriteExistingData
|
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
|
a1395ba118df306c7fe67c24fb0c9a95a4473140
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public String buildMetadataResponse(MetaData metaData) throws SAMLException {
EntityDescriptorType root = new EntityDescriptorType();
root.setID("_" + metaData.id);
root.setEntityID(metaData.entityId);
if (metaData.idp != null) {
IDPSSODescriptorType idp = new IDPSSODescriptorType();
idp.getProtocolSupportEnumeration().add("urn:oasis:names:tc:SAML:2.0:protocol");
metaData.idp.redirectBindingSignInEndpoints.forEach(endpoint -> {
EndpointType signIn = new EndpointType();
signIn.setBinding(Binding.HTTP_Redirect.toSAMLFormat());
signIn.setLocation(endpoint);
idp.getSingleSignOnService().add(signIn);
});
metaData.idp.postBindingSignInEndpoints.forEach(endpoint -> {
EndpointType signIn = new EndpointType();
signIn.setBinding(Binding.HTTP_POST.toSAMLFormat());
signIn.setLocation(endpoint);
idp.getSingleSignOnService().add(signIn);
});
metaData.idp.redirectBindingLogoutEndpoints.forEach(endpoint -> {
EndpointType logOut = new EndpointType();
logOut.setBinding(Binding.HTTP_Redirect.toSAMLFormat());
logOut.setLocation(endpoint);
idp.getSingleLogoutService().add(logOut);
});
metaData.idp.postBindingLogoutEndpoints.forEach(endpoint -> {
EndpointType logOut = new EndpointType();
logOut.setBinding(Binding.HTTP_POST.toSAMLFormat());
logOut.setLocation(endpoint);
idp.getSingleLogoutService().add(logOut);
});
// Add certificates
addKeyDescriptors(idp, metaData.idp.certificates);
root.getRoleDescriptorOrIDPSSODescriptorOrSPSSODescriptor().add(idp);
}
if (metaData.sp != null) {
SPSSODescriptorType sp = new SPSSODescriptorType();
sp.getProtocolSupportEnumeration().add("urn:oasis:names:tc:SAML:2.0:protocol");
sp.setAuthnRequestsSigned(metaData.sp.authnRequestsSigned);
sp.setWantAssertionsSigned(metaData.sp.wantAssertionsSigned);
if (metaData.sp.acsEndpoint != null) {
IndexedEndpointType acs = new IndexedEndpointType();
acs.setBinding(Binding.HTTP_POST.toSAMLFormat());
acs.setLocation(metaData.sp.acsEndpoint);
sp.getAssertionConsumerService().add(acs);
}
if (metaData.sp.nameIDFormat != null) {
sp.getNameIDFormat().add(metaData.sp.nameIDFormat.toSAMLFormat());
}
// Add certificates
addKeyDescriptors(sp, metaData.sp.certificates);
root.getRoleDescriptorOrIDPSSODescriptorOrSPSSODescriptor().add(sp);
}
// Convert to String
byte[] bytes = marshallToBytes(METADATA_OBJECT_FACTORY.createEntityDescriptor(root), EntityDescriptorType.class);
return new String(bytes, StandardCharsets.UTF_8);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildMetadataResponse
File: src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
Repository: FusionAuth/fusionauth-samlv2
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2021-27736
|
MEDIUM
| 4
|
FusionAuth/fusionauth-samlv2
|
buildMetadataResponse
|
src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
|
c66fb689d50010662f705d5b585c6388ce555dbd
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void onFinishedClosing() {
mSelectedAction = -1;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFinishedClosing
File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40098
|
MEDIUM
| 5.5
|
android
|
onFinishedClosing
|
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
|
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected <RemoteInterfaceType, RemoteCallResponseType, FinalResponseType> NodeResponse<FinalResponseType> doNodeApiCall(
String nodeId, Class<RemoteInterfaceType> interfaceClass, Function<RemoteInterfaceType,
Call<RemoteCallResponseType>> remoteInterfaceFunction, Function<RemoteCallResponseType, FinalResponseType> transformer,
Duration timeout) throws IOException {
return super.doNodeApiCall(nodeId, interfaceClass, remoteInterfaceFunction, transformer, timeout);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doNodeApiCall
File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
Repository: Graylog2/graylog2-server
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2023-41044
|
LOW
| 3.8
|
Graylog2/graylog2-server
|
doNodeApiCall
|
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
|
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public long forceNetworkLogs() {
Preconditions.checkCallAuthorization(isAdb(getCallerIdentity())
|| hasCallingOrSelfPermission(permission.FORCE_DEVICE_POLICY_MANAGER_LOGS),
"Caller must be shell or hold FORCE_DEVICE_POLICY_MANAGER_LOGS to call "
+ "forceNetworkLogs");
synchronized (getLockObject()) {
if (!isNetworkLoggingEnabledInternalLocked()) {
throw new IllegalStateException("logging is not available");
}
if (mNetworkLogger != null) {
return mInjector.binderWithCleanCallingIdentity(
() -> mNetworkLogger.forceBatchFinalization());
}
return 0;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: forceNetworkLogs
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2023-21284
|
MEDIUM
| 5.5
|
android
|
forceNetworkLogs
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
ed3f25b7222d4cff471f2b7d22d1150348146957
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void startDelegateShellPermissionIdentity(int delegateUid,
@Nullable String[] permissions) {
if (UserHandle.getCallingAppId() != Process.SHELL_UID
&& UserHandle.getCallingAppId() != Process.ROOT_UID) {
throw new SecurityException("Only the shell can delegate its permissions");
}
// We allow delegation only to one instrumentation started from the shell
synchronized (mProcLock) {
// If the delegate is already set up for the target UID, nothing to do.
if (mAppOpsService.getAppOpsServiceDelegate() != null) {
if (!(mAppOpsService.getAppOpsServiceDelegate() instanceof ShellDelegate)) {
throw new IllegalStateException("Bad shell delegate state");
}
final ShellDelegate delegate = (ShellDelegate) mAppOpsService
.getAppOpsServiceDelegate();
if (delegate.getDelegateUid() != delegateUid) {
throw new SecurityException("Shell can delegate permissions only "
+ "to one instrumentation at a time");
}
}
final int instrCount = mActiveInstrumentation.size();
for (int i = 0; i < instrCount; i++) {
final ActiveInstrumentation instr = mActiveInstrumentation.get(i);
if (instr.mTargetInfo.uid != delegateUid) {
continue;
}
// If instrumentation started from the shell the connection is not null
if (instr.mUiAutomationConnection == null) {
throw new SecurityException("Shell can delegate its permissions" +
" only to an instrumentation started from the shell");
}
// Hook them up...
final ShellDelegate shellDelegate = new ShellDelegate(delegateUid,
permissions);
mAppOpsService.setAppOpsServiceDelegate(shellDelegate);
final String packageName = instr.mTargetInfo.packageName;
final List<String> permissionNames = permissions != null ?
Arrays.asList(permissions) : null;
getPermissionManagerInternal().startShellPermissionIdentityDelegation(
delegateUid, packageName, permissionNames);
return;
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startDelegateShellPermissionIdentity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21292
|
MEDIUM
| 5.5
|
android
|
startDelegateShellPermissionIdentity
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
d10b27e539f7bc91c2360d429b9d05f05274670d
| 0
|
Analyze the following code function for security vulnerabilities
|
public AutoCompletionCandidates doAutoCompleteAssignedLabelString(@QueryParameter String value) {
AutoCompletionCandidates c = new AutoCompletionCandidates();
Set<Label> labels = Jenkins.getInstance().getLabels();
List<String> queries = new AutoCompleteSeeder(value).getSeeds();
for (String term : queries) {
for (Label l : labels) {
if (l.getName().startsWith(term)) {
c.add(l.getName());
}
}
}
return c;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doAutoCompleteAssignedLabelString
File: core/src/main/java/hudson/model/AbstractProject.java
Repository: jenkinsci/jenkins
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2013-7330
|
MEDIUM
| 4
|
jenkinsci/jenkins
|
doAutoCompleteAssignedLabelString
|
core/src/main/java/hudson/model/AbstractProject.java
|
36342d71e29e0620f803a7470ce96c61761648d8
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void killApplication(String pkg, int appId, int userId, String reason) {
if (pkg == null) {
return;
}
// Make sure the uid is valid.
if (appId < 0) {
Slog.w(TAG, "Invalid appid specified for pkg : " + pkg);
return;
}
int callerUid = Binder.getCallingUid();
// Only the system server can kill an application
if (UserHandle.getAppId(callerUid) == Process.SYSTEM_UID) {
// Post an aysnc message to kill the application
Message msg = mHandler.obtainMessage(KILL_APPLICATION_MSG);
msg.arg1 = appId;
msg.arg2 = userId;
Bundle bundle = new Bundle();
bundle.putString("pkg", pkg);
bundle.putString("reason", reason);
msg.obj = bundle;
mHandler.sendMessage(msg);
} else {
throw new SecurityException(callerUid + " cannot kill pkg: " +
pkg);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: killApplication
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3912
|
HIGH
| 9.3
|
android
|
killApplication
|
services/core/java/com/android/server/am/ActivityManagerService.java
|
6c049120c2d749f0c0289d822ec7d0aa692f55c5
| 0
|
Analyze the following code function for security vulnerabilities
|
ObjectStreamField[] getLoadFields() {
return loadFields;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLoadFields
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2014-7911
|
HIGH
| 7.2
|
android
|
getLoadFields
|
luni/src/main/java/java/io/ObjectStreamClass.java
|
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public ParceledListSlice<ApplicationInfo> getInstalledApplications(int flags, int userId) {
if (!sUserManager.exists(userId)) return null;
final boolean listUninstalled = (flags & PackageManager.GET_UNINSTALLED_PACKAGES) != 0;
// writer
synchronized (mPackages) {
ArrayList<ApplicationInfo> list;
if (listUninstalled) {
list = new ArrayList<ApplicationInfo>(mSettings.mPackages.size());
for (PackageSetting ps : mSettings.mPackages.values()) {
ApplicationInfo ai;
if (ps.pkg != null) {
ai = PackageParser.generateApplicationInfo(ps.pkg, flags,
ps.readUserState(userId), userId);
} else {
ai = generateApplicationInfoFromSettingsLPw(ps.name, flags, userId);
}
if (ai != null) {
list.add(ai);
}
}
} else {
list = new ArrayList<ApplicationInfo>(mPackages.size());
for (PackageParser.Package p : mPackages.values()) {
if (p.mExtras != null) {
ApplicationInfo ai = PackageParser.generateApplicationInfo(p, flags,
((PackageSetting)p.mExtras).readUserState(userId), userId);
if (ai != null) {
list.add(ai);
}
}
}
}
return new ParceledListSlice<ApplicationInfo>(list);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInstalledApplications
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-119"
] |
CVE-2016-2497
|
HIGH
| 7.5
|
android
|
getInstalledApplications
|
services/core/java/com/android/server/pm/PackageManagerService.java
|
a75537b496e9df71c74c1d045ba5569631a16298
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getSerialFrom() {
return serialFrom;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSerialFrom
File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
Repository: dogtagpki/pki
The code follows secure coding practices.
|
[
"CWE-611"
] |
CVE-2022-2414
|
HIGH
| 7.5
|
dogtagpki/pki
|
getSerialFrom
|
base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
|
16deffdf7548e305507982e246eb9fd1eac414fd
| 0
|
Analyze the following code function for security vulnerabilities
|
private void testWrongParameters() {
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createPgServer("-pgPort 8182"));
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createTcpServer("-tcpPort 8182"));
assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createWebServer("-webPort=8182"));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testWrongParameters
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices.
|
[
"CWE-312"
] |
CVE-2022-45868
|
HIGH
| 7.8
|
h2database
|
testWrongParameters
|
h2/src/test/org/h2/test/server/TestWeb.java
|
23ee3d0b973923c135fa01356c8eaed40b895393
| 0
|
Analyze the following code function for security vulnerabilities
|
private List<EnforcingUser> getEnforcingUsers(Set<EnforcingAdmin> admins) {
List<EnforcingUser> enforcingUsers = new ArrayList();
ComponentName deviceOwner = mOwners.getDeviceOwnerComponent();
for (EnforcingAdmin admin : admins) {
if (deviceOwner != null
&& deviceOwner.getPackageName().equals(admin.getPackageName())) {
enforcingUsers.add(new EnforcingUser(admin.getUserId(),
UserManager.RESTRICTION_SOURCE_DEVICE_OWNER));
} else {
enforcingUsers.add(new EnforcingUser(admin.getUserId(),
UserManager.RESTRICTION_SOURCE_PROFILE_OWNER));
}
}
return enforcingUsers;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEnforcingUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-40089
|
HIGH
| 7.8
|
android
|
getEnforcingUsers
|
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
|
e2e05f488da6abc765a62e7faf10cb74e729732e
| 0
|
Analyze the following code function for security vulnerabilities
|
@MediumTest
@Test
public void testDropCdmaEnhancedPrivacyVoiceCall() throws Exception {
mConnectionServiceFixtureA.mConnectionServiceDelegate.mProperties =
Connection.PROPERTY_HAS_CDMA_VOICE_PRIVACY;
IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212",
mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA);
assertEquals(Call.STATE_ACTIVE, mInCallServiceFixtureX.getCall(ids.mCallId).getState());
mConnectionServiceFixtureA.mLatestConnection.setConnectionProperties(0);
assertFalse(Call.Details.hasProperty(
mInCallServiceFixtureX.getCall(ids.mCallId).getProperties(),
Call.Details.PROPERTY_HAS_CDMA_VOICE_PRIVACY));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDropCdmaEnhancedPrivacyVoiceCall
File: tests/src/com/android/server/telecom/tests/BasicCallTests.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-21283
|
MEDIUM
| 5.5
|
android
|
testDropCdmaEnhancedPrivacyVoiceCall
|
tests/src/com/android/server/telecom/tests/BasicCallTests.java
|
9b41a963f352fdb3da1da8c633d45280badfcb24
| 0
|
Analyze the following code function for security vulnerabilities
|
public boolean isNearMeFeatureEnabled() {
return CONF.postsNearMeEnabled();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isNearMeFeatureEnabled
File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java
Repository: Erudika/scoold
The code follows secure coding practices.
|
[
"CWE-130"
] |
CVE-2022-1543
|
MEDIUM
| 6.5
|
Erudika/scoold
|
isNearMeFeatureEnabled
|
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
|
62a0e92e1486ddc17676a7ead2c07ff653d167ce
| 0
|
Analyze the following code function for security vulnerabilities
|
public void addOnShowModeChangedListener(@NonNull OnShowModeChangedListener listener) {
addOnShowModeChangedListener(listener, null);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addOnShowModeChangedListener
File: core/java/android/accessibilityservice/AccessibilityService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-284"
] |
CVE-2016-3923
|
MEDIUM
| 4.3
|
android
|
addOnShowModeChangedListener
|
core/java/android/accessibilityservice/AccessibilityService.java
|
5f256310187b4ff2f13a7abb9afed9126facd7bc
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public InternationalString getDescriptionText(final String code) throws FactoryException {
IdentifiedObject identifiedObject = createObject(code);
final Identifier identifier = identifiedObject.getName();
if (identifier instanceof GenericName) {
return ((GenericName) identifier).toInternationalString();
}
return new SimpleInternationalString(identifier.getCode());
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDescriptionText
File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
Repository: geotools
The code follows secure coding practices.
|
[
"CWE-917"
] |
CVE-2022-24818
|
HIGH
| 7.5
|
geotools
|
getDescriptionText
|
modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
|
4f70fa3234391dd0cda883a20ab0ec75688cba49
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void deleteMediaPackage(String mediaPackageId, Date deletionDate) throws SearchServiceDatabaseException,
NotFoundException {
EntityManager em = null;
EntityTransaction tx = null;
try {
em = emf.createEntityManager();
tx = em.getTransaction();
tx.begin();
SearchEntity searchEntity = getSearchEntity(mediaPackageId, em);
if (searchEntity == null)
throw new NotFoundException("No media package with id=" + mediaPackageId + " exists");
// Ensure this user is allowed to delete this episode
String accessControlXml = searchEntity.getAccessControl();
if (accessControlXml != null) {
AccessControlList acl = AccessControlParser.parseAcl(accessControlXml);
User currentUser = securityService.getUser();
Organization currentOrg = securityService.getOrganization();
if (!AccessControlUtil.isAuthorized(acl, currentUser, currentOrg, WRITE.toString()))
throw new UnauthorizedException(currentUser + " is not authorized to delete media package " + mediaPackageId);
searchEntity.setDeletionDate(deletionDate);
em.merge(searchEntity);
}
tx.commit();
} catch (NotFoundException e) {
throw e;
} catch (Exception e) {
logger.error("Could not delete episode {}: {}", mediaPackageId, e.getMessage());
if (tx.isActive()) {
tx.rollback();
}
throw new SearchServiceDatabaseException(e);
} finally {
if (em != null)
em.close();
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: deleteMediaPackage
File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
Repository: opencast
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2021-21318
|
MEDIUM
| 5.5
|
opencast
|
deleteMediaPackage
|
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
|
b18c6a7f81f08ed14884592a6c14c9ab611ad450
| 0
|
Analyze the following code function for security vulnerabilities
|
protected final void destroyContentViewCore(boolean deleteNativeWebContents) {
if (mContentViewCore == null) return;
destroyContentViewCoreInternal(mContentViewCore);
if (mInfoBarContainer != null && mInfoBarContainer.getParent() != null) {
mInfoBarContainer.removeFromParentView();
}
mContentViewCore.destroy();
mContentViewCore = null;
mWebContentsDelegate = null;
mWebContentsObserver = null;
mVoiceSearchTabHelper = null;
assert mNativeTabAndroid != 0;
nativeDestroyWebContents(mNativeTabAndroid, deleteNativeWebContents);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: destroyContentViewCore
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2014-3159
|
MEDIUM
| 6.4
|
chromium
|
destroyContentViewCore
|
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
|
98a50b76141f0b14f292f49ce376e6554142d5e2
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
protected void dumpFilter(PrintWriter out, String prefix,
PackageParser.ProviderIntentInfo filter) {
out.print(prefix);
out.print(
Integer.toHexString(System.identityHashCode(filter.provider)));
out.print(' ');
filter.provider.printComponentShortName(out);
out.print(" filter ");
out.println(Integer.toHexString(System.identityHashCode(filter)));
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpFilter
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-119"
] |
CVE-2016-2497
|
HIGH
| 7.5
|
android
|
dumpFilter
|
services/core/java/com/android/server/pm/PackageManagerService.java
|
a75537b496e9df71c74c1d045ba5569631a16298
| 0
|
Analyze the following code function for security vulnerabilities
|
public static HtmlForm getHtmlFormFromUiResource(ResourceFactory resourceFactory, FormService formService,
HtmlFormEntryService htmlFormEntryService, String providerAndPath, Encounter encounter) throws IOException {
int ind = providerAndPath.indexOf(':');
String provider = providerAndPath.substring(0, ind);
String path = providerAndPath.substring(ind + 1);
return getHtmlFormFromUiResource(resourceFactory, formService, htmlFormEntryService, provider, path, encounter);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHtmlFormFromUiResource
File: api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java
Repository: openmrs/openmrs-module-htmlformentryui
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2021-4284
|
MEDIUM
| 6.1
|
openmrs/openmrs-module-htmlformentryui
|
getHtmlFormFromUiResource
|
api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java
|
811990972ea07649ae33c4b56c61c3b520895f07
| 0
|
Analyze the following code function for security vulnerabilities
|
public DisplayContent getDisplayContentLocked(final int displayId) {
DisplayContent displayContent = mDisplayContents.get(displayId);
if (displayContent == null) {
final Display display = mDisplayManager.getDisplay(displayId);
if (display != null) {
displayContent = newDisplayContentLocked(display);
}
}
return displayContent;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDisplayContentLocked
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-264"
] |
CVE-2016-3875
|
HIGH
| 7.2
|
android
|
getDisplayContentLocked
|
services/core/java/com/android/server/wm/WindowManagerService.java
|
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
| 0
|
Analyze the following code function for security vulnerabilities
|
public ApiClient setTempFolderPath(String tempFolderPath) {
this.tempFolderPath = tempFolderPath;
return this;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTempFolderPath
File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
Repository: OpenAPITools/openapi-generator
The code follows secure coding practices.
|
[
"CWE-668"
] |
CVE-2021-21430
|
LOW
| 2.1
|
OpenAPITools/openapi-generator
|
setTempFolderPath
|
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
|
2c576483f26f85b3979c6948a131f585c237109a
| 0
|
Analyze the following code function for security vulnerabilities
|
public int copySpaceBetweenWikis(String space, String sourceWiki, String targetWiki, String locale, boolean clean,
XWikiContext context) throws XWikiException
{
String db = context.getWikiId();
int nb = 0;
// Workaround for XWIKI-3915: Do not use XWikiStoreInterface#searchDocumentNames since currently it has the
// side effect of hidding hidden documents and no other workaround exists than directly using
// XWikiStoreInterface#search directly
String sql = "select distinct doc.fullName from XWikiDocument as doc";
List<String> parameters = new ArrayList<>();
if (space != null) {
parameters.add(space);
sql += " where doc.space = ?" + parameters.size();
}
if (clean) {
try {
context.setWikiId(targetWiki);
List<String> list = getStore().search(sql, 0, 0, parameters, context);
LOGGER.info("Deleting [{}] documents from wiki [{}]", list.size(), targetWiki);
for (String docname : list) {
XWikiDocument doc = getDocument(docname, context);
deleteDocument(doc, context);
}
} finally {
context.setWikiId(db);
}
}
try {
context.setWikiId(sourceWiki);
List<String> list = getStore().search(sql, 0, 0, parameters, context);
LOGGER.info("Copying [{}] documents from wiki [{}] to wiki [{}]", list.size(), sourceWiki, targetWiki);
WikiReference sourceWikiReference = new WikiReference(sourceWiki);
WikiReference targetWikiReference = new WikiReference(targetWiki);
for (String docname : list) {
DocumentReference sourceDocumentReference = getCurrentMixedDocumentReferenceResolver().resolve(docname);
sourceDocumentReference = sourceDocumentReference
.replaceParent(sourceDocumentReference.getWikiReference(), sourceWikiReference);
DocumentReference targetDocumentReference =
sourceDocumentReference.replaceParent(sourceWikiReference, targetWikiReference);
copyDocument(sourceDocumentReference, targetDocumentReference, locale, context);
nb++;
}
return nb;
} finally {
context.setWikiId(db);
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: copySpaceBetweenWikis
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-863"
] |
CVE-2021-32620
|
MEDIUM
| 4
|
xwiki/xwiki-platform
|
copySpaceBetweenWikis
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
|
f9a677408ffb06f309be46ef9d8df1915d9099a4
| 0
|
Analyze the following code function for security vulnerabilities
|
List<SysUserDepVo> getDepNamesByUserIds(@Param("userIds")List<String> userIds);
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDepNamesByUserIds
File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
Repository: jeecgboot/jeecg-boot
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2022-45208
|
MEDIUM
| 4.3
|
jeecgboot/jeecg-boot
|
getDepNamesByUserIds
|
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
|
51e2227bfe54f5d67b09411ee9a336750164e73d
| 0
|
Analyze the following code function for security vulnerabilities
|
public void setStudyEventAndFormMetaOC1_3TypesExpected() {
this.unsetTypeExpected();
int i=1;
this.setTypeExpected(i, TypeNames.INT);// definition_order
++i;
this.setTypeExpected(i, TypeNames.INT); // crf_order
++i;
this.setTypeExpected(i, TypeNames.INT); // edc.crf_id
++i;
this.setTypeExpected(i, TypeNames.INT); // cv.crf_version_id
++i;
this.setTypeExpected(i, TypeNames.STRING);// definition_oid
++i;
this.setTypeExpected(i, TypeNames.STRING);// cv_oid
++i;
this.setTypeExpected(i, TypeNames.STRING);// description
++i;
this.setTypeExpected(i, TypeNames.STRING);// category
++i;
this.setTypeExpected(i, TypeNames.STRING);// version_description
++i;
this.setTypeExpected(i, TypeNames.STRING);// revision_notes
++i;
this.setTypeExpected(i, TypeNames.STRING);// crf_oid
++i;
this.setTypeExpected(i, TypeNames.STRING);// null_values
++i;
this.setTypeExpected(i, TypeNames.INT); //default_version_id
++i;
this.setTypeExpected(i, TypeNames.BOOL); //electronic_signature
++i;
this.setTypeExpected(i, TypeNames.BOOL);// double_entry
++i;
this.setTypeExpected(i, TypeNames.BOOL);// hide_crf
++i;
this.setTypeExpected(i, TypeNames.BOOL);// participant_form
++i;
this.setTypeExpected(i, TypeNames.BOOL);// allow_anonymous_submission
++i;
this.setTypeExpected(i, TypeNames.STRING);// submission_url
++i;
this.setTypeExpected(i, TypeNames.BOOL);// offline
++i;
this.setTypeExpected(i, TypeNames.INT);// source_data_verification_code
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setStudyEventAndFormMetaOC1_3TypesExpected
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2022-24831
|
HIGH
| 7.5
|
OpenClinica
|
setStudyEventAndFormMetaOC1_3TypesExpected
|
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
|
b152cc63019230c9973965a98e4386ea5322c18f
| 0
|
Analyze the following code function for security vulnerabilities
|
public static Path getDeployedPath(Path path) throws IOException {
return DEPLOYED_BASE_PATH.get().resolve(path);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeployedPath
File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
Repository: eclipse/lemminx
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2019-18212
|
MEDIUM
| 4
|
eclipse/lemminx
|
getDeployedPath
|
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
|
e37c399aa266be1b7a43061d4afc43dc230410d2
| 0
|
Analyze the following code function for security vulnerabilities
|
public String getRenderedContent(String text, String sourceSyntaxId, String targetSyntaxId, XWikiContext context)
{
return getRenderedContent(text, sourceSyntaxId, targetSyntaxId, false, context);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRenderedContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices.
|
[
"CWE-787"
] |
CVE-2023-26470
|
HIGH
| 7.5
|
xwiki/xwiki-platform
|
getRenderedContent
|
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
|
db3d1c62fc5fb59fefcda3b86065d2d362f55164
| 0
|
Analyze the following code function for security vulnerabilities
|
public void setUseDarkTextColors(boolean useDarkColors) {
if (mUseDarkColors != null && mUseDarkColors.booleanValue() == useDarkColors) return;
mUseDarkColors = useDarkColors;
if (mUseDarkColors) {
setTextColor(mDarkDefaultTextColor);
setHighlightColor(mDarkHighlightColor);
} else {
setTextColor(mLightDefaultTextColor);
setHighlightColor(mLightHighlightColor);
}
// Note: Setting the hint text color only takes effect if there is not text in the URL bar.
// To get around this, set the URL to empty before setting the hint color and revert
// back to the previous text after.
boolean hasNonEmptyText = false;
Editable text = getText();
if (!TextUtils.isEmpty(text)) {
setText("");
hasNonEmptyText = true;
}
if (useDarkColors) {
setHintTextColor(mDarkHintColor);
} else {
setHintTextColor(mLightHintColor);
}
if (hasNonEmptyText) setText(text);
if (!hasFocus()) {
deEmphasizeUrl();
emphasizeUrl();
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseDarkTextColors
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices.
|
[
"CWE-254"
] |
CVE-2016-5163
|
MEDIUM
| 4.3
|
chromium
|
setUseDarkTextColors
|
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
|
3bd33fee094e863e5496ac24714c558bd58d28ef
| 0
|
Analyze the following code function for security vulnerabilities
|
@VisibleForTesting
int injectBinderCallingUid() {
return getCallingUid();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectBinderCallingUid
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other"
] |
CVE-2023-40079
|
HIGH
| 7.8
|
android
|
injectBinderCallingUid
|
services/core/java/com/android/server/pm/ShortcutService.java
|
96e0524c48c6e58af7d15a2caf35082186fc8de2
| 0
|
Analyze the following code function for security vulnerabilities
|
public List<SyncInfo> getCurrentSyncsCopy(int userId, boolean canAccessAccounts) {
synchronized (mAuthorities) {
final List<SyncInfo> syncs = getCurrentSyncsLocked(userId);
final List<SyncInfo> syncsCopy = new ArrayList<SyncInfo>();
for (SyncInfo sync : syncs) {
SyncInfo copy;
if (!canAccessAccounts) {
copy = SyncInfo.createAccountRedacted(
sync.authorityId, sync.authority, sync.startTime);
} else {
copy = new SyncInfo(sync);
}
syncsCopy.add(copy);
}
return syncsCopy;
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentSyncsCopy
File: services/core/java/com/android/server/content/SyncStorageEngine.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-20"
] |
CVE-2016-2424
|
HIGH
| 7.1
|
android
|
getCurrentSyncsCopy
|
services/core/java/com/android/server/content/SyncStorageEngine.java
|
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void write(String string, int offset, int length) {
builder.append(string, offset, length);
tryFlush();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
Repository: 94fzb/zrlog
The code follows secure coding practices.
|
[
"CWE-79"
] |
CVE-2019-16643
|
LOW
| 3.5
|
94fzb/zrlog
|
write
|
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
|
4a91c83af669e31a22297c14f089d8911d353fa1
| 0
|
Analyze the following code function for security vulnerabilities
|
public UserProperty newInstance(User user) {
return null;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newInstance
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices.
|
[
"CWE-200"
] |
CVE-2014-2064
|
MEDIUM
| 5
|
jenkinsci/jenkins
|
newInstance
|
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
|
fbf96734470caba9364f04e0b77b0bae7293a1ec
| 0
|
Analyze the following code function for security vulnerabilities
|
private boolean getBooleanCarrierConfig(String key) {
PersistableBundle b = PhoneGlobals.getInstance()
.getCarrierConfigForSubId(mPhone.getSubId());
if (b == null) {
b = PhoneGlobals.getInstance().getCarrierConfig();
}
return b.getBoolean(key);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBooleanCarrierConfig
File: src/com/android/phone/settings/VoicemailSettingsActivity.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-Other",
"CWE-862"
] |
CVE-2023-35665
|
HIGH
| 7.8
|
android
|
getBooleanCarrierConfig
|
src/com/android/phone/settings/VoicemailSettingsActivity.java
|
674039e70e1c5bf29b808899ac80c709acc82290
| 0
|
Analyze the following code function for security vulnerabilities
|
public void setCommentTitle(String commentTitle){
this.commentTitle = commentTitle;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCommentTitle
File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java
Repository: dotCMS/core
The code follows secure coding practices.
|
[
"CWE-254",
"CWE-264"
] |
CVE-2016-8600
|
MEDIUM
| 5
|
dotCMS/core
|
setCommentTitle
|
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
|
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
@BeforeMethod
public void setUp(){
super.setUp();
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUp
File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
Repository: OpenRefine
The code follows secure coding practices.
|
[
"CWE-22"
] |
CVE-2018-19859
|
MEDIUM
| 4
|
OpenRefine
|
setUp
|
main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
|
79994e86da1a3eecc62723f4ba90f14a63ad0e72
| 0
|
Analyze the following code function for security vulnerabilities
|
protected String _finishTextToken(int ch) throws IOException
{
_tokenIncomplete = false;
final int type = ((ch >> 5) & 0x7);
ch &= 0x1F;
// sanity check
if (type != CBORConstants.MAJOR_TYPE_TEXT) {
// should never happen so
_throwInternal();
}
// String value, decode
final int len = _decodeExplicitLength(ch);
if (len <= 0) {
if (len == 0) {
_textBuffer.resetWithEmpty();
return "";
}
_finishChunkedText();
return _textBuffer.contentsAsString();
}
if (len > (_inputEnd - _inputPtr)) {
// or if not, could we read?
if (len >= _inputBuffer.length) {
// If not enough space, need handling similar to chunked
_finishLongText(len);
return _textBuffer.contentsAsString();
}
_loadToHaveAtLeast(len);
}
// offline for better optimization
return _finishShortText(len);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _finishTextToken
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices.
|
[
"CWE-770"
] |
CVE-2020-28491
|
MEDIUM
| 5
|
FasterXML/jackson-dataformats-binary
|
_finishTextToken
|
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
|
de072d314af8f5f269c8abec6930652af67bc8e6
| 0
|
Analyze the following code function for security vulnerabilities
|
public void update(String table, Object entity, CQLWrapper filter, boolean returnUpdatedIds, Handler<AsyncResult<UpdateResult>> replyHandler)
{
String where = "";
if(filter != null){
where = filter.toString();
}
update(table, entity, DEFAULT_JSONB_FIELD_NAME, where, returnUpdatedIds, replyHandler);
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: update
File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
Repository: folio-org/raml-module-builder
The code follows secure coding practices.
|
[
"CWE-89"
] |
CVE-2019-15534
|
HIGH
| 7.5
|
folio-org/raml-module-builder
|
update
|
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
|
b7ef741133e57add40aa4cb19430a0065f378a94
| 0
|
Analyze the following code function for security vulnerabilities
|
@DimenRes
public int getDesiredHeightResId() {
return mDesiredHeightResId;
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDesiredHeightResId
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices.
|
[
"CWE-862"
] |
CVE-2023-21288
|
MEDIUM
| 5.5
|
android
|
getDesiredHeightResId
|
core/java/android/app/Notification.java
|
726247f4f53e8cc0746175265652fa415a123c0c
| 0
|
Analyze the following code function for security vulnerabilities
|
@Override
public void onStart() {
super.onStart();
if (this.reInitRequiredOnStart && this.conversation != null) {
final Bundle extras = pendingExtras.pop();
reInit(this.conversation, extras != null);
if (extras != null) {
processExtras(extras);
}
} else if (conversation == null && activity != null && activity.xmppConnectionService != null) {
final String uuid = pendingConversationsUuid.pop();
Log.d(Config.LOGTAG, "ConversationFragment.onStart() - activity was bound but no conversation loaded. uuid=" + uuid);
if (uuid != null) {
findAndReInitByUuidOrArchive(uuid);
}
}
}
|
No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onStart
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices.
|
[
"CWE-200"
] |
CVE-2018-18467
|
MEDIUM
| 5
|
iNPUTmice/Conversations
|
onStart
|
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
|
7177c523a1b31988666b9337249a4f1d0c36f479
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.