instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public static Structure getStructureByVelocityVarName(String varName) { if(varName ==null) return new Structure(); Structure structure = null; String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'"; List<Structure> list = InodeFactory.getInodesOfClassByCondition(Structure.class,condition); if (list.size() > 0) { structure = (Structure) list.get(0); } else { structure = new Structure(); } return structure; }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2016-2355 - Severity: HIGH - CVSS Score: 7.5 Description: fixes #8848 Function: getStructureByVelocityVarName File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core Fixed Code: @SuppressWarnings("unchecked") public static Structure getStructureByVelocityVarName(String varName) { varName = SQLUtil.sanitizeParameter(varName); if(!UtilMethods.isSet(varName)) return new Structure(); Structure structure = null; String condition = " lower(velocity_var_name) = '" + varName.toLowerCase() + "'"; List<Structure> list = InodeFactory.getInodesOfClassByCondition(Structure.class,condition); if (list.size() > 0) { structure = (Structure) list.get(0); } else { structure = new Structure(); } return structure; }
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
getStructureByVelocityVarName
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
1
Analyze the following code function for security vulnerabilities
private String convertServiceName(String packageName, String serviceName) { if (TextUtils.isEmpty(serviceName)) { return null; } final String fullName; if (serviceName.startsWith(".")) { // Relative to the app package. Prepend the app package name. fullName = packageName + serviceName; } else if (serviceName.indexOf('.') >= 0) { // Fully qualified package name. fullName = serviceName; } else { fullName = null; } return fullName; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertServiceName File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
convertServiceName
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
private static String fromTimeMillis(long value) { return StringValueConverter.INSTANCE.convertTimeMillis(value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromTimeMillis File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
fromTimeMillis
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override protected void initComponent() { if(android.os.Build.VERSION.SDK_INT == 21 && web.getLayerType() != layerType){ act.runOnUiThread(new Runnable() { @Override public void run() { web.setLayerType(layerType, null); //setting layer type to original state } }); } super.initComponent(); blockNativeFocus(false); setPeerImage(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initComponent File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
initComponent
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public Registration addSelectionListener(SelectionListener<T> listener) throws UnsupportedOperationException { return getSelectionModel().addSelectionListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addSelectionListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addSelectionListener
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public ApiClient addDefaultHeader(String key, String value) { defaultHeaderMap.put(key, value); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDefaultHeader File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
addDefaultHeader
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setSamlHandlerChainClass(String samlHandlerChainClass) { logger .warn("Option 'samlHandlerChainClass' is deprecated and should not be used. This configuration is now set in picketlink.xml."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSamlHandlerChainClass File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setSamlHandlerChainClass
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private void internalPrintln(Map<String, Object> options, Object object) { if (object == null) { return; } long start = new Date().getTime(); if (options.containsKey(Printer.EXCLUDE)) { List<String> colOut = optionList(Printer.EXCLUDE, options); List<String> colIn = optionList(Printer.COLUMNS_IN, options); colIn.removeAll(colOut); colOut.addAll((List<String>) options.get(Printer.COLUMNS_OUT)); options.put(Printer.COLUMNS_IN, colIn); options.put(Printer.COLUMNS_OUT, colOut); } if (options.containsKey(Printer.INCLUDE)) { List<String> colIn = optionList(Printer.INCLUDE, options); colIn.addAll((List<String>) options.get(Printer.COLUMNS_IN)); options.put(Printer.COLUMNS_IN, colIn); } options.put(Printer.VALUE_STYLE, valueHighlighter((String) options.getOrDefault(Printer.VALUE_STYLE, null))); prntStyle = Styles.prntStyle(); options.putIfAbsent(Printer.WIDTH, terminal().getSize().getColumns()); String style = (String) options.getOrDefault(Printer.STYLE, ""); options.put(Printer.STYLE, valueHighlighter(style)); int width = (int) options.get(Printer.WIDTH); if (!style.isEmpty() && object instanceof String) { highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), (String) object, true); } else if (style.equalsIgnoreCase("JSON")) { if (engine == null) { throw new IllegalArgumentException("JSON style not supported!"); } String json = engine.toJson(object); highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), json, true); } else if (options.containsKey(Printer.SKIP_DEFAULT_OPTIONS)) { highlightAndPrint(options, object); } else if (object instanceof Exception) { highlightAndPrint(options, (Exception) object); } else if (object instanceof CmdDesc) { highlight((CmdDesc) object).println(terminal()); } else if (object instanceof String || object instanceof Number) { String str = object.toString(); SyntaxHighlighter highlighter = (SyntaxHighlighter) options.getOrDefault(Printer.VALUE_STYLE, null); highlightAndPrint(width, highlighter, str, doValueHighlight(options, str)); } else { highlightAndPrint(options, object); } terminal().flush(); Log.debug("println: ", new Date().getTime() - start, " msec"); }
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-50572 - Severity: MEDIUM - CVSS Score: 5.5 Description: GroovyEngine.execute cause an OOM exception, fixes #909 Function: internalPrintln File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 Fixed Code: @SuppressWarnings("unchecked") private void internalPrintln(Map<String, Object> options, Object object) { if (object == null) { return; } long start = new Date().getTime(); if (options.containsKey(Printer.EXCLUDE)) { List<String> colOut = optionList(Printer.EXCLUDE, options); List<String> colIn = optionList(Printer.COLUMNS_IN, options); colIn.removeAll(colOut); colOut.addAll((List<String>) options.get(Printer.COLUMNS_OUT)); options.put(Printer.COLUMNS_IN, colIn); options.put(Printer.COLUMNS_OUT, colOut); } if (options.containsKey(Printer.INCLUDE)) { List<String> colIn = optionList(Printer.INCLUDE, options); colIn.addAll((List<String>) options.get(Printer.COLUMNS_IN)); options.put(Printer.COLUMNS_IN, colIn); } options.put(Printer.VALUE_STYLE, valueHighlighter((String) options.getOrDefault(Printer.VALUE_STYLE, null))); prntStyle = Styles.prntStyle(); options.putIfAbsent(Printer.WIDTH, terminal().getSize().getColumns()); String style = (String) options.getOrDefault(Printer.STYLE, ""); options.put(Printer.STYLE, valueHighlighter(style)); int width = (int) options.get(Printer.WIDTH); int maxrows = (int) options.get(Printer.MAXROWS); if (!style.isEmpty() && object instanceof String) { highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), (String) object, true, maxrows); } else if (style.equalsIgnoreCase("JSON")) { if (engine == null) { throw new IllegalArgumentException("JSON style not supported!"); } String json = engine.toJson(object); highlightAndPrint(width, (SyntaxHighlighter) options.get(Printer.STYLE), json, true, maxrows); } else if (options.containsKey(Printer.SKIP_DEFAULT_OPTIONS)) { highlightAndPrint(options, object); } else if (object instanceof Exception) { highlightAndPrint(options, (Exception) object); } else if (object instanceof CmdDesc) { highlight((CmdDesc) object).println(terminal()); } else if (object instanceof String || object instanceof Number) { String str = object.toString(); SyntaxHighlighter highlighter = (SyntaxHighlighter) options.getOrDefault(Printer.VALUE_STYLE, null); highlightAndPrint(width, highlighter, str, doValueHighlight(options, str), maxrows); } else { highlightAndPrint(options, object); } terminal().flush(); Log.debug("println: ", new Date().getTime() - start, " msec"); }
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
internalPrintln
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
1
Analyze the following code function for security vulnerabilities
@GET @Path("async-writer-on-worker-thread") public AsyncWriterData asyncWriterOnWorkerThread() { return new AsyncWriterData(false, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: asyncWriterOnWorkerThread File: server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java Repository: resteasy The code follows secure coding practices.
[ "CWE-378" ]
CVE-2023-0482
MEDIUM
5.5
resteasy
asyncWriterOnWorkerThread
server-adapters/resteasy-undertow/src/test/java/org/jboss/resteasy/test/undertow/AsyncIOResource.java
807d7456f2137cde8ef7c316707211bf4e542d56
0
Analyze the following code function for security vulnerabilities
private void addKeysToMap(String className) { try { Class z = Class.forName(className); // All the keys must exist in the en_US XML files first. The other // languages may have subsets but no unique keys. If this is a // problem // refactoring will need to take place. Enumeration<String> e = XmlMessages.getInstance().getKeys(z, Locale.US); while (e.hasMoreElements()) { String key = e.nextElement(); keyToBundleMap.put(key, className); } } catch (ClassNotFoundException ce) { String message = "Class not found when trying to initalize " + "the LocalizationService: " + ce.toString(); log.error(message, ce); throw new LocalizationException(message, ce); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addKeysToMap File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
addKeysToMap
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
private void updateApnDataToDatabase(Uri uri, ContentValues values) { ThreadUtils.postOnBackgroundThread(() -> { if (uri.equals(mCarrierUri)) { // Add a new apn to the database final Uri newUri = getContentResolver().insert(mCarrierUri, values); if (newUri == null) { Log.e(TAG, "Can't add a new apn to database " + mCarrierUri); } } else { // Update the existing apn getContentResolver().update( uri, values, null /* where */, null /* selection Args */); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApnDataToDatabase File: src/com/android/settings/network/apn/ApnEditor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40125
HIGH
7.8
android
updateApnDataToDatabase
src/com/android/settings/network/apn/ApnEditor.java
63d464c3fa5c7b9900448fef3844790756e557eb
0
Analyze the following code function for security vulnerabilities
void handshakeFinished() throws SSLException { synchronized (OpenSslEngine.this) { if (!isDestroyed()) { id = SSL.getSessionId(ssl); cipher = toJavaCipherSuite(SSL.getCipherForSSL(ssl)); protocol = SSL.getVersion(ssl); initPeerCerts(); selectApplicationProtocol(); handshakeState = HandshakeState.FINISHED; } else { throw new SSLException("Already closed"); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handshakeFinished File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
handshakeFinished
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public Configuration getConfiguration() { return configuration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfiguration File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
getConfiguration
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
efc44b7b0a5dd4f44773808840dd9785cabcf21c
0
Analyze the following code function for security vulnerabilities
public String getDeviceOwnerInfo() { return getString(LOCK_SCREEN_DEVICE_OWNER_INFO, UserHandle.USER_SYSTEM); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceOwnerInfo File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
getDeviceOwnerInfo
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
private static String escape(String str) { StringBuilder sb = new StringBuilder(); for (char c : str.toCharArray()) { switch (c) { case '(': case ')': case '\\': sb.append('\\'); // intended fall-through default: sb.append(c); } } return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escape File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
escape
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private static String toLuceneDate(Date date) { try { SimpleDateFormat df = new SimpleDateFormat("yyyyMMddHHmmss"); String returnValue = df.format(date); return returnValue; } catch (Exception ex) { Logger.error(ESContentFactoryImpl.class, ex.toString()); return ERROR_DATE; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toLuceneDate File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
toLuceneDate
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") void tempAllowlistForPendingIntentLocked(int callerPid, int callerUid, int targetUid, long duration, int type, @ReasonCode int reasonCode, String reason) { if (DEBUG_ALLOWLISTS) { Slog.d(TAG, "tempAllowlistForPendingIntentLocked(" + callerPid + ", " + callerUid + ", " + targetUid + ", " + duration + ", " + type + ")"); } synchronized (mPidsSelfLocked) { final ProcessRecord pr = mPidsSelfLocked.get(callerPid); if (pr == null) { Slog.w(TAG, "tempAllowlistForPendingIntentLocked() no ProcessRecord for pid " + callerPid); return; } if (!pr.mServices.mAllowlistManager) { if (checkPermission(CHANGE_DEVICE_IDLE_TEMP_WHITELIST, callerPid, callerUid) != PackageManager.PERMISSION_GRANTED && checkPermission(START_ACTIVITIES_FROM_BACKGROUND, callerPid, callerUid) != PackageManager.PERMISSION_GRANTED && checkPermission(START_FOREGROUND_SERVICES_FROM_BACKGROUND, callerPid, callerUid) != PackageManager.PERMISSION_GRANTED) { if (DEBUG_ALLOWLISTS) { Slog.d(TAG, "tempAllowlistForPendingIntentLocked() for target " + targetUid + ": pid " + callerPid + " is not allowed"); } return; } } } tempAllowlistUidLocked(targetUid, duration, reasonCode, reason, type, callerUid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tempAllowlistForPendingIntentLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
tempAllowlistForPendingIntentLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public char getFileSystemSeparator() { return File.separatorChar; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileSystemSeparator File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getFileSystemSeparator
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private static CharacterStyle getColor(String color, boolean foreground) { int c = 0xff000000; if (!TextUtils.isEmpty(color)) { if (color.startsWith("@")) { Resources res = Resources.getSystem(); String name = color.substring(1); int colorRes = res.getIdentifier(name, "color", "android"); if (colorRes != 0) { ColorStateList colors = res.getColorStateList(colorRes, null); if (foreground) { return new TextAppearanceSpan(null, 0, 0, colors, null); } else { c = colors.getDefaultColor(); } } } else { try { c = Color.parseColor(color); } catch (IllegalArgumentException e) { c = Color.BLACK; } } } if (foreground) { return new ForegroundColorSpan(c); } else { return new BackgroundColorSpan(c); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getColor File: core/java/android/content/res/StringBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getColor
core/java/android/content/res/StringBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override public void setManagedProfileContactsAccessPolicy(PackagePolicy policy) { if (!mHasFeature) { return; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization((isProfileOwner(caller) && isManagedProfile(caller.getUserId()))); synchronized (getLockObject()) { ActiveAdmin admin = getProfileOwnerLocked(caller.getUserId()); admin.disableContactsSearch = false; admin.mManagedProfileContactsAccess = policy; saveSettingsLocked(caller.getUserId()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManagedProfileContactsAccessPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setManagedProfileContactsAccessPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public String getEmail() { XWikiDocument userDoc; try { userDoc = getXWikiContext().getWiki().getDocument(this.user.getUser(), getXWikiContext()); BaseObject obj = userDoc.getObject("XWiki.XWikiUsers"); return obj.getStringValue("email"); } catch (Exception e) { // APIs should never throw errors, as velocity cannot catch them, and scripts should be // as robust as possible. Instead, the code using this should know that null means there // was an error, if it really needs to report these exceptions. return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEmail File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-41929
MEDIUM
4.9
xwiki/xwiki-platform
getEmail
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
0
Analyze the following code function for security vulnerabilities
protected LocallyAvailableResource entryAt(File file) { return entryAt(RelativePathUtil.relativePath(baseDir, file)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: entryAt File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java Repository: gradle The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35946
MEDIUM
5.5
gradle
entryAt
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
0
Analyze the following code function for security vulnerabilities
private void sendPreface() { Http2PrefaceStreamSinkChannel preface = new Http2PrefaceStreamSinkChannel(this); flushChannelIgnoreFailure(preface); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendPreface File: core/src/main/java/io/undertow/protocols/http2/Http2Channel.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-214" ]
CVE-2021-3859
HIGH
7.5
undertow-io/undertow
sendPreface
core/src/main/java/io/undertow/protocols/http2/Http2Channel.java
e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
0
Analyze the following code function for security vulnerabilities
@Override public <T> T extractPayload(Object payload, Class<T> type) { try { return objectMapper.convertValue(payload, type); } catch (IllegalArgumentException e) { LOG.error("Error while deserializing payload", e); return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPayload File: graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
extractPayload
graylog2-server/src/main/java/org/graylog2/cluster/ClusterConfigServiceImpl.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasManagedProfileContactsAccess(int userId, String packageName) { Preconditions.checkArgumentNonnegative(userId, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasCrossUsersPermission(caller, userId)); synchronized (getLockObject()) { ActiveAdmin admin = getProfileOwnerAdminLocked(userId); if (admin != null) { if (admin.mManagedProfileContactsAccess == null) { return !admin.disableContactsSearch; } return admin.mManagedProfileContactsAccess.isPackageAllowed(packageName, mContactSystemRoleHolders); } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasManagedProfileContactsAccess File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
hasManagedProfileContactsAccess
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setupBackgroundLocationRequest(LocationRequest req) { Display d = Display.getInstance(); String priorityStr = d.getProperty("android.backgroundLocation.priority", "PRIORITY_BALANCED_POWER_ACCURACY"); String fastestIntervalStr = d.getProperty("android.backgroundLocation.fastestInterval", "5000"); String intervalStr = d.getProperty("android.backgroundLocation.interval", "10000"); String smallestDisplacementStr = d.getProperty("android.backgroundLocation.smallestDisplacement", "50"); int priority = LocationRequest.PRIORITY_BALANCED_POWER_ACCURACY; if ("PRIORITY_HIGH_ACCURACY".equals(priorityStr)) { priority = LocationRequest.PRIORITY_HIGH_ACCURACY; } else if ("PRIORITY_LOW_POWER".equals(priorityStr)) { priority = LocationRequest.PRIORITY_LOW_POWER; } else if ("PRIORITY_NO_POWER".equals(priorityStr)) { priority = LocationRequest.PRIORITY_NO_POWER; } long interval = Long.parseLong(intervalStr); long fastestInterval = Long.parseLong(fastestIntervalStr); int smallestDisplacement = Integer.parseInt(smallestDisplacementStr); req.setPriority(priority) .setFastestInterval(fastestInterval) .setInterval(interval) .setSmallestDisplacement(smallestDisplacement); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setupBackgroundLocationRequest File: Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setupBackgroundLocationRequest
Ports/Android/src/com/codename1/location/AndroidLocationPlayServiceManager.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public List<RequestFilter> getRequestFilters() { return Collections.unmodifiableList(requestFilters); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestFilters File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
getRequestFilters
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfig.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public void requestBugReport(int bugreportType) { String service = null; switch (bugreportType) { case ActivityManager.BUGREPORT_OPTION_FULL: service = "bugreport"; break; case ActivityManager.BUGREPORT_OPTION_INTERACTIVE: service = "bugreportplus"; break; case ActivityManager.BUGREPORT_OPTION_REMOTE: service = "bugreportremote"; break; } if (service == null) { throw new IllegalArgumentException("Provided bugreport type is not correct, value: " + bugreportType); } enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport"); SystemProperties.set("ctl.start", service); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private native void nativeDestroyWebContents(long nativeTabAndroid, boolean deleteNative);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeDestroyWebContents File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeDestroyWebContents
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public XWikiAttachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName) { XWikiContext context = this.contextProvider.get(); XWikiAttachment result = null; try { Part part = context.getRequest().getPart(fieldName); if (part != null) { result = this.temporaryAttachmentSessionsManager.uploadAttachment(documentReference, part); } } catch (IOException | ServletException e) { logger.warn("Error while reading the request content part: [{}]", ExceptionUtils.getRootCauseMessage(e)); } catch (TemporaryAttachmentException e) { logger.warn("Error while uploading the attachment: [{}]", ExceptionUtils.getRootCauseMessage(e)); } return result; }
Vulnerability Classification: - CWE: CWE-749 - CVE: CVE-2023-26478 - Severity: HIGH - CVSS Score: 8.1 Description: XWIKI-20180: TemporaryAttachmentsScriptService#uploadTemporaryAttachment return an XWikiAttachment instance Function: uploadTemporaryAttachment File: xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java Repository: xwiki/xwiki-platform Fixed Code: public Attachment uploadTemporaryAttachment(DocumentReference documentReference, String fieldName) { XWikiContext context = this.contextProvider.get(); Optional<XWikiAttachment> result = Optional.empty(); try { Part part = context.getRequest().getPart(fieldName); if (part != null) { result = Optional.of(this.temporaryAttachmentSessionsManager.uploadAttachment(documentReference, part)); } } catch (IOException | ServletException e) { this.logger.warn("Error while reading the request content part: [{}]", getRootCauseMessage(e)); } catch (TemporaryAttachmentException e) { this.logger.warn("Error while uploading the attachment: [{}]", getRootCauseMessage(e)); } return result.map(attachment -> { Document document = Optional.ofNullable(attachment.getDoc()) .map(doc -> doc.newDocument(context)) .orElse(null); return new Attachment(document, attachment, context); }).orElse(null); }
[ "CWE-749" ]
CVE-2023-26478
HIGH
8.1
xwiki/xwiki-platform
uploadTemporaryAttachment
xwiki-platform-core/xwiki-platform-store/xwiki-platform-store-filesystem-oldcore/src/main/java/org/xwiki/store/script/TemporaryAttachmentsScriptService.java
3c73c59e39b6436b1074d8834cf276916010014d
1
Analyze the following code function for security vulnerabilities
@Override public void startProcess(String processName, ApplicationInfo info, boolean knownToBeDead, boolean isTop, String hostingType, ComponentName hostingName) { try { if (Trace.isTagEnabled(Trace.TRACE_TAG_ACTIVITY_MANAGER)) { Trace.traceBegin(Trace.TRACE_TAG_ACTIVITY_MANAGER, "startProcess:" + processName); } synchronized (ActivityManagerService.this) { // If the process is known as top app, set a hint so when the process is // started, the top priority can be applied immediately to avoid cpu being // preempted by other processes before attaching the process of top app. startProcessLocked(processName, info, knownToBeDead, 0 /* intentFlags */, new HostingRecord(hostingType, hostingName, isTop), ZYGOTE_POLICY_FLAG_LATENCY_SENSITIVE, false /* allowWhileBooting */, false /* isolated */); } } finally { Trace.traceEnd(Trace.TRACE_TAG_ACTIVITY_MANAGER); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startProcess File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startProcess
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private static byte[] generateSignatureFile( List<Integer> apkSignatureSchemeIds, DigestAlgorithm manifestDigestAlgorithm, String createdBy, OutputManifestFile manifest) throws NoSuchAlgorithmException { Manifest sf = new Manifest(); Attributes mainAttrs = sf.getMainAttributes(); mainAttrs.put(Attributes.Name.SIGNATURE_VERSION, ATTRIBUTE_VALUE_SIGNATURE_VERSION); mainAttrs.put(ATTRIBUTE_NAME_CREATED_BY, createdBy); if (!apkSignatureSchemeIds.isEmpty()) { // Add APK Signature Scheme v2 (and newer) signature stripping protection. // This attribute indicates that this APK is supposed to have been signed using one or // more APK-specific signature schemes in addition to the standard JAR signature scheme // used by this code. APK signature verifier should reject the APK if it does not // contain a signature for the signature scheme the verifier prefers out of this set. StringBuilder attrValue = new StringBuilder(); for (int id : apkSignatureSchemeIds) { if (attrValue.length() > 0) { attrValue.append(", "); } attrValue.append(String.valueOf(id)); } mainAttrs.put( SF_ATTRIBUTE_NAME_ANDROID_APK_SIGNED_NAME, attrValue.toString()); } // Add main attribute containing the digest of MANIFEST.MF. MessageDigest md = getMessageDigestInstance(manifestDigestAlgorithm); mainAttrs.putValue( getManifestDigestAttributeName(manifestDigestAlgorithm), Base64.getEncoder().encodeToString(md.digest(manifest.contents))); ByteArrayOutputStream out = new ByteArrayOutputStream(); try { SignatureFileWriter.writeMainSection(out, mainAttrs); } catch (IOException e) { throw new RuntimeException("Failed to write in-memory .SF file", e); } String entryDigestAttributeName = getEntryDigestAttributeName(manifestDigestAlgorithm); for (Map.Entry<String, byte[]> manifestSection : manifest.individualSectionsContents.entrySet()) { String sectionName = manifestSection.getKey(); byte[] sectionContents = manifestSection.getValue(); byte[] sectionDigest = md.digest(sectionContents); Attributes attrs = new Attributes(); attrs.putValue( entryDigestAttributeName, Base64.getEncoder().encodeToString(sectionDigest)); try { SignatureFileWriter.writeIndividualSection(out, sectionName, attrs); } catch (IOException e) { throw new RuntimeException("Failed to write in-memory .SF file", e); } } // A bug in the java.util.jar implementation of Android platforms up to version 1.6 will // cause a spurious IOException to be thrown if the length of the signature file is a // multiple of 1024 bytes. As a workaround, add an extra CRLF in this case. if ((out.size() > 0) && ((out.size() % 1024) == 0)) { try { SignatureFileWriter.writeSectionDelimiter(out); } catch (IOException e) { throw new RuntimeException("Failed to write to ByteArrayOutputStream", e); } } return out.toByteArray(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateSignatureFile File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
generateSignatureFile
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeSigner.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
private Token getTokenInSession(String tokenId, HttpServletRequest request, boolean pop) { Token token = null; HttpSession session = request.getSession(false); if (session != null) { token = getToken(tokenId, session, pop); } if (token == null) { String sessionId = request.getHeader(UserPrivilegeValidation.HTTP_SESSIONKEY); if (StringUtil.isDefined(sessionId)) { SessionManagement sessionManagement = SessionManagementProvider.getSessionManagement(); SessionInfo sessionInfo = sessionManagement.getSessionInfo(sessionId); if (sessionInfo.isDefined()) { token = sessionInfo.getAttribute(tokenId); if (token != null && pop) { sessionInfo.unsetAttribute(tokenId); } } } } return (token == null ? SynchronizerToken.NoneToken : token); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTokenInSession File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getTokenInSession
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@POST @Path("externalpage") @Operation(summary = "Update an external page building block", description = "Update an external page building block") @ApiResponse(responseCode = "200", description = "The course node metadatas", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class)), @Content(mediaType = "application/xml", schema = @Schema(implementation = CourseNodeVO.class)) }) @ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient") @ApiResponse(responseCode = "404", description = "The course or parentNode not found") @Consumes(MediaType.APPLICATION_FORM_URLENCODED) @Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) public Response attachExternalPagePost(@PathParam("courseId") Long courseId, @QueryParam("parentNodeId") String parentNodeId, @QueryParam("position") Integer position, @QueryParam("shortTitle") @DefaultValue("undefined") String shortTitle, @QueryParam("longTitle") @DefaultValue("undefined") String longTitle, @QueryParam("objectives") @DefaultValue("undefined") String objectives, @QueryParam("visibilityExpertRules") String visibilityExpertRules, @QueryParam("accessExpertRules") String accessExpertRules, @QueryParam("url") String url, @Context HttpServletRequest request) { return attachExternalPage(courseId, parentNodeId, position, shortTitle, longTitle, objectives, visibilityExpertRules, accessExpertRules, url, request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachExternalPagePost File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
attachExternalPagePost
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
private void writeError(PollError error, OutputStream out) throws IOException { out.write(ERROR_TAG_OPEN_START); out.write(error.getCode().getBytes()); out.write(ERROR_TAG_OPEN_END); out.write(error.getMessage().getBytes()); out.write(ERROR_TAG_CLOSE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeError File: jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java Repository: seam2/jboss-seam The code follows secure coding practices.
[ "CWE-264", "CWE-200" ]
CVE-2013-6447
MEDIUM
5
seam2/jboss-seam
writeError
jboss-seam-remoting/src/main/java/org/jboss/seam/remoting/PollHandler.java
090aa6252affc978a96c388e3fc2c1c2688d9bb5
0
Analyze the following code function for security vulnerabilities
@Override public void onCreate() { super.onCreate(); debugLog("onCreate()"); mBinder = new AdapterServiceBinder(this); mAdapterProperties = new AdapterProperties(this); mAdapterStateMachine = AdapterState.make(this, mAdapterProperties); mJniCallbacks = new JniCallbacks(mAdapterStateMachine, mAdapterProperties); initNative(); mNativeAvailable=true; mCallbacks = new RemoteCallbackList<IBluetoothCallback>(); //Load the name and address getAdapterPropertyNative(AbstractionLayer.BT_PROPERTY_BDADDR); getAdapterPropertyNative(AbstractionLayer.BT_PROPERTY_BDNAME); mAlarmManager = (AlarmManager) getSystemService(Context.ALARM_SERVICE); mPowerManager = (PowerManager) getSystemService(Context.POWER_SERVICE); mSdpManager = SdpManager.init(this); registerReceiver(mAlarmBroadcastReceiver, new IntentFilter(ACTION_ALARM_WAKEUP)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
onCreate
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public void updateShowImeWithHardKeyboard() { synchronized (mWindowMap) { final boolean showImeWithHardKeyboard = Settings.Secure.getIntForUser( mContext.getContentResolver(), Settings.Secure.SHOW_IME_WITH_HARD_KEYBOARD, 0, mCurrentUserId) == 1; if (mShowImeWithHardKeyboard != showImeWithHardKeyboard) { mShowImeWithHardKeyboard = showImeWithHardKeyboard; mH.sendEmptyMessage(H.SEND_NEW_CONFIGURATION); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateShowImeWithHardKeyboard File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
updateShowImeWithHardKeyboard
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void done() { final int processing_time = processingTimeMillis(); httplatency.add(processing_time); logInfo("HTTP " + request().getUri() + " done in " + processing_time + "ms"); deferred.callback(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: done File: src/tsd/HttpQuery.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
done
src/tsd/HttpQuery.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public boolean getHintDisplayActionInline() { return (mFlags & FLAG_HINT_DISPLAY_INLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHintDisplayActionInline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getHintDisplayActionInline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformRotation(Object nativeTransform, float angle, float x, float y, float z) { CN1Matrix4f m = (CN1Matrix4f)nativeTransform; m.reset(); m.rotate(angle, x, y, z); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformRotation File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformRotation
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private List<String> removeInvalidPkgsForMeteredDataRestriction( int userId, List<String> pkgNames) { final Set<String> activeAdmins = getActiveAdminPackagesLocked(userId); final List<String> excludedPkgs = new ArrayList<>(); for (int i = pkgNames.size() - 1; i >= 0; --i) { final String pkgName = pkgNames.get(i); // If the package is an active admin, don't restrict it. if (activeAdmins.contains(pkgName)) { excludedPkgs.add(pkgName); continue; } // If the package doesn't exist, don't restrict it. try { if (!mInjector.getIPackageManager().isPackageAvailable(pkgName, userId)) { excludedPkgs.add(pkgName); } } catch (RemoteException e) { // Should not happen } } pkgNames.removeAll(excludedPkgs); return excludedPkgs; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeInvalidPkgsForMeteredDataRestriction File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
removeInvalidPkgsForMeteredDataRestriction
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void positionTaskInStack(int taskId, int stackId, int position) { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "positionTaskInStack()"); if (stackId == HOME_STACK_ID) { throw new IllegalArgumentException( "positionTaskInStack: Attempt to change the position of task " + taskId + " in/to home stack"); } synchronized (this) { long ident = Binder.clearCallingIdentity(); try { if (DEBUG_STACK) Slog.d(TAG_STACK, "positionTaskInStack: positioning task=" + taskId + " in stackId=" + stackId + " at position=" + position); mStackSupervisor.positionTaskInStackLocked(taskId, stackId, position); } finally { Binder.restoreCallingIdentity(ident); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: positionTaskInStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
positionTaskInStack
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
protected String getPrefixFromQualifiedName(String qualifiedName) { int colonPos = qualifiedName.indexOf(':'); if (colonPos > 0) { return qualifiedName.substring(0, colonPos); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPrefixFromQualifiedName File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
getPrefixFromQualifiedName
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public List<PeriodicSync> getPeriodicSyncs(EndPoint info) { synchronized (mAuthorities) { AuthorityInfo authorityInfo = getAuthorityLocked(info, "getPeriodicSyncs"); ArrayList<PeriodicSync> syncs = new ArrayList<PeriodicSync>(); if (authorityInfo != null) { for (PeriodicSync item : authorityInfo.periodicSyncs) { // Copy and send out. Necessary for thread-safety although it's parceled. syncs.add(new PeriodicSync(item)); } } return syncs; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPeriodicSyncs File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getPeriodicSyncs
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
private static native long nativeAssetSeek(long assetPtr, long offset, int whence);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeAssetSeek File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
nativeAssetSeek
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException { return ClassLoaderUtil.loadClass(classLoader, desc.getName()); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2016-10750 - Severity: MEDIUM - CVSS Score: 6.8 Description: Add basic protection against untrusted deserialization. Function: resolveClass File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast Fixed Code: @Override protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundException { String name = desc.getName(); if (classFilter != null) { classFilter.filter(name); } return ClassLoaderUtil.loadClass(classLoader, name); }
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
resolveClass
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
1
Analyze the following code function for security vulnerabilities
@Override public void createConference( PhoneAccountHandle connectionManagerPhoneAccount, String id, ConnectionRequest request, boolean isIncoming, boolean isUnknown, Session.Info sessionInfo) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createConference File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
createConference
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void grantEphemeralAccessLocked(int userId, Intent intent, int targetAppId, int ephemeralAppId) { getPackageManagerInternalLocked(). grantEphemeralAccess(userId, intent, targetAppId, ephemeralAppId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantEphemeralAccessLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
grantEphemeralAccessLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public int optInt(String key) { return optInt(key, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optInt File: src/main/java/org/codehaus/jettison/json/JSONObject.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optInt
src/main/java/org/codehaus/jettison/json/JSONObject.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
public boolean copyWiki(File sourceDirectory, File targetDirectory) { try { Path path = sourceDirectory.toPath(); Path destDir = targetDirectory.toPath(); Files.walkFileTree(path, new CopyVisitor(path, destDir)); return true; } catch (IOException e) { log.error("", e); return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyWiki File: src/main/java/org/olat/modules/wiki/WikiManager.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
copyWiki
src/main/java/org/olat/modules/wiki/WikiManager.java
699490be8e931af0ef1f135c55384db1f4232637
0
Analyze the following code function for security vulnerabilities
protected IssuesWithBLOBs insertIssues(IssuesUpdateRequest issuesRequest) { IssuesWithBLOBs issues = new IssuesWithBLOBs(); BeanUtils.copyBean(issues, issuesRequest); issues.setId(issuesRequest.getId()); issues.setPlatformId(issuesRequest.getPlatformId()); issues.setCreateTime(System.currentTimeMillis()); issues.setUpdateTime(System.currentTimeMillis()); issues.setNum(getNextNum(issuesRequest.getProjectId())); issues.setPlatformStatus(issuesRequest.getPlatformStatus()); issues.setCreator(SessionUtils.getUserId()); issuesMapper.insert(issues); return issues; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: insertIssues File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
insertIssues
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void dispose(@Nullable Disposable disposable) { if (disposable != null && !disposable.isDisposed()) { disposable.dispose(); } else if (disposable == null) { if (signalingDisposable != null && !signalingDisposable.isDisposed()) { signalingDisposable.dispose(); signalingDisposable = null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispose File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
dispose
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
private boolean addProviderLocked(ResolveInfo ri) { if ((ri.activityInfo.applicationInfo.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) { return false; } if (!ri.activityInfo.isEnabled()) { return false; } ComponentName componentName = new ComponentName(ri.activityInfo.packageName, ri.activityInfo.name); ProviderId providerId = new ProviderId(ri.activityInfo.applicationInfo.uid, componentName); Provider provider = parseProviderInfoXml(providerId, ri); if (provider != null) { // we might have an inactive entry for this provider already due to // a preceding restore operation. if so, fix it up in place; otherwise // just add this new one. Provider existing = lookupProviderLocked(providerId); // If the provider was not found it may be because it was restored and // we did not know its UID so let us find if there is such one. if (existing == null) { ProviderId restoredProviderId = new ProviderId(UNKNOWN_UID, componentName); existing = lookupProviderLocked(restoredProviderId); } if (existing != null) { if (existing.zombie && !mSafeMode) { // it's a placeholder that was set up during an app restore existing.id = providerId; existing.zombie = false; existing.info = provider.info; // the real one filled out from the ResolveInfo if (DEBUG) { Slog.i(TAG, "Provider placeholder now reified: " + existing); } } } else { mProviders.add(provider); } return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addProviderLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
addProviderLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public int getTextLength() throws IOException { if (_currToken != null) { // null only before/after document if (_tokenIncomplete) { _finishToken(); } if (_currToken == JsonToken.VALUE_STRING) { return _textBuffer.size(); } if (_currToken == JsonToken.FIELD_NAME) { return _parsingContext.getCurrentName().length(); } if ((_currToken == JsonToken.VALUE_NUMBER_INT) || (_currToken == JsonToken.VALUE_NUMBER_FLOAT)) { return getNumberValue().toString().length(); } return _currToken.asCharArray().length; } return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextLength File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
getTextLength
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@Override boolean forAllWindows(ToBooleanFunction<WindowState> callback, boolean traverseTopToBottom) { if (mChildren.isEmpty()) { // The window has no children so we just return it. return applyInOrderWithImeWindows(callback, traverseTopToBottom); } if (traverseTopToBottom) { return forAllWindowTopToBottom(callback); } else { return forAllWindowBottomToTop(callback); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forAllWindows File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
forAllWindows
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private void updateBasePath() { if (serverIndex != null) { setBasePath(servers.get(serverIndex).URL(serverVariables)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBasePath File: samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateBasePath
samples/openapi3/client/petstore/java/jersey2-java8-special-characters/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public boolean isBuiltinSoundAvailable(String soundIdentifier) { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBuiltinSoundAvailable File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isBuiltinSoundAvailable
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated // since 2.12 protected Object _coerceNullToken(DeserializationContext ctxt, boolean isPrimitive) throws JsonMappingException { if (isPrimitive) { _verifyNullForPrimitive(ctxt); } return getNullValue(ctxt); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _coerceNullToken File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_coerceNullToken
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) { Map < String, Property<?>> result = new HashMap<>(); if (null != properties) { properties.forEach(property -> { // Initiate with name and value String name = (String) property.get(PROPERTY_PARAMNAME); if (null == name) { throw new IllegalArgumentException("Invalid YAML File: 'name' is expected for properties"); } Object objValue = property.get(PROPERTY_PARAMVALUE); if (null == objValue) { throw new IllegalArgumentException("Invalid YAML File: 'value' is expected for properties"); } // Convert as a String String strValue = String.valueOf(objValue); if (objValue instanceof Date) { strValue = SIMPLE_DATE_FORMAT.format((Date) objValue); } Property<?> ap = new PropertyString(name, strValue); String optionalType = (String) property.get(PROPERTY_PARAMTYPE); // If specific type defined ? if (null != optionalType) { // Substitution if relevant (e.g. 'int' -> 'org.ff4j.property.PropertyInt') optionalType = MappingUtil.mapPropertyType(optionalType); try { // Constructor (String, String) is mandatory in Property interface Constructor<?> constr = Class.forName(optionalType).getConstructor(String.class, String.class); ap = (Property<?>) constr.newInstance(name, strValue); } catch (Exception e) { throw new IllegalArgumentException("Cannot instantiate '" + optionalType + "' check default constructor", e); } } // Description String description = (String) property.get(PROPERTY_PARAMDESCRIPTION); if (null != description) { ap.setDescription(description); } // Fixed Values List<Object> fixedValues = (List<Object>) property.get(PROPERTY_PARAMFIXED_VALUES); if (null != fixedValues && fixedValues.size() > 0) { fixedValues.stream().map(Object::toString).forEach(ap::add2FixedValueFromString); } // Check fixed value if (ap.getFixedValues() != null && !ap.getFixedValues().isEmpty() && !ap.getFixedValues().contains(ap.getValue())) { throw new IllegalArgumentException("Cannot create property <" + ap.getName() + "> invalid value <" + ap.getValue() + "> expected one of " + ap.getFixedValues()); } result.put(ap.getName(), ap); }); } return result; }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2022-44262 - Severity: CRITICAL - CVSS Score: 9.8 Description: fix: Add assignable check to PropertiesParser, YamlParser and XmlParser (#624) Function: parseProperties File: ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java Repository: ff4j Fixed Code: @SuppressWarnings("unchecked") private Map < String, Property<?>> parseProperties(List<Map<String, Object>> properties) { Map < String, Property<?>> result = new HashMap<>(); if (null != properties) { properties.forEach(property -> { // Initiate with name and value String name = (String) property.get(PROPERTY_PARAMNAME); if (null == name) { throw new IllegalArgumentException("Invalid YAML File: 'name' is expected for properties"); } Object objValue = property.get(PROPERTY_PARAMVALUE); if (null == objValue) { throw new IllegalArgumentException("Invalid YAML File: 'value' is expected for properties"); } // Convert as a String String strValue = String.valueOf(objValue); if (objValue instanceof Date) { strValue = SIMPLE_DATE_FORMAT.format((Date) objValue); } Property<?> ap = new PropertyString(name, strValue); String optionalType = (String) property.get(PROPERTY_PARAMTYPE); // If specific type defined ? if (null != optionalType) { // Substitution if relevant (e.g. 'int' -> 'org.ff4j.property.PropertyInt') optionalType = MappingUtil.mapPropertyType(optionalType); try { // Constructor (String, String) is mandatory in Property interface Class<?> typeClass = Class.forName(optionalType); if (!Property.class.isAssignableFrom(typeClass)) { throw new IllegalArgumentException("Cannot create property <" + name + "> invalid type <" + optionalType + ">"); } Constructor<?> constr = typeClass.getConstructor(String.class, String.class); ap = (Property<?>) constr.newInstance(name, strValue); } catch (Exception e) { throw new IllegalArgumentException("Cannot instantiate '" + optionalType + "' check default constructor", e); } } // Description String description = (String) property.get(PROPERTY_PARAMDESCRIPTION); if (null != description) { ap.setDescription(description); } // Fixed Values List<Object> fixedValues = (List<Object>) property.get(PROPERTY_PARAMFIXED_VALUES); if (null != fixedValues && fixedValues.size() > 0) { fixedValues.stream().map(Object::toString).forEach(ap::add2FixedValueFromString); } // Check fixed value if (ap.getFixedValues() != null && !ap.getFixedValues().isEmpty() && !ap.getFixedValues().contains(ap.getValue())) { throw new IllegalArgumentException("Cannot create property <" + ap.getName() + "> invalid value <" + ap.getValue() + "> expected one of " + ap.getFixedValues()); } result.put(ap.getName(), ap); }); } return result; }
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
parseProperties
ff4j-config-yaml/src/main/java/org/ff4j/parser/yaml/YamlParser.java
e915c026aef46b502934cb05a825ea2ea15eb9e6
1
Analyze the following code function for security vulnerabilities
private boolean isCallerChooserActivity() { // TODO(b/228975502): Migrate this check to a proper permission or role check final int callingUid = injectBinderCallingUid(); ComponentName systemChooser = injectChooserActivity(); if (systemChooser == null) { return false; } int uid = injectGetPackageUid(systemChooser.getPackageName(), UserHandle.USER_SYSTEM); return UserHandle.getAppId(uid) == UserHandle.getAppId(callingUid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCallerChooserActivity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
isCallerChooserActivity
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public boolean isOverWriteExistingData() { return overWriteExistingData; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOverWriteExistingData File: quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java Repository: quartz-scheduler/quartz The code follows secure coding practices.
[ "CWE-611" ]
CVE-2019-13990
HIGH
7.5
quartz-scheduler/quartz
isOverWriteExistingData
quartz-core/src/main/java/org/quartz/xml/XMLSchedulingDataProcessor.java
a1395ba118df306c7fe67c24fb0c9a95a4473140
0
Analyze the following code function for security vulnerabilities
@Override public String buildMetadataResponse(MetaData metaData) throws SAMLException { EntityDescriptorType root = new EntityDescriptorType(); root.setID("_" + metaData.id); root.setEntityID(metaData.entityId); if (metaData.idp != null) { IDPSSODescriptorType idp = new IDPSSODescriptorType(); idp.getProtocolSupportEnumeration().add("urn:oasis:names:tc:SAML:2.0:protocol"); metaData.idp.redirectBindingSignInEndpoints.forEach(endpoint -> { EndpointType signIn = new EndpointType(); signIn.setBinding(Binding.HTTP_Redirect.toSAMLFormat()); signIn.setLocation(endpoint); idp.getSingleSignOnService().add(signIn); }); metaData.idp.postBindingSignInEndpoints.forEach(endpoint -> { EndpointType signIn = new EndpointType(); signIn.setBinding(Binding.HTTP_POST.toSAMLFormat()); signIn.setLocation(endpoint); idp.getSingleSignOnService().add(signIn); }); metaData.idp.redirectBindingLogoutEndpoints.forEach(endpoint -> { EndpointType logOut = new EndpointType(); logOut.setBinding(Binding.HTTP_Redirect.toSAMLFormat()); logOut.setLocation(endpoint); idp.getSingleLogoutService().add(logOut); }); metaData.idp.postBindingLogoutEndpoints.forEach(endpoint -> { EndpointType logOut = new EndpointType(); logOut.setBinding(Binding.HTTP_POST.toSAMLFormat()); logOut.setLocation(endpoint); idp.getSingleLogoutService().add(logOut); }); // Add certificates addKeyDescriptors(idp, metaData.idp.certificates); root.getRoleDescriptorOrIDPSSODescriptorOrSPSSODescriptor().add(idp); } if (metaData.sp != null) { SPSSODescriptorType sp = new SPSSODescriptorType(); sp.getProtocolSupportEnumeration().add("urn:oasis:names:tc:SAML:2.0:protocol"); sp.setAuthnRequestsSigned(metaData.sp.authnRequestsSigned); sp.setWantAssertionsSigned(metaData.sp.wantAssertionsSigned); if (metaData.sp.acsEndpoint != null) { IndexedEndpointType acs = new IndexedEndpointType(); acs.setBinding(Binding.HTTP_POST.toSAMLFormat()); acs.setLocation(metaData.sp.acsEndpoint); sp.getAssertionConsumerService().add(acs); } if (metaData.sp.nameIDFormat != null) { sp.getNameIDFormat().add(metaData.sp.nameIDFormat.toSAMLFormat()); } // Add certificates addKeyDescriptors(sp, metaData.sp.certificates); root.getRoleDescriptorOrIDPSSODescriptorOrSPSSODescriptor().add(sp); } // Convert to String byte[] bytes = marshallToBytes(METADATA_OBJECT_FACTORY.createEntityDescriptor(root), EntityDescriptorType.class); return new String(bytes, StandardCharsets.UTF_8); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildMetadataResponse File: src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java Repository: FusionAuth/fusionauth-samlv2 The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-27736
MEDIUM
4
FusionAuth/fusionauth-samlv2
buildMetadataResponse
src/main/java/io/fusionauth/samlv2/service/DefaultSAMLv2Service.java
c66fb689d50010662f705d5b585c6388ce555dbd
0
Analyze the following code function for security vulnerabilities
@Override public void onFinishedClosing() { mSelectedAction = -1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onFinishedClosing File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
onFinishedClosing
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
@Override protected <RemoteInterfaceType, RemoteCallResponseType, FinalResponseType> NodeResponse<FinalResponseType> doNodeApiCall( String nodeId, Class<RemoteInterfaceType> interfaceClass, Function<RemoteInterfaceType, Call<RemoteCallResponseType>> remoteInterfaceFunction, Function<RemoteCallResponseType, FinalResponseType> transformer, Duration timeout) throws IOException { return super.doNodeApiCall(nodeId, interfaceClass, remoteInterfaceFunction, transformer, timeout); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doNodeApiCall File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
doNodeApiCall
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
@Override public long forceNetworkLogs() { Preconditions.checkCallAuthorization(isAdb(getCallerIdentity()) || hasCallingOrSelfPermission(permission.FORCE_DEVICE_POLICY_MANAGER_LOGS), "Caller must be shell or hold FORCE_DEVICE_POLICY_MANAGER_LOGS to call " + "forceNetworkLogs"); synchronized (getLockObject()) { if (!isNetworkLoggingEnabledInternalLocked()) { throw new IllegalStateException("logging is not available"); } if (mNetworkLogger != null) { return mInjector.binderWithCleanCallingIdentity( () -> mNetworkLogger.forceBatchFinalization()); } return 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forceNetworkLogs File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
forceNetworkLogs
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void startDelegateShellPermissionIdentity(int delegateUid, @Nullable String[] permissions) { if (UserHandle.getCallingAppId() != Process.SHELL_UID && UserHandle.getCallingAppId() != Process.ROOT_UID) { throw new SecurityException("Only the shell can delegate its permissions"); } // We allow delegation only to one instrumentation started from the shell synchronized (mProcLock) { // If the delegate is already set up for the target UID, nothing to do. if (mAppOpsService.getAppOpsServiceDelegate() != null) { if (!(mAppOpsService.getAppOpsServiceDelegate() instanceof ShellDelegate)) { throw new IllegalStateException("Bad shell delegate state"); } final ShellDelegate delegate = (ShellDelegate) mAppOpsService .getAppOpsServiceDelegate(); if (delegate.getDelegateUid() != delegateUid) { throw new SecurityException("Shell can delegate permissions only " + "to one instrumentation at a time"); } } final int instrCount = mActiveInstrumentation.size(); for (int i = 0; i < instrCount; i++) { final ActiveInstrumentation instr = mActiveInstrumentation.get(i); if (instr.mTargetInfo.uid != delegateUid) { continue; } // If instrumentation started from the shell the connection is not null if (instr.mUiAutomationConnection == null) { throw new SecurityException("Shell can delegate its permissions" + " only to an instrumentation started from the shell"); } // Hook them up... final ShellDelegate shellDelegate = new ShellDelegate(delegateUid, permissions); mAppOpsService.setAppOpsServiceDelegate(shellDelegate); final String packageName = instr.mTargetInfo.packageName; final List<String> permissionNames = permissions != null ? Arrays.asList(permissions) : null; getPermissionManagerInternal().startShellPermissionIdentityDelegation( delegateUid, packageName, permissionNames); return; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startDelegateShellPermissionIdentity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startDelegateShellPermissionIdentity
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public AutoCompletionCandidates doAutoCompleteAssignedLabelString(@QueryParameter String value) { AutoCompletionCandidates c = new AutoCompletionCandidates(); Set<Label> labels = Jenkins.getInstance().getLabels(); List<String> queries = new AutoCompleteSeeder(value).getSeeds(); for (String term : queries) { for (Label l : labels) { if (l.getName().startsWith(term)) { c.add(l.getName()); } } } return c; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doAutoCompleteAssignedLabelString File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
doAutoCompleteAssignedLabelString
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@Override public void killApplication(String pkg, int appId, int userId, String reason) { if (pkg == null) { return; } // Make sure the uid is valid. if (appId < 0) { Slog.w(TAG, "Invalid appid specified for pkg : " + pkg); return; } int callerUid = Binder.getCallingUid(); // Only the system server can kill an application if (UserHandle.getAppId(callerUid) == Process.SYSTEM_UID) { // Post an aysnc message to kill the application Message msg = mHandler.obtainMessage(KILL_APPLICATION_MSG); msg.arg1 = appId; msg.arg2 = userId; Bundle bundle = new Bundle(); bundle.putString("pkg", pkg); bundle.putString("reason", reason); msg.obj = bundle; mHandler.sendMessage(msg); } else { throw new SecurityException(callerUid + " cannot kill pkg: " + pkg); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: killApplication File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
killApplication
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
ObjectStreamField[] getLoadFields() { return loadFields; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLoadFields File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
getLoadFields
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice<ApplicationInfo> getInstalledApplications(int flags, int userId) { if (!sUserManager.exists(userId)) return null; final boolean listUninstalled = (flags & PackageManager.GET_UNINSTALLED_PACKAGES) != 0; // writer synchronized (mPackages) { ArrayList<ApplicationInfo> list; if (listUninstalled) { list = new ArrayList<ApplicationInfo>(mSettings.mPackages.size()); for (PackageSetting ps : mSettings.mPackages.values()) { ApplicationInfo ai; if (ps.pkg != null) { ai = PackageParser.generateApplicationInfo(ps.pkg, flags, ps.readUserState(userId), userId); } else { ai = generateApplicationInfoFromSettingsLPw(ps.name, flags, userId); } if (ai != null) { list.add(ai); } } } else { list = new ArrayList<ApplicationInfo>(mPackages.size()); for (PackageParser.Package p : mPackages.values()) { if (p.mExtras != null) { ApplicationInfo ai = PackageParser.generateApplicationInfo(p, flags, ((PackageSetting)p.mExtras).readUserState(userId), userId); if (ai != null) { list.add(ai); } } } } return new ParceledListSlice<ApplicationInfo>(list); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstalledApplications File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getInstalledApplications
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public String getSerialFrom() { return serialFrom; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSerialFrom File: base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getSerialFrom
base/common/src/main/java/com/netscape/certsrv/cert/CertSearchRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void testWrongParameters() { assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createPgServer("-pgPort 8182")); assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createTcpServer("-tcpPort 8182")); assertThrows(ErrorCode.FEATURE_NOT_SUPPORTED_1, () -> Server.createWebServer("-webPort=8182")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testWrongParameters File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
testWrongParameters
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private List<EnforcingUser> getEnforcingUsers(Set<EnforcingAdmin> admins) { List<EnforcingUser> enforcingUsers = new ArrayList(); ComponentName deviceOwner = mOwners.getDeviceOwnerComponent(); for (EnforcingAdmin admin : admins) { if (deviceOwner != null && deviceOwner.getPackageName().equals(admin.getPackageName())) { enforcingUsers.add(new EnforcingUser(admin.getUserId(), UserManager.RESTRICTION_SOURCE_DEVICE_OWNER)); } else { enforcingUsers.add(new EnforcingUser(admin.getUserId(), UserManager.RESTRICTION_SOURCE_PROFILE_OWNER)); } } return enforcingUsers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEnforcingUsers File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getEnforcingUsers
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@MediumTest @Test public void testDropCdmaEnhancedPrivacyVoiceCall() throws Exception { mConnectionServiceFixtureA.mConnectionServiceDelegate.mProperties = Connection.PROPERTY_HAS_CDMA_VOICE_PRIVACY; IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212", mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA); assertEquals(Call.STATE_ACTIVE, mInCallServiceFixtureX.getCall(ids.mCallId).getState()); mConnectionServiceFixtureA.mLatestConnection.setConnectionProperties(0); assertFalse(Call.Details.hasProperty( mInCallServiceFixtureX.getCall(ids.mCallId).getProperties(), Call.Details.PROPERTY_HAS_CDMA_VOICE_PRIVACY)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDropCdmaEnhancedPrivacyVoiceCall File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testDropCdmaEnhancedPrivacyVoiceCall
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public boolean isNearMeFeatureEnabled() { return CONF.postsNearMeEnabled(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNearMeFeatureEnabled File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isNearMeFeatureEnabled
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public void addOnShowModeChangedListener(@NonNull OnShowModeChangedListener listener) { addOnShowModeChangedListener(listener, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addOnShowModeChangedListener File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
addOnShowModeChangedListener
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
@Override public InternationalString getDescriptionText(final String code) throws FactoryException { IdentifiedObject identifiedObject = createObject(code); final Identifier identifier = identifiedObject.getName(); if (identifier instanceof GenericName) { return ((GenericName) identifier).toInternationalString(); } return new SimpleInternationalString(identifier.getCode()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDescriptionText File: modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getDescriptionText
modules/library/referencing/src/main/java/org/geotools/referencing/factory/AbstractEpsgMediator.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override public void deleteMediaPackage(String mediaPackageId, Date deletionDate) throws SearchServiceDatabaseException, NotFoundException { EntityManager em = null; EntityTransaction tx = null; try { em = emf.createEntityManager(); tx = em.getTransaction(); tx.begin(); SearchEntity searchEntity = getSearchEntity(mediaPackageId, em); if (searchEntity == null) throw new NotFoundException("No media package with id=" + mediaPackageId + " exists"); // Ensure this user is allowed to delete this episode String accessControlXml = searchEntity.getAccessControl(); if (accessControlXml != null) { AccessControlList acl = AccessControlParser.parseAcl(accessControlXml); User currentUser = securityService.getUser(); Organization currentOrg = securityService.getOrganization(); if (!AccessControlUtil.isAuthorized(acl, currentUser, currentOrg, WRITE.toString())) throw new UnauthorizedException(currentUser + " is not authorized to delete media package " + mediaPackageId); searchEntity.setDeletionDate(deletionDate); em.merge(searchEntity); } tx.commit(); } catch (NotFoundException e) { throw e; } catch (Exception e) { logger.error("Could not delete episode {}: {}", mediaPackageId, e.getMessage()); if (tx.isActive()) { tx.rollback(); } throw new SearchServiceDatabaseException(e); } finally { if (em != null) em.close(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteMediaPackage File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
deleteMediaPackage
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/persistence/SearchServiceDatabaseImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
protected final void destroyContentViewCore(boolean deleteNativeWebContents) { if (mContentViewCore == null) return; destroyContentViewCoreInternal(mContentViewCore); if (mInfoBarContainer != null && mInfoBarContainer.getParent() != null) { mInfoBarContainer.removeFromParentView(); } mContentViewCore.destroy(); mContentViewCore = null; mWebContentsDelegate = null; mWebContentsObserver = null; mVoiceSearchTabHelper = null; assert mNativeTabAndroid != 0; nativeDestroyWebContents(mNativeTabAndroid, deleteNativeWebContents); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroyContentViewCore File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
destroyContentViewCore
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override protected void dumpFilter(PrintWriter out, String prefix, PackageParser.ProviderIntentInfo filter) { out.print(prefix); out.print( Integer.toHexString(System.identityHashCode(filter.provider))); out.print(' '); filter.provider.printComponentShortName(out); out.print(" filter "); out.println(Integer.toHexString(System.identityHashCode(filter))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpFilter File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
dumpFilter
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static HtmlForm getHtmlFormFromUiResource(ResourceFactory resourceFactory, FormService formService, HtmlFormEntryService htmlFormEntryService, String providerAndPath, Encounter encounter) throws IOException { int ind = providerAndPath.indexOf(':'); String provider = providerAndPath.substring(0, ind); String path = providerAndPath.substring(ind + 1); return getHtmlFormFromUiResource(resourceFactory, formService, htmlFormEntryService, provider, path, encounter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHtmlFormFromUiResource File: api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java Repository: openmrs/openmrs-module-htmlformentryui The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-4284
MEDIUM
6.1
openmrs/openmrs-module-htmlformentryui
getHtmlFormFromUiResource
api/src/main/java/org/openmrs/module/htmlformentryui/HtmlFormUtil.java
811990972ea07649ae33c4b56c61c3b520895f07
0
Analyze the following code function for security vulnerabilities
public DisplayContent getDisplayContentLocked(final int displayId) { DisplayContent displayContent = mDisplayContents.get(displayId); if (displayContent == null) { final Display display = mDisplayManager.getDisplay(displayId); if (display != null) { displayContent = newDisplayContentLocked(display); } } return displayContent; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisplayContentLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getDisplayContentLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public ApiClient setTempFolderPath(String tempFolderPath) { this.tempFolderPath = tempFolderPath; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTempFolderPath File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setTempFolderPath
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public int copySpaceBetweenWikis(String space, String sourceWiki, String targetWiki, String locale, boolean clean, XWikiContext context) throws XWikiException { String db = context.getWikiId(); int nb = 0; // Workaround for XWIKI-3915: Do not use XWikiStoreInterface#searchDocumentNames since currently it has the // side effect of hidding hidden documents and no other workaround exists than directly using // XWikiStoreInterface#search directly String sql = "select distinct doc.fullName from XWikiDocument as doc"; List<String> parameters = new ArrayList<>(); if (space != null) { parameters.add(space); sql += " where doc.space = ?" + parameters.size(); } if (clean) { try { context.setWikiId(targetWiki); List<String> list = getStore().search(sql, 0, 0, parameters, context); LOGGER.info("Deleting [{}] documents from wiki [{}]", list.size(), targetWiki); for (String docname : list) { XWikiDocument doc = getDocument(docname, context); deleteDocument(doc, context); } } finally { context.setWikiId(db); } } try { context.setWikiId(sourceWiki); List<String> list = getStore().search(sql, 0, 0, parameters, context); LOGGER.info("Copying [{}] documents from wiki [{}] to wiki [{}]", list.size(), sourceWiki, targetWiki); WikiReference sourceWikiReference = new WikiReference(sourceWiki); WikiReference targetWikiReference = new WikiReference(targetWiki); for (String docname : list) { DocumentReference sourceDocumentReference = getCurrentMixedDocumentReferenceResolver().resolve(docname); sourceDocumentReference = sourceDocumentReference .replaceParent(sourceDocumentReference.getWikiReference(), sourceWikiReference); DocumentReference targetDocumentReference = sourceDocumentReference.replaceParent(sourceWikiReference, targetWikiReference); copyDocument(sourceDocumentReference, targetDocumentReference, locale, context); nb++; } return nb; } finally { context.setWikiId(db); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copySpaceBetweenWikis File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
copySpaceBetweenWikis
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
List<SysUserDepVo> getDepNamesByUserIds(@Param("userIds")List<String> userIds);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDepNamesByUserIds File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getDepNamesByUserIds
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public void setStudyEventAndFormMetaOC1_3TypesExpected() { this.unsetTypeExpected(); int i=1; this.setTypeExpected(i, TypeNames.INT);// definition_order ++i; this.setTypeExpected(i, TypeNames.INT); // crf_order ++i; this.setTypeExpected(i, TypeNames.INT); // edc.crf_id ++i; this.setTypeExpected(i, TypeNames.INT); // cv.crf_version_id ++i; this.setTypeExpected(i, TypeNames.STRING);// definition_oid ++i; this.setTypeExpected(i, TypeNames.STRING);// cv_oid ++i; this.setTypeExpected(i, TypeNames.STRING);// description ++i; this.setTypeExpected(i, TypeNames.STRING);// category ++i; this.setTypeExpected(i, TypeNames.STRING);// version_description ++i; this.setTypeExpected(i, TypeNames.STRING);// revision_notes ++i; this.setTypeExpected(i, TypeNames.STRING);// crf_oid ++i; this.setTypeExpected(i, TypeNames.STRING);// null_values ++i; this.setTypeExpected(i, TypeNames.INT); //default_version_id ++i; this.setTypeExpected(i, TypeNames.BOOL); //electronic_signature ++i; this.setTypeExpected(i, TypeNames.BOOL);// double_entry ++i; this.setTypeExpected(i, TypeNames.BOOL);// hide_crf ++i; this.setTypeExpected(i, TypeNames.BOOL);// participant_form ++i; this.setTypeExpected(i, TypeNames.BOOL);// allow_anonymous_submission ++i; this.setTypeExpected(i, TypeNames.STRING);// submission_url ++i; this.setTypeExpected(i, TypeNames.BOOL);// offline ++i; this.setTypeExpected(i, TypeNames.INT);// source_data_verification_code }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStudyEventAndFormMetaOC1_3TypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setStudyEventAndFormMetaOC1_3TypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public static Path getDeployedPath(Path path) throws IOException { return DEPLOYED_BASE_PATH.get().resolve(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeployedPath File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
getDeployedPath
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/utils/FilesUtils.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
public String getRenderedContent(String text, String sourceSyntaxId, String targetSyntaxId, XWikiContext context) { return getRenderedContent(text, sourceSyntaxId, targetSyntaxId, false, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void setUseDarkTextColors(boolean useDarkColors) { if (mUseDarkColors != null && mUseDarkColors.booleanValue() == useDarkColors) return; mUseDarkColors = useDarkColors; if (mUseDarkColors) { setTextColor(mDarkDefaultTextColor); setHighlightColor(mDarkHighlightColor); } else { setTextColor(mLightDefaultTextColor); setHighlightColor(mLightHighlightColor); } // Note: Setting the hint text color only takes effect if there is not text in the URL bar. // To get around this, set the URL to empty before setting the hint color and revert // back to the previous text after. boolean hasNonEmptyText = false; Editable text = getText(); if (!TextUtils.isEmpty(text)) { setText(""); hasNonEmptyText = true; } if (useDarkColors) { setHintTextColor(mDarkHintColor); } else { setHintTextColor(mLightHintColor); } if (hasNonEmptyText) setText(text); if (!hasFocus()) { deEmphasizeUrl(); emphasizeUrl(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUseDarkTextColors File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
setUseDarkTextColors
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting int injectBinderCallingUid() { return getCallingUid(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectBinderCallingUid File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectBinderCallingUid
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public List<SyncInfo> getCurrentSyncsCopy(int userId, boolean canAccessAccounts) { synchronized (mAuthorities) { final List<SyncInfo> syncs = getCurrentSyncsLocked(userId); final List<SyncInfo> syncsCopy = new ArrayList<SyncInfo>(); for (SyncInfo sync : syncs) { SyncInfo copy; if (!canAccessAccounts) { copy = SyncInfo.createAccountRedacted( sync.authorityId, sync.authority, sync.startTime); } else { copy = new SyncInfo(sync); } syncsCopy.add(copy); } return syncsCopy; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentSyncsCopy File: services/core/java/com/android/server/content/SyncStorageEngine.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-2424
HIGH
7.1
android
getCurrentSyncsCopy
services/core/java/com/android/server/content/SyncStorageEngine.java
d3383d5bfab296ba3adbc121ff8a7b542bde4afb
0
Analyze the following code function for security vulnerabilities
@Override public void write(String string, int offset, int length) { builder.append(string, offset, length); tryFlush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
write
web/src/main/java/com/zrlog/web/handler/ResponseRenderPrintWriter.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public UserProperty newInstance(User user) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-2064
MEDIUM
5
jenkinsci/jenkins
newInstance
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
fbf96734470caba9364f04e0b77b0bae7293a1ec
0
Analyze the following code function for security vulnerabilities
private boolean getBooleanCarrierConfig(String key) { PersistableBundle b = PhoneGlobals.getInstance() .getCarrierConfigForSubId(mPhone.getSubId()); if (b == null) { b = PhoneGlobals.getInstance().getCarrierConfig(); } return b.getBoolean(key); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBooleanCarrierConfig File: src/com/android/phone/settings/VoicemailSettingsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
getBooleanCarrierConfig
src/com/android/phone/settings/VoicemailSettingsActivity.java
674039e70e1c5bf29b808899ac80c709acc82290
0
Analyze the following code function for security vulnerabilities
public void setCommentTitle(String commentTitle){ this.commentTitle = commentTitle; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCommentTitle File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setCommentTitle
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
@Override @BeforeMethod public void setUp(){ super.setUp(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUp File: main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
setUp
main/tests/server/src/com/google/refine/tests/importing/ImportingUtilitiesTests.java
79994e86da1a3eecc62723f4ba90f14a63ad0e72
0
Analyze the following code function for security vulnerabilities
protected String _finishTextToken(int ch) throws IOException { _tokenIncomplete = false; final int type = ((ch >> 5) & 0x7); ch &= 0x1F; // sanity check if (type != CBORConstants.MAJOR_TYPE_TEXT) { // should never happen so _throwInternal(); } // String value, decode final int len = _decodeExplicitLength(ch); if (len <= 0) { if (len == 0) { _textBuffer.resetWithEmpty(); return ""; } _finishChunkedText(); return _textBuffer.contentsAsString(); } if (len > (_inputEnd - _inputPtr)) { // or if not, could we read? if (len >= _inputBuffer.length) { // If not enough space, need handling similar to chunked _finishLongText(len); return _textBuffer.contentsAsString(); } _loadToHaveAtLeast(len); } // offline for better optimization return _finishShortText(len); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _finishTextToken File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_finishTextToken
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public void update(String table, Object entity, CQLWrapper filter, boolean returnUpdatedIds, Handler<AsyncResult<UpdateResult>> replyHandler) { String where = ""; if(filter != null){ where = filter.toString(); } update(table, entity, DEFAULT_JSONB_FIELD_NAME, where, returnUpdatedIds, replyHandler); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
update
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@DimenRes public int getDesiredHeightResId() { return mDesiredHeightResId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDesiredHeightResId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getDesiredHeightResId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void onStart() { super.onStart(); if (this.reInitRequiredOnStart && this.conversation != null) { final Bundle extras = pendingExtras.pop(); reInit(this.conversation, extras != null); if (extras != null) { processExtras(extras); } } else if (conversation == null && activity != null && activity.xmppConnectionService != null) { final String uuid = pendingConversationsUuid.pop(); Log.d(Config.LOGTAG, "ConversationFragment.onStart() - activity was bound but no conversation loaded. uuid=" + uuid); if (uuid != null) { findAndReInitByUuidOrArchive(uuid); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStart File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onStart
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0