instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private DocumentReference getCurrentUser(Right right, EntityReference entity) { // Backward compatibility for the old way of assigning programming right. if (CONTENT_AUTHOR_RIGHTS.contains(right)) { XWikiDocument doc = entity == null ? getProgrammingDocument() : getDocument(entity); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentUser File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContext...
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
getCurrentUser
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContextualAuthorizationManager.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public void startSystemLockTaskMode(int taskId) throws RemoteException { mActivityTaskManager.startSystemLockTaskMode(taskId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startSystemLockTaskMode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startSystemLockTaskMode
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void removeCharacterDataChangeListener(final CharacterDataChangeListener listener) { WebAssert.notNull("listener", listener); synchronized (listeners_lock_) { if (characterDataListeners_ != null) { characterDataListeners_.remove(listener); characterDat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeCharacterDataChangeListener File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
removeCharacterDataChangeListener
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private boolean isPackageAccessForbidden(String pkg) { return SecurityConstants.PACKAGE_USE_BLACKLIST.stream().anyMatch(pkg::startsWith) || (isPackageBlacklisted(pkg) && !isPackageWhitelisted(pkg)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackageAccessForbidden File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
isPackageAccessForbidden
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public void setSimpleMode(boolean val) { simpleMode = val; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSimpleMode File: src/main/java/emissary/pickup/WorkBundle.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
setSimpleMode
src/main/java/emissary/pickup/WorkBundle.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
@Nullable private ParcelFileDescriptor getShortcutIconParcelFileDescriptor( @Nullable final ShortcutPackage p, @Nullable final ShortcutInfo shortcutInfo) { if (p == null || shortcutInfo == null || !shortcutInfo.hasIconFile()) { return null; } f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShortcutIconParcelFileDescriptor File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getShortcutIconParcelFileDescriptor
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
protected boolean isAllowed(DocumentReference resultDocumentReference, List<DocumentReference> usersToCheck) { for (DocumentReference user : usersToCheck) { if (!this.authorization.hasAccess(Right.VIEW, user, resultDocumentReference)) { return false; } } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAllowed File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-query/src/main/java/org/xwiki/query/solr/internal/SolrQueryExecutor.java Repository: xwiki/xwiki-platform ...
[ "CWE-285" ]
CVE-2023-48241
HIGH
7.5
xwiki/xwiki-platform
isAllowed
xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-query/src/main/java/org/xwiki/query/solr/internal/SolrQueryExecutor.java
93b8ec702d7075f0f5794bb05dfb651382596764
0
Analyze the following code function for security vulnerabilities
private void offerEncryptedWriteRequest(MessageEvent encryptedWrite) { final boolean locked = pendingEncryptedWritesLock.tryLock(); try { pendingEncryptedWrites.add(encryptedWrite); } finally { if (locked) { pendingEncryptedWritesLock.unlock(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: offerEncryptedWriteRequest File: src/main/java/org/jboss/netty/handler/ssl/SslHandler.java Repository: netty The code follows secure coding practices.
[ "CWE-119" ]
CVE-2014-3488
MEDIUM
5
netty
offerEncryptedWriteRequest
src/main/java/org/jboss/netty/handler/ssl/SslHandler.java
2fa9400a59d0563a66908aba55c41e7285a04994
0
Analyze the following code function for security vulnerabilities
public static String getBuildTimestamp() { return BUILD_TIMESTAMP; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBuildTimestamp File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getBuildTimestamp
modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override public boolean getMasterSyncAutomaticallyAsUser(int userId) { enforceCrossUserPermission(userId, "no permission to read the sync settings for user " + userId); mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_SETTINGS, "no permission to ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMasterSyncAutomaticallyAsUser File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
getMasterSyncAutomaticallyAsUser
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@Override public String getType(Uri arg0) { return "application/vnd.hgz.vocabletrainer"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getType File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java Repository: hgzojer/vocabletrainer The code follows secure coding practices.
[ "CWE-22" ]
CVE-2017-20181
MEDIUM
4.3
hgzojer/vocabletrainer
getType
src/at/hgz/vocabletrainer/VocableTrainerProvider.java
accf6838078f8eb105cfc7865aba5c705fb68426
0
Analyze the following code function for security vulnerabilities
public static void copyToDir(Directory in, Directory out, String inFile, String outFile) throws DirectoryException { try { if (in.containsDir(inFile)) { in.getDir(inFile).copyToDir(out.createDir(outFile)); } else { BrutIO.copyAndClose(in.getFil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyToDir File: brut.j.dir/src/main/java/brut/directory/DirUtil.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
copyToDir
brut.j.dir/src/main/java/brut/directory/DirUtil.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
private void dismissVolumeDialog() { if (mVolumeComponent != null) { mVolumeComponent.dismissNow(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissVolumeDialog File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
dismissVolumeDialog
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private Element elementAsLink(String url, String text) { Element link = new Element(Tag.A).attr("href", url).text(text); return new Element(Tag.LI).appendChild(link); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elementAsLink File: flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-31412
MEDIUM
4.3
vaadin/flow
elementAsLink
flow-server/src/main/java/com/vaadin/flow/router/RouteNotFoundError.java
c79a7a8dbe1a494ff99a591d2e85b1100fc0aa15
0
Analyze the following code function for security vulnerabilities
boolean checkDestination(SmsTracker tracker) { if (mContext.checkCallingOrSelfPermission(SEND_SMS_NO_CONFIRMATION) == PackageManager.PERMISSION_GRANTED) { return true; // app is pre-approved to send to short codes } else { int rule = mPremiumSmsRule.get...
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3888 - Severity: LOW - CVSS Score: 2.1 Description: Do not allow premium SMS during SuW Bug: 29420123 Change-Id: I41ef7138635f11fbe7f495dd81103458cb969c35 (cherry picked from commit 15f55ca2f204e664807e047b5f898693b274bab6) Function: checkDestination File...
[ "CWE-264" ]
CVE-2016-3888
LOW
2.1
android
checkDestination
src/java/com/android/internal/telephony/SMSDispatcher.java
b8d1aee993dcc565e6576b2f2439a8f5a507cff6
1
Analyze the following code function for security vulnerabilities
public GestureRecorder getGestureRecorder() { return mGestureRec; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGestureRecorder File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getGestureRecorder
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
private static void loadLibraryByHelper(final Class<?> helper, final String name, final boolean absolute) throws UnsatisfiedLinkError { Object ret = AccessController.doPrivileged(new PrivilegedAction<Object>() { @Override public Object run() { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadLibraryByHelper File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
loadLibraryByHelper
common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
public int delete(String table, String whereClause, String[] whereArgs) { acquireReference(); try { SQLiteStatement statement = new SQLiteStatement(this, "DELETE FROM " + table + (!TextUtils.isEmpty(whereClause) ? " WHERE " + whereClause : ""), whereArgs); tr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
delete
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
public String dialogContentStart(String title) { return dialogContent(HTML_START, title); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dialogContentStart File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
dialogContentStart
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
private void gc(ConsoleOutputStreamConsumer outputStreamConsumer) { log(outputStreamConsumer, "Performing git gc"); CommandLine gitGc = gitWd().withArgs("gc", "--auto"); run(gitGc, outputStreamConsumer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: gc File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
gc
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
private void handleIpConfigurationLost() { mWifiInfo.setInetAddress(null); mWifiInfo.setMeteredHint(false); mWifiConfigManager.updateNetworkSelectionStatus(mLastNetworkId, WifiConfiguration.NetworkSelectionStatus.DISABLED_DHCP_FAILURE); /* DHCP times out after about 30 ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleIpConfigurationLost File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleIpConfigurationLost
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void purgeOldGrants(UserAccounts accounts) { synchronized (accounts.dbLock) { synchronized (accounts.cacheLock) { List<Integer> uids = accounts.accountsDb.findAllUidGrants(); for (int uid : uids) { final boolean packageExists = mPackageMana...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: purgeOldGrants File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
purgeOldGrants
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public java.net.URL getURL(String columnName) throws SQLException { return getURL(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURL File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getURL
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@OnClose public void onClose(){ for(String activityId : activitiesMap.keySet()){ activitiesMap.get(activityId).onClose(); } activitiesMap.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onClose File: jbpm-console-ng-human-tasks/jbpm-console-ng-human-tasks-client/src/main/java/org/jbpm/console/ng/ht/client/editors/taskdetailsmulti/TaskDetailsMultiPresenter.java Repository: kiegroup/jbpm-wb The code fo...
[ "CWE-79" ]
CVE-2013-6465
LOW
3.5
kiegroup/jbpm-wb
onClose
jbpm-console-ng-human-tasks/jbpm-console-ng-human-tasks-client/src/main/java/org/jbpm/console/ng/ht/client/editors/taskdetailsmulti/TaskDetailsMultiPresenter.java
4818204506e8e94645b52adb9426bedfa9ffdd04
0
Analyze the following code function for security vulnerabilities
public static void registerCodeActionParticipants(Map<String, ICodeActionParticipant> codeActions) { codeActions.put(ElementUnterminated.getCode(), new ElementUnterminatedCodeAction()); codeActions.put(EqRequiredInAttribute.getCode(), new EqRequiredInAttributeCodeAction()); codeActions.put(OpenQuoteExpected.getCo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerCodeActionParticipants File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/participants/XMLSyntaxErrorCode.java Repository: eclipse/lemminx The code follows secure coding practi...
[ "CWE-611" ]
CVE-2019-18213
MEDIUM
6.5
eclipse/lemminx
registerCodeActionParticipants
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/extensions/contentmodel/participants/XMLSyntaxErrorCode.java
c8bf3245a72cace50ee2aae5eee69538c58ce056
0
Analyze the following code function for security vulnerabilities
@Override public int getClipHeight(Object graphics) { return ((AndroidGraphics) graphics).getClipHeight(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClipHeight File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getClipHeight
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@CalledByNative private void addPermissionSection(String name, int type, int currentSetting) { // We have at least one permission, so show the lower permissions area. setVisibilityOfLowerDialogArea(true); View permissionRow = LayoutInflater.from(mContext).inflate( R.layout.w...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPermissionSection File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-1261
MEDIUM
5
chromium
addPermissionSection
chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f
0
Analyze the following code function for security vulnerabilities
public @NonNull List<UserHandle> getBindDeviceAdminTargetUsers(@NonNull ComponentName admin) { throwIfParentInstance("getBindDeviceAdminTargetUsers"); try { return mService.getBindDeviceAdminTargetUsers(admin); } catch (RemoteException re) { throw re.rethrowFromSystemServ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBindDeviceAdminTargetUsers File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getBindDeviceAdminTargetUsers
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void run() { android.os.Debug.stopMethodTracing(); Log.d(TAG, "stopTracing"); vibrate(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
run
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setCurrentInstances(VaadinRequest request, VaadinResponse response) { setCurrent(this); CurrentInstance.set(VaadinRequest.class, request); CurrentInstance.set(VaadinResponse.class, response); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCurrentInstances File: flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31404
LOW
1.9
vaadin/flow
setCurrentInstances
flow-server/src/main/java/com/vaadin/flow/server/VaadinService.java
621ef1b322737d963bee624b2d2e38cd739903d9
0
Analyze the following code function for security vulnerabilities
@Override public void updateApplicationTemplate(String oldTemplateName, SpTemplate spTemplate, String tenantDomain) throws IdentityApplicationManagementException { try { validateSPTemplateExists(oldTemplateName, spTemplate, tenantDomain); ServiceProvider serviceProvider...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApplicationTemplate File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-i...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
updateApplicationTemplate
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Override public boolean isLookupFontSupported() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLookupFontSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isLookupFontSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private int applyUserId(int uid, int userId) { return UserHandle.getUid(userId, uid); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyUserId File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
applyUserId
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public Integer getMaximumTransactionBundleSize() { return myMaximumTransactionBundleSize; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumTransactionBundleSize File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getMaximumTransactionBundleSize
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
protected String htmlImg2MsImg(String input) { // <img src="xxx/resource/md/get/a0b19136_中心主题.png"/> -> ![中心主题.png](/resource/md/get/a0b19136_中心主题.png) String regex = "(<img\\s*src=\\\"(.*?)\\\".*?>)"; Pattern pattern = Pattern.compile(regex); if (StringUtils.isBlank(input)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: htmlImg2MsImg File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
htmlImg2MsImg
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void beginTransaction(SQLiteTransactionListener transactionListener, boolean exclusive) { acquireReference(); try { getThreadSession().beginTransaction( exclusive ? SQLiteSession.TRANSACTION_MODE_EXCLUSIVE : SQLiteSession.TR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginTransaction File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
beginTransaction
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override public String[] getAlias() { return new String[]{"twitchnotifier", "streamnotifier"}; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAlias File: src/main/java/de/presti/ree6/commands/impl/community/TwitchNotifier.java Repository: Ree6-Applications/Ree6 The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-39302
MEDIUM
5.4
Ree6-Applications/Ree6
getAlias
src/main/java/de/presti/ree6/commands/impl/community/TwitchNotifier.java
459b5bc24f0ea27e50031f563373926e94b9aa0a
0
Analyze the following code function for security vulnerabilities
private void pushNativePageStateToNavigationEntry() { assert mNativeTabAndroid != 0 && getNativePage() != null; nativeSetActiveNavigationEntryTitleForUrl(mNativeTabAndroid, getNativePage().getUrl(), getNativePage().getTitle()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushNativePageStateToNavigationEntry File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
pushNativePageStateToNavigationEntry
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private static String genRandomStr() { String base = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"; Random random = new Random(); StringBuilder sb = new StringBuilder(); for (int i = 0; i < 16; i++) { int number = random.nextInt(base.length()); sb.append(base.charAt(number...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: genRandomStr File: weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java Repository: Wechat-Group/WxJava The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20318
HIGH
7.5
Wechat-Group/WxJava
genRandomStr
weixin-java-common/src/main/java/me/chanjar/weixin/common/util/crypto/WxCryptUtil.java
6272639f02e397fed40828a2d0da66c30264bc0e
0
Analyze the following code function for security vulnerabilities
private void setSelectedRcoiForPasspoint(WifiConfiguration config) { // Only relevant for Passpoint providers with roaming consortium subscriptions if (config.isPasspoint() && config.roamingConsortiumIds != null && config.roamingConsortiumIds.length > 0) { long selectedRcoi =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSelectedRcoiForPasspoint File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
setSelectedRcoiForPasspoint
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
void finishLaunchTickingLocked() { launchTickTime = 0; final Task rootTask = getRootTask(); if (rootTask == null) { return; } rootTask.removeLaunchTickMessages(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishLaunchTickingLocked File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
finishLaunchTickingLocked
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public String loadXML(String fileName) { loadFile(fileName); return getXML(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadXML File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
loadXML
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Beta public static BufferedReader newReader(File file, Charset charset) throws FileNotFoundException { checkNotNull(file); checkNotNull(charset); return new BufferedReader(new InputStreamReader(new FileInputStream(file), charset)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newReader File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
newReader
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
private void placeWindowBefore(WindowState pos, WindowState window) { final WindowList windows = pos.getWindowList(); int i = windows.indexOf(pos); if (DEBUG_FOCUS || DEBUG_WINDOW_MOVEMENT || DEBUG_ADD_REMOVE) Slog.v( TAG, "Adding window " + window + " at " + i + " of " +...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: placeWindowBefore File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
placeWindowBefore
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public PlaybackState getPlaybackState() { return getStateWithUpdatedPosition(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPlaybackState File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
getPlaybackState
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
@Nonnull public static Image renderWithTransparency(final float opacity, @Nonnull final AbstractElement element, @Nonnull final MindMapPanelConfig config, @Nonnull final RenderQuality quality) { final AbstractElement cloned = element.makeCopy(); final Rectangle2D bounds = cloned.getBounds(); final float ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderWithTransparency File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java Repository: raydac/netbeans-mmd-plugin The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000542
MEDIUM
6.8
raydac/netbeans-mmd-plugin
renderWithTransparency
mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
9fba652bf06e649186b8f9e612d60e9cc15097e9
0
Analyze the following code function for security vulnerabilities
public void update(Status status) { ClickHouseNodeManager m = this.manager.get(); if (m != null) { m.update(this, status); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
update
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
protected final byte _parseBytePrimitive(JsonParser p, DeserializationContext ctxt) throws IOException { String text; switch (p.currentTokenId()) { case JsonTokenId.ID_STRING: text = p.getText(); break; case JsonTokenId.ID_NUMBER_FLOAT: Coe...
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2022-42003 - Severity: HIGH - CVSS Score: 7.5 Description: Fix #3590 Function: _parseBytePrimitive File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind Fixed Code: protected final byte _parseBy...
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_parseBytePrimitive
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
1
Analyze the following code function for security vulnerabilities
public boolean isVisible() { if (hasFeature(ElementData.class)) { boolean isVisibleSelf = getFeature(ElementData.class).isVisible(); if (!isVisibleSelf || getParent() == null) { return isVisibleSelf; } return parent.isVisible(); } r...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2023-25499 - Severity: MEDIUM - CVSS Score: 6.5 Description: Cleanup, and refactoring, in Element, StateNode, UIInternals classes + mvn formatter. Function: isVisible File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow...
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
isVisible
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
1
Analyze the following code function for security vulnerabilities
public boolean isAccessPermissionEpub() { synchronized (this) { try { if ((navigationHelper != null && !isEnabled(EPUBDownloadJob.LOCAL_TYPE, navigationHelper.getCurrentPage())) || viewManager == null || !DownloadJob.ocrFolderExists(viewManager.getPi())) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAccessPermissionEpub File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
isAccessPermissionEpub
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public static Element getChildElement(Element element, String childName) { for (org.w3c.dom.Node node = element.getFirstChild(); node != null; node = node.getNextSibling()) { if (node.getNodeType() == org.w3c.dom.Node.ELEMENT_NODE && ((Elemen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildElement File: bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java Repository: dbeaver The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3836
MEDIUM
4.3
dbeaver
getChildElement
bundles/org.jkiss.utils/src/org/jkiss/utils/xml/XMLUtils.java
4debf8f25184b7283681ed3fb5e9e887d9d4fe22
0
Analyze the following code function for security vulnerabilities
public void stopRestrictingAutoJoinToSubscriptionId() { mNonCarrierMergedNetworksStatusTracker.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopRestrictingAutoJoinToSubscriptionId File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
stopRestrictingAutoJoinToSubscriptionId
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
protected void executePut(String uri, InputStream content, String mediaType, int... expectedCodes) throws Exception { executePut(uri, content, mediaType, true, expectedCodes); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executePut File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
executePut
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private static boolean isValidIpAddress(String ipAddress) { return isIp4Address(ipAddress) || isIp6Address(ipAddress); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidIpAddress File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
isValidIpAddress
graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
private void appendBasicMemEntry(StringBuilder sb, int oomAdj, int procState, long pss, long memtrack, String name) { sb.append(" "); sb.append(ProcessList.makeOomAdjString(oomAdj)); sb.append(' '); sb.append(ProcessList.makeProcStateString(procState)); sb.append(' '...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendBasicMemEntry File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
appendBasicMemEntry
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public boolean launchAssistIntent(Intent intent, int requestType, String hint, int userHandle, Bundle args) { return enqueueAssistContext(requestType, intent, hint, null, null, userHandle, args, PENDING_ASSIST_EXTRAS_TIMEOUT) != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: launchAssistIntent File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
launchAssistIntent
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override boolean isSyncFinished() { if (mSyncState == SYNC_STATE_WAITING_FOR_DRAW && mViewVisibility == View.GONE && !isVisibleRequested()) { // Don't wait for GONE windows. However, we don't alter the state in case the window // becomes un-gone while the syncset is ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSyncFinished File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isSyncFinished
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setAuthenticationRequired(boolean authenticationRequired) { mAuthenticationRequired = authenticationRequired; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAuthenticationRequired File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setAuthenticationRequired
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void refreshExtensions() throws ExtensionRefreshException { ExtensionList<ExtensionFinder> finders = getExtensionList(ExtensionFinder.class); for (ExtensionFinder ef : finders) { if (!ef.isRefreshable()) throw new ExtensionRefreshException(ef+" doesn't support refresh"...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshExtensions File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
refreshExtensions
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
static DownloadLaunchRunnable createForTest(DownloadStatusCallback callback, FileDownloadModel model, FileDownloadHeader header, IThreadPoolMonitor threadPoolMonitor, final int...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createForTest File: library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
createForTest
library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
protected X509TrustManager getX509TrustManager() { return x509TrustManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getX509TrustManager File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getX509TrustManager
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
public void setYearlyVotes(Integer yearlyVotes) { this.yearlyVotes = yearlyVotes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setYearlyVotes File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
setYearlyVotes
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public boolean isSelected(Object itemId) { return selectionModel.isSelected(itemId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSelected File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
isSelected
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public static boolean isConfigForWpa3EnterpriseNetwork(WifiConfiguration config) { return config.isSecurityType(WifiConfiguration.SECURITY_TYPE_EAP_WPA3_ENTERPRISE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConfigForWpa3EnterpriseNetwork File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
isConfigForWpa3EnterpriseNetwork
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
@Override public boolean onCreateOptionsMenu(Menu menu) { super.onCreateOptionsMenu(menu); this.menu = menu; // By returning true we signal let Android know that we want the menu // to be displayed return nativeMenu && Display.isInitialized() && Display.getInstance().getCurre...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateOptionsMenu File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
onCreateOptionsMenu
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override protected void onDraw(Canvas canvas) { super.onDraw(canvas); if (DeviceFormFactor.isTablet(getContext())) { // Use the same image transform matrix as the navigation icon to ensure the same // scaling, which requires centering vertically based on...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDraw File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
onDraw
chrome/android/java/src/org/chromium/chrome/browser/omnibox/SuggestionView.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
@Column(name = "url") public String getUrl() { return this.url; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUrl File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-18927
LOW
3.5
sanluan/PublicCMS
getUrl
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/sys/SysModule.java
2b411dc2821c69539138aaf7632b938b659a58fa
0
Analyze the following code function for security vulnerabilities
void flush() throws IOException { if (mSocketOS == null) throw new IOException("flush is called on null OutputStream"); if (VDBG) Log.d(TAG, "flush: " + mSocketOS); mSocketOS.flush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flush File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
flush
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
public List<EnforcingUser> getUserRestrictionSources(String restriction, @UserIdInt int userId) { PolicyDefinition<Boolean> policy = PolicyDefinition.getPolicyDefinitionForUserRestriction(restriction); Set<EnforcingAdmin> localAdmins = mDe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserRestrictionSources File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getUserRestrictionSources
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void addExtras(Bundle extras) { super.addExtras(extras); extras.putInt(EXTRA_CALL_TYPE, mCallType); extras.putBoolean(EXTRA_CALL_IS_VIDEO, mIsVideo); extras.putParcelable(EXTRA_CALL_PERSON, mPerson); if (mVerificationIcon != null) { extr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addExtras File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
addExtras
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public String getBasePath() { return basePath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBasePath File: samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getBasePath
samples/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private HttpSessionDestructionContext getSessionDestructionContext() { if (sessionDestructionContextCache == null) { this.sessionDestructionContextCache = beanManager.instance().select(HttpSessionDestructionContext.class).get(); } return sessionDestructionContextCache; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionDestructionContext File: impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
getSessionDestructionContext
impl/src/main/java/org/jboss/weld/servlet/HttpContextLifecycle.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
@Override public void onAuthenticationFailed() { handleFingerprintAuthFailed(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAuthenticationFailed File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticationFailed
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Nullable private IJsonParsePosition _getCurrentParsePos () { return m_bTrackPosition ? m_aParsePos.getClone () : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _getCurrentParsePos File: ph-json/src/main/java/com/helger/json/parser/JsonParser.java Repository: phax/ph-commons The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34612
HIGH
7.5
phax/ph-commons
_getCurrentParsePos
ph-json/src/main/java/com/helger/json/parser/JsonParser.java
02a4d034dcfb2b6e1796b25f519bf57a6796edce
0
Analyze the following code function for security vulnerabilities
@Override public void removeExpired(RealmModel realm) { int expiredOffline = Time.currentTime() - realm.getOfflineSessionIdleTimeout() - SessionTimeoutHelper.PERIODIC_CLEANER_IDLE_TIMEOUT_WINDOW_SECONDS; // prefer client session timeout if set int expiredClientOffline = expiredOffline; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeExpired File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java Repository: keycloak The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-6563
HIGH
7.7
keycloak
removeExpired
model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
11eb952e1df7cbb95b1e2c101dfd4839a2375695
0
Analyze the following code function for security vulnerabilities
private boolean allowTextHandleFadeIn() { if (mTouchScrollInProgress) return false; if (mPopupZoomer.isShowing()) return false; return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: allowTextHandleFadeIn File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
allowTextHandleFadeIn
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public File workingdir(File baseFolder) { if (getFolder() == null) { return baseFolder; } return new File(baseFolder, getFolder()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: workingdir File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
workingdir
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = "/**/consoleout.json", method = RequestMethod.GET) public ModelAndView consoleout(@RequestParam("pipelineName") String pipelineName, @RequestParam("pipelineCounter") String pipelineCounter, @RequestParam("stageName") Strin...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-43289 - Severity: MEDIUM - CVSS Score: 5.0 Description: #000 - Validate stage counter in GETs as well. Continuation of commit c22e0428164af Function: consoleout File: server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java Reposi...
[ "CWE-22" ]
CVE-2021-43289
MEDIUM
5
gocd
consoleout
server/src/main/java/com/thoughtworks/go/server/controller/ArtifactsController.java
4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595
1
Analyze the following code function for security vulnerabilities
@CalledByNative public void activateContents() { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activateContents File: components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java Repository: chromium The code follows secure codin...
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
activateContents
components/web_contents_delegate_android/android/java/src/org/chromium/components/web_contents_delegate_android/WebContentsDelegateAndroid.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void clearDeviceOwnerUserRestriction(UserHandle userHandle) { // ManagedProvisioning/DPC sets DISALLOW_ADD_USER. Clear to recover to the original state if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_USER, userHandle)) { mUserManager.setUserRestriction(UserManager.DISALL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearDeviceOwnerUserRestriction File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
clearDeviceOwnerUserRestriction
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@ProxyFromPrimaryToCurrentUser public void onStart() { // Initialize some static datastructures TaskStackViewLayoutAlgorithm.initializeCurve(); // Load the header bar layout reloadHeaderBarLayout(true); // When we start, preload the data associated with the previous recent t...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStart File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
onStart
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
0
Analyze the following code function for security vulnerabilities
public void setCertURL(String certURL) { this.certURL = certURL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCertURL File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setCertURL
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static Object callPrivateMethod(Object obj, String methodName, Class<?>[] classes, Object[] args) { try { Method method = obj.getClass().getDeclaredMethod(methodName, classes); method.setAccessible(true); return method.invoke(obj, args); } catch (IllegalAcc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: callPrivateMethod File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
callPrivateMethod
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override // TODO: API should just be about changing windowing modes... public void moveTasksToFullscreenStack(int fromStackId, boolean onTop) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "moveTasksToFullscreenStack()"); synchronized (this) { final ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTasksToFullscreenStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
moveTasksToFullscreenStack
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void restoreDisabledSystemPackageLIF(DeletePackageAction action, @NonNull int[] allUserHandles, boolean writeSettings) throws SystemDeleteException { final PackageSetting deletedPs = action.mDeletingPs; final PackageRemovedInfo outInfo = action.mRemovedInfo; final PackageSetti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: restoreDisabledSystemPackageLIF File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
restoreDisabledSystemPackageLIF
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
public static long toLong(@Nullable String s) throws SQLException { if (s != null) { try { s = s.trim(); return Long.parseLong(s); } catch (NumberFormatException e) { try { BigDecimal n = new BigDecimal(s); BigInteger i = n.toBigInteger(); int gt = i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toLong File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
toLong
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public BigDecimal optBigDecimal(String key, BigDecimal defaultValue) { Object val = this.opt(key); return objectToBigDecimal(val, defaultValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optBigDecimal File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optBigDecimal
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public synchronized HttpRedirect doQuietDown() throws IOException { try { return doQuietDown(false,0); } catch (InterruptedException e) { throw new AssertionError(); // impossible } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doQuietDown File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
doQuietDown
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
private List<ResolveInfo> queryIntentReceivers(Intent intent, int userId) { final long identity = Binder.clearCallingIdentity(); try { int flags = PackageManager.GET_META_DATA; // Widgets referencing shared libraries need to have their // dependencies loaded. ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryIntentReceivers File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
queryIntentReceivers
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Beta public static BufferedWriter newWriter(File file, Charset charset) throws FileNotFoundException { checkNotNull(file); checkNotNull(charset); return new BufferedWriter(new OutputStreamWriter(new FileOutputStream(file), charset)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newWriter File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
newWriter
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasNext() { return current.after != head; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasNext File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
hasNext
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
public int getEllipsizedWidth() { return mWidth; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEllipsizedWidth File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getEllipsizedWidth
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
protected ClickHouseNode setManager(ClickHouseNodeManager m) { this.manager.getAndUpdate(v -> { boolean sameManager = Objects.equals(v, m); if (v != null && !sameManager) { v.update(ClickHouseNode.this, Status.STANDALONE); } return sameManager ? v ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setManager File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
setManager
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
@Override public Collection<String> queryParamNames() { return context.queryParams().names(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryParamNames File: independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java Repository: quarkusio/quarkus The code follows ...
[ "CWE-863" ]
CVE-2022-0981
MEDIUM
6.5
quarkusio/quarkus
queryParamNames
independent-projects/resteasy-reactive/server/vertx/src/main/java/org/jboss/resteasy/reactive/server/vertx/VertxResteasyReactiveRequestContext.java
96c64fd8f09c02a497e2db366c64dd9196582442
0
Analyze the following code function for security vulnerabilities
@Override public byte[] getPreferredActivityBackup(int userId) { if (Binder.getCallingUid() != Process.SYSTEM_UID) { throw new SecurityException("Only the system may call getPreferredActivityBackup()"); } ByteArrayOutputStream dataStream = new ByteArrayOutputStream(); tr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredActivityBackup File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getPreferredActivityBackup
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static void extract(ZipFile zipFile, File destDir) throws IOException { assert destDir.isDirectory(); Enumeration<? extends ZipEntry> entries = zipFile.entries(); while (entries.hasMoreElements()) { ZipEntry entry = entries.nextElement(); writeEntry(zipFile, entry, destDir); } }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2018-20227 - Severity: MEDIUM - CVSS Score: 6.4 Description: Verify that zip file entries don't try to escape the parent dir + test Signed-off-by: Bart Hanssens <bart.hanssens@bosa.fgov.be> Function: extract File: util/src/main/java/org/eclipse/rdf4j/common/io/Z...
[ "CWE-22" ]
CVE-2018-20227
MEDIUM
6.4
eclipse-rdf4j/rdf4j
extract
util/src/main/java/org/eclipse/rdf4j/common/io/ZipUtil.java
df15a4d7a8f2789c043b27c9eafe1b30316cfa79
1
Analyze the following code function for security vulnerabilities
private DependencyInjector dependencyInjectorOrReflective() { if (dependencyInjector != null) { return dependencyInjector; } final ReflectiveDependencyInjector reflectiveDependencyInjector = new ReflectiveDependencyInjector(); shutdownSupports.add(ShutdownSupport.of(reflectiv...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dependencyInjectorOrReflective File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
dependencyInjectorOrReflective
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
boolean executeDrawHandlers(SurfaceControl.Transaction t, int seqId) { boolean hadHandlers = false; boolean applyHere = false; if (t == null) { t = mTmpTransaction; applyHere = true; } final List<DrawHandler> handlersToRemove = new ArrayList<>(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeDrawHandlers File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
executeDrawHandlers
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public void setFocusedRootTask(int taskId) { mActivityTaskManager.setFocusedRootTask(taskId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFocusedRootTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setFocusedRootTask
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private Map<String, Object> packageSingleActivitiInfo(ActivityImpl activity, ProcessInstance processInstance, boolean currentActiviti) throws Exception { Map<String, Object> vars = new HashMap<String, Object>(); Map<String, Object> activityInfo = new HashMap<String, Object>(); activityInfo.put("currentActiviti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: packageSingleActivitiInfo File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
packageSingleActivitiInfo
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0