instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message message) { switch (message.what) { case MSG_NOTIFY_UPDATE_APP_WIDGET: { SomeArgs args = (SomeArgs) message.obj; Host host = (Host) args.arg1; IAppWidgetHost callbacks = (IAppWidgetHost) args.arg2; RemoteViews views = (RemoteViews) args.arg3; final int appWidgetId = args.argi1; args.recycle(); handleNotifyUpdateAppWidget(host, callbacks, appWidgetId, views); } break; case MSG_NOTIFY_PROVIDER_CHANGED: { SomeArgs args = (SomeArgs) message.obj; Host host = (Host) args.arg1; IAppWidgetHost callbacks = (IAppWidgetHost) args.arg2; AppWidgetProviderInfo info = (AppWidgetProviderInfo)args.arg3; final int appWidgetId = args.argi1; args.recycle(); handleNotifyProviderChanged(host, callbacks, appWidgetId, info); } break; case MSG_NOTIFY_PROVIDERS_CHANGED: { SomeArgs args = (SomeArgs) message.obj; Host host = (Host) args.arg1; IAppWidgetHost callbacks = (IAppWidgetHost) args.arg2; args.recycle(); handleNotifyProvidersChanged(host, callbacks); } break; case MSG_NOTIFY_VIEW_DATA_CHANGED: { SomeArgs args = (SomeArgs) message.obj; Host host = (Host) args.arg1; IAppWidgetHost callbacks = (IAppWidgetHost) args.arg2; final int appWidgetId = args.argi1; final int viewId = args.argi2; args.recycle(); handleNotifyAppWidgetViewDataChanged(host, callbacks, appWidgetId, viewId); } break; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
handleMessage
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
static private void createProjectSynchronously( final ImportingJob job, final String format, final ObjectNode optionObj, final List<Exception> exceptions, final Format record, final Project project ) { ProjectMetadata pm = createProjectMetadata(optionObj); record.parser.parse( project, pm, job, job.getSelectedFileRecords(), format, -1, optionObj, exceptions ); if (!job.canceled) { if (exceptions.size() == 0) { project.update(); // update all internal models, indexes, caches, etc. ProjectManager.singleton.registerProject(project, pm); job.setProjectID(project.id); job.setState("created-project"); } else { job.setError(exceptions); } job.touch(); job.updating = false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createProjectSynchronously File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
createProjectSynchronously
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasDeviceOwner() { final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || canManageUsers(caller) || isFinancedDeviceOwner( caller) || hasCallingOrSelfPermission( MANAGE_PROFILE_AND_DEVICE_OWNERS)); return mOwners.hasDeviceOwner(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasDeviceOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
hasDeviceOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void dismissInvalidChargerWarning() { dismissInvalidChargerNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissInvalidChargerWarning File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
dismissInvalidChargerWarning
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
private Optional<LogFile> buildLogFile(String id, String fileName) { try { final Path filePath = Path.of(fileName); final long size = Files.size(filePath); final FileTime lastModifiedTime = Files.getLastModifiedTime(filePath); return Optional.of(new LogFile(id, fileName, size, lastModifiedTime.toInstant())); } catch (NoSuchFileException ignored) { return Optional.empty(); } catch (IOException e) { LOG.warn("Failed to read logfile <{}>", fileName, e); return Optional.empty(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildLogFile File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
buildLogFile
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
private boolean removeDisallowedEmpty(Node node){ String tagName = node.getNodeName(); if (!isAllowedEmptyTag(tagName)) { /* * Wasn't in the list of allowed elements, so we'll nuke it. */ addError(ErrorMessageUtil.ERROR_TAG_EMPTY, new Object[]{HTMLEntityEncoder.htmlEntityEncode(node.getNodeName())}); removeNode(node); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeDisallowedEmpty File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-28367
MEDIUM
4.3
nahsra/antisamy
removeDisallowedEmpty
src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
0199e7e194dba5e7d7197703f43ebe22401e61ae
0
Analyze the following code function for security vulnerabilities
@Override public int stop(boolean initiatedByClient) { IFingerprintDaemon daemon = getFingerprintDaemon(); if (daemon == null) { Slog.w(TAG, "stopAuthentication: no fingeprintd!"); return ERROR_ESRCH; } try { final int result = daemon.cancelAuthentication(); if (result != 0) { Slog.w(TAG, "stopAuthentication failed, result=" + result); return result; } if (DEBUG) Slog.w(TAG, "client " + getOwnerString() + " is no longer authenticating"); } catch (RemoteException e) { Slog.e(TAG, "stopAuthentication failed", e); return ERROR_ESRCH; } return 0; // success }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stop File: services/core/java/com/android/server/fingerprint/AuthenticationClient.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
stop
services/core/java/com/android/server/fingerprint/AuthenticationClient.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public Document parseDocument(Reader reader) throws InvalidSyntaxException { ParserEnvironment parserEnvironment = ParserEnvironment.newParserEnvironment() .document(reader) .build(); return parseDocumentImpl(parserEnvironment); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDocument File: src/main/java/graphql/parser/Parser.java Repository: graphql-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-28867
HIGH
7.5
graphql-java
parseDocument
src/main/java/graphql/parser/Parser.java
8a1c884c81c0b656db201cfd95881feb0f430a55
0
Analyze the following code function for security vulnerabilities
@Editable(order=600, description= "This filter is used to determine the LDAP entry for current user. " + "For example: <i>(&(uid={0})(objectclass=person))</i>. In this example, " + "<i>{0}</i> represents login name of current user.") @NotEmpty public String getUserSearchFilter() { return userSearchFilter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserSearchFilter File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-90" ]
CVE-2021-32651
MEDIUM
4.3
theonedev/onedev
getUserSearchFilter
server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
4440f0c57e440488d7e653417b2547eaae8ad19c
0
Analyze the following code function for security vulnerabilities
@Override public List<PackageInfo> getPreferredPackages(int flags) { return new ArrayList<PackageInfo>(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredPackages File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getPreferredPackages
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public Builder addClusterPerms(Collection<String> clusterPerms) { if (clusterPerms != null) { this.clusterPerms.addAll(clusterPerms); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addClusterPerms File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
addClusterPerms
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
@Override public List<PlatformStatusDTO> getTransitions(String issueKey) { List<PlatformStatusDTO> platformStatusDTOS = new ArrayList<>(); for (ZentaoIssuePlatformStatus status : ZentaoIssuePlatformStatus.values()) { PlatformStatusDTO platformStatusDTO = new PlatformStatusDTO(); platformStatusDTO.setValue(status.name()); platformStatusDTO.setLabel(status.getName()); platformStatusDTOS.add(platformStatusDTO); } return platformStatusDTOS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTransitions File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getTransitions
test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private boolean hasOptions(String[] arguments, String... options) { for (String argument: arguments) { for (String option: options) { if (option.startsWith("--")) { if (argument.startsWith(option + "=") || argument.equals(option)) return true; } else if (option.startsWith("-")) { if (argument.startsWith(option)) return true; } else { throw new ExplicitException("Invalid option: " + option); } } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasOptions File: server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
hasOptions
server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
private boolean exitPublicInterface() { return recursionBreak.get().getAndDecrement() > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exitPublicInterface File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
exitPublicInterface
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public static void setConfigFilePath(String path){ configPath = path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConfigFilePath File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
setConfigFilePath
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private int computeCompatSmallestWidth(boolean rotated, DisplayMetrics dm, int dw, int dh) { // TODO: Multidisplay: for now only use with default display. mTmpDisplayMetrics.setTo(dm); final DisplayMetrics tmpDm = mTmpDisplayMetrics; final int unrotDw, unrotDh; if (rotated) { unrotDw = dh; unrotDh = dw; } else { unrotDw = dw; unrotDh = dh; } int sw = reduceCompatConfigWidthSize(0, Surface.ROTATION_0, tmpDm, unrotDw, unrotDh); sw = reduceCompatConfigWidthSize(sw, Surface.ROTATION_90, tmpDm, unrotDh, unrotDw); sw = reduceCompatConfigWidthSize(sw, Surface.ROTATION_180, tmpDm, unrotDw, unrotDh); sw = reduceCompatConfigWidthSize(sw, Surface.ROTATION_270, tmpDm, unrotDh, unrotDw); return sw; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeCompatSmallestWidth File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
computeCompatSmallestWidth
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private Set<String> getInstantAppAccessibleSettings(int settingsType) { switch (settingsType) { case SETTINGS_TYPE_GLOBAL: return Settings.Global.INSTANT_APP_SETTINGS; case SETTINGS_TYPE_SECURE: return Settings.Secure.INSTANT_APP_SETTINGS; case SETTINGS_TYPE_SYSTEM: return Settings.System.INSTANT_APP_SETTINGS; default: throw new IllegalArgumentException("Invalid settings type: " + settingsType); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstantAppAccessibleSettings File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getInstantAppAccessibleSettings
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public List<DocumentReference> getChildrenReferences(XWikiContext context) throws XWikiException { return getChildrenReferences(0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildrenReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getChildrenReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withPackageWhitelist(Collection<PackageRule> packageWhitelist) { whitelistedPackages = Set.copyOf(packageWhitelist); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPackageWhitelist File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withPackageWhitelist
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
@Override public Experiment read(K8sClient api) { try { XGBoostJob xgBoostJob = api.getXGBoostJobClient() .get(getMetadata().getNamespace(), getMetadata().getName()) .throwsApiException().getObject(); if (LOG.isDebugEnabled()) { LOG.debug("Get XGBoostJob resource: \n{}", YamlUtils.toPrettyYaml(xgBoostJob)); } return parseExperimentResponseObject(xgBoostJob, XGBoostJob.class); } catch (ApiException e) { throw new SubmarineRuntimeException(e.getCode(), e.getMessage()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java Repository: apache/submarine The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
read
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
0
Analyze the following code function for security vulnerabilities
@Override public void onConfigurationChanged(@NonNull Configuration newConfig) { super.onConfigurationChanged(newConfig); if (drawerToggle != null) { drawerToggle.onConfigurationChanged(newConfig); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConfigurationChanged File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onConfigurationChanged
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
private void migrate98(File dataDir, Stack<Integer> versions) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate98 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate98
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
@Override public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException { File cacheDir = getContext().getCacheDir(); File privateFile = new File(cacheDir, uri.getLastPathSegment()); return ParcelFileDescriptor.open(privateFile, ParcelFileDescriptor.MODE_READ_ONLY); }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2017-20181 - Severity: MEDIUM - CVSS Score: 4.3 Description: Bugfix Path Traversal Vulnerability - see https://support.google.com/faqs/answer/7496913 Function: openFile File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java Repository: hgzojer/vocabletrainer Fixed Code: @Override public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException { try { String cacheDir = getContext().getCacheDir().toString(); File privateFile = new File(cacheDir, uri.getLastPathSegment()); if (!privateFile.getCanonicalPath().startsWith(cacheDir)) { throw new IllegalArgumentException(); } return ParcelFileDescriptor.open(privateFile, ParcelFileDescriptor.MODE_READ_ONLY); } catch (IOException e) { throw new RuntimeException(e.getMessage(), e); } }
[ "CWE-22" ]
CVE-2017-20181
MEDIUM
4.3
hgzojer/vocabletrainer
openFile
src/at/hgz/vocabletrainer/VocableTrainerProvider.java
accf6838078f8eb105cfc7865aba5c705fb68426
1
Analyze the following code function for security vulnerabilities
@Exported(visibility=3) public int getUpstreamBuild() { return upstreamBuild; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUpstreamBuild File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
getUpstreamBuild
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
public AsyncHttpClientConfigBean setConnectionTimeOutInMs(int connectionTimeOutInMs) { this.connectionTimeOutInMs = connectionTimeOutInMs; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectionTimeOutInMs File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setConnectionTimeOutInMs
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public Cursor queryWithFactory(CursorFactory cursorFactory, boolean distinct, String table, String[] columns, String selection, String[] selectionArgs, String groupBy, String having, String orderBy, String limit, CancellationSignal cancellationSignal) { acquireReference(); try { String sql = SQLiteQueryBuilder.buildQueryString( distinct, table, columns, selection, groupBy, having, orderBy, limit); return rawQueryWithFactory(cursorFactory, sql, selectionArgs, findEditTable(table), cancellationSignal); } finally { releaseReference(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryWithFactory File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
queryWithFactory
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override protected void loadDirs() { loadAll(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadDirs File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
loadDirs
brut.j.dir/src/main/java/brut/directory/FileDirectory.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
public String getPackageVersion() { return this.packageVersion; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageVersion File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getPackageVersion
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public <V> Column<T, V> addColumn(ValueProvider<T, V> valueProvider, ValueProvider<V, String> presentationProvider) { return addColumn(valueProvider, presentationProvider, new TextRenderer()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumn
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public Map<String, Object> getApiKeys() { return Collections.unmodifiableMap(API_KEYS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApiKeys File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getApiKeys
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public AsyncHttpClientConfigBean setProxyServerSelector(ProxyServerSelector proxyServerSelector) { this.proxyServerSelector = proxyServerSelector; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProxyServerSelector File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setProxyServerSelector
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@Override public int getPackageUid(String packageName, int flags) { try { return mActivityManagerService.mContext.getPackageManager() .getPackageUid(packageName, flags); } catch (NameNotFoundException nnfe) { return -1; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageUid File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageUid
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public Route.Collection delete(final String path1, final String path2, final Route.OneArgHandler handler) { return new Route.Collection( new Route.Definition[]{delete(path1, handler), delete(path2, handler)}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
delete
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public <E extends Enum<E>> E optEnum(Class<E> clazz, String key, E defaultValue) { try { Object val = this.opt(key); if (NULL.equals(val)) { return defaultValue; } if (clazz.isAssignableFrom(val.getClass())) { // we just checked it! @SuppressWarnings("unchecked") E myE = (E) val; return myE; } return Enum.valueOf(clazz, val.toString()); } catch (IllegalArgumentException e) { return defaultValue; } catch (NullPointerException e) { return defaultValue; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optEnum File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optEnum
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
@Override public void requestBugReport(@BugreportParams.BugreportMode int bugreportType) { requestBugReportWithDescription(null, null, bugreportType, 0L); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void onScrollUpdateGestureConsumed() { mZoomControlsDelegate.invokeZoomPicker(); for (mGestureStateListenersIterator.rewind(); mGestureStateListenersIterator.hasNext();) { mGestureStateListenersIterator.next().onScrollUpdateGestureConsumed(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onScrollUpdateGestureConsumed File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onScrollUpdateGestureConsumed
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void denyTypesByRegExp(Pattern[] regexps) { denyPermission(new RegExpTypePermission(regexps)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: denyTypesByRegExp File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
denyTypesByRegExp
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private void amendToList(Map<String, Object> map, String key, Object value) { final Object element = map.get(key); if (element == null) { map.put(key, value); } else { if (element instanceof List) { ((List) element).add(value); } else { List<Object> list = new LinkedList<>(); list.add(element); list.add(value); map.put(key, list); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: amendToList File: src/main/java/apoc/load/Xml.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000820
HIGH
7.5
neo4j-contrib/neo4j-apoc-procedures
amendToList
src/main/java/apoc/load/Xml.java
45bc09c8bd7f17283e2a7e85ce3f02cb4be4fd1a
0
Analyze the following code function for security vulnerabilities
private void renderEditPage(RequestEvent event, FeatureModel featureModel) throws IOException { List<CSRFToken> tokens = new ArrayList<>(); for (CSRFTokenProvider provider : Services.get(CSRFTokenProvider.class)) { CSRFToken token = provider.getToken(event.getRequest()); if (token != null) { tokens.add(token); } } Map<String, Object> model = new HashMap<>(); model.put("model", featureModel); model.put("tokens", tokens); String template = getResourceAsString("edit.html"); String content = new Engine().transform(template, model); writeResponse(event, content); }
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2020-28191 - Severity: HIGH - CVSS Score: 8.8 Description: Added CSRF protection to the togglz console via a CSRF token passed between the server and the clinet. This remediates the vulnerabilty CVE-2020-28191 by blocking CSRF attacks as the attcker will not be able to guess the CSRF token value. (#495) This has been implemented with either the session timeout of the application the togglz console is embedded in. Or if no user session is available it defaults to a 10 minute timeout for the CSRF token. This CSRF token does not interfere with either OWASP's CSRFGuard or Spring-Security's CSRF protection if they are used within the application. Co-authored-by: Joseph Beeton <joseph.p.beeton1@aexp.com> Function: renderEditPage File: console/src/main/java/org/togglz/console/handlers/edit/EditPageHandler.java Repository: togglz Fixed Code: private void renderEditPage(RequestEvent event, FeatureModel featureModel) throws IOException { List<CSRFToken> tokens = new ArrayList<>(); for (CSRFTokenProvider provider : Services.get(CSRFTokenProvider.class)) { CSRFToken token = provider.getToken(event.getRequest()); if (token != null) { tokens.add(token); } } Map<String, Object> model = new HashMap<>(); model.put("model", featureModel); model.put("tokens", tokens); String template = getResourceAsString("edit.html"); String content = new Engine().transform(template, model); writeResponse(event, content); }
[ "CWE-352" ]
CVE-2020-28191
HIGH
8.8
togglz
renderEditPage
console/src/main/java/org/togglz/console/handlers/edit/EditPageHandler.java
ed66e3f584de954297ebaf98ea4a235286784707
1
Analyze the following code function for security vulnerabilities
public static void marshal(final Object obj, final Writer writer) { final Marshaller jaxbMarshaller = getMarshallerFor(obj, null); try { jaxbMarshaller.marshal(obj, writer); } catch (final JAXBException e) { throw EXCEPTION_TRANSLATOR.translate("marshalling " + obj.getClass().getSimpleName(), e); } catch (final FactoryConfigurationError e) { throw EXCEPTION_TRANSLATOR.translate("marshalling " + obj.getClass().getSimpleName(), e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshal File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
marshal
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
protected Mapper getMapper() { return this.mapper; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMapper File: xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
getMapper
xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
protected String findLibrary(String lib) { String syslib = System.mapLibraryName(lib); File libFile = nativeLibraryStorage.findLibrary(syslib); if (libFile != null) { return libFile.toString(); } String result = super.findLibrary(lib); if (result != null) { return result; } return findLibraryExt(lib); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findLibrary File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
findLibrary
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public void removeCall(String callId, Session.Info sessionInfo) { Log.startSession(sessionInfo, LogUtils.Sessions.CSW_REMOVE_CALL, mPackageAbbreviation); long token = Binder.clearCallingIdentity(); try { synchronized (mLock) { logIncoming("removeCall %s", callId); Call call = mCallIdMapper.getCall(callId); if (call != null) { if (call.isAlive() && !call.isDisconnectHandledViaFuture()) { mCallsManager.markCallAsDisconnected( call, new DisconnectCause(DisconnectCause.REMOTE)); } else { mCallsManager.markCallAsRemoved(call); } } } } catch (Throwable t) { Log.e(ConnectionServiceWrapper.this, t, ""); throw t; } finally { Binder.restoreCallingIdentity(token); Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeCall File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
removeCall
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void startFreezingScreen(int overrideOriginalDisplayRotation) { if (mTransitionController.isShellTransitionsEnabled()) { return; } ProtoLog.i(WM_DEBUG_ORIENTATION, "Set freezing of %s: visible=%b freezing=%b visibleRequested=%b. %s", token, isVisible(), mFreezingScreen, mVisibleRequested, new RuntimeException().fillInStackTrace()); if (!mVisibleRequested) { return; } // If the override is given, the rotation of display doesn't change but we still want to // cover the activity whose configuration is changing by freezing the display and running // the rotation animation. final boolean forceRotation = overrideOriginalDisplayRotation != ROTATION_UNDEFINED; if (!mFreezingScreen) { mFreezingScreen = true; mWmService.registerAppFreezeListener(this); mWmService.mAppsFreezingScreen++; if (mWmService.mAppsFreezingScreen == 1) { if (forceRotation) { // Make sure normal rotation animation will be applied. mDisplayContent.getDisplayRotation().cancelSeamlessRotation(); } mWmService.startFreezingDisplay(0 /* exitAnim */, 0 /* enterAnim */, mDisplayContent, overrideOriginalDisplayRotation); mWmService.mH.removeMessages(H.APP_FREEZE_TIMEOUT); mWmService.mH.sendEmptyMessageDelayed(H.APP_FREEZE_TIMEOUT, 2000); } } if (forceRotation) { // The rotation of the real display won't change, so in order to unfreeze the screen // via {@link #checkAppWindowsReadyToShow}, the windows have to be able to call // {@link WindowState#reportResized} (it is skipped if the window is freezing) to update // the drawn state. return; } final int count = mChildren.size(); for (int i = 0; i < count; i++) { final WindowState w = mChildren.get(i); w.onStartFreezingScreen(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startFreezingScreen File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
startFreezingScreen
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@IgnoreJRERequirement public static boolean isMustangOrAbove() { try { System.console(); return true; } catch(LinkageError e) { return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMustangOrAbove File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
isMustangOrAbove
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
private void saveNitzTimeZone(String zoneId) { mSavedTimeZone = zoneId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveNitzTimeZone File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
saveNitzTimeZone
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private String getProcessContent(String uuid, Repository repository) { try { Asset<String> processAsset = repository.loadAsset(uuid); return processAsset.getAssetContent(); } catch (Exception e) { // we dont want to barf..just log that error happened _logger.error(e.getMessage()); return ""; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessContent File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java Repository: kiegroup/jbpm-designer The code follows secure coding practices.
[ "CWE-611" ]
CVE-2017-7545
MEDIUM
4
kiegroup/jbpm-designer
getProcessContent
jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
a143f3b92a6a5a527d929d68c02a0c5d914ab81d
0
Analyze the following code function for security vulnerabilities
public void activitySlept(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activitySlept File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activitySlept
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public javax.xml.rpc.Service createService(QName serviceName) throws ServiceException { return new Service(serviceName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createService File: axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java Repository: apache/axis-axis1-java The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-51441
HIGH
7.2
apache/axis-axis1-java
createService
axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java
685c309febc64aa393b2d64a05f90e7eb9f73e06
0
Analyze the following code function for security vulnerabilities
private void blockNumberWithAnswer(String phoneNumber, Answer answer) throws Exception { when(getBlockedNumberProvider().call( any(), anyString(), eq(BlockedNumberContract.SystemContract.METHOD_SHOULD_SYSTEM_BLOCK_NUMBER), eq(phoneNumber), nullable(Bundle.class))).thenAnswer(answer); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: blockNumberWithAnswer File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
blockNumberWithAnswer
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void attachToDisplayLocked(ActivityDisplay activityDisplay) { if (DEBUG_STACK) Slog.d(TAG_STACK, "attachToDisplayLocked: " + this + " to display=" + activityDisplay); mActivityDisplay = activityDisplay; mStack.mDisplayId = activityDisplay.mDisplayId; mStack.mStacks = activityDisplay.mStacks; activityDisplay.attachActivities(mStack); mWindowManager.attachStack(mStackId, activityDisplay.mDisplayId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachToDisplayLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
attachToDisplayLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
void fillClientWindowFramesAndConfiguration(ClientWindowFrames outFrames, MergedConfiguration outMergedConfiguration, boolean useLatestConfig, boolean relayoutVisible) { outFrames.frame.set(mWindowFrames.mCompatFrame); outFrames.displayFrame.set(mWindowFrames.mDisplayFrame); if (mInvGlobalScale != 1.0f && hasCompatScale()) { outFrames.displayFrame.scale(mInvGlobalScale); } // Note: in the cases where the window is tied to an activity, we should not send a // configuration update when the window has requested to be hidden. Doing so can lead to // the client erroneously accepting a configuration that would have otherwise caused an // activity restart. We instead hand back the last reported {@link MergedConfiguration}. if (useLatestConfig || (relayoutVisible && (shouldCheckTokenVisibleRequested() || mToken.isVisibleRequested()))) { final Configuration globalConfig = getProcessGlobalConfiguration(); final Configuration overrideConfig = getMergedOverrideConfiguration(); outMergedConfiguration.setConfiguration(globalConfig, overrideConfig); if (outMergedConfiguration != mLastReportedConfiguration) { mLastReportedConfiguration.setTo(outMergedConfiguration); } } else { outMergedConfiguration.setTo(mLastReportedConfiguration); } mLastConfigReportedToClient = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillClientWindowFramesAndConfiguration File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
fillClientWindowFramesAndConfiguration
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public void addMember(Context context, Group group, EPerson e) { if (isDirectMember(group, e)) { return; } group.addMember(e); e.getGroups().add(group); context.addEvent( new Event(Event.ADD, Constants.GROUP, group.getID(), Constants.EPERSON, e.getID(), e.getEmail(), getIdentifiers(context, group))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addMember File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
addMember
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private void addPackageHoldingPermissions(ArrayList<PackageInfo> list, PackageSetting ps, String[] permissions, boolean[] tmp, int flags, int userId) { int numMatch = 0; final PermissionsState permissionsState = ps.getPermissionsState(); for (int i=0; i<permissions.length; i++) { final String permission = permissions[i]; if (permissionsState.hasPermission(permission, userId)) { tmp[i] = true; numMatch++; } else { tmp[i] = false; } } if (numMatch == 0) { return; } PackageInfo pi; if (ps.pkg != null) { pi = generatePackageInfo(ps.pkg, flags, userId); } else { pi = generatePackageInfoFromSettingsLPw(ps.name, flags, userId); } // The above might return null in cases of uninstalled apps or install-state // skew across users/profiles. if (pi != null) { if ((flags&PackageManager.GET_PERMISSIONS) == 0) { if (numMatch == permissions.length) { pi.requestedPermissions = permissions; } else { pi.requestedPermissions = new String[numMatch]; numMatch = 0; for (int i=0; i<permissions.length; i++) { if (tmp[i]) { pi.requestedPermissions[numMatch] = permissions[i]; numMatch++; } } } } list.add(pi); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPackageHoldingPermissions File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
addPackageHoldingPermissions
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public List<InstrumentationInfo> queryInstrumentation(String targetPackage, int flags) { ArrayList<InstrumentationInfo> finalList = new ArrayList<InstrumentationInfo>(); // reader synchronized (mPackages) { final Iterator<PackageParser.Instrumentation> i = mInstrumentation.values().iterator(); while (i.hasNext()) { final PackageParser.Instrumentation p = i.next(); if (targetPackage == null || targetPackage.equals(p.info.targetPackage)) { InstrumentationInfo ii = PackageParser.generateInstrumentationInfo(p, flags); if (ii != null) { finalList.add(ii); } } } } return finalList; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryInstrumentation File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
queryInstrumentation
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private long convertToKB(double size) { return (long) Math.ceil(size / 1024); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToKB File: src/main/java/cloudsync/connector/LocalFilesystemConnector.java Repository: HolgerHees/cloudsync The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4773
LOW
3.3
HolgerHees/cloudsync
convertToKB
src/main/java/cloudsync/connector/LocalFilesystemConnector.java
3ad796833398af257c28e0ebeade68518e0e612a
0
Analyze the following code function for security vulnerabilities
void loadOwners() { synchronized (getLockObject()) { mOwners.load(); setDeviceOwnershipSystemPropertyLocked(); if (mOwners.hasDeviceOwner()) { setGlobalSettingDeviceOwnerType( mOwners.getDeviceOwnerType(mOwners.getDeviceOwnerPackageName())); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadOwners File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
loadOwners
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setOverscanLocked(DisplayContent displayContent, int left, int top, int right, int bottom) { final DisplayInfo displayInfo = displayContent.getDisplayInfo(); synchronized (displayContent.mDisplaySizeLock) { displayInfo.overscanLeft = left; displayInfo.overscanTop = top; displayInfo.overscanRight = right; displayInfo.overscanBottom = bottom; } mDisplaySettings.setOverscanLocked(displayInfo.uniqueId, left, top, right, bottom); mDisplaySettings.writeSettingsLocked(); reconfigureDisplayLocked(displayContent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOverscanLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setOverscanLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wContr, Translator trans) { this.translator = trans; FileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainerPath()); VFSContainer currentContainer = folderComponent.getCurrentContainer(); if (currentContainer.canWrite() != VFSConstants.YES) throw new AssertException("Cannot unzip to folder. Writing denied."); //check if command is executed on a file containing invalid filenames or paths - checks if the resulting folder has a valid name if(selection.getInvalidFileNames().size()>0) { status = FolderCommandStatus.STATUS_INVALID_NAME; return null; } List<String> lockedFiles = new ArrayList<>(); for (String sItem:selection.getFiles()) { VFSItem vfsItem = currentContainer.resolve(sItem); if (vfsItem instanceof VFSLeaf) { try { lockedFiles.addAll(checkLockedFiles((VFSLeaf)vfsItem, currentContainer, ureq.getIdentity())); } catch (Exception e) { String name = vfsItem == null ? "NULL" : vfsItem.getName(); getWindowControl().setError(translator.translate("FileUnzipFailed", new String[]{name})); } } } if(!lockedFiles.isEmpty()) { String msg = FolderCommandHelper.renderLockedMessageAsHtml(trans, lockedFiles); List<String> buttonLabels = Collections.singletonList(trans.translate("ok")); lockedFiledCtr = activateGenericDialog(ureq, trans.translate("lock.title"), msg, buttonLabels, lockedFiledCtr); return null; } VFSItem currentVfsItem = null; try { boolean fileNotExist = false; for (String sItem:selection.getFiles()) { currentVfsItem = currentContainer.resolve(sItem); if (currentVfsItem instanceof VFSLeaf) { if (!doUnzip((VFSLeaf)currentVfsItem, currentContainer, ureq, wContr)) { status = FolderCommandStatus.STATUS_FAILED; break; } } else { fileNotExist = true; break; } } if (fileNotExist) { status = FolderCommandStatus.STATUS_FAILED; getWindowControl().setError(translator.translate("FileDoesNotExist")); } VFSContainer inheritingCont = VFSManager.findInheritingSecurityCallbackContainer(folderComponent.getRootContainer()); if(inheritingCont != null) { VFSSecurityCallback secCallback = inheritingCont.getLocalSecurityCallback(); if(secCallback != null) { SubscriptionContext subsContext = secCallback.getSubscriptionContext(); if (subsContext != null) { notificationsManager.markPublisherNews(subsContext, ureq.getIdentity(), true); } } } } catch (IllegalArgumentException e) { logError("Corrupted ZIP", e); String name = currentVfsItem == null ? "NULL" : currentVfsItem.getName(); getWindowControl().setError(translator.translate("FileUnzipFailed", new String[]{name})); } return null; }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-41152 - Severity: MEDIUM - CVSS Score: 4.0 Description: OO-5696: validate file selections against current container Function: execute File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java Repository: OpenOLAT Fixed Code: @Override public Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wContr, Translator trans) { this.translator = trans; FileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainer(), folderComponent.getCurrentContainerPath()); VFSContainer currentContainer = folderComponent.getCurrentContainer(); if (currentContainer.canWrite() != VFSConstants.YES) throw new AssertException("Cannot unzip to folder. Writing denied."); //check if command is executed on a file containing invalid filenames or paths - checks if the resulting folder has a valid name if(selection.getInvalidFileNames().size()>0) { status = FolderCommandStatus.STATUS_INVALID_NAME; return null; } List<String> lockedFiles = new ArrayList<>(); for (String sItem:selection.getFiles()) { VFSItem vfsItem = currentContainer.resolve(sItem); if (vfsItem instanceof VFSLeaf) { try { lockedFiles.addAll(checkLockedFiles((VFSLeaf)vfsItem, currentContainer, ureq.getIdentity())); } catch (Exception e) { String name = vfsItem == null ? "NULL" : vfsItem.getName(); getWindowControl().setError(translator.translate("FileUnzipFailed", new String[]{name})); } } } if(!lockedFiles.isEmpty()) { String msg = FolderCommandHelper.renderLockedMessageAsHtml(trans, lockedFiles); List<String> buttonLabels = Collections.singletonList(trans.translate("ok")); lockedFiledCtr = activateGenericDialog(ureq, trans.translate("lock.title"), msg, buttonLabels, lockedFiledCtr); return null; } VFSItem currentVfsItem = null; try { boolean fileNotExist = false; for (String sItem:selection.getFiles()) { currentVfsItem = currentContainer.resolve(sItem); if (currentVfsItem instanceof VFSLeaf) { if (!doUnzip((VFSLeaf)currentVfsItem, currentContainer, ureq, wContr)) { status = FolderCommandStatus.STATUS_FAILED; break; } } else { fileNotExist = true; break; } } if (fileNotExist) { status = FolderCommandStatus.STATUS_FAILED; getWindowControl().setError(translator.translate("FileDoesNotExist")); } VFSContainer inheritingCont = VFSManager.findInheritingSecurityCallbackContainer(folderComponent.getRootContainer()); if(inheritingCont != null) { VFSSecurityCallback secCallback = inheritingCont.getLocalSecurityCallback(); if(secCallback != null) { SubscriptionContext subsContext = secCallback.getSubscriptionContext(); if (subsContext != null) { notificationsManager.markPublisherNews(subsContext, ureq.getIdentity(), true); } } } } catch (IllegalArgumentException e) { logError("Corrupted ZIP", e); String name = currentVfsItem == null ? "NULL" : currentVfsItem.getName(); getWindowControl().setError(translator.translate("FileUnzipFailed", new String[]{name})); } return null; }
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
execute
src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
1
Analyze the following code function for security vulnerabilities
private void handleEvict(URL podUrl, String namespace, String name) throws ExecutionException, InterruptedException, IOException { Eviction eviction = new EvictionBuilder() .withNewMetadata() .withName(name) .withNamespace(namespace) .endMetadata() .withDeleteOptions(new DeleteOptions()) .build(); RequestBody requestBody = RequestBody.create(JSON, JSON_MAPPER.writeValueAsString(eviction)); URL requestUrl = new URL(URLUtils.join(podUrl.toString(), "eviction")); Request.Builder requestBuilder = new Request.Builder().post(requestBody).url(requestUrl); handleResponse(requestBuilder, null, Collections.<String, String>emptyMap()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleEvict File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
handleEvict
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
private void handleSuccessfulIpConfiguration() { mLastSignalLevel = -1; // Force update of signal strength WifiConfiguration c = getConnectedWifiConfigurationInternal(); if (c != null) { // Reset IP failure tracking c.getNetworkSelectionStatus().clearDisableReasonCounter( WifiConfiguration.NetworkSelectionStatus.DISABLED_DHCP_FAILURE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSuccessfulIpConfiguration File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleSuccessfulIpConfiguration
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void initGlobalSettingsDefaultValForWearLocked(String key, long val) { initGlobalSettingsDefaultValForWearLocked(key, String.valueOf(val)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initGlobalSettingsDefaultValForWearLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
initGlobalSettingsDefaultValForWearLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
protected void untar(File destDir, InputStream inputStream) throws IOException { TarArchiveInputStream tin = new TarArchiveInputStream(inputStream); TarArchiveEntry tarEntry = null; while ((tarEntry = tin.getNextTarEntry()) != null) { File destEntry = new File(destDir, tarEntry.getName()); File parent = destEntry.getParentFile(); if (!parent.exists()) { parent.mkdirs(); } if (tarEntry.isDirectory()) { destEntry.mkdirs(); } else { FileOutputStream fout = new FileOutputStream(destEntry); try { IOUtils.copy(tin, fout); } finally { fout.close(); } } } tin.close(); }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2023-37476 - Severity: HIGH - CVSS Score: 7.8 Description: Merge pull request from GHSA-m88m-crr9-jvqq * Fix zip slip vulnerability in project import command * Add zip-slip.tar test resource Function: untar File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine Fixed Code: protected void untar(File destDir, InputStream inputStream) throws IOException { TarArchiveInputStream tin = new TarArchiveInputStream(inputStream); TarArchiveEntry tarEntry = null; while ((tarEntry = tin.getNextTarEntry()) != null) { File destEntry = new File(destDir, tarEntry.getName()); if (!destEntry.toPath().normalize().startsWith(destDir.toPath().normalize())) { throw new IllegalArgumentException("Zip archives with files escaping their root directory are not allowed."); } File parent = destEntry.getParentFile(); if (!parent.exists()) { parent.mkdirs(); } if (tarEntry.isDirectory()) { destEntry.mkdirs(); } else { FileOutputStream fout = new FileOutputStream(destEntry); try { IOUtils.copy(tin, fout); } finally { fout.close(); } } } tin.close(); }
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
untar
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
1
Analyze the following code function for security vulnerabilities
public boolean isAppSuspended(String packageName, UserHandle user) { ApplicationInfo info = getApplicationInfo(packageName, user, 0); return info != null && isAppSuspended(info); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAppSuspended File: src/com/android/launcher3/util/PackageManagerHelper.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-40097
HIGH
7.8
android
isAppSuspended
src/com/android/launcher3/util/PackageManagerHelper.java
6c9a41117d5a9365cf34e770bbb00138f6bf997e
0
Analyze the following code function for security vulnerabilities
@Override protected void readAmqpBody(byte[] barr) { throw new UnsupportedOperationException(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readAmqpBody File: src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
readAmqpBody
src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public void configRoute(Routes routes) { routes.add("/", ArticleController.class); routes.add(INSTALL_ROUTER_PATH, InstallController.class); // 后台管理者 routes.add(new AdminRoutes()); currentRoutes = routes; initRoute(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configRoute File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
configRoute
web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public void footer(PrintWriter out) { out.println("</body>"); out.println("</html>"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: footer File: src/main/java/com/openkm/servlet/admin/BaseServlet.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-3628
LOW
3.5
openkm/document-management-system
footer
src/main/java/com/openkm/servlet/admin/BaseServlet.java
c96f2e33adab3bbf550977b1b62acaa54f86fa03
0
Analyze the following code function for security vulnerabilities
public int getManagedUserId(@UserIdInt int callingUserId) { if (VERBOSE_LOG) Slogf.v(LOG_TAG, "getManagedUserId: callingUserId=%d", callingUserId); for (UserInfo ui : mUserManager.getProfiles(callingUserId)) { if (ui.id == callingUserId || !ui.isManagedProfile()) { continue; // Caller user self, or not a managed profile. Skip. } if (VERBOSE_LOG) Slogf.v(LOG_TAG, "Managed user=%d", ui.id); return ui.id; } if (VERBOSE_LOG) Slogf.v(LOG_TAG, "Managed user not found."); return -1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getManagedUserId File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getManagedUserId
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setOCFormDataAuditsTypesExpected() { this.unsetTypeExpected(); int i = 1; this.setTypeExpected(i, TypeNames.INT); // event_crf_id ++i; this.setTypeExpected(i, TypeNames.INT); // audit_id ++i; this.setTypeExpected(i, TypeNames.STRING); // name ++i; this.setTypeExpected(i, TypeNames.INT); // user_id ++i; this.setTypeExpected(i, TypeNames.TIMESTAMP); // audit_date ++i; this.setTypeExpected(i, TypeNames.STRING); // reason_for_change ++i; this.setTypeExpected(i, TypeNames.STRING); // old_value ++i; this.setTypeExpected(i, TypeNames.STRING); // new_value ++i; this.setTypeExpected(i, TypeNames.INT); // audit_log_event_type_id }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOCFormDataAuditsTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setOCFormDataAuditsTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public boolean isAvailableOffline() { return (mFlags & FLAG_AVAILABLE_OFFLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAvailableOffline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
isAvailableOffline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@TestApi public void setEligibleForLegacyPermissionPrompt(boolean eligible) { mIsEligibleForLegacyPermissionPrompt = eligible; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEligibleForLegacyPermissionPrompt File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setEligibleForLegacyPermissionPrompt
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public abstract StringBuilder getGenericSignature(StringBuilder sb);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGenericSignature File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
getGenericSignature
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public static List<Descriptor<AuthorizationStrategy>> getAuthorizationStrategyDescriptors() { return AuthorizationStrategy.all(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthorizationStrategyDescriptors File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getAuthorizationStrategyDescriptors
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public void removeStartingWindow(IBinder appToken, View window) { if (DEBUG_STARTING_WINDOW) Slog.v(TAG, "Removing starting window for " + appToken + ": " + window + " Callers=" + Debug.getCallers(4)); if (window != null) { WindowManager wm = (WindowManager)mContext.getSystemService(Context.WINDOW_SERVICE); wm.removeView(window); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStartingWindow File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
removeStartingWindow
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition sse(final String path, final Sse.Handler1 handler) { return appendDefinition(GET, path, handler).consumes(MediaType.sse); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sse File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
sse
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
native boolean enableNative();
Vulnerability Classification: - CWE: CWE-362, CWE-20 - CVE: CVE-2016-3760 - Severity: MEDIUM - CVSS Score: 5.4 Description: Add guest mode functionality (3/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving restricted mode. Right now restricted mode is only entered while a guest user is active. Bug: 27410683 Change-Id: If4a8855faf362d7f6de509d7ddc7197d1ac75cee Function: enableNative File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android Fixed Code: native boolean enableNative(boolean startRestricted);
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
enableNative
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
1
Analyze the following code function for security vulnerabilities
@JsonIgnore public File getWorkspaceDir() { return _workspaceDir; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWorkspaceDir File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
getWorkspaceDir
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
private String getAttribute(Element element, String attributeName) { Attr attrribute = element.getAttributeNode(attributeName); return attrribute != null ? attrribute.getValue() : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttribute File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getAttribute
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public boolean profileControl(String process, int userId, boolean start, ProfilerInfo profilerInfo, int profileType) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeString(process); data.writeInt(userId); data.writeInt(start ? 1 : 0); data.writeInt(profileType); if (profilerInfo != null) { data.writeInt(1); profilerInfo.writeToParcel(data, Parcelable.PARCELABLE_WRITE_RETURN_VALUE); } else { data.writeInt(0); } mRemote.transact(PROFILE_CONTROL_TRANSACTION, data, reply, 0); reply.readException(); boolean res = reply.readInt() != 0; reply.recycle(); data.recycle(); return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: profileControl File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
profileControl
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public void displayPreference(PreferenceScreen screen) { super.displayPreference(screen); MainSwitchPreference pref = screen.findPreference(getPreferenceKey()); pref.addOnSwitchChangeListener(this); pref.updateStatus(isChecked()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayPreference File: src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21247
HIGH
7.8
android
displayPreference
src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java
edd4023805bc7fa54ae31de222cde02b9012bbc4
0
Analyze the following code function for security vulnerabilities
void setOomAdjObserver(int uid, OomAdjObserver observer) { synchronized (this) { mCurOomAdjUid = uid; mCurOomAdjObserver = observer; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOomAdjObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setOomAdjObserver
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@PUT @Path("{username}/permissions") @RequiresPermissions(RestPermissions.USERS_PERMISSIONSEDIT) @ApiOperation("Update a user's permission set.") @ApiResponses({ @ApiResponse(code = 400, message = "Missing or invalid permission data.") }) @AuditEvent(type = AuditEventTypes.USER_PERMISSIONS_UPDATE) public void editPermissions(@ApiParam(name = "username", value = "The name of the user to modify.", required = true) @PathParam("username") String username, @ApiParam(name = "JSON body", value = "The list of permissions to assign to the user.", required = true) @Valid @NotNull PermissionEditRequest permissionRequest) throws ValidationException { final User user = userManagementService.load(username); if (user == null) { throw new NotFoundException("Couldn't find user " + username); } user.setPermissions(getEffectiveUserPermissions(user, permissionRequest.permissions())); userManagementService.save(user); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: editPermissions File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
editPermissions
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
public void copyIncludedFilesFromJarTrimmingBasePath(File jar, String jarDirectoryToCopyFrom, File outputDirectory, String... wildcardPathInclusions) { requireFileExistence(jar); if (!Objects.requireNonNull(outputDirectory).isDirectory()) { throw new IllegalArgumentException( String.format("Expect '%s' to be an existing directory", outputDirectory)); } String basePath = normalizeJarBasePath(jarDirectoryToCopyFrom); try (JarFile jarFile = new JarFile(jar, false)) { jarFile.stream().filter(file -> !file.isDirectory()) .filter(file -> file.getName().toLowerCase(Locale.ENGLISH) .startsWith(basePath.toLowerCase(Locale.ENGLISH))) .filter(file -> includeFile(file, wildcardPathInclusions)) .forEach(jarEntry -> copyJarEntryTrimmingBasePath(jarFile, jarEntry, basePath, outputDirectory)); } catch (IOException e) { throw new UncheckedIOException(String.format( "Failed to extract files from jarFile '%s' to directory '%s'", jar, outputDirectory), e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyIncludedFilesFromJarTrimmingBasePath File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-379" ]
CVE-2021-31411
MEDIUM
4.6
vaadin/flow
copyIncludedFilesFromJarTrimmingBasePath
flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
82cea56045b8430f7a26f037c01486b1feffa51d
0
Analyze the following code function for security vulnerabilities
public StrongAuthTracker getStrongAuthTracker() { return mStrongAuthTracker; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStrongAuthTracker File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getStrongAuthTracker
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return (int) Util.getHash(getLocalKey()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
hashCode
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void setKeyURL(String keyURL) { this.keyURL = keyURL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyURL File: base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setKeyURL
base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void getAuthTokenLabel(IAccountManagerResponse response, final String accountType, final String authTokenType) throws RemoteException { Preconditions.checkArgument(accountType != null, "accountType cannot be null"); Preconditions.checkArgument(authTokenType != null, "authTokenType cannot be null"); final int callingUid = getCallingUid(); clearCallingIdentity(); if (UserHandle.getAppId(callingUid) != Process.SYSTEM_UID) { throw new SecurityException("can only call from system"); } int userId = UserHandle.getUserId(callingUid); final long identityToken = clearCallingIdentity(); try { UserAccounts accounts = getUserAccounts(userId); new Session(accounts, response, accountType, false /* expectActivityLaunch */, false /* stripAuthTokenFromResult */, null /* accountName */, false /* authDetailsRequired */) { @Override protected String toDebugString(long now) { return super.toDebugString(now) + ", getAuthTokenLabel" + ", " + accountType + ", authTokenType " + authTokenType; } @Override public void run() throws RemoteException { mAuthenticator.getAuthTokenLabel(this, authTokenType); } @Override public void onResult(Bundle result) { Bundle.setDefusable(result, true); if (result != null) { String label = result.getString(AccountManager.KEY_AUTH_TOKEN_LABEL); Bundle bundle = new Bundle(); bundle.putString(AccountManager.KEY_AUTH_TOKEN_LABEL, label); super.onResult(bundle); return; } else { super.onResult(result); } } }.bind(); } finally { restoreCallingIdentity(identityToken); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthTokenLabel File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAuthTokenLabel
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public Label getAssignedLabel() { if(canRoam) return null; if(assignedNode==null) return Jenkins.getInstance().getSelfLabel(); return Jenkins.getInstance().getLabel(assignedNode); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAssignedLabel File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getAssignedLabel
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
protected void internalSkipMessages(String subName, int numMessages, boolean authoritative) { if (topicName.isGlobal()) { validateGlobalNamespaceOwnership(namespaceName); } PartitionedTopicMetadata partitionMetadata = getPartitionedTopicMetadata(topicName, authoritative, false); if (partitionMetadata.partitions > 0) { throw new RestException(Status.METHOD_NOT_ALLOWED, "Skip messages on a partitioned topic is not allowed"); } validateTopicOwnership(topicName, authoritative); validateTopicOperation(topicName, TopicOperation.SKIP); PersistentTopic topic = (PersistentTopic) getTopicReference(topicName); try { if (subName.startsWith(topic.getReplicatorPrefix())) { String remoteCluster = PersistentReplicator.getRemoteCluster(subName); PersistentReplicator repl = (PersistentReplicator) topic.getPersistentReplicator(remoteCluster); checkNotNull(repl); repl.skipMessages(numMessages).get(); } else { PersistentSubscription sub = topic.getSubscription(subName); checkNotNull(sub); sub.skipMessages(numMessages).get(); } log.info("[{}] Skipped {} messages on {} {}", clientAppId(), numMessages, topicName, subName); } catch (NullPointerException npe) { throw new RestException(Status.NOT_FOUND, "Subscription not found"); } catch (Exception exception) { log.error("[{}] Failed to skip {} messages {} {}", clientAppId(), numMessages, topicName, subName, exception); throw new RestException(exception); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalSkipMessages File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalSkipMessages
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public void setStatusFromConfig() { // TODO: only call this when carbons changed, not on every presence change CarbonManager.getInstanceFor(mXMPPConnection).sendCarbonsEnabled(mConfig.messageCarbons); Presence presence = new Presence(Presence.Type.available); Mode mode = Mode.valueOf(mConfig.getPresenceMode().toString()); presence.setMode(mode); presence.setStatus(mConfig.statusMessage); presence.setPriority(mConfig.priority); mXMPPConnection.sendPacket(presence); mConfig.presence_required = false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatusFromConfig File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
setStatusFromConfig
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public void setTitlePrinted(boolean enabled) { mTitlePrinted = enabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTitlePrinted File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setTitlePrinted
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public List<ApiScenrioExportJmx> exportJmx(ApiScenarioBatchRequest request) { List<ApiScenarioWithBLOBs> apiScenarioWithBLOBs = getExportResult(request); // 生成jmx List<ApiScenrioExportJmx> resList = new ArrayList<>(); apiScenarioWithBLOBs.forEach(item -> { if (StringUtils.isNotEmpty(item.getScenarioDefinition())) { String jmx = generateJmx(item); if (StringUtils.isNotEmpty(jmx)) { ApiScenrioExportJmx scenrioExportJmx = new ApiScenrioExportJmx(item.getName(), apiTestService.updateJmxString(jmx, null, true).getXml()); JmxInfoDTO dto = apiTestService.updateJmxString(jmx, item.getName(), true); scenrioExportJmx.setId(item.getId()); scenrioExportJmx.setVersion(item.getVersion()); //扫描需要哪些文件 scenrioExportJmx.setFileMetadataList(dto.getFileMetadataList()); resList.add(scenrioExportJmx); } } }); if (CollectionUtils.isNotEmpty(apiScenarioWithBLOBs)) { List<String> names = apiScenarioWithBLOBs.stream().map(ApiScenarioWithBLOBs::getName).collect(Collectors.toList()); request.setName(String.join(",", names)); List<String> ids = apiScenarioWithBLOBs.stream().map(ApiScenarioWithBLOBs::getId).collect(Collectors.toList()); request.setId(JSON.toJSONString(ids)); } return resList; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exportJmx File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
exportJmx
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void updateAsciiStream(String columnName, @Nullable InputStream inputStream, long length) throws SQLException { updateAsciiStream(findColumn(columnName), inputStream, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAsciiStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateAsciiStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public String getAttributeLocalName(int index){ return parser.getAttributeLocalName(index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeLocalName File: main/src/com/google/refine/importers/XmlImporter.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20157
MEDIUM
5
OpenRefine
getAttributeLocalName
main/src/com/google/refine/importers/XmlImporter.java
6a0d7d56e4ffb420316ce7849fde881344fbf881
0
Analyze the following code function for security vulnerabilities
public void setID(CertId id) { this.id = id; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setID File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setID
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private static synchronized DocumentBuilder getDocBuilder() throws ParserConfigurationException { if (docBuilderFactory == null) initDocBuilderFactory(); DocumentBuilder docBuilder = docBuilderFactory.newDocumentBuilder(); docBuilder.setEntityResolver(new EntityResolver() { public InputSource resolveEntity(String publicId, String systemId) { if ("-//Apple Computer//DTD PLIST 1.0//EN".equals(publicId) || // older publicId "-//Apple//DTD PLIST 1.0//EN".equals(publicId)) { // newer publicId // return a dummy, zero length DTD so we don't have to fetch // it from the network. return new InputSource(new ByteArrayInputStream(new byte[0])); } return null; } }); return docBuilder; }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2016-15026 - Severity: MEDIUM - CVSS Score: 4.3 Description: 1) Take steps to guard against external XXE attacks (except, note that <!DOCTYPE> cannot be disabled in XML plists). 2) Resolve the actual PLIST DTD from inside the JAR file itself, and prevent resolution of other external XML resources. 3) Make XMLPlistParser.getDocBuilder public Function: getDocBuilder File: src/main/java/com/dd/plist/XMLPropertyListParser.java Repository: 3breadt/dd-plist Fixed Code: public static synchronized DocumentBuilder getDocBuilder() throws ParserConfigurationException { DocumentBuilder builder = FACTORY.newDocumentBuilder(); builder.setEntityResolver(new PlistDTDResolver()); return builder; }
[ "CWE-611" ]
CVE-2016-15026
MEDIUM
4.3
3breadt/dd-plist
getDocBuilder
src/main/java/com/dd/plist/XMLPropertyListParser.java
8c954e8d9f6f6863729e50105a8abf3f87fff74c
1
Analyze the following code function for security vulnerabilities
private void pushBackUnconsumedBytes() { int remaining = inf.getRemaining(); BufferObjectDataInput bufferedInput = (BufferObjectDataInput) in; int position = bufferedInput.position(); int rewindBack = max(0, remaining - ExtendedGZipInputStream.GZIP_TRAILER_SIZE); int newPosition = position - rewindBack; bufferedInput.position(newPosition); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushBackUnconsumedBytes File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
pushBackUnconsumedBytes
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public Response processAddDestination(DestinationInfo info) throws Exception { TransportConnectionState cs = lookupConnectionState(info.getConnectionId()); broker.addDestinationInfo(cs.getContext(), info); if (info.getDestination().isTemporary()) { cs.addTempDestination(info); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAddDestination File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processAddDestination
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override boolean forAllActivities(Predicate<ActivityRecord> callback, boolean traverseTopToBottom) { return callback.test(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forAllActivities File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
forAllActivities
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
protected void requestRestoreLoad() { if (mContentViewCore != null) mContentViewCore.requestRestoreLoad(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestRestoreLoad File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
requestRestoreLoad
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0