instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message message) { switch (message.what) { case MSG_NOTIFY_UPDATE_APP_WIDGET: { SomeArgs args = (SomeArgs) message.obj; Host host = (Host) args.arg1; IAppWidgetHost callbacks = (IAppWidget...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
handleMessage
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
static private void createProjectSynchronously( final ImportingJob job, final String format, final ObjectNode optionObj, final List<Exception> exceptions, final Format record, final Project project ) { ProjectMetadata pm = createProjectMetadata(optionObj); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createProjectSynchronously File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
createProjectSynchronously
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasDeviceOwner() { final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(caller) || canManageUsers(caller) || isFinancedDeviceOwner( caller) || hasCallingOrSelfPermission( ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasDeviceOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
hasDeviceOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void dismissInvalidChargerWarning() { dismissInvalidChargerNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissInvalidChargerWarning File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
dismissInvalidChargerWarning
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
private Optional<LogFile> buildLogFile(String id, String fileName) { try { final Path filePath = Path.of(fileName); final long size = Files.size(filePath); final FileTime lastModifiedTime = Files.getLastModifiedTime(filePath); return Optional.of(new LogFile(id, fi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildLogFile File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
buildLogFile
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
private boolean removeDisallowedEmpty(Node node){ String tagName = node.getNodeName(); if (!isAllowedEmptyTag(tagName)) { /* * Wasn't in the list of allowed elements, so we'll nuke it. */ addError(ErrorMessageUtil.ERROR_TAG_EMPTY, new Object[]{HTMLEntityEn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeDisallowedEmpty File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-28367
MEDIUM
4.3
nahsra/antisamy
removeDisallowedEmpty
src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
0199e7e194dba5e7d7197703f43ebe22401e61ae
0
Analyze the following code function for security vulnerabilities
@Override public int stop(boolean initiatedByClient) { IFingerprintDaemon daemon = getFingerprintDaemon(); if (daemon == null) { Slog.w(TAG, "stopAuthentication: no fingeprintd!"); return ERROR_ESRCH; } try { final int result = daemon.cancelAuthent...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stop File: services/core/java/com/android/server/fingerprint/AuthenticationClient.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
stop
services/core/java/com/android/server/fingerprint/AuthenticationClient.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public Document parseDocument(Reader reader) throws InvalidSyntaxException { ParserEnvironment parserEnvironment = ParserEnvironment.newParserEnvironment() .document(reader) .build(); return parseDocumentImpl(parserEnvironment); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDocument File: src/main/java/graphql/parser/Parser.java Repository: graphql-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-28867
HIGH
7.5
graphql-java
parseDocument
src/main/java/graphql/parser/Parser.java
8a1c884c81c0b656db201cfd95881feb0f430a55
0
Analyze the following code function for security vulnerabilities
@Editable(order=600, description= "This filter is used to determine the LDAP entry for current user. " + "For example: <i>(&(uid={0})(objectclass=person))</i>. In this example, " + "<i>{0}</i> represents login name of current user.") @NotEmpty public String getUserSearchFilter() { return userS...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserSearchFilter File: server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java Repository: theonedev/onedev The code follows secure coding prac...
[ "CWE-90" ]
CVE-2021-32651
MEDIUM
4.3
theonedev/onedev
getUserSearchFilter
server-plugin/server-plugin-authenticator-ldap/src/main/java/io/onedev/server/plugin/authenticator/ldap/LdapAuthenticator.java
4440f0c57e440488d7e653417b2547eaae8ad19c
0
Analyze the following code function for security vulnerabilities
@Override public List<PackageInfo> getPreferredPackages(int flags) { return new ArrayList<PackageInfo>(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredPackages File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
getPreferredPackages
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public Builder addClusterPerms(Collection<String> clusterPerms) { if (clusterPerms != null) { this.clusterPerms.addAll(clusterPerms); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addClusterPerms File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
addClusterPerms
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
@Override public List<PlatformStatusDTO> getTransitions(String issueKey) { List<PlatformStatusDTO> platformStatusDTOS = new ArrayList<>(); for (ZentaoIssuePlatformStatus status : ZentaoIssuePlatformStatus.values()) { PlatformStatusDTO platformStatusDTO = new PlatformStatusDTO(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTransitions File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getTransitions
test-track/backend/src/main/java/io/metersphere/service/issue/platform/ZentaoPlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private boolean hasOptions(String[] arguments, String... options) { for (String argument: arguments) { for (String option: options) { if (option.startsWith("--")) { if (argument.startsWith(option + "=") || argument.equals(option)) return true; } else if (option.startsWith("-")) { if (argume...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasOptions File: server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java Repository: theonedev/onedev The code follows secure coding prac...
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
hasOptions
server-plugin/server-plugin-executor-serverdocker/src/main/java/io/onedev/server/plugin/executor/serverdocker/ServerDockerExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
private boolean exitPublicInterface() { return recursionBreak.get().getAndDecrement() > 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exitPublicInterface File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
exitPublicInterface
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public static void setConfigFilePath(String path){ configPath = path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConfigFilePath File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
setConfigFilePath
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
private int computeCompatSmallestWidth(boolean rotated, DisplayMetrics dm, int dw, int dh) { // TODO: Multidisplay: for now only use with default display. mTmpDisplayMetrics.setTo(dm); final DisplayMetrics tmpDm = mTmpDisplayMetrics; final int unrotDw, unrotDh; if (rotated) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeCompatSmallestWidth File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
computeCompatSmallestWidth
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private Set<String> getInstantAppAccessibleSettings(int settingsType) { switch (settingsType) { case SETTINGS_TYPE_GLOBAL: return Settings.Global.INSTANT_APP_SETTINGS; case SETTINGS_TYPE_SECURE: return Settings.Secure.INSTANT_APP_SETTINGS; case...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstantAppAccessibleSettings File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getInstantAppAccessibleSettings
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public List<DocumentReference> getChildrenReferences(XWikiContext context) throws XWikiException { return getChildrenReferences(0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildrenReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getChildrenReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public ArtemisSecurityConfigurationBuilder withPackageWhitelist(Collection<PackageRule> packageWhitelist) { whitelistedPackages = Set.copyOf(packageWhitelist); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPackageWhitelist File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-501", "CWE-653" ]
CVE-2024-23682
HIGH
8.2
ls1intum/Ares
withPackageWhitelist
src/main/java/de/tum/in/test/api/security/ArtemisSecurityConfigurationBuilder.java
4c146ff85a0fa6022087fb0cffa6b8021d51101f
0
Analyze the following code function for security vulnerabilities
@Override public Experiment read(K8sClient api) { try { XGBoostJob xgBoostJob = api.getXGBoostJobClient() .get(getMetadata().getNamespace(), getMetadata().getName()) .throwsApiException().getObject(); if (LOG.isDebugEnabled()) { LOG.debug("Get XGBoostJob resource: \n{}", Ya...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: read File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java Repository: apache/submarine The code follows secure coding practices...
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
read
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
0
Analyze the following code function for security vulnerabilities
@Override public void onConfigurationChanged(@NonNull Configuration newConfig) { super.onConfigurationChanged(newConfig); if (drawerToggle != null) { drawerToggle.onConfigurationChanged(newConfig); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConfigurationChanged File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onConfigurationChanged
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
private void migrate98(File dataDir, Stack<Integer> versions) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate98 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate98
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
@Override public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException { File cacheDir = getContext().getCacheDir(); File privateFile = new File(cacheDir, uri.getLastPathSegment()); return ParcelFileDescriptor.open(privateFile, ParcelFileDescriptor.MODE_READ_ONLY); ...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2017-20181 - Severity: MEDIUM - CVSS Score: 4.3 Description: Bugfix Path Traversal Vulnerability - see https://support.google.com/faqs/answer/7496913 Function: openFile File: src/at/hgz/vocabletrainer/VocableTrainerProvider.java Repository: hgzojer/vocabletrainer...
[ "CWE-22" ]
CVE-2017-20181
MEDIUM
4.3
hgzojer/vocabletrainer
openFile
src/at/hgz/vocabletrainer/VocableTrainerProvider.java
accf6838078f8eb105cfc7865aba5c705fb68426
1
Analyze the following code function for security vulnerabilities
@Exported(visibility=3) public int getUpstreamBuild() { return upstreamBuild; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUpstreamBuild File: core/src/main/java/hudson/model/Cause.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2067
LOW
3.5
jenkinsci/jenkins
getUpstreamBuild
core/src/main/java/hudson/model/Cause.java
5d57c855f3147bfc5e7fda9252317b428a700014
0
Analyze the following code function for security vulnerabilities
public AsyncHttpClientConfigBean setConnectionTimeOutInMs(int connectionTimeOutInMs) { this.connectionTimeOutInMs = connectionTimeOutInMs; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectionTimeOutInMs File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setConnectionTimeOutInMs
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
public Cursor queryWithFactory(CursorFactory cursorFactory, boolean distinct, String table, String[] columns, String selection, String[] selectionArgs, String groupBy, String having, String orderBy, String limit, CancellationSignal cancellationSignal) { acquireReference(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryWithFactory File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
queryWithFactory
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override protected void loadDirs() { loadAll(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadDirs File: brut.j.dir/src/main/java/brut/directory/FileDirectory.java Repository: iBotPeaches/Apktool The code follows secure coding practices.
[ "CWE-22" ]
CVE-2024-21633
HIGH
7.8
iBotPeaches/Apktool
loadDirs
brut.j.dir/src/main/java/brut/directory/FileDirectory.java
d348c43b24a9de350ff6e5bd610545a10c1fc712
0
Analyze the following code function for security vulnerabilities
public String getPackageVersion() { return this.packageVersion; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageVersion File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getPackageVersion
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public <V> Column<T, V> addColumn(ValueProvider<T, V> valueProvider, ValueProvider<V, String> presentationProvider) { return addColumn(valueProvider, presentationProvider, new TextRenderer()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumn
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public Map<String, Object> getApiKeys() { return Collections.unmodifiableMap(API_KEYS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApiKeys File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getApiKeys
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public AsyncHttpClientConfigBean setProxyServerSelector(ProxyServerSelector proxyServerSelector) { this.proxyServerSelector = proxyServerSelector; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setProxyServerSelector File: api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7397
MEDIUM
4.3
AsyncHttpClient/async-http-client
setProxyServerSelector
api/src/main/java/org/asynchttpclient/AsyncHttpClientConfigBean.java
df6ed70e86c8fc340ed75563e016c8baa94d7e72
0
Analyze the following code function for security vulnerabilities
@Override public int getPackageUid(String packageName, int flags) { try { return mActivityManagerService.mContext.getPackageManager() .getPackageUid(packageName, flags); } catch (NameNotFoundException nnfe) { return -1; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageUid File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageUid
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public Route.Collection delete(final String path1, final String path2, final Route.OneArgHandler handler) { return new Route.Collection( new Route.Definition[]{delete(path1, handler), delete(path2, handler)}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
delete
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public <E extends Enum<E>> E optEnum(Class<E> clazz, String key, E defaultValue) { try { Object val = this.opt(key); if (NULL.equals(val)) { return defaultValue; } if (clazz.isAssignableFrom(val.getClass())) { // we just checked it!...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optEnum File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optEnum
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
@Override public void requestBugReport(@BugreportParams.BugreportMode int bugreportType) { requestBugReportWithDescription(null, null, bugreportType, 0L); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unused") @CalledByNative private void onScrollUpdateGestureConsumed() { mZoomControlsDelegate.invokeZoomPicker(); for (mGestureStateListenersIterator.rewind(); mGestureStateListenersIterator.hasNext();) { mGestureStateListenersIterator.next().onScro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onScrollUpdateGestureConsumed File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onScrollUpdateGestureConsumed
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void denyTypesByRegExp(Pattern[] regexps) { denyPermission(new RegExpTypePermission(regexps)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: denyTypesByRegExp File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
denyTypesByRegExp
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
private void amendToList(Map<String, Object> map, String key, Object value) { final Object element = map.get(key); if (element == null) { map.put(key, value); } else { if (element instanceof List) { ((List) element).add(value); } else { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: amendToList File: src/main/java/apoc/load/Xml.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000820
HIGH
7.5
neo4j-contrib/neo4j-apoc-procedures
amendToList
src/main/java/apoc/load/Xml.java
45bc09c8bd7f17283e2a7e85ce3f02cb4be4fd1a
0
Analyze the following code function for security vulnerabilities
private void renderEditPage(RequestEvent event, FeatureModel featureModel) throws IOException { List<CSRFToken> tokens = new ArrayList<>(); for (CSRFTokenProvider provider : Services.get(CSRFTokenProvider.class)) { CSRFToken token = provider.getToken(event.getRequest()); if (toke...
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2020-28191 - Severity: HIGH - CVSS Score: 8.8 Description: Added CSRF protection to the togglz console via a CSRF token passed between the server and the clinet. This remediates the vulnerabilty CVE-2020-28191 by blocking CSRF attacks as the attcker will not be a...
[ "CWE-352" ]
CVE-2020-28191
HIGH
8.8
togglz
renderEditPage
console/src/main/java/org/togglz/console/handlers/edit/EditPageHandler.java
ed66e3f584de954297ebaf98ea4a235286784707
1
Analyze the following code function for security vulnerabilities
public static void marshal(final Object obj, final Writer writer) { final Marshaller jaxbMarshaller = getMarshallerFor(obj, null); try { jaxbMarshaller.marshal(obj, writer); } catch (final JAXBException e) { throw EXCEPTION_TRANSLATOR.translate("marshalling " + obj.getCla...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshal File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
marshal
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
protected Mapper getMapper() { return this.mapper; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMapper File: xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
getMapper
xstream/src/java/com/thoughtworks/xstream/core/TreeUnmarshaller.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
protected String findLibrary(String lib) { String syslib = System.mapLibraryName(lib); File libFile = nativeLibraryStorage.findLibrary(syslib); if (libFile != null) { return libFile.toString(); } String result = super.findLibrary(lib); if (result != null) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findLibrary File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
findLibrary
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public void removeCall(String callId, Session.Info sessionInfo) { Log.startSession(sessionInfo, LogUtils.Sessions.CSW_REMOVE_CALL, mPackageAbbreviation); long token = Binder.clearCallingIdentity(); try { synchronized (mLock) { log...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeCall File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
removeCall
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void startFreezingScreen(int overrideOriginalDisplayRotation) { if (mTransitionController.isShellTransitionsEnabled()) { return; } ProtoLog.i(WM_DEBUG_ORIENTATION, "Set freezing of %s: visible=%b freezing=%b visibleRequested=%b. %s", token, isVisible()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startFreezingScreen File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
startFreezingScreen
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@IgnoreJRERequirement public static boolean isMustangOrAbove() { try { System.console(); return true; } catch(LinkageError e) { return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMustangOrAbove File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
isMustangOrAbove
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
private void saveNitzTimeZone(String zoneId) { mSavedTimeZone = zoneId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveNitzTimeZone File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
saveNitzTimeZone
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private String getProcessContent(String uuid, Repository repository) { try { Asset<String> processAsset = repository.loadAsset(uuid); return processAsset.getAssetContent(); } catch (Exception e) { // we dont want to barf..just log that error happened _log...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessContent File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java Repository: kiegroup/jbpm-designer The code follows secure coding practices.
[ "CWE-611" ]
CVE-2017-7545
MEDIUM
4
kiegroup/jbpm-designer
getProcessContent
jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
a143f3b92a6a5a527d929d68c02a0c5d914ab81d
0
Analyze the following code function for security vulnerabilities
public void activitySlept(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activitySlept File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activitySlept
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public javax.xml.rpc.Service createService(QName serviceName) throws ServiceException { return new Service(serviceName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createService File: axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java Repository: apache/axis-axis1-java The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-51441
HIGH
7.2
apache/axis-axis1-java
createService
axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java
685c309febc64aa393b2d64a05f90e7eb9f73e06
0
Analyze the following code function for security vulnerabilities
private void blockNumberWithAnswer(String phoneNumber, Answer answer) throws Exception { when(getBlockedNumberProvider().call( any(), anyString(), eq(BlockedNumberContract.SystemContract.METHOD_SHOULD_SYSTEM_BLOCK_NUMBER), eq(phoneNumber), ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: blockNumberWithAnswer File: tests/src/com/android/server/telecom/tests/BasicCallTests.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
blockNumberWithAnswer
tests/src/com/android/server/telecom/tests/BasicCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
void attachToDisplayLocked(ActivityDisplay activityDisplay) { if (DEBUG_STACK) Slog.d(TAG_STACK, "attachToDisplayLocked: " + this + " to display=" + activityDisplay); mActivityDisplay = activityDisplay; mStack.mDisplayId = activityDisplay.mDisplayId; m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachToDisplayLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
attachToDisplayLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
void fillClientWindowFramesAndConfiguration(ClientWindowFrames outFrames, MergedConfiguration outMergedConfiguration, boolean useLatestConfig, boolean relayoutVisible) { outFrames.frame.set(mWindowFrames.mCompatFrame); outFrames.displayFrame.set(mWindowFrames.mDisplayFrame); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillClientWindowFramesAndConfiguration File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
fillClientWindowFramesAndConfiguration
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public void addMember(Context context, Group group, EPerson e) { if (isDirectMember(group, e)) { return; } group.addMember(e); e.getGroups().add(group); context.addEvent( new Event(Event.ADD, Constants.GROUP, group.getID(), Constants.EPERSON,...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addMember File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
addMember
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private void addPackageHoldingPermissions(ArrayList<PackageInfo> list, PackageSetting ps, String[] permissions, boolean[] tmp, int flags, int userId) { int numMatch = 0; final PermissionsState permissionsState = ps.getPermissionsState(); for (int i=0; i<permissions.length; i++) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPackageHoldingPermissions File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
addPackageHoldingPermissions
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public List<InstrumentationInfo> queryInstrumentation(String targetPackage, int flags) { ArrayList<InstrumentationInfo> finalList = new ArrayList<InstrumentationInfo>(); // reader synchronized (mPackages) { final Iterator<PackageParser.Instrumen...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryInstrumentation File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
queryInstrumentation
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private long convertToKB(double size) { return (long) Math.ceil(size / 1024); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToKB File: src/main/java/cloudsync/connector/LocalFilesystemConnector.java Repository: HolgerHees/cloudsync The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4773
LOW
3.3
HolgerHees/cloudsync
convertToKB
src/main/java/cloudsync/connector/LocalFilesystemConnector.java
3ad796833398af257c28e0ebeade68518e0e612a
0
Analyze the following code function for security vulnerabilities
void loadOwners() { synchronized (getLockObject()) { mOwners.load(); setDeviceOwnershipSystemPropertyLocked(); if (mOwners.hasDeviceOwner()) { setGlobalSettingDeviceOwnerType( mOwners.getDeviceOwnerType(mOwners.getDeviceOwnerPackageName...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadOwners File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
loadOwners
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setOverscanLocked(DisplayContent displayContent, int left, int top, int right, int bottom) { final DisplayInfo displayInfo = displayContent.getDisplayInfo(); synchronized (displayContent.mDisplaySizeLock) { displayInfo.overscanLeft = left; displayInfo.ove...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOverscanLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setOverscanLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public Controller execute(FolderComponent folderComponent, UserRequest ureq, WindowControl wContr, Translator trans) { this.translator = trans; FileSelection selection = new FileSelection(ureq, folderComponent.getCurrentContainerPath()); VFSContainer currentContainer = folderComponent.getCurrentContain...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-41152 - Severity: MEDIUM - CVSS Score: 4.0 Description: OO-5696: validate file selections against current container Function: execute File: src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java Repository: OpenOLAT Fixed Code: @Override pub...
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
execute
src/main/java/org/olat/core/commons/modules/bc/commands/CmdUnzip.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
1
Analyze the following code function for security vulnerabilities
private void handleEvict(URL podUrl, String namespace, String name) throws ExecutionException, InterruptedException, IOException { Eviction eviction = new EvictionBuilder() .withNewMetadata() .withName(name) .withNamespace(namespace) .endMetadata() .withDeleteOptions(new DeleteOptions(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleEvict File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
handleEvict
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
private void handleSuccessfulIpConfiguration() { mLastSignalLevel = -1; // Force update of signal strength WifiConfiguration c = getConnectedWifiConfigurationInternal(); if (c != null) { // Reset IP failure tracking c.getNetworkSelectionStatus().clearDisableReasonCounter(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSuccessfulIpConfiguration File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
handleSuccessfulIpConfiguration
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void initGlobalSettingsDefaultValForWearLocked(String key, long val) { initGlobalSettingsDefaultValForWearLocked(key, String.valueOf(val)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initGlobalSettingsDefaultValForWearLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
initGlobalSettingsDefaultValForWearLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
protected void untar(File destDir, InputStream inputStream) throws IOException { TarArchiveInputStream tin = new TarArchiveInputStream(inputStream); TarArchiveEntry tarEntry = null; while ((tarEntry = tin.getNextTarEntry()) != null) { File destEntry = new File(destDir, tarEntry.getN...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2023-37476 - Severity: HIGH - CVSS Score: 7.8 Description: Merge pull request from GHSA-m88m-crr9-jvqq * Fix zip slip vulnerability in project import command * Add zip-slip.tar test resource Function: untar File: main/src/com/google/refine/io/FileProjectManager...
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
untar
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
1
Analyze the following code function for security vulnerabilities
public boolean isAppSuspended(String packageName, UserHandle user) { ApplicationInfo info = getApplicationInfo(packageName, user, 0); return info != null && isAppSuspended(info); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAppSuspended File: src/com/android/launcher3/util/PackageManagerHelper.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-40097
HIGH
7.8
android
isAppSuspended
src/com/android/launcher3/util/PackageManagerHelper.java
6c9a41117d5a9365cf34e770bbb00138f6bf997e
0
Analyze the following code function for security vulnerabilities
@Override protected void readAmqpBody(byte[] barr) { throw new UnsupportedOperationException(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readAmqpBody File: src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
readAmqpBody
src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public void configRoute(Routes routes) { routes.add("/", ArticleController.class); routes.add(INSTALL_ROUTER_PATH, InstallController.class); // 后台管理者 routes.add(new AdminRoutes()); currentRoutes = routes; initRoute(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: configRoute File: web/src/main/java/com/zrlog/web/config/ZrLogConfig.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
configRoute
web/src/main/java/com/zrlog/web/config/ZrLogConfig.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
public void footer(PrintWriter out) { out.println("</body>"); out.println("</html>"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: footer File: src/main/java/com/openkm/servlet/admin/BaseServlet.java Repository: openkm/document-management-system The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-3628
LOW
3.5
openkm/document-management-system
footer
src/main/java/com/openkm/servlet/admin/BaseServlet.java
c96f2e33adab3bbf550977b1b62acaa54f86fa03
0
Analyze the following code function for security vulnerabilities
public int getManagedUserId(@UserIdInt int callingUserId) { if (VERBOSE_LOG) Slogf.v(LOG_TAG, "getManagedUserId: callingUserId=%d", callingUserId); for (UserInfo ui : mUserManager.getProfiles(callingUserId)) { if (ui.id == callingUserId || !ui.isManagedProfile()) { continue;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getManagedUserId File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getManagedUserId
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setOCFormDataAuditsTypesExpected() { this.unsetTypeExpected(); int i = 1; this.setTypeExpected(i, TypeNames.INT); // event_crf_id ++i; this.setTypeExpected(i, TypeNames.INT); // audit_id ++i; this.setTypeExpected(i, TypeNames.STRING); // name +...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOCFormDataAuditsTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setOCFormDataAuditsTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public boolean isAvailableOffline() { return (mFlags & FLAG_AVAILABLE_OFFLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAvailableOffline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
isAvailableOffline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@TestApi public void setEligibleForLegacyPermissionPrompt(boolean eligible) { mIsEligibleForLegacyPermissionPrompt = eligible; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEligibleForLegacyPermissionPrompt File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setEligibleForLegacyPermissionPrompt
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public abstract StringBuilder getGenericSignature(StringBuilder sb);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGenericSignature File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
getGenericSignature
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public static List<Descriptor<AuthorizationStrategy>> getAuthorizationStrategyDescriptors() { return AuthorizationStrategy.all(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthorizationStrategyDescriptors File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getAuthorizationStrategyDescriptors
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public void removeStartingWindow(IBinder appToken, View window) { if (DEBUG_STARTING_WINDOW) Slog.v(TAG, "Removing starting window for " + appToken + ": " + window + " Callers=" + Debug.getCallers(4)); if (window != null) { WindowManager wm = (WindowManager)mCo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStartingWindow File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
removeStartingWindow
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public Route.Definition sse(final String path, final Sse.Handler1 handler) { return appendDefinition(GET, path, handler).consumes(MediaType.sse); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sse File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
sse
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
native boolean enableNative();
Vulnerability Classification: - CWE: CWE-362, CWE-20 - CVE: CVE-2016-3760 - Severity: MEDIUM - CVSS Score: 5.4 Description: Add guest mode functionality (3/3) Add a flag to enable() to start Bluetooth in restricted mode. In restricted mode, all devices that are paired during restricted mode are deleted upon leaving r...
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
enableNative
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
1
Analyze the following code function for security vulnerabilities
@JsonIgnore public File getWorkspaceDir() { return _workspaceDir; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWorkspaceDir File: main/src/com/google/refine/io/FileProjectManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-37476
HIGH
7.8
OpenRefine
getWorkspaceDir
main/src/com/google/refine/io/FileProjectManager.java
e9c1e65d58b47aec8cd676bd5c07d97b002f205e
0
Analyze the following code function for security vulnerabilities
private String getAttribute(Element element, String attributeName) { Attr attrribute = element.getAttributeNode(attributeName); return attrribute != null ? attrribute.getValue() : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttribute File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
getAttribute
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
public boolean profileControl(String process, int userId, boolean start, ProfilerInfo profilerInfo, int profileType) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeSt...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: profileControl File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
profileControl
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public void displayPreference(PreferenceScreen screen) { super.displayPreference(screen); MainSwitchPreference pref = screen.findPreference(getPreferenceKey()); pref.addOnSwitchChangeListener(this); pref.updateStatus(isChecked()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayPreference File: src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21247
HIGH
7.8
android
displayPreference
src/com/android/settings/location/BluetoothScanningMainSwitchPreferenceController.java
edd4023805bc7fa54ae31de222cde02b9012bbc4
0
Analyze the following code function for security vulnerabilities
void setOomAdjObserver(int uid, OomAdjObserver observer) { synchronized (this) { mCurOomAdjUid = uid; mCurOomAdjObserver = observer; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOomAdjObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
setOomAdjObserver
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@PUT @Path("{username}/permissions") @RequiresPermissions(RestPermissions.USERS_PERMISSIONSEDIT) @ApiOperation("Update a user's permission set.") @ApiResponses({ @ApiResponse(code = 400, message = "Missing or invalid permission data.") }) @AuditEvent(type ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: editPermissions File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
editPermissions
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
public void copyIncludedFilesFromJarTrimmingBasePath(File jar, String jarDirectoryToCopyFrom, File outputDirectory, String... wildcardPathInclusions) { requireFileExistence(jar); if (!Objects.requireNonNull(outputDirectory).isDirectory()) { throw new IllegalArgumentE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyIncludedFilesFromJarTrimmingBasePath File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-379" ]
CVE-2021-31411
MEDIUM
4.6
vaadin/flow
copyIncludedFilesFromJarTrimmingBasePath
flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
82cea56045b8430f7a26f037c01486b1feffa51d
0
Analyze the following code function for security vulnerabilities
public StrongAuthTracker getStrongAuthTracker() { return mStrongAuthTracker; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStrongAuthTracker File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getStrongAuthTracker
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return (int) Util.getHash(getLocalKey()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
hashCode
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public void setKeyURL(String keyURL) { this.keyURL = keyURL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeyURL File: base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setKeyURL
base/common/src/main/java/com/netscape/certsrv/key/KeyRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void getAuthTokenLabel(IAccountManagerResponse response, final String accountType, final String authTokenType) throws RemoteException { Preconditions.checkArgument(accountType != null, "accountType cannot be null"); Preconditions.checkAr...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthTokenLabel File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAuthTokenLabel
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public Label getAssignedLabel() { if(canRoam) return null; if(assignedNode==null) return Jenkins.getInstance().getSelfLabel(); return Jenkins.getInstance().getLabel(assignedNode); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAssignedLabel File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getAssignedLabel
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
protected void internalSkipMessages(String subName, int numMessages, boolean authoritative) { if (topicName.isGlobal()) { validateGlobalNamespaceOwnership(namespaceName); } PartitionedTopicMetadata partitionMetadata = getPartitionedTopicMetadata(topicName, authoritati...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalSkipMessages File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalSkipMessages
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public void setStatusFromConfig() { // TODO: only call this when carbons changed, not on every presence change CarbonManager.getInstanceFor(mXMPPConnection).sendCarbonsEnabled(mConfig.messageCarbons); Presence presence = new Presence(Presence.Type.available); Mode mode = Mode.valueOf(mConfig.getPresenceMode()....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatusFromConfig File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
setStatusFromConfig
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
public void setTitlePrinted(boolean enabled) { mTitlePrinted = enabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTitlePrinted File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setTitlePrinted
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public List<ApiScenrioExportJmx> exportJmx(ApiScenarioBatchRequest request) { List<ApiScenarioWithBLOBs> apiScenarioWithBLOBs = getExportResult(request); // 生成jmx List<ApiScenrioExportJmx> resList = new ArrayList<>(); apiScenarioWithBLOBs.forEach(item -> { if (StringUtils.isN...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exportJmx File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
exportJmx
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void updateAsciiStream(String columnName, @Nullable InputStream inputStream, long length) throws SQLException { updateAsciiStream(findColumn(columnName), inputStream, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAsciiStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateAsciiStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public String getAttributeLocalName(int index){ return parser.getAttributeLocalName(index); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeLocalName File: main/src/com/google/refine/importers/XmlImporter.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-20157
MEDIUM
5
OpenRefine
getAttributeLocalName
main/src/com/google/refine/importers/XmlImporter.java
6a0d7d56e4ffb420316ce7849fde881344fbf881
0
Analyze the following code function for security vulnerabilities
public void setID(CertId id) { this.id = id; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setID File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setID
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private static synchronized DocumentBuilder getDocBuilder() throws ParserConfigurationException { if (docBuilderFactory == null) initDocBuilderFactory(); DocumentBuilder docBuilder = docBuilderFactory.newDocumentBuilder(); docBuilder.setEntityResolver(new EntityResolver() { ...
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2016-15026 - Severity: MEDIUM - CVSS Score: 4.3 Description: 1) Take steps to guard against external XXE attacks (except, note that <!DOCTYPE> cannot be disabled in XML plists). 2) Resolve the actual PLIST DTD from inside the JAR file itself, and prevent resoluti...
[ "CWE-611" ]
CVE-2016-15026
MEDIUM
4.3
3breadt/dd-plist
getDocBuilder
src/main/java/com/dd/plist/XMLPropertyListParser.java
8c954e8d9f6f6863729e50105a8abf3f87fff74c
1
Analyze the following code function for security vulnerabilities
private void pushBackUnconsumedBytes() { int remaining = inf.getRemaining(); BufferObjectDataInput bufferedInput = (BufferObjectDataInput) in; int position = bufferedInput.position(); int rewindBack = max(0, remaining - ExtendedGZipInputStream.GZIP_TRAILER_SIZE); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushBackUnconsumedBytes File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
pushBackUnconsumedBytes
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public Response processAddDestination(DestinationInfo info) throws Exception { TransportConnectionState cs = lookupConnectionState(info.getConnectionId()); broker.addDestinationInfo(cs.getContext(), info); if (info.getDestination().isTemporary()) { cs.addTempDestination...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processAddDestination File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processAddDestination
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@Override boolean forAllActivities(Predicate<ActivityRecord> callback, boolean traverseTopToBottom) { return callback.test(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forAllActivities File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
forAllActivities
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
protected void requestRestoreLoad() { if (mContentViewCore != null) mContentViewCore.requestRestoreLoad(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestRestoreLoad File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
requestRestoreLoad
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0