instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
ActivityStack createStackOnDisplay(int stackId, int displayId) { ActivityDisplay activityDisplay = mActivityDisplays.get(displayId); if (activityDisplay == null) { return null; } ActivityContainer activityContainer = new ActivityContainer(stackId); mActivityContainer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createStackOnDisplay File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
createStackOnDisplay
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override public boolean supportsDestinationFolder() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsDestinationFolder File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
supportsDestinationFolder
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
abstract Object parseList(String value);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseList File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
parseList
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
private void buildCustomData(IssuesDao issuesDao, IssueExcelData excelData) { if (CollectionUtils.isNotEmpty(issuesDao.getFields())) { Map<String, Object> customData = new LinkedHashMap<>(); issuesDao.getFields().forEach(field -> { customData.put(field.getName(), field.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildCustomData File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
buildCustomData
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void injectRestoreCallingIdentity(long token) { Binder.restoreCallingIdentity(token); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectRestoreCallingIdentity File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
injectRestoreCallingIdentity
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public BeanDeserializerBase withIgnoreAllUnknown(boolean ignoreUnknown) { return new BeanDeserializer(this, ignoreUnknown); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withIgnoreAllUnknown File: src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42004
HIGH
7.5
FasterXML/jackson-databind
withIgnoreAllUnknown
src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializer.java
063183589218fec19a9293ed2f17ec53ea80ba88
0
Analyze the following code function for security vulnerabilities
protected void appendMetadatas(VFSLeaf file, VFSMetadata infos, StringBuilder sb) { if (infos == null) { appendMetadata("mf.filename", file.getName(), sb); } else { appendMetadata("mf.filename", infos.getFilename(), sb); String title = infos.getTitle(); if (StringHelper.containsNonWhitespace(title)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendMetadatas File: src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41152
MEDIUM
4
OpenOLAT
appendMetadatas
src/main/java/org/olat/core/util/mail/ui/SendDocumentsByEMailController.java
418bb509ffcb0e25ab4390563c6c47f0458583eb
0
Analyze the following code function for security vulnerabilities
private static byte[] generateAdditionalAttributes(boolean v3SigningEnabled) { if (v3SigningEnabled) { // FORMAT (little endian): // * length-prefixed bytes: attribute pair // * uint32: ID - STRIPPING_PROTECTION_ATTR_ID in this case // * uint32: value - 3 (v3 ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateAdditionalAttributes File: src/main/java/com/android/apksig/internal/apk/v2/V2SchemeSigner.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
generateAdditionalAttributes
src/main/java/com/android/apksig/internal/apk/v2/V2SchemeSigner.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
public static Collection<SFile> fileCandidates() { final Set<SFile> result = new TreeSet<>(); final String classpath = System.getProperty("java.class.path"); String[] classpathEntries = classpath.split(SFile.pathSeparator); for (String s : classpathEntries) { if (s == null) continue; SFile dir = new S...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fileCandidates File: src/net/sourceforge/plantuml/version/LicenseInfo.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
fileCandidates
src/net/sourceforge/plantuml/version/LicenseInfo.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
private void saveShortcutsAsync( @NonNull final Collection<ShortcutInfo> shortcuts) { Objects.requireNonNull(shortcuts); if (!isAppSearchEnabled() || shortcuts.isEmpty()) { // No need to invoke AppSearch when there's nothing to save. return; } if (Shor...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveShortcutsAsync File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
saveShortcutsAsync
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
WindowProcessController getProcessController(String processName, int uid) { if (uid == SYSTEM_UID) { // The system gets to run in any process. If there are multiple processes with the same // uid, just pick the first (this should never happen). final SparseArray<WindowProcess...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessController File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getProcessController
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override protected Object loadField(String inode, String fieldContentlet) throws DotDataException { String sql="SELECT "+fieldContentlet+" FROM contentlet WHERE inode=?"; DotConnect dc=new DotConnect(); dc.setSQL(sql); dc.addParam(inode); ArrayList results=dc.loadResults(); if(results.si...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadField File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
loadField
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
private long getFastLong(byte[] bytes) throws NumberFormatException { if (bytes.length == 0) { throw FAST_NUMBER_FAILED; } long val = 0; int start; boolean neg; if (bytes[0] == '-') { neg = true; start = 1; if (bytes.length == 1 || bytes.length > 19) { throw FAST...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFastLong File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getFastLong
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public static void cursorStringToContentValues(Cursor cursor, String field, ContentValues values) { cursorStringToContentValues(cursor, field, values, field); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cursorStringToContentValues File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
cursorStringToContentValues
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
@Override public void write(final ObjectDataOutput out, final Date obj) throws IOException { out.writeLong(obj.getTime()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
write
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public void processPartial(PhaseId phaseId) { PartialViewContext pvc = ctx.getPartialViewContext(); Collection <String> myExecuteIds = pvc.getExecuteIds(); Collection <String> myRenderIds = pvc.getRenderIds(); UIViewRoot viewRoot = ctx.getViewRoot(); if (phaseId ==...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processPartial File: impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-17091
MEDIUM
4.3
eclipse-ee4j/mojarra
processPartial
impl/src/main/java/com/sun/faces/context/PartialViewContextImpl.java
a3fa9573789ed5e867c43ea38374f4dbd5a8f81f
0
Analyze the following code function for security vulnerabilities
public JSON getJSON() { return json; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJSON File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getJSON
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_PROFILE_INTERACTION, conditional = true) public boolean addCrossProfileWidgetProvider(@Nullable ComponentName admin, String packageName) { throwIfParentInstance("addCrossProfileWidgetProvider"); if (mService != null) { try { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCrossProfileWidgetProvider File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
addCrossProfileWidgetProvider
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void sendSetOnHold(String id) throws Exception { mConnectionById.get(id).state = Connection.STATE_HOLDING; for (IConnectionServiceAdapter a : mConnectionServiceAdapters) { a.setOnHold(id, null /*Session.Info*/); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendSetOnHold File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
sendSetOnHold
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private void dropData(Collection<String> droppedKeys) { for (String key : droppedKeys) { assert key != null : "Bookkeepping failure. Dropping a null key"; T data = getKeyMapper().get(key); assert data != null : "Bookkeepping failure. No data object to match key"; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dropData File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
dropData
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
public int getSingleTapX() { return mSingleTapX; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSingleTapX File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getSingleTapX
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void setDispatch(String dispatch) { this.dispatch = dispatch; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDispatch File: src/com/dotmarketing/cms/comment/struts/CommentsForm.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-254", "CWE-264" ]
CVE-2016-8600
MEDIUM
5
dotCMS/core
setDispatch
src/com/dotmarketing/cms/comment/struts/CommentsForm.java
cb84b130065c9eed1d1df9e4770ffa5d4bd30569
0
Analyze the following code function for security vulnerabilities
private CompletableFuture<Map<NodeId, AttributeGroup>> readMonitoringAttributes(List<NodeId> nodeIds) { List<ReadValueId> attributesToRead = nodeIds.stream() .flatMap(nodeId -> { Function<AttributeId, ReadValueId> f = id -> new ReadValueId( nodeId, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readMonitoringAttributes File: opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java Repository: eclipse/milo The code follows secure coding practices.
[ "CWE-770" ]
CVE-2022-25897
HIGH
7.5
eclipse/milo
readMonitoringAttributes
opc-ua-sdk/sdk-server/src/main/java/org/eclipse/milo/opcua/sdk/server/subscriptions/SubscriptionManager.java
4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5
0
Analyze the following code function for security vulnerabilities
@Override public Document build(final String systemId) throws JDOMException, IOException { if (systemId == null) { throw new NullPointerException( "Unable to build a URI from a null systemID."); } try { return getEngine().build(systemId); } catch (IOException ioe) { // OK, Issue #63 // it i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build File: core/src/java/org/jdom2/input/SAXBuilder.java Repository: hunterhacker/jdom The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-33813
MEDIUM
5
hunterhacker/jdom
build
core/src/java/org/jdom2/input/SAXBuilder.java
bd3ab78370098491911d7fe9d7a43b97144a234e
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message msg) { switch (msg.what) { case MESSAGE_TIMED_OUT: Session session = (Session)msg.obj; session.onTimedOut(); break; case MESSAGE_COPY_SHARED_ACCOUNT: ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
handleMessage
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
private DocumentReferenceResolver<EntityReference> getCurrentgetdocumentResolver() { if (this.currentgetdocumentResolver == null) { this.currentgetdocumentResolver = Utils.getComponent(DocumentReferenceResolver.TYPE_REFERENCE, "currentgetdocument"); } return this...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentgetdocumentResolver File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getCurrentgetdocumentResolver
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
protected String getOCFormDataDNsSql(String ecIds) { return "select ec.event_crf_id, dn.parent_dn_id, dn.discrepancy_note_id as dn_id, dn.description, dn.detailed_notes, dn.owner_id, dn.date_created, rs.name as status, dnt.name" + " from discrepancy_note dn, dn_event_crf_map dnecm, event_crf ec, dis...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOCFormDataDNsSql File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
getOCFormDataDNsSql
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
public Set<LabelAtom> getLabelAtoms() { Set<LabelAtom> r = new TreeSet<LabelAtom>(); for (Label l : labels.values()) { if(!l.isEmpty() && l instanceof LabelAtom) r.add((LabelAtom)l); } return r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLabelAtoms File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getLabelAtoms
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public void sync(SyncRequest request) { syncAsUser(request, UserHandle.getCallingUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sync File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
sync
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
public static void deleteStructure(Structure structure) throws DotHibernateException, DotDataException { WorkFlowFactory wff = FactoryLocator.getWorkFlowFactory(); wff.deleteSchemeForStruct(structure.getInode()); InodeFactory.deleteInode(structure); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteStructure File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
deleteStructure
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
public static List<String> splitAsList(String source, String delimiter, boolean trim) { int dl = delimiter.length(); if (dl == 1) { // optimize for short strings return splitAsList(source, delimiter.charAt(0), trim); } List<String> result = new ArrayList<String>...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: splitAsList File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
splitAsList
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void sendCustomAction(String packageName, String action, Bundle args) { mSessionCb.sendCustomAction(packageName, Binder.getCallingPid(), Binder.getCallingUid(), action, args); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendCustomAction File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
sendCustomAction
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public void addEntry(final String key, final String value) { entries.put(generateKey(key, value), new Entry(key, value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addEntry File: src/main/java/com/gitblit/StoredUserConfig.java Repository: gitblit-org/gitblit The code follows secure coding practices.
[ "CWE-269" ]
CVE-2022-31267
HIGH
7.5
gitblit-org/gitblit
addEntry
src/main/java/com/gitblit/StoredUserConfig.java
9b4afad6f4be212474809533ec2c280cce86501a
0
Analyze the following code function for security vulnerabilities
private void writeApplicationRestrictionsLocked(String packageName, Bundle restrictions, int userId) { AtomicFile restrictionsFile = new AtomicFile( new File(Environment.getUserSystemDirectory(userId), packageToRestrictionsFileName(packageName))); writ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeApplicationRestrictionsLocked File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
writeApplicationRestrictionsLocked
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
@Override public TemplateEngineTypeEnum type() { return TemplateEngineTypeEnum.VELOCITY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: type File: ballcat-codegen-backend/src/main/java/com/hccake/ballcat/codegen/engine/VelocityTemplateEngine.java Repository: ballcat-projects/ballcat-codegen The code follows secure coding practices.
[ "CWE-20" ]
CVE-2022-24881
HIGH
7.5
ballcat-projects/ballcat-codegen
type
ballcat-codegen-backend/src/main/java/com/hccake/ballcat/codegen/engine/VelocityTemplateEngine.java
84a7cb38daf0295b93aba21d562ec627e4eb463b
0
Analyze the following code function for security vulnerabilities
@Override public void write(int b) throws IOException { buff.write(b); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
write
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public final void addService(PackageParser.Service s) { mServices.put(s.getComponentName(), s); if (DEBUG_SHOW_INFO) { Log.v(TAG, " " + (s.info.nonLocalizedLabel != null ? s.info.nonLocalizedLabel : s.info.name) + ":"); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addService File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
addService
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public PortForwardingEventListener getPortForwardingEventListenerProxy() { return tunnelListenerProxy; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPortForwardingEventListenerProxy File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
getPortForwardingEventListenerProxy
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
public void setBanner(String banner) { this.banner = banner; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBanner File: base/common/src/main/java/org/dogtagpki/common/Info.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setBanner
base/common/src/main/java/org/dogtagpki/common/Info.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public String getUserTimeZone() { return this.xwiki.getUserTimeZone(this.context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserTimeZone File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getUserTimeZone
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public boolean isEnableCaptcha() { return enableCaptcha; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isEnableCaptcha File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-200" ]
CVE-2014-2064
MEDIUM
5
jenkinsci/jenkins
isEnableCaptcha
core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
fbf96734470caba9364f04e0b77b0bae7293a1ec
0
Analyze the following code function for security vulnerabilities
@Override public OnGoingLikeCondition notLike() { notLike = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notLike File: src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java Repository: xjodoin/torpedoquery The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2019-11343
HIGH
7.5
xjodoin/torpedoquery
notLike
src/main/java/org/torpedoquery/jpa/internal/conditions/ConditionBuilder.java
3c20b874fba9cc2a78b9ace10208de1602b56c3f
0
Analyze the following code function for security vulnerabilities
public void setRemoteTransition(@Nullable RemoteTransition remoteTransition) { mRemoteTransition = remoteTransition; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRemoteTransition File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setRemoteTransition
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public static void checkSqlAnnotation(String str){ Matcher matcher = SQL_ANNOTATION.matcher(str); if(matcher.find()){ String error = "请注意,值可能存在SQL注入风险---> \\*.*\\"; log.error(error); throw new RuntimeException(error); } }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2023-38905 - Severity: MEDIUM - CVSS Score: 5.5 Description: sys/duplicate/check SQL注入 #4737 Function: checkSqlAnnotation File: jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java Repository: jeecgboot/jeecg-boot Fixed Code: public sta...
[ "CWE-89" ]
CVE-2023-38905
MEDIUM
5.5
jeecgboot/jeecg-boot
checkSqlAnnotation
jeecg-boot-base-core/src/main/java/org/jeecg/common/util/SqlInjectionUtil.java
ca1218f792369ed3c8196e796b1940b33ed6469b
1
Analyze the following code function for security vulnerabilities
@Override public synchronized boolean trim(boolean aggressive) { cacheGet.trim(aggressive); cacheSet.trim(aggressive); if (Thread.currentThread() == currentThread) { lastChunk = null; lastPair = Long.MAX_VALUE; return chunks.isEmpty(); } if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trim File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
trim
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public static void computeDataFromValues(@NonNull ContentValues values, @NonNull File volumePath, boolean isForFuse) { values.remove(MediaColumns.DATA); final String displayName = values.getAsString(MediaColumns.DISPLAY_NAME); final String resolvedDisplayName; // Pending fil...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeDataFromValues File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
computeDataFromValues
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public String selectHeaderAccept(String[] accepts) { if (accepts.length == 0) { return null; } for (String accept : accepts) { if (isJsonMime(accept)) { return accept; } } return StringUtil.join(accepts, ","); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectHeaderAccept File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practi...
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
selectHeaderAccept
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public String getValue() { return value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValue File: base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getValue
base/common/src/main/java/com/netscape/certsrv/profile/PolicyConstraintValue.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
protected abstract String getBaseTableName();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBaseTableName File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java Repository: dhis2/dhis2-core The code follows secure coding p...
[ "CWE-89" ]
CVE-2022-24848
MEDIUM
6.5
dhis2/dhis2-core
getBaseTableName
dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/association/AbstractOrganisationUnitAssociationsQueryBuilder.java
ef04483a9b177d62e48dcf4e498b302a11f95e7d
0
Analyze the following code function for security vulnerabilities
@Override public void onRealmRemoved(RealmModel realm) { int deletedClientSessions = em.createNamedQuery("deleteClientSessionsByRealm") .setParameter("realmId", realm.getId()) .executeUpdate(); int deletedUserSessions = em.createNamedQuery("deleteUserSessionsByRealm"...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRealmRemoved File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java Repository: keycloak The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-6563
HIGH
7.7
keycloak
onRealmRemoved
model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
11eb952e1df7cbb95b1e2c101dfd4839a2375695
0
Analyze the following code function for security vulnerabilities
@Override public Frame readFrame() throws IOException { synchronized (_inputStream) { return Frame.readFrom(_inputStream); } }
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2023-46120 - Severity: HIGH - CVSS Score: 7.5 Description: Add max inbound message size to ConnectionFactory To avoid OOM with a very large message. The default value is 64 MiB. Fixes #1062 (cherry picked from commit 9ed45fde52224ec74fc523321efdf9a157d5cfca) ...
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
readFrame
src/main/java/com/rabbitmq/client/impl/SocketFrameHandler.java
714aae602dcae6cb4b53cadf009323ebac313cc8
1
Analyze the following code function for security vulnerabilities
private void updateResolvedBoundsHorizontalPosition(Configuration newParentConfiguration) { final Configuration resolvedConfig = getResolvedOverrideConfiguration(); final Rect resolvedBounds = resolvedConfig.windowConfiguration.getBounds(); final Rect screenResolvedBounds = mSize...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateResolvedBoundsHorizontalPosition File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
updateResolvedBoundsHorizontalPosition
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
final void ensureLocked() { if (Thread.holdsLock(mLockDoNoUseDirectly)) { return; } Slogf.wtfStack(LOG_TAG, "Not holding DPMS lock."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
ensureLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public boolean installCaCert(@Nullable ComponentName admin, byte[] certBuffer) { throwIfParentInstance("installCaCert"); if (mService != null) { try { return mService.installCaCert(admin, mContext.getPackageName(), certBuffer); } catch (RemoteException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installCaCert File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
installCaCert
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void setMaxTimeFrameUnits(TimeFrameUnits maxTimeFrameUnits) { this.maxTimeFrameUnits = maxTimeFrameUnits; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaxTimeFrameUnits File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4727
MEDIUM
6.1
openmrs/openmrs-module-appointmentscheduling
setMaxTimeFrameUnits
api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
2ccbe39c020809765de41eeb8ee4c70b5ec49cc8
0
Analyze the following code function for security vulnerabilities
@Override public void releaseSomeActivities(IApplicationThread appInt) { synchronized (mGlobalLock) { final long origId = Binder.clearCallingIdentity(); try { final WindowProcessController app = getProcessController(appInt); app.releaseSomeActivities("...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: releaseSomeActivities File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
releaseSomeActivities
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public String getWebAppPath() { return this.xwiki.getWebAppPath(this.context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWebAppPath File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getWebAppPath
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
private boolean pull(ConsoleOutputStreamConsumer outputStreamConsumer) { CommandLine hg = hg("pull", "-b", branch, "--config", String.format("paths.default=%s", url)); return execute(hg, outputStreamConsumer) == 0; }
Vulnerability Classification: - CWE: CWE-77 - CVE: CVE-2022-29184 - Severity: MEDIUM - CVSS Score: 6.5 Description: Improve escaping of arguments when constructing Hg command calls Function: pull File: domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java Repository: gocd Fixed Code: pri...
[ "CWE-77" ]
CVE-2022-29184
MEDIUM
6.5
gocd
pull
domain/src/main/java/com/thoughtworks/go/domain/materials/mercurial/HgCommand.java
37d35115db2ada2190173f9413cfe1bc6c295ecb
1
Analyze the following code function for security vulnerabilities
public ProfileInput getInputByID(String id) { for (ProfileInput input : inputs) { if (input.getId().equals(id)) return input; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputByID File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getInputByID
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Test public void save5returnId(TestContext context) { String id = randomUuid(); createFoo(context).save(FOO, id, xPojo, /* returnId */ true, context.asyncAssertSuccess(save -> { context.assertEquals(id, save); postgresClient.getById(FOO, id, context.asyncAssertSuccess(get -> { context.ass...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save5returnId File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
save5returnId
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
protected SecretKey engineGenerateSecret( String algorithm) throws NoSuchAlgorithmException { if (x == null) { throw new IllegalStateException("Diffie-Hellman not initialised."); } byte[] res = bigIntToBytes(result); // for JSSE compatibility ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineGenerateSecret File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/KeyAgreementSpi.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-320" ]
CVE-2016-1000346
MEDIUM
4.3
bcgit/bc-java
engineGenerateSecret
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/KeyAgreementSpi.java
1127131c89021612c6eefa26dbe5714c194e7495
0
Analyze the following code function for security vulnerabilities
public String getSecurePort() { return securePort; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecurePort File: base/server/src/main/java/com/netscape/cmscore/apps/ServerXml.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getSecurePort
base/server/src/main/java/com/netscape/cmscore/apps/ServerXml.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public PageReference getPageReferenceWithLocale() { return this.doc.getPageReferenceWithLocale(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPageReferenceWithLocale File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getPageReferenceWithLocale
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public final void mark(int readlimit) { ensureOpen(); mMarkPos = nativeAssetSeek(mAssetNativePtr, 0, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mark File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
mark
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public Date parseDate(String str) { try { return dateFormat.parse(str); } catch (java.text.ParseException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseDate File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
parseDate
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override boolean check(SetConfig c1, SetConfig c2) { return isCompatible(c1, c2); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Bean public void configAviatorEvaluator() { // 配置AviatorEvaluator使用LRU缓存编译后的表达式 AviatorEvaluator.getInstance() .useLRUExpressionCache(AVIATOR_LRU_CACHE_SIZE) .addFunction(new StrEqualFunction()); // 配置自定义aviator函数 AviatorEvaluator.getInstance().addOp...
Vulnerability Classification: - CWE: CWE-94 - CVE: CVE-2023-51387 - Severity: HIGH - CVSS Score: 8.8 Description: fix: expression injection RCE (#1241) Function: configAviatorEvaluator File: common/src/main/java/org/dromara/hertzbeat/common/config/AviatorConfiguration.java Repository: apache/hertzbeat Fixed Code: @B...
[ "CWE-94" ]
CVE-2023-51387
HIGH
8.8
apache/hertzbeat
configAviatorEvaluator
common/src/main/java/org/dromara/hertzbeat/common/config/AviatorConfiguration.java
8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2
1
Analyze the following code function for security vulnerabilities
public String getVersionHashCode(XWikiContext context) { MessageDigest md5 = null; try { md5 = MessageDigest.getInstance("MD5"); } catch (NoSuchAlgorithmException ex) { LOGGER.error("Cannot create MD5 object", ex); return hashCode() + ""; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVersionHashCode File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getVersionHashCode
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public static BufferedReader newReader(File file, Charset charset) throws FileNotFoundException { checkNotNull(file); checkNotNull(charset); return new BufferedReader(new InputStreamReader(new FileInputStream(file), charset)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newReader File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
newReader
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public List<Map> list(TaskDTO queryVO) { return extTaskMapper.list(queryVO); }
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2023-42405 - Severity: CRITICAL - CVSS Score: 9.8 Description: fix(rackshift-server): 处理 SQL注入漏洞 #79 Function: list File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift Fixed Code: public List<Map> list(TaskD...
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
list
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
1
Analyze the following code function for security vulnerabilities
void computeScreenConfigurationLocked(Configuration config) { final DisplayInfo displayInfo = updateDisplayAndOrientationLocked(); final int dw = displayInfo.logicalWidth; final int dh = displayInfo.logicalHeight; config.orientation = (dw <= dh) ? Configuration.ORIENTATION_PORTRAIT : ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeScreenConfigurationLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
computeScreenConfigurationLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
private static boolean hasPermission(PackageParser.Package pkgInfo, String perm) { for (int i=pkgInfo.permissions.size()-1; i>=0; i--) { if (pkgInfo.permissions.get(i).info.name.equals(perm)) { return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasPermission File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
hasPermission
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private String serializeJobId(List<String> jobId) { return StringUtils.join(jobId, "/"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serializeJobId File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
serializeJobId
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/SaveAction.java
30c52b01559b8ef5ed1035dac7c34aaf805764d5
0
Analyze the following code function for security vulnerabilities
@Test public void executeURIDuplicates() throws Exception { final DataPoints[] datapoints = new DataPoints[1]; datapoints[0] = new MockDataPoints().getMock(); when(query_result.runAsync()).thenReturn( Deferred.fromResult(datapoints)); final HttpQuery query = NettyMocks.getQuery(tsdb, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeURIDuplicates File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
executeURIDuplicates
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public void moveElementsFrom(UI otherUI) { internalsHandler.moveToNewUI(otherUI, ui); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveElementsFrom File: flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
moveElementsFrom
flow-server/src/main/java/com/vaadin/flow/component/internal/UIInternals.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
@Override public void updateDeviceOwner(String packageName) { final int callingUid = Binder.getCallingUid(); if (callingUid != 0 && callingUid != Process.SYSTEM_UID) { throw new SecurityException("updateDeviceOwner called from non-system process"); } synchronized (this) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateDeviceOwner File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
updateDeviceOwner
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public ProjectIssueConfig getProjectConfig(String configStr) { ProjectIssueConfig issueConfig; if (StringUtils.isNotBlank(configStr)) { issueConfig = JSON.parseObject(configStr, ProjectIssueConfig.class); } else { issueConfig = new ProjectIssueConfig(); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProjectConfig File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getProjectConfig
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
@Override public int getMetricsCategory() { return SettingsEnums.NOTIFICATION_ACCESS; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricsCategory File: src/com/android/settings/notification/NotificationAccessSettings.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35667
HIGH
7.8
android
getMetricsCategory
src/com/android/settings/notification/NotificationAccessSettings.java
d8355ac47e068ad20c6a7b1602e72f0585ec0085
0
Analyze the following code function for security vulnerabilities
private void renderTaskOptions(JSONObject task) { try { Map<String, String> thisOptions = getThisOptions(task); String optionStr = task.getJSONObject("options").toJSONString(); //temp code if (!"create-raid".equalsIgnoreCase(task.getString("label"))) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderTaskOptions File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
renderTaskOptions
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
@SuppressJava6Requirement(reason = "Guarded by version check") private static void rethrowWithMoreDetailsIfPossible(String name, NoSuchMethodError error) { if (PlatformDependent.javaVersion() >= 7) { throw new LinkageError( "Possible multiple incompatible native libraries on ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rethrowWithMoreDetailsIfPossible File: common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java Repository: netty The code follows secure coding practices.
[ "CWE-378", "CWE-379" ]
CVE-2021-21290
LOW
1.9
netty
rethrowWithMoreDetailsIfPossible
common/src/main/java/io/netty/util/internal/NativeLibraryLoader.java
c735357bf29d07856ad171c6611a2e1a0e0000ec
0
Analyze the following code function for security vulnerabilities
@Override public SummaryLoader.SummaryProvider createSummaryProvider(Activity activity, SummaryLoader summaryLoader) { return new SummaryProvider(activity, summaryLoader); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createSummaryProvider File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
createSummaryProvider
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
@TestApi @NonNull public static String operationToString(@DevicePolicyOperation int operation) { return DebugUtils.constantToString(DevicePolicyManager.class, PREFIX_OPERATION, operation); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: operationToString File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
operationToString
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void handleLongPressOnHome() { if (mLongPressOnHomeBehavior != LONG_PRESS_HOME_NOTHING) { mHomeConsumed = true; performHapticFeedbackLw(null, HapticFeedbackConstants.LONG_PRESS, false); if (mLongPressOnHomeBehavior == LONG_PRESS_HOME_RECENT_SYSTEM_UI) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleLongPressOnHome File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
handleLongPressOnHome
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public Iterator<Class<?>> getConverterTypes() { return converterTypeMap.keySet().iterator(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConverterTypes File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getConverterTypes
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
@Override public boolean isBackupServiceEnabled(ComponentName admin) { if (!mHasFeature) { return true; } Objects.requireNonNull(admin, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(admin); Preconditions.checkCallAuthorization(isDefaul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBackupServiceEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isBackupServiceEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private ThreadGroup getRootThreadGroup() { var group = testThreadGroup; // NOSONAR for (ThreadGroup nextParent; (nextParent = group.getParent()) != null;) group = nextParent; return group; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRootThreadGroup File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
getRootThreadGroup
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public static List<String> getPathComponents(String path) { List<String> result = CmsStringUtil.splitAsList(path, "/"); Iterator<String> iter = result.iterator(); while (iter.hasNext()) { String token = iter.next(); if (CmsStringUtil.isEmptyOrWhitespaceOnly(token)) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPathComponents File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getPathComponents
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
public abstract String getDisplayName();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDisplayName File: core/src/main/java/hudson/model/Descriptor.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getDisplayName
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public Object query(String query) throws ApplicationException { StringBuffer html = new StringBuffer(); String[] keywords; int page = 1, pageSize = 20; this.request = (Request) this.context .getAttribute(HTTP_REQUEST); if (this.request.getParameter("page") == nu...
Vulnerability Classification: - CWE: CWE-89 - CVE: CVE-2022-4454 - Severity: CRITICAL - CVSS Score: 9.8 Description: Fixed the SQL Injection issue. Function: query File: src/main/java/custom/application/search.java Repository: m0ver/bible-online Fixed Code: public Object query(String query) throws ApplicationExcepti...
[ "CWE-89" ]
CVE-2022-4454
CRITICAL
9.8
m0ver/bible-online
query
src/main/java/custom/application/search.java
6ef0aabfb2d4ccd53fcaa9707781303af357410e
1
Analyze the following code function for security vulnerabilities
@Override public void deflect(String callId, Uri address, Session.Info info) throws RemoteException { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deflect File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
deflect
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public boolean contains(String where, String what) { boolean retval = false; String[] tmp = where.split(","); for (int i = 0; i < tmp.length; i++) { if (what.equalsIgnoreCase(tmp[i])) { retval = true; break; } } return retv...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: contains File: src/main/java/com/jflyfox/modules/filemanager/FileManager.java Repository: jflyfox/jfinal_cms The code follows secure coding practices.
[ "CWE-74" ]
CVE-2021-37262
MEDIUM
5
jflyfox/jfinal_cms
contains
src/main/java/com/jflyfox/modules/filemanager/FileManager.java
e7fd0fe9362464c4d2bd308318eecc89a847b116
0
Analyze the following code function for security vulnerabilities
public void setFieldValue(String key, String value) { if (TextUtils.isEmpty(value)) { mFields.put(key, EMPTY_VALUE); } else { mFields.put(key, convertToQuotedString(value)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setFieldValue File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
setFieldValue
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
private String computeNextDestination(final HttpRequest httpRequest, final String componentId, final String function, final T component) { final String destination;// retourne la page jsp de destination et place dans la request les objets // utilises par cette page if (checkUserAuthorization(f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: computeNextDestination File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
computeNextDestination
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public abstract boolean isContainerType();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isContainerType File: src/main/java/com/fasterxml/jackson/databind/JavaType.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
isContainerType
src/main/java/com/fasterxml/jackson/databind/JavaType.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
private <T> String getName(T listener) { return listener.getClass().getName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framework ...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
getName
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
public Column addColumn(Object propertyId, Class<?> type) { addColumnProperty(propertyId, type, null); return getColumn(propertyId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumn File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumn
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public HeaderRow getHeaderRow(int rowIndex) { return header.getRow(rowIndex); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHeaderRow File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getHeaderRow
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private void revokeUriPermissionLocked(String targetPackage, int callingUid, GrantUri grantUri, final int modeFlags) { if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION, "Revoking all granted permissions to " + grantUri); final IPackageManager pm = A...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: revokeUriPermissionLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
revokeUriPermissionLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public boolean addOrUpdateProvider(PasspointConfiguration config, int uid, String packageName, boolean isFromSuggestion, boolean isTrusted) { mWifiMetrics.incrementNumPasspointProviderInstallation(); if (config == null) { Log.e(TAG, "Configuration not provided"); retu...
Vulnerability Classification: - CWE: CWE-120 - CVE: CVE-2023-21243 - Severity: MEDIUM - CVSS Score: 5.5 Description: Limit the ServiceFriendlyNames and limit the number of Passpoint per App Reject the suggestion passpoint with ServiceFriendlyNames Bug: 274445194 Test: atest com.android.server.wifi (cherry picked fro...
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
addOrUpdateProvider
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
1
Analyze the following code function for security vulnerabilities
protected Http2FrameLogger frameLogger() { return frameLogger; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: frameLogger File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java Repository: netty The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
netty
frameLogger
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
58f75f665aa81a8cbcf6ffa74820042a285c5e61
0