instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public Descriptors.FieldDescriptor getOneofFieldDescriptor(Descriptors.OneofDescriptor oneof) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOneofFieldDescriptor File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
getOneofFieldDescriptor
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
@Override public String toNativePath(String path) { return removeFilePrefix(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toNativePath File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
toNativePath
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public String getPackageForToken(IBinder token) { synchronized(this) { ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return null; } return r.packageName; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageForToken File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPackageForToken
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public boolean hasShareTargets(String packageName, String packageToCheck, @UserIdInt int userId) { verifyCaller(packageName, userId); enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_APP_PREDICTIONS, "hasShareTargets"); synchronized (mLock) { throwIfUserLockedL(userId); return getPackageShortcutsLocked(packageToCheck, userId).hasShareTargets(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasShareTargets File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
hasShareTargets
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public String[] getAccountTypesWithManagementDisabled() { return getAccountTypesWithManagementDisabledAsUser(UserHandle.getCallingUserId(), false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountTypesWithManagementDisabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getAccountTypesWithManagementDisabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public <X> X getFirstByXPath(final String xpathExpr) { return getFirstByXPath(xpathExpr, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstByXPath File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
getFirstByXPath
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private Profile getProfileForEditing(String id, Profile authUser) { if (!canEditProfile(authUser, id)) { return null; } return isMyid(authUser, id) ? authUser : (Profile) utils.getParaClient().read(Profile.id(id)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileForEditing File: src/main/java/com/erudika/scoold/controllers/ProfileController.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getProfileForEditing
src/main/java/com/erudika/scoold/controllers/ProfileController.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
private void updateWifiConfigInWcmIfPresent( WifiConfiguration newConfig, int uid, String packageName, boolean isFromSuggestion) { WifiConfiguration configInWcm = mWifiConfigManager.getConfiguredNetwork(newConfig.getProfileKey()); if (configInWcm == null) return; // suggestion != saved if (isFromSuggestion != configInWcm.fromWifiNetworkSuggestion) return; // is suggestion from same app. if (isFromSuggestion && (configInWcm.creatorUid != uid || !TextUtils.equals(configInWcm.creatorName, packageName))) { return; } NetworkUpdateResult result = mWifiConfigManager.addOrUpdateNetwork( newConfig, uid, packageName, false); if (!result.isSuccess()) { Log.e(TAG, "Failed to update config in WifiConfigManager"); } else { mWifiConfigManager.allowAutojoin(result.getNetworkId(), newConfig.allowAutojoin); if (mVerboseLoggingEnabled) { Log.v(TAG, "Updated config in WifiConfigManager"); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateWifiConfigInWcmIfPresent File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
updateWifiConfigInWcmIfPresent
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
public SysUser getUserByPhone(@Param("phone") String phone);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserByPhone File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45208
MEDIUM
4.3
jeecgboot/jeecg-boot
getUserByPhone
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysUserMapper.java
51e2227bfe54f5d67b09411ee9a336750164e73d
0
Analyze the following code function for security vulnerabilities
public static boolean isValidCompressedBuffer(long inputAddr, long offset, long length) throws IOException { return impl.isValidCompressedBuffer(inputAddr, offset, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidCompressedBuffer File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
isValidCompressedBuffer
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
public boolean showsTime() { return when != 0 && extras.getBoolean(EXTRA_SHOW_WHEN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showsTime File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
showsTime
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void handle(Message msg, SSHPacket buf) throws SSHException { this.msg = msg; log.trace("Received packet {}", msg); if (msg.geq(50)) { // not a transport layer packet service.handle(msg, buf); } else if (msg.in(20, 21) || msg.in(30, 49)) { // kex packet kexer.handle(msg, buf); } else { switch (msg) { case DISCONNECT: gotDisconnect(buf); break; case IGNORE: log.debug("Received SSH_MSG_IGNORE"); break; case UNIMPLEMENTED: gotUnimplemented(buf); break; case DEBUG: gotDebug(buf); break; case SERVICE_ACCEPT: gotServiceAccept(); break; case EXT_INFO: log.debug("Received SSH_MSG_EXT_INFO"); break; case USERAUTH_BANNER: log.debug("Received USERAUTH_BANNER"); break; default: sendUnimplemented(); break; } } }
Vulnerability Classification: - CWE: CWE-354 - CVE: CVE-2023-48795 - Severity: MEDIUM - CVSS Score: 5.9 Description: Implement OpenSSH strict key exchange extension Function: handle File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj Fixed Code: @Override public void handle(Message msg, SSHPacket buf) throws SSHException { this.msg = msg; log.trace("Received packet {}", msg); if (kexer.isInitialKex()) { if (decoder.isSequenceNumberAtMax()) { throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED, "Sequence number of decoder is about to wrap during initial key exchange"); } if (kexer.isStrictKex() && !isKexerPacket(msg) && msg != Message.DISCONNECT) { throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED, "Unexpected packet type during initial strict key exchange"); } } if (msg.geq(50)) { // not a transport layer packet service.handle(msg, buf); } else if (isKexerPacket(msg)) { kexer.handle(msg, buf); } else { switch (msg) { case DISCONNECT: gotDisconnect(buf); break; case IGNORE: log.debug("Received SSH_MSG_IGNORE"); break; case UNIMPLEMENTED: gotUnimplemented(buf); break; case DEBUG: gotDebug(buf); break; case SERVICE_ACCEPT: gotServiceAccept(); break; case EXT_INFO: log.debug("Received SSH_MSG_EXT_INFO"); break; case USERAUTH_BANNER: log.debug("Received USERAUTH_BANNER"); break; default: sendUnimplemented(); break; } } }
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
handle
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
1
Analyze the following code function for security vulnerabilities
public String getFirstNonNullAttributeFromList(List<String> attributesList) { for (String attribute : attributesList) { if (attributes.get(attribute) != null) { return attributes.get(attribute); } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFirstNonNullAttributeFromList File: src/edu/stanford/nlp/util/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-0239
HIGH
7.5
stanfordnlp/CoreNLP
getFirstNonNullAttributeFromList
src/edu/stanford/nlp/util/XMLUtils.java
1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd
0
Analyze the following code function for security vulnerabilities
boolean manageExternalJars(final URL ref, final String version, final DownloadAction action) { boolean approved = false; JNLPClassLoader foundLoader = LocateJnlpClassLoader.getLoaderByResourceUrl(this, ref, version); final VersionString resourceVersion = (version == null) ? null : VersionString.fromString(version); if (foundLoader != null) { approved = true; } else if (ref.toString().startsWith(file.getNotNullProbableCodeBase().toString())) { approved = true; } else if (SecurityDesc.ALL_PERMISSIONS.equals(security.getSecurityType())) { approved = true; } if (approved) { if (foundLoader == null) { foundLoader = this; } if (action == DownloadAction.DOWNLOAD_TO_CACHE) { JARDesc jarToCache = new JARDesc(ref, resourceVersion, null, false, true, false, true); LOG.info("Downloading and initializing jar: {}", ref.toString()); foundLoader.addNewJar(jarToCache, UpdatePolicy.FORCE); } else if (action == DownloadAction.REMOVE_FROM_CACHE) { JARDesc[] jarToRemove = {new JARDesc(ref, resourceVersion, null, false, true, false, true)}; foundLoader.removeJars(jarToRemove); } else if (action == DownloadAction.CHECK_CACHE) { return CacheUtil.isCached(ref, resourceVersion); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: manageExternalJars File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
manageExternalJars
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
private String typeURIToString(String uri) { switch (uri) { case "http://www.w3.org/2001/XMLSchema#string": return "String"; case "https://w3id.org/cwl/cwl#File": return "File"; case "http://www.w3.org/2001/XMLSchema#boolean": return "Boolean"; case "http://www.w3.org/2001/XMLSchema#int": return "Integer"; case "http://www.w3.org/2001/XMLSchema#double": return "Double"; case "http://www.w3.org/2001/XMLSchema#float": return "Float"; case "http://www.w3.org/2001/XMLSchema#long": return "Long"; case "https://w3id.org/cwl/cwl#Directory": return "Directory"; default: return uri; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: typeURIToString File: src/main/java/org/commonwl/view/cwl/CWLService.java Repository: common-workflow-language/cwlviewer The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-41110
HIGH
7.5
common-workflow-language/cwlviewer
typeURIToString
src/main/java/org/commonwl/view/cwl/CWLService.java
f6066f09edb70033a2ce80200e9fa9e70a5c29de
0
Analyze the following code function for security vulnerabilities
protected BlockStateChainingListener getBlockState() { return (BlockStateChainingListener) getListenerChain().getListener(BlockStateChainingListener.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBlockState File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
getBlockState
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public void updateUiForNormalMode() { Log.d(TAG, "updateUiForNormalMode"); if (isVoiceOnlyCall) { binding.callControls.setVisibility(View.VISIBLE); } else { // animateCallControls needs this to be invisible for a check. binding.callControls.setVisibility(View.INVISIBLE); } initViews(); binding.callInfosLinearLayout.setVisibility(View.VISIBLE); binding.selfVideoViewWrapper.setVisibility(View.VISIBLE); binding.pipGroupCallOverlay.setVisibility(View.GONE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateUiForNormalMode File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
updateUiForNormalMode
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
public static int translateModeStringToPosix(String mode) { // Sanity check for invalid chars for (int i = 0; i < mode.length(); i++) { switch (mode.charAt(i)) { case 'r': case 'w': case 't': case 'a': break; default: throw new IllegalArgumentException("Bad mode: " + mode); } } int res = 0; if (mode.startsWith("rw")) { res = O_RDWR | O_CREAT; } else if (mode.startsWith("w")) { res = O_WRONLY | O_CREAT; } else if (mode.startsWith("r")) { res = O_RDONLY; } else { throw new IllegalArgumentException("Bad mode: " + mode); } if (mode.indexOf('t') != -1) { res |= O_TRUNC; } if (mode.indexOf('a') != -1) { res |= O_APPEND; } return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: translateModeStringToPosix File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
translateModeStringToPosix
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
public void removePasspointProviderWithPackage(@NonNull String packageName) { stopTrackingAppOpsChange(packageName); for (Map.Entry<String, PasspointProvider> entry : getPasspointProviderWithPackage( packageName).entrySet()) { String uniqueId = entry.getValue().getConfig().getUniqueId(); removeProvider(Process.WIFI_UID /* ignored */, true, uniqueId, null); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removePasspointProviderWithPackage File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
removePasspointProviderWithPackage
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
private boolean isAliasInCredentialManagementAppPolicy(CallerIdentity caller, String alias) { return mInjector.binderWithCleanCallingIdentity(() -> { try (KeyChainConnection connection = KeyChain.bindAsUser(mContext, caller.getUserHandle())) { // The policy will be null if there is no credential management app AppUriAuthenticationPolicy policy = connection.getService().getCredentialManagementAppPolicy(); return policy != null && !policy.getAppAndUriMappings().isEmpty() && containsAlias(policy, alias); } catch (RemoteException | InterruptedException e) { return false; } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAliasInCredentialManagementAppPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isAliasInCredentialManagementAppPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void setBackupServiceEnabled(@NonNull ComponentName admin, boolean enabled) { throwIfParentInstance("setBackupServiceEnabled"); try { mService.setBackupServiceEnabled(admin, enabled); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBackupServiceEnabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setBackupServiceEnabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static PostgresClient getInstance(Vertx vertx) { return getInstanceInternal(vertx, DEFAULT_SCHEMA); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstance File: domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getInstance
domain-models-runtime/src/main/java/org/folio/rest/persist/PostgresClient.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void extractPresentationPage(final String sourceMeetingId, final String presentationId, final Integer presentationSlide, final String destinationMeetingId) { /** * We delay processing of the presentation to make sure that the meeting has already been created. * Otherwise, the meeting won't get the conversion events. */ ScheduledFuture scheduledFuture = scheduledThreadPool.schedule(new Runnable() { public void run() { extractPage(sourceMeetingId, presentationId, presentationSlide, destinationMeetingId) ; } }, 5, TimeUnit.SECONDS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPresentationPage File: bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java Repository: bigbluebutton The code follows secure coding practices.
[ "CWE-918" ]
CVE-2023-43798
MEDIUM
5.4
bigbluebutton
extractPresentationPage
bbb-common-web/src/main/java/org/bigbluebutton/presentation/PresentationUrlDownloadService.java
02ba4c6ff8e78a0f4384ad1b7c7367c5a90376e8
0
Analyze the following code function for security vulnerabilities
ProcessRecord handleApplicationWtfInner(int callingUid, int callingPid, @Nullable IBinder app, @Nullable String tag, @Nullable final ApplicationErrorReport.CrashInfo crashInfo) { final ProcessRecord r = findAppProcess(app, "WTF"); final String processName = app == null ? "system_server" : (r == null ? "unknown" : r.processName); EventLogTags.writeAmWtf(UserHandle.getUserId(callingUid), callingPid, processName, r == null ? -1 : r.info.flags, tag, crashInfo == null ? "unknown" : crashInfo.exceptionMessage); FrameworkStatsLog.write(FrameworkStatsLog.WTF_OCCURRED, callingUid, tag, processName, callingPid, (r != null) ? r.getProcessClassEnum() : 0); addErrorToDropBox("wtf", r, processName, null, null, null, tag, null, null, crashInfo, null, null, null); return r; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleApplicationWtfInner File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
handleApplicationWtfInner
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void bindAlertedIcon(RemoteViews contentView, StandardTemplateParams p) { contentView.setDrawableTint( R.id.alerted_icon, false /* targetBackground */, getColors(p).getSecondaryTextColor(), PorterDuff.Mode.SRC_IN); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindAlertedIcon File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
bindAlertedIcon
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
void setDublinCoreService(DublinCoreCatalogService dcService) { this.dublinCoreService = dcService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDublinCoreService File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java Repository: opencast The code follows secure coding practices.
[ "CWE-74" ]
CVE-2020-5230
MEDIUM
5
opencast
setDublinCoreService
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/endpoint/IngestRestService.java
bbb473f34ab95497d6c432c81285efb0c739f317
0
Analyze the following code function for security vulnerabilities
public void init(CipherParameters params) throws IllegalArgumentException { ccm.init(true, params); this.macLength = ccm.getMac().length; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-310" ]
CVE-2016-1000339
MEDIUM
5
bcgit/bc-java
init
prov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/AES.java
413b42f4d770456508585c830cfcde95f9b0e93b
0
Analyze the following code function for security vulnerabilities
private void processParamObjects(ParamObjectsType xmlParamObjects, String packageName, String packageVersion, String configId) { pluginParamObjectSupportService.registerParamObjects(xmlParamObjects, packageName, packageVersion, configId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processParamObjects File: platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java Repository: WeBankPartners/wecube-platform The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-45746
MEDIUM
5
WeBankPartners/wecube-platform
processParamObjects
platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java
1164dae43c505f8a0233cc049b2689d6ca6d0c37
0
Analyze the following code function for security vulnerabilities
public static String generateAssertionID() { String encodedID = generateID(); if (encodedID == null) { return null; } String id = null; try { id = SystemConfigurationUtil.getServerID( SAMLServiceManager.getServerProtocol(), SAMLServiceManager.getServerHost(), Integer.parseInt(SAMLServiceManager.getServerPort()), SAMLServiceManager.getServerURI()); } catch (Exception ex) { if (SAMLUtils.debug.messageEnabled()) { SAMLUtils.debug.message("SAMLUtil:generateAssertionID: " + "exception obtain serverID:", ex); } } if (id == null) { return encodedID; } else { return (encodedID + id); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateAssertionID File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
generateAssertionID
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
private String getConnectingSsidInternal() { WifiConfiguration config = getConnectingWifiConfigurationInternal(); return config != null ? config.SSID : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectingSsidInternal File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getConnectingSsidInternal
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public boolean willActivityBeVisible(IBinder token) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); mRemote.transact(WILL_ACTIVITY_BE_VISIBLE_TRANSACTION, data, reply, 0); reply.readException(); boolean res = reply.readInt() != 0; data.recycle(); reply.recycle(); return res; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: willActivityBeVisible File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
willActivityBeVisible
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public Element createElement(String tagName) throws DOMException { return doc.createElement(tagName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createElement File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
createElement
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean isDaemon() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDaemon File: graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-863" ]
CVE-2024-24824
HIGH
8.8
Graylog2/graylog2-server
isDaemon
graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java
75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8
0
Analyze the following code function for security vulnerabilities
public String getClientSecret(String cId) { return clientSecretMap.get(cId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientSecret File: src/main/java/com/mxgraph/online/AbsAuthServlet.java Repository: jgraph/drawio The code follows secure coding practices.
[ "CWE-601", "CWE-918" ]
CVE-2022-1767
MEDIUM
5
jgraph/drawio
getClientSecret
src/main/java/com/mxgraph/online/AbsAuthServlet.java
c63f3a04450f30798df47f9badbc74eb8a69fbdf
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams text(CharSequence text) { this.text = text; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: text File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
text
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void removeStack(int stackId) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "removeStack()"); synchronized (this) { final long ident = Binder.clearCallingIdentity(); try { final ActivityStack stack = mStackSupervisor.getStack(stackId); if (stack == null) { Slog.w(TAG, "removeStack: No stack with id=" + stackId); return; } if (!stack.isActivityTypeStandardOrUndefined()) { throw new IllegalArgumentException( "Removing non-standard stack is not allowed."); } mStackSupervisor.removeStack(stack); } finally { Binder.restoreCallingIdentity(ident); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
removeStack
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public float getY() { return y; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getY File: svg-core/src/main/java/com/kitfox/svg/ImageSVG.java Repository: blackears/svgSalamander The code follows secure coding practices.
[ "CWE-918" ]
CVE-2017-5617
MEDIUM
5.8
blackears/svgSalamander
getY
svg-core/src/main/java/com/kitfox/svg/ImageSVG.java
826555b0a3229b6cf4671fe4de7aa51b5946b63d
0
Analyze the following code function for security vulnerabilities
private ServiceProvider removeUnsupportedTemplateConfigs(ServiceProvider serviceProvider) { ServiceProvider updatedSp = serviceProvider; if (updatedSp != null) { updatedSp.setApplicationName(null); updatedSp.setDescription(null); updatedSp.setApplicationID(0); updatedSp.setCertificateContent(null); updatedSp.setInboundAuthenticationConfig(null); } return updatedSp; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUnsupportedTemplateConfigs File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-identity-framework The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
removeUnsupportedTemplateConfigs
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
final void idleUids() { synchronized (this) { final long nowElapsed = SystemClock.elapsedRealtime(); final long maxBgTime = nowElapsed - BACKGROUND_SETTLE_TIME; long nextTime = 0; for (int i=mActiveUids.size()-1; i>=0; i--) { final UidRecord uidRec = mActiveUids.valueAt(i); final long bgTime = uidRec.lastBackgroundTime; if (bgTime > 0 && !uidRec.idle) { if (bgTime <= maxBgTime) { uidRec.idle = true; doStopUidLocked(uidRec.uid, uidRec); } else { if (nextTime == 0 || nextTime > bgTime) { nextTime = bgTime; } } } } if (nextTime > 0) { mHandler.removeMessages(IDLE_UIDS_MSG); mHandler.sendEmptyMessageDelayed(IDLE_UIDS_MSG, nextTime + BACKGROUND_SETTLE_TIME - nowElapsed); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: idleUids File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
idleUids
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public int getResponseCode(Object connection) throws IOException { // workaround for Android bug discussed here: http://stackoverflow.com/questions/17638398/androids-httpurlconnection-throws-eofexception-on-head-requests HttpURLConnection con = (HttpURLConnection) connection; if("head".equalsIgnoreCase(con.getRequestMethod())) { con.setDoOutput(false); con.setRequestProperty( "Accept-Encoding", "" ); } return ((HttpURLConnection) connection).getResponseCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResponseCode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getResponseCode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS) public void finalizeWorkProfileProvisioning( @NonNull UserHandle managedProfileUser, @Nullable Account migratedAccount) { Objects.requireNonNull(managedProfileUser, "managedProfileUser can't be null"); if (mService == null) { throw new IllegalStateException("Could not find DevicePolicyManagerService"); } try { mService.finalizeWorkProfileProvisioning(managedProfileUser, migratedAccount); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalizeWorkProfileProvisioning File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
finalizeWorkProfileProvisioning
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private ComponentDocumentTranslationBundle createComponentDocumentBundle(XWikiDocument document, ComponentDescriptor<TranslationBundle> descriptor) throws TranslationBundleDoesNotExistsException { ComponentDocumentTranslationBundle documentBundle; try { documentBundle = new ComponentDocumentTranslationBundle(ID_PREFIX, document.getDocumentReference(), this.componentManagerProvider.get(), this.translationParser, descriptor); } catch (ComponentLookupException e) { throw new TranslationBundleDoesNotExistsException("Failed to create document bundle", e); } return documentBundle; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createComponentDocumentBundle File: xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29510
HIGH
8.8
xwiki/xwiki-platform
createComponentDocumentBundle
xwiki-platform-core/xwiki-platform-localization/xwiki-platform-localization-sources/xwiki-platform-localization-source-wiki/src/main/java/org/xwiki/localization/wiki/internal/DocumentTranslationBundleFactory.java
d06ff8a58480abc7f63eb1d4b8b366024d990643
0
Analyze the following code function for security vulnerabilities
private String generateJmx(ApiScenarioWithBLOBs apiScenario) { HashTree jmeterHashTree = new ListedHashTree(); MsTestPlan testPlan = new MsTestPlan(); testPlan.setName(apiScenario.getName()); testPlan.setHashTree(new LinkedList<>()); ParameterConfig config = new ParameterConfig(); config.setOperating(true); try { MsScenario scenario = JSONObject.parseObject(apiScenario.getScenarioDefinition(), MsScenario.class); if (scenario == null) { return null; } GenerateHashTreeUtil.parse(apiScenario.getScenarioDefinition(), scenario); String environmentType = apiScenario.getEnvironmentType(); String environmentJson = apiScenario.getEnvironmentJson(); String environmentGroupId = apiScenario.getEnvironmentGroupId(); if (StringUtils.equals(environmentType, EnvironmentType.JSON.name()) && StringUtils.isNotBlank(environmentJson)) { scenario.setEnvironmentMap(JSON.parseObject(environmentJson, Map.class)); } else if (StringUtils.equals(environmentType, EnvironmentType.GROUP.name()) && StringUtils.isNotBlank(environmentGroupId)) { Map<String, String> envMap = environmentGroupProjectService.getEnvMap(environmentGroupId); scenario.setEnvironmentMap(envMap); } // 针对导入的jmx 处理 if (CollectionUtils.isNotEmpty(scenario.getHashTree()) && (scenario.getHashTree().get(0) instanceof MsJmeterElement)) { scenario.toHashTree(jmeterHashTree, scenario.getHashTree(), config); return scenario.getJmx(jmeterHashTree); } else { MsThreadGroup group = new MsThreadGroup(); group.setLabel(apiScenario.getName()); group.setName(apiScenario.getName()); group.setEnableCookieShare(scenario.isEnableCookieShare()); group.setOnSampleError(scenario.getOnSampleError()); group.setHashTree(new LinkedList<MsTestElement>() {{ this.add(scenario); }}); testPlan.getHashTree().add(group); } } catch (Exception ex) { ex.printStackTrace(); MSException.throwException(ex.getMessage()); } testPlan.toHashTree(jmeterHashTree, testPlan.getHashTree(), config); return testPlan.getJmx(jmeterHashTree); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateJmx File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
generateJmx
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
protected JsonObject inputToJsonObject(String input) { try (JsonReader jsonReader = jsonReaderFactory.createReader(new StringReader(input))) { return jsonReader.readObject(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: inputToJsonObject File: extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java Repository: quarkusio/quarkus The code follows secure coding practices.
[ "CWE-444" ]
CVE-2022-2466
CRITICAL
9.8
quarkusio/quarkus
inputToJsonObject
extensions/smallrye-graphql/runtime/src/main/java/io/quarkus/smallrye/graphql/runtime/SmallRyeGraphQLAbstractHandler.java
08e5c3106ce4bfb18b24a38514eeba6464668b07
0
Analyze the following code function for security vulnerabilities
@Override public void enableSystemApp(ComponentName who, String callerPackage, String packageName) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isProfileOwner(caller) || isDefaultDeviceOwner(caller))) || (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_ENABLE_SYSTEM_APP))); synchronized (getLockObject()) { final boolean isDemo = isCurrentUserDemo(); int userId = caller.getUserId(); long id = mInjector.binderClearCallingIdentity(); try { if (VERBOSE_LOG) { Slogf.v(LOG_TAG, "installing " + packageName + " for " + userId); } Preconditions.checkArgument(isDemo || isSystemApp(mIPackageManager, packageName, getProfileParentId(userId)), "Only system apps can be enabled this way"); // Install the app. mIPackageManager.installExistingPackageAsUser(packageName, userId, PackageManager.INSTALL_ALL_WHITELIST_RESTRICTED_PERMISSIONS, PackageManager.INSTALL_REASON_POLICY, null); if (isDemo) { // Ensure the app is also ENABLED for demo users. mIPackageManager.setApplicationEnabledSetting(packageName, PackageManager.COMPONENT_ENABLED_STATE_ENABLED, PackageManager.DONT_KILL_APP, userId, "DevicePolicyManager"); } } catch (RemoteException re) { // shouldn't happen Slogf.wtf(LOG_TAG, "Failed to install " + packageName, re); } finally { mInjector.binderRestoreCallingIdentity(id); } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.ENABLE_SYSTEM_APP) .setAdmin(caller.getPackageName()) .setBoolean(/* isDelegate */ who == null) .setStrings(packageName) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enableSystemApp File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
enableSystemApp
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void postUrlAsync(final AwContents awContents, final String url, byte[] postData) throws Exception { class PostUrl implements Runnable { byte[] mPostData; public PostUrl(byte[] postData) { mPostData = postData; } @Override public void run() { awContents.postUrl(url, mPostData); } } getInstrumentation().runOnMainSync(new PostUrl(postData)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postUrlAsync File: android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5155
MEDIUM
4.3
chromium
postUrlAsync
android_webview/javatests/src/org/chromium/android_webview/test/AwTestBase.java
b8dcfeb065bbfd777cdc5f5433da9a87f25e6ec6
0
Analyze the following code function for security vulnerabilities
public void setStatus(AppointmentRequestStatus status) { this.status = status; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStatus File: api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4727
MEDIUM
6.1
openmrs/openmrs-module-appointmentscheduling
setStatus
api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
2ccbe39c020809765de41eeb8ee4c70b5ec49cc8
0
Analyze the following code function for security vulnerabilities
public boolean shouldDumpMain() { return mDumpMain; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDumpMain File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
shouldDumpMain
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private boolean isResetPasswordTokenActiveForUserLocked(int userHandle) { DevicePolicyData policy = getUserData(userHandle); if (policy.mPasswordTokenHandle != 0) { return mInjector.binderWithCleanCallingIdentity(() -> mLockPatternUtils.isEscrowTokenActive(policy.mPasswordTokenHandle, userHandle)); } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isResetPasswordTokenActiveForUserLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isResetPasswordTokenActiveForUserLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected int readRaw(byte[] b) throws IOException { return zipEntryInputStream.readRawFully(b); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readRaw File: src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
readRaw
src/main/java/net/lingala/zip4j/io/inputstream/CipherInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
protected final boolean hasTheSessionSecurityTokenToBeRenewed(final HttpServletRequest request, final String function) { boolean hasToBeRenewed = SecuritySettings.isSessionTokenRenewEnabled(); if (hasToBeRenewed) { for (Pattern sessionSecurityTokenPattern : SESSION_SECURITY_GENERATION_FUNCTION_PATTERNS) { hasToBeRenewed = sessionSecurityTokenPattern.matcher(function).matches(); if (hasToBeRenewed) { break; } } } if (hasToBeRenewed) { final String referer = defaultStringIfNotDefined(request.getHeader("Referer"), ""); hasToBeRenewed = !request.getRequestURL().toString().equals(referer); } return hasToBeRenewed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasTheSessionSecurityTokenToBeRenewed File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
hasTheSessionSecurityTokenToBeRenewed
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public boolean getContentIntentAvailableOffline() { return (mFlags & FLAG_CONTENT_INTENT_AVAILABLE_OFFLINE) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentIntentAvailableOffline File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getContentIntentAvailableOffline
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public void setPackageDescription(String packageDescription) { this.packageDescription = packageDescription; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageDescription File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
setPackageDescription
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
@Override protected byte[] engineDoFinal(byte[] input, int inputOffset, int inputLen) throws IllegalBlockSizeException, BadPaddingException { final int maximumLen = getOutputSizeForFinal(inputLen); /* Assume that we'll output exactly on a byte boundary. */ final byte[] output = new byte[maximumLen]; int bytesWritten; if (inputLen > 0) { try { bytesWritten = updateInternal(input, inputOffset, inputLen, output, 0, maximumLen); } catch (ShortBufferException e) { /* This should not happen since we sized our own buffer. */ throw new RuntimeException("our calculated buffer was too small", e); } } else { bytesWritten = 0; } try { bytesWritten += doFinalInternal(output, bytesWritten, maximumLen - bytesWritten); } catch (ShortBufferException e) { /* This should not happen since we sized our own buffer. */ throw new RuntimeException("our calculated buffer was too small", e); } if (bytesWritten == output.length) { return output; } else if (bytesWritten == 0) { return EmptyArray.BYTE; } else { return Arrays.copyOfRange(output, 0, bytesWritten); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineDoFinal File: src/main/java/org/conscrypt/OpenSSLCipher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2461
HIGH
7.6
android
engineDoFinal
src/main/java/org/conscrypt/OpenSSLCipher.java
1638945d4ed9403790962ec7abed1b7a232a9ff8
0
Analyze the following code function for security vulnerabilities
private Uri getNotificationUriFor(int key, String name) { if (isConfigSettingsKey(key)) { return (name != null) ? Uri.withAppendedPath(DeviceConfig.CONTENT_URI, name) : DeviceConfig.CONTENT_URI; } else if (isGlobalSettingsKey(key)) { return (name != null) ? Uri.withAppendedPath(Settings.Global.CONTENT_URI, name) : Settings.Global.CONTENT_URI; } else if (isSecureSettingsKey(key)) { return (name != null) ? Uri.withAppendedPath(Settings.Secure.CONTENT_URI, name) : Settings.Secure.CONTENT_URI; } else if (isSystemSettingsKey(key)) { return (name != null) ? Uri.withAppendedPath(Settings.System.CONTENT_URI, name) : Settings.System.CONTENT_URI; } else { throw new IllegalArgumentException("Invalid settings key:" + key); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNotificationUriFor File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getNotificationUriFor
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public void setContentEncoding(String contentEncoding) { this.contentEncoding = contentEncoding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContentEncoding File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
setContentEncoding
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
public @Nullable String getNString(String columnName) throws SQLException { return getNString(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNString File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getNString
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public void setPackageAskScreenCompat(String packageName, boolean ask) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPackageAskScreenCompat File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
setPackageAskScreenCompat
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private int findNotificationRecordIndexLocked(NotificationRecord target) { return mRankingHelper.indexOf(mNotificationList, target); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findNotificationRecordIndexLocked File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
findNotificationRecordIndexLocked
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private boolean hasActiveInstrumentationLocked(int pid) { if (pid == 0) { return false; } synchronized (mPidsSelfLocked) { ProcessRecord process = mPidsSelfLocked.get(pid); return process != null && process.getActiveInstrumentation() != null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasActiveInstrumentationLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
hasActiveInstrumentationLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private void enforceModifyPermission(String message) { mContext.enforceCallingOrSelfPermission(MODIFY_PHONE_STATE, message); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceModifyPermission File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
enforceModifyPermission
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
@Override public MvcClass consumes(final List<MediaType> consumes) { this.consumes = consumes; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: consumes File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
consumes
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
private static String stringifyKBSize(long size) { return stringifySize(size * 1024, 1024); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stringifyKBSize File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stringifyKBSize
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void migrateLegacySettingsForUserLocked(DatabaseHelper dbHelper, SQLiteDatabase database, int userId) { // Move over the system settings. final int systemKey = makeKey(SETTINGS_TYPE_SYSTEM, userId); ensureSettingsStateLocked(systemKey); SettingsState systemSettings = mSettingsStates.get(systemKey); migrateLegacySettingsLocked(systemSettings, database, TABLE_SYSTEM); systemSettings.persistSyncLocked(); // Move over the secure settings. // Do this after System settings, since this is the first thing we check when deciding // to skip over migration from db to xml for a secondary user. final int secureKey = makeKey(SETTINGS_TYPE_SECURE, userId); ensureSettingsStateLocked(secureKey); SettingsState secureSettings = mSettingsStates.get(secureKey); migrateLegacySettingsLocked(secureSettings, database, TABLE_SECURE); ensureSecureSettingAndroidIdSetLocked(secureSettings); secureSettings.persistSyncLocked(); // Move over the global settings if owner. // Do this last, since this is the first thing we check when deciding // to skip over migration from db to xml for owner user. if (userId == UserHandle.USER_SYSTEM) { final int globalKey = makeKey(SETTINGS_TYPE_GLOBAL, userId); ensureSettingsStateLocked(globalKey); SettingsState globalSettings = mSettingsStates.get(globalKey); migrateLegacySettingsLocked(globalSettings, database, TABLE_GLOBAL); globalSettings.persistSyncLocked(); } // Drop the database as now all is moved and persisted. if (DROP_DATABASE_ON_MIGRATION) { dbHelper.dropDatabase(); } else { dbHelper.backupDatabase(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateLegacySettingsForUserLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
migrateLegacySettingsForUserLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent) { switch (intent.getAction()) { case ACTION_PROXY_NOTIFY_RECENTS_VISIBLITY_TO_OWNER: visibilityChanged(intent.getBooleanExtra(EXTRA_RECENTS_VISIBILITY, false)); break; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0813
MEDIUM
6.6
android
onReceive
packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
16a76dadcc23a13223e9c2216dad1fe5cad7d6e1
0
Analyze the following code function for security vulnerabilities
protected void setCertId(CertId certId) { this.certId = certId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCertId File: base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setCertId
base/common/src/main/java/com/netscape/certsrv/cert/CertRetrievalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder setShortcutId(String shortcutId) { mN.mShortcutId = shortcutId; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setShortcutId File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setShortcutId
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private void updateNotificationsOnDensityOrFontScaleChanged() { ArrayList<Entry> activeNotifications = mNotificationData.getActiveNotifications(); for (int i = 0; i < activeNotifications.size(); i++) { Entry entry = activeNotifications.get(i); boolean exposedGuts = mNotificationGutsExposed != null && entry.row.getGuts() == mNotificationGutsExposed; entry.row.onDensityOrFontScaleChanged(); if (exposedGuts) { mNotificationGutsExposed = entry.row.getGuts(); bindGuts(entry.row, mGutsMenuItem); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNotificationsOnDensityOrFontScaleChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateNotificationsOnDensityOrFontScaleChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void setMarshallerListener(Marshaller.Listener marshallerListener) { this.marshallerListener = marshallerListener; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMarshallerListener File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
setMarshallerListener
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
public Map<String, Authentication> getAuthentications() { return authentications; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthentications File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
getAuthentications
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void openNewTab(String url, String extraHeaders, byte[] postData, int disposition) { // This is only called in chrome layers. assert false; }
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2014-3159 - Severity: MEDIUM - CVSS Score: 6.4 Description: Use LoadURLWithParams in ChromeWebContentsDelegateAndroid Build a LoadURLParams object from the OpenURLParams and properly set all parameters on that object when calling into NavigationController. This makes sure we set the correct state for the load. BUG=352083 Review URL: https://codereview.chromium.org/267253007 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@273865 0039d316-1c4b-4281-b951-d872f2087c98 Function: openNewTab File: android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java Repository: chromium Fixed Code: @Override public void openNewTab(String url, String extraHeaders, byte[] postData, int disposition, boolean isRendererInitiated) { // This is only called in chrome layers. assert false; }
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
openNewTab
android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
98a50b76141f0b14f292f49ce376e6554142d5e2
1
Analyze the following code function for security vulnerabilities
public int getTimeout() { return mTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTimeout File: core/java/android/service/gatekeeper/GateKeeperResponse.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-0806
HIGH
9.3
android
getTimeout
core/java/android/service/gatekeeper/GateKeeperResponse.java
b87c968e5a41a1a09166199bf54eee12608f3900
0
Analyze the following code function for security vulnerabilities
@LogMessage(level = Level.WARN) @Message(id = 711, value = "Context activation pattern {0} ignored as it is overriden by the integrator.", format = Format.MESSAGE_FORMAT) void webXmlMappingPatternIgnored(String pattern);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: webXmlMappingPatternIgnored File: impl/src/main/java/org/jboss/weld/logging/ServletLogger.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
webXmlMappingPatternIgnored
impl/src/main/java/org/jboss/weld/logging/ServletLogger.java
8e413202fa1af08c09c580f444e4fd16874f9c65
0
Analyze the following code function for security vulnerabilities
public String getCharacterEncoding() { return characterEncoding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharacterEncoding File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
getCharacterEncoding
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Test public void getByIdConnectionFailure(TestContext context) throws Exception { postgresClientNonexistingTenant().getByIdAsString( FOO, randomUuid(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getByIdConnectionFailure File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
getByIdConnectionFailure
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public void activityResumed(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityResumed File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activityResumed
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public MediaPackage addPartialTrack(URI uri, MediaPackageElementFlavor flavor, long startTime, MediaPackage mediaPackage) throws IOException, IngestException { Job job = null; try { job = serviceRegistry.createJob( JOB_TYPE, INGEST_TRACK_FROM_URI, Arrays.asList(uri.toString(), flavor == null ? null : flavor.toString(), MediaPackageParser.getAsXml(mediaPackage)), null, false); job.setStatus(Status.RUNNING); job = serviceRegistry.updateJob(job); String elementId = UUID.randomUUID().toString(); logger.info("Start adding partial track {} from URL {} on mediapackage {}", elementId, uri, mediaPackage); URI newUrl = addContentToRepo(mediaPackage, elementId, uri); MediaPackage mp = addContentToMediaPackage(mediaPackage, elementId, newUrl, MediaPackageElement.Type.Track, flavor); job.setStatus(Job.Status.FINISHED); // store startTime partialTrackStartTimes.put(elementId, startTime); logger.debug("Added start time {} for track {}", startTime, elementId); logger.info("Successful added partial track {} on mediapackage {} at URL {}", elementId, mediaPackage, newUrl); return mp; } catch (ServiceRegistryException e) { throw new IngestException(e); } catch (NotFoundException e) { throw new IngestException("Unable to update ingest job", e); } finally { finallyUpdateJob(job); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addPartialTrack File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
addPartialTrack
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
public int createXObject(EntityReference classReference, XWikiContext context) throws XWikiException { DocumentReference absoluteClassReference = resolveClassReference(classReference); BaseObject object = BaseClass.newCustomClassInstance(absoluteClassReference, context); object.setOwnerDocument(this); object.setXClassReference(classReference); List<BaseObject> objects = this.xObjects.get(absoluteClassReference); if (objects == null) { objects = new ArrayList<BaseObject>(); this.xObjects.put(absoluteClassReference, objects); } objects.add(object); int nb = objects.size() - 1; object.setNumber(nb); setMetaDataDirty(true); return nb; }
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-26470 - Severity: HIGH - CVSS Score: 7.5 Description: XWIKI-19223: Improve xobject memory storage in XWikidocument Function: createXObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform Fixed Code: public int createXObject(EntityReference classReference, XWikiContext context) throws XWikiException { DocumentReference absoluteClassReference = resolveClassReference(classReference); BaseObject object = BaseClass.newCustomClassInstance(absoluteClassReference, context); object.setOwnerDocument(this); object.setXClassReference(classReference); BaseObjects objects = this.xObjects.get(absoluteClassReference); if (objects == null) { objects = new BaseObjects(); this.xObjects.put(absoluteClassReference, objects); } objects.add(object); int nb = objects.size() - 1; object.setNumber(nb); setMetaDataDirty(true); return nb; }
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
createXObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
1
Analyze the following code function for security vulnerabilities
protected void handleSerialization(Node node) { BeanDefinitionBuilder serializationConfigBuilder = createBeanBuilder(SerializationConfig.class); AbstractBeanDefinition beanDefinition = serializationConfigBuilder.getBeanDefinition(); fillAttributeValues(node, serializationConfigBuilder); for (Node child : childElements(node)) { String nodeName = cleanNodeName(child); if ("data-serializable-factories".equals(nodeName)) { handleDataSerializableFactories(child, serializationConfigBuilder); } else if ("portable-factories".equals(nodeName)) { handlePortableFactories(child, serializationConfigBuilder); } else if ("serializers".equals(nodeName)) { handleSerializers(child, serializationConfigBuilder); } } configBuilder.addPropertyValue("serializationConfig", beanDefinition); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2016-10750 - Severity: MEDIUM - CVSS Score: 6.8 Description: Add basic protection against untrusted deserialization. Function: handleSerialization File: hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java Repository: hazelcast Fixed Code: protected void handleSerialization(Node node) { BeanDefinitionBuilder serializationConfigBuilder = createBeanBuilder(SerializationConfig.class); AbstractBeanDefinition beanDefinition = serializationConfigBuilder.getBeanDefinition(); fillAttributeValues(node, serializationConfigBuilder); for (Node child : childElements(node)) { String nodeName = cleanNodeName(child); if ("data-serializable-factories".equals(nodeName)) { handleDataSerializableFactories(child, serializationConfigBuilder); } else if ("portable-factories".equals(nodeName)) { handlePortableFactories(child, serializationConfigBuilder); } else if ("serializers".equals(nodeName)) { handleSerializers(child, serializationConfigBuilder); } else if ("java-serialization-filter".equals(nodeName)) { handleJavaSerializationFilter(child, serializationConfigBuilder); } } configBuilder.addPropertyValue("serializationConfig", beanDefinition); }
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
handleSerialization
hazelcast-spring/src/main/java/com/hazelcast/spring/AbstractHazelcastBeanDefinitionParser.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
1
Analyze the following code function for security vulnerabilities
protected void save(List<Contentlet> contentlets) throws DotDataException, DotStateException, DotSecurityException { for(Contentlet con : contentlets) save(con); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
save
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Override public void stopAppSwitches() { mAmInternal.enforceCallingPermission(STOP_APP_SWITCHES, "stopAppSwitches"); synchronized (mGlobalLock) { mAppSwitchesState = APP_SWITCH_DISALLOW; mLastStopAppSwitchesTime = SystemClock.uptimeMillis(); mH.removeMessages(H.RESUME_FG_APP_SWITCH_MSG); mH.sendEmptyMessageDelayed(H.RESUME_FG_APP_SWITCH_MSG, RESUME_FG_APP_SWITCH_MS); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopAppSwitches File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
stopAppSwitches
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
private PostgresClient createFooBinary(TestContext context) { return createTable(context, TENANT, FOO, "id UUID PRIMARY KEY , jsonb TEXT NOT NULL"); // TEXT to store binary data }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createFooBinary File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
createFooBinary
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public Principal getLocalPrincipal() { Certificate[] local = localCerts; if (local == null || local.length == 0) { return null; } return ((java.security.cert.X509Certificate) local[0]).getIssuerX500Principal(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalPrincipal File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
getLocalPrincipal
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
@Override public void unregisterTaskStackListener(ITaskStackListener listener) { mActivityTaskManager.unregisterTaskStackListener(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterTaskStackListener File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
unregisterTaskStackListener
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
boolean isLastWindow(WindowState win) { return mChildren.size() == 1 && mChildren.get(0) == win; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isLastWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
isLastWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
void dumpFileMetadata(FileMetadata info) { if (DEBUG) { StringBuilder b = new StringBuilder(128); // mode string b.append((info.type == BackupAgent.TYPE_DIRECTORY) ? 'd' : '-'); b.append(((info.mode & 0400) != 0) ? 'r' : '-'); b.append(((info.mode & 0200) != 0) ? 'w' : '-'); b.append(((info.mode & 0100) != 0) ? 'x' : '-'); b.append(((info.mode & 0040) != 0) ? 'r' : '-'); b.append(((info.mode & 0020) != 0) ? 'w' : '-'); b.append(((info.mode & 0010) != 0) ? 'x' : '-'); b.append(((info.mode & 0004) != 0) ? 'r' : '-'); b.append(((info.mode & 0002) != 0) ? 'w' : '-'); b.append(((info.mode & 0001) != 0) ? 'x' : '-'); b.append(String.format(" %9d ", info.size)); Date stamp = new Date(info.mtime); b.append(new SimpleDateFormat("MMM dd HH:mm:ss ").format(stamp)); b.append(info.packageName); b.append(" :: "); b.append(info.domain); b.append(" :: "); b.append(info.path); Slog.i(TAG, b.toString()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpFileMetadata File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
dumpFileMetadata
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private static String[] getDefaultCipherSuites( boolean x509CipherSuitesNeeded, boolean pskCipherSuitesNeeded) { if (x509CipherSuitesNeeded) { // X.509 based cipher suites need to be listed. if (pskCipherSuitesNeeded) { // Both X.509 and PSK based cipher suites need to be listed. Because TLS-PSK is not // normally used, we assume that when PSK cipher suites are requested here they // should be preferred over other cipher suites. Thus, we give PSK cipher suites // higher priority than X.509 cipher suites. // NOTE: There are cipher suites that use both X.509 and PSK (e.g., those based on // RSA_PSK key exchange). However, these cipher suites are not currently supported. return concat( NativeCrypto.DEFAULT_PSK_CIPHER_SUITES, NativeCrypto.DEFAULT_X509_CIPHER_SUITES, new String[] {NativeCrypto.TLS_EMPTY_RENEGOTIATION_INFO_SCSV}); } else { // Only X.509 cipher suites need to be listed. return concat( NativeCrypto.DEFAULT_X509_CIPHER_SUITES, new String[] {NativeCrypto.TLS_EMPTY_RENEGOTIATION_INFO_SCSV}); } } else if (pskCipherSuitesNeeded) { // Only PSK cipher suites need to be listed. return concat( NativeCrypto.DEFAULT_PSK_CIPHER_SUITES, new String[] {NativeCrypto.TLS_EMPTY_RENEGOTIATION_INFO_SCSV}); } else { // Neither X.509 nor PSK cipher suites need to be listed. return new String[] {NativeCrypto.TLS_EMPTY_RENEGOTIATION_INFO_SCSV}; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultCipherSuites File: src/main/java/org/conscrypt/SSLParametersImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3840
HIGH
10
android
getDefaultCipherSuites
src/main/java/org/conscrypt/SSLParametersImpl.java
5af5e93463f4333187e7e35f3bd2b846654aa214
0
Analyze the following code function for security vulnerabilities
static void copyStream(InputStream is, OutputStream os) throws IOException { Utils.copyStream(is, os, -1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyStream File: 1.x/src/rogatkin/web/WarRoller.java Repository: drogatkin/TJWS2 The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-4594
CRITICAL
9.8
drogatkin/TJWS2
copyStream
1.x/src/rogatkin/web/WarRoller.java
1bac15c496ec54efe21ad7fab4e17633778582fc
0
Analyze the following code function for security vulnerabilities
public void checkDeletingDocument(DocumentReference userReference, XWikiDocument document, XWikiContext context) throws XWikiException { String currentWiki = null; currentWiki = context.getWikiId(); try { context.setWikiId(document.getDocumentReference().getWikiReference().getName()); XWikiDocument blankDoc = prepareDocumentDelete(document, context); ObservationManager om = getObservationManager(); // Inform notification mechanisms that a document is about to be deleted // Note that for the moment the event being send is a bridge event, as we are still passing around // an XWikiDocument as source and an XWikiContext as data. if (om != null) { CancelableEvent documentEvent = new UserDeletingDocumentEvent(userReference, document.getDocumentReference()); om.notify(documentEvent, blankDoc, context); // If the action has been canceled by the user then don't perform any deletion and throw an exception if (documentEvent.isCanceled()) { throw new XWikiException(XWikiException.MODULE_XWIKI_ACCESS, XWikiException.ERROR_XWIKI_ACCESS_DENIED, String.format("User [%s] has been denied the right to delete the document [%s]. Reason: [%s]", userReference, document.getDocumentReference(), documentEvent.getReason())); } } } finally { context.setWikiId(currentWiki); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkDeletingDocument File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
checkDeletingDocument
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public File getDownloadablePresentationFile(String meetingId, String presId, String presFilename) { log.info("Find downloadable presentation for meetingId={} presId={} filename={}", meetingId, presId, presFilename); File presDir = Util.getPresentationDir(presentationBaseDir, meetingId, presId); return new File(presDir.getAbsolutePath() + File.separatorChar + presFilename); }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-12443 - Severity: HIGH - CVSS Score: 7.5 Description: Return 404 error when the file download is not allowed. Function: getDownloadablePresentationFile File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java Repository: bigbluebutton Fixed Code: public File getDownloadablePresentationFile(String meetingId, String presId, String presFilename) { log.info("Find downloadable presentation for meetingId={} presId={} filename={}", meetingId, presId, presFilename); File presDir = Util.getPresentationDir(presentationBaseDir, meetingId, presId); // Build file to presFilename // Get canonicalPath and make sure it starts with // /var/bigbluebutton/<meetingid-pattern> // If so return file, if not return null File presFile = new File(presDir.getAbsolutePath() + File.separatorChar + presFilename); try { String presFileCanonical = presFile.getCanonicalPath(); log.debug("Requested presentation name file full path {}",presFileCanonical); if (presFileCanonical.startsWith(presentationBaseDir)) { return presFile; } } catch (IOException e) { log.error("Exception getting canonical path for {}.\n{}", presFilename, e); return null; } log.error("Cannot find file for {}.", presFilename); return null; }
[ "CWE-22" ]
CVE-2020-12443
HIGH
7.5
bigbluebutton
getDownloadablePresentationFile
bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
b21ca8355a57286a1e6df96984b3a4c57679a463
1
Analyze the following code function for security vulnerabilities
private Map getThisOptions(JSONObject task) { Map<String, String> optionMap = new HashMap<>(); task.getJSONObject("options").keySet().stream().forEach(k -> { optionMap.put(k, task.getJSONObject("options").getString(k)); }); return optionMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getThisOptions File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
getThisOptions
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
@Override public boolean playEffect(Vector3 position, int type, int data) { World world = getWorld(); final Effect effect = effects.get(type); if (effect == null) { return false; } world.playEffect(BukkitAdapter.adapt(world, position), effect, data); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: playEffect File: worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
playEffect
worldedit-bukkit/src/main/java/com/sk89q/worldedit/bukkit/BukkitWorld.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
@Override protected void completedAfter() { super.completedAfter(); GeneralEntityServiceContextHolder.isSkipSeriesValue(Boolean.TRUE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: completedAfter File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
completedAfter
src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
d0de4cc35303168f44ca57712c824b5cb9525e54
0
Analyze the following code function for security vulnerabilities
public void updateSQLXML(String columnName, @Nullable SQLXML xmlObject) throws SQLException { updateSQLXML(findColumn(columnName), xmlObject); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSQLXML File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateSQLXML
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public String optString(int index, String defaultValue) { Object o = opt(index); return o != null ? o.toString() : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optString File: src/main/java/org/codehaus/jettison/json/JSONArray.java Repository: jettison-json/jettison The code follows secure coding practices.
[ "CWE-674", "CWE-787" ]
CVE-2022-45693
HIGH
7.5
jettison-json/jettison
optString
src/main/java/org/codehaus/jettison/json/JSONArray.java
cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8
0
Analyze the following code function for security vulnerabilities
FrameType getFrameType() { return frameType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFrameType File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getFrameType
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return Objects.hash(key, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: src/main/java/com/gitblit/StoredUserConfig.java Repository: gitblit-org/gitblit The code follows secure coding practices.
[ "CWE-269" ]
CVE-2022-31267
HIGH
7.5
gitblit-org/gitblit
hashCode
src/main/java/com/gitblit/StoredUserConfig.java
9b4afad6f4be212474809533ec2c280cce86501a
0
Analyze the following code function for security vulnerabilities
private void onDocumentEvent(XWikiDocument document) { boolean remove = false; if (document.getObject(getExtensionClassName()) != null) { // new or already existing object if (document.getObject(getExtensionClassName(), USE_FIELDNAME, "always", false) != null) { if (Utils.getComponent(AuthorizationManager.class).hasAccess(Right.PROGRAM, document.getAuthorReference(), document.getDocumentReference())) { getAlwaysUsedExtensions().add(document.getDocumentReference()); return; } else { // in case the extension lost its programming rights upon this save. remove = true; } } else { // remove if exists but use onDemand remove = true; } } else if (document.getOriginalDocument().getObject(getExtensionClassName()) != null) { // object removed remove = true; } if (remove) { getAlwaysUsedExtensions().remove(document.getDocumentReference()); } }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29206 - Severity: MEDIUM - CVSS Score: 5.4 Description: XWIKI-9119: Refactoring of SkinExtensionPlugin * Provide some tests Function: onDocumentEvent File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java Repository: xwiki/xwiki-platform Fixed Code: private void onDocumentEvent(XWikiDocument document) { boolean remove = false; if (document.getObject(getExtensionClassName()) != null) { // new or already existing object if (document.getObject(getExtensionClassName(), USE_FIELDNAME, "always", false) != null) { if (getAuthorizationManager().hasAccess(Right.PROGRAM, document.getAuthorReference(), document.getDocumentReference())) { getAlwaysUsedExtensions().add(document.getDocumentReference()); return; } else { // in case the extension lost its programming rights upon this save. remove = true; } } else { // remove if exists but use onDemand remove = true; } } else if (document.getOriginalDocument().getObject(getExtensionClassName()) != null) { // object removed remove = true; } if (remove) { getAlwaysUsedExtensions().remove(document.getDocumentReference()); } }
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
onDocumentEvent
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
1
Analyze the following code function for security vulnerabilities
private final void processCurBroadcastLocked(BroadcastRecord r, ProcessRecord app) throws RemoteException { if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Process cur broadcast " + r + " for app " + app); if (app.thread == null) { throw new RemoteException(); } if (app.inFullBackup) { skipReceiverLocked(r); return; } r.receiver = app.thread.asBinder(); r.curApp = app; app.curReceiver = r; app.forceProcessStateUpTo(ActivityManager.PROCESS_STATE_RECEIVER); mService.updateLruProcessLocked(app, false, null); mService.updateOomAdjLocked(); // Tell the application to launch this receiver. r.intent.setComponent(r.curComponent); boolean started = false; try { if (DEBUG_BROADCAST_LIGHT) Slog.v(TAG_BROADCAST, "Delivering to component " + r.curComponent + ": " + r); mService.notifyPackageUse(r.intent.getComponent().getPackageName(), PackageManager.NOTIFY_PACKAGE_USE_BROADCAST_RECEIVER); app.thread.scheduleReceiver(new Intent(r.intent), r.curReceiver, mService.compatibilityInfoForPackageLocked(r.curReceiver.applicationInfo), r.resultCode, r.resultData, r.resultExtras, r.ordered, r.userId, app.repProcState); if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Process cur broadcast " + r + " DELIVERED for app " + app); started = true; } finally { if (!started) { if (DEBUG_BROADCAST) Slog.v(TAG_BROADCAST, "Process cur broadcast " + r + ": NOT STARTED!"); r.receiver = null; r.curApp = null; app.curReceiver = null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processCurBroadcastLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
processCurBroadcastLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public SQLType getType() { return this.type; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getType File: extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-41886
HIGH
7.5
OpenRefine
getType
extensions/database/src/com/google/refine/extension/database/mysql/MySQLConnectionManager.java
2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
0