instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public int getHelpResource() { return R.string.help_url_users; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHelpResource File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
getHelpResource
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
void sendDeviceOwnerOrProfileOwnerCommand(String action, Bundle extras, int userId) { if (userId == UserHandle.USER_ALL) { userId = UserHandle.USER_SYSTEM; } boolean inForeground = false; ComponentName receiverComponent = null; if (action.equals(DeviceAdminReceiver.AC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendDeviceOwnerOrProfileOwnerCommand File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
sendDeviceOwnerOrProfileOwnerCommand
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override boolean check(PNCounterConfig c1, PNCounterConfig c2) { if (c1 == c2) { return true; } if (c1 == null || c2 == null) { return false; } return nullSafeEqual(c1.getName(), c2.getName()) && c1....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: check File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
check
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public T addObject(K name, Object... values) { for (Object value: values) { addObject(name, value); } return thisT(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObject File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
addObject
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public ApplicationBasicInfo[] getApplicationBasicInfo(String tenantDomain, String username, String filter, int offset, int limit) throws IdentityApplicationManagementException { ApplicationBasicInfo[] applicationBasicInfoArray;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApplicationBasicInfo File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carbon-ide...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
getApplicationBasicInfo
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
@Test public void testDeserializationAsFloatEdgeCase06() throws Exception { // Into the positive zone where everything becomes zero. String input = "1e64"; Instant value = MAPPER.readValue(input, Instant.class); assertEquals(0, value.getEpochSecond()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testDeserializationAsFloatEdgeCase06 File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java Repository: FasterXML/jackson-modules-java8 The code follows secure coding practice...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
testDeserializationAsFloatEdgeCase06
datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
0
Analyze the following code function for security vulnerabilities
@NonNull public DevicePolicyResourcesManager getResources() { return mResourcesManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResources File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getResources
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void setMaxLines(int maxlines) { super.setMaxLines(maxlines); mCurrentMaxLines = maxlines; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMaxLines File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-1261
MEDIUM
5
chromium
setMaxLines
chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f
0
Analyze the following code function for security vulnerabilities
long getConstructor() { return constructor; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConstructor File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
getConstructor
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public TtyExecable<String, ExecWatch> redirectingErrorChannel() { return readingErrorChannel(new PipedInputStream()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: redirectingErrorChannel File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java Repository: fabric8io/kubernetes-client The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-20218
MEDIUM
5.8
fabric8io/kubernetes-client
redirectingErrorChannel
kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
325d67cc80b73f049a5d0cea4917c1f2709a8d86
0
Analyze the following code function for security vulnerabilities
public void draw(Canvas c) { draw(c, null, null, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: draw File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
draw
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
@Override public CustomResourceType getResourceType() { return CustomResourceType.XGBoost; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResourceType File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java Repository: apache/submarine The code follows secure codin...
[ "CWE-502" ]
CVE-2023-46302
CRITICAL
9.8
apache/submarine
getResourceType
submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
ed5ad3b824ba388259e0d1ea137d7fca5f0c288e
0
Analyze the following code function for security vulnerabilities
@Override public boolean process(byte value) throws Exception { validateHeaderNameElement(value); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: process File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
process
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
void noteUidProcessState(final int uid, final int state, final @ProcessCapability int capability) { mBatteryStatsService.noteUidProcessState(uid, state); mAppOpsService.updateUidProcState(uid, state, capability); if (mTrackingAssociations) { for (int i1=0, N1=mAssocia...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteUidProcessState File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
noteUidProcessState
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public int getDeviceOwnerUserId() { if (mService != null) { try { return mService.getDeviceOwnerUserId(); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } } return UserHandle.USER_NULL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDeviceOwnerUserId File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getDeviceOwnerUserId
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean getBoolean(K name, boolean defaultValue) { Boolean v = getBoolean(name); return v != null ? v : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBoolean File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
getBoolean
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override protected List<Contentlet> findContentletsByIdentifier(String identifier, Boolean live, Long languageId) throws DotDataException, DotStateException, DotSecurityException { List<Contentlet> cons = new ArrayList<Contentlet>(); StringBuilder queryBuffer = new StringBuilder(); queryBuffer.ap...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findContentletsByIdentifier File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
findContentletsByIdentifier
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Override public String marshal(DateTime v) throws Exception { if (v == null) { return null; } else { return v.toString(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: marshal File: src/main/java/de/rwth/idsg/ocpp/jaxb/JodaDateTimeConverter.java Repository: steve-community/ocpp-jaxb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-52096
HIGH
7.5
steve-community/ocpp-jaxb
marshal
src/main/java/de/rwth/idsg/ocpp/jaxb/JodaDateTimeConverter.java
13667036f7a30c5e7aca796ef6e2a3b0926c679a
0
Analyze the following code function for security vulnerabilities
@Override public void put(K key, V value, Long expiryInSeconds) { Jedis jedis = jedisPool.getResource(); if (null == expiryInSeconds) { jedis.set(getKey(key), valueSerializer.serialize(value)); } else { jedis.setex(getKey(key), expiryInSeconds, valueSerializer.seriali...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: put File: publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-46990
CRITICAL
9.8
sanluan/PublicCMS
put
publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java
c7bf58bf07fdc60a71134c6a73a4947c7709abf7
0
Analyze the following code function for security vulnerabilities
@Override public boolean onUnbind(Intent intent) { ((FileUploaderBinder) mBinder).clearListeners(); return false; // not accepting rebinding (default behaviour) }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUnbind File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
onUnbind
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
public XWikiRCSNodeInfo getRevisionInfo(String version, XWikiContext context) throws XWikiException { return getDocumentArchive(context).getNode(new Version(version)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRevisionInfo File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getRevisionInfo
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
void setIgnored() { mIgnored = true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIgnored File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
setIgnored
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
public void updateSQLXML(@Positive int columnIndex, @Nullable SQLXML xmlObject) throws SQLException { updateValue(columnIndex, xmlObject); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSQLXML File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateSQLXML
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public void flushRecentTasks() { mRecentTasks.flush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flushRecentTasks File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
flushRecentTasks
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public final void update() throws IOException, FileNotFoundException { m_writeLock.lock(); try { doUpdate(); } finally { m_writeLock.unlock(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
update
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
public String convertUsername(String username, XWikiContext context) { if (username == null) { return null; } if (getConvertingUserNameType(context).equals("1") && (username.indexOf('@') != -1)) { String id = "" + username.hashCode(); id = id.replace("-",...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertUsername File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
convertUsername
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public ServerBuilder withVirtualHost(Consumer<? super VirtualHostBuilder> customizer) { final VirtualHostBuilder virtualHostBuilder = new VirtualHostBuilder(this, false); customizer.accept(virtualHostBuilder); virtualHostBuilders.add(virtualHostBuilder); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withVirtualHost File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
withVirtualHost
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public synchronized void updateCharacterStream( String columnName, java.io.@Nullable Reader reader, int length) throws SQLException { updateCharacterStream(findColumn(columnName), reader, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateCharacterStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateCharacterStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
private void migrate3(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { String name = element.getName(); name = StringUtils.replace(name, "com.pmease.commons", "co...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate3 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate3
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public ComponentName startService(IApplicationThread caller, Intent service, String resolvedType, String callingPackage, int userId) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startService File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startService
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public boolean apply(XWikiDocument document, boolean clean) { boolean modified = false; // ///////////////////////////////// // Document if (!StringUtils.equals(getContent(), document.getContent())) { setContent(document.getContent()); modified = true; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: apply File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
apply
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public boolean isOemPaid() { return mIsOemPaid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOemPaid File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
isOemPaid
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public boolean unlockUser(int userId, byte[] token, byte[] secret, IProgressListener listener) { return mUserController.unlockUser(userId, token, secret, listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unlockUser File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
unlockUser
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public String link() { return "link"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: link File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21316
MEDIUM
4.3
94fzb/zrlog
link
web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
b921c1ae03b8290f438657803eee05226755c941
0
Analyze the following code function for security vulnerabilities
public static ObjectNode parse( final TomlFactory tomlFactory, final IOContext ioContext, final Reader reader ) throws IOException { final TomlFactory factory = tomlFactory == null ? new TomlFactory() : tomlFactory; Parser parser = new Parser(factory, ioContext, ...
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-3894 - Severity: HIGH - CVSS Score: 7.5 Description: validate nesting depth goes back tp zero Function: parse File: toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java Repository: FasterXML/jackson-dataformats-text Fixed Code: public stati...
[ "CWE-787" ]
CVE-2023-3894
HIGH
7.5
FasterXML/jackson-dataformats-text
parse
toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java
6f2f87f94d53fe440afd353b74c07ffa97d9888f
1
Analyze the following code function for security vulnerabilities
@Override public String getRemoteHost() { return connInfo.host; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRemoteHost File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
getRemoteHost
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
@GET @Path("query/distributions/{cohortId}/{sourceKey}") @Produces(MediaType.APPLICATION_JSON) public List<DistributionStat> getCohortFeatureDistributionStats( @PathParam("cohortId") final long cohortId, @PathParam("sourceKey") final String sourceKey, @QueryParam("searchTerm") final String searchTerm, @Query...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCohortFeatureDistributionStats File: src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java Repository: OHDSI/WebAPI The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15563
HIGH
7.5
OHDSI/WebAPI
getCohortFeatureDistributionStats
src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java
b3944074a1976c95d500239cbbf0741917ed75ca
0
Analyze the following code function for security vulnerabilities
public long getStartTime() { return _startTime; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStartTime File: framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java Repository: nuxeo/richfaces-3.3 The code follows secure coding practices.
[ "CWE-502" ]
CVE-2013-4521
HIGH
7.5
nuxeo/richfaces-3.3
getStartTime
framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java
6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec
0
Analyze the following code function for security vulnerabilities
protected int load(int offset) throws IOException { if (DEBUG_BUFFER) { debugBufferIfNeeded("(load: "); } // resize buffer, if needed if (offset == buffer.length) { int adjust = buffer.length / 4; char[] array = new char[bu...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: load File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
load
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
public static String generateSourceID(String siteURL) { if ((siteURL == null) || (siteURL.length() == 0)) { SAMLUtils.debug.error("SAMLUtils.genrateSourceID: empty siteURL."); return null; } MessageDigest md = null; try { md = MessageDigest.getInstance...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: generateSourceID File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
generateSourceID
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
@Override public KeyEvent dispatchUnhandledKey(WindowState win, KeyEvent event, int policyFlags) { // Note: This method is only called if the initial down was unhandled. if (DEBUG_INPUT) { Slog.d(TAG, "Unhandled key: win=" + win + ", action=" + event.getAction() + ", ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchUnhandledKey File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
dispatchUnhandledKey
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
public void clearLastSelectedNetwork() { if (mVerboseLoggingEnabled) { Log.v(TAG, "Clearing last selected network"); } mLastSelectedNetworkId = WifiConfiguration.INVALID_NETWORK_ID; mLastSelectedTimeStamp = NetworkSelectionStatus.INVALID_NETWORK_SELECTION_DISABLE_TIMESTAMP; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearLastSelectedNetwork File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
clearLastSelectedNetwork
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public void badRequest(final BadRequestException exception) { logWarn("Bad Request on " + request().getUri() + ": " + exception.getMessage()); if (this.api_version > 0) { // always default to the latest version of the error formatter since we // need to return something switch (thi...
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2023-36812 - Severity: CRITICAL - CVSS Score: 9.8 Description: Fix for #2269 and #2267 XSS vulnerability. Escaping the user supplied input when outputing the HTML for the old BadRequest HTML handlers should help. Thanks to the reporters. Fixes CVE-2018-13003. Fun...
[ "CWE-74" ]
CVE-2023-36812
CRITICAL
9.8
OpenTSDB/opentsdb
badRequest
src/tsd/HttpQuery.java
fa88d3e4b5369f9fb73da384fab0b23e246309ba
1
Analyze the following code function for security vulnerabilities
@Override public boolean getCrossProfileContactsSearchDisabled(ComponentName who) { if (!mHasFeature) { return false; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCrossProfileContactsSearchDisabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getCrossProfileContactsSearchDisabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mLock") private void dumpForUserLocked(int userId, PrintWriter pw) { if (userId == UserHandle.USER_SYSTEM) { pw.println("CONFIG SETTINGS (user " + userId + ")"); SettingsState configSettings = mSettingsRegistry.getSettingsLocked( SETTINGS_TYPE_CONFIG, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpForUserLocked File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
dumpForUserLocked
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
final void broadcastTimeoutLocked(boolean fromMsg) { if (fromMsg) { mPendingBroadcastTimeoutMessage = false; } if (mOrderedBroadcasts.size() == 0) { return; } long now = SystemClock.uptimeMillis(); BroadcastRecord r = mOrderedBroadcasts.get(0); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: broadcastTimeoutLocked File: services/core/java/com/android/server/am/BroadcastQueue.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
broadcastTimeoutLocked
services/core/java/com/android/server/am/BroadcastQueue.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
private URLConfiguration getURLConfiguration() { if (this.urlConfiguration == null) { this.urlConfiguration = Utils.getComponent(URLConfiguration.class); } return this.urlConfiguration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURLConfiguration File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getURLConfiguration
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void updateSplitLayout() { if (!mIsEmbeddingActivityEnabled) { return; } if (mIsTwoPane) { if (mIsRegularLayout == ActivityEmbeddingUtils.isRegularHomepageLayout(this)) { // Layout unchanged return; } } else if ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSplitLayout File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
updateSplitLayout
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
public Builder setRequestInitializer(HttpRequestInitializer requestInitializer) { this.requestInitializer = requestInitializer; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRequestInitializer File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
setRequestInitializer
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
void startRunningVoiceLocked(IVoiceInteractionSession session, int targetUid) { Slog.d(TAG, "<<< startRunningVoiceLocked()"); mVoiceWakeLock.setWorkSource(new WorkSource(targetUid)); if (mRunningVoice == null || mRunningVoice.asBinder() != session.asBinder()) { boolean wasRunningVoi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startRunningVoiceLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
startRunningVoiceLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public List<ValidationError> globalErrors() { return Collections.unmodifiableList( errors.stream().filter(error -> error.key().isEmpty()).collect(Collectors.toList())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: globalErrors File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
globalErrors
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
public void create(String tenantKey) { final StopWatch stopWatch = createStarted(); log.info("START - SETUP:CreateTenant:schema tenantKey: {}", tenantKey); try { DatabaseUtil.createSchema(dataSource, tenantKey); log.info("STOP - SETUP:CreateTenant:schema tenantKey: {}, r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantDatabaseService.java Repository: xm-online/xm-uaa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15557
HIGH
7.5
xm-online/xm-uaa
create
src/main/java/com/icthh/xm/uaa/service/tenant/TenantDatabaseService.java
ffa9609c809c17e7a39ae1d92843c4463e3ca739
0
Analyze the following code function for security vulnerabilities
public static boolean isConfigForOweNetwork(WifiConfiguration config) { return config.isSecurityType(WifiConfiguration.SECURITY_TYPE_OWE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConfigForOweNetwork File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
isConfigForOweNetwork
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
private void logAddAccountMetrics( String callerPackage, String accountType, String[] requiredFeatures, String authTokenType) { // Although this is not a 'device policy' API, enterprise is the current use case. DevicePolicyEventLogger .createEvent(DevicePolicyEnum...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logAddAccountMetrics File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
logAddAccountMetrics
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Override public void scanQRCode(ScanResult callback) { if (getActivity() == null) { return; } if (getActivity() instanceof CodenameOneActivity) { ((CodenameOneActivity) getActivity()).setIntentResultListener(this); } th...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanQRCode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
scanQRCode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated private void requestBugReportWithDescription(String shareTitle, String shareDescription, int bugreportType) { if (!TextUtils.isEmpty(shareTitle)) { if (shareTitle.length() > MAX_BUGREPORT_TITLE_SIZE) { String errorStr =...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReportWithDescription File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
requestBugReportWithDescription
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public long getMaxHttpUploadSize(Conversation conversation) { final XmppConnection connection = conversation.getAccount().getXmppConnection(); return connection == null ? -1 : connection.getFeatures().getMaxHttpUploadSize(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaxHttpUploadSize File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
getMaxHttpUploadSize
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
@Override public DOMConfiguration getDomConfig() { return doc.getDomConfig(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDomConfig File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
getDomConfig
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
void stopDtmfTone(Call call) { final String callId = mCallIdMapper.getCallId(call); if (callId != null && isServiceValid("stopDtmfTone")) { try { logOutgoing("stopDtmfTone %s", callId); mServiceInterface.stopDtmfTone(callId, Log.getExte...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopDtmfTone File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
stopDtmfTone
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private void load(Dependency dependency) throws LoadFailureException { try { classLoader.addURL(dragonfly.getDirectory().resolve(dependency.getFileName()).toUri().toURL()); } catch (MalformedURLException ex) { throw new LoadFailureException(ex); } }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-41967 - Severity: HIGH - CVSS Score: 7.5 Description: fix: CVE-2022-41967 Dragonfly v0.3.0-SNAPSHOT fails to properly configure the DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when parsing maven-metadata.xml files provided by externa...
[ "CWE-611" ]
CVE-2022-41967
HIGH
7.5
HyperaDev/Dragonfly
load
src/main/java/dev/hypera/dragonfly/loading/DependencyLoader.java
9661375e1135127ca6cdb5712e978bec33cc06b3
1
Analyze the following code function for security vulnerabilities
private void showSaverNotification() { final Notification.Builder nb = new Notification.Builder(mContext) .setSmallIcon(R.drawable.ic_power_saver) .setContentTitle(mContext.getString(R.string.battery_saver_notification_title)) .setContentText(mContext.getString(R....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showSaverNotification File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
showSaverNotification
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
void clearIntentFilterVerificationsLPw(String packageName, int userId) { if (userId == UserHandle.USER_ALL) { if (mSettings.removeIntentFilterVerificationLPw(packageName, sUserManager.getUserIds())) { for (int oneUserId : sUserManager.getUserIds()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearIntentFilterVerificationsLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
clearIntentFilterVerificationsLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public boolean isHasLanguages() { return recordLanguages != null && !recordLanguages.isEmpty(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isHasLanguages File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
isHasLanguages
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
@NonNull public String getAttributeName(int index) { final int id = nativeGetAttributeName(mParseState, index); if (DEBUG) System.out.println("getAttributeName of " + index + " = " + id); if (id == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null do...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeName File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeName
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@TestApi public boolean shouldShowForegroundImmediately() { // Has the app demanded immediate display? if (mFgsDeferBehavior == FOREGROUND_SERVICE_IMMEDIATE) { return true; } // Has the app demanded deferred display? if (mFgsDeferBehavior == FOREGROUND_SERVICE_DE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldShowForegroundImmediately File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
shouldShowForegroundImmediately
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
static void setPlotParams(final HttpQuery query, final Plot plot) { final HashMap<String, String> params = new HashMap<String, String>(); final Map<String, List<String>> querystring = query.getQueryString(); String value; if ((value = popParam(querystring, "yrange")) != null) { if (!RANGE_VALIDATO...
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2023-36812 - Severity: CRITICAL - CVSS Score: 9.8 Description: Improved fix for #2261. Regular expressions wouldn't catch the newlines or possibly other control characters. Now we'll use the TAG validation code to make sure the inputs are only plain ASCII printabl...
[ "CWE-74" ]
CVE-2023-36812
CRITICAL
9.8
OpenTSDB/opentsdb
setPlotParams
src/tsd/GraphHandler.java
07c4641471c6f5c2ab5aab615969e97211eb50d9
1
Analyze the following code function for security vulnerabilities
public void setCount(int count) { this.count = count; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCount File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
setCount
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
public String getGlobalExcludedRevprop() { return globalExcludedRevprop; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGlobalExcludedRevprop File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getGlobalExcludedRevprop
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public abstract String getUrl();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUrl File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
getUrl
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
@Override @PermissionCheckerManager.PermissionResult public int checkOp(int op, AttributionSourceState attributionSource, String message, boolean forDataDelivery, boolean startDataDelivery) { int result = checkOp(mContext, op, mPermissionManagerServiceInternal, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkOp File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
checkOp
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public StyleSheet getStyleSheet() { return style; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStyleSheet File: org/w3c/css/css/StyleSheetParser.java Repository: w3c/css-validator The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-4070
LOW
3.5
w3c/css-validator
getStyleSheet
org/w3c/css/css/StyleSheetParser.java
e5c09a9119167d3064db786d5f00d730b584a53b
0
Analyze the following code function for security vulnerabilities
protected void storeInRepository(String uuid, String svg, String transformto, String processid, Repository repository) { String assetFullName = ""; try { if(processid != null) { Asset<byte[]> processAsset = repository.loadAsset(uuid); String assetExt = ""; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: storeInRepository File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java Repository: kiegroup/jbpm-designer The code follows secure coding practices.
[ "CWE-611" ]
CVE-2017-7545
MEDIUM
4
kiegroup/jbpm-designer
storeInRepository
jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
a143f3b92a6a5a527d929d68c02a0c5d914ab81d
0
Analyze the following code function for security vulnerabilities
@Override public void addMediaErrorListener(ActionListener<MediaErrorEvent> l) { errorListeners.addListener(l); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addMediaErrorListener File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
addMediaErrorListener
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@NonNull public static SQLiteDatabase create(@Nullable CursorFactory factory) { // This is a magic string with special meaning for SQLite. return openDatabase(SQLiteDatabaseConfiguration.MEMORY_DB_PATH, factory, CREATE_IF_NECESSARY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
create
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
private Study getParentStudy(String studyOid) { Study study = studyDao.findByOcOID(studyOid); Study parentStudy = study.getStudy(); if (parentStudy != null && parentStudy.getStudyId() > 0) return parentStudy; else return study; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParentStudy File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
getParentStudy
web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
private void exposePlace(SysSite site, String templatePath, CmsPlaceMetadata metadata, Map<String, Object> model) { if (null != metadata.getSize() && 0 < metadata.getSize()) { Date now = CommonUtils.getMinuteDate(); PageHandler page = placeService.getPage(site.getId(), null, templatePath...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exposePlace File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-20914
CRITICAL
9.8
sanluan/PublicCMS
exposePlace
publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae
0
Analyze the following code function for security vulnerabilities
private void setSecurity() throws LaunchException { URL codebase = UrlUtils.guessCodeBase(file); this.security = securityDelegate.getClassLoaderSecurity(codebase); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSecurity File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
setSecurity
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
@Override public void setTransformIdentity(Object transform) { CN1Matrix4f m = (CN1Matrix4f)transform; m.setIdentity(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransformIdentity File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setTransformIdentity
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void setUserName(int userId, String name) { checkManageUsersPermission("rename users"); boolean changed = false; synchronized (mPackagesLock) { UserInfo info = mUsers.get(userId); if (info == null || info.partial) { Slog.w(LOG_TAG, "se...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserName File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
setUserName
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
@Override protected AbstractChainingPrintRenderer getSyntaxRenderer() { return new XHTMLChainingRenderer(this.linkRenderer, this.imageRenderer, getListenerChain()); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-32070 - Severity: MEDIUM - CVSS Score: 6.1 Description: XRENDERING-663: Restrict allowed attributes in HTML rendering * Change HTML renderers to only print allowed attributes and elements. * Add prefix to forbidden attributes to preserve them in XWiki syntax...
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
getSyntaxRenderer
xwiki-rendering-macros/xwiki-rendering-macro-html/src/main/java/org/xwiki/rendering/internal/macro/html/HTMLMacroXHTMLRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
1
Analyze the following code function for security vulnerabilities
private void createLoggingSocket() throws SSLException { if (debug_port == 0) { return; } try { ss_socket = new ServerSocket(debug_port); ss_socket.setReuseAddress(true); ss_socket.setReceiveBufferSize(BUFFER_SIZE); c_socket = new Soc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createLoggingSocket File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java Repository: dogtagpki/jss The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-4213
HIGH
7.5
dogtagpki/jss
createLoggingSocket
src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
5922560a78d0dee61af8a33cc9cfbf4cfa291448
0
Analyze the following code function for security vulnerabilities
protected abstract Assertion parseResponseFromServer(final String response) throws TicketValidationException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseResponseFromServer File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
parseResponseFromServer
cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
private void saveLocaleLocked(Locale l, boolean isDiff, boolean isPersist) { if(isDiff) { SystemProperties.set("user.language", l.getLanguage()); SystemProperties.set("user.region", l.getCountry()); } if(isPersist) { SystemProperties.set("persist.sys.languag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveLocaleLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
saveLocaleLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public static ClickHouseNode of(String uri, ClickHouseNode template) { return of(normalize(uri, template != null ? template.getProtocol() : null), template); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: of File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
of
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void saveBaseState() { try (ResilientAtomicFile file = getBaseStateFile()) { if (DEBUG || DEBUG_REBOOT) { Slog.d(TAG, "Saving to " + file.getBaseFile()); } FileOutputStream outs = null; try { synchronized (mL...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveBaseState File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
saveBaseState
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public void onChange(boolean selfChange, Uri uri) { update(uri); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onChange File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
onChange
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@HiddenApiEnforcementPolicy int getPolicyForPrePApps() { return mPolicyPreP; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPolicyForPrePApps File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getPolicyForPrePApps
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@GuardedBy({"mPm.mLock", "mPm.mInstallLock"}) void installSystemStubPackages(@NonNull List<String> systemStubPackageNames, @PackageManagerService.ScanFlags int scanFlags) { for (int i = systemStubPackageNames.size() - 1; i >= 0; --i) { final String packageName = systemStubPackageName...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installSystemStubPackages File: services/core/java/com/android/server/pm/InstallPackageHelper.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21257
HIGH
7.8
android
installSystemStubPackages
services/core/java/com/android/server/pm/InstallPackageHelper.java
1aec7feaf07e6d4568ca75d18158445dbeac10f6
0
Analyze the following code function for security vulnerabilities
public String getProjectId() { return projectId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProjectId File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getProjectId
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public String getLocalUserName(String user) { try { return this.xwiki.getUserName(user.substring(user.indexOf(":") + 1), null, getXWikiContext()); } catch (Exception e) { return this.xwiki.getUserName(user, null, getXWikiContext()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLocalUserName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getLocalUserName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public boolean fileNameExists(Host host, Folder folder, String fileName, String identifier, long languageId) throws DotDataException{ if( !UtilMethods.isSet(fileName) ){ return true; } if( folder == null || host == null ) { return false; } boolean exist = false; Identifier folderId = APILocator.ge...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fileNameExists File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
fileNameExists
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
@Override public void run() { dataSource = helperObject.getDataSource(); cBean = helperObject.getcBean(); reportLog = helperObject.getReportLog(); stBean = helperObject.getStBean(); resterms = helperObject.getResterms(); userAccountBean = helperObject.getUserAccountBe...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
run
web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
private Cursor queryCleared(Uri uri, String[] projection, String selection, String[] selectionArgs, String sort) { final long token = Binder.clearCallingIdentity(); try { return query(uri, projection, selection, selectionArgs, sort); } finally { Binder.restore...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: queryCleared File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
queryCleared
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
protected final JsonToken _decodeFieldName() throws IOException { if (_inputPtr >= _inputEnd) { loadMoreGuaranteed(); } final int ch = _inputBuffer[_inputPtr++]; final int type = ((ch >> 5) & 0x7); // Expecting a String, but may need to allow other types too...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _decodeFieldName File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_decodeFieldName
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public void resumeAppSwitches() { if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES) != PackageManager.PERMISSION_GRANTED) { throw new SecurityException("Requires permission " + android.Manifest.permission.STOP_APP_SWITCHES); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resumeAppSwitches File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
resumeAppSwitches
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Deprecated public void setCrossProfileCallerIdDisabled(@NonNull ComponentName admin, boolean disabled) { throwIfParentInstance("setCrossProfileCallerIdDisabled"); if (mService != null) { try { mService.setCrossProfileCallerIdDisabled(admin, disabled); } catch...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCrossProfileCallerIdDisabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setCrossProfileCallerIdDisabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private static final void checkManageUsersPermission(String message) { final int uid = Binder.getCallingUid(); if (uid != Process.SYSTEM_UID && uid != 0 && ActivityManager.checkComponentPermission( android.Manifest.permission.MANAGE_USERS, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkManageUsersPermission File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
checkManageUsersPermission
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public Form<T> bind( Lang lang, TypedMap attrs, Map<String, String> data, String... allowedFields) { return bind(lang, attrs, data, Collections.emptyMap(), allowedFields); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bind File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
bind
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
private void migratePermittedInputMethodsPolicyLocked() { Binder.withCleanCallingIdentity(() -> { List<UserInfo> users = mUserManager.getUsers(); for (UserInfo userInfo : users) { ActiveAdmin admin = getProfileOwnerOrDeviceOwnerLocked(userInfo.id); if (adm...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migratePermittedInputMethodsPolicyLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
migratePermittedInputMethodsPolicyLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public @UserIdInt int getLastResumedActivityUserId() { mAmInternal.enforceCallingPermission( Manifest.permission.INTERACT_ACROSS_USERS_FULL, "getLastResumedActivityUserId()"); synchronized (mGlobalLock) { if (mLastResumedActivity == null) { r...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLastResumedActivityUserId File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getLastResumedActivityUserId
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0