instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public int getHelpResource() {
return R.string.help_url_users;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getHelpResource
File: src/com/android/settings/users/UserSettings.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3889 | HIGH | 7.2 | android | getHelpResource | src/com/android/settings/users/UserSettings.java | bd5d5176c74021e8cf4970f93f273ba3023c3d72 | 0 |
Analyze the following code function for security vulnerabilities | void sendDeviceOwnerOrProfileOwnerCommand(String action, Bundle extras, int userId) {
if (userId == UserHandle.USER_ALL) {
userId = UserHandle.USER_SYSTEM;
}
boolean inForeground = false;
ComponentName receiverComponent = null;
if (action.equals(DeviceAdminReceiver.AC... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendDeviceOwnerOrProfileOwnerCommand
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | sendDeviceOwnerOrProfileOwnerCommand | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean check(PNCounterConfig c1, PNCounterConfig c2) {
if (c1 == c2) {
return true;
}
if (c1 == null || c2 == null) {
return false;
}
return nullSafeEqual(c1.getName(), c2.getName())
&& c1.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: check
File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | check | hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public T addObject(K name, Object... values) {
for (Object value: values) {
addObject(name, value);
}
return thisT();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addObject
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | addObject | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public ApplicationBasicInfo[] getApplicationBasicInfo(String tenantDomain, String username, String filter,
int offset, int limit)
throws IdentityApplicationManagementException {
ApplicationBasicInfo[] applicationBasicInfoArray;... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getApplicationBasicInfo
File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
Repository: wso2/carbon-ide... | [
"CWE-611"
] | CVE-2021-42646 | MEDIUM | 6.4 | wso2/carbon-identity-framework | getApplicationBasicInfo | components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java | e9119883ee02a884f3c76c7bbc4022a4f4c58fc0 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationAsFloatEdgeCase06() throws Exception
{
// Into the positive zone where everything becomes zero.
String input = "1e64";
Instant value = MAPPER.readValue(input, Instant.class);
assertEquals(0, value.getEpochSecond());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: testDeserializationAsFloatEdgeCase06
File: datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java
Repository: FasterXML/jackson-modules-java8
The code follows secure coding practice... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationAsFloatEdgeCase06 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public DevicePolicyResourcesManager getResources() {
return mResourcesManager;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResources
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getResources | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setMaxLines(int maxlines) {
super.setMaxLines(maxlines);
mCurrentMaxLines = maxlines;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setMaxLines
File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2015-1261 | MEDIUM | 5 | chromium | setMaxLines | chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java | 5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f | 0 |
Analyze the following code function for security vulnerabilities | long getConstructor() {
return constructor;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConstructor
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | getConstructor | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public TtyExecable<String, ExecWatch> redirectingErrorChannel() {
return readingErrorChannel(new PipedInputStream());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: redirectingErrorChannel
File: kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java
Repository: fabric8io/kubernetes-client
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-20218 | MEDIUM | 5.8 | fabric8io/kubernetes-client | redirectingErrorChannel | kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java | 325d67cc80b73f049a5d0cea4917c1f2709a8d86 | 0 |
Analyze the following code function for security vulnerabilities | public void draw(Canvas c) {
draw(c, null, null, 0);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: draw
File: core/java/android/text/Layout.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2018-9452 | MEDIUM | 4.3 | android | draw | core/java/android/text/Layout.java | 3b6f84b77c30ec0bab5147b0cffc192c86ba2634 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public CustomResourceType getResourceType() {
return CustomResourceType.XGBoost;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResourceType
File: submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java
Repository: apache/submarine
The code follows secure codin... | [
"CWE-502"
] | CVE-2023-46302 | CRITICAL | 9.8 | apache/submarine | getResourceType | submarine-server/server-submitter/submitter-k8s/src/main/java/org/apache/submarine/server/submitter/k8s/model/xgboostjob/XGBoostJob.java | ed5ad3b824ba388259e0d1ea137d7fca5f0c288e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean process(byte value) throws Exception {
validateHeaderNameElement(value);
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: process
File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-444"
] | CVE-2021-43797 | MEDIUM | 4.3 | netty | process | codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java | 07aa6b5938a8b6ed7a6586e066400e2643897323 | 0 |
Analyze the following code function for security vulnerabilities | void noteUidProcessState(final int uid, final int state,
final @ProcessCapability int capability) {
mBatteryStatsService.noteUidProcessState(uid, state);
mAppOpsService.updateUidProcState(uid, state, capability);
if (mTrackingAssociations) {
for (int i1=0, N1=mAssocia... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noteUidProcessState
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | noteUidProcessState | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public int getDeviceOwnerUserId() {
if (mService != null) {
try {
return mService.getDeviceOwnerUserId();
} catch (RemoteException re) {
throw re.rethrowFromSystemServer();
}
}
return UserHandle.USER_NULL;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDeviceOwnerUserId
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getDeviceOwnerUserId | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getBoolean(K name, boolean defaultValue) {
Boolean v = getBoolean(name);
return v != null ? v : defaultValue;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBoolean
File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
Repository: netty
The code follows secure coding practices. | [
"CWE-436",
"CWE-113"
] | CVE-2022-41915 | MEDIUM | 6.5 | netty | getBoolean | codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java | fe18adff1c2b333acb135ab779a3b9ba3295a1c4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected List<Contentlet> findContentletsByIdentifier(String identifier, Boolean live, Long languageId) throws DotDataException, DotStateException, DotSecurityException {
List<Contentlet> cons = new ArrayList<Contentlet>();
StringBuilder queryBuffer = new StringBuilder();
queryBuffer.ap... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findContentletsByIdentifier
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | findContentletsByIdentifier | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String marshal(DateTime v) throws Exception {
if (v == null) {
return null;
} else {
return v.toString();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: marshal
File: src/main/java/de/rwth/idsg/ocpp/jaxb/JodaDateTimeConverter.java
Repository: steve-community/ocpp-jaxb
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2023-52096 | HIGH | 7.5 | steve-community/ocpp-jaxb | marshal | src/main/java/de/rwth/idsg/ocpp/jaxb/JodaDateTimeConverter.java | 13667036f7a30c5e7aca796ef6e2a3b0926c679a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void put(K key, V value, Long expiryInSeconds) {
Jedis jedis = jedisPool.getResource();
if (null == expiryInSeconds) {
jedis.set(getKey(key), valueSerializer.serialize(value));
} else {
jedis.setex(getKey(key), expiryInSeconds, valueSerializer.seriali... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: put
File: publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2023-46990 | CRITICAL | 9.8 | sanluan/PublicCMS | put | publiccms-parent/publiccms-cache/src/main/java/com/publiccms/common/redis/RedisCacheEntity.java | c7bf58bf07fdc60a71134c6a73a4947c7709abf7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean onUnbind(Intent intent) {
((FileUploaderBinder) mBinder).clearListeners();
return false; // not accepting rebinding (default behaviour)
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUnbind
File: src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2022-24886 | LOW | 2.1 | nextcloud/android | onUnbind | src/main/java/com/owncloud/android/files/services/FileUploader.java | c01fa0b17050cdcf77a468cc22f4071eae29d464 | 0 |
Analyze the following code function for security vulnerabilities | public XWikiRCSNodeInfo getRevisionInfo(String version, XWikiContext context) throws XWikiException
{
return getDocumentArchive(context).getNode(new Version(version));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRevisionInfo
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | getRevisionInfo | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | void setIgnored() {
mIgnored = true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setIgnored
File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | setIgnored | src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java | 41d882324288085fd32ae0bb70dc85f5fd0e2be7 | 0 |
Analyze the following code function for security vulnerabilities | public void updateSQLXML(@Positive int columnIndex, @Nullable SQLXML xmlObject) throws SQLException {
updateValue(columnIndex, xmlObject);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSQLXML
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateSQLXML | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void flushRecentTasks() {
mRecentTasks.flush();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: flushRecentTasks
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | flushRecentTasks | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | public final void update() throws IOException, FileNotFoundException {
m_writeLock.lock();
try {
doUpdate();
} finally {
m_writeLock.unlock();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: update
File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2021-25931 | MEDIUM | 6.8 | OpenNMS/opennms | update | opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java | 607151ea8f90212a3fb37c977fa57c7d58d26a84 | 0 |
Analyze the following code function for security vulnerabilities | public String convertUsername(String username, XWikiContext context)
{
if (username == null) {
return null;
}
if (getConvertingUserNameType(context).equals("1") && (username.indexOf('@') != -1)) {
String id = "" + username.hashCode();
id = id.replace("-",... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertUsername
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | convertUsername | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | public ServerBuilder withVirtualHost(Consumer<? super VirtualHostBuilder> customizer) {
final VirtualHostBuilder virtualHostBuilder = new VirtualHostBuilder(this, false);
customizer.accept(virtualHostBuilder);
virtualHostBuilders.add(virtualHostBuilder);
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: withVirtualHost
File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
Repository: line/armeria
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | line/armeria | withVirtualHost | core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java | df7f85824a62e997b910b5d6194a3335841065fd | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void updateCharacterStream(
String columnName, java.io.@Nullable Reader reader,
int length) throws SQLException {
updateCharacterStream(findColumn(columnName), reader, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateCharacterStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateCharacterStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | private void migrate3(File dataDir, Stack<Integer> versions) {
for (File file: dataDir.listFiles()) {
VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file);
for (Element element: dom.getRootElement().elements()) {
String name = element.getName();
name = StringUtils.replace(name, "com.pmease.commons", "co... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migrate3
File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
Repository: theonedev/onedev
The code follows secure coding practices. | [
"CWE-338"
] | CVE-2023-24828 | HIGH | 8.8 | theonedev/onedev | migrate3 | server-core/src/main/java/io/onedev/server/migration/DataMigrator.java | d67dd9686897fe5e4ab881d749464aa7c06a68e5 | 0 |
Analyze the following code function for security vulnerabilities | public ComponentName startService(IApplicationThread caller, Intent service,
String resolvedType, String callingPackage, int userId) throws RemoteException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startService
File: core/java/android/app/IActivityManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | startService | core/java/android/app/IActivityManager.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | public boolean apply(XWikiDocument document, boolean clean)
{
boolean modified = false;
// /////////////////////////////////
// Document
if (!StringUtils.equals(getContent(), document.getContent())) {
setContent(document.getContent());
modified = true;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: apply
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | apply | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isOemPaid() {
return mIsOemPaid;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isOemPaid
File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | isOemPaid | framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean unlockUser(int userId, byte[] token, byte[] secret, IProgressListener listener) {
return mUserController.unlockUser(userId, token, secret, listener);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: unlockUser
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | unlockUser | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String link() {
return "link";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: link
File: web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java
Repository: 94fzb/zrlog
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21316 | MEDIUM | 4.3 | 94fzb/zrlog | link | web/src/main/java/com/zrlog/web/controller/blog/ArticleController.java | b921c1ae03b8290f438657803eee05226755c941 | 0 |
Analyze the following code function for security vulnerabilities | public static ObjectNode parse(
final TomlFactory tomlFactory,
final IOContext ioContext,
final Reader reader
) throws IOException {
final TomlFactory factory = tomlFactory == null ? new TomlFactory() : tomlFactory;
Parser parser = new Parser(factory, ioContext,
... | Vulnerability Classification:
- CWE: CWE-787
- CVE: CVE-2023-3894
- Severity: HIGH
- CVSS Score: 7.5
Description: validate nesting depth goes back tp zero
Function: parse
File: toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java
Repository: FasterXML/jackson-dataformats-text
Fixed Code:
public stati... | [
"CWE-787"
] | CVE-2023-3894 | HIGH | 7.5 | FasterXML/jackson-dataformats-text | parse | toml/src/main/java/com/fasterxml/jackson/dataformat/toml/Parser.java | 6f2f87f94d53fe440afd353b74c07ffa97d9888f | 1 |
Analyze the following code function for security vulnerabilities | @Override
public String getRemoteHost() {
return connInfo.host;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRemoteHost
File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java
Repository: hierynomus/sshj
The code follows secure coding practices. | [
"CWE-354"
] | CVE-2023-48795 | MEDIUM | 5.9 | hierynomus/sshj | getRemoteHost | src/main/java/net/schmizz/sshj/transport/TransportImpl.java | 94fcc960e0fb198ddec0f7efc53f95ac627fe083 | 0 |
Analyze the following code function for security vulnerabilities | @GET
@Path("query/distributions/{cohortId}/{sourceKey}")
@Produces(MediaType.APPLICATION_JSON)
public List<DistributionStat> getCohortFeatureDistributionStats(
@PathParam("cohortId") final long cohortId,
@PathParam("sourceKey") final String sourceKey,
@QueryParam("searchTerm") final String searchTerm,
@Query... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCohortFeatureDistributionStats
File: src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java
Repository: OHDSI/WebAPI
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15563 | HIGH | 7.5 | OHDSI/WebAPI | getCohortFeatureDistributionStats | src/main/java/org/ohdsi/webapi/service/FeatureExtractionService.java | b3944074a1976c95d500239cbbf0741917ed75ca | 0 |
Analyze the following code function for security vulnerabilities | public long getStartTime() {
return _startTime;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStartTime
File: framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java
Repository: nuxeo/richfaces-3.3
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2013-4521 | HIGH | 7.5 | nuxeo/richfaces-3.3 | getStartTime | framework/impl/src/main/java/org/ajax4jsf/resource/ResourceBuilderImpl.java | 6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec | 0 |
Analyze the following code function for security vulnerabilities | protected int load(int offset) throws IOException {
if (DEBUG_BUFFER) {
debugBufferIfNeeded("(load: ");
}
// resize buffer, if needed
if (offset == buffer.length) {
int adjust = buffer.length / 4;
char[] array = new char[bu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: load
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | load | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | public static String generateSourceID(String siteURL) {
if ((siteURL == null) || (siteURL.length() == 0)) {
SAMLUtils.debug.error("SAMLUtils.genrateSourceID: empty siteURL.");
return null;
}
MessageDigest md = null;
try {
md = MessageDigest.getInstance... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generateSourceID
File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
Repository: OpenIdentityPlatform/OpenAM
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2023-37471 | CRITICAL | 9.8 | OpenIdentityPlatform/OpenAM | generateSourceID | openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java | 7c18543d126e8a567b83bb4535631825aaa9d742 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public KeyEvent dispatchUnhandledKey(WindowState win, KeyEvent event, int policyFlags) {
// Note: This method is only called if the initial down was unhandled.
if (DEBUG_INPUT) {
Slog.d(TAG, "Unhandled key: win=" + win + ", action=" + event.getAction()
+ ", ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchUnhandledKey
File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0812 | MEDIUM | 6.6 | android | dispatchUnhandledKey | policy/src/com/android/internal/policy/impl/PhoneWindowManager.java | 84669ca8de55d38073a0dcb01074233b0a417541 | 0 |
Analyze the following code function for security vulnerabilities | public void clearLastSelectedNetwork() {
if (mVerboseLoggingEnabled) {
Log.v(TAG, "Clearing last selected network");
}
mLastSelectedNetworkId = WifiConfiguration.INVALID_NETWORK_ID;
mLastSelectedTimeStamp = NetworkSelectionStatus.INVALID_NETWORK_SELECTION_DISABLE_TIMESTAMP;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearLastSelectedNetwork
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | clearLastSelectedNetwork | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void badRequest(final BadRequestException exception) {
logWarn("Bad Request on " + request().getUri() + ": " + exception.getMessage());
if (this.api_version > 0) {
// always default to the latest version of the error formatter since we
// need to return something
switch (thi... | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2023-36812
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Fix for #2269 and #2267 XSS vulnerability.
Escaping the user supplied input when outputing the HTML for the old BadRequest
HTML handlers should help. Thanks to the reporters.
Fixes CVE-2018-13003.
Fun... | [
"CWE-74"
] | CVE-2023-36812 | CRITICAL | 9.8 | OpenTSDB/opentsdb | badRequest | src/tsd/HttpQuery.java | fa88d3e4b5369f9fb73da384fab0b23e246309ba | 1 |
Analyze the following code function for security vulnerabilities | @Override
public boolean getCrossProfileContactsSearchDisabled(ComponentName who) {
if (!mHasFeature) {
return false;
}
Objects.requireNonNull(who, "ComponentName is null");
final CallerIdentity caller = getCallerIdentity(who);
Preconditions.checkCallAuthorization... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCrossProfileContactsSearchDisabled
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | getCrossProfileContactsSearchDisabled | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("mLock")
private void dumpForUserLocked(int userId, PrintWriter pw) {
if (userId == UserHandle.USER_SYSTEM) {
pw.println("CONFIG SETTINGS (user " + userId + ")");
SettingsState configSettings = mSettingsRegistry.getSettingsLocked(
SETTINGS_TYPE_CONFIG, ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpForUserLocked
File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | dumpForUserLocked | packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java | ff86ff28cf82124f8e65833a2dd8c319aea08945 | 0 |
Analyze the following code function for security vulnerabilities | final void broadcastTimeoutLocked(boolean fromMsg) {
if (fromMsg) {
mPendingBroadcastTimeoutMessage = false;
}
if (mOrderedBroadcasts.size() == 0) {
return;
}
long now = SystemClock.uptimeMillis();
BroadcastRecord r = mOrderedBroadcasts.get(0);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: broadcastTimeoutLocked
File: services/core/java/com/android/server/am/BroadcastQueue.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | broadcastTimeoutLocked | services/core/java/com/android/server/am/BroadcastQueue.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | private URLConfiguration getURLConfiguration()
{
if (this.urlConfiguration == null) {
this.urlConfiguration = Utils.getComponent(URLConfiguration.class);
}
return this.urlConfiguration;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getURLConfiguration
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getURLConfiguration | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | private void updateSplitLayout() {
if (!mIsEmbeddingActivityEnabled) {
return;
}
if (mIsTwoPane) {
if (mIsRegularLayout == ActivityEmbeddingUtils.isRegularHomepageLayout(this)) {
// Layout unchanged
return;
}
} else if ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSplitLayout
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | updateSplitLayout | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | public Builder setRequestInitializer(HttpRequestInitializer requestInitializer) {
this.requestInitializer = requestInitializer;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRequestInitializer
File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
Repository: googleapis/google-oauth-java-client
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2020-7692 | MEDIUM | 6.4 | googleapis/google-oauth-java-client | setRequestInitializer | google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java | 13433cd7dd06267fc261f0b1d4764f8e3432c824 | 0 |
Analyze the following code function for security vulnerabilities | void startRunningVoiceLocked(IVoiceInteractionSession session, int targetUid) {
Slog.d(TAG, "<<< startRunningVoiceLocked()");
mVoiceWakeLock.setWorkSource(new WorkSource(targetUid));
if (mRunningVoice == null || mRunningVoice.asBinder() != session.asBinder()) {
boolean wasRunningVoi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startRunningVoiceLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | startRunningVoiceLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public List<ValidationError> globalErrors() {
return Collections.unmodifiableList(
errors.stream().filter(error -> error.key().isEmpty()).collect(Collectors.toList()));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: globalErrors
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | globalErrors | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | public void create(String tenantKey) {
final StopWatch stopWatch = createStarted();
log.info("START - SETUP:CreateTenant:schema tenantKey: {}", tenantKey);
try {
DatabaseUtil.createSchema(dataSource, tenantKey);
log.info("STOP - SETUP:CreateTenant:schema tenantKey: {}, r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantDatabaseService.java
Repository: xm-online/xm-uaa
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2019-15557 | HIGH | 7.5 | xm-online/xm-uaa | create | src/main/java/com/icthh/xm/uaa/service/tenant/TenantDatabaseService.java | ffa9609c809c17e7a39ae1d92843c4463e3ca739 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isConfigForOweNetwork(WifiConfiguration config) {
return config.isSecurityType(WifiConfiguration.SECURITY_TYPE_OWE);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isConfigForOweNetwork
File: service/java/com/android/server/wifi/WifiConfigurationUtil.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21252 | MEDIUM | 5.5 | android | isConfigForOweNetwork | service/java/com/android/server/wifi/WifiConfigurationUtil.java | 50b08ee30e04d185e5ae97a5f717d436fd5a90f3 | 0 |
Analyze the following code function for security vulnerabilities | private void logAddAccountMetrics(
String callerPackage, String accountType, String[] requiredFeatures,
String authTokenType) {
// Although this is not a 'device policy' API, enterprise is the current use case.
DevicePolicyEventLogger
.createEvent(DevicePolicyEnum... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logAddAccountMetrics
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | logAddAccountMetrics | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void scanQRCode(ScanResult callback) {
if (getActivity() == null) {
return;
}
if (getActivity() instanceof CodenameOneActivity) {
((CodenameOneActivity) getActivity()).setIntentResultListener(this);
}
th... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanQRCode
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | scanQRCode | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
private void requestBugReportWithDescription(String shareTitle, String shareDescription,
int bugreportType) {
if (!TextUtils.isEmpty(shareTitle)) {
if (shareTitle.length() > MAX_BUGREPORT_TITLE_SIZE) {
String errorStr =... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestBugReportWithDescription
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | requestBugReportWithDescription | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public long getMaxHttpUploadSize(Conversation conversation) {
final XmppConnection connection = conversation.getAccount().getXmppConnection();
return connection == null ? -1 : connection.getFeatures().getMaxHttpUploadSize();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxHttpUploadSize
File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
Repository: iNPUTmice/Conversations
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2018-18467 | MEDIUM | 5 | iNPUTmice/Conversations | getMaxHttpUploadSize | src/main/java/eu/siacs/conversations/ui/ConversationFragment.java | 7177c523a1b31988666b9337249a4f1d0c36f479 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public DOMConfiguration getDomConfig() {
return doc.getDomConfig();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDomConfig
File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
Repository: LoboEvolution
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000540 | MEDIUM | 6.8 | LoboEvolution | getDomConfig | HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java | 9b75694cedfa4825d4a2330abf2719d470c654cd | 0 |
Analyze the following code function for security vulnerabilities | void stopDtmfTone(Call call) {
final String callId = mCallIdMapper.getCallId(call);
if (callId != null && isServiceValid("stopDtmfTone")) {
try {
logOutgoing("stopDtmfTone %s", callId);
mServiceInterface.stopDtmfTone(callId,
Log.getExte... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: stopDtmfTone
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | stopDtmfTone | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | private void load(Dependency dependency) throws LoadFailureException {
try {
classLoader.addURL(dragonfly.getDirectory().resolve(dependency.getFileName()).toUri().toURL());
} catch (MalformedURLException ex) {
throw new LoadFailureException(ex);
}
} | Vulnerability Classification:
- CWE: CWE-611
- CVE: CVE-2022-41967
- Severity: HIGH
- CVSS Score: 7.5
Description: fix: CVE-2022-41967
Dragonfly v0.3.0-SNAPSHOT fails to properly configure the
DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when
parsing maven-metadata.xml files provided by externa... | [
"CWE-611"
] | CVE-2022-41967 | HIGH | 7.5 | HyperaDev/Dragonfly | load | src/main/java/dev/hypera/dragonfly/loading/DependencyLoader.java | 9661375e1135127ca6cdb5712e978bec33cc06b3 | 1 |
Analyze the following code function for security vulnerabilities | private void showSaverNotification() {
final Notification.Builder nb = new Notification.Builder(mContext)
.setSmallIcon(R.drawable.ic_power_saver)
.setContentTitle(mContext.getString(R.string.battery_saver_notification_title))
.setContentText(mContext.getString(R.... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showSaverNotification
File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3854 | MEDIUM | 5 | android | showSaverNotification | packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java | 05e0705177d2078fa9f940ce6df723312cfab976 | 0 |
Analyze the following code function for security vulnerabilities | void clearIntentFilterVerificationsLPw(String packageName, int userId) {
if (userId == UserHandle.USER_ALL) {
if (mSettings.removeIntentFilterVerificationLPw(packageName,
sUserManager.getUserIds())) {
for (int oneUserId : sUserManager.getUserIds()) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearIntentFilterVerificationsLPw
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | clearIntentFilterVerificationsLPw | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isHasLanguages() {
return recordLanguages != null && !recordLanguages.isEmpty();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isHasLanguages
File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
Repository: intranda/goobi-viewer-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-29014 | MEDIUM | 6.1 | intranda/goobi-viewer-core | isHasLanguages | goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java | c29efe60e745a94d03debc17681c4950f3917455 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public String getAttributeName(int index) {
final int id = nativeGetAttributeName(mParseState, index);
if (DEBUG) System.out.println("getAttributeName of " + index + " = " + id);
if (id == ERROR_NULL_DOCUMENT) {
throw new NullPointerException("Null do... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAttributeName
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getAttributeName | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public boolean shouldShowForegroundImmediately() {
// Has the app demanded immediate display?
if (mFgsDeferBehavior == FOREGROUND_SERVICE_IMMEDIATE) {
return true;
}
// Has the app demanded deferred display?
if (mFgsDeferBehavior == FOREGROUND_SERVICE_DE... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: shouldShowForegroundImmediately
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | shouldShowForegroundImmediately | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | static void setPlotParams(final HttpQuery query, final Plot plot) {
final HashMap<String, String> params = new HashMap<String, String>();
final Map<String, List<String>> querystring = query.getQueryString();
String value;
if ((value = popParam(querystring, "yrange")) != null) {
if (!RANGE_VALIDATO... | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2023-36812
- Severity: CRITICAL
- CVSS Score: 9.8
Description: Improved fix for #2261.
Regular expressions wouldn't catch the newlines or possibly other
control characters. Now we'll use the TAG validation code to make
sure the inputs are only plain ASCII printabl... | [
"CWE-74"
] | CVE-2023-36812 | CRITICAL | 9.8 | OpenTSDB/opentsdb | setPlotParams | src/tsd/GraphHandler.java | 07c4641471c6f5c2ab5aab615969e97211eb50d9 | 1 |
Analyze the following code function for security vulnerabilities | public void setCount(int count) {
this.count = count;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCount
File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | setCount | src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | public String getGlobalExcludedRevprop() {
return globalExcludedRevprop;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGlobalExcludedRevprop
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | getGlobalExcludedRevprop | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | public abstract String getUrl(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUrl
File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | getUrl | config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | @Override
@PermissionCheckerManager.PermissionResult
public int checkOp(int op, AttributionSourceState attributionSource,
String message, boolean forDataDelivery, boolean startDataDelivery) {
int result = checkOp(mContext, op, mPermissionManagerServiceInternal,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkOp
File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | checkOp | services/core/java/com/android/server/pm/permission/PermissionManagerService.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | public StyleSheet getStyleSheet() {
return style;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getStyleSheet
File: org/w3c/css/css/StyleSheetParser.java
Repository: w3c/css-validator
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-4070 | LOW | 3.5 | w3c/css-validator | getStyleSheet | org/w3c/css/css/StyleSheetParser.java | e5c09a9119167d3064db786d5f00d730b584a53b | 0 |
Analyze the following code function for security vulnerabilities | protected void storeInRepository(String uuid, String svg, String transformto, String processid, Repository repository) {
String assetFullName = "";
try {
if(processid != null) {
Asset<byte[]> processAsset = repository.loadAsset(uuid);
String assetExt = "";
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: storeInRepository
File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
Repository: kiegroup/jbpm-designer
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2017-7545 | MEDIUM | 4 | kiegroup/jbpm-designer | storeInRepository | jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java | a143f3b92a6a5a527d929d68c02a0c5d914ab81d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void addMediaErrorListener(ActionListener<MediaErrorEvent> l) {
errorListeners.addListener(l);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addMediaErrorListener
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | addMediaErrorListener | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public static SQLiteDatabase create(@Nullable CursorFactory factory) {
// This is a magic string with special meaning for SQLite.
return openDatabase(SQLiteDatabaseConfiguration.MEMORY_DB_PATH,
factory, CREATE_IF_NECESSARY);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: create
File: core/java/android/database/sqlite/SQLiteDatabase.java
Repository: android
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2018-9493 | LOW | 2.1 | android | create | core/java/android/database/sqlite/SQLiteDatabase.java | ebc250d16c747f4161167b5ff58b3aea88b37acf | 0 |
Analyze the following code function for security vulnerabilities | private Study getParentStudy(String studyOid) {
Study study = studyDao.findByOcOID(studyOid);
Study parentStudy = study.getStudy();
if (parentStudy != null && parentStudy.getStudyId() > 0)
return parentStudy;
else
return study;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getParentStudy
File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | getParentStudy | web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | private void exposePlace(SysSite site, String templatePath, CmsPlaceMetadata metadata, Map<String, Object> model) {
if (null != metadata.getSize() && 0 < metadata.getSize()) {
Date now = CommonUtils.getMinuteDate();
PageHandler page = placeService.getPage(site.getId(), null, templatePath... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exposePlace
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2020-20914 | CRITICAL | 9.8 | sanluan/PublicCMS | exposePlace | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/component/template/TemplateComponent.java | bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae | 0 |
Analyze the following code function for security vulnerabilities | private void setSecurity() throws LaunchException {
URL codebase = UrlUtils.guessCodeBase(file);
this.security = securityDelegate.getClassLoaderSecurity(codebase);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSecurity
File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
Repository: AdoptOpenJDK/IcedTea-Web
The code follows secure coding practices. | [
"CWE-345",
"CWE-94",
"CWE-22"
] | CVE-2019-10182 | MEDIUM | 5.8 | AdoptOpenJDK/IcedTea-Web | setSecurity | core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | e0818f521a0711aeec4b913b49b5fc6a52815662 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setTransformIdentity(Object transform) {
CN1Matrix4f m = (CN1Matrix4f)transform;
m.setIdentity();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setTransformIdentity
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | setTransformIdentity | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUserName(int userId, String name) {
checkManageUsersPermission("rename users");
boolean changed = false;
synchronized (mPackagesLock) {
UserInfo info = mUsers.get(userId);
if (info == null || info.partial) {
Slog.w(LOG_TAG, "se... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUserName
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | setUserName | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected AbstractChainingPrintRenderer getSyntaxRenderer()
{
return new XHTMLChainingRenderer(this.linkRenderer, this.imageRenderer, getListenerChain());
} | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-32070
- Severity: MEDIUM
- CVSS Score: 6.1
Description: XRENDERING-663: Restrict allowed attributes in HTML rendering
* Change HTML renderers to only print allowed attributes and elements.
* Add prefix to forbidden attributes to preserve them in XWiki syntax... | [
"CWE-79"
] | CVE-2023-32070 | MEDIUM | 6.1 | xwiki/xwiki-rendering | getSyntaxRenderer | xwiki-rendering-macros/xwiki-rendering-macro-html/src/main/java/org/xwiki/rendering/internal/macro/html/HTMLMacroXHTMLRenderer.java | c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1 | 1 |
Analyze the following code function for security vulnerabilities | private void createLoggingSocket() throws SSLException {
if (debug_port == 0) {
return;
}
try {
ss_socket = new ServerSocket(debug_port);
ss_socket.setReuseAddress(true);
ss_socket.setReceiveBufferSize(BUFFER_SIZE);
c_socket = new Soc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createLoggingSocket
File: src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java
Repository: dogtagpki/jss
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-4213 | HIGH | 7.5 | dogtagpki/jss | createLoggingSocket | src/main/java/org/mozilla/jss/ssl/javax/JSSEngineReferenceImpl.java | 5922560a78d0dee61af8a33cc9cfbf4cfa291448 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract Assertion parseResponseFromServer(final String response) throws TicketValidationException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseResponseFromServer
File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
Repository: apereo/java-cas-client
The code follows secure coding practices. | [
"CWE-74"
] | CVE-2014-4172 | HIGH | 7.5 | apereo/java-cas-client | parseResponseFromServer | cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java | ae37092100c8eaec610dab6d83e5e05a8ee58814 | 0 |
Analyze the following code function for security vulnerabilities | private void saveLocaleLocked(Locale l, boolean isDiff, boolean isPersist) {
if(isDiff) {
SystemProperties.set("user.language", l.getLanguage());
SystemProperties.set("user.region", l.getCountry());
}
if(isPersist) {
SystemProperties.set("persist.sys.languag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveLocaleLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | saveLocaleLocked | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public static ClickHouseNode of(String uri, ClickHouseNode template) {
return of(normalize(uri, template != null ? template.getProtocol() : null), template);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: of
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | of | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | @VisibleForTesting
void saveBaseState() {
try (ResilientAtomicFile file = getBaseStateFile()) {
if (DEBUG || DEBUG_REBOOT) {
Slog.d(TAG, "Saving to " + file.getBaseFile());
}
FileOutputStream outs = null;
try {
synchronized (mL... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveBaseState
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | saveBaseState | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override public void onChange(boolean selfChange, Uri uri) {
update(uri);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onChange
File: services/core/java/com/android/server/notification/NotificationManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3884 | MEDIUM | 4.3 | android | onChange | services/core/java/com/android/server/notification/NotificationManagerService.java | 61e9103b5725965568e46657f4781dd8f2e5b623 | 0 |
Analyze the following code function for security vulnerabilities | @HiddenApiEnforcementPolicy int getPolicyForPrePApps() {
return mPolicyPreP;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPolicyForPrePApps
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getPolicyForPrePApps | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy({"mPm.mLock", "mPm.mInstallLock"})
void installSystemStubPackages(@NonNull List<String> systemStubPackageNames,
@PackageManagerService.ScanFlags int scanFlags) {
for (int i = systemStubPackageNames.size() - 1; i >= 0; --i) {
final String packageName = systemStubPackageName... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: installSystemStubPackages
File: services/core/java/com/android/server/pm/InstallPackageHelper.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21257 | HIGH | 7.8 | android | installSystemStubPackages | services/core/java/com/android/server/pm/InstallPackageHelper.java | 1aec7feaf07e6d4568ca75d18158445dbeac10f6 | 0 |
Analyze the following code function for security vulnerabilities | public String getProjectId() {
return projectId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getProjectId
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getProjectId | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public String getLocalUserName(String user)
{
try {
return this.xwiki.getUserName(user.substring(user.indexOf(":") + 1), null, getXWikiContext());
} catch (Exception e) {
return this.xwiki.getUserName(user, null, getXWikiContext());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLocalUserName
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | getLocalUserName | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | public boolean fileNameExists(Host host, Folder folder, String fileName, String identifier, long languageId) throws DotDataException{
if( !UtilMethods.isSet(fileName) ){
return true;
}
if( folder == null || host == null ) {
return false;
}
boolean exist = false;
Identifier folderId = APILocator.ge... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fileNameExists
File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-434"
] | CVE-2017-11466 | HIGH | 9 | dotCMS/core | fileNameExists | dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java | ab2bb2e00b841d131b8734227f9106e3ac31bb99 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void run() {
dataSource = helperObject.getDataSource();
cBean = helperObject.getcBean();
reportLog = helperObject.getReportLog();
stBean = helperObject.getStBean();
resterms = helperObject.getResterms();
userAccountBean = helperObject.getUserAccountBe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: run
File: web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-24830 | HIGH | 7.5 | OpenClinica | run | web/src/main/java/org/akaza/openclinica/controller/BatchCRFMigrationController.java | 6f864e86543f903bd20d6f9fc7056115106441f3 | 0 |
Analyze the following code function for security vulnerabilities | private Cursor queryCleared(Uri uri, String[] projection, String selection,
String[] selectionArgs, String sort) {
final long token = Binder.clearCallingIdentity();
try {
return query(uri, projection, selection, selectionArgs, sort);
} finally {
Binder.restore... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: queryCleared
File: src/com/android/providers/downloads/DownloadProvider.java
Repository: android
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-0848 | HIGH | 7.2 | android | queryCleared | src/com/android/providers/downloads/DownloadProvider.java | bdc831357e7a116bc561d51bf2ddc85ff11c01a9 | 0 |
Analyze the following code function for security vulnerabilities | protected final JsonToken _decodeFieldName() throws IOException
{
if (_inputPtr >= _inputEnd) {
loadMoreGuaranteed();
}
final int ch = _inputBuffer[_inputPtr++];
final int type = ((ch >> 5) & 0x7);
// Expecting a String, but may need to allow other types too... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _decodeFieldName
File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
Repository: FasterXML/jackson-dataformats-binary
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-28491 | MEDIUM | 5 | FasterXML/jackson-dataformats-binary | _decodeFieldName | cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java | de072d314af8f5f269c8abec6930652af67bc8e6 | 0 |
Analyze the following code function for security vulnerabilities | public void resumeAppSwitches() {
if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES)
!= PackageManager.PERMISSION_GRANTED) {
throw new SecurityException("Requires permission "
+ android.Manifest.permission.STOP_APP_SWITCHES);
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resumeAppSwitches
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-2500 | MEDIUM | 4.3 | android | resumeAppSwitches | services/core/java/com/android/server/am/ActivityManagerService.java | 9878bb99b77c3681f0fda116e2964bac26f349c3 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void setCrossProfileCallerIdDisabled(@NonNull ComponentName admin, boolean disabled) {
throwIfParentInstance("setCrossProfileCallerIdDisabled");
if (mService != null) {
try {
mService.setCrossProfileCallerIdDisabled(admin, disabled);
} catch... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setCrossProfileCallerIdDisabled
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setCrossProfileCallerIdDisabled | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | private static final void checkManageUsersPermission(String message) {
final int uid = Binder.getCallingUid();
if (uid != Process.SYSTEM_UID && uid != 0
&& ActivityManager.checkComponentPermission(
android.Manifest.permission.MANAGE_USERS,
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkManageUsersPermission
File: services/core/java/com/android/server/pm/UserManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2457 | LOW | 2.1 | android | checkManageUsersPermission | services/core/java/com/android/server/pm/UserManagerService.java | 12332e05f632794e18ea8c4ac52c98e82532e5db | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("unchecked")
public Form<T> bind(
Lang lang, TypedMap attrs, Map<String, String> data, String... allowedFields) {
return bind(lang, attrs, data, Collections.emptyMap(), allowedFields);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: bind
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | bind | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | private void migratePermittedInputMethodsPolicyLocked() {
Binder.withCleanCallingIdentity(() -> {
List<UserInfo> users = mUserManager.getUsers();
for (UserInfo userInfo : users) {
ActiveAdmin admin = getProfileOwnerOrDeviceOwnerLocked(userInfo.id);
if (adm... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: migratePermittedInputMethodsPolicyLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | migratePermittedInputMethodsPolicyLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public @UserIdInt
int getLastResumedActivityUserId() {
mAmInternal.enforceCallingPermission(
Manifest.permission.INTERACT_ACROSS_USERS_FULL, "getLastResumedActivityUserId()");
synchronized (mGlobalLock) {
if (mLastResumedActivity == null) {
r... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getLastResumedActivityUserId
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | getLastResumedActivityUserId | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.