instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static CmsDialog initCmsDialog(PageContext context, HttpServletRequest req, HttpServletResponse res) { CmsDialog wp = (CmsDialog)req.getAttribute(CmsWorkplace.SESSION_WORKPLACE_CLASS); if (wp == null) { // ensure that we don't get null pointers if the page is directly called wp = new CmsDialog(new CmsJspActionElement(context, req, res)); wp.fillParamValues(req); } return wp; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initCmsDialog File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
initCmsDialog
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void switchKeyboardLayout(int deviceId, int direction) { mInputManager.switchKeyboardLayout(deviceId, direction); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: switchKeyboardLayout File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
switchKeyboardLayout
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override protected String process(Job job) throws Exception { Operation op = null; String operation = job.getOperation(); List<String> arguments = job.getArguments(); try { op = Operation.valueOf(operation); switch (op) { case Add: MediaPackage mediaPackage = MediaPackageParser.getFromXml(arguments.get(0)); addSynchronously(mediaPackage); return null; case Delete: String mediapackageId = arguments.get(0); boolean deleted = deleteSynchronously(mediapackageId); return Boolean.toString(deleted); default: throw new IllegalStateException("Don't know how to handle operation '" + operation + "'"); } } catch (IllegalArgumentException e) { throw new ServiceRegistryException("This service can't handle operations of type '" + op + "'", e); } catch (IndexOutOfBoundsException e) { throw new ServiceRegistryException("This argument list for operation '" + op + "' does not meet expectations", e); } catch (Exception e) { throw new ServiceRegistryException("Error handling operation '" + op + "'", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: process File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
process
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
public void setClusterRole(String clusterRole) { this.clusterRole = clusterRole; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClusterRole File: server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-610" ]
CVE-2022-39206
CRITICAL
9.9
theonedev/onedev
setClusterRole
server-plugin/server-plugin-executor-kubernetes/src/main/java/io/onedev/server/plugin/executor/kubernetes/KubernetesExecutor.java
0052047a5b5095ac6a6b4a73a522d0272fec3a22
0
Analyze the following code function for security vulnerabilities
private byte getCompactType(byte ttype) { return ttypeToCompactType[ttype]; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCompactType File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
getCompactType
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(android.Manifest.permission.MANAGE_DEVICE_POLICY_APP_EXEMPTIONS) public void setApplicationExemptions(@NonNull String packageName, @NonNull @ApplicationExemptionConstants Set<Integer> exemptions) throws NameNotFoundException { throwIfParentInstance("setApplicationExemptions"); if (mService != null) { try { mService.setApplicationExemptions(mContext.getPackageName(), packageName, ArrayUtils.convertToIntArray(new ArraySet<>(exemptions))); } catch (ServiceSpecificException e) { switch (e.errorCode) { case ERROR_PACKAGE_NAME_NOT_FOUND: throw new NameNotFoundException(e.getMessage()); default: throw new RuntimeException( "Unknown error setting application exemptions: " + e.errorCode, e); } } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApplicationExemptions File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setApplicationExemptions
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private void setContentType(HttpServletResponse pResp, String pContentType) { boolean encodingDone = false; try { pResp.setCharacterEncoding("utf-8"); pResp.setContentType(pContentType); encodingDone = true; } catch (NoSuchMethodError error) { /* Servlet 2.3 */ } catch (UnsupportedOperationException error) { /* Equinox HTTP Service */ } if (!encodingDone) { // For a Servlet 2.3 container or an Equinox HTTP Service, set the charset by hand pResp.setContentType(pContentType + "; charset=utf-8"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setContentType File: agent/core/src/main/java/org/jolokia/http/AgentServlet.java Repository: jolokia The code follows secure coding practices.
[ "CWE-352" ]
CVE-2014-0168
MEDIUM
6.8
jolokia
setContentType
agent/core/src/main/java/org/jolokia/http/AgentServlet.java
2d9b168cfbbf5a6d16fa6e8a5b34503e3dc42364
0
Analyze the following code function for security vulnerabilities
void clearAllowBgActivityStarts(IBinder token) { if (token == null) return; mAllowBgActivityStartsForActivitySender.remove(token); mAllowBgActivityStartsForBroadcastSender.remove(token); mAllowBgActivityStartsForServiceSender.remove(token); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearAllowBgActivityStarts File: services/core/java/com/android/server/am/PendingIntentRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
clearAllowBgActivityStarts
services/core/java/com/android/server/am/PendingIntentRecord.java
8418e3a017428683d173c0c82b0eb02d5b923a4e
0
Analyze the following code function for security vulnerabilities
private boolean isRootUid(CallerIdentity caller) { return UserHandle.isSameApp(caller.getUid(), Process.ROOT_UID); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRootUid File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isRootUid
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private boolean savedPatternExists(int userId) { try { return getLockSettings().havePattern(userId); } catch (RemoteException re) { return false; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: savedPatternExists File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
savedPatternExists
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
protected HtmlifyBeginResult onHtmlifyBegin(Spanned body) { return new HtmlifyBeginResult(body, null /* extras */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onHtmlifyBegin File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onHtmlifyBegin
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
private static void multiMapXmlGenerator(XmlGenerator gen, Config config) { for (MultiMapConfig mm : config.getMultiMapConfigs().values()) { gen.open("multimap", "name", mm.getName()) .node("backup-count", mm.getBackupCount()) .node("async-backup-count", mm.getAsyncBackupCount()) .node("statistics-enabled", mm.isStatisticsEnabled()) .node("binary", mm.isBinary()) .node("quorum-ref", mm.getQuorumName()) .node("value-collection-type", mm.getValueCollectionType()); entryListenerConfigXmlGenerator(gen, mm.getEntryListenerConfigs()); MergePolicyConfig mergePolicyConfig = mm.getMergePolicyConfig(); gen.node("merge-policy", mergePolicyConfig.getPolicy(), "batch-size", mergePolicyConfig.getBatchSize()) .close(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: multiMapXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
multiMapXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Deprecated public String getInterfaceLanguagePreference() { return this.xwiki.getInterfaceLanguagePreference(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInterfaceLanguagePreference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getInterfaceLanguagePreference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@GetMapping("{sheetId:\\d+}/comments/{commentParentId:\\d+}/children") public List<BaseCommentDTO> listChildrenBy(@PathVariable("sheetId") Integer sheetId, @PathVariable("commentParentId") Long commentParentId, @SortDefault(sort = "createTime", direction = DESC) Sort sort) { // Find all children comments List<SheetComment> sheetComments = sheetCommentService.listChildrenBy(sheetId, commentParentId, CommentStatus.PUBLISHED, sort); // Convert to base comment dto List<BaseCommentDTO> result = sheetCommentService.convertTo(sheetComments); return sheetCommentService.filterIpAddress(result); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listChildrenBy File: src/main/java/run/halo/app/controller/content/api/SheetController.java Repository: halo-dev/halo The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-19007
LOW
3.5
halo-dev/halo
listChildrenBy
src/main/java/run/halo/app/controller/content/api/SheetController.java
d6b3d6cb5d681c7d8d64fd48de6c7c99b696bb8b
0
Analyze the following code function for security vulnerabilities
protected boolean skip(String s, boolean caseSensitive) throws IOException { int length = s != null ? s.length() : 0; for (int i = 0; i < length; i++) { if (fCurrentEntity.offset == fCurrentEntity.length) { System.arraycopy(fCurrentEntity.buffer, fCurrentEntity.offset - i, fCurrentEntity.buffer, 0, i); if (fCurrentEntity.load(i) == -1) { fCurrentEntity.offset = 0; return false; } } char c0 = s.charAt(i); char c1 = fCurrentEntity.getNextChar(); if (!caseSensitive) { c0 = String.valueOf(c0).toUpperCase(Locale.ENGLISH).charAt(0); c1 = String.valueOf(c1).toUpperCase(Locale.ENGLISH).charAt(0); } if (c0 != c1) { fCurrentEntity.rewind(i + 1); return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: skip File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
skip
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
@Override public boolean injectEvent(InputEvent event) { final long origId = Binder.clearCallingIdentity(); try { synchronized (mService) { if (mActivityDisplay != null) { return mInputManagerInternal.injectInputEvent(event, mActivityDisplay.mDisplayId, InputManager.INJECT_INPUT_EVENT_MODE_ASYNC); } } return false; } finally { Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectEvent File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
injectEvent
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
public String getUserName(String user, XWikiContext context) { return getUserName(user, null, true, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getUserName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override protected void onActivityResult(int requestCode, int resultCode, Intent data) { Log.d(LOG_TAG, "onActivityResult: done"); if (resultCode != RESULT_OK) { Log.d(LOG_TAG, "onActivityResult: contact picker result not OK."); return; } Cursor cursor = null; try { cursor = getContentResolver().query(data.getData(), NUM_PROJECTION, null, null, null); if ((cursor == null) || (!cursor.moveToFirst())) { Log.d(LOG_TAG, "onActivityResult: bad contact data, no results found."); return; } switch (requestCode) { case CommandsInterface.CF_REASON_UNCONDITIONAL: mButtonCFU.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_BUSY: mButtonCFB.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_NO_REPLY: mButtonCFNRy.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_NOT_REACHABLE: mButtonCFNRc.onPickActivityResult(cursor.getString(0)); break; default: // TODO: may need exception here. } } finally { if (cursor != null) { cursor.close(); } } }
Vulnerability Classification: - CWE: CWE-Other, CWE-862 - CVE: CVE-2023-35665 - Severity: HIGH - CVSS Score: 7.8 Description: Fixed leak of cross user data in multiple settings. - Any app is allowed to receive GET_CONTENT intent. Using this, an user puts back in the intent an uri with data of another user. - Telephony service has INTERACT_ACROSS_USER permission. Using this, it reads and shows the deta to the evil user. Fix: When telephony service gets the intent result, it checks if the uri is from the current user or not. Bug: b/256591023 , b/256819787 Test: The malicious behaviour was not being reproduced. Unable to import contact from other users data. Test2: Able to import contact from the primary user or uri with no user id (These settings are not available for secondary users) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:ab593467e900d4a6d25a34024a06195ae863f6dc) Merged-In: I1e3a643f17948153aecc1d0df9ffd9619ad678c1 Change-Id: I1e3a643f17948153aecc1d0df9ffd9619ad678c1 Function: onActivityResult File: src/com/android/phone/GsmUmtsCallForwardOptions.java Repository: android Fixed Code: @Override protected void onActivityResult(int requestCode, int resultCode, Intent data) { Log.d(LOG_TAG, "onActivityResult: done"); if (resultCode != RESULT_OK) { Log.d(LOG_TAG, "onActivityResult: contact picker result not OK."); return; } Cursor cursor = null; try { // check if the URI returned by the user belongs to the user final int currentUser = UserHandle.getUserId(Process.myUid()); if (currentUser != ContentProvider.getUserIdFromUri(data.getData(), currentUser)) { Log.w(LOG_TAG, "onActivityResult: Contact data of different user, " + "cannot access"); return; } cursor = getContentResolver().query(data.getData(), NUM_PROJECTION, null, null, null); if ((cursor == null) || (!cursor.moveToFirst())) { Log.d(LOG_TAG, "onActivityResult: bad contact data, no results found."); return; } switch (requestCode) { case CommandsInterface.CF_REASON_UNCONDITIONAL: mButtonCFU.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_BUSY: mButtonCFB.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_NO_REPLY: mButtonCFNRy.onPickActivityResult(cursor.getString(0)); break; case CommandsInterface.CF_REASON_NOT_REACHABLE: mButtonCFNRc.onPickActivityResult(cursor.getString(0)); break; default: // TODO: may need exception here. } } finally { if (cursor != null) { cursor.close(); } } }
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
onActivityResult
src/com/android/phone/GsmUmtsCallForwardOptions.java
674039e70e1c5bf29b808899ac80c709acc82290
1
Analyze the following code function for security vulnerabilities
public String copyToStandardDirectory(File sourceFile, String databaseType) { String targetFile = targetDriverFile(databaseType, sourceFile.getName()); try { Path target = Paths.get(targetFile); Files.createDirectories(target.getParent()); Files.copy(sourceFile.toPath(), target, StandardCopyOption.REPLACE_EXISTING); return targetFile; } catch (IOException e) { log.error("copy driver file error", e); throw DomainErrors.DOWNLOAD_DRIVER_ERROR.exception(e.getMessage()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyToStandardDirectory File: core/src/main/java/com/databasir/core/infrastructure/driver/DriverResources.java Repository: vran-dev/databasir The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-31196
HIGH
7.5
vran-dev/databasir
copyToStandardDirectory
core/src/main/java/com/databasir/core/infrastructure/driver/DriverResources.java
226c20e0c9124037671a91d6b3e5083bd2462058
0
Analyze the following code function for security vulnerabilities
@Override public void suppressResizeConfigChanges(boolean suppress) throws RemoteException { enforceCallingPermission(MANAGE_ACTIVITY_STACKS, "suppressResizeConfigChanges()"); synchronized (this) { mSuppressResizeConfigChanges = suppress; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: suppressResizeConfigChanges File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
suppressResizeConfigChanges
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public Map<String, Object> searchArticle(int page, int row, String keywords) { Map<String, Object> data = new Log().findByTitleOrPlainContentLike(page, row, keywords); wrapperSearchKeyword(data, keywords); return data; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: searchArticle File: service/src/main/java/com/zrlog/service/ArticleService.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
searchArticle
service/src/main/java/com/zrlog/service/ArticleService.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@CalledByNative private void startContentIntent(String contentUrl) { getContentViewClient().onStartContentIntent(getContext(), contentUrl); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startContentIntent File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
startContentIntent
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Deprecated public <T> ApiResponse<T> invokeAPI(String path, String method, List<Pair> queryParams, Object body, Map<String, String> headerParams, Map<String, String> cookieParams, Map<String, Object> formParams, String accept, String contentType, String[] authNames, GenericType<T> returnType, boolean isBodyNullable) throws ApiException { return invokeAPI(null, path, method, queryParams, body, headerParams, cookieParams, formParams, accept, contentType, authNames, returnType, isBodyNullable); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeAPI File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
invokeAPI
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void setClosingWithAlphaFadeout(boolean closing) { mClosingWithAlphaFadeOut = closing; mNotificationStackScroller.forceNoOverlappingRendering(closing); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClosingWithAlphaFadeout File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
setClosingWithAlphaFadeout
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
static public InputStream tryOpenAsArchive(File file, String mimeType, String contentType) { String fileName = file.getName(); try { if (fileName.endsWith(".tar.gz") || fileName.endsWith(".tgz")) { return new TarInputStream(new GZIPInputStream(new FileInputStream(file))); } else if (fileName.endsWith(".tar.bz2")) { return new TarInputStream(new CBZip2InputStream(new FileInputStream(file))); } else if (fileName.endsWith(".tar") || "application/x-tar".equals(contentType)) { return new TarInputStream(new FileInputStream(file)); } else if (fileName.endsWith(".zip") || "application/x-zip-compressed".equals(contentType) || "application/zip".equals(contentType) || "application/x-compressed".equals(contentType) || "multipar/x-zip".equals(contentType)) { return new ZipInputStream(new FileInputStream(file)); } else if (fileName.endsWith(".kmz")) { return new ZipInputStream(new FileInputStream(file)); } } catch (IOException e) { } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryOpenAsArchive File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
tryOpenAsArchive
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
public OnmsUser getOnmsUser(final String username) throws IOException { update(); m_readLock.lock(); try { return _getOnmsUser(username); } finally { m_readLock.unlock(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOnmsUser File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
getOnmsUser
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
@Transactional(readOnly = false) public void claim(String taskId, String userId){ taskService.claim(taskId, userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: claim File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
claim
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0
Analyze the following code function for security vulnerabilities
public static int javaVersion() { return PlatformDependent0.javaVersion(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: javaVersion File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
javaVersion
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
private WindowState getFocusedWindowLocked() { return mCurrentFocus; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFocusedWindowLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getFocusedWindowLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate fetchByUUID_G(String uuid, long groupId) { return fetchByUUID_G(uuid, groupId, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchByUUID_G File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
fetchByUUID_G
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
private boolean isSsaidSettingsKey(int key) { return getTypeFromKey(key) == SETTINGS_TYPE_SSAID; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSsaidSettingsKey File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
isSsaidSettingsKey
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public ApiClient setReadTimeout(int readTimeout) { this.readTimeout = readTimeout; httpClient.property(ClientProperties.READ_TIMEOUT, readTimeout); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setReadTimeout File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setReadTimeout
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public ActivityOptions setTransientLaunch() { mTransientLaunch = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTransientLaunch File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setTransientLaunch
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public boolean isDebugging() { return debugging; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDebugging File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
isDebugging
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public static void decrypt( final AEADBlockCipher cipher, final SecretKey key, final InputStream input, final OutputStream output) throws CryptoException, EncodingException, StreamException { final CiphertextHeader header = CiphertextHeader.decode(input); final byte[] nonce = header.getNonce(); final byte[] hbytes = header.encode(); cipher.init(false, new AEADParameters(new KeyParameter(key.getEncoded()), MAC_SIZE_BITS, nonce, hbytes)); process(new AEADBlockCipherAdapter(cipher), input, output); }
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2020-7226 - Severity: MEDIUM - CVSS Score: 5.0 Description: Define new ciphertext header format. New format does not allocate any memory until HMAC check passes, which guards against untrusted input. All encryption components have been updated to use the new header, while preserving backward compatibility to decrypt messages encrypted with the old format. The decoding process for the old header has been hardened to impose reasonable limits on header fields: nonce sizes up to 255 bytes, key names up to 500 bytes. Fixes #52. Function: decrypt File: src/main/java/org/cryptacular/util/CipherUtil.java Repository: vt-middleware/cryptacular Fixed Code: public static void decrypt( final AEADBlockCipher cipher, final SecretKey key, final InputStream input, final OutputStream output) throws CryptoException, EncodingException, StreamException { final CiphertextHeader header = decodeHeader(input, String -> key); final byte[] nonce = header.getNonce(); final byte[] hbytes = header.encode(); cipher.init(false, new AEADParameters(new KeyParameter(key.getEncoded()), MAC_SIZE_BITS, nonce, hbytes)); process(new AEADBlockCipherAdapter(cipher), input, output); }
[ "CWE-770" ]
CVE-2020-7226
MEDIUM
5
vt-middleware/cryptacular
decrypt
src/main/java/org/cryptacular/util/CipherUtil.java
8c6c7528f1e24c6b71f3e36db0cb8a697256ce25
1
Analyze the following code function for security vulnerabilities
public void setClient(@Nullable String client) { this.client = client; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClient File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setClient
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/PagerdutyNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
public static boolean wasWhitespacePeeked(XMLEventReader xmlEventReader, XMLEvent xmlEvent) { if (xmlEvent.isCharacters()) { Characters chars = xmlEvent.asCharacters(); String data = chars.getData(); if (data == null || data.trim().equals("")) { try { xmlEventReader.nextEvent(); return true; } catch (XMLStreamException e) { throw new RuntimeException(e); } } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: wasWhitespacePeeked File: saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java Repository: keycloak The code follows secure coding practices.
[ "CWE-200" ]
CVE-2017-2582
MEDIUM
4
keycloak
wasWhitespacePeeked
saml-core/src/main/java/org/keycloak/saml/common/util/StaxParserUtil.java
0cb5ba0f6e83162d221681f47b470c3042eef237
0
Analyze the following code function for security vulnerabilities
private void failTask(Task task) { WorkflowRequestDTO requestDTO = new WorkflowRequestDTO(); requestDTO.setTaskId(task.getId()); requestDTO.setParams(JSONObject.parseObject("{ \"result\" : false}")); requestDTO.setBareMetalId(task.getBareMetalId()); Workflow workflow = workflowService.getById(task.getWorkFlowId()); LifeEventType type = LifeEventType.valueOf(workflow.getEventType().replace("START", "END")); LifeEvent event = LifeEvent.builder().withEventType(type).withWorkflowRequestDTO(requestDTO); stateMachine.sendEvent(event); template.convertAndSend("/topic/lifecycle", ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: failTask File: rackshift-server/src/main/java/io/rackshift/service/TaskService.java Repository: fit2cloud/rackshift The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-42405
CRITICAL
9.8
fit2cloud/rackshift
failTask
rackshift-server/src/main/java/io/rackshift/service/TaskService.java
305aea3b20d36591d519f7d04e0a25be05a51e93
0
Analyze the following code function for security vulnerabilities
public abstract long get(String name, long defaultValue) throws IOException, IllegalArgumentException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: get File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
get
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
private Intent createIntentForURL(String url) { Intent intent; Uri uri; try { if (url.startsWith("intent")) { intent = Intent.parseUri(url, Intent.URI_INTENT_SCHEME); } else { if(url.startsWith("/") || url.startsWith("file:")) { if(!checkForPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE, "This is required to open the file")){ return null; } } intent = new Intent(); intent.setAction(Intent.ACTION_VIEW); if (url.startsWith("/")) { File f = new File(url); Uri furi = null; try { furi = FileProvider.getUriForFile(getContext(), getContext().getPackageName()+".provider", f); } catch (Exception ex) { f = makeTempCacheCopy(f); furi = FileProvider.getUriForFile(getContext(), getContext().getPackageName()+".provider", f); } if (Build.VERSION.SDK_INT < 21) { List<ResolveInfo> resInfoList = getContext().getPackageManager().queryIntentActivities(intent, PackageManager.MATCH_DEFAULT_ONLY); for (ResolveInfo resolveInfo : resInfoList) { String packageName = resolveInfo.activityInfo.packageName; getContext().grantUriPermission(packageName, furi, Intent.FLAG_GRANT_WRITE_URI_PERMISSION | Intent.FLAG_GRANT_READ_URI_PERMISSION); } } uri = furi; intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK|Intent.FLAG_GRANT_READ_URI_PERMISSION); }else{ if (url.startsWith("file:")) { File f = new File(removeFilePrefix(url)); System.out.println("File size: "+f.length()); Uri furi = null; try { furi = FileProvider.getUriForFile(getContext(), getContext().getPackageName()+".provider", f); } catch (Exception ex) { f = makeTempCacheCopy(f); furi = FileProvider.getUriForFile(getContext(), getContext().getPackageName()+".provider", f); } if (Build.VERSION.SDK_INT < 21) { List<ResolveInfo> resInfoList = getContext().getPackageManager().queryIntentActivities(intent, PackageManager.MATCH_DEFAULT_ONLY); for (ResolveInfo resolveInfo : resInfoList) { String packageName = resolveInfo.activityInfo.packageName; getContext().grantUriPermission(packageName, furi, Intent.FLAG_GRANT_WRITE_URI_PERMISSION | Intent.FLAG_GRANT_READ_URI_PERMISSION); } } uri = furi; intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK|Intent.FLAG_GRANT_READ_URI_PERMISSION); } else { uri = Uri.parse(url); } } String mimeType = getMimeType(url); if(mimeType != null){ intent.setDataAndType(uri, mimeType); }else{ intent.setData(uri); } } return intent; } catch(Exception err) { com.codename1.io.Log.e(err); return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createIntentForURL File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createIntentForURL
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(Message msg) { switch (msg.what) { case SHOW: handleShow((Bundle) msg.obj); break; case HIDE: handleHide(); break; case RESET: handleReset(); break; case VERIFY_UNLOCK: Trace.beginSection("KeyguardViewMediator#handleMessage VERIFY_UNLOCK"); handleVerifyUnlock(); Trace.endSection(); break; case NOTIFY_STARTED_GOING_TO_SLEEP: handleNotifyStartedGoingToSleep(); break; case NOTIFY_FINISHED_GOING_TO_SLEEP: handleNotifyFinishedGoingToSleep(); break; case NOTIFY_STARTED_WAKING_UP: Trace.beginSection( "KeyguardViewMediator#handleMessage NOTIFY_STARTED_WAKING_UP"); handleNotifyStartedWakingUp(); Trace.endSection(); break; case KEYGUARD_DONE: Trace.beginSection("KeyguardViewMediator#handleMessage KEYGUARD_DONE"); handleKeyguardDone(); Trace.endSection(); break; case KEYGUARD_DONE_DRAWING: Trace.beginSection("KeyguardViewMediator#handleMessage KEYGUARD_DONE_DRAWING"); handleKeyguardDoneDrawing(); Trace.endSection(); break; case SET_OCCLUDED: Trace.beginSection("KeyguardViewMediator#handleMessage SET_OCCLUDED"); handleSetOccluded(msg.arg1 != 0, msg.arg2 != 0); Trace.endSection(); break; case KEYGUARD_TIMEOUT: synchronized (KeyguardViewMediator.this) { doKeyguardLocked((Bundle) msg.obj); } break; case DISMISS: final DismissMessage message = (DismissMessage) msg.obj; handleDismiss(message.getCallback(), message.getMessage()); break; case START_KEYGUARD_EXIT_ANIM: Trace.beginSection( "KeyguardViewMediator#handleMessage START_KEYGUARD_EXIT_ANIM"); StartKeyguardExitAnimParams params = (StartKeyguardExitAnimParams) msg.obj; mNotificationShadeWindowControllerLazy.get().batchApplyWindowLayoutParams( () -> { handleStartKeyguardExitAnimation(params.startTime, params.fadeoutDuration, params.mApps, params.mWallpapers, params.mNonApps, params.mFinishedCallback); mFalsingCollector.onSuccessfulUnlock(); }); Trace.endSection(); break; case CANCEL_KEYGUARD_EXIT_ANIM: Trace.beginSection( "KeyguardViewMediator#handleMessage CANCEL_KEYGUARD_EXIT_ANIM"); handleCancelKeyguardExitAnimation(); Trace.endSection(); break; case KEYGUARD_DONE_PENDING_TIMEOUT: Trace.beginSection("KeyguardViewMediator#handleMessage" + " KEYGUARD_DONE_PENDING_TIMEOUT"); Log.w(TAG, "Timeout while waiting for activity drawn!"); Trace.endSection(); break; case SYSTEM_READY: handleSystemReady(); break; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleMessage File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
handleMessage
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
public ExportConfig.NodeConfig getTarget() { return target; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTarget File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
getTarget
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
@Nullable String scheme() { return get(HttpHeaderNames.SCHEME); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheme File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
scheme
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public boolean isInMultiWindowMode(IBinder token) { final long origId = Binder.clearCallingIdentity(); try { synchronized(this) { final ActivityRecord r = ActivityRecord.isInStackLocked(token); if (r == null) { return false; } // An activity is consider to be in multi-window mode if its task isn't fullscreen. return r.inMultiWindowMode(); } } finally { Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInMultiWindowMode File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
isInMultiWindowMode
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private Set<XWikiLink> extractLinks(XWikiDocument doc, XWikiContext context) { Set<XWikiLink> links = new LinkedHashSet<>(); String fullName = this.localEntityReferenceSerializer.serialize(doc.getDocumentReference()); // Add entity references. for (EntityReference entityReference : doc.getUniqueLinkedEntities(context)) { XWikiLink wikiLink = new XWikiLink(); wikiLink.setDocId(doc.getId()); wikiLink.setFullName(fullName); // getUniqueLinkedEntities() returns both DOCUMENT and PAGE references (and ATTACHMENT and // PAGE_ATTACHMENT references). If the reference is a PageReference (or a PageAttachmentReference) then // we can't know if it points to a terminal page or a non-terminal one, and thus we need to get the // document to check if it exists, starting with the non-terminal one since "[[page:test]]" points // first to the non-terminal page when it exists. EntityReference documentReferenceToSerialize = convertToDocumentReference(entityReference); wikiLink.setLink(this.compactWikiEntityReferenceSerializer.serialize(documentReferenceToSerialize)); boolean isAttachmentReference = false; if (Objects.equals(entityReference.getType(), EntityType.ATTACHMENT) || Objects.equals(entityReference.getType(), EntityType.PAGE_ATTACHMENT)) { wikiLink.setAttachmentName(entityReference.getName()); isAttachmentReference = true; } wikiLink.setType( isAttachmentReference ? EntityType.ATTACHMENT.getLowerCase() : EntityType.DOCUMENT.getLowerCase()); links.add(wikiLink); } // Add included pages. List<String> includedPages = doc.getIncludedPages(context); for (String includedPage : includedPages) { XWikiLink wikiLink = new XWikiLink(); wikiLink.setDocId(doc.getId()); wikiLink.setFullName(fullName); wikiLink.setLink(includedPage); wikiLink.setType(EntityType.DOCUMENT.getLowerCase()); links.add(wikiLink); } return links; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractLinks File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
extractLinks
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private void setCurrentTaskAssignee(Map<String, Object> vars, Task currentTask) { String assignee = currentTask.getAssignee(); if (assignee != null) { org.activiti.engine.identity.User assigneeUser = identityService.createUserQuery().userId(assignee).singleResult(); String userInfo = assigneeUser.getFirstName() + " " + assigneeUser.getLastName(); vars.put("当前处理人", userInfo); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCurrentTaskAssignee File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
setCurrentTaskAssignee
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0
Analyze the following code function for security vulnerabilities
void finalizeBackup() { addBackupTrace("finishing"); // Either backup was successful, in which case we of course do not need // this pass's journal any more; or it failed, in which case we just // re-enqueued all of these packages in the current active journal. // Either way, we no longer need this pass's journal. if (mJournal != null && !mJournal.delete()) { Slog.e(TAG, "Unable to remove backup journal file " + mJournal); } // If everything actually went through and this is the first time we've // done a backup, we can now record what the current backup dataset token // is. if ((mCurrentToken == 0) && (mStatus == BackupTransport.TRANSPORT_OK)) { addBackupTrace("success; recording token"); try { mCurrentToken = mTransport.getCurrentRestoreSet(); writeRestoreTokens(); } catch (RemoteException e) { // nothing for it at this point, unfortunately, but this will be // recorded the next time we fully succeed. addBackupTrace("transport threw returning token"); } } // Set up the next backup pass - at this point we can set mBackupRunning // to false to allow another pass to fire, because we're done with the // state machine sequence and the wakelock is refcounted. synchronized (mQueueLock) { mBackupRunning = false; if (mStatus == BackupTransport.TRANSPORT_NOT_INITIALIZED) { // Make sure we back up everything and perform the one-time init clearMetadata(); if (MORE_DEBUG) Slog.d(TAG, "Server requires init; rerunning"); addBackupTrace("init required; rerunning"); backupNow(); } } // Only once we're entirely finished do we release the wakelock clearBackupTrace(); Slog.i(BackupManagerService.TAG, "Backup pass finished."); mWakelock.release(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finalizeBackup File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
finalizeBackup
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override public void reportFailedBiometricAttempt(int userHandle) { Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHandle)); Preconditions.checkCallAuthorization(hasCallingOrSelfPermission(BIND_DEVICE_ADMIN)); if (mInjector.securityLogIsLoggingEnabled()) { SecurityLog.writeEvent(SecurityLog.TAG_KEYGUARD_DISMISS_AUTH_ATTEMPT, /*result*/ 0, /*method strength*/ 0); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportFailedBiometricAttempt File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
reportFailedBiometricAttempt
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private synchronized void doNotify() { if (!notified) { notified = true; notifyAll(); // NOSONAR } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doNotify File: flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-36321
MEDIUM
5
vaadin/flow
doNotify
flow-server/src/main/java/com/vaadin/flow/server/DevModeHandler.java
6ae6460ca4f3a9b50bd46fbf49c807fe67718307
0
Analyze the following code function for security vulnerabilities
private void dismissTextHandles() { mHasSelection = false; mHasInsertion = false; if (mNativeContentViewCore != 0) nativeDismissTextHandles(mNativeContentViewCore); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissTextHandles File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
dismissTextHandles
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
protected PdfObject readSingleObject(int k) throws IOException { strings.clear(); int k2 = k * 2; int pos = xref[k2]; if (pos < 0) return null; if (xref[k2 + 1] > 0) pos = objStmToOffset.get(xref[k2 + 1]); if (pos == 0) return null; tokens.seek(pos); tokens.nextValidToken(); if (tokens.getTokenType() != PRTokeniser.TK_NUMBER) tokens.throwError("Invalid object number."); objNum = tokens.intValue(); tokens.nextValidToken(); if (tokens.getTokenType() != PRTokeniser.TK_NUMBER) tokens.throwError("Invalid generation number."); objGen = tokens.intValue(); tokens.nextValidToken(); if (!tokens.getStringValue().equals("obj")) tokens.throwError("Token 'obj' expected."); PdfObject obj; try { obj = readPRObject(); for (int j = 0; j < strings.size(); ++j) { PdfString str = (PdfString)strings.get(j); str.decrypt(this); } if (obj.isStream()) { checkPRStreamLength((PRStream)obj); } } catch (Exception e) { obj = null; } if (xref[k2 + 1] > 0) { obj = readOneObjStm((PRStream)obj, xref[k2]); } xrefObj.set(k, obj); return obj; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readSingleObject File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
readSingleObject
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
protected boolean isRekeyRequired() { if ((!isOpen()) || isClosing() || isClosed()) { return false; } KexState curState = kexState.get(); if (!KexState.DONE.equals(curState)) { return false; } return isRekeyTimeIntervalExceeded() || isRekeyPacketCountsExceeded() || isRekeyBlocksCountExceeded() || isRekeyDataSizeExceeded(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRekeyRequired File: sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java Repository: apache/mina-sshd The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
apache/mina-sshd
isRekeyRequired
sshd-core/src/main/java/org/apache/sshd/common/session/helpers/AbstractSession.java
6b0fd46f64bcb75eeeee31d65f10242660aad7c1
0
Analyze the following code function for security vulnerabilities
public Iterator<String> getBehaviorIds() { return behaviorMap.keySet().iterator(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBehaviorIds File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getBehaviorIds
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public static int defaultIdleConnectionTimeoutInMs() { return Integer.getInteger(ASYNC_CLIENT + "idleConnectionTimeoutInMs", 60 * 1000); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: defaultIdleConnectionTimeoutInMs File: src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java Repository: AsyncHttpClient/async-http-client The code follows secure coding practices.
[ "CWE-345" ]
CVE-2013-7398
MEDIUM
4.3
AsyncHttpClient/async-http-client
defaultIdleConnectionTimeoutInMs
src/main/java/com/ning/http/client/AsyncHttpClientConfigDefaults.java
a894583921c11c3b01f160ada36a8bb9d5158e96
0
Analyze the following code function for security vulnerabilities
@Override public int size() { return size; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: size File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
size
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
private void cloneXObjects(XWikiDocument templatedoc, boolean keepsIdentity) { // clean map this.xObjects.clear(); // fill map for (Map.Entry<DocumentReference, List<BaseObject>> entry : templatedoc.getXObjects().entrySet()) { List<BaseObject> tobjects = entry.getValue(); // clone and insert xobjects for (BaseObject otherObject : tobjects) { if (otherObject != null) { if (keepsIdentity) { addXObject(otherObject.clone()); } else { BaseObject newObject = otherObject.duplicate(getDocumentReference()); setXObject(newObject.getNumber(), newObject); } } else if (keepsIdentity) { // set null object to make sure to have exactly the same thing when cloning a document addXObject(entry.getKey(), null); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cloneXObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
cloneXObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
WindowProcessController getProcessController(int pid, int uid) { final WindowProcessController proc = mProcessMap.getProcess(pid); if (proc == null) return null; if (UserHandle.isApp(uid) && proc.mUid == uid) { return proc; } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessController File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getProcessController
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public int getConnectionCounter() { return connectionCounterValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectionCounter File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
getConnectionCounter
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public ApiClient setAccessToken(String accessToken) { for (Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setAccessToken(accessToken); return this; } } throw new RuntimeException("No OAuth2 authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAccessToken File: samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setAccessToken
samples/client/petstore/java/resteasy/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
void removeListener(CallsManagerListener listener) { mListeners.remove(listener); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeListener File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
removeListener
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Override public String elementAsString(Properties outputProperties) { try { return super.elementAsString(outputProperties); } catch (TransformerException e) { throw wrapExceptionAsRuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elementAsString File: src/main/java/com/jamesmurty/utils/XMLBuilder2.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
elementAsString
src/main/java/com/jamesmurty/utils/XMLBuilder2.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; Script script = (Script) o; return Objects.equals(stmts, script.stmts) && Objects.equals(options, script.options) && Objects.equals(sourceImages, script.sourceImages) && Objects.equals(destImages, script.destImages) && Objects.equals(globals, script.globals); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
equals
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
@Override public void setUserRestriction(ComponentName who, String key, boolean enabledFromThisOwner, boolean parent) { Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); if (!UserRestrictionsUtils.isValidRestriction(key)) { return; } int userHandle = caller.getUserId(); synchronized (getLockObject()) { final ActiveAdmin activeAdmin = getParentOfAdminIfRequired( getProfileOwnerOrDeviceOwnerLocked(caller), parent); if (isDefaultDeviceOwner(caller)) { if (!UserRestrictionsUtils.canDeviceOwnerChange(key)) { throw new SecurityException("Device owner cannot set user restriction " + key); } Preconditions.checkArgument(!parent, "Cannot use the parent instance in Device Owner mode"); } else if (isFinancedDeviceOwner(caller)) { if (!UserRestrictionsUtils.canFinancedDeviceOwnerChange(key)) { throw new SecurityException("Cannot set user restriction " + key + " when managing a financed device"); } Preconditions.checkArgument(!parent, "Cannot use the parent instance in Financed Device Owner mode"); } else { boolean profileOwnerCanChangeOnItself = !parent && UserRestrictionsUtils.canProfileOwnerChange(key, userHandle); boolean orgOwnedProfileOwnerCanChangesGlobally = parent && isProfileOwnerOfOrganizationOwnedDevice(caller) && UserRestrictionsUtils.canProfileOwnerOfOrganizationOwnedDeviceChange( key); if (!profileOwnerCanChangeOnItself && !orgOwnedProfileOwnerCanChangesGlobally) { throw new SecurityException("Profile owner cannot set user restriction " + key); } } checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_USER_RESTRICTION); // Save the restriction to ActiveAdmin. final Bundle restrictions = activeAdmin.ensureUserRestrictions(); if (enabledFromThisOwner) { restrictions.putBoolean(key, true); } else { restrictions.remove(key); } saveUserRestrictionsLocked(userHandle); } final int eventId = enabledFromThisOwner ? DevicePolicyEnums.ADD_USER_RESTRICTION : DevicePolicyEnums.REMOVE_USER_RESTRICTION; DevicePolicyEventLogger .createEvent(eventId) .setAdmin(caller.getComponentName()) .setStrings(key, parent ? CALLED_FROM_PARENT : NOT_CALLED_FROM_PARENT) .write(); if (SecurityLog.isLoggingEnabled()) { final int eventTag = enabledFromThisOwner ? SecurityLog.TAG_USER_RESTRICTION_ADDED : SecurityLog.TAG_USER_RESTRICTION_REMOVED; SecurityLog.writeEvent(eventTag, who.getPackageName(), userHandle, key); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserRestriction File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setUserRestriction
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public Block execute(boolean async, boolean cached) throws RenderingException { Block resultBlock; try { // Register the known involved references and components for (EntityReference reference : this.configuration.getReferences()) { this.asyncContext.useEntity(reference); } for (ComponentRole<?> role : this.configuration.getRoles()) { this.asyncContext.useComponent(role.getRoleType(), role.getRoleHint()); } // Get the block to transform Block block = this.configuration.getBlock(); // Make sure the source is inline if needed if (this.configuration.isInline()) { block = PARSERUTILS.convertToInline(block, true); } // Get the XDOM instance for the transformation context XDOM xdom = this.configuration.getXDOM(); if (xdom == null) { Block rootBlock = block.getRoot(); if (rootBlock instanceof XDOM) { xdom = (XDOM) rootBlock; } else { xdom = new XDOM(Collections.singletonList(rootBlock)); } } /////////////////////////////////////// // Transformations resultBlock = tranform(xdom, block); } catch (Exception e) { // Display the error in the result resultBlock = new CompositeBlock(this.errorBlockGenerator.generateErrorBlocks(this.configuration.isInline(), TM_FAILEDASYNC, "Failed to execute asynchronous content", null, e)); } return resultBlock; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-26471
HIGH
8.8
xwiki/xwiki-platform
execute
xwiki-platform-core/xwiki-platform-rendering/xwiki-platform-rendering-async/xwiki-platform-rendering-async-api/src/main/java/org/xwiki/rendering/async/internal/block/DefaultBlockAsyncRenderer.java
00532d9f1404287cf3ec3a05056640d809516006
0
Analyze the following code function for security vulnerabilities
private void dispatchProcessesChanged() { int N; synchronized (this) { N = mPendingProcessChanges.size(); if (mActiveProcessChanges.length < N) { mActiveProcessChanges = new ProcessChangeItem[N]; } mPendingProcessChanges.toArray(mActiveProcessChanges); mPendingProcessChanges.clear(); if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG_PROCESS_OBSERVERS, "*** Delivering " + N + " process changes"); } int i = mProcessObservers.beginBroadcast(); while (i > 0) { i--; final IProcessObserver observer = mProcessObservers.getBroadcastItem(i); if (observer != null) { try { for (int j=0; j<N; j++) { ProcessChangeItem item = mActiveProcessChanges[j]; if ((item.changes&ProcessChangeItem.CHANGE_ACTIVITIES) != 0) { if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG_PROCESS_OBSERVERS, "ACTIVITIES CHANGED pid=" + item.pid + " uid=" + item.uid + ": " + item.foregroundActivities); observer.onForegroundActivitiesChanged(item.pid, item.uid, item.foregroundActivities); } if ((item.changes&ProcessChangeItem.CHANGE_PROCESS_STATE) != 0) { if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG_PROCESS_OBSERVERS, "PROCSTATE CHANGED pid=" + item.pid + " uid=" + item.uid + ": " + item.processState); observer.onProcessStateChanged(item.pid, item.uid, item.processState); } } } catch (RemoteException e) { } } } mProcessObservers.finishBroadcast(); synchronized (this) { for (int j=0; j<N; j++) { mAvailProcessChanges.add(mActiveProcessChanges[j]); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchProcessesChanged File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
dispatchProcessesChanged
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAdminActive(ComponentName adminReceiver, int userHandle) { if (!mHasFeature) { return false; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHandle)); synchronized (getLockObject()) { return getActiveAdminUncheckedLocked(adminReceiver, userHandle) != null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAdminActive File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
isAdminActive
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public String getRealPath(String path) { return getEngineContext().getRealPath(path); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRealPath File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getRealPath
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public SourceStampVerificationStatus getSourceStampVerificationStatus() { return mSourceStampVerificationStatus; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSourceStampVerificationStatus File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getSourceStampVerificationStatus
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public static boolean addItemIfActive(final RequestScopedItem item) { final List<RequestScopedItem> cache = CACHE.get(); if (cache != null) { cache.add(item); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addItemIfActive File: impl/src/main/java/org/jboss/weld/context/cache/RequestScopedCache.java Repository: weld/core The code follows secure coding practices.
[ "CWE-362" ]
CVE-2014-8122
MEDIUM
4.3
weld/core
addItemIfActive
impl/src/main/java/org/jboss/weld/context/cache/RequestScopedCache.java
6808b11cd6d97c71a2eed754ed4f955acd789086
0
Analyze the following code function for security vulnerabilities
private static Number stringToNumber(final String val) throws NumberFormatException { char initial = val.charAt(0); if ((initial >= '0' && initial <= '9') || initial == '-') { // decimal representation if (isDecimalNotation(val)) { // Use a BigDecimal all the time so we keep the original // representation. BigDecimal doesn't support -0.0, ensure we // keep that by forcing a decimal. try { BigDecimal bd = new BigDecimal(val); if(initial == '-' && BigDecimal.ZERO.compareTo(bd)==0) { return Double.valueOf(-0.0); } return bd; } catch (NumberFormatException retryAsDouble) { // this is to support "Hex Floats" like this: 0x1.0P-1074 try { Double d = Double.valueOf(val); if(d.isNaN() || d.isInfinite()) { throw new NumberFormatException("val ["+val+"] is not a valid number."); } return d; } catch (NumberFormatException ignore) { throw new NumberFormatException("val ["+val+"] is not a valid number."); } } } // block items like 00 01 etc. Java number parsers treat these as Octal. if(initial == '0' && val.length() > 1) { char at1 = val.charAt(1); if(at1 >= '0' && at1 <= '9') { throw new NumberFormatException("val ["+val+"] is not a valid number."); } } else if (initial == '-' && val.length() > 2) { char at1 = val.charAt(1); char at2 = val.charAt(2); if(at1 == '0' && at2 >= '0' && at2 <= '9') { throw new NumberFormatException("val ["+val+"] is not a valid number."); } } // integer representation. // This will narrow any values to the smallest reasonable Object representation // (Integer, Long, or BigInteger) // BigInteger down conversion: We use a similar bitLength compare as // BigInteger#intValueExact uses. Increases GC, but objects hold // only what they need. i.e. Less runtime overhead if the value is // long lived. BigInteger bi = new BigInteger(val); if(bi.bitLength() <= 31){ return Integer.valueOf(bi.intValue()); } if(bi.bitLength() <= 63){ return Long.valueOf(bi.longValue()); } return bi; } throw new NumberFormatException("val ["+val+"] is not a valid number."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stringToNumber File: src/main/java/org/json/XML.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2022-45688
HIGH
7.5
stleary/JSON-java
stringToNumber
src/main/java/org/json/XML.java
f566a1d9ee1f8139357017dc6c7def1da19cd8d4
0
Analyze the following code function for security vulnerabilities
@Override public boolean isInvertFilter() { return invertFilter; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInvertFilter File: config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
isInvertFilter
config/config-api/src/main/java/com/thoughtworks/go/config/materials/ScmMaterialConfig.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
@POST @Path("survey/{nodeId}") @Operation(summary = "Attaches an survey building block", description = "Attaches an survey building block") @ApiResponse(responseCode = "200", description = "The course node metadatas", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class)), @Content(mediaType = "application/xml", schema = @Schema(implementation = CourseNodeVO.class)) }) @ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient") @ApiResponse(responseCode = "404", description = "The course or parentNode not found") @Consumes(MediaType.APPLICATION_FORM_URLENCODED) @Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) public Response attachSurveyPost(@PathParam("courseId") Long courseId, @PathParam("nodeId") String nodeId, @FormParam("shortTitle") @DefaultValue("undefined") String shortTitle, @FormParam("longTitle") @DefaultValue("undefined") String longTitle, @FormParam("objectives") @DefaultValue("undefined") String objectives, @FormParam("visibilityExpertRules") String visibilityExpertRules, @FormParam("accessExpertRules") String accessExpertRules, @FormParam("surveyResourceableId") Long surveyResourceableId, @Context HttpServletRequest request) { RepositoryManager rm = RepositoryManager.getInstance(); RepositoryEntry surveyRepoEntry = rm.lookupRepositoryEntry(surveyResourceableId); if(surveyRepoEntry == null) { return Response.serverError().status(Status.NOT_FOUND).build(); } CustomConfigDelegate config = CustomConfigFactory.getSurveyCustomConfig(surveyRepoEntry); return update(courseId, nodeId, shortTitle, longTitle, objectives, visibilityExpertRules, accessExpertRules, config, request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachSurveyPost File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
attachSurveyPost
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
public byte[] engineUpdate( byte[] input, int inputOffset, int inputLen) { buffer.write(input, inputOffset, inputLen); return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: engineUpdate File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/IESCipher.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-361" ]
CVE-2016-1000345
MEDIUM
4.3
bcgit/bc-java
engineUpdate
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dh/IESCipher.java
21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35
0
Analyze the following code function for security vulnerabilities
private String getMultipartMessageText(ArrayList<String> parts) { final StringBuilder sb = new StringBuilder(); for (String part : parts) { if (part != null) { sb.append(part); } } return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMultipartMessageText File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
getMultipartMessageText
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
public void focusChanged();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: focusChanged File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
focusChanged
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
void enqueueFullBackup(String packageName, long lastBackedUp) { FullBackupEntry newEntry = new FullBackupEntry(packageName, lastBackedUp); synchronized (mQueueLock) { int N = mFullBackupQueue.size(); // First, sanity check that we aren't adding a duplicate. Slow but // straightforward; we'll have at most on the order of a few hundred // items in this list. for (int i = N-1; i >= 0; i--) { final FullBackupEntry e = mFullBackupQueue.get(i); if (packageName.equals(e.packageName)) { mFullBackupQueue.remove(i); } } // This is also slow but easy for modest numbers of apps: work backwards // from the end of the queue until we find an item whose last backup // time was before this one, then insert this new entry after it. If we're // adding something new we don't bother scanning, and just prepend. int which = -1; if (lastBackedUp > 0) { for (which = mFullBackupQueue.size() - 1; which >= 0; which--) { final FullBackupEntry entry = mFullBackupQueue.get(which); if (entry.lastBackup <= lastBackedUp) { mFullBackupQueue.add(which + 1, newEntry); break; } } } if (which < 0) { // this one is earlier than any existing one, so prepend mFullBackupQueue.add(0, newEntry); } } writeFullBackupScheduleAsync(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enqueueFullBackup File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
enqueueFullBackup
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private void restoreSettings(TestUtils setup) { // Make sure we can restore the settings, so we log back with superadmin to finish the work setup.loginAsSuperAdmin(); // Remove the previous version that the setup has created. setup.deleteLatestVersion("Mail", "MailConfig"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: restoreSettings File: xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-200" ]
CVE-2021-32731
MEDIUM
5
xwiki/xwiki-platform
restoreSettings
xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-test/xwiki-platform-administration-test-docker/src/test/it/org/xwiki/administration/test/ui/ResetPasswordIT.java
0cf716250b3645a5974c80d8336dcdf885749dff
0
Analyze the following code function for security vulnerabilities
private void tearDown(PackageInfo pkg) { if (pkg != null) { final ApplicationInfo app = pkg.applicationInfo; if (app != null) { tearDownAgentAndKill(app); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tearDown File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
tearDown
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override public void writeLegacyPermissionsTEMP( @NonNull LegacyPermissionSettings legacyPermissionSettings) { mPermissionManagerServiceImpl.writeLegacyPermissionsTEMP(legacyPermissionSettings); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeLegacyPermissionsTEMP File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
writeLegacyPermissionsTEMP
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
@Override public void onUserInfoUpdated(OcsUser userInfo) { final Drawable placeHolder = getDrawable(R.drawable.ic_baseline_account_circle_24); DisplayImageOptions displayImageOptions = new DisplayImageOptions.Builder() .displayer(new CircleBitmapDisplayer()) .showImageOnLoading(placeHolder) .showImageForEmptyUri(placeHolder) .showImageOnFail(placeHolder) .cacheOnDisk(true) .cacheInMemory(true) .build(); if (userInfo.getId() != null) { String mOc_root_path = mPrefs.getString(SettingsActivity.EDT_OWNCLOUDROOTPATH_STRING, null); String avatarUrl = mOc_root_path + "/index.php/avatar/" + Uri.encode(userInfo.getId()) + "/64"; ImageLoader.getInstance().displayImage(avatarUrl, binding.toolbarLayout.avatar, displayImageOptions); if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.O) { binding.toolbarLayout.avatar.setTooltipText(userInfo.getDisplayName()); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserInfoUpdated File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onUserInfoUpdated
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
@Override public void setCrossProfilePackages(ComponentName who, List<String> packageNames) { if (!mHasFeature) { return; } Objects.requireNonNull(who, "ComponentName is null"); Objects.requireNonNull(packageNames, "Package names is null"); final CallerIdentity caller = getCallerIdentity(who); final List<String> previousCrossProfilePackages; synchronized (getLockObject()) { final ActiveAdmin admin = getProfileOwnerLocked(caller); previousCrossProfilePackages = admin.mCrossProfilePackages; if (packageNames.equals(previousCrossProfilePackages)) { return; } admin.mCrossProfilePackages = packageNames; saveSettingsLocked(caller.getUserId()); } logSetCrossProfilePackages(who, packageNames); final CrossProfileApps crossProfileApps = mContext.getSystemService(CrossProfileApps.class); mInjector.binderWithCleanCallingIdentity( () -> crossProfileApps.resetInteractAcrossProfilesAppOps( previousCrossProfilePackages, new HashSet<>(packageNames))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCrossProfilePackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setCrossProfilePackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
abstract void populate();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populate File: core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
populate
core/src/main/java/net/sourceforge/jnlp/cache/CacheUtil.java
2ab070cdac087bd208f64fa8138bb709f8d7680c
0
Analyze the following code function for security vulnerabilities
public boolean isDefaultUserview(String appId, String userviewId) { boolean result = false; String userviewPath = appId + "/" + userviewId; Setting defaultUserviewSetting = setupManager.getSettingByProperty("defaultUserview"); if (defaultUserviewSetting != null) { // check app center userview is published String defaultUserviewValue = defaultUserviewSetting.getValue(); result = userviewPath.equals(defaultUserviewValue); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDefaultUserview File: wflow-core/src/main/java/org/joget/apps/userview/service/UserviewService.java Repository: jogetworkflow/jw-community The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-4560
MEDIUM
6.1
jogetworkflow/jw-community
isDefaultUserview
wflow-core/src/main/java/org/joget/apps/userview/service/UserviewService.java
ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b
0
Analyze the following code function for security vulnerabilities
private List<ShortcutInfo> prepareChangedShortcuts(List<ShortcutInfo> changedList, List<ShortcutInfo> newList, List<ShortcutInfo> deletedList, final ShortcutPackage ps) { ArraySet<String> changedIds = new ArraySet<>(); addShortcutIdsToSet(changedIds, changedList); ArraySet<String> newIds = new ArraySet<>(); addShortcutIdsToSet(newIds, newList); return prepareChangedShortcuts(changedIds, newIds, deletedList, ps); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: prepareChangedShortcuts File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
prepareChangedShortcuts
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private boolean applyImeWindowsIfNeeded(ToBooleanFunction<WindowState> callback, boolean traverseTopToBottom) { // No need to apply to IME window if the window is not the current IME layering target. if (!isImeLayeringTarget()) { return false; } // Note that we don't process IME window if the IME input target is not on the screen. // In case some unexpected IME visibility cases happen like starting the remote // animation on the keyguard but seeing the IME window that originally on the app // which behinds the keyguard. final WindowState imeInputTarget = getImeInputTarget(); if (imeInputTarget != null && !(imeInputTarget.isDrawn() || imeInputTarget.isVisible())) { return false; } return mDisplayContent.forAllImeWindows(callback, traverseTopToBottom); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyImeWindowsIfNeeded File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
applyImeWindowsIfNeeded
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public List<SsurgeonPattern> readFromDirectory(File dir) throws Exception { if (!dir.isDirectory()) throw new Exception("Given path not a directory, path="+dir.getAbsolutePath()); if (VERBOSE) System.out.println("Reading Ssurgeon patterns from directory = "+dir.getAbsolutePath()); File[] files = dir.listFiles((dir1, name) -> name.toLowerCase().endsWith(".xml")); List<SsurgeonPattern> patterns = new ArrayList<>(); for (File file : files) { try { patterns.addAll(readFromFile(file)); } catch (Exception e) { log.error(e); } } return patterns; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readFromDirectory File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3878
HIGH
7.5
stanfordnlp/CoreNLP
readFromDirectory
src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
e5bbe135a02a74b952396751ed3015e8b8252e99
0
Analyze the following code function for security vulnerabilities
public static float[] unshuffleFloatArray(byte[] input) throws IOException { float[] output = new float[input.length / 4]; int numProcessed = impl.unshuffle(input, 0, 4, input.length, output, 0); assert(numProcessed == input.length); return output; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unshuffleFloatArray File: src/main/java/org/xerial/snappy/BitShuffle.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34453
HIGH
7.5
xerial/snappy-java
unshuffleFloatArray
src/main/java/org/xerial/snappy/BitShuffle.java
820e2e074c58748b41dbd547f4edba9e108ad905
0
Analyze the following code function for security vulnerabilities
@Override public void updatePersistentConfigurationForUser(@NonNull Configuration values, int userId) { Preconditions.checkNotNull(values, "Configuration must not be null"); Preconditions.checkArgumentNonnegative(userId, "userId " + userId + " not supported"); synchronized (ActivityManagerService.this) { updateConfigurationLocked(values, null, false, true, userId, false /* deferResume */); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updatePersistentConfigurationForUser File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
updatePersistentConfigurationForUser
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void onStart() { publishBinderService(Context.DEVICE_POLICY_SERVICE, mService); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onStart File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
onStart
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { String urlParam = request.getParameter("url"); if (Utils.sanitizeUrl(urlParam)) { // build the UML source from the compressed request parameter String ref = request.getHeader("referer"); String ua = request.getHeader("User-Agent"); String auth = request.getHeader("Authorization"); String dom = getCorsDomain(ref, ua); try(OutputStream out = response.getOutputStream()) { request.setCharacterEncoding("UTF-8"); response.setCharacterEncoding("UTF-8"); URL url = new URL(urlParam); URLConnection connection = url.openConnection(); connection.setConnectTimeout(TIMEOUT); connection.setReadTimeout(TIMEOUT); response.setHeader("Cache-Control", "private, max-age=86400"); // Workaround for 451 response from Iconfinder CDN connection.setRequestProperty("User-Agent", "draw.io"); //Forward auth header if (auth != null) { connection.setRequestProperty("Authorization", auth); } if (dom != null && dom.length() > 0) { response.addHeader("Access-Control-Allow-Origin", dom); } // Status code pass-through and follow redirects if (connection instanceof HttpURLConnection) { ((HttpURLConnection) connection) .setInstanceFollowRedirects(true); int status = ((HttpURLConnection) connection) .getResponseCode(); int counter = 0; // Follows a maximum of 6 redirects while (counter++ <= 6 && (status == HttpURLConnection.HTTP_MOVED_PERM || status == HttpURLConnection.HTTP_MOVED_TEMP)) { String redirectUrl = connection.getHeaderField("Location"); if (!Utils.sanitizeUrl(redirectUrl)) { break; } url = new URL(redirectUrl); connection = url.openConnection(); ((HttpURLConnection) connection) .setInstanceFollowRedirects(true); connection.setConnectTimeout(TIMEOUT); connection.setReadTimeout(TIMEOUT); // Workaround for 451 response from Iconfinder CDN connection.setRequestProperty("User-Agent", "draw.io"); status = ((HttpURLConnection) connection) .getResponseCode(); } if (status >= 200 && status <= 299) { response.setStatus(status); // Copies input stream to output stream InputStream is = connection.getInputStream(); byte[] head = (contentAlwaysAllowed(urlParam)) ? emptyBytes : Utils.checkStreamContent(is); response.setContentType("application/octet-stream"); String base64 = request.getParameter("base64"); copyResponse(is, out, head, base64 != null && base64.equals("1")); } else { response.setStatus(HttpURLConnection.HTTP_PRECON_FAILED); } } else { response.setStatus(HttpURLConnection.HTTP_UNSUPPORTED_TYPE); } out.flush(); log.log(Level.FINEST, "processed proxy request: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); } catch (DeadlineExceededException e) { response.setStatus(HttpServletResponse.SC_REQUEST_TIMEOUT); } catch (UnknownHostException | FileNotFoundException e) { // do not log 404 and DNS errors response.setStatus(HttpServletResponse.SC_NOT_FOUND); } catch (UnsupportedContentException e) { response.setStatus(HttpServletResponse.SC_FORBIDDEN); log.log(Level.SEVERE, "proxy request with invalid content: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); } catch (Exception e) { response.setStatus( HttpServletResponse.SC_INTERNAL_SERVER_ERROR); log.log(Level.FINE, "proxy request failed: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); e.printStackTrace(); } } else { response.setStatus(HttpServletResponse.SC_BAD_REQUEST); log.log(Level.SEVERE, "proxy request with invalid URL parameter: url=" + ((urlParam != null) ? urlParam : "[null]")); } }
Vulnerability Classification: - CWE: CWE-601, CWE-918 - CVE: CVE-2022-1767 - Severity: MEDIUM - CVSS Score: 5.0 Description: 18.0.7 release Function: doGet File: src/main/java/com/mxgraph/online/ProxyServlet.java Repository: jgraph/drawio Fixed Code: protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { String urlParam = request.getParameter("url"); if (Utils.sanitizeUrl(urlParam)) { // build the UML source from the compressed request parameter String ref = request.getHeader("referer"); String ua = request.getHeader("User-Agent"); String auth = request.getHeader("Authorization"); String dom = getCorsDomain(ref, ua); try(OutputStream out = response.getOutputStream()) { request.setCharacterEncoding("UTF-8"); response.setCharacterEncoding("UTF-8"); URL url = new URL(urlParam); URLConnection connection = url.openConnection(); connection.setConnectTimeout(TIMEOUT); connection.setReadTimeout(TIMEOUT); response.setHeader("Cache-Control", "private, max-age=86400"); // Workaround for 451 response from Iconfinder CDN connection.setRequestProperty("User-Agent", "draw.io"); //Forward auth header if (auth != null) { connection.setRequestProperty("Authorization", auth); } if (dom != null && dom.length() > 0) { response.addHeader("Access-Control-Allow-Origin", dom); } // Status code pass-through and follow redirects if (connection instanceof HttpURLConnection) { ((HttpURLConnection) connection) .setInstanceFollowRedirects(false); int status = ((HttpURLConnection) connection) .getResponseCode(); int counter = 0; // Follows a maximum of 6 redirects while (counter++ <= 6 && (int)(status / 10) == 30) //Any redirect status 30x { String redirectUrl = connection.getHeaderField("Location"); if (!Utils.sanitizeUrl(redirectUrl)) { break; } url = new URL(redirectUrl); connection = url.openConnection(); ((HttpURLConnection) connection) .setInstanceFollowRedirects(false); connection.setConnectTimeout(TIMEOUT); connection.setReadTimeout(TIMEOUT); // Workaround for 451 response from Iconfinder CDN connection.setRequestProperty("User-Agent", "draw.io"); status = ((HttpURLConnection) connection) .getResponseCode(); } if (status >= 200 && status <= 299) { response.setStatus(status); // Copies input stream to output stream InputStream is = connection.getInputStream(); byte[] head = (contentAlwaysAllowed(urlParam)) ? emptyBytes : Utils.checkStreamContent(is); response.setContentType("application/octet-stream"); String base64 = request.getParameter("base64"); copyResponse(is, out, head, base64 != null && base64.equals("1")); } else { response.setStatus(HttpURLConnection.HTTP_PRECON_FAILED); } } else { response.setStatus(HttpURLConnection.HTTP_UNSUPPORTED_TYPE); } out.flush(); log.log(Level.FINEST, "processed proxy request: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); } catch (DeadlineExceededException e) { response.setStatus(HttpServletResponse.SC_REQUEST_TIMEOUT); } catch (UnknownHostException | FileNotFoundException e) { // do not log 404 and DNS errors response.setStatus(HttpServletResponse.SC_NOT_FOUND); } catch (UnsupportedContentException e) { response.setStatus(HttpServletResponse.SC_FORBIDDEN); log.log(Level.SEVERE, "proxy request with invalid content: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); } catch (Exception e) { response.setStatus( HttpServletResponse.SC_INTERNAL_SERVER_ERROR); log.log(Level.FINE, "proxy request failed: url=" + ((urlParam != null) ? urlParam : "[null]") + ", referer=" + ((ref != null) ? ref : "[null]") + ", user agent=" + ((ua != null) ? ua : "[null]")); e.printStackTrace(); } } else { response.setStatus(HttpServletResponse.SC_BAD_REQUEST); log.log(Level.SEVERE, "proxy request with invalid URL parameter: url=" + ((urlParam != null) ? urlParam : "[null]")); } }
[ "CWE-601", "CWE-918" ]
CVE-2022-1767
MEDIUM
5
jgraph/drawio
doGet
src/main/java/com/mxgraph/online/ProxyServlet.java
c63f3a04450f30798df47f9badbc74eb8a69fbdf
1
Analyze the following code function for security vulnerabilities
private static void serializeProvider(XmlSerializer out, Provider p) throws IOException { out.startTag(null, "p"); out.attribute(null, "pkg", p.info.provider.getPackageName()); out.attribute(null, "cl", p.info.provider.getClassName()); out.attribute(null, "tag", Integer.toHexString(p.tag)); out.endTag(null, "p"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: serializeProvider File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
serializeProvider
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
private boolean canInstallCertificates(CallerIdentity caller) { if (isPermissionCheckFlagEnabled()) { return hasPermission(MANAGE_DEVICE_POLICY_CERTIFICATES, caller.getPackageName(), caller.getUserId()); } else { return isProfileOwner(caller) || isDefaultDeviceOwner(caller) || isCallerDelegate(caller, DELEGATION_CERT_INSTALL); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canInstallCertificates File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
canInstallCertificates
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private String getProperty(String propertyName, String defaultValue) { String val = properties.get(propertyName); if (val == null) { return defaultValue; } return val; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProperty File: Ports/Android/src/com/codename1/impl/android/PushNotificationService.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getProperty
Ports/Android/src/com/codename1/impl/android/PushNotificationService.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void finishScreenTurningOn() { final ScreenOnListener listener; final boolean enableScreen; synchronized (mLock) { if (DEBUG_WAKEUP) Slog.d(TAG, "finishScreenTurningOn: mAwake=" + mAwake + ", mScreenOnEarly=" + mScreenOnEarly + ", mScreenOnFully=" + mScreenOnFully + ", mKeyguardDrawComplete=" + mKeyguardDrawComplete + ", mWindowManagerDrawComplete=" + mWindowManagerDrawComplete); if (mScreenOnFully || !mScreenOnEarly || !mWindowManagerDrawComplete || (mAwake && !mKeyguardDrawComplete)) { return; // spurious or not ready yet } if (DEBUG_WAKEUP) Slog.i(TAG, "Finished screen turning on..."); listener = mScreenOnListener; mScreenOnListener = null; mScreenOnFully = true; // Remember the first time we draw the keyguard so we know when we're done with // the main part of booting and can enable the screen and hide boot messages. if (!mKeyguardDrawnOnce && mAwake) { mKeyguardDrawnOnce = true; enableScreen = true; if (mBootMessageNeedsHiding) { mBootMessageNeedsHiding = false; hideBootMessages(); } } else { enableScreen = false; } } if (listener != null) { listener.onScreenOn(); } if (enableScreen) { try { mWindowManager.enableScreenIfNeeded(); } catch (RemoteException unhandled) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishScreenTurningOn File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
finishScreenTurningOn
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void getTopShortcutsFromPersistence(AndroidFuture<List<ShortcutInfo>> cb) { if (!isAppSearchEnabled()) { cb.complete(null); } runAsSystem(() -> fromAppSearch().thenAccept(session -> { SearchResults res = session.search("", getSearchSpec()); res.getNextPage(mShortcutUser.mExecutor, results -> { if (!results.isSuccess()) { cb.completeExceptionally(new IllegalStateException(results.getErrorMessage())); return; } cb.complete(results.getResultValue().stream() .map(SearchResult::getGenericDocument) .map(doc -> ShortcutInfo.createFromGenericDocument( mShortcutUser.getUserId(), doc)) .collect(Collectors.toList())); }); })); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTopShortcutsFromPersistence File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
getTopShortcutsFromPersistence
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
private int logoutUserUnchecked(@UserIdInt int userIdToStop) { int logoutUserId = getLogoutUserIdUnchecked(); if (logoutUserId == UserHandle.USER_NULL) { // Could happen on devices using headless system user mode when called before calling // switchUser() or startUserInBackground() first Slogf.w(LOG_TAG, "logoutUser(): could not determine which user to switch to"); return UserManager.USER_OPERATION_ERROR_UNKNOWN; } final long id = mInjector.binderClearCallingIdentity(); try { Slogf.i(LOG_TAG, "logoutUser(): switching to user %d", logoutUserId); if (!mInjector.getIActivityManager().switchUser(logoutUserId)) { Slogf.w(LOG_TAG, "Failed to switch to user %d", logoutUserId); // This should never happen as target user is determined by getPreviousUserId() return UserManager.USER_OPERATION_ERROR_UNKNOWN; } clearLogoutUser(); } catch (RemoteException e) { // Same process, should not happen. return UserManager.USER_OPERATION_ERROR_UNKNOWN; } finally { mInjector.binderRestoreCallingIdentity(id); } return stopUserUnchecked(userIdToStop); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: logoutUserUnchecked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
logoutUserUnchecked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void fillPortableFactories(Node node, SerializationConfig serializationConfig) { for (Node child : childElements(node)) { final String name = cleanNodeName(child); if ("portable-factory".equals(name)) { final String value = getTextContent(child); final Node factoryIdNode = child.getAttributes().getNamedItem("factory-id"); if (factoryIdNode == null) { throw new IllegalArgumentException("'factory-id' attribute of 'portable-factory' is required!"); } int factoryId = Integer.parseInt(getTextContent(factoryIdNode)); serializationConfig.addPortableFactoryClass(factoryId, value); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fillPortableFactories File: hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
fillPortableFactories
hazelcast/src/main/java/com/hazelcast/config/AbstractXmlConfigHelper.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public void setConnectTimeout(final int connectTimeout) { this.connectTimeout = connectTimeout; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConnectTimeout File: pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java Repository: pac4j The code follows secure coding practices.
[ "CWE-347" ]
CVE-2021-44878
MEDIUM
5
pac4j
setConnectTimeout
pac4j-oidc/src/main/java/org/pac4j/oidc/config/OidcConfiguration.java
22b82ffd702a132d9f09da60362fc6264fc281ae
0
Analyze the following code function for security vulnerabilities
public void init() { // reads SMTP server setting from web.xml file ServletContext context = getServletContext(); host = context.getInitParameter("host"); port = context.getInitParameter("port"); user = context.getInitParameter("user"); pass = context.getInitParameter("pass"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: src/com/bijay/onlinevotingsystem/controller/VoterLoginController.java Repository: bijaythapaa/OnlineVotingSystem The code follows secure coding practices.
[ "CWE-916" ]
CVE-2021-21253
MEDIUM
5
bijaythapaa/OnlineVotingSystem
init
src/com/bijay/onlinevotingsystem/controller/VoterLoginController.java
0181cb0272857696c8eb3e44fcf6cb014ff90f09
0
Analyze the following code function for security vulnerabilities
@Override public void onBackPressed() { if(!handlePodcastBackPressed()) { if (binding.drawerLayout != null) { if (binding.drawerLayout.isDrawerOpen(GravityCompat.START)) super.onBackPressed(); else binding.drawerLayout.openDrawer(GravityCompat.START); } else { super.onBackPressed(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBackPressed File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
onBackPressed
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0