instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public static void copyFile(File source, File target, long sourceCount) { if (!source.exists()) { throw new IllegalArgumentException("Source does not exist " + source.getAbsolutePath()); } if (!source.isFile()) { throw new IllegalArgumentException("Source is not a file " + source.getAbsolutePath()); } if (!target.exists() && !target.mkdirs()) { throw new HazelcastException("Could not create the target directory " + target.getAbsolutePath()); } final File destination = target.isDirectory() ? new File(target, source.getName()) : target; FileInputStream in = null; FileOutputStream out = null; try { in = new FileInputStream(source); out = new FileOutputStream(destination); final FileChannel inChannel = in.getChannel(); final FileChannel outChannel = out.getChannel(); final long transferCount = sourceCount > 0 ? sourceCount : inChannel.size(); inChannel.transferTo(0, transferCount, outChannel); } catch (Exception e) { throw new HazelcastException("Error occurred while copying file", e); } finally { closeResource(in); closeResource(out); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyFile File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
copyFile
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public String getName() { return internal.getName(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getName
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public void requestBugReport() { enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport"); SystemProperties.set("ctl.start", "bugreport"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestBugReport File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
requestBugReport
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
UriPermissionOwner getUriPermissionsLocked() { if (uriPermissions == null) { uriPermissions = new UriPermissionOwner(mAtmService.mUgmInternal, this); } return uriPermissions; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUriPermissionsLocked File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
getUriPermissionsLocked
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void addConfigAttribute(ProfileAttribute configAttr) { configAttrs.add(configAttr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addConfigAttribute File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
addConfigAttribute
base/common/src/main/java/com/netscape/certsrv/profile/ProfileInput.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private PostgresClient postgresClientConnectionThrowsException() { SQLConnection sqlConnection = new PostgreSQLConnectionImpl(null, null, null) { @Override public SQLConnection update(String sql, Handler<AsyncResult<UpdateResult>> resultHandler) { throw new RuntimeException(); } @Override public SQLConnection updateWithParams(String sql, JsonArray params, Handler<AsyncResult<UpdateResult>> resultHandler) { throw new RuntimeException(); } @Override public void close(Handler<AsyncResult<Void>> handler) { handler.handle(Future.succeededFuture()); } @Override public void close() { // nothing to do } }; AsyncSQLClient client = new AsyncSQLClient() { @Override public SQLClient getConnection(Handler<AsyncResult<SQLConnection>> handler) { handler.handle(Future.succeededFuture(sqlConnection)); return this; } @Override public void close(Handler<AsyncResult<Void>> handler) { handler.handle(Future.succeededFuture()); } @Override public void close() { // nothing to do } }; try { setRootLevel(Level.FATAL); PostgresClient postgresClient = new PostgresClient(vertx, TENANT); postgresClient.setClient(client); return postgresClient; } catch (Exception e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postgresClientConnectionThrowsException File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
postgresClientConnectionThrowsException
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public void updateOomAdj() { synchronized (ActivityManagerService.this) { ActivityManagerService.this.updateOomAdjLocked(OomAdjuster.OOM_ADJ_REASON_NONE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateOomAdj File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateOomAdj
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void finishReceiver(IBinder who, int resultCode, String resultData, Bundle resultExtras, boolean resultAbort) { if (DEBUG_BROADCAST) Slog.v(TAG, "Finish receiver: " + who); // Refuse possible leaked file descriptors if (resultExtras != null && resultExtras.hasFileDescriptors()) { throw new IllegalArgumentException("File descriptors passed in Bundle"); } final long origId = Binder.clearCallingIdentity(); try { boolean doNext = false; BroadcastRecord r; synchronized(this) { r = broadcastRecordForReceiverLocked(who); if (r != null) { doNext = r.queue.finishReceiverLocked(r, resultCode, resultData, resultExtras, resultAbort, true); } } if (doNext) { r.queue.processNextBroadcast(false); } trimApplications(); } finally { Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishReceiver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
finishReceiver
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public static PdfObject getPdfObjectRelease(PdfObject obj, PdfObject parent) { PdfObject obj2 = getPdfObject(obj, parent); releaseLastXrefPartial(obj); return obj2; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPdfObjectRelease File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
getPdfObjectRelease
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
private Map<Long, ServiceReference<?>> filterReferencesByContextPath( ServiceReference<?>[] references) { Map<Long, ServiceReference<?>> matchedReferences = new HashMap<>(); for (ServiceReference<?> reference : references) { if (reference.getUsingBundles().length > 0) { Object path = reference.getProperty( HttpWhiteboardConstants.HTTP_WHITEBOARD_CONTEXT_PATH); if (contextPath.equals(path)) { matchedReferences.put( reference.getBundle().getBundleId(), reference); } } } return matchedReferences; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: filterReferencesByContextPath File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java Repository: vaadin/osgi The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-31407
MEDIUM
5
vaadin/osgi
filterReferencesByContextPath
flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8
0
Analyze the following code function for security vulnerabilities
private void notifyInterruptionFilterChanged(ManagedServiceInfo info, int interruptionFilter) { final INotificationListener listener = (INotificationListener) info.service; try { listener.onInterruptionFilterChanged(interruptionFilter); } catch (RemoteException ex) { Log.e(TAG, "unable to notify listener (interruption filter): " + listener, ex); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyInterruptionFilterChanged File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
notifyInterruptionFilterChanged
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@GuardedBy("mLock") private void unloadUserLocked(int userId) { if (DEBUG || DEBUG_REBOOT) { Slog.d(TAG, "unloadUserLocked: user=" + userId); } // Cancel any ongoing background tasks. getUserShortcutsLocked(userId).cancelAllInFlightTasks(); // Save all dirty information. saveDirtyInfo(); // Unload mUsers.delete(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unloadUserLocked File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
unloadUserLocked
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
@Override public void setLocationPackagesProvider(PackagesProvider provider) { synchronized (mPackages) { mDefaultPermissionPolicy.setLocationPackagesProviderLPw(provider); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLocationPackagesProvider File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
setLocationPackagesProvider
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void loginAndGotoPage(String username, String password, String pageURL) { loginAndGotoPage(username, password, pageURL, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loginAndGotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
loginAndGotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
public String getImeiForSubscriber(int subId) { PhoneSubInfoProxy phoneSubInfoProxy = getPhoneSubInfoProxy(subId); if (phoneSubInfoProxy != null) { return phoneSubInfoProxy.getImei(); } else { Rlog.e(TAG,"getDeviceId phoneSubInfoProxy is null" + " for Subscription:" + subId); return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getImeiForSubscriber File: src/java/com/android/internal/telephony/PhoneSubInfoController.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-0831
MEDIUM
4.3
android
getImeiForSubscriber
src/java/com/android/internal/telephony/PhoneSubInfoController.java
79eecef63f3ea99688333c19e22813f54d4a31b1
0
Analyze the following code function for security vulnerabilities
public void finishReceiver(IBinder who, int resultCode, String resultData, Bundle map, boolean abortBroadcast, int flags) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(who); data.writeInt(resultCode); data.writeString(resultData); data.writeBundle(map); data.writeInt(abortBroadcast ? 1 : 0); data.writeInt(flags); mRemote.transact(FINISH_RECEIVER_TRANSACTION, data, reply, IBinder.FLAG_ONEWAY); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishReceiver File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
finishReceiver
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public int movePackage(final String packageName, final String volumeUuid) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MOVE_PACKAGE, null); final int moveId = mNextMoveId.getAndIncrement(); mHandler.post(new Runnable() { @Override public void run() { try { movePackageInternal(packageName, volumeUuid, moveId); } catch (PackageManagerException e) { Slog.w(TAG, "Failed to move " + packageName, e); mMoveCallbacks.notifyStatusChanged(moveId, PackageManager.MOVE_FAILED_INTERNAL_ERROR); } } }); return moveId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: movePackage File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
movePackage
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private int peek() throws IOException { return peek(0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: peek File: src/main/org/hjson/HjsonParser.java Repository: hjson/hjson-java The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-34620
HIGH
7.5
hjson/hjson-java
peek
src/main/org/hjson/HjsonParser.java
00e3b1325cb6c2b80b347dbec9181fd17ce0a599
0
Analyze the following code function for security vulnerabilities
private void retryUploads(Intent intent, User user, List<String> requestedUploads) { boolean onWifiOnly; boolean whileChargingOnly; OCUpload upload = intent.getParcelableExtra(KEY_RETRY_UPLOAD); onWifiOnly = upload.isUseWifiOnly(); whileChargingOnly = upload.isWhileChargingOnly(); UploadFileOperation newUpload = new UploadFileOperation( mUploadsStorageManager, connectivityService, powerManagementService, user, null, upload, upload.getNameCollisionPolicy(), upload.getLocalAction(), this, onWifiOnly, whileChargingOnly, true, new FileDataStorageManager(user, getContentResolver()) ); newUpload.addDataTransferProgressListener(this); newUpload.addDataTransferProgressListener((FileUploaderBinder) mBinder); newUpload.addRenameUploadListener(this); Pair<String, String> putResult = mPendingUploads.putIfAbsent( user.getAccountName(), upload.getRemotePath(), newUpload ); if (putResult != null) { String uploadKey = putResult.first; requestedUploads.add(uploadKey); // Update upload in database upload.setUploadStatus(UploadStatus.UPLOAD_IN_PROGRESS); mUploadsStorageManager.updateUpload(upload); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retryUploads File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
retryUploads
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@Override public void waitOnHandlers() { try { Log.startSession("TSI.wOH"); enforceModifyPermission(); synchronized (mLock) { long token = Binder.clearCallingIdentity(); try { Log.i(this, "waitOnHandlers"); mCallsManager.waitOnHandlers(); } finally { Binder.restoreCallingIdentity(token); } } } finally { Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: waitOnHandlers File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
waitOnHandlers
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
void pendingAssistExtrasTimedOut(PendingAssistExtras pae) { IResultReceiver receiver; synchronized (this) { mPendingAssistExtras.remove(pae); receiver = pae.receiver; } if (receiver != null) { // Caller wants result sent back to them. try { pae.receiver.send(0, null); } catch (RemoteException e) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pendingAssistExtrasTimedOut File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
pendingAssistExtrasTimedOut
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
int getConnectionState(BluetoothDevice device) { enforceCallingOrSelfPermission(BLUETOOTH_PERM, "Need BLUETOOTH permission"); byte[] addr = Utils.getBytesFromAddress(device.getAddress()); return getConnectionStateNative(addr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectionState File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
getConnectionState
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
public List<X509Certificate> getCertificatesInLineage() { return mCertificateLineage; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCertificatesInLineage File: src/main/java/com/android/apksig/ApkVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getCertificatesInLineage
src/main/java/com/android/apksig/ApkVerifier.java
039f815895f62c9f8af23df66622b66246f3f61e
0
Analyze the following code function for security vulnerabilities
public ImportedFiles withCurrentDir(AParentFolder newCurrentDir) { if (newCurrentDir == null) { return this; } return new ImportedFiles(imported, newCurrentDir); }
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2023-3431 - Severity: MEDIUM - CVSS Score: 5.3 Description: feat: remove legacy ALLOW_INCLUDE use PLANTUML_SECURITY_PROFILE instead https://github.com/plantuml/plantuml-server/issues/232 Function: withCurrentDir File: src/net/sourceforge/plantuml/preproc/ImportedFiles.java Repository: plantuml Fixed Code: public ImportedFiles withCurrentDir(AParentFolder newCurrentDir) { if (newCurrentDir == null) return this; return new ImportedFiles(imported, newCurrentDir); }
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
withCurrentDir
src/net/sourceforge/plantuml/preproc/ImportedFiles.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
1
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = MANAGE_DEVICE_POLICY_LOCK_TASK, conditional = true) public @LockTaskFeature int getLockTaskFeatures(@Nullable ComponentName admin) { throwIfParentInstance("getLockTaskFeatures"); if (mService != null) { try { return mService.getLockTaskFeatures(admin, mContext.getPackageName()); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockTaskFeatures File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getLockTaskFeatures
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public final String getClientId() { return clientId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClientId File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
getClientId
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
public void setEnabled(boolean enabled) { this.enabled = enabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEnabled File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setEnabled
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
void startSetupActivityLocked() { // Only do this once per boot. if (mCheckedForSetup) { return; } // We will show this screen if the current one is a different // version than the last one shown, and we are not running in // low-level factory test mode. final ContentResolver resolver = mContext.getContentResolver(); if (mFactoryTest != FactoryTest.FACTORY_TEST_LOW_LEVEL && Settings.Global.getInt(resolver, Settings.Global.DEVICE_PROVISIONED, 0) != 0) { mCheckedForSetup = true; // See if we should be showing the platform update setup UI. final Intent intent = new Intent(Intent.ACTION_UPGRADE_SETUP); final List<ResolveInfo> ris = mContext.getPackageManager().queryIntentActivities(intent, PackageManager.MATCH_SYSTEM_ONLY | PackageManager.GET_META_DATA); if (!ris.isEmpty()) { final ResolveInfo ri = ris.get(0); String vers = ri.activityInfo.metaData != null ? ri.activityInfo.metaData.getString(Intent.METADATA_SETUP_VERSION) : null; if (vers == null && ri.activityInfo.applicationInfo.metaData != null) { vers = ri.activityInfo.applicationInfo.metaData.getString( Intent.METADATA_SETUP_VERSION); } String lastVers = Settings.Secure.getString( resolver, Settings.Secure.LAST_SETUP_SHOWN); if (vers != null && !vers.equals(lastVers)) { intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); intent.setComponent(new ComponentName( ri.activityInfo.packageName, ri.activityInfo.name)); mActivityStarter.startActivityLocked(null, intent, null /*ephemeralIntent*/, null, ri.activityInfo, null /*rInfo*/, null, null, null, null, 0, 0, 0, null, 0, 0, 0, null, false, false, null, null, null); } } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startSetupActivityLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
startSetupActivityLocked
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
@Override public void registerUserSwitchObserver(IUserSwitchObserver observer, String name) { mUserController.registerUserSwitchObserver(observer, name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: registerUserSwitchObserver File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
registerUserSwitchObserver
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private UserReference userStringToUserReference(String userString) { // The user API is missing the concept of relative user references ATM so if we want to resolve (partial) user // references that were stored in the database relative to this document then we need to check where the users // are stored. See also XWIKI-19442: APIs to generate various String references from a UserReference if ("document".equals(getUserConfiguration().getStoreHint())) { return getUserReferenceStringResolver().resolve(userString, getDocumentReference().getWikiReference()); } else { return getUserReferenceStringResolver().resolve(userString); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: userStringToUserReference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
userStringToUserReference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public InputStream getInputStream(String prefix, String path, Map<String, ?> queryParams, Object... elements) throws Exception { String cleanPrefix = prefix.endsWith("/") ? prefix.substring(0, prefix.length() - 1) : prefix; if (path.startsWith(cleanPrefix)) { cleanPrefix = ""; } UriBuilder builder = UriBuilder.fromUri(cleanPrefix).path(path.startsWith("/") ? path.substring(1) : path); if (queryParams != null) { for (Map.Entry<String, ?> entry : queryParams.entrySet()) { if (entry.getValue() instanceof Object[]) { builder.queryParam(entry.getKey(), (Object[]) entry.getValue()); } else { builder.queryParam(entry.getKey(), entry.getValue()); } } } String url = builder.build(elements).toString(); return executeGet(url, Status.OK.getStatusCode()).getResponseBodyAsStream(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputStream File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getInputStream
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public void afterPropertiesSet() { applicationEventPublisher.registerListener(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: afterPropertiesSet File: spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java Repository: infinispan The code follows secure coding practices.
[ "CWE-384" ]
CVE-2019-10158
HIGH
7.5
infinispan
afterPropertiesSet
spring/spring5/spring5-common/src/main/java/org/infinispan/spring/common/session/AbstractInfinispanSessionRepository.java
f3efef8de7fec4108dd5ab725cea6ae09f14815d
0
Analyze the following code function for security vulnerabilities
protected String checkoutFileOrImage(Cell cell) { List<String> urls = new ArrayList<>(); for (String s : cell.asString().split(MVAL_SPLIT)) { if (EasyUrl.isUrl(s) || s.startsWith("rb/")) urls.add(s); } return urls.isEmpty() ? null : JSON.toJSON(urls).toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkoutFileOrImage File: src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
checkoutFileOrImage
src/main/java/com/rebuild/core/service/dataimport/RecordCheckout.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
public int getProfileParent(int profileId) { final long identity = Binder.clearCallingIdentity(); try { UserInfo parent = mUserManager.getProfileParent(profileId); if (parent != null) { return parent.getUserHandle().getIdentifier(); } } finally { Binder.restoreCallingIdentity(identity); } return UNKNOWN_USER_ID; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileParent File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getProfileParent
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public boolean blockBuildWhenDownstreamBuilding() { return blockBuildWhenDownstreamBuilding; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: blockBuildWhenDownstreamBuilding File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
blockBuildWhenDownstreamBuilding
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
public long getMaximumSize() { long pageCount = DatabaseUtils.longForQuery(this, "PRAGMA max_page_count;", null); return pageCount * getPageSize(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumSize File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
getMaximumSize
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
String getPayload() { return ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPayload File: Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getPayload
Ports/Android/src/com/codename1/impl/android/CodenameOneActivity.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Deprecated public BaseObject newObject(String className, XWikiContext context) throws XWikiException { return newXObject( getXClassEntityReferenceResolver().resolve(className, EntityType.DOCUMENT, getDocumentReference()), context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
newObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public long getPasswordExpiration(ComponentName who, int userHandle, boolean parent) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return 0L; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization(hasFullCrossUsersPermission(caller, userHandle)); synchronized (getLockObject()) { return getPasswordExpirationLocked(who, userHandle, parent); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordExpiration File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPasswordExpiration
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public static <BEAN> Grid<BEAN> withPropertySet( PropertySet<BEAN> propertySet) { return new Grid<>(propertySet); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withPropertySet File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
withPropertySet
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
public int getData(String name) { final Pattern p = Pattern.compile("(?i)<svg[^>]+" + name + "\\W+(\\d+)"); final Matcher m = p.matcher(svg); if (m.find()) { final String s = m.group(1); return Integer.parseInt(s); } final Pattern p2 = Pattern.compile("viewBox[= \"\']+([0-9.]+)[\\s,]+([0-9.]+)[\\s,]+([0-9.]+)[\\s,]+([0-9.]+)"); final Matcher m2 = p2.matcher(svg); if (m2.find()) { if ("width".equals(name)) { final String s = m2.group(3); final int width = (int) Double.parseDouble(s); return width; } if ("height".equals(name)) { final String s = m2.group(4); final int result = (int) Double.parseDouble(s); return result; } } throw new IllegalStateException("Cannot find " + name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getData File: src/net/sourceforge/plantuml/ugraphic/UImageSvg.java Repository: plantuml The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-1231
MEDIUM
4.3
plantuml
getData
src/net/sourceforge/plantuml/ugraphic/UImageSvg.java
c9137be051ce98b3e3e27f65f54ec7d9f8886903
0
Analyze the following code function for security vulnerabilities
public void setTampered(boolean tampered) { this.tampered = tampered; pageRefs.keepPages(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTampered File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
setTampered
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
public void setForceEphemeralUsers( @NonNull ComponentName admin, boolean forceEphemeralUsers) { throwIfParentInstance("setForceEphemeralUsers"); if (mService != null) { try { mService.setForceEphemeralUsers(admin, forceEphemeralUsers); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setForceEphemeralUsers File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setForceEphemeralUsers
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private Matcher matchResultLine(String resultLine) { return GIT_DIFF_TREE_PATTERN.matcher(resultLine); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: matchResultLine File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
matchResultLine
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public boolean shouldDumpUid() { return mDumpUid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: shouldDumpUid File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
shouldDumpUid
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private void HEXLOG(byte[] block) { int offset = 0; int todo = block.length; StringBuilder buf = new StringBuilder(64); while (todo > 0) { buf.append(String.format("%04x ", offset)); int numThisLine = (todo > 16) ? 16 : todo; for (int i = 0; i < numThisLine; i++) { buf.append(String.format("%02x ", block[offset+i])); } Slog.i("hexdump", buf.toString()); buf.setLength(0); todo -= numThisLine; offset += numThisLine; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: HEXLOG File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
HEXLOG
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
public void ensureImmutableShortcutsNotIncluded(@NonNull List<ShortcutInfo> shortcuts, boolean ignoreInvisible) { for (int i = shortcuts.size() - 1; i >= 0; i--) { ensureNotImmutable(shortcuts.get(i).getId(), ignoreInvisible); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureImmutableShortcutsNotIncluded File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
ensureImmutableShortcutsNotIncluded
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
@Override public void printXMLElement(String name, Map<String, String> attributes) { handleSpaceWhenStartElement(); super.printXMLElement(name, attributes); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-32070 - Severity: MEDIUM - CVSS Score: 6.1 Description: XRENDERING-663: Restrict allowed attributes in HTML rendering * Change HTML renderers to only print allowed attributes and elements. * Add prefix to forbidden attributes to preserve them in XWiki syntax. * Adapt tests to expect that invalid attributes get a prefix. Function: printXMLElement File: xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java Repository: xwiki/xwiki-rendering Fixed Code: @Override public void printXMLElement(String name, Map<String, String> attributes) { if (this.htmlElementSanitizer == null || this.htmlElementSanitizer.isElementAllowed(name)) { handleSpaceWhenStartElement(); super.printXMLElement(name, cleanAttributes(name, attributes)); } }
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
printXMLElement
xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
1
Analyze the following code function for security vulnerabilities
@Override public String convert(String url) throws DiffException { if (url.startsWith("data:")) { // Already data URI. return url; } String cachedDataURI = this.cache.get(url); if (cachedDataURI == null) { try { cachedDataURI = convert(getAbsoluteURI(url)); this.cache.set(url, cachedDataURI); } catch (IOException | URISyntaxException e) { throw new DiffException("Failed to convert [" + url + "] to data URI.", e); } } return cachedDataURI; }
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2023-48240 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20818: Improve data URI converter * Cache failures * Properly dispose the caches * Only send requests to trusted domains * Only embed actual images * Limit responses to 1MB * Introduce configuration options for timeout, maximum size and if the feature is enabled at all * Add a UI test that checks that attachment embedding is working in general * Move to httpclient5 * Expose the cookie domains configuration in AuthenticationConfiguration Function: convert File: xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java Repository: xwiki/xwiki-platform Fixed Code: @Override public String convert(String url) throws DiffException { if (url.startsWith("data:") || !this.configuration.isEnabled()) { // Already data URI. return url; } // Convert URL to absolute URL to avoid issues with relative URLs that might reference different images // in different subwikis. URL absoluteURL = getAbsoluteURL(url, this.xcontextProvider.get()); String cacheKey = getCacheKey(absoluteURL); try { String dataURI = this.cache.get(cacheKey); if (dataURI == null) { DiffException failure = this.failureCache.get(cacheKey); if (failure != null) { throw failure; } dataURI = convert(absoluteURL); this.cache.set(cacheKey, dataURI); } return dataURI; } catch (IOException | URISyntaxException e) { DiffException diffException = new DiffException("Failed to convert [" + url + "] to data URI.", e); this.failureCache.set(cacheKey, diffException); throw diffException; } }
[ "CWE-918" ]
CVE-2023-48240
HIGH
8.8
xwiki/xwiki-platform
convert
xwiki-platform-core/xwiki-platform-diff/xwiki-platform-diff-xml/src/main/java/org/xwiki/diff/xml/internal/DefaultDataURIConverter.java
bff0203e739b6e3eb90af5736f04278c73c2a8bb
1
Analyze the following code function for security vulnerabilities
public boolean isBatteryLow() { return level < LOW_BATTERY_THRESHOLD; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBatteryLow File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
isBatteryLow
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private static void traverse(final Binder binder, final String p, final ConfigObject root) { root.forEach((n, v) -> { if (v instanceof ConfigObject) { ConfigObject child = (ConfigObject) v; String path = p + n; Named named = Names.named(path); binder.bind(Config.class).annotatedWith(named).toInstance(child.toConfig()); traverse(binder, path + ".", child); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: traverse File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
traverse
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public boolean isMod(Profile authUser) { return authUser != null && (isAdmin(authUser) || User.Groups.MODS.toString().equals(authUser.getGroups())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isMod File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
isMod
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
@Override public boolean onCanceledViaNewOutgoingCallBroadcast(final Call call) { mPendingCallsToDisconnect.add(call); mHandler.postDelayed(new Runnable() { @Override public void run() { if (mPendingCallsToDisconnect.remove(call)) { Log.i(this, "Delayed disconnection of call: %s", call); call.disconnect(); } } }, Timeouts.getNewOutgoingCallCancelMillis(mContext.getContentResolver())); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCanceledViaNewOutgoingCallBroadcast File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
onCanceledViaNewOutgoingCallBroadcast
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Unstable public boolean isRestricted() { return getIntValue("restricted", 0) == 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRestricted File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
isRestricted
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
Call getActiveCall() { return getFirstCallWithState(CallState.ACTIVE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
getActiveCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
@Override public String getCharacterEncoding() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharacterEncoding File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getCharacterEncoding
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public static void init(HttpServletRequest request) throws Exception { regionList.clear(); idStr = ""; table = "variantList"; Output.rvisPercentile = null; query = request.getParameter("query").toUpperCase(); if (query.split("-").length == 4) { idStr = query; table = "variant"; } else if (query.contains(":")) { initRegionListByStr(query); } else { initRegionListByGeneName(query); initRvisByGene(query); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: src/main/java/model/Input.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
init
src/main/java/model/Input.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
public static int hashCodeAscii(CharSequence bytes) { final int length = bytes.length(); final int remainingBytes = length & 7; int hash = HASH_CODE_ASCII_SEED; // Benchmarking shows that by just naively looping for inputs 8~31 bytes long we incur a relatively large // performance penalty (only achieve about 60% performance of loop which iterates over each char). So because // of this we take special provisions to unroll the looping for these conditions. if (length >= 32) { for (int i = length - 8; i >= remainingBytes; i -= 8) { hash = hashCodeAsciiCompute(bytes, i, hash); } } else if (length >= 8) { hash = hashCodeAsciiCompute(bytes, length - 8, hash); if (length >= 16) { hash = hashCodeAsciiCompute(bytes, length - 16, hash); if (length >= 24) { hash = hashCodeAsciiCompute(bytes, length - 24, hash); } } } if (remainingBytes == 0) { return hash; } int offset = 0; if (remainingBytes != 2 & remainingBytes != 4 & remainingBytes != 6) { // 1, 3, 5, 7 hash = hash * HASH_CODE_C1 + hashCodeAsciiSanitizeByte(bytes.charAt(0)); offset = 1; } if (remainingBytes != 1 & remainingBytes != 4 & remainingBytes != 5) { // 2, 3, 6, 7 hash = hash * (offset == 0 ? HASH_CODE_C1 : HASH_CODE_C2) + hashCodeAsciiSanitize(hashCodeAsciiSanitizeShort(bytes, offset)); offset += 2; } if (remainingBytes >= 4) { // 4, 5, 6, 7 return hash * ((offset == 0 | offset == 3) ? HASH_CODE_C1 : HASH_CODE_C2) + hashCodeAsciiSanitizeInt(bytes, offset); } return hash; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCodeAscii File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
hashCodeAscii
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public static PackageManager getPackageManagerForUser(Context context, int userId) { Context contextForUser = context; // UserHandle defines special userId as negative values, e.g. USER_ALL if (userId >= 0) { try { // Create a context for the correct user so if a package isn't installed // for user 0 we can still load information about the package. contextForUser = context.createPackageContextAsUser(context.getPackageName(), Context.CONTEXT_RESTRICTED, new UserHandle(userId)); } catch (NameNotFoundException e) { // Shouldn't fail to find the package name for system ui. } } return contextForUser.getPackageManager(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPackageManagerForUser File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getPackageManagerForUser
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void writeToParcel(Parcel parcel, int flags) { final boolean oldAllowFds = parcel.pushAllowFds(false); try { writeToParcelInner(parcel, flags); } finally { parcel.restoreAllowFds(oldAllowFds); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeToParcel File: core/java/android/os/PersistableBundle.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40074
MEDIUM
5.5
android
writeToParcel
core/java/android/os/PersistableBundle.java
40e4ea759743737958dde018f3606d778f7a53f3
0
Analyze the following code function for security vulnerabilities
public String getTables() { return mTables; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTables File: core/java/android/database/sqlite/SQLiteQueryBuilder.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
getTables
core/java/android/database/sqlite/SQLiteQueryBuilder.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override public Enumeration<String> getParameterNames() { return new Vector<String>().elements(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParameterNames File: h2/src/test/org/h2/test/server/TestWeb.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
getParameterNames
h2/src/test/org/h2/test/server/TestWeb.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
public static HttpRequest create(final String method, final String destination) { return new HttpRequest() .method(method.toUpperCase()) .set(destination); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: create File: src/main/java/jodd/http/HttpRequest.java Repository: oblac/jodd-http The code follows secure coding practices.
[ "CWE-74" ]
CVE-2022-29631
MEDIUM
5
oblac/jodd-http
create
src/main/java/jodd/http/HttpRequest.java
e50f573c8f6a39212ade68c6eb1256b2889fa8a6
0
Analyze the following code function for security vulnerabilities
@Override public void setUninstallBlocked(ComponentName who, String callerPackage, String packageName, boolean uninstallBlocked) { final CallerIdentity caller = getCallerIdentity(who, callerPackage); if (isPolicyEngineForFinanceFlagEnabled()) { EnforcingAdmin enforcingAdmin = enforcePermissionsAndGetEnforcingAdmin( who, new String[]{ MANAGE_DEVICE_POLICY_APPS_CONTROL, MANAGE_DEVICE_POLICY_BLOCK_UNINSTALL }, caller.getPackageName(), caller.getUserId()); mDevicePolicyEngine.setLocalPolicy( PolicyDefinition.PACKAGE_UNINSTALL_BLOCKED(packageName), enforcingAdmin, new BooleanPolicyValue(uninstallBlocked), caller.getUserId()); } else { Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isProfileOwner(caller) || isDefaultDeviceOwner(caller) || isFinancedDeviceOwner(caller))) || (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_BLOCK_UNINSTALL))); final int userId = caller.getUserId(); synchronized (getLockObject()) { long id = mInjector.binderClearCallingIdentity(); try { mIPackageManager.setBlockUninstallForUser( packageName, uninstallBlocked, userId); } catch (RemoteException re) { // Shouldn't happen. Slogf.e(LOG_TAG, "Failed to setBlockUninstallForUser", re); } finally { mInjector.binderRestoreCallingIdentity(id); } } if (uninstallBlocked) { final PackageManagerInternal pmi = mInjector.getPackageManagerInternal(); pmi.removeNonSystemPackageSuspensions(packageName, userId); pmi.removeDistractingPackageRestrictions(packageName, userId); pmi.flushPackageRestrictions(userId); } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_UNINSTALL_BLOCKED) .setAdmin(caller.getPackageName()) .setBoolean(/* isDelegate */ isCallerDelegate(caller)) .setStrings(packageName) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUninstallBlocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setUninstallBlocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void dispatch(Tag tag) throws RemoteException { NfcPermissions.enforceAdminPermissions(mContext); mNfcDispatcher.dispatchTag(tag); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatch File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
dispatch
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Override public List<Collection> findAll(Context context, Integer limit, Integer offset) throws SQLException { MetadataField nameField = metadataFieldService.findByElement(context, MetadataSchemaEnum.DC.getName(), "title", null); if (nameField == null) { throw new IllegalArgumentException( "Required metadata field '" + MetadataSchemaEnum.DC.getName() + ".title' doesn't exist!"); } return collectionDAO.findAll(context, nameField, limit, offset); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findAll File: dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
findAll
dspace-api/src/main/java/org/dspace/content/CollectionServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
private SessionFactory injectCustomMappingsInSessionFactory(XWikiDocument doc, XWikiContext context) throws XWikiException { // If we haven't turned of dynamic custom mappings we should not inject them if (!context.getWiki().hasDynamicCustomMappings()) { return getSessionFactory(); } boolean result = injectCustomMappings(doc, context); if (!result) { return getSessionFactory(); } return getConfiguration().buildSessionFactory(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: injectCustomMappingsInSessionFactory File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
injectCustomMappingsInSessionFactory
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private void checkParams() throws Exception { if (vi == null) { throw new Exception("no layers defined."); } if (vi.length > 1) { for (int i = 0; i < vi.length - 1; i++) { if (vi[i] >= vi[i + 1]) { throw new Exception( "v[i] has to be smaller than v[i+1]"); } } } else { throw new Exception( "Rainbow needs at least 1 layer, such that v1 < v2."); } }
Vulnerability Classification: - CWE: CWE-470 - CVE: CVE-2018-1000613 - Severity: HIGH - CVSS Score: 7.5 Description: added additional checking to XMSS BDS tree parsing. Failures now mostly cause IOException Function: checkParams File: core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java Repository: bcgit/bc-java Fixed Code: private void checkParams() { if (vi == null) { throw new IllegalArgumentException("no layers defined."); } if (vi.length > 1) { for (int i = 0; i < vi.length - 1; i++) { if (vi[i] >= vi[i + 1]) { throw new IllegalArgumentException( "v[i] has to be smaller than v[i+1]"); } } } else { throw new IllegalArgumentException( "Rainbow needs at least 1 layer, such that v1 < v2."); } }
[ "CWE-470" ]
CVE-2018-1000613
HIGH
7.5
bcgit/bc-java
checkParams
core/src/main/java/org/bouncycastle/pqc/crypto/rainbow/RainbowParameters.java
4092ede58da51af9a21e4825fbad0d9a3ef5a223
1
Analyze the following code function for security vulnerabilities
public static void copy(File from, File to) throws IOException { checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to); asByteSource(from).copyTo(asByteSink(to)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
copy
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public boolean convertFromTranslucent(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertFromTranslucent File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
convertFromTranslucent
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private String getStringValue(String x, Map<String, Object> map) { Object obj = map.get(x); if (obj == null) return null; String ret = null; if (obj instanceof String[]) { ret = ((String[]) obj)[0]; } else { ret = obj.toString(); } return (UtilMethods.isSet(ret)) ? ret : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStringValue File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
getStringValue
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
static DOMFragmentParser getDomParser() throws SAXNotRecognizedException, SAXNotSupportedException { DOMFragmentParser parser = new DOMFragmentParser(); parser.setProperty("http://cyberneko.org/html/properties/names/elems", "lower"); parser.setFeature("http://cyberneko.org/html/features/scanner/style/strip-cdata-delims", false); parser.setFeature("http://cyberneko.org/html/features/scanner/cdata-sections", true); try { parser.setFeature("http://cyberneko.org/html/features/enforce-strict-attribute-names", true); } catch (SAXNotRecognizedException se) { // this indicates that the patched nekohtml is not on the // classpath } return parser; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDomParser File: src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2022-28367
MEDIUM
4.3
nahsra/antisamy
getDomParser
src/main/java/org/owasp/validator/html/scan/AntiSamyDOMScanner.java
0199e7e194dba5e7d7197703f43ebe22401e61ae
0
Analyze the following code function for security vulnerabilities
@Override public V next() { if (!hasNext()) { throw new NoSuchElementException(); } if (previous != null) { removalPrevious = previous; } previous = next; calculateNext(next.next); return previous.value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: next File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
next
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public void showInvalidChargerWarning() { mInvalidCharger = true; updateNotification(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showInvalidChargerWarning File: packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3854
MEDIUM
5
android
showInvalidChargerWarning
packages/SystemUI/src/com/android/systemui/power/PowerNotificationWarnings.java
05e0705177d2078fa9f940ce6df723312cfab976
0
Analyze the following code function for security vulnerabilities
public static void uploadUpdateFile( Context context, Account account, OCFile existingFile, Integer behaviour, NameCollisionPolicy nameCollisionPolicy, boolean disableRetries ) { uploadUpdateFile(context, account, new OCFile[]{existingFile}, behaviour, nameCollisionPolicy, disableRetries); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uploadUpdateFile File: src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-732" ]
CVE-2022-24886
LOW
2.1
nextcloud/android
uploadUpdateFile
src/main/java/com/owncloud/android/files/services/FileUploader.java
c01fa0b17050cdcf77a468cc22f4071eae29d464
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isPanelVisibleBecauseOfHeadsUp() { return mHeadsUpManager.hasPinnedHeadsUp() || mHeadsUpAnimatingAway; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPanelVisibleBecauseOfHeadsUp File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isPanelVisibleBecauseOfHeadsUp
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@VisibleForTesting void setVibrator(Vibrator vibrator) { mVibrator = vibrator; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVibrator File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
setVibrator
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private void updateSharedLibrariesLPw(PackageParser.Package pkg, PackageParser.Package changingLib) throws PackageManagerException { if (pkg.usesLibraries != null || pkg.usesOptionalLibraries != null) { final ArraySet<String> usesLibraryFiles = new ArraySet<>(); int N = pkg.usesLibraries != null ? pkg.usesLibraries.size() : 0; for (int i=0; i<N; i++) { final SharedLibraryEntry file = mSharedLibraries.get(pkg.usesLibraries.get(i)); if (file == null) { throw new PackageManagerException(INSTALL_FAILED_MISSING_SHARED_LIBRARY, "Package " + pkg.packageName + " requires unavailable shared library " + pkg.usesLibraries.get(i) + "; failing!"); } addSharedLibraryLPw(usesLibraryFiles, file, changingLib); } N = pkg.usesOptionalLibraries != null ? pkg.usesOptionalLibraries.size() : 0; for (int i=0; i<N; i++) { final SharedLibraryEntry file = mSharedLibraries.get(pkg.usesOptionalLibraries.get(i)); if (file == null) { Slog.w(TAG, "Package " + pkg.packageName + " desires unavailable shared library " + pkg.usesOptionalLibraries.get(i) + "; ignoring!"); } else { addSharedLibraryLPw(usesLibraryFiles, file, changingLib); } } N = usesLibraryFiles.size(); if (N > 0) { pkg.usesLibraryFiles = usesLibraryFiles.toArray(new String[N]); } else { pkg.usesLibraryFiles = null; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSharedLibrariesLPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
updateSharedLibrariesLPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
private static void buildAndValidateConstraint(Map.Entry<String, Map<String, ?>> constraint, String field, Object actualValue, LinkedList<String> errors) { if (constraint == null) { return; } String consName = constraint.getKey(); Map<String, ?> vals = constraint.getValue(); if (vals == null) { vals = Collections.emptyMap(); } Object val = vals.get("value"); long min = NumberUtils.toLong(vals.get("min") + "", 0); long max = NumberUtils.toLong(vals.get("max") + "", Config.DEFAULT_LIMIT); if (isValidSimpleConstraint(consName, field, actualValue, errors)) { if (matches(Min.class, consName) && !min(NumberUtils.toLong(val + "", 0)).isValid(actualValue)) { errors.add(Utils.formatMessage("{0} must be a number larger than {1}.", field, val)); } else if (matches(Max.class, consName) && !max(NumberUtils.toLong(val + "", Config.DEFAULT_LIMIT)).isValid(actualValue)) { errors.add(Utils.formatMessage("{0} must be a number smaller than {1}.", field, val)); } else if (matches(Size.class, consName) && !size(min, max).isValid(actualValue)) { errors.add(Utils.formatMessage("{0} must be between {1} and {2}.", field, min, max)); } else if (matches(Digits.class, consName) && !digits(NumberUtils.toLong(vals.get("integer") + "", 0), NumberUtils.toLong(vals.get("fraction") + "", 0)).isValid(actualValue)) { errors.add(Utils.formatMessage("{0} is not a valid number or within range.", field)); } else if (matches(Pattern.class, consName) && !pattern(val).isValid(actualValue)) { errors.add(Utils.formatMessage("{0} doesn't match the pattern {1}.", field, val)); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildAndValidateConstraint File: para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java Repository: Erudika/para The code follows secure coding practices.
[ "CWE-840" ]
CVE-2022-1848
MEDIUM
4.3
Erudika/para
buildAndValidateConstraint
para-core/src/main/java/com/erudika/para/core/validation/ValidationUtils.java
fa677c629842df60099daa9c23bd802bc41b48d1
0
Analyze the following code function for security vulnerabilities
protected void updateParamsForAuth(String[] authNames, List<Pair> queryParams, Map<String, String> headerParams, Map<String, String> cookieParams, String payload, String method, URI uri) throws ApiException { for (String authName : authNames) { Authentication auth = authentications.get(authName); if (auth == null) { continue; } auth.applyToParams(queryParams, headerParams, cookieParams, payload, method, uri); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateParamsForAuth File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
updateParamsForAuth
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected InboxUserNotificationEntity decorate(final SILVERMAILMessage notification) { this.id = notification.getId(); this.source = notification.getSource(); this.subject = notification.getSubject(); this.senderName = notification.getSenderName(); this.date = toLocalDate(notification.getDate()).toString(); try { this.resourceViewUrl = UriBuilder.fromUri(notification.getUrl()).build(); } catch (Exception e) { SilverLogger.getLogger(this).warn(e); } this.content = notification.getBody(); this.read = notification.getReaden() > 0; return this; }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-47324 - Severity: MEDIUM - CVSS Score: 5.4 Description: Bug #13811: fixing stored XSS leading to full account takeover * making HTML sanitize processing accessible for JSTL instructions * sanitizing user notification title and contents on registering * sanitizing user notification title and contents on rendering * sanitizing browse bar parts * modifying the user and group saving action names in order to get the user token verifications * applying the token validation from component request router abstraction Function: decorate File: core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java Repository: Silverpeas/Silverpeas-Core Fixed Code: protected InboxUserNotificationEntity decorate(final SILVERMAILMessage notification) { this.id = notification.getId(); this.source = notification.getSource(); final HtmlSanitizer htmlSanitizer = HtmlSanitizer.get(); this.subject = htmlSanitizer.sanitize(notification.getSubject()); this.senderName = notification.getSenderName(); this.date = toLocalDate(notification.getDate()).toString(); try { this.resourceViewUrl = UriBuilder.fromUri(notification.getUrl()).build(); } catch (Exception e) { SilverLogger.getLogger(this).warn(e); } this.content = htmlSanitizer.sanitize(notification.getBody()); this.read = notification.getReaden() > 0; return this; }
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
decorate
core-web/src/main/java/org/silverpeas/core/webapi/notification/user/InboxUserNotificationEntity.java
9a55728729a3b431847045c674b3e883507d1e1a
1
Analyze the following code function for security vulnerabilities
public void setWebhookUrl(@Nullable URI webhookUrl) { this.webhookUrl = webhookUrl; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setWebhookUrl File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setWebhookUrl
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
private void ensureXrefSize(int size) { if (size == 0) return; if (xref == null) xref = new int[size]; else { if (xref.length < size) { int xref2[] = new int[size]; System.arraycopy(xref, 0, xref2, 0, xref.length); xref = xref2; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureXrefSize File: java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java Repository: pdftk-java/pdftk The code follows secure coding practices.
[ "CWE-835" ]
CVE-2021-37819
HIGH
7.5
pdftk-java/pdftk
ensureXrefSize
java/com/gitlab/pdftk_java/com/lowagie/text/pdf/PdfReader.java
9b0cbb76c8434a8505f02ada02a94263dcae9247
0
Analyze the following code function for security vulnerabilities
@Override public PlayRequest playAsync() { final PlayRequest out = new PlayRequest(); out.ready(new SuccessCallback<AsyncMedia>() { @Override public void onSucess(AsyncMedia value) { if (out == pendingPlayRequest) { pendingPlayRequest = null; } } }).except(new SuccessCallback<Throwable>() { @Override public void onSucess(Throwable value) { if (out == pendingPlayRequest) { pendingPlayRequest = null; } } }); ; if (pendingPlayRequest != null) { pendingPlayRequest.ready(new SuccessCallback<AsyncMedia>() { @Override public void onSucess(AsyncMedia value) { if (!out.isDone()) { out.complete(value); } } }).except(new SuccessCallback<Throwable>() { @Override public void onSucess(Throwable value) { if (!out.isDone()) { out.error(value); } } }); return out; } else { pendingPlayRequest = out; } ActionListener<MediaStateChangeEvent> onStateChange = new ActionListener<MediaStateChangeEvent>() { @Override public void actionPerformed(MediaStateChangeEvent evt) { stateChangeListeners.removeListener(this); if (!out.isDone()) { if (evt.getNewState() == State.Playing) { out.complete(Video.this); } } } }; stateChangeListeners.addListener(onStateChange); play(); return out; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: playAsync File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
playAsync
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public boolean isOpen() { return open; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isOpen File: src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4040
MEDIUM
6.5
dotCMS/core
isOpen
src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java
bc4db5d71dc67015572f8e4c6fdf87e29b854d02
0
Analyze the following code function for security vulnerabilities
@Override public String getName() { return "MSBib"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java Repository: JabRef/jabref The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000652
HIGH
7.5
JabRef/jabref
getName
src/main/java/org/jabref/logic/importer/fileformat/MsBibImporter.java
89f855d76713b4cd25ac0830c719cd61c511851e
0
Analyze the following code function for security vulnerabilities
@Override public abstract void sendNonza(Nonza element) throws NotConnectedException, InterruptedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendNonza File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
sendNonza
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public String getFormat() { return this.doc.getFormat(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFormat File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getFormat
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M2") public List<String> getChildren(XWikiContext context) throws XWikiException { return getChildren(0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildren File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getChildren
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public boolean isConcurrentVoiceAndDataAllowed() { return (mSS.getRilVoiceRadioTechnology() >= ServiceState.RIL_RADIO_TECHNOLOGY_UMTS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isConcurrentVoiceAndDataAllowed File: src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
isConcurrentVoiceAndDataAllowed
src/java/com/android/internal/telephony/gsm/GsmServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = "/{studyOID}/submission", method = RequestMethod.POST) public ResponseEntity<String> doSubmission(HttpServletRequest request, HttpServletResponse response, @PathVariable("studyOID") String studyOID, @RequestParam(FORM_CONTEXT) String ecid) { logger.info("Processing xform submission."); HashMap<String, String> subjectContext = null; Locale locale = LocaleResolver.getLocale(request); DataBinder dataBinder = new DataBinder(null); Errors errors = dataBinder.getBindingResult(); Study study = studyDao.findByOcOID(studyOID); String requestBody=null; HashMap<String,String> map = new HashMap(); ArrayList <HashMap> listOfUploadFilePaths = new ArrayList(); try { // Verify Study is allowed to submit if (!mayProceed(studyOID)) { logger.info("Submissions to the study not allowed. Aborting submission."); return new ResponseEntity<String>(org.springframework.http.HttpStatus.NOT_ACCEPTABLE); } if (ServletFileUpload.isMultipartContent(request)) { String dir = getAttachedFilePath(studyOID); FileProperties fileProperties= new FileProperties(); DiskFileItemFactory factory = new DiskFileItemFactory(); ServletFileUpload upload = new ServletFileUpload(factory); upload.setFileSizeMax(fileProperties.getFileSizeMax()); List<FileItem> items = upload.parseRequest(request); for (FileItem item : items) { if (item.getContentType() != null && !item.getFieldName().equals("xml_submission_file") ) { if (!new File(dir).exists()) new File(dir).mkdirs(); File file = processUploadedFile(item, dir); map.put(item.getFieldName(), file.getPath()); } else if (item.getFieldName().equals("xml_submission_file")) { requestBody = item.getString("UTF-8"); } } listOfUploadFilePaths.add(map); } else { requestBody = IOUtils.toString(request.getInputStream(), "UTF-8"); } // Load user context from ecid PFormCache cache = PFormCache.getInstance(context); subjectContext = cache.getSubjectContext(ecid); // Execute save as Hibernate transaction to avoid partial imports openRosaSubmissionService.processRequest(study, subjectContext, requestBody, errors, locale , listOfUploadFilePaths); } catch (Exception e) { logger.error("Exception while processing xform submission."); logger.error(e.getMessage()); logger.error(ExceptionUtils.getStackTrace(e)); if (!errors.hasErrors()) { // Send a failure response logger.info("Submission caused internal error. Sending error response."); return new ResponseEntity<String>(org.springframework.http.HttpStatus.INTERNAL_SERVER_ERROR); } } if (!errors.hasErrors()) { // Log submission with Participate notifier.notify(studyOID, subjectContext); logger.info("Completed xform submission. Sending successful response"); String responseMessage = "<OpenRosaResponse xmlns=\"http://openrosa.org/http/response\">" + "<message>success</message>" + "</OpenRosaResponse>"; return new ResponseEntity<String>(responseMessage, org.springframework.http.HttpStatus.CREATED); } else { logger.info("Submission contained errors. Sending error response"); return new ResponseEntity<String>(org.springframework.http.HttpStatus.NOT_ACCEPTABLE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doSubmission File: web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-24830
HIGH
7.5
OpenClinica
doSubmission
web/src/main/java/org/akaza/openclinica/controller/openrosa/OpenRosaSubmissionController.java
6f864e86543f903bd20d6f9fc7056115106441f3
0
Analyze the following code function for security vulnerabilities
@Override public void renameAccount( IAccountManagerResponse response, Account accountToRename, String newName) { final int callingUid = Binder.getCallingUid(); if (Log.isLoggable(TAG, Log.VERBOSE)) { Log.v(TAG, "renameAccount: " + accountToRename + " -> " + newName + ", caller's uid " + callingUid + ", pid " + Binder.getCallingPid()); } if (accountToRename == null) throw new IllegalArgumentException("account is null"); if (newName != null && newName.length() > 200) { Log.e(TAG, "renameAccount failed - account name longer than 200"); throw new IllegalArgumentException("account name longer than 200"); } int userId = UserHandle.getCallingUserId(); if (!isAccountManagedByCaller(accountToRename.type, callingUid, userId)) { String msg = String.format( "uid %s cannot rename accounts of type: %s", callingUid, accountToRename.type); throw new SecurityException(msg); } final long identityToken = clearCallingIdentity(); try { UserAccounts accounts = getUserAccounts(userId); Account resultingAccount = renameAccountInternal(accounts, accountToRename, newName); Bundle result = new Bundle(); result.putString(AccountManager.KEY_ACCOUNT_NAME, resultingAccount.name); result.putString(AccountManager.KEY_ACCOUNT_TYPE, resultingAccount.type); result.putString(AccountManager.KEY_ACCOUNT_ACCESS_ID, resultingAccount.getAccessId()); try { response.onResult(result); } catch (RemoteException e) { Log.w(TAG, e.getMessage()); } } finally { restoreCallingIdentity(identityToken); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameAccount File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
renameAccount
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public View.People getPeople() { return new View.People(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPeople File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getPeople
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
@Override public void unregisterPhoneAccount(PhoneAccountHandle accountHandle) { synchronized (mLock) { try { Log.startSession("TSI.uPA"); enforcePhoneAccountModificationForPackage( accountHandle.getComponentName().getPackageName()); enforceUserHandleMatchesCaller(accountHandle); final long token = Binder.clearCallingIdentity(); try { mPhoneAccountRegistrar.unregisterPhoneAccount(accountHandle); } finally { Binder.restoreCallingIdentity(token); } } catch (Exception e) { Log.e(this, e, "unregisterPhoneAccount %s", accountHandle); throw e; } finally { Log.endSession(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unregisterPhoneAccount File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
unregisterPhoneAccount
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public final void installSystemProviders() { List<ProviderInfo> providers; synchronized (this) { ProcessRecord app = mProcessNames.get("system", Process.SYSTEM_UID); providers = generateApplicationProvidersLocked(app); if (providers != null) { for (int i=providers.size()-1; i>=0; i--) { ProviderInfo pi = (ProviderInfo)providers.get(i); if ((pi.applicationInfo.flags&ApplicationInfo.FLAG_SYSTEM) == 0) { Slog.w(TAG, "Not installing system proc provider " + pi.name + ": not system .apk"); providers.remove(i); } } } } if (providers != null) { mSystemThread.installSystemProviders(providers); } mCoreSettingsObserver = new CoreSettingsObserver(this); mFontScaleSettingObserver = new FontScaleSettingObserver(); //mUsageStatsService.monitorPackages(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: installSystemProviders File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
installSystemProviders
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
protected Object createDiscordNotification(InstanceEvent event, Instance instance) { Map<String, Object> body = new HashMap<>(); body.put("content", createContent(event, instance)); body.put("tts", tts); if (avatarUrl != null) { body.put("avatar_url", avatarUrl); } if (username != null) { body.put("username", username); } HttpHeaders headers = new HttpHeaders(); headers.setContentType(MediaType.APPLICATION_JSON); headers.add(HttpHeaders.USER_AGENT, "RestTemplate"); return new HttpEntity<>(body, headers); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDiscordNotification File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
createDiscordNotification
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/DiscordNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
@Override public int getPreferredOptionsPanelGravity() { synchronized (mWindowMap) { final int rotation = getRotation(); // TODO(multidisplay): Assume that such devices physical keys are on the main screen. final DisplayContent displayContent = getDefaultDisplayContentLocked(); if (displayContent.mInitialDisplayWidth < displayContent.mInitialDisplayHeight) { // On devices with a natural orientation of portrait switch (rotation) { default: case Surface.ROTATION_0: return Gravity.CENTER_HORIZONTAL | Gravity.BOTTOM; case Surface.ROTATION_90: return Gravity.RIGHT | Gravity.BOTTOM; case Surface.ROTATION_180: return Gravity.CENTER_HORIZONTAL | Gravity.BOTTOM; case Surface.ROTATION_270: return Gravity.START | Gravity.BOTTOM; } } // On devices with a natural orientation of landscape switch (rotation) { default: case Surface.ROTATION_0: return Gravity.RIGHT | Gravity.BOTTOM; case Surface.ROTATION_90: return Gravity.CENTER_HORIZONTAL | Gravity.BOTTOM; case Surface.ROTATION_180: return Gravity.START | Gravity.BOTTOM; case Surface.ROTATION_270: return Gravity.CENTER_HORIZONTAL | Gravity.BOTTOM; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreferredOptionsPanelGravity File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getPreferredOptionsPanelGravity
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public void setBackEndSorting(List<QuerySortOrder> sortOrder, boolean immediateReset) { backEndSorting.clear(); backEndSorting.addAll(sortOrder); if (immediateReset) { reset(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBackEndSorting File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
setBackEndSorting
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
public static boolean equal(File file1, File file2) throws IOException { checkNotNull(file1); checkNotNull(file2); if (file1 == file2 || file1.equals(file2)) { return true; } /* * Some operating systems may return zero as the length for files denoting system-dependent * entities such as devices or pipes, in which case we must fall back on comparing the bytes * directly. */ long len1 = file1.length(); long len2 = file2.length(); if (len1 != 0 && len2 != 0 && len1 != len2) { return false; } return asByteSource(file1).contentEquals(asByteSource(file2)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equal File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
equal
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@GetMapping("/update/current-by-resource/{resourceId}") public void updateCurrentUserByResourceId(@PathVariable String resourceId) { baseUserService.updateCurrentUserByResourceId(resourceId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateCurrentUserByResourceId File: framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java Repository: metersphere The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-38494
HIGH
7.5
metersphere
updateCurrentUserByResourceId
framework/sdk-parent/sdk/src/main/java/io/metersphere/controller/BaseUserController.java
a23f75d93b666901fd148d834df9384f6f24cf28
0