instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public List<DocumentReference> getChildrenReferences() throws XWikiException { return this.doc.getChildrenReferences(getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildrenReferences File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-648" ]
CVE-2023-29507
HIGH
7.2
xwiki/xwiki-platform
getChildrenReferences
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
905cdd7c421dbf8c565557cdc773ab1aa9028f83
0
Analyze the following code function for security vulnerabilities
private void verifyJars(List<JARDesc> jars, ResourceTracker tracker) throws Exception { for (JARDesc jar : jars) { try { File jarFile = tracker.getCacheFile(jar.getLocation()); // some sort of resource download/cache error. Nothing to add ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyJars File: core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
verifyJars
core/src/main/java/net/sourceforge/jnlp/tools/JarCertVerifier.java
2fd1e4b769911f2c6f7f3902f7ea21568ddc2f99
0
Analyze the following code function for security vulnerabilities
public ScenarioEnv getApiScenarioProjectId(String id) { ApiScenarioWithBLOBs scenario = apiScenarioMapper.selectByPrimaryKey(id); ScenarioEnv scenarioEnv = new ScenarioEnv(); if (scenario == null) { return scenarioEnv; } String definition = scenario.getScenarioDefini...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApiScenarioProjectId File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
getApiScenarioProjectId
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
final void trimApplicationsLocked() { // First remove any unused application processes whose package // has been removed. for (int i=mRemovedProcesses.size()-1; i>=0; i--) { final ProcessRecord app = mRemovedProcesses.get(i); if (app.activities.size() == 0 && app.recentTa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: trimApplicationsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
trimApplicationsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public String formatDate(Date date) { return dateFormat.format(date); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: formatDate File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
formatDate
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
protected Double _checkDoubleSpecialValue(String text) { if (!text.isEmpty()) { switch (text.charAt(0)) { case 'I': if (_isPosInf(text)) { return Double.POSITIVE_INFINITY; } break; case 'N': ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _checkDoubleSpecialValue File: src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-42003
HIGH
7.5
FasterXML/jackson-databind
_checkDoubleSpecialValue
src/main/java/com/fasterxml/jackson/databind/deser/std/StdDeserializer.java
d78d00ee7b5245b93103fef3187f70543d67ca33
0
Analyze the following code function for security vulnerabilities
@Override public void setCrossProfilePackages(ComponentName who, List<String> packageNames) { if (!mHasFeature) { return; } Objects.requireNonNull(who, "ComponentName is null"); Objects.requireNonNull(packageNames, "Package names is null"); final CallerIdentity c...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCrossProfilePackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setCrossProfilePackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public Context getContext() { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContext File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getContext
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private static void handleException(String msg, Throwable t) throws APIManagementException { log.error(msg, t); throw new APIManagementException(msg, t); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleException File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practic...
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
handleException
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
@Beta public static MappedByteBuffer map(File file, MapMode mode, long size) throws IOException { checkArgument(size >= 0, "size (%s) may not be negative", size); return mapInternal(file, mode, size); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: map File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
map
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
private void validateDurationField(Errors errors, AppointmentType appointmentType) { ValidationUtils.rejectIfEmpty(errors, "duration", "appointmentscheduling.AppointmentType.durationEmpty"); if (appointmentType.getDuration() == null || appointmentType.getDuration() <= 0) { errors.rejectValue("duration", "appoint...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: validateDurationField File: api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding pr...
[ "CWE-79" ]
CVE-2020-36635
MEDIUM
5.4
openmrs/openmrs-module-appointmentscheduling
validateDurationField
api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java
34213c3f6ea22df427573076fb62744694f601d8
0
Analyze the following code function for security vulnerabilities
@Override public void setSecureSetting(ComponentName who, String setting, String value) { Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( isProfileOwner(caller) || isDefaultDevic...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSecureSetting File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setSecureSetting
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private boolean canConvert(Object obj) { return engine != null && obj != null && !(obj instanceof Class) && !(obj instanceof Map) && !simpleObject(obj) && !collectionObject(obj); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canConvert File: console/src/main/java/org/jline/console/impl/DefaultPrinter.java Repository: jline/jline3 The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-50572
MEDIUM
5.5
jline/jline3
canConvert
console/src/main/java/org/jline/console/impl/DefaultPrinter.java
f3c60a3e6255e8e0c20d5043a4fe248446f292bb
0
Analyze the following code function for security vulnerabilities
@NonNull public BubbleMetadata.Builder setDesiredHeight(@Dimension(unit = DP) int height) { mDesiredHeight = Math.max(height, 0); mDesiredHeightResId = 0; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDesiredHeight File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
setDesiredHeight
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override protected void onSuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, Authentication authResult) throws IOException { super.onSuccessfulAuthentication(request,response,authResult); // make sure we have a session to store this successful authentication, given t...
Vulnerability Classification: - CWE: CWE-287 - CVE: CVE-2014-2066 - Severity: MEDIUM - CVSS Score: 6.8 Description: [FIXED SECURITY-75] Invalidate session after login to avoid session fixation Function: onSuccessfulAuthentication File: core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java Repository...
[ "CWE-287" ]
CVE-2014-2066
MEDIUM
6.8
jenkinsci/jenkins
onSuccessfulAuthentication
core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java
8ac74c350779921598f9d5edfed39dd35de8842a
1
Analyze the following code function for security vulnerabilities
@Override public void setAuthenticated() { this.authed = true; encoder.setAuthenticated(); decoder.setAuthenticated(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAuthenticated File: src/main/java/net/schmizz/sshj/transport/TransportImpl.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
setAuthenticated
src/main/java/net/schmizz/sshj/transport/TransportImpl.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
public boolean isQuotedExecutableEnabled() { return quotedExecutableEnabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isQuotedExecutableEnabled File: src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java Repository: codehaus-plexus/plexus-utils The code follows secure coding practices.
[ "CWE-78" ]
CVE-2017-1000487
HIGH
7.5
codehaus-plexus/plexus-utils
isQuotedExecutableEnabled
src/main/java/org/codehaus/plexus/util/cli/shell/Shell.java
b38a1b3a4352303e4312b2bb601a0d7ec6e28f41
0
Analyze the following code function for security vulnerabilities
@Test public void upsert5binary(TestContext context) { String id = randomUuid(); byte [] witloof = "witloof".getBytes(); byte [] weld = "weld".getBytes(); PostgresClient postgresClient = createFooBinary(context); postgresClient.upsert(FOO, id, new JsonArray().add(witloof), /* convertEntity */ fals...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: upsert5binary File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
upsert5binary
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
public WearableExtender addAction(Action action) { mActions.add(action); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAction File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
addAction
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
boolean setName(String name) { enforceCallingOrSelfPermission(BLUETOOTH_ADMIN_PERM, "Need BLUETOOTH ADMIN permission"); return mAdapterProperties.setName(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setName File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
setName
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("resource") protected byte[] _finishBytes(int len) throws IOException { // First, simple: non-chunked if (len >= 0) { if (len == 0) { return NO_BYTES; } byte[] b = new byte[len]; if (_inputPtr >= _inputEnd) { ...
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2020-28491 - Severity: MEDIUM - CVSS Score: 5.0 Description: Fix eager allocation aspect of #186 Function: _finishBytes File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary Fixed Code: @...
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_finishBytes
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
1
Analyze the following code function for security vulnerabilities
public static EventProxy createEventProxy() { /* * Rather than defaulting to localhost all the time, give an option in properties */ final String vaultHost = Vault.getProperty("opennms.rtc.event.proxy.host"); final String vaultPort = Vault.getProperty("opennms.rtc.event.proxy.port");...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createEventProxy File: opennms-web-api/src/main/java/org/opennms/web/api/Util.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-0869
MEDIUM
6.1
OpenNMS/opennms
createEventProxy
opennms-web-api/src/main/java/org/opennms/web/api/Util.java
66b4ba96a18b9952f25a350bbccc2a7e206238d1
0
Analyze the following code function for security vulnerabilities
private String buildPrintMessage(final SAXParseException x) { return this.message.format( new Object[]{x.getSystemId(), new Integer( x.getLineNumber() ), new Integer( x.getColumnNumber() ), x.getMessage()} ); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildPrintMessage File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java Repository: apache/incubator-kie-drools The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-8125
HIGH
7.5
apache/incubator-kie-drools
buildPrintMessage
drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "9.10RC1") public XWikiAttachment addAttachment(String fileName, InputStream content, XWikiContext context) throws XWikiException, IOException { return setAttachment(fileName, content, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAttachment File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
addAttachment
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
@Override public CharSequence getOrganizationName(@NonNull ComponentName who) { if (!mHasFeature) { return null; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallingUser(isManaged...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOrganizationName File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getOrganizationName
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
abstract public void savedMore();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: savedMore File: main/src/com/google/refine/importing/ImportingUtilities.java Repository: OpenRefine The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-19859
MEDIUM
4
OpenRefine
savedMore
main/src/com/google/refine/importing/ImportingUtilities.java
e243e73e4064de87a913946bd320fbbe246da656
0
Analyze the following code function for security vulnerabilities
public ISession getSessionBinder() { return mSession; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSessionBinder File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
getSessionBinder
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public boolean dumpHeap(String process, int userId, boolean managed, String path, ParcelFileDescriptor fd) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeString(process);...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpHeap File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
dumpHeap
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
boolean containsShowWhenLockedWindow() { // When we are relaunching, it is possible for us to be unfrozen before our previous // windows have been added back. Using the cached value ensures that our previous // showWhenLocked preference is honored until relaunching is complete. if (isRel...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsShowWhenLockedWindow File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
containsShowWhenLockedWindow
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public String getRealm() { return realm; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRealm File: base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getRealm
base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static NativeObject jsFunction_getAllPaginatedAPIs(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws ScriptException, APIManagementException { APIConsumer apiCo...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_getAllPaginatedAPIs File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure...
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_getAllPaginatedAPIs
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
public static Collection<Descriptor> getSortedDescriptorsForGlobalConfigUnclassified() { return getSortedDescriptorsForGlobalConfig(new Predicate<GlobalConfigurationCategory>() { public boolean apply(GlobalConfigurationCategory cat) { return cat instanceof GlobalConfigurationCategory...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSortedDescriptorsForGlobalConfigUnclassified File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
getSortedDescriptorsForGlobalConfigUnclassified
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
void setLastParentBeforePip(@Nullable ActivityRecord launchIntoPipHostActivity) { mLastParentBeforePip = (launchIntoPipHostActivity == null) ? getTask() : launchIntoPipHostActivity.getTask(); mLastParentBeforePip.mChildPipActivity = this; mLaunchIntoPipHostActivit...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setLastParentBeforePip File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
setLastParentBeforePip
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { final int prime = 31; int result = 1; result = prime * result + ((id == null) ? 0 : id.hashCode()); result = prime * result + ((issuedBy == null) ? 0 : issuedBy.hashCode()); result = prime * result + ((issuedOn == null) ? 0 : issuedOn.hashCod...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
hashCode
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@WorkbenchPartTitle public String getTitle() { return constants.Details(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTitle File: jbpm-console-ng-human-tasks/jbpm-console-ng-human-tasks-client/src/main/java/org/jbpm/console/ng/ht/client/editors/taskdetailsmulti/TaskDetailsMultiPresenter.java Repository: kiegroup/jbpm-wb The code f...
[ "CWE-79" ]
CVE-2013-6465
LOW
3.5
kiegroup/jbpm-wb
getTitle
jbpm-console-ng-human-tasks/jbpm-console-ng-human-tasks-client/src/main/java/org/jbpm/console/ng/ht/client/editors/taskdetailsmulti/TaskDetailsMultiPresenter.java
4818204506e8e94645b52adb9426bedfa9ffdd04
0
Analyze the following code function for security vulnerabilities
@Override public Intent getResolvedIntent() { if (mSourceInfo != null) { return mSourceInfo.getResolvedIntent(); } return getTargetIntent(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResolvedIntent File: core/java/com/android/internal/app/ChooserActivity.java Repository: android The code follows secure coding practices.
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
getResolvedIntent
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
0
Analyze the following code function for security vulnerabilities
@Override public Revision oldestRevision(Modifications modifications) { return Modification.oldestRevision(modifications); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: oldestRevision File: domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
oldestRevision
domain/src/main/java/com/thoughtworks/go/config/materials/ScmMaterial.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public Optional<String> name() { return Optional.ofNullable(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: name File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
name
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
public static <T> Query applyAndBind(String queryString, Iterable<T> entities, EntityManager entityManager) { Assert.notNull(queryString); Assert.notNull(entities); Assert.notNull(entityManager); Iterator<T> iterator = entities.iterator(); if (!iterator.hasNext()) { return entityManager.createQuery(quer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyAndBind File: src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java Repository: spring-projects/spring-data-jpa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-6652
MEDIUM
6.8
spring-projects/spring-data-jpa
applyAndBind
src/main/java/org/springframework/data/jpa/repository/query/QueryUtils.java
b8e7fe
0
Analyze the following code function for security vulnerabilities
public static EditorType getEditorType(String contentType, EditorType def) { return getEditorType(ContentType.getByValue(contentType), def); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEditorType File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
getEditorType
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
public GetMethod executeGet(Object resourceUri, Object... elements) throws Exception { return executeGet(resourceUri, Collections.<String, Object[]>emptyMap(), elements); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeGet File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
executeGet
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public int getMinY() { return minY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMinY File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
getMinY
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
private Set<DocumentReference> getUniqueLinkedPages10(XWikiContext context) { Set<DocumentReference> pageNames; try { List<String> list = context.getUtil().getUniqueMatches(getContent(), "\\[(.*?)\\]", 1); pageNames = new HashSet<DocumentReference>(list.size()); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUniqueLinkedPages10 File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getUniqueLinkedPages10
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public Column setConverter(Converter<?, ?> converter) throws IllegalArgumentException { Class<?> modelType = getModelType(); if (converter != null) { if (!converter.getModelType().isAssignableFrom(modelType)) { throw new IllegalArgumentExceptio...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConverter File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setConverter
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@JsonProperty("ClassName") public String getClassName() { return className; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClassName File: base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getClassName
base/common/src/main/java/com/netscape/certsrv/base/RESTMessage.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@MediumTest @Test public void testAutoSpeakerphoneOutgoingBidirectional() throws Exception { // Start an incoming video call. IdPair ids = startAndMakeActiveOutgoingCall("650-555-1212", mPhoneAccountA0.getAccountHandle(), mConnectionServiceFixtureA, VideoProfile.S...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 2...
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
testAutoSpeakerphoneOutgoingBidirectional
tests/src/com/android/server/telecom/tests/VideoCallTests.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
ProcessRecord handleApplicationWtfInner(int callingUid, int callingPid, IBinder app, String tag, final ApplicationErrorReport.CrashInfo crashInfo) { final ProcessRecord r = findAppProcess(app, "WTF"); final String processName = app == null ? "system_server" : (r == null ? "un...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleApplicationWtfInner File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
handleApplicationWtfInner
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(anyOf = { android.Manifest.permission.MANAGE_USERS, android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS }) public @Nullable String getProfileOwnerNameAsUser(int userId) throws IllegalArgumentException { throwIfParentInstance("getProfile...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProfileOwnerNameAsUser File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getProfileOwnerNameAsUser
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public Integer getMonthlyVotes() { if (monthlyVotes < 0) { monthlyVotes = 0; } return monthlyVotes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMonthlyVotes File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getMonthlyVotes
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public static String getDefaultAvatar() { return CONF.imagesLink() + "/anon.svg"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultAvatar File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getDefaultAvatar
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
protected Intent getLockPasswordIntent(int quality, int minLength, int maxLength) { ChooseLockPassword.IntentBuilder builder = new ChooseLockPassword.IntentBuilder(getContext()) .setPasswordQuality(quality) .setPasswordLengthRange(m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockPasswordIntent File: src/com/android/settings/password/ChooseLockGeneric.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2018-9501
HIGH
7.2
android
getLockPasswordIntent
src/com/android/settings/password/ChooseLockGeneric.java
5e43341b8c7eddce88f79c9a5068362927c05b54
0
Analyze the following code function for security vulnerabilities
@Nullable public BlobRenderContext getBlobRenderContext() { return blobRenderContext; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBlobRenderContext File: server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
getBlobRenderContext
server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java
f864053176c08f59ef2d97fea192ceca46a4d9be
0
Analyze the following code function for security vulnerabilities
private String getGroupFromPermission(String permissionName) { try { PermissionInfo permInfo = getPackageManager().getPermissionInfo( permissionName, 0); return Utils.getGroupOfPermission(permInfo); } catch (PackageManager.NameNotFoundException e) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGroupFromPermission File: PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21132
MEDIUM
6.8
android
getGroupFromPermission
PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java
0679e4f35055729be7276536fe45fe8ec18a0453
0
Analyze the following code function for security vulnerabilities
private static Path resolvePath(String url) throws IOException { Path urlPath = getPath(url); final Path resolvedPath; if (apocConfig().isImportFolderConfigured() && isImportUsingNeo4jConfig()) { Path basePath = Paths.get(apocConfig().getImportDir()); urlPath = relativize...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolvePath File: core/src/main/java/apoc/util/FileUtils.java Repository: neo4j-contrib/neo4j-apoc-procedures The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23532
MEDIUM
6.5
neo4j-contrib/neo4j-apoc-procedures
resolvePath
core/src/main/java/apoc/util/FileUtils.java
01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522
0
Analyze the following code function for security vulnerabilities
@Override public ComponentName startServiceInPackage(int uid, Intent service, String resolvedType, boolean fgRequired, String callingPackage, @Nullable String callingFeatureId, int userId, boolean allowBackgroundActivityStarts, @Nullable IBinder backgroundActivity...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startServiceInPackage File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
startServiceInPackage
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = { "/about" }) public String actionAbout(HttpServletRequest theServletRequest, final HomeRequest theRequest, final ModelMap theModel) { addCommonParams(theServletRequest, theRequest, theModel); theModel.put("notHome", true); theModel.put("extraBreadcrumb", "About"); ourLog.info(logPref...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: actionAbout File: hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-24301
MEDIUM
4.3
hapifhir/hapi-fhir
actionAbout
hapi-fhir-testpage-overlay/src/main/java/ca/uhn/fhir/to/Controller.java
adb3734fcbbf9a9165445e9ee5eef168dbcaedaf
0
Analyze the following code function for security vulnerabilities
public void startContainer(String containerId) { KieServerState currentState = context.getStateRepository().load(KieServerEnvironment.getServerId()); Set<String> controllers = currentState.getControllers(); KieServerConfig config = currentState.getConfiguration(); if (controllers != nu...
Vulnerability Classification: - CWE: CWE-260 - CVE: CVE-2016-7043 - Severity: MEDIUM - CVSS Score: 5.0 Description: [RHBMS-4312] Loading pasword from a keystore Function: startContainer File: kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/Default...
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
startContainer
kie-server-parent/kie-server-services/kie-server-services-common/src/main/java/org/kie/server/services/impl/controller/DefaultRestControllerImpl.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
1
Analyze the following code function for security vulnerabilities
public IntentBuilder setUserId(int userId) { mIntent.putExtra(Intent.EXTRA_USER_ID, userId); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setUserId File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
setUserId
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public float getAttributeFloatValue(String namespace, String attribute, float defaultValue) { int idx = nativeGetAttributeIndex(mParseState, namespace, attribute); if (idx >= 0) { return getAttributeFloatValue(idx, defaultValue); } return d...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeFloatValue File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeFloatValue
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@SneakyThrows private void addRoleSpecification(String tenantName) { String rolesYml = mapper.writeValueAsString(new HashMap<>()); tenantConfigRepository.updateConfigFullPath(tenantName, API + permissionProperties.getRolesSpecPath(), rolesYml); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addRoleSpecification File: src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java Repository: xm-online/xm-uaa The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15557
HIGH
7.5
xm-online/xm-uaa
addRoleSpecification
src/main/java/com/icthh/xm/uaa/service/tenant/TenantService.java
bd235434f119c67090952e08fc28abe41aea2e2c
0
Analyze the following code function for security vulnerabilities
protected void internalGetManagedLedgerInfo(AsyncResponse asyncResponse, boolean authoritative) { if (topicName.isGlobal()) { try { validateGlobalNamespaceOwnership(namespaceName); } catch (Exception e) { log.error("[{}] Failed to get managed info for {}",...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: internalGetManagedLedgerInfo File: pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java Repository: apache/pulsar The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41571
MEDIUM
4
apache/pulsar
internalGetManagedLedgerInfo
pulsar-broker/src/main/java/org/apache/pulsar/broker/admin/impl/PersistentTopicsBase.java
5b35bb81c31f1bc2ad98c9fde5b39ec68110ca52
0
Analyze the following code function for security vulnerabilities
public List<SyncInfo> getCurrentSyncsCopy(int userId) { synchronized (mAuthorities) { final List<SyncInfo> syncs = getCurrentSyncsLocked(userId); final List<SyncInfo> syncsCopy = new ArrayList<SyncInfo>(); for (SyncInfo sync : syncs) { syncsCopy.add(new SyncIn...
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2016-2426 - Severity: MEDIUM - CVSS Score: 4.3 Description: Redact Account info from getCurrentSyncs BUG:26094635 If the caller to ContentResolver#getCurrentSyncs does not hold the GET_ACCOUNTS permission, return a SyncInfo object that does not contain any Accou...
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
getCurrentSyncsCopy
services/core/java/com/android/server/content/SyncStorageEngine.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
1
Analyze the following code function for security vulnerabilities
public void deleteOnExit() { internal.deleteOnExit(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteOnExit File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
deleteOnExit
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("PMD.CompareObjectsWithEquals") private static void ensureReceivedMatchesExpected(Message got, Message expected) throws TransportException { if (got != expected) throw new TransportException(DisconnectReason.PROTOCOL_ERROR, "Was expecting " + expected); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureReceivedMatchesExpected File: src/main/java/net/schmizz/sshj/transport/KeyExchanger.java Repository: hierynomus/sshj The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
hierynomus/sshj
ensureReceivedMatchesExpected
src/main/java/net/schmizz/sshj/transport/KeyExchanger.java
94fcc960e0fb198ddec0f7efc53f95ac627fe083
0
Analyze the following code function for security vulnerabilities
@Override public void activate(final ComponentContext cc) throws IllegalStateException { super.activate(cc); final String solrServerUrlConfig = StringUtils.trimToNull(cc.getBundleContext().getProperty(CONFIG_SOLR_URL)); logger.info("Setting up solr server"); solrServer = new Object() { SolrSer...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activate File: modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-21318
MEDIUM
5.5
opencast
activate
modules/search-service-impl/src/main/java/org/opencastproject/search/impl/SearchServiceImpl.java
b18c6a7f81f08ed14884592a6c14c9ab611ad450
0
Analyze the following code function for security vulnerabilities
RecentTasks getRecentTasks() { return mRecentTasks; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRecentTasks File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getRecentTasks
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public @ProcessCapability int getUidProcessCapabilities(int uid, String callingPackage) { if (!hasUsageStatsPermission(callingPackage)) { enforceCallingPermission(android.Manifest.permission.PACKAGE_USAGE_STATS, "getUidProcessState"); } // In case th...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidProcessCapabilities File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getUidProcessCapabilities
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public com.xpn.xwiki.api.PropertyClass getPropertyClassFromName(String propPath) { return new PropertyClass(this.xwiki.getPropertyClassFromName(propPath, getXWikiContext()), getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPropertyClassFromName File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
getPropertyClassFromName
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
public List<Attachment> getAttachmentList() { List<Attachment> apis = new ArrayList<Attachment>(); for (XWikiAttachment attachment : this.getDoc().getAttachmentList()) { apis.add(new Attachment(this, attachment, getXWikiContext())); } return apis; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttachmentList File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getAttachmentList
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public void load(List<Dependency> dependencies) throws LoadFailureException { for (Dependency dependency : dependencies) { load(dependency); } }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-41967 - Severity: HIGH - CVSS Score: 7.5 Description: fix: CVE-2022-41967 Dragonfly v0.3.0-SNAPSHOT fails to properly configure the DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when parsing maven-metadata.xml files provided by externa...
[ "CWE-611" ]
CVE-2022-41967
HIGH
7.5
HyperaDev/Dragonfly
load
src/main/java/dev/hypera/dragonfly/loading/DependencyLoader.java
9661375e1135127ca6cdb5712e978bec33cc06b3
1
Analyze the following code function for security vulnerabilities
private native WebContents nativeGetWebContents(long nativeTabAndroid);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeGetWebContents File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeGetWebContents
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public void takeEmergencyCallAction() { MetricsLogger.action(mContext, MetricsLogger.ACTION_EMERGENCY_CALL); // TODO: implement a shorter timeout once new PowerManager API is ready. // should be the equivalent to the old userActivity(EMERGENCY_CALL_TIMEOUT) mPowerManager.userActivity(Sys...
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2016-3838 - Severity: MEDIUM - CVSS Score: 4.3 Description: DO NOT MERGE Disable app pinning when emergency call button pressed Also disables app pinning when the "return to call" button is pressed and brings up the in-call screen when app pinning is stopped if ...
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
takeEmergencyCallAction
packages/Keyguard/src/com/android/keyguard/EmergencyButton.java
468651c86a8adb7aa56c708d2348e99022088af3
1
Analyze the following code function for security vulnerabilities
private String[] getDefaultRoleHolderPackageNameAndSignature() { String packageNameAndSignature = mContext.getString( com.android.internal.R.string.config_devicePolicyManagement); if (TextUtils.isEmpty(packageNameAndSignature)) { return null; } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultRoleHolderPackageNameAndSignature File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getDefaultRoleHolderPackageNameAndSignature
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public StackInfo getStackInfo(int stackId) { enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, "getStackInfo()"); long ident = Binder.clearCallingIdentity(); try { synchronized (this) { return mStackSupervisor.g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStackInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
getStackInfo
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
void updateSourceFrame(Rect winFrame) { if (mGivenInsetsPending) { // The given insets are pending, and they are not reliable for now. The source frame // should be updated after the new given insets are sent to window manager. return; } final SparseArray<Inse...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateSourceFrame File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
updateSourceFrame
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public static boolean isArtifactsPermissionEnabled() { return Boolean.getBoolean("hudson.security.ArtifactsPermission"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isArtifactsPermissionEnabled File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
isArtifactsPermissionEnabled
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override protected void bindFields() { List<Field<?>> fields = new ArrayList<Field<?>>(getFields()); Item itemDataSource = getItemDataSource(); if (itemDataSource == null) { unbindFields(fields); } else { bindFields(fields, itemDa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindFields File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
bindFields
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
private native void nativeShowImeIfNeeded(long nativeContentViewCoreImpl);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nativeShowImeIfNeeded File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
nativeShowImeIfNeeded
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override @SuppressWarnings("serial") protected void init() { super.init(); add(createFeedbackPanel()); gridBuilder = newGridBuilder(this, "flowform"); { gridBuilder.newSplitPanel(GridSize.COL50); final FieldsetPanel fs = gridBuilder.newFieldset(getString("searchFilter")); final ...
Vulnerability Classification: - CWE: CWE-352 - CVE: CVE-2013-7251 - Severity: MEDIUM - CVSS Score: 6.8 Description: CSRF protection. Function: init File: src/main/java/org/projectforge/web/task/TaskTreeForm.java Repository: micromata/projectforge-webapp Fixed Code: @Override @SuppressWarnings("serial") protected...
[ "CWE-352" ]
CVE-2013-7251
MEDIUM
6.8
micromata/projectforge-webapp
init
src/main/java/org/projectforge/web/task/TaskTreeForm.java
422de35e3c3141e418a73bfb39b430d5fd74077e
1
Analyze the following code function for security vulnerabilities
void placeOutgoingCall(Call call, Uri handle, GatewayInfo gatewayInfo, boolean speakerphoneOn, int videoState) { if (call == null) { // don't do anything if the call no longer exists Log.i(this, "Canceling unknown call."); return; } final Uri uriH...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: placeOutgoingCall File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
placeOutgoingCall
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
public List<String> getTagsList(XWikiContext context) { List<String> tagList = null; BaseProperty prop = getTagProperty(context); if (prop != null) { tagList = (List<String>) prop.getValue(); } return tagList; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTagsList File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getTagsList
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public Mono<ActionExecutionResult> executeParameterized(APIConnection connection, ExecuteActionDTO executeActionDTO, DatasourceConfiguration datasourceConfiguration, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeParameterized File: app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java Repository: appsmithorg/appsmith The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-4096
MEDIUM
6.5
appsmithorg/appsmith
executeParameterized
app/server/appsmith-plugins/restApiPlugin/src/main/java/com/external/plugins/RestApiPlugin.java
769719ccfe667f059fe0b107a19ec9feb90f2e40
0
Analyze the following code function for security vulnerabilities
public <T> void appendClause(String newClause, final T... parameters) { if (newClause == null || newClause.isEmpty()) { return; } if (mWhereClause.length() != 0) { mWhereClause.append(" AND "); } mWhereClause.append("("); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendClause File: src/com/android/providers/downloads/DownloadProvider.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
appendClause
src/com/android/providers/downloads/DownloadProvider.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
@Override public boolean next() throws SQLException { checkClosed(); castNonNull(rows, "rows"); if (onInsertRow) { throw new PSQLException(GT.tr("Can''t use relative move methods while on the insert row."), PSQLState.INVALID_CURSOR_STATE); } if (currentRow + 1 >= rows.size()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: next File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
next
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public String getCdmaMin() { return mMin; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCdmaMin File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
getCdmaMin
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
private void enforceNonCodecConstraints(String rejected) { enforceConstraint(rejected, "server/connection", decoder); enforceConstraint(rejected, "server/connection", encoder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceNonCodecConstraints File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java Repository: netty The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
netty
enforceNonCodecConstraints
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
58f75f665aa81a8cbcf6ffa74820042a285c5e61
0
Analyze the following code function for security vulnerabilities
@Override protected URL getStaticResource(String path) { return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStaticResource File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/OSGiStaticFileHandlerFactory.java Repository: vaadin/osgi The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-31407
MEDIUM
5
vaadin/osgi
getStaticResource
flow-osgi/src/main/java/com/vaadin/flow/osgi/support/OSGiStaticFileHandlerFactory.java
0b82a606eeafdf56a129630f00b9c55a5177b64b
0
Analyze the following code function for security vulnerabilities
CounterManager getCounterManager() { return counterManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCounterManager File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
getCounterManager
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
efc44b7b0a5dd4f44773808840dd9785cabcf21c
0
Analyze the following code function for security vulnerabilities
private void sendNetworkChangeBroadcast(NetworkInfo.DetailedState state) { boolean hidden = false; if (mIsAutoRoaming) { // There is generally a confusion in the system about colluding // WiFi Layer 2 state (as reported by supplicant) and the Network state // which l...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendNetworkChangeBroadcast File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
sendNetworkChangeBroadcast
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (getClass() != obj.getClass()) return false; CMSRequestInfo other = (CMSRequestInfo) obj; if (realm == null) { if (oth...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
equals
base/common/src/main/java/com/netscape/certsrv/request/CMSRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private ObjectStreamClass readClassDesc() throws ClassNotFoundException, IOException { byte tc = nextTC(); switch (tc) { case TC_CLASSDESC: return readNewClassDesc(false); case TC_PROXYCLASSDESC: Class<?> proxyClass = readNewProxyClassDesc(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readClassDesc File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readClassDesc
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
@Override public int getMaximumFailedPasswordsForWipe(ComponentName who, int userHandle, boolean parent) { if (!mHasFeature || !mLockPatternUtils.hasSecureLockScreen()) { return 0; } Preconditions.checkArgumentNonnegative(userHandle, "Invalid userId"); final CallerIdenti...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumFailedPasswordsForWipe File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getMaximumFailedPasswordsForWipe
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected void _finishToken() throws IOException { _tokenIncomplete = false; int ch = _typeByte; final int type = ((ch >> 5) & 0x7); ch &= 0x1F; // Either String or byte[] if (type != CBORConstants.MAJOR_TYPE_TEXT) { if (type == CBORConstants.MAJOR_TYPE_B...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _finishToken File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_finishToken
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
@Override public void onConference(Connection cxn1, Connection cxn2) { if (((FakeConnection) cxn1).getIsConferenceCreated()) { // Usually, this is implemented by something in Telephony, which does a bunch of // radio work to conference the two connections together. He...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21283 - Severity: MEDIUM - CVSS Score: 5.5 Description: [conflict] Resolve StatusHints image exploit across user. am: a853f6ba61 Original change: https://googleplex-android-review.googlesource.com/c/platform/packages/services/Telecomm/+/23463634 Fixes: 2...
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
onConference
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
1
Analyze the following code function for security vulnerabilities
void pushTempWhitelist() { final int N; final PendingTempWhitelist[] list; // First copy out the pending changes... we need to leave them in the map for now, // in case someone needs to check what is coming up while we don't have the lock held. synchronized(this) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: pushTempWhitelist File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
pushTempWhitelist
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Test public void executeParamNullConnection(TestContext context) throws Exception { postgresClientNullConnection().execute("SELECT 1", new JsonArray(), context.asyncAssertFailure()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: executeParamNullConnection File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
executeParamNullConnection
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
protected void destroyContentViewCoreInternal(ContentViewCore cvc) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroyContentViewCoreInternal File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
destroyContentViewCoreInternal
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public SecurityCheck getSecuritySettings() { checkTrusted(); return SecurityCheck.INSTANCE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSecuritySettings File: api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java Repository: Karlatemp/UnsafeAccessor The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-31139
MEDIUM
4.3
Karlatemp/UnsafeAccessor
getSecuritySettings
api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java
4ef83000184e8f13239a1ea2847ee401d81585fd
0
Analyze the following code function for security vulnerabilities
protected void openConversationForContact(int position) { Contact contact = (Contact) contacts.get(position); openConversationForContact(contact); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openConversationForContact File: src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
openConversationForContact
src/main/java/eu/siacs/conversations/ui/StartConversationActivity.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
public boolean startUserInBackground(int userid) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startUserInBackground File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startUserInBackground
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0