instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(android.Manifest.permission.MANAGE_USERS) public boolean isDeviceProvisioningConfigApplied() { try { return mService.isDeviceProvisioningConfigApplied(); } catch (RemoteException re) { throw re.rethrowFromSystemServer(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDeviceProvisioningConfigApplied File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isDeviceProvisioningConfigApplied
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override protected Integer exec() { final List<Cell[]> rows = new DataFileParser(rule.getSourceFile()).parse(); this.setTotal(rows.size() - 1); final ID defaultOwning = ObjectUtils.defaultIfNull(rule.getDefaultOwningUser(), getUser()); GeneralEntityServiceContextHolder.setSkipSeriesValue(); final EntityService ies = Application.getEntityService(rule.getToEntity().getEntityCode()); for (final Cell[] row : rows) { if (isInterrupt()) { this.setInterrupted(); break; } Cell fc = row == null || row.length == 0 ? null : row[0]; if (fc == null || fc.getRowNo() == 0) continue; try { Record record = checkoutRecord(row, defaultOwning); if (record == null) { traceLogs.add(new Object[] { fc.getRowNo(), "SKIP" }); } else { boolean isNew = record.getPrimary() == null; record = ies.createOrUpdate(record); this.addSucceeded(); traceLogs.add(new Object[] { fc.getRowNo(), isNew ? "CREATED" : "UPDATED", record.getPrimary(), cellTraces }); } } catch (Exception ex) { String error = ThrowableUtils.getRootCause(ex).getLocalizedMessage(); log.error("ROW#{} > {}", fc.getRowNo(), error, ex); if (ex instanceof JdbcException) { String know = KnownExceptionConverter.convert2ErrorMsg(ex); if (know != null) error = know; } traceLogs.add(new Object[] { fc.getRowNo(), "ERROR", error }); } finally { // 可能有级联触发器 Object ts = FieldAggregation.cleanTriggerChain(); if (ts != null) log.info("Clean current-loop : {}", ts); } this.addCompleted(); } return this.getSucceeded(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exec File: src/main/java/com/rebuild/core/service/dataimport/DataImporter.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
exec
src/main/java/com/rebuild/core/service/dataimport/DataImporter.java
d0de4cc35303168f44ca57712c824b5cb9525e54
0
Analyze the following code function for security vulnerabilities
public static void dumpCurrentRow(Cursor cursor, StringBuilder sb) { String[] cols = cursor.getColumnNames(); sb.append(cursor.getPosition()).append(" {\n"); int length = cols.length; for (int i = 0; i < length; i++) { String value; try { value = cursor.getString(i); } catch (SQLiteException e) { // assume that if the getString threw this exception then the column is not // representable by a string, e.g. it is a BLOB. value = "<unprintable>"; } sb.append(" ").append(cols[i]).append('=').append(value).append('\n'); } sb.append("}\n"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpCurrentRow File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
dumpCurrentRow
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
@Override public boolean havePassword(int userId) throws RemoteException { // Do we need a permissions check here? return mStorage.hasPassword(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: havePassword File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
havePassword
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
@Override public void drawLine(Object graphics, int x1, int y1, int x2, int y2) { ((AndroidGraphics) graphics).drawLine(x1, y1, x2, y2); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: drawLine File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
drawLine
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
@Override public VFSStatus copyFrom(VFSItem source, Identity savedBy) { return copyFrom(source, true, savedBy); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyFrom File: src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
copyFrom
src/main/java/org/olat/core/util/vfs/LocalFolderImpl.java
336d5ce80681be61a0bbf4f73d2af5d1ff67e93a
0
Analyze the following code function for security vulnerabilities
@Override public boolean onSetFieldValueWarn(Field field, String value, Record record) { // 非业务实体 if (MetadataHelper.isBusinessEntity(field.getOwnEntity())) return true; final boolean isNew = record.getPrimary() == null; // 明细关联主记录 if (isNew && isDtmField(field)) return true; // 公共字段前台可能会布局出来 // 此处忽略检查没问题,因为最后还会复写,即 #bindCommonsFieldsValue boolean isCommonField = MetadataHelper.isCommonsField(field); if (!isCommonField) return false; String fieldName = field.getName(); return isNew || (!EntityHelper.OwningUser.equalsIgnoreCase(fieldName) && !EntityHelper.OwningDept.equalsIgnoreCase(fieldName) && !EntityHelper.CreatedBy.equalsIgnoreCase(fieldName) && !EntityHelper.CreatedOn.equalsIgnoreCase(fieldName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSetFieldValueWarn File: src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-1613
MEDIUM
4
getrebuild/rebuild
onSetFieldValueWarn
src/main/java/com/rebuild/core/metadata/EntityRecordCreator.java
d0de4cc35303168f44ca57712c824b5cb9525e54
0
Analyze the following code function for security vulnerabilities
private ProductionFrontier getProductionFrontier(final Element element, final String attribute, final boolean mustFind) throws GameParseException { return getValidatedObject(element, attribute, mustFind, data.getProductionFrontierList()::getProductionFrontier, "production frontier"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProductionFrontier File: game-core/src/main/java/games/strategy/engine/data/GameParser.java Repository: triplea-game/triplea The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000546
MEDIUM
6.8
triplea-game/triplea
getProductionFrontier
game-core/src/main/java/games/strategy/engine/data/GameParser.java
0f23875a4c6e166218859a63c884995f15c53895
0
Analyze the following code function for security vulnerabilities
@Override public int addAppTask(IBinder activityToken, Intent intent, ActivityManager.TaskDescription description, Bitmap thumbnail) throws RemoteException { final int callingUid = Binder.getCallingUid(); final long callingIdent = Binder.clearCallingIdentity(); try { synchronized (this) { ActivityRecord r = ActivityRecord.isInStackLocked(activityToken); if (r == null) { throw new IllegalArgumentException("Activity does not exist; token=" + activityToken); } ComponentName comp = intent.getComponent(); if (comp == null) { throw new IllegalArgumentException("Intent " + intent + " must specify explicit component"); } if (thumbnail.getWidth() != mThumbnailWidth || thumbnail.getHeight() != mThumbnailHeight) { throw new IllegalArgumentException("Bad thumbnail size: got " + thumbnail.getWidth() + "x" + thumbnail.getHeight() + ", require " + mThumbnailWidth + "x" + mThumbnailHeight); } if (intent.getSelector() != null) { intent.setSelector(null); } if (intent.getSourceBounds() != null) { intent.setSourceBounds(null); } if ((intent.getFlags()&Intent.FLAG_ACTIVITY_NEW_DOCUMENT) != 0) { if ((intent.getFlags()&Intent.FLAG_ACTIVITY_RETAIN_IN_RECENTS) == 0) { // The caller has added this as an auto-remove task... that makes no // sense, so turn off auto-remove. intent.addFlags(Intent.FLAG_ACTIVITY_RETAIN_IN_RECENTS); } } else if ((intent.getFlags()&Intent.FLAG_ACTIVITY_NEW_TASK) != 0) { // Must be a new task. intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); } if (!comp.equals(mLastAddedTaskComponent) || callingUid != mLastAddedTaskUid) { mLastAddedTaskActivity = null; } ActivityInfo ainfo = mLastAddedTaskActivity; if (ainfo == null) { ainfo = mLastAddedTaskActivity = AppGlobals.getPackageManager().getActivityInfo( comp, 0, UserHandle.getUserId(callingUid)); if (ainfo.applicationInfo.uid != callingUid) { throw new SecurityException( "Can't add task for another application: target uid=" + ainfo.applicationInfo.uid + ", calling uid=" + callingUid); } } // Use the full screen as the context for the task thumbnail final Point displaySize = new Point(); final TaskThumbnailInfo thumbnailInfo = new TaskThumbnailInfo(); r.task.stack.getDisplaySize(displaySize); thumbnailInfo.taskWidth = displaySize.x; thumbnailInfo.taskHeight = displaySize.y; thumbnailInfo.screenOrientation = mConfiguration.orientation; TaskRecord task = new TaskRecord(this, mStackSupervisor.getNextTaskIdForUserLocked(r.userId), ainfo, intent, description, thumbnailInfo); int trimIdx = mRecentTasks.trimForTaskLocked(task, false); if (trimIdx >= 0) { // If this would have caused a trim, then we'll abort because that // means it would be added at the end of the list but then just removed. return INVALID_TASK_ID; } final int N = mRecentTasks.size(); if (N >= (ActivityManager.getMaxRecentTasksStatic()-1)) { final TaskRecord tr = mRecentTasks.remove(N - 1); tr.removedFromRecents(); } task.inRecents = true; mRecentTasks.add(task); r.task.stack.addTask(task, false, "addAppTask"); task.setLastThumbnailLocked(thumbnail); task.freeLastThumbnail(); return task.taskId; } } finally { Binder.restoreCallingIdentity(callingIdent); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addAppTask File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
addAppTask
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public static void cleanUp() { SnappyLoader.cleanUpExtractedNativeLib(); SnappyLoader.setSnappyApi(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanUp File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
cleanUp
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
private Converter createConverterBasedOnClass(Class<?> targetClass, Class<?> baseClass) { Converter returnVal = (Converter) newConverter(targetClass, converterTypeMap, baseClass); if (returnVal != null) { if (LOGGER.isLoggable(Level.FINE)) { LOGGER.fine(MessageFormat.format("Created converter of type ''{0}''", returnVal.getClass().getName())); } return returnVal; } // Search for converters registered to interfaces implemented by // targetClass Class<?>[] interfaces = targetClass.getInterfaces(); if (interfaces != null) { for (int i = 0; i < interfaces.length; i++) { returnVal = createConverterBasedOnClass(interfaces[i], null); if (returnVal != null) { if (LOGGER.isLoggable(Level.FINE)) { LOGGER.fine(MessageFormat.format("Created converter of type ''{0}''", returnVal.getClass().getName())); } return returnVal; } } } // Search for converters registered to superclasses of targetClass Class<?> superclass = targetClass.getSuperclass(); if (superclass != null) { returnVal = createConverterBasedOnClass(superclass, targetClass); if (returnVal != null) { if (LOGGER.isLoggable(Level.FINE)) { LOGGER.fine(MessageFormat.format("Created converter of type ''{0}''", returnVal.getClass().getName())); } return returnVal; } } return returnVal; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createConverterBasedOnClass File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
createConverterBasedOnClass
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
@Override public void setQSPanel(final QSPanel qsPanel) { mQsPanel = qsPanel; setupHost(qsPanel.getHost()); if (mQsPanel != null) { mMultiUserSwitch.setQsPanel(qsPanel); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setQSPanel File: packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3886
HIGH
7.2
android
setQSPanel
packages/SystemUI/src/com/android/systemui/statusbar/phone/QuickStatusBarHeader.java
6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5
0
Analyze the following code function for security vulnerabilities
public ActivityTaskManagerService getService() { return mService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getService File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getService
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
void startLockTaskModeLocked(TaskRecord task) { if (DEBUG_LOCKTASK) Slog.w(TAG_LOCKTASK, "startLockTaskModeLocked: " + task); if (task.mLockTaskAuth == LOCK_TASK_AUTH_DONT_LOCK) { return; } // isSystemInitiated is used to distinguish between locked and pinned mode, as pinned mode // is initiated by system after the pinning request was shown and locked mode is initiated // by an authorized app directly final int callingUid = Binder.getCallingUid(); boolean isSystemInitiated = callingUid == Process.SYSTEM_UID; long ident = Binder.clearCallingIdentity(); try { final ActivityStack stack = mStackSupervisor.getFocusedStack(); if (!isSystemInitiated) { task.mLockTaskUid = callingUid; if (task.mLockTaskAuth == LOCK_TASK_AUTH_PINNABLE) { // startLockTask() called by app and task mode is lockTaskModeDefault. if (DEBUG_LOCKTASK) Slog.w(TAG_LOCKTASK, "Mode default, asking user"); StatusBarManagerInternal statusBarManager = LocalServices.getService(StatusBarManagerInternal.class); if (statusBarManager != null) { statusBarManager.showScreenPinningRequest(); } return; } if (stack == null || task != stack.topTask()) { throw new IllegalArgumentException("Invalid task, not in foreground"); } } if (DEBUG_LOCKTASK) Slog.w(TAG_LOCKTASK, isSystemInitiated ? "Locking pinned" : "Locking fully"); mStackSupervisor.setLockTaskModeLocked(task, isSystemInitiated ? ActivityManager.LOCK_TASK_MODE_PINNED : ActivityManager.LOCK_TASK_MODE_LOCKED, "startLockTask", true); } finally { Binder.restoreCallingIdentity(ident); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startLockTaskModeLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
startLockTaskModeLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public void preload(Region region) { if (Settings.settings().QUEUE.PRELOAD_CHUNK_COUNT > 1) { int loadCount = 0; for (BlockVector2 from : region.getChunks()) { if (loadCount >= Settings.settings().QUEUE.PRELOAD_CHUNK_COUNT) { break; } loadCount++; addChunkLoad(from.getBlockX(), from.getBlockZ()); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: preload File: worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java Repository: IntellectualSites/FastAsyncWorldEdit The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-35925
MEDIUM
5.5
IntellectualSites/FastAsyncWorldEdit
preload
worldedit-core/src/main/java/com/fastasyncworldedit/core/queue/implementation/SingleThreadQueueExtent.java
3a8dfb4f7b858a439c35f7af1d56d21f796f61f5
0
Analyze the following code function for security vulnerabilities
public static final RMQMessage recreate(StreamMessage msg) throws JMSException { RMQStreamMessage rmqSMsg = new RMQStreamMessage(); RMQMessage.copyAttributes(rmqSMsg, msg); msg.reset(); // reset to beginning boolean endOfStream = false; while(!endOfStream) { try { rmqSMsg.writeObject(msg.readObject()); } catch (MessageEOFException e) { endOfStream = true; } } return rmqSMsg; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recreate File: src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
recreate
src/main/java/com/rabbitmq/jms/client/message/RMQStreamMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public void setAllowAppSwitches(@NonNull String type, int uid, int userId) { if (!mAmInternal.isUserRunning(userId, ActivityManager.FLAG_OR_STOPPED)) { return; } synchronized (mGlobalLock) { ArrayMap<String, Integer> types = mAllowAppSwitchUids.get(userId); if (types == null) { if (uid < 0) { return; } types = new ArrayMap<>(); mAllowAppSwitchUids.put(userId, types); } if (uid < 0) { types.remove(type); } else { types.put(type, uid); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowAppSwitches File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
setAllowAppSwitches
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) { Rlog.d(TAG, "remember this choice: " + isChecked); mRememberChoice = isChecked; if (isChecked) { mPositiveButton.setText(R.string.sms_short_code_confirm_always_allow); mNegativeButton.setText(R.string.sms_short_code_confirm_never_allow); if (mRememberUndoInstruction != null) { mRememberUndoInstruction. setText(R.string.sms_short_code_remember_undo_instruction); mRememberUndoInstruction.setPadding(0,0,0,32); } } else { mPositiveButton.setText(R.string.sms_short_code_confirm_allow); mNegativeButton.setText(R.string.sms_short_code_confirm_deny); if (mRememberUndoInstruction != null) { mRememberUndoInstruction.setText(""); mRememberUndoInstruction.setPadding(0,0,0,0); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCheckedChanged File: src/java/com/android/internal/telephony/SMSDispatcher.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3858
HIGH
9.3
android
onCheckedChanged
src/java/com/android/internal/telephony/SMSDispatcher.java
df31d37d285dde9911b699837c351aed2320b586
0
Analyze the following code function for security vulnerabilities
@Override public String getPreviousName(Account account) { if (Log.isLoggable(TAG, Log.VERBOSE)) { Log.v(TAG, "getPreviousName: " + account + ", caller's uid " + Binder.getCallingUid() + ", pid " + Binder.getCallingPid()); } Objects.requireNonNull(account, "account cannot be null"); int userId = UserHandle.getCallingUserId(); final long identityToken = clearCallingIdentity(); try { UserAccounts accounts = getUserAccounts(userId); return readPreviousNameInternal(accounts, account); } finally { restoreCallingIdentity(identityToken); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreviousName File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getPreviousName
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@Deprecated @InlineMe( replacement = "Files.asByteSource(file).read(processor)", imports = "com.google.common.io.Files") @CanIgnoreReturnValue // some processors won't return a useful result @ParametricNullness public static <T extends @Nullable Object> T readBytes(File file, ByteProcessor<T> processor) throws IOException { return asByteSource(file).read(processor); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readBytes File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
readBytes
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
public int startActivity(IApplicationThread caller, String callingPackage, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, ProfilerInfo profilerInfo, Bundle options) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(caller != null ? caller.asBinder() : null); data.writeString(callingPackage); intent.writeToParcel(data, 0); data.writeString(resolvedType); data.writeStrongBinder(resultTo); data.writeString(resultWho); data.writeInt(requestCode); data.writeInt(startFlags); if (profilerInfo != null) { data.writeInt(1); profilerInfo.writeToParcel(data, Parcelable.PARCELABLE_WRITE_RETURN_VALUE); } else { data.writeInt(0); } if (options != null) { data.writeInt(1); options.writeToParcel(data, 0); } else { data.writeInt(0); } mRemote.transact(START_ACTIVITY_TRANSACTION, data, reply, 0); reply.readException(); int result = reply.readInt(); reply.recycle(); data.recycle(); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivity File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startActivity
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
protected void addColumnProperty(Object propertyId, Class<?> type, Object defaultValue) throws IllegalStateException { if (!defaultContainer) { throw new IllegalStateException( "Container for this Grid is not a default container from Grid() constructor"); } if (!columns.containsKey(propertyId)) { if (!datasource.getContainerPropertyIds().contains(propertyId)) { datasource.addContainerProperty(propertyId, type, defaultValue); } else { Property<?> containerProperty = datasource.getContainerProperty( datasource.firstItemId(), propertyId); if (containerProperty.getType() == type) { appendColumn(propertyId); } else { throw new IllegalStateException( "DataSource already has the given property " + propertyId + " with a different type"); } } } else { throw new IllegalStateException( "Grid already has a column for property " + propertyId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addColumnProperty File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
addColumnProperty
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") final void updateLruProcessLocked(ProcessRecord app, boolean activityChange, ProcessRecord client) { mProcessList.updateLruProcessLocked(app, activityChange, client); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLruProcessLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
updateLruProcessLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public void setURLConnectionFactory(final HttpURLConnectionFactory urlConnectionFactory) { this.urlConnectionFactory = urlConnectionFactory; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setURLConnectionFactory File: cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java Repository: apereo/java-cas-client The code follows secure coding practices.
[ "CWE-74" ]
CVE-2014-4172
HIGH
7.5
apereo/java-cas-client
setURLConnectionFactory
cas-client-core/src/main/java/org/jasig/cas/client/validation/AbstractUrlBasedTicketValidator.java
ae37092100c8eaec610dab6d83e5e05a8ee58814
0
Analyze the following code function for security vulnerabilities
private static Region getRegionByStr(String str) { String[] tmp = str.split(":"); String chr = tmp[0].replace("chr", ""); tmp = tmp[1].split("-"); int start = Integer.valueOf(tmp[0]); int end = Integer.valueOf(tmp[1]); return new Region(chr, start, end); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRegionByStr File: src/main/java/model/Input.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
getRegionByStr
src/main/java/model/Input.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
@Override public List<KBTemplate> findByUuid(String uuid, int start, int end, OrderByComparator<KBTemplate> orderByComparator) { return findByUuid(uuid, start, end, orderByComparator, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByUuid File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByUuid
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public void crashApplication(int uid, int initialPid, String packageName, String message) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeInt(uid); data.writeInt(initialPid); data.writeString(packageName); data.writeString(message); mRemote.transact(CRASH_APPLICATION_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: crashApplication File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
crashApplication
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public void setToken(@Nullable String token) { this.token = token; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setToken File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/LetsChatNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setToken
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/LetsChatNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
public Bitmap getLargeIcon() { return mLargeIcon; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLargeIcon File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
getLargeIcon
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
protected Set<UUID> getChildren(Map<UUID, Set<UUID>> parents, UUID parent) { Set<UUID> myChildren = new HashSet<>(); // degenerate case, this parent has no children if (!parents.containsKey(parent)) { return myChildren; } // got this far, so we must have children Set<UUID> children = parents.get(parent); // now iterate over all of the children for (UUID child : children) { // add this child's ID to our return set myChildren.add(child); // and now its children myChildren.addAll(getChildren(parents, child)); } return myChildren; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildren File: dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java Repository: DSpace The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-41189
HIGH
9
DSpace
getChildren
dspace-api/src/main/java/org/dspace/eperson/GroupServiceImpl.java
277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
0
Analyze the following code function for security vulnerabilities
public ServerBuilder disableDateHeader() { enableDateHeader = false; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: disableDateHeader File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
disableDateHeader
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return "AMQChannel(" + _connection + "," + _channelNumber + ")"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
toString
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public void sendAsynchronousMessage(byte[] msg) throws IOException { synchronized (asynchronousQueue) { asynchronousQueue.addElement(msg); /* This limit should be flexible enough. We need this, otherwise the peer * can flood us with global requests (and other stuff where we have to reply * with an asynchronous message) and (if the server just sends data and does not * read what we send) this will probably put us in a low memory situation * (our send queue would grow and grow and...) */ if (asynchronousQueue.size() > 100) throw new IOException("Error: the peer is not consuming our asynchronous replies."); /* Check if we have an asynchronous sending thread */ if (asynchronousThread == null) { asynchronousThread = new AsynchronousWorker(); asynchronousThread.setDaemon(true); asynchronousThread.start(); /* The thread will stop after 2 seconds of inactivity (i.e., empty queue) */ } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendAsynchronousMessage File: src/main/java/com/trilead/ssh2/transport/TransportManager.java Repository: connectbot/sshlib The code follows secure coding practices.
[ "CWE-354" ]
CVE-2023-48795
MEDIUM
5.9
connectbot/sshlib
sendAsynchronousMessage
src/main/java/com/trilead/ssh2/transport/TransportManager.java
5c8b534f6e97db7ac0e0e579331213aa25c173ab
0
Analyze the following code function for security vulnerabilities
public void setRestTemplate(RestTemplate restTemplate) { this.restTemplate = restTemplate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRestTemplate File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
setRestTemplate
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/MicrosoftTeamsNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
final void showLaunchWarningLocked(final ActivityRecord cur, final ActivityRecord next) { if (!mLaunchWarningShown) { mLaunchWarningShown = true; mUiHandler.post(new Runnable() { @Override public void run() { synchronized (ActivityManagerService.this) { final Dialog d = new LaunchWarningWindow(mContext, cur, next); d.show(); mUiHandler.postDelayed(new Runnable() { @Override public void run() { synchronized (ActivityManagerService.this) { d.dismiss(); mLaunchWarningShown = false; } } }, 4000); } } }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: showLaunchWarningLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
showLaunchWarningLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public abstract void execute( RequestContext requestContext ) throws IOException, LockFailedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: execute File: core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java Repository: opencrx The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-46502
CRITICAL
9.8
opencrx
execute
core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java
ce7a71db0bb34ecbcb0e822d40598e410a48b399
0
Analyze the following code function for security vulnerabilities
private static String replaceSecurityRoles(final String orig, final User user) { String retVal = orig; if (orig.contains("${user.securityRoles}") || orig.contains("${user_securityRoles}")) { final String commaSeparatedRoles = toQuotedCommaSeparatedString(user.getSecurityRoles()); retVal = orig.replace("${user.securityRoles}", commaSeparatedRoles).replace("${user_securityRoles}", commaSeparatedRoles); } return retVal; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: replaceSecurityRoles File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
replaceSecurityRoles
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
@Override public int startActivitiesAsPackage(String packageName, @Nullable String featureId, int userId, Intent[] intents, Bundle bOptions) { Objects.requireNonNull(intents, "intents"); final String[] resolvedTypes = new String[intents.length]; // UID of the package on user userId. // "= 0" is needed because otherwise catch(RemoteException) would make it look like // packageUid may not be initialized. int packageUid = 0; final long ident = Binder.clearCallingIdentity(); try { for (int i = 0; i < intents.length; i++) { resolvedTypes[i] = intents[i].resolveTypeIfNeeded(mContext.getContentResolver()); } packageUid = AppGlobals.getPackageManager().getPackageUid( packageName, PackageManager.MATCH_DEBUG_TRIAGED_MISSING, userId); } catch (RemoteException e) { // Shouldn't happen. } finally { Binder.restoreCallingIdentity(ident); } return getActivityStartController().startActivitiesInPackage( packageUid, packageName, featureId, intents, resolvedTypes, null /* resultTo */, SafeActivityOptions.fromBundle(bOptions), userId, false /* validateIncomingUser */, null /* originatingPendingIntent */, false /* allowBackgroundActivityStart */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivitiesAsPackage File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
startActivitiesAsPackage
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public static CertRequestInfo fromDOM(Element infoElement) { CertRequestInfo info = new CertRequestInfo(); CMSRequestInfo.fromDOM(infoElement, info); NodeList certIDLList = infoElement.getElementsByTagName("certID"); if (certIDLList.getLength() > 0) { String value = certIDLList.item(0).getTextContent(); info.setCertId(new CertId(value)); } else { // TODO: remove in PKI 12 String id = infoElement.getAttribute("id"); info.setCertId(StringUtils.isEmpty(id) ? null : new CertId(id)); } NodeList certURLList = infoElement.getElementsByTagName("certURL"); if (certURLList.getLength() > 0) { String value = certURLList.item(0).getTextContent(); info.setCertURL(value); } NodeList certRequestTypeList = infoElement.getElementsByTagName("certRequestType"); if (certRequestTypeList.getLength() > 0) { String value = certRequestTypeList.item(0).getTextContent(); info.setCertRequestType(value); } NodeList operationResultList = infoElement.getElementsByTagName("operationResult"); if (operationResultList.getLength() > 0) { String value = operationResultList.item(0).getTextContent(); info.setOperationResult(value); } NodeList typeList = infoElement.getElementsByTagName("errorMessage"); if (typeList.getLength() > 0) { String value = typeList.item(0).getTextContent(); info.setErrorMessage(value); } return info; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromDOM File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
fromDOM
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
private void updateInteropDatabase() { interopDatabaseClearNative(); String interop_string = Settings.Global.getString(getContentResolver(), Settings.Global.BLUETOOTH_INTEROPERABILITY_LIST); if (interop_string == null) return; Log.d(TAG, "updateInteropDatabase: [" + interop_string + "]"); String[] entries = interop_string.split(";"); for (String entry : entries) { String[] tokens = entry.split(","); if (tokens.length != 2) continue; // Get feature int feature = 0; try { feature = Integer.parseInt(tokens[1]); } catch (NumberFormatException e) { Log.e(TAG, "updateInteropDatabase: Invalid feature '" + tokens[1] + "'"); continue; } // Get address bytes and length int length = (tokens[0].length() + 1) / 3; if (length < 1 || length > 6) { Log.e(TAG, "updateInteropDatabase: Malformed address string '" + tokens[0] + "'"); continue; } byte[] addr = new byte[6]; int offset = 0; for (int i = 0; i < tokens[0].length(); ) { if (tokens[0].charAt(i) == ':') { i += 1; } else { try { addr[offset++] = (byte) Integer.parseInt(tokens[0].substring(i, i + 2), 16); } catch (NumberFormatException e) { offset = 0; break; } i += 2; } } // Check if address was parsed ok, otherwise, move on... if (offset == 0) continue; // Add entry interopDatabaseAddNative(feature, addr, length); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateInteropDatabase File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
updateInteropDatabase
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
@Column(name = "error_password", length = 100) public String getErrorPassword() { return this.errorPassword; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getErrorPassword File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
getErrorPassword
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/log/LogLogin.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@Override public void binderDied() { mService.onSessionDied(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: binderDied File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
binderDied
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
private HashMap<String, String> getAllConfigFlags(@Nullable String prefix) { if (DEBUG) { Slog.v(LOG_TAG, "getAllConfigFlags() for " + prefix); } DeviceConfig.enforceReadPermission(getContext(), prefix != null ? prefix.split("/")[0] : null); synchronized (mLock) { // Get the settings. SettingsState settingsState = mSettingsRegistry.getSettingsLocked( SETTINGS_TYPE_CONFIG, UserHandle.USER_SYSTEM); List<String> names = getSettingsNamesLocked(SETTINGS_TYPE_CONFIG, UserHandle.USER_SYSTEM); final int nameCount = names.size(); HashMap<String, String> flagsToValues = new HashMap<>(names.size()); for (int i = 0; i < nameCount; i++) { String name = names.get(i); Setting setting = settingsState.getSettingLocked(name); if (prefix == null || setting.getName().startsWith(prefix)) { flagsToValues.put(setting.getName(), setting.getValue()); } } return flagsToValues; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllConfigFlags File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getAllConfigFlags
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
private void updateNetworkPreferenceForUser(int userId, List<PreferentialNetworkServiceConfig> preferentialNetworkServiceConfigs) { if (!isManagedProfile(userId) && !isDeviceOwnerUserId(userId)) { return; } List<ProfileNetworkPreference> preferences = new ArrayList<>(); for (PreferentialNetworkServiceConfig preferentialNetworkServiceConfig : preferentialNetworkServiceConfigs) { ProfileNetworkPreference.Builder preferenceBuilder = new ProfileNetworkPreference.Builder(); if (preferentialNetworkServiceConfig.isEnabled()) { if (preferentialNetworkServiceConfig.isFallbackToDefaultConnectionAllowed()) { preferenceBuilder.setPreference(PROFILE_NETWORK_PREFERENCE_ENTERPRISE); } else { preferenceBuilder.setPreference( PROFILE_NETWORK_PREFERENCE_ENTERPRISE_NO_FALLBACK); } preferenceBuilder.setIncludedUids( preferentialNetworkServiceConfig.getIncludedUids()); preferenceBuilder.setExcludedUids( preferentialNetworkServiceConfig.getExcludedUids()); preferenceBuilder.setPreferenceEnterpriseId( preferentialNetworkServiceConfig.getNetworkId()); } else { preferenceBuilder.setPreference(PROFILE_NETWORK_PREFERENCE_DEFAULT); } preferences.add(preferenceBuilder.build()); } Slogf.d(LOG_TAG, "updateNetworkPreferenceForUser to " + preferences); mInjector.binderWithCleanCallingIdentity(() -> mInjector.getConnectivityManager().setProfileNetworkPreferences( UserHandle.of(userId), preferences, null /* executor */, null /* listener */)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateNetworkPreferenceForUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
updateNetworkPreferenceForUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
public void play(String packageName, int pid, int uid) { try { final String reason = TAG + ":play"; mService.tempAllowlistTargetPkgIfPossible(getUid(), getPackageName(), pid, uid, packageName, reason); mCb.onPlay(packageName, pid, uid); } catch (RemoteException e) { Log.e(TAG, "Remote failure in play.", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: play File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
play
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public void removeToGc(List<String> apiIds) { ApiScenarioExampleWithOperation example = new ApiScenarioExampleWithOperation(); example.createCriteria().andIdIn(apiIds); example.setOperator(SessionUtils.getUserId()); example.setOperationTime(System.currentTimeMillis()); extApiScenarioMapper.removeToGcByExample(example); //将这些场景的定时任务删除掉 for (String id : apiIds) { scheduleService.deleteByResourceId(id, ScheduleGroup.API_SCENARIO_TEST.name()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeToGc File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
removeToGc
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
@SuppressLint("CheckResult") private void downloadMoreItemsForFeed(final Long feedId) { Completable.fromAction(new Action() { @Override public void run() throws Exception { DatabaseConnectionOrm dbConn = new DatabaseConnectionOrm(NewsReaderListActivity.this); RssItem rssItem = dbConn.getLowestRssItemIdByFeed(feedId); long offset = Long.MAX_VALUE; if(rssItem != null) { offset = rssItem.getId(); } int type = 0; // the type of the query (Feed: 0, Folder: 1, Starred: 2, All: 3) List<RssItem> buffer = mApi.getNewsAPI().items(100, offset, type, feedId, true, false).execute().body(); RssItemObservable.performDatabaseBatchInsert(dbConn, buffer); } }) .subscribeOn(Schedulers.newThread()) .observeOn(AndroidSchedulers.mainThread()) .subscribe(() -> { updateCurrentRssView(); Log.v(TAG, "Finished Download extra items.."); }, throwable -> { throwable.printStackTrace(); Throwable e = OkHttpSSLClient.HandleExceptions(throwable); Toast.makeText(NewsReaderListActivity.this, getString(R.string.login_dialog_text_something_went_wrong) + " - " + e.getMessage(), Toast.LENGTH_SHORT).show(); }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: downloadMoreItemsForFeed File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android The code follows secure coding practices.
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
downloadMoreItemsForFeed
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
0
Analyze the following code function for security vulnerabilities
public void assertOnPage(final String pageURL) { final String pageURI = pageURL.replaceAll("\\?.*", ""); getDriver().waitUntilCondition(new ExpectedCondition<Boolean>() { @Override public Boolean apply(WebDriver driver) { return getDriver().getCurrentUrl().contains(pageURI); } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: assertOnPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
assertOnPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public String encodeRedirectURL(String s) { return this.response.encodeRedirectURL(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encodeRedirectURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-601" ]
CVE-2022-23618
MEDIUM
5.8
xwiki/xwiki-platform
encodeRedirectURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiServletResponse.java
5251c02080466bf9fb55288f04a37671108f8096
0
Analyze the following code function for security vulnerabilities
private void addCcAddresses(Collection<String> addresses, Collection<String> toAddresses) { addCcAddressesToList(tokenizeAddressList(addresses), toAddresses != null ? tokenizeAddressList(toAddresses) : null, mCc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCcAddresses File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
addCcAddresses
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void removeActiveAdmin(@NonNull ComponentName admin) { throwIfParentInstance("removeActiveAdmin"); if (mService != null) { try { mService.removeActiveAdmin(admin, myUserId()); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeActiveAdmin File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
removeActiveAdmin
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public static Service getService(Map environment) { Service service = null; InitialContext context = null; EngineConfiguration configProvider = (EngineConfiguration)environment.get(EngineConfiguration.PROPERTY_NAME); if (configProvider == null) configProvider = (EngineConfiguration)threadDefaultConfig.get(); if (configProvider == null) configProvider = getDefaultEngineConfig(); // First check to see if JNDI works // !!! Might we need to set up context parameters here? try { context = new InitialContext(); } catch (NamingException e) { } if (context != null) { String name = (String)environment.get("jndiName"); if(name!=null && (name.toUpperCase().indexOf("LDAP")!=-1 || name.toUpperCase().indexOf("RMI")!=-1 || name.toUpperCase().indexOf("JMS")!=-1 || name.toUpperCase().indexOf("JMX")!=-1) || name.toUpperCase().indexOf("JRMP")!=-1 || name.toUpperCase().indexOf("JAVA")!=-1 || name.toUpperCase().indexOf("DNS")!=-1) { return null; } if (name == null) { name = "axisServiceName"; } // We've got JNDI, so try to find an AxisClient at the // specified name. try { service = (Service)context.lookup(name); } catch (NamingException e) { service = new Service(configProvider); try { context.bind(name, service); } catch (NamingException e1) { // !!! Couldn't do it, what should we do here? return null; } } } else { service = new Service(configProvider); } return service; }
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2023-51441 - Severity: HIGH - CVSS Score: 7.2 Description: Filter out more unsupported protocols in the client class ServiceFactory Function: getService File: axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java Repository: apache/axis-axis1-java Fixed Code: public static Service getService(Map environment) { Service service = null; InitialContext context = null; EngineConfiguration configProvider = (EngineConfiguration)environment.get(EngineConfiguration.PROPERTY_NAME); if (configProvider == null) configProvider = (EngineConfiguration)threadDefaultConfig.get(); if (configProvider == null) configProvider = getDefaultEngineConfig(); // First check to see if JNDI works // !!! Might we need to set up context parameters here? try { context = new InitialContext(); } catch (NamingException e) { } if (context != null) { String name = (String)environment.get("jndiName"); if(name!=null && (name.toUpperCase().indexOf("LDAP")!=-1 || name.toUpperCase().indexOf("RMI")!=-1 || name.toUpperCase().indexOf("JMS")!=-1 || name.toUpperCase().indexOf("JMX")!=-1) || name.toUpperCase().indexOf("JRMP")!=-1 || name.toUpperCase().indexOf("JAVA")!=-1 || name.toUpperCase().indexOf("DNS")!=-1 || name.toUpperCase().indexOf("IIOP")!=-1 || name.toUpperCase().indexOf("CORBANAME")!=-1) { log.warn("returning null, jndiName received by ServiceFactory.getService() is not supported by this method: " + name); return null; } if (name == null) { name = "axisServiceName"; } // We've got JNDI, so try to find an AxisClient at the // specified name. try { service = (Service)context.lookup(name); } catch (NamingException e) { service = new Service(configProvider); try { context.bind(name, service); } catch (NamingException e1) { // !!! Couldn't do it, what should we do here? return null; } } } else { service = new Service(configProvider); } return service; }
[ "CWE-918" ]
CVE-2023-51441
HIGH
7.2
apache/axis-axis1-java
getService
axis-rt-core/src/main/java/org/apache/axis/client/ServiceFactory.java
685c309febc64aa393b2d64a05f90e7eb9f73e06
1
Analyze the following code function for security vulnerabilities
private static String chooseExtensionFromMimeType(String mimeType, boolean useDefaults) { String extension = null; if (mimeType != null) { extension = MimeTypeMap.getSingleton().getExtensionFromMimeType(mimeType); if (extension != null) { if (Constants.LOGVV) { Log.v(Constants.TAG, "adding extension from type"); } extension = "." + extension; } else { if (Constants.LOGVV) { Log.v(Constants.TAG, "couldn't find extension for " + mimeType); } } } if (extension == null) { if (mimeType != null && mimeType.toLowerCase().startsWith("text/")) { if (mimeType.equalsIgnoreCase("text/html")) { if (Constants.LOGVV) { Log.v(Constants.TAG, "adding default html extension"); } extension = Constants.DEFAULT_DL_HTML_EXTENSION; } else if (useDefaults) { if (Constants.LOGVV) { Log.v(Constants.TAG, "adding default text extension"); } extension = Constants.DEFAULT_DL_TEXT_EXTENSION; } } else if (useDefaults) { if (Constants.LOGVV) { Log.v(Constants.TAG, "adding default binary extension"); } extension = Constants.DEFAULT_DL_BINARY_EXTENSION; } } return extension; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: chooseExtensionFromMimeType File: src/com/android/providers/downloads/Helpers.java Repository: android The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-0848
HIGH
7.2
android
chooseExtensionFromMimeType
src/com/android/providers/downloads/Helpers.java
bdc831357e7a116bc561d51bf2ddc85ff11c01a9
0
Analyze the following code function for security vulnerabilities
public Injector getInjector() { return lookup(Injector.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInjector File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getInjector
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public int processMessage(String app_id, String content_type, Intent intent) throws RemoteException { Log.d(LOG_TAG, "wpman processMsg " + app_id + ":" + content_type); WapPushManDBHelper dbh = getDatabase(mContext); SQLiteDatabase db = dbh.getReadableDatabase(); WapPushManDBHelper.queryData lastapp = dbh.queryLastApp(db, app_id, content_type); db.close(); if (lastapp == null) { Log.w(LOG_TAG, "no receiver app found for " + app_id + ":" + content_type); return WapPushManagerParams.APP_QUERY_FAILED; } if (LOCAL_LOGV) Log.v(LOG_TAG, "starting " + lastapp.packageName + "/" + lastapp.className); if (lastapp.needSignature != 0) { if (!signatureCheck(lastapp.packageName)) { return WapPushManagerParams.SIGNATURE_NO_MATCH; } } if (lastapp.appType == WapPushManagerParams.APP_TYPE_ACTIVITY) { //Intent intent = new Intent(Intent.ACTION_MAIN); intent.setClassName(lastapp.packageName, lastapp.className); intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); try { mContext.startActivity(intent); } catch (ActivityNotFoundException e) { Log.w(LOG_TAG, "invalid name " + lastapp.packageName + "/" + lastapp.className); return WapPushManagerParams.INVALID_RECEIVER_NAME; } } else { intent.setClassName(mContext, lastapp.className); intent.setComponent(new ComponentName(lastapp.packageName, lastapp.className)); if (mContext.startService(intent) == null) { Log.w(LOG_TAG, "invalid name " + lastapp.packageName + "/" + lastapp.className); return WapPushManagerParams.INVALID_RECEIVER_NAME; } } return WapPushManagerParams.MESSAGE_HANDLED | (lastapp.furtherProcessing == 1 ? WapPushManagerParams.FURTHER_PROCESSING : 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processMessage File: packages/WAPPushManager/src/com/android/smspush/WapPushManager.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2014-8507
HIGH
7.5
android
processMessage
packages/WAPPushManager/src/com/android/smspush/WapPushManager.java
48ed835468c6235905459e6ef7df032baf3e4df6
0
Analyze the following code function for security vulnerabilities
private void handleErr(final RequestImpl req, final ResponseImpl rsp, final Throwable ex) { Logger log = LoggerFactory.getLogger(HttpHandler.class); try { log.debug("execution of: {}{} resulted in exception", req.method(), req.path(), ex); // execution failed, find status code Status status = sc.apply(ex); if (status == Status.REQUESTED_RANGE_NOT_SATISFIABLE) { String range = rsp.header("Content-Length").toOptional().map(it -> "bytes */" + it) .orElse("*"); rsp.reset(); rsp.header("Content-Range", range); } else { rsp.reset(); } rsp.header("Cache-Control", NO_CACHE); rsp.status(status); Err err = ex instanceof Err ? (Err) ex : new Err(status, ex); Iterator<Handler> it = this.err.iterator(); while (!rsp.committed() && it.hasNext()) { Err.Handler next = it.next(); log.debug("handling err with: {}", next); next.handle(req, rsp, err); } } catch (Throwable errex) { log.error("error handler resulted in exception: {}{}\nRoute:\n{}\n\nStacktrace:\n{}\nSource:", req.method(), req.path(), req.route().print(6), Throwables.getStackTraceAsString(errex), ex); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleErr File: jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-15477
MEDIUM
4.3
jooby-project/jooby
handleErr
jooby/src/main/java/org/jooby/internal/HttpHandlerImpl.java
34856a738829d8fedca4ed27bd6ff413af87186f
0
Analyze the following code function for security vulnerabilities
public void destroy() { ServiceDestroyEvent event = new ServiceDestroyEvent(this); serviceDestroyListeners .forEach(listener -> listener.serviceDestroy(event)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: server/src/main/java/com/vaadin/server/VaadinService.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-203" ]
CVE-2021-31403
LOW
1.9
vaadin/framework
destroy
server/src/main/java/com/vaadin/server/VaadinService.java
d852126ab6f0c43f937239305bd0e9594834fe34
0
Analyze the following code function for security vulnerabilities
public ParaClient getParaClient() { return pc; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParaClient File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getParaClient
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public static boolean isHostName(String hostName) { return VALID_HOSTNAME_PATTERN.matcher(hostName).matches(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isHostName File: graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-345" ]
CVE-2023-41045
MEDIUM
5.3
Graylog2/graylog2-server
isHostName
graylog2-server/src/main/java/org/graylog2/lookup/adapters/dnslookup/DnsClient.java
466af814523cffae9fbc7e77bab7472988f03c3e
0
Analyze the following code function for security vulnerabilities
private void initDefaultGuestRestrictions() { if (mGuestRestrictions.isEmpty()) { mGuestRestrictions.putBoolean(UserManager.DISALLOW_OUTGOING_CALLS, true); mGuestRestrictions.putBoolean(UserManager.DISALLOW_SMS, true); } }
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-2457 - Severity: LOW - CVSS Score: 2.1 Description: [DO NOT MERGE] Disallow guest user from changing Wifi settings Disallow existing and newly created guest users from changing Wifi settings. BUG: 27411179 TEST: Flashed device, switched to existing guest user, and verified that Wifi settings are disabled. TEST: Flashed device, created new guest user, and verified that Wifi settings are disabled. Change-Id: Ia1bf4cce0369017b62f69d317c7ab2e30e3949b3 Function: initDefaultGuestRestrictions File: services/core/java/com/android/server/pm/UserManagerService.java Repository: android Fixed Code: private void initDefaultGuestRestrictions() { if (mGuestRestrictions.isEmpty()) { mGuestRestrictions.putBoolean(UserManager.DISALLOW_OUTGOING_CALLS, true); mGuestRestrictions.putBoolean(UserManager.DISALLOW_SMS, true); mGuestRestrictions.putBoolean(UserManager.DISALLOW_CONFIG_WIFI, true); } }
[ "CWE-264" ]
CVE-2016-2457
LOW
2.1
android
initDefaultGuestRestrictions
services/core/java/com/android/server/pm/UserManagerService.java
12332e05f632794e18ea8c4ac52c98e82532e5db
1
Analyze the following code function for security vulnerabilities
int getMaximumNestingDepth() { return this.maximumNestingDepth; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumNestingDepth File: src/main/java/com/google/json/JsonSanitizer.java Repository: OWASP/json-sanitizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-13973
MEDIUM
4.3
OWASP/json-sanitizer
getMaximumNestingDepth
src/main/java/com/google/json/JsonSanitizer.java
53ceaac3e0a10e86d512ce96a0056578f2d1978f
0
Analyze the following code function for security vulnerabilities
private EntityReferenceSerializer<String> getUidStringEntityReferenceSerializer() { if (this.uidStringEntityReferenceSerializer == null) { this.uidStringEntityReferenceSerializer = Utils.getComponent(EntityReferenceSerializer.TYPE_STRING, "uid"); } return this.uidStringEntityReferenceSerializer; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidStringEntityReferenceSerializer File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getUidStringEntityReferenceSerializer
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public String getParamCloseLink() { if ((m_paramCloseLink == null) || "null".equals(m_paramCloseLink)) { return null; } return m_paramCloseLink; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParamCloseLink File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getParamCloseLink
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void reportAssistContextExtras(IBinder token, Bundle extras, AssistStructure structure, AssistContent content, Uri referrer) { PendingAssistExtras pae = (PendingAssistExtras)token; synchronized (pae) { pae.result = extras; pae.structure = structure; pae.content = content; if (referrer != null) { pae.extras.putParcelable(Intent.EXTRA_REFERRER, referrer); } if (structure != null) { structure.setHomeActivity(pae.isHome); } pae.haveResult = true; pae.notifyAll(); if (pae.intent == null && pae.receiver == null) { // Caller is just waiting for the result. return; } } // We are now ready to launch the assist activity. IAssistDataReceiver sendReceiver = null; Bundle sendBundle = null; synchronized (this) { buildAssistBundleLocked(pae, extras); boolean exists = mPendingAssistExtras.remove(pae); mUiHandler.removeCallbacks(pae); if (!exists) { // Timed out. return; } if ((sendReceiver=pae.receiver) != null) { // Caller wants result sent back to them. sendBundle = new Bundle(); sendBundle.putBundle(ASSIST_KEY_DATA, pae.extras); sendBundle.putParcelable(ASSIST_KEY_STRUCTURE, pae.structure); sendBundle.putParcelable(ASSIST_KEY_CONTENT, pae.content); sendBundle.putBundle(ASSIST_KEY_RECEIVER_EXTRAS, pae.receiverExtras); } } if (sendReceiver != null) { try { sendReceiver.onHandleAssistData(sendBundle); } catch (RemoteException e) { } return; } final long ident = Binder.clearCallingIdentity(); try { if (TextUtils.equals(pae.intent.getAction(), android.service.voice.VoiceInteractionService.SERVICE_INTERFACE)) { pae.intent.putExtras(pae.extras); mContext.startServiceAsUser(pae.intent, new UserHandle(pae.userHandle)); } else { pae.intent.replaceExtras(pae.extras); pae.intent.setFlags(FLAG_ACTIVITY_NEW_TASK | Intent.FLAG_ACTIVITY_SINGLE_TOP | Intent.FLAG_ACTIVITY_CLEAR_TOP); closeSystemDialogs("assist"); try { mContext.startActivityAsUser(pae.intent, new UserHandle(pae.userHandle)); } catch (ActivityNotFoundException e) { Slog.w(TAG, "No activity to handle assist action.", e); } } } finally { Binder.restoreCallingIdentity(ident); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reportAssistContextExtras File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
reportAssistContextExtras
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private void notifySettingChangeForRunningUsers(int key, String name) { // Important: No need to update generation for each user as there // is a singleton generation entry for the global settings which // is already incremented be the caller. final Uri uri = getNotificationUriFor(key, name); final List<UserInfo> users = mUserManager.getAliveUsers(); for (int i = 0; i < users.size(); i++) { final int userId = users.get(i).id; if (mUserManager.isUserRunning(UserHandle.of(userId))) { mHandler.obtainMessage(MyHandler.MSG_NOTIFY_URI_CHANGED, userId, 0, uri).sendToTarget(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifySettingChangeForRunningUsers File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
notifySettingChangeForRunningUsers
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
@Override public CharSequence getShortSupportMessage(@Nullable ComponentName who, String callerPackageName) { if (!mHasFeature) { return null; } CallerIdentity caller; ActiveAdmin admin; if (isPermissionCheckFlagEnabled()) { caller = getCallerIdentity(who, callerPackageName); EnforcingAdmin enforcingAdmin = enforcePermissionAndGetEnforcingAdmin( who, MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE, caller.getPackageName(), caller.getUserId()); admin = enforcingAdmin.getActiveAdmin(); } else { caller = getCallerIdentity(who); Objects.requireNonNull(who, "ComponentName is null"); synchronized (getLockObject()) { admin = getActiveAdminForUidLocked(who, caller.getUid()); } } return admin.shortSupportMessage; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShortSupportMessage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getShortSupportMessage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Nullable public String getNamespace() { int id = nativeGetNamespace(mParseState); return id >= 0 ? getSequenceString(mStrings.getSequence(id)) : ""; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNamespace File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getNamespace
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
void settingsGlobalPutStringForUser(String name, String value, int userHandle) { Settings.Global.putStringForUser(mContext.getContentResolver(), name, value, userHandle); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: settingsGlobalPutStringForUser File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
settingsGlobalPutStringForUser
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public Version version() { return PackageVersion.VERSION; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: version File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
version
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public void killUid(int appId, int userId, String reason) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeInt(appId); data.writeInt(userId); data.writeString(reason); mRemote.transact(KILL_UID_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: killUid File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
killUid
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public String getExternalURL(String fullname, String action, XWikiContext context) throws XWikiException { XWikiDocument doc = new XWikiDocument(getCurrentMixedDocumentReferenceResolver().resolve(fullname)); URL url = context.getURLFactory().createExternalURL(doc.getSpace(), doc.getName(), action, null, null, doc.getDatabase(), context); return url.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExternalURL File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getExternalURL
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public static EncounterType getEncounterType(String id) { EncounterType encounterType = null; if (StringUtils.isNotBlank(id)) { id = id.trim(); // see if this is parseable int; if so, try looking up by id try { int encounterTypeId = Integer.parseInt(id); encounterType = Context.getEncounterService().getEncounterType(encounterTypeId); if (encounterType != null) return encounterType; } catch (Exception ex) { //do nothing } //get EncounterType by mapping encounterType = getMetadataByMapping(EncounterType.class, id); if (encounterType != null) { return encounterType; } // handle uuid id: "a3e1302b-74bf-11df-9768-17cfc9833272" if id matches a uuid format if (isValidUuidFormat(id)) { encounterType = Context.getEncounterService().getEncounterTypeByUuid(id); if (encounterType != null) return encounterType; } // if it's neither a uuid or id, try encounter type name encounterType = Context.getEncounterService().getEncounterType(id); if (encounterType != null) return encounterType; } // no match found return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEncounterType File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getEncounterType
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
@Deprecated public BaseClass getClass(String fullName, XWikiContext context) throws XWikiException { DocumentReference reference = null; if (StringUtils.isNotEmpty(fullName)) { reference = getCurrentMixedDocumentReferenceResolver().resolve(fullName); } return getXClass(reference, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
final void sendPackageBroadcast(final String action, final String pkg, final Bundle extras, final String targetPkg, final IIntentReceiver finishedReceiver, final int[] userIds) { mHandler.post(new Runnable() { @Override public void run() { try { final IActivityManager am = ActivityManagerNative.getDefault(); if (am == null) return; final int[] resolvedUserIds; if (userIds == null) { resolvedUserIds = am.getRunningUserIds(); } else { resolvedUserIds = userIds; } for (int id : resolvedUserIds) { final Intent intent = new Intent(action, pkg != null ? Uri.fromParts("package", pkg, null) : null); if (extras != null) { intent.putExtras(extras); } if (targetPkg != null) { intent.setPackage(targetPkg); } // Modify the UID when posting to other users int uid = intent.getIntExtra(Intent.EXTRA_UID, -1); if (uid > 0 && UserHandle.getUserId(uid) != id) { uid = UserHandle.getUid(id, UserHandle.getAppId(uid)); intent.putExtra(Intent.EXTRA_UID, uid); } intent.putExtra(Intent.EXTRA_USER_HANDLE, id); intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT); if (DEBUG_BROADCASTS) { RuntimeException here = new RuntimeException("here"); here.fillInStackTrace(); Slog.d(TAG, "Sending to user " + id + ": " + intent.toShortString(false, true, false, false) + " " + intent.getExtras(), here); } am.broadcastIntent(null, intent, null, finishedReceiver, 0, null, null, null, android.app.AppOpsManager.OP_NONE, null, finishedReceiver != null, false, id); } } catch (RemoteException ex) { } } }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendPackageBroadcast File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
sendPackageBroadcast
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
final StandardTemplateParams headerTextSecondary(CharSequence text) { this.headerTextSecondary = text; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: headerTextSecondary File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
headerTextSecondary
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
private boolean isValidAcceptVideoState(int videoState) { // Given a video state input, turn off TX and RX so that we can determine if those were the // only bits set. int remainingState = videoState & ~VideoProfile.STATE_TX_ENABLED; remainingState = remainingState & ~VideoProfile.STATE_RX_ENABLED; // If only TX or RX were set (or neither), the video state is valid. return remainingState == 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isValidAcceptVideoState File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
isValidAcceptVideoState
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
private void setOauthBasePath(String basePath) { for(Authentication auth : authentications.values()) { if (auth instanceof OAuth) { ((OAuth) auth).setBasePath(basePath); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOauthBasePath File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setOauthBasePath
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public KeyguardAffordanceView getRightView() { return mRightAffordanceView; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRightView File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
getRightView
packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public void removeMediaStateChangeListener(ActionListener<MediaStateChangeEvent> l) { stateChangeListeners.removeListener(l); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeMediaStateChangeListener File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
removeMediaStateChangeListener
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private static void dumpProvider(Provider provider, int index, PrintWriter pw) { AppWidgetProviderInfo info = provider.info; pw.print(" ["); pw.print(index); pw.print("] provider "); pw.println(provider.id); pw.print(" min=("); pw.print(info.minWidth); pw.print("x"); pw.print(info.minHeight); pw.print(") minResize=("); pw.print(info.minResizeWidth); pw.print("x"); pw.print(info.minResizeHeight); pw.print(") updatePeriodMillis="); pw.print(info.updatePeriodMillis); pw.print(" resizeMode="); pw.print(info.resizeMode); pw.print(info.widgetCategory); pw.print(" autoAdvanceViewId="); pw.print(info.autoAdvanceViewId); pw.print(" initialLayout=#"); pw.print(Integer.toHexString(info.initialLayout)); pw.print(" initialKeyguardLayout=#"); pw.print(Integer.toHexString(info.initialKeyguardLayout)); pw.print(" zombie="); pw.println(provider.zombie); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpProvider File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
dumpProvider
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
public String selectHeaderAccept(String[] accepts) { if (accepts.length == 0) { return null; } for (String accept : accepts) { if (isJsonMime(accept)) { return accept; } } return StringUtil.join(accepts, ","); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: selectHeaderAccept File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
selectHeaderAccept
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public synchronized int getAvailableRestoreSets(IRestoreObserver observer) { mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "getAvailableRestoreSets"); if (observer == null) { throw new IllegalArgumentException("Observer must not be null"); } if (mEnded) { throw new IllegalStateException("Restore session already ended"); } if (mTimedOut) { Slog.i(TAG, "Session already timed out"); return -1; } long oldId = Binder.clearCallingIdentity(); try { if (mRestoreTransport == null) { Slog.w(TAG, "Null transport getting restore sets"); return -1; } // We know we're doing legit work now, so halt the timeout // until we're done. It gets started again when the result // comes in. mBackupHandler.removeMessages(MSG_RESTORE_TIMEOUT); // spin off the transport request to our service thread mWakelock.acquire(); Message msg = mBackupHandler.obtainMessage(MSG_RUN_GET_RESTORE_SETS, new RestoreGetSetsParams(mRestoreTransport, this, observer)); mBackupHandler.sendMessage(msg); return 0; } catch (Exception e) { Slog.e(TAG, "Error in getAvailableRestoreSets", e); return -1; } finally { Binder.restoreCallingIdentity(oldId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAvailableRestoreSets File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
getAvailableRestoreSets
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
int extractLine(byte[] buffer, int offset, String[] outStr) throws IOException { final int end = buffer.length; if (offset >= end) throw new IOException("Incomplete data"); int pos; for (pos = offset; pos < end; pos++) { byte c = buffer[pos]; // at LF we declare end of line, and return the next char as the // starting point for the next time through if (c == '\n') { break; } } outStr[0] = new String(buffer, offset, pos - offset); pos++; // may be pointing an extra byte past the end but that's okay return pos; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractLine File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
extractLine
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
boolean bindTransport(ServiceInfo transport) { ComponentName svcName = new ComponentName(transport.packageName, transport.name); if (MORE_DEBUG) { Slog.i(TAG, "Binding to transport host " + svcName); } Intent intent = new Intent(mTransportServiceIntent); intent.setComponent(svcName); TransportConnection connection; synchronized (mTransports) { connection = mTransportConnections.get(transport.packageName); if (null == connection) { connection = new TransportConnection(transport); mTransportConnections.put(transport.packageName, connection); } else { // This is a rebind due to package upgrade. The service won't be // automatically relaunched for us until we explicitly rebind, but // we need to unbind the now-orphaned original connection. mContext.unbindService(connection); } } return mContext.bindServiceAsUser(intent, connection, Context.BIND_AUTO_CREATE, UserHandle.OWNER); }
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2016-3759 - Severity: MEDIUM - CVSS Score: 5.0 Description: Backport of backup transport whitelist Sysconfig define a whitelist of permitted backup transports Previously any apk bundled in priv-app could insert a backup transport. Reduce risk surface by giving the OEM explicit control over who is allowed to handle backup data. Bug 28406080 Backport of 494df791728f4d42d67e935c327910975993ad29 from N Change-Id: I9f90e324169a68720d608f74754d284a7e59cf87 Function: bindTransport File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android Fixed Code: boolean bindTransport(ServiceInfo transport) { ComponentName svcName = new ComponentName(transport.packageName, transport.name); if (!mTransportWhitelist.contains(svcName)) { Slog.w(TAG, "Proposed transport " + svcName + " not whitelisted; ignoring"); return false; } if (DEBUG) { Slog.i(TAG, "Binding to transport host " + svcName); } Intent intent = new Intent(mTransportServiceIntent); intent.setComponent(svcName); TransportConnection connection; synchronized (mTransports) { connection = mTransportConnections.get(transport.packageName); if (null == connection) { connection = new TransportConnection(transport); mTransportConnections.put(transport.packageName, connection); } else { // This is a rebind due to package upgrade. The service won't be // automatically relaunched for us until we explicitly rebind, but // we need to unbind the now-orphaned original connection. mContext.unbindService(connection); } } return mContext.bindServiceAsUser(intent, connection, Context.BIND_AUTO_CREATE, UserHandle.OWNER); }
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
bindTransport
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
1
Analyze the following code function for security vulnerabilities
public void broadcastAuthenticationFailureEvent(String iface, int reason, int errorCode, String ssid, MacAddress bssid) { sendMessage(iface, AUTHENTICATION_FAILURE_EVENT, new AuthenticationFailureEventInfo(ssid, bssid, reason, errorCode)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: broadcastAuthenticationFailureEvent File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
broadcastAuthenticationFailureEvent
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void setDataProvider(FetchItemsCallback<T> fetchItems, SerializableSupplier<Integer> sizeCallback) { internalSetDataProvider( new CallbackDataProvider<>( q -> fetchItems.fetchItems(q.getSortOrders(), q.getOffset(), q.getLimit()), q -> sizeCallback.get())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDataProvider File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
setDataProvider
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public void cancelMissedCallsNotification(String callingPackage) { synchronized (mLock) { enforcePermissionOrPrivilegedDialer(MODIFY_PHONE_STATE, callingPackage); long token = Binder.clearCallingIdentity(); try { mCallsManager.getMissedCallNotifier().clearMissedCalls(); } finally { Binder.restoreCallingIdentity(token); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelMissedCallsNotification File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
cancelMissedCallsNotification
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
private static SparseArray<InsetsSource> toInsetsSources( SparseArray<InsetsSourceProvider> insetsSourceProviders) { final SparseArray<InsetsSource> insetsSources = new SparseArray<>( insetsSourceProviders.size()); for (int i = 0; i < insetsSourceProviders.size(); i++) { insetsSources.append(insetsSourceProviders.keyAt(i), insetsSourceProviders.valueAt(i).getSource()); } return insetsSources; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toInsetsSources File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
toInsetsSources
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
public byte[] encode(final SecretKey hmacKey) { final ByteBuffer bb = ByteBuffer.allocate(length); bb.order(ByteOrder.BIG_ENDIAN); bb.putInt(VERSION); bb.put(ByteUtil.toBytes(keyName)); bb.put((byte) 0); bb.put(ByteUtil.toUnsignedByte(nonce.length)); bb.put(nonce); if (hmacKey != null) { final byte[] hmac = hmac(bb.array(), 0, bb.limit() - HMAC_SIZE); bb.put(hmac); } return bb.array(); }
Vulnerability Classification: - CWE: CWE-770 - CVE: CVE-2020-7226 - Severity: MEDIUM - CVSS Score: 5.0 Description: Address code review feedback points. Function: encode File: src/main/java/org/cryptacular/CiphertextHeaderV2.java Repository: vt-middleware/cryptacular Fixed Code: public byte[] encode(final SecretKey hmacKey) { if (hmacKey == null) { throw new IllegalArgumentException("Secret key cannot be null"); } final ByteBuffer bb = ByteBuffer.allocate(length); bb.order(ByteOrder.BIG_ENDIAN); bb.putInt(VERSION); bb.put(ByteUtil.toBytes(keyName)); bb.put((byte) 0); bb.put(ByteUtil.toUnsignedByte(nonce.length)); bb.put(nonce); bb.put(hmac(bb.array(), 0, bb.limit() - HMAC_SIZE)); return bb.array(); }
[ "CWE-770" ]
CVE-2020-7226
MEDIUM
5
vt-middleware/cryptacular
encode
src/main/java/org/cryptacular/CiphertextHeaderV2.java
132f15ead532d78d4c19d2bcb39ec8f319ad6945
1
Analyze the following code function for security vulnerabilities
@Override public PermissionGroupInfo getPermissionGroupInfo(String groupName, int flags) { return mPermissionManagerServiceImpl.getPermissionGroupInfo(groupName, flags); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPermissionGroupInfo File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getPermissionGroupInfo
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
private CriteriaQuery<Project> buildCriteriaQuery(Session session, EntityQuery<Project> projectQuery) { CriteriaBuilder builder = session.getCriteriaBuilder(); CriteriaQuery<Project> query = builder.createQuery(Project.class); Root<Project> root = query.from(Project.class); query.select(root); query.where(getPredicates(projectQuery.getCriteria(), query, root, builder)); List<javax.persistence.criteria.Order> orders = new ArrayList<>(); for (EntitySort sort: projectQuery.getSorts()) { if (sort.getDirection() == Direction.ASCENDING) orders.add(builder.asc(ProjectQuery.getPath(root, Project.ORDER_FIELDS.get(sort.getField())))); else orders.add(builder.desc(ProjectQuery.getPath(root, Project.ORDER_FIELDS.get(sort.getField())))); } if (orders.isEmpty()) orders.add(builder.desc(ProjectQuery.getPath(root, Project.PROP_UPDATE_DATE))); query.orderBy(orders); return query; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildCriteriaQuery File: server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39205
CRITICAL
9.8
theonedev/onedev
buildCriteriaQuery
server-core/src/main/java/io/onedev/server/entitymanager/impl/DefaultProjectManager.java
f1e97688e4e19d6de1dfa1d00e04655209d39f8e
0
Analyze the following code function for security vulnerabilities
private VaadinSession getSession() { UI ui = grid.getUI(); return ui != null ? ui.getSession() : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSession File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getSession
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public Set<SecurityRole> getRoles() { return Collections.unmodifiableSet(roles); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRoles File: src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java Repository: opensearch-project/security The code follows secure coding practices.
[ "CWE-612", "CWE-863" ]
CVE-2022-41918
MEDIUM
6.3
opensearch-project/security
getRoles
src/main/java/org/opensearch/security/securityconf/ConfigModelV7.java
f7cc569c9d3fa5d5432c76c854eed280d45ce6f4
0
Analyze the following code function for security vulnerabilities
public void updateClob(String columnName, @Nullable Reader reader, long length) throws SQLException { updateClob(findColumn(columnName), reader, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateClob File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateClob
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public String getURLToLoginAndGotoPage(final String username, final String password, final String pageURL) { Map<String, String> parameters = new HashMap<String, String>() { { put("j_username", username); put("j_password", password); if (pageURL != null && pageURL.length() > 0) { put("xredirect", pageURL); } } }; return getURL("XWiki", "XWikiLogin", "loginsubmit", parameters); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getURLToLoginAndGotoPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
getURLToLoginAndGotoPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
private static ProgramWorkflowState getState(Integer id) { for (ProgramWorkflowState s : getStates(true)) { if (s.getProgramWorkflowStateId().equals(id)) { return s; } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getState File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
getState
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
@Override public ValueType getValueType() { return ValueType.NUMBER; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getValueType File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repository: eclipse-ee4j/parsson The code follows secure coding practices.
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
getValueType
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
84764ffbe3d0376da242b27a9a526138d0dfb8e6
0
Analyze the following code function for security vulnerabilities
protected Node upImpl(int steps) { Node currNode = this.xmlNode; int stepCount = 0; while (currNode.getParentNode() != null && stepCount < steps) { currNode = currNode.getParentNode(); stepCount++; } return currNode; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: upImpl File: src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java Repository: jmurty/java-xmlbuilder The code follows secure coding practices.
[ "CWE-611" ]
CVE-2014-125087
MEDIUM
5.2
jmurty/java-xmlbuilder
upImpl
src/main/java/com/jamesmurty/utils/BaseXMLBuilder.java
e6fddca201790abab4f2c274341c0bb8835c3e73
0
Analyze the following code function for security vulnerabilities
public String getRenderedContent(String text, Syntax sourceSyntaxId, Syntax targetSyntaxId, boolean restrictedTransformationContext, XWikiDocument sDocument, boolean isolated, XWikiContext context) { Map<String, Object> backup = null; getProgress().startStep(this, "document.progress.renderText", "Execute content [{}] in the context of document [{}]", StringUtils.substring(text, 0, 100) + (text.length() >= 100 ? "..." : ""), getDocumentReference()); XWikiDocument currentSDocument = (XWikiDocument) context.get(CKEY_SDOC); try { // We have to render the given text in the context of this document. Check if this document is already // on the context (same Java object reference). We don't check if the document references are equal // because this document can have temporary changes that are not present on the context document even if // it has the same document reference. if (isolated && context.getDoc() != this) { backup = new HashMap<>(); backupContext(backup, context); setAsContextDoc(context); } // Make sure to execute the document with the right of the provided sdocument's author if (sDocument != null) { context.put(CKEY_SDOC, sDocument); } // Reuse this document's reference so that the Velocity macro name-space is computed based on it. XWikiDocument fakeDocument = new XWikiDocument(getDocumentReference()); fakeDocument.setSyntax(sourceSyntaxId); fakeDocument.setContent(text); // We don't let displayer take care of the context isolation because we don't want the fake document to be // context document return fakeDocument.display(targetSyntaxId, false, isolated, restrictedTransformationContext, false); } catch (Exception e) { // Failed to render for some reason. This method should normally throw an exception but this // requires changing the signature of calling methods too. LOGGER.warn("Failed to render content [{}]", text, e); } finally { if (backup != null) { restoreContext(backup, context); } context.put(CKEY_SDOC, currentSDocument); getProgress().endStep(this); } return ""; }
Vulnerability Classification: - CWE: CWE-459 - CVE: CVE-2023-36468 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20594: Mark old revisions and deleted documents as restricted * Introduce a new "restricted" attribute on XWikiDocument * Mark any document that is restored from XML as restricted * Deny script right when the secure document is restricted * Make transformations restricted when the document is restricted * Do not execute Velocity in titles when the document is restricted * Make sure saved documents aren't restricted. * Add tests * Display a warning when a document is rendered in restricted mode and the user is advanced or there is actually an error in the output. Function: getRenderedContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform Fixed Code: public String getRenderedContent(String text, Syntax sourceSyntaxId, Syntax targetSyntaxId, boolean restrictedTransformationContext, XWikiDocument sDocument, boolean isolated, XWikiContext context) { Map<String, Object> backup = null; getProgress().startStep(this, "document.progress.renderText", "Execute content [{}] in the context of document [{}]", StringUtils.substring(text, 0, 100) + (text.length() >= 100 ? "..." : ""), getDocumentReference()); XWikiDocument currentSDocument = (XWikiDocument) context.get(CKEY_SDOC); try { // We have to render the given text in the context of this document. Check if this document is already // on the context (same Java object reference). We don't check if the document references are equal // because this document can have temporary changes that are not present on the context document even if // it has the same document reference. if (isolated && context.getDoc() != this) { backup = new HashMap<>(); backupContext(backup, context); setAsContextDoc(context); } // Make sure to execute the document with the right of the provided sdocument's author if (sDocument != null) { context.put(CKEY_SDOC, sDocument); } // Reuse this document's reference so that the Velocity macro name-space is computed based on it. XWikiDocument fakeDocument = new XWikiDocument(getDocumentReference()); fakeDocument.setSyntax(sourceSyntaxId); fakeDocument.setContent(text); fakeDocument.setRestricted(sDocument != null && sDocument.isRestricted()); // We don't let displayer take care of the context isolation because we don't want the fake document to be // context document return fakeDocument.display(targetSyntaxId, false, isolated, restrictedTransformationContext, false); } catch (Exception e) { // Failed to render for some reason. This method should normally throw an exception but this // requires changing the signature of calling methods too. LOGGER.warn("Failed to render content [{}]", text, e); } finally { if (backup != null) { restoreContext(backup, context); } context.put(CKEY_SDOC, currentSDocument); getProgress().endStep(this); } return ""; }
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
getRenderedContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
1
Analyze the following code function for security vulnerabilities
@Override protected void resolveIntent() { super.resolveIntent(); mAddContact = TextUtils.isEmpty(mNumber); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveIntent File: src/com/android/phone/settings/fdn/EditFdnContactScreen.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-862" ]
CVE-2023-35665
HIGH
7.8
android
resolveIntent
src/com/android/phone/settings/fdn/EditFdnContactScreen.java
674039e70e1c5bf29b808899ac80c709acc82290
0