instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | private void setupEdgeToEdge() {
WindowCompat.setDecorFitsSystemWindows(getWindow(), false);
ViewCompat.setOnApplyWindowInsetsListener(findViewById(android.R.id.content),
(v, windowInsets) -> {
Insets insets = windowInsets.getInsets(WindowInsetsCompat.Type.systemBars());
// Apply the insets paddings to the view.
v.setPadding(insets.left, insets.top, insets.right, insets.bottom);
// Return CONSUMED if you don't want the window insets to keep being
// passed down to descendant views.
return WindowInsetsCompat.CONSUMED;
});
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setupEdgeToEdge
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | setupEdgeToEdge | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | public String getActiveClass()
{
if (this.currentObj == null) {
return null;
} else {
return this.currentObj.getName();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getActiveClass
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getActiveClass | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void updateAsciiStream(
String columnName, java.io.@Nullable InputStream x, int length)
throws SQLException {
updateAsciiStream(findColumn(columnName), x, length);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAsciiStream
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateAsciiStream | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isSystemPriority() {
return (mFlags & MediaSession.FLAG_EXCLUSIVE_GLOBAL_PRIORITY) != 0;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSystemPriority
File: services/core/java/com/android/server/media/MediaSessionRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21280 | MEDIUM | 5.5 | android | isSystemPriority | services/core/java/com/android/server/media/MediaSessionRecord.java | 06e772e05514af4aa427641784c5eec39a892ed3 | 0 |
Analyze the following code function for security vulnerabilities | boolean cancelBondProcess(BluetoothDevice device) {
enforceCallingOrSelfPermission(BLUETOOTH_ADMIN_PERM, "Need BLUETOOTH ADMIN permission");
byte[] addr = Utils.getBytesFromAddress(device.getAddress());
return cancelBondNative(addr);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelBondProcess
File: src/com/android/bluetooth/btservice/AdapterService.java
Repository: android
The code follows secure coding practices. | [
"CWE-362",
"CWE-20"
] | CVE-2016-3760 | MEDIUM | 5.4 | android | cancelBondProcess | src/com/android/bluetooth/btservice/AdapterService.java | 122feb9a0b04290f55183ff2f0384c6c53756bd8 | 0 |
Analyze the following code function for security vulnerabilities | private Map<String, CWLElement> getInputsOutputs(JsonNode inputsOutputs) {
Map<String, CWLElement> returnMap = new HashMap<>();
if (inputsOutputs.getClass() == ArrayNode.class) {
// Explicit ID and other fields within each list
for (JsonNode inputOutput : inputsOutputs) {
String id = inputOutput.get(ID).asText();
if (id.charAt(0) == '#') {
id = id.substring(1);
}
returnMap.put(id, getDetails(inputOutput));
}
} else if (inputsOutputs.getClass() == ObjectNode.class) {
// ID is the key of each object
Iterator<Map.Entry<String, JsonNode>> iterator = inputsOutputs.fields();
while (iterator.hasNext()) {
Map.Entry<String, JsonNode> inputOutputNode = iterator.next();
returnMap.put(inputOutputNode.getKey(), getDetails(inputOutputNode.getValue()));
}
}
return returnMap;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getInputsOutputs
File: src/main/java/org/commonwl/view/cwl/CWLService.java
Repository: common-workflow-language/cwlviewer
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-41110 | HIGH | 7.5 | common-workflow-language/cwlviewer | getInputsOutputs | src/main/java/org/commonwl/view/cwl/CWLService.java | f6066f09edb70033a2ce80200e9fa9e70a5c29de | 0 |
Analyze the following code function for security vulnerabilities | private BeanManager getBeanManager() {
if (beanManager == null) {
FacesContext facesContext = FacesContext.getCurrentInstance();
beanManager = Util.getCdiBeanManager(facesContext);
}
return beanManager;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBeanManager
File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
Repository: eclipse-ee4j/mojarra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2018-14371 | MEDIUM | 5 | eclipse-ee4j/mojarra | getBeanManager | impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java | 1b434748d9239f42eae8aa7d37d7a0930c061e24 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onConnectionServiceFocusReleased(Session.Info sessionInfo)
throws RemoteException {
Log.startSession(sessionInfo, "CSW.oCSFR", mPackageAbbreviation);
long token = Binder.clearCallingIdentity();
try {
synchronized (mLock) {
mConnSvrFocusListener.onConnectionServiceReleased(
ConnectionServiceWrapper.this);
}
} catch (Throwable t) {
Log.e(ConnectionServiceWrapper.this, t, "");
throw t;
} finally {
Binder.restoreCallingIdentity(token);
Log.endSession();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConnectionServiceFocusReleased
File: src/com/android/server/telecom/ConnectionServiceWrapper.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | onConnectionServiceFocusReleased | src/com/android/server/telecom/ConnectionServiceWrapper.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean isSecurityParamsValid(SecurityParams params) {
if (!params.isEnabled()) return false;
if (!isSecurityParamsSupported(params)) return false;
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isSecurityParamsValid
File: service/java/com/android/server/wifi/WifiConfigurationUtil.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21252 | MEDIUM | 5.5 | android | isSecurityParamsValid | service/java/com/android/server/wifi/WifiConfigurationUtil.java | 50b08ee30e04d185e5ae97a5f717d436fd5a90f3 | 0 |
Analyze the following code function for security vulnerabilities | @GuardedBy("this")
private void ensureValidLocked() {
if (mObject == 0) {
throw new RuntimeException("AssetManager has been destroyed");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: ensureValidLocked
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | ensureValidLocked | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | public void saveAsAuthor() throws XWikiException
{
saveAsAuthor("", false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveAsAuthor
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | saveAsAuthor | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | void initiateOneRestore(PackageInfo app, int appVersionCode) {
final String packageName = app.packageName;
if (DEBUG) Slog.d(TAG, "initiateOneRestore packageName=" + packageName);
// !!! TODO: get the dirs from the transport
mBackupDataName = new File(mDataDir, packageName + ".restore");
mStageName = new File(mDataDir, packageName + ".stage");
mNewStateName = new File(mStateDir, packageName + ".new");
mSavedStateName = new File(mStateDir, packageName);
// don't stage the 'android' package where the wallpaper data lives. this is
// an optimization: we know there's no widget data hosted/published by that
// package, and this way we avoid doing a spurious copy of MB-sized wallpaper
// data following the download.
boolean staging = !packageName.equals("android");
ParcelFileDescriptor stage;
File downloadFile = (staging) ? mStageName : mBackupDataName;
final int token = generateToken();
try {
// Run the transport's restore pass
stage = ParcelFileDescriptor.open(downloadFile,
ParcelFileDescriptor.MODE_READ_WRITE |
ParcelFileDescriptor.MODE_CREATE |
ParcelFileDescriptor.MODE_TRUNCATE);
if (!SELinux.restorecon(mBackupDataName)) {
if (MORE_DEBUG) Slog.e(TAG, "SElinux restorecon failed for " + downloadFile);
}
if (mTransport.getRestoreData(stage) != BackupTransport.TRANSPORT_OK) {
// Transport-level failure, so we wind everything up and
// terminate the restore operation.
Slog.e(TAG, "Error getting restore data for " + packageName);
EventLog.writeEvent(EventLogTags.RESTORE_TRANSPORT_FAILURE);
stage.close();
downloadFile.delete();
executeNextState(UnifiedRestoreState.FINAL);
return;
}
// We have the data from the transport. Now we extract and strip
// any per-package metadata (typically widget-related information)
// if appropriate
if (staging) {
stage.close();
stage = ParcelFileDescriptor.open(downloadFile,
ParcelFileDescriptor.MODE_READ_ONLY);
mBackupData = ParcelFileDescriptor.open(mBackupDataName,
ParcelFileDescriptor.MODE_READ_WRITE |
ParcelFileDescriptor.MODE_CREATE |
ParcelFileDescriptor.MODE_TRUNCATE);
BackupDataInput in = new BackupDataInput(stage.getFileDescriptor());
BackupDataOutput out = new BackupDataOutput(mBackupData.getFileDescriptor());
byte[] buffer = new byte[8192]; // will grow when needed
while (in.readNextHeader()) {
final String key = in.getKey();
final int size = in.getDataSize();
// is this a special key?
if (key.equals(KEY_WIDGET_STATE)) {
if (DEBUG) {
Slog.i(TAG, "Restoring widget state for " + packageName);
}
mWidgetData = new byte[size];
in.readEntityData(mWidgetData, 0, size);
} else {
if (size > buffer.length) {
buffer = new byte[size];
}
in.readEntityData(buffer, 0, size);
out.writeEntityHeader(key, size);
out.writeEntityData(buffer, size);
}
}
mBackupData.close();
}
// Okay, we have the data. Now have the agent do the restore.
stage.close();
mBackupData = ParcelFileDescriptor.open(mBackupDataName,
ParcelFileDescriptor.MODE_READ_ONLY);
mNewState = ParcelFileDescriptor.open(mNewStateName,
ParcelFileDescriptor.MODE_READ_WRITE |
ParcelFileDescriptor.MODE_CREATE |
ParcelFileDescriptor.MODE_TRUNCATE);
// Kick off the restore, checking for hung agents. The timeout or
// the operationComplete() callback will schedule the next step,
// so we do not do that here.
prepareOperationTimeout(token, TIMEOUT_RESTORE_INTERVAL, this);
mAgent.doRestore(mBackupData, appVersionCode, mNewState,
token, mBackupManagerBinder);
} catch (Exception e) {
Slog.e(TAG, "Unable to call app for restore: " + packageName, e);
EventLog.writeEvent(EventLogTags.RESTORE_AGENT_FAILURE,
packageName, e.toString());
keyValueAgentErrorCleanup(); // clears any pending timeout messages as well
// After a restore failure we go back to running the queue. If there
// are no more packages to be restored that will be handled by the
// next step.
executeNextState(UnifiedRestoreState.RUNNING_QUEUE);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: initiateOneRestore
File: services/backup/java/com/android/server/backup/BackupManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2016-3759 | MEDIUM | 5 | android | initiateOneRestore | services/backup/java/com/android/server/backup/BackupManagerService.java | 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28 | 0 |
Analyze the following code function for security vulnerabilities | private <T extends AnnotatedMember> T _fixAccess(T member) {
if (member != null && _canFixAccess) {
ClassUtil.checkAndFixAccess((Member) member.getAnnotated(),
_forceAccess);
}
return member;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: _fixAccess
File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | _fixAccess | src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public void setRows(int rows)
{
setIntValue("rows", rows);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setRows
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-41046 | MEDIUM | 6.3 | xwiki/xwiki-platform | setRows | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java | edc52579eeaab1b4514785c134044671a1ecd839 | 0 |
Analyze the following code function for security vulnerabilities | public static Class<?> findCollectionFallback(JavaType type) {
return _collectionFallbacks.get(type.getRawClass().getName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findCollectionFallback
File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2019-16942 | HIGH | 7.5 | FasterXML/jackson-databind | findCollectionFallback | src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java | 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8 | 0 |
Analyze the following code function for security vulnerabilities | public String buildAjaxResultContainer(String title) {
StringBuffer html = new StringBuffer(512);
html.append(dialogBlockStart(title));
html.append(dialogWhiteBoxStart());
html.append("<div id='ajaxreport' >");
html.append(buildAjaxWaitMessage());
html.append("</div>\n");
html.append(dialogWhiteBoxEnd());
html.append(dialogBlockEnd());
html.append(" <br>\n");
return html.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildAjaxResultContainer
File: src/org/opencms/workplace/CmsDialog.java
Repository: alkacon/opencms-core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2013-4600 | MEDIUM | 4.3 | alkacon/opencms-core | buildAjaxResultContainer | src/org/opencms/workplace/CmsDialog.java | 72a05e3ea1cf692e2efce002687272e63f98c14a | 0 |
Analyze the following code function for security vulnerabilities | static Certificate[] verifyBytes(byte[] blockBytes, byte[] sfBytes)
throws GeneralSecurityException {
Object obj = null;
try {
obj = Providers.startJarVerification();
PKCS7 block = new PKCS7(blockBytes);
SignerInfo[] verifiedSignerInfos = block.verify(sfBytes);
if ((verifiedSignerInfos == null) || (verifiedSignerInfos.length == 0)) {
throw new GeneralSecurityException(
"Failed to verify signature: no verified SignerInfos");
}
// Ignore any SignerInfo other than the first one, to be compatible with older Android
// platforms which have been doing this for years. See
// libcore/luni/src/main/java/org/apache/harmony/security/utils/JarUtils.java
// verifySignature method of older platforms.
SignerInfo verifiedSignerInfo = verifiedSignerInfos[0];
List<X509Certificate> verifiedSignerCertChain =
verifiedSignerInfo.getCertificateChain(block);
if (verifiedSignerCertChain == null) {
// Should never happen
throw new GeneralSecurityException(
"Failed to find verified SignerInfo certificate chain");
} else if (verifiedSignerCertChain.isEmpty()) {
// Should never happen
throw new GeneralSecurityException(
"Verified SignerInfo certificate chain is emtpy");
}
return verifiedSignerCertChain.toArray(
new X509Certificate[verifiedSignerCertChain.size()]);
} catch (IOException e) {
throw new GeneralSecurityException("IO exception verifying jar cert", e);
} finally {
Providers.stopJarVerification(obj);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: verifyBytes
File: core/java/android/util/jar/StrictJarVerifier.java
Repository: android
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-21253 | MEDIUM | 5.5 | android | verifyBytes | core/java/android/util/jar/StrictJarVerifier.java | 84df68840b6f2407146e722ebd95a7d8bc6e3529 | 0 |
Analyze the following code function for security vulnerabilities | Endpoint getEndpoint() {
return endpoint;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getEndpoint
File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-401"
] | CVE-2021-3690 | HIGH | 7.5 | undertow-io/undertow | getEndpoint | websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java | c7e84a0b7efced38506d7d1dfea5902366973877 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Iterable<File> successors(File file) {
// check isDirectory() just because it may be faster than listFiles() on a non-directory
if (file.isDirectory()) {
File[] files = file.listFiles();
if (files != null) {
return Collections.unmodifiableList(Arrays.asList(files));
}
}
return ImmutableList.of();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: successors
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-552"
] | CVE-2023-2976 | HIGH | 7.1 | google/guava | successors | guava/src/com/google/common/io/Files.java | feb83a1c8fd2e7670b244d5afd23cba5aca43284 | 0 |
Analyze the following code function for security vulnerabilities | private static Optional<Method> findMethod(Component instance,
Class<?> clazz, String methodName) {
List<Method> methods = Stream.of(clazz.getDeclaredMethods())
.filter(method -> methodName.equals(method.getName()))
.filter(method -> hasMethodAnnotation(method))
.collect(Collectors.toList());
if (methods.size() > 1) {
String msg = String.format("Class '%s' contains "
+ "several event handler method with the same name '%s'",
instance.getClass().getName(), methodName);
getLogger().error(msg);
throw new IllegalStateException(
"Method conflict in event handler with multiple methods with same name.");
} else if (methods.size() == 1) {
return Optional.of(methods.get(0));
} else if (!Component.class.equals(clazz)) {
return findMethod(instance, clazz.getSuperclass(), methodName);
} else {
return Optional.empty();
}
} | Vulnerability Classification:
- CWE: CWE-200
- CVE: CVE-2023-25500
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Update messages to point to logs.
Start both error and log with same string.
Function: findMethod
File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
Repository: vaadin/flow
Fixed Code:
private static Optional<Method> findMethod(Component instance,
Class<?> clazz, String methodName) {
List<Method> methods = Stream.of(clazz.getDeclaredMethods())
.filter(method -> methodName.equals(method.getName()))
.filter(method -> hasMethodAnnotation(method))
.collect(Collectors.toList());
if (methods.size() > 1) {
getLogger().error(String.format(
"Method conflict in event handler. Class '%s' contains "
+ "several event handler methods with the same name '%s'",
instance.getClass().getName(), methodName));
throw new IllegalStateException(
"Method conflict in event handler with multiple methods with same name. See server log for more details.");
} else if (methods.size() == 1) {
return Optional.of(methods.get(0));
} else if (!Component.class.equals(clazz)) {
return findMethod(instance, clazz.getSuperclass(), methodName);
} else {
return Optional.empty();
}
} | [
"CWE-200"
] | CVE-2023-25500 | MEDIUM | 4.3 | vaadin/flow | findMethod | flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java | e13da1c685fa1b5fdd74774813a028748bc4b62b | 1 |
Analyze the following code function for security vulnerabilities | @TestOnly
public void fetchAndResetToHead(ConsoleOutputStreamConsumer outputStreamConsumer, boolean shallow) {
fetch(outputStreamConsumer);
resetWorkingDir(outputStreamConsumer, new StringRevision(remoteBranch()), shallow);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: fetchAndResetToHead
File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
Repository: gocd
The code follows secure coding practices. | [
"CWE-77"
] | CVE-2021-43286 | MEDIUM | 6.5 | gocd | fetchAndResetToHead | domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java | 6fa9fb7a7c91e760f1adc2593acdd50f2d78676b | 0 |
Analyze the following code function for security vulnerabilities | public int setSocketOpt(int optionName, byte [] optionVal, int optionLen) throws IOException {
int ret = 0;
if (mSocketState == SocketState.CLOSED) throw new IOException("socket closed");
IBluetooth bluetoothProxy = BluetoothAdapter.getDefaultAdapter().getBluetoothService(null);
if (bluetoothProxy == null) {
Log.e(TAG, "setSocketOpt fail, reason: bluetooth is off");
return -1;
}
try {
if(VDBG) Log.d(TAG, "setSocketOpt(), mType: " + mType + " mPort: " + mPort);
ret = bluetoothProxy.setSocketOpt(mType, mPort, optionName, optionVal, optionLen);
} catch (RemoteException e) {
Log.e(TAG, Log.getStackTraceString(new Throwable()));
return -1;
}
return ret;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSocketOpt
File: core/java/android/bluetooth/BluetoothSocket.java
Repository: Genymobile/f2ut_platform_frameworks_base
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2014-9908 | LOW | 3.3 | Genymobile/f2ut_platform_frameworks_base | setSocketOpt | core/java/android/bluetooth/BluetoothSocket.java | f24cec326f5f65c693544fb0b92c37f633bacda2 | 0 |
Analyze the following code function for security vulnerabilities | public void delete(String id) {
//及连删除外键表
this.preDelete(id);
testPlanScenarioCaseService.deleteByScenarioId(id);
apiScenarioMapper.deleteByPrimaryKey(id);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: delete
File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2021-45789 | MEDIUM | 6.5 | metersphere | delete | backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java | d74e02cdff47cdf7524d305d098db6ffb7f61b47 | 0 |
Analyze the following code function for security vulnerabilities | public void setPassword(char[] password) {
this.password = password;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPassword
File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
Repository: srikanth-lingala/zip4j
The code follows secure coding practices. | [
"CWE-346"
] | CVE-2023-22899 | MEDIUM | 5.9 | srikanth-lingala/zip4j | setPassword | src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java | ddd8fdc8ad0583eb4a6172dc86c72c881485c55b | 0 |
Analyze the following code function for security vulnerabilities | public void removeColumnVisibilityChangeListener(
ColumnVisibilityChangeListener listener) {
removeListener(ColumnVisibilityChangeEvent.class, listener,
COLUMN_VISIBILITY_METHOD);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: removeColumnVisibilityChangeListener
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | removeColumnVisibilityChangeListener | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateTopComponentForFactoryTest() {
synchronized (mGlobalLock) {
if (mFactoryTest != FACTORY_TEST_LOW_LEVEL) {
return;
}
final ResolveInfo ri = mContext.getPackageManager()
.resolveActivity(new Intent(Intent.ACTION_FACTORY_TEST), STOCK_PM_FLAGS);
final CharSequence errorMsg;
if (ri != null) {
final ActivityInfo ai = ri.activityInfo;
final ApplicationInfo app = ai.applicationInfo;
if ((app.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
mTopAction = Intent.ACTION_FACTORY_TEST;
mTopData = null;
mTopComponent = new ComponentName(app.packageName, ai.name);
errorMsg = null;
} else {
errorMsg = mContext.getResources().getText(
com.android.internal.R.string.factorytest_not_system);
}
} else {
errorMsg = mContext.getResources().getText(
com.android.internal.R.string.factorytest_no_action);
}
if (errorMsg == null) {
return;
}
mTopAction = null;
mTopData = null;
mTopComponent = null;
mUiHandler.post(() -> {
Dialog d = new FactoryErrorDialog(mUiContext, errorMsg);
d.show();
mAmInternal.ensureBootCompleted();
});
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateTopComponentForFactoryTest
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | updateTopComponentForFactoryTest | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void write(final ObjectDataOutput out, final Class obj) throws IOException {
out.writeUTF(obj.getName());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: write
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | write | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
private RemoteViews makeMessagingView(int viewType) {
boolean isCollapsed = viewType != StandardTemplateParams.VIEW_TYPE_BIG;
boolean hideRightIcons = viewType != StandardTemplateParams.VIEW_TYPE_NORMAL;
boolean isConversationLayout = mConversationType != CONVERSATION_TYPE_LEGACY;
boolean isImportantConversation = mConversationType == CONVERSATION_TYPE_IMPORTANT;
boolean isHeaderless = !isConversationLayout && isCollapsed;
CharSequence conversationTitle = !TextUtils.isEmpty(super.mBigContentTitle)
? super.mBigContentTitle
: mConversationTitle;
boolean atLeastP = mBuilder.mContext.getApplicationInfo().targetSdkVersion
>= Build.VERSION_CODES.P;
boolean isOneToOne;
CharSequence nameReplacement = null;
if (!atLeastP) {
isOneToOne = TextUtils.isEmpty(conversationTitle);
if (hasOnlyWhiteSpaceSenders()) {
isOneToOne = true;
nameReplacement = conversationTitle;
conversationTitle = null;
}
} else {
isOneToOne = !isGroupConversation();
}
if (isHeaderless && isOneToOne && TextUtils.isEmpty(conversationTitle)) {
conversationTitle = getOtherPersonName();
}
Icon largeIcon = mBuilder.mN.mLargeIcon;
TemplateBindResult bindResult = new TemplateBindResult();
StandardTemplateParams p = mBuilder.mParams.reset()
.viewType(viewType)
.highlightExpander(isConversationLayout)
.hideProgress(true)
.title(isHeaderless ? conversationTitle : null)
.text(null)
.hideLeftIcon(isOneToOne)
.hideRightIcon(hideRightIcons || isOneToOne)
.headerTextSecondary(isHeaderless ? null : conversationTitle);
RemoteViews contentView = mBuilder.applyStandardTemplateWithActions(
isConversationLayout
? mBuilder.getConversationLayoutResource()
: isCollapsed
? mBuilder.getMessagingLayoutResource()
: mBuilder.getBigMessagingLayoutResource(),
p,
bindResult);
if (isConversationLayout) {
mBuilder.setTextViewColorPrimary(contentView, R.id.conversation_text, p);
mBuilder.setTextViewColorSecondary(contentView, R.id.app_name_divider, p);
}
addExtras(mBuilder.mN.extras);
contentView.setInt(R.id.status_bar_latest_event_content, "setLayoutColor",
mBuilder.getSmallIconColor(p));
contentView.setInt(R.id.status_bar_latest_event_content, "setSenderTextColor",
mBuilder.getPrimaryTextColor(p));
contentView.setInt(R.id.status_bar_latest_event_content, "setMessageTextColor",
mBuilder.getSecondaryTextColor(p));
contentView.setInt(R.id.status_bar_latest_event_content,
"setNotificationBackgroundColor",
mBuilder.getBackgroundColor(p));
contentView.setBoolean(R.id.status_bar_latest_event_content, "setIsCollapsed",
isCollapsed);
contentView.setIcon(R.id.status_bar_latest_event_content, "setAvatarReplacement",
mBuilder.mN.mLargeIcon);
contentView.setCharSequence(R.id.status_bar_latest_event_content, "setNameReplacement",
nameReplacement);
contentView.setBoolean(R.id.status_bar_latest_event_content, "setIsOneToOne",
isOneToOne);
contentView.setCharSequence(R.id.status_bar_latest_event_content,
"setConversationTitle", conversationTitle);
if (isConversationLayout) {
contentView.setIcon(R.id.status_bar_latest_event_content,
"setShortcutIcon", mShortcutIcon);
contentView.setBoolean(R.id.status_bar_latest_event_content,
"setIsImportantConversation", isImportantConversation);
}
if (isHeaderless) {
// Collapsed legacy messaging style has a 1-line limit.
contentView.setInt(R.id.notification_messaging, "setMaxDisplayedLines", 1);
}
contentView.setIcon(R.id.status_bar_latest_event_content, "setLargeIcon",
largeIcon);
contentView.setBundle(R.id.status_bar_latest_event_content, "setData",
mBuilder.mN.extras);
return contentView;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeMessagingView
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | makeMessagingView | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | public synchronized void save() {
if(BulkChange.contains(this)) return;
try {
getConfigFile().write(this);
SaveableListener.fireOnChange(this, getConfigFile());
} catch (IOException e) {
LOGGER.log(Level.WARNING, "Failed to save "+getConfigFile(),e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: save
File: core/src/main/java/hudson/model/Descriptor.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2013-7330 | MEDIUM | 4 | jenkinsci/jenkins | save | core/src/main/java/hudson/model/Descriptor.java | 36342d71e29e0620f803a7470ce96c61761648d8 | 0 |
Analyze the following code function for security vulnerabilities | static public void noteWakeupAlarm(PendingIntent ps, int sourceUid, String sourcePkg,
String tag) {
try {
getDefault().noteWakeupAlarm(ps.getTarget(), sourceUid, sourcePkg, tag);
} catch (RemoteException ex) {
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: noteWakeupAlarm
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | noteWakeupAlarm | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private final void moveTaskBackwardsLocked(int task) {
Slog.e(TAG, "moveTaskBackwards not yet implemented!");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTaskBackwardsLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | moveTaskBackwardsLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public static String getPayloadOneLineString(final IBaseDataObject payload) {
final StringBuilder sb = new StringBuilder();
final String fn = payload.getFilename();
final int attPos = fn.indexOf(emissary.core.Family.SEP);
if (attPos != -1) {
sb.append(fn.substring(attPos + 1)).append(" ");
}
final List<String> th = payload.transformHistory();
String prev = "";
for (final String h : th) {
final int pos = h.indexOf(".");
if (pos > 0) {
final String prefix = h.substring(0, pos);
if (!prev.equals(prefix)) {
if (prev.length() != 0) {
sb.append(",");
}
sb.append(prefix);
prev = prefix;
}
}
}
sb.append(">>").append(payload.getAllCurrentForms());
sb.append("//").append(payload.getFileType());
sb.append("//").append(payload.getCreationTimestamp());
return sb.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getPayloadOneLineString
File: src/main/java/emissary/util/PayloadUtil.java
Repository: NationalSecurityAgency/emissary
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2021-32634 | MEDIUM | 6.5 | NationalSecurityAgency/emissary | getPayloadOneLineString | src/main/java/emissary/util/PayloadUtil.java | 40260b1ec1f76cc92361702cc14fa1e4388e19d7 | 0 |
Analyze the following code function for security vulnerabilities | public void setDateHeader(String name, long date) {
setHeader(name, formatHeaderDate(new Date(date)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDateHeader
File: src/java/winstone/WinstoneResponse.java
Repository: jenkinsci/winstone
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2011-4344 | LOW | 2.6 | jenkinsci/winstone | setDateHeader | src/java/winstone/WinstoneResponse.java | 410ed3001d51c689cf59085b7417466caa2ded7b | 0 |
Analyze the following code function for security vulnerabilities | private void ensureCorrectTheme(Intent data) {
String oldListLayout = data.getStringExtra(SettingsActivity.SP_FEED_LIST_LAYOUT);
String newListLayout = mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT,"0");
if (ThemeChooser.themeRequiresRestartOfUI() || !newListLayout.equals(oldListLayout)) {
NewsReaderListActivity.this.recreate();
} else if (data.hasExtra(SettingsActivity.CACHE_CLEARED)) {
resetUiAndStartSync();
}
} | Vulnerability Classification:
- CWE: CWE-829
- CVE: CVE-2021-41256
- Severity: MEDIUM
- CVSS Score: 5.8
Description: fix GHSL-2021-1033
Signed-off-by: David Luhmer <david-dev@live.de>
Function: ensureCorrectTheme
File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
Repository: nextcloud/news-android
Fixed Code:
private void ensureCorrectTheme(Intent data) {
String oldListLayout = data.getStringExtra(SettingsActivity.AI_FEED_LIST_LAYOUT);
String newListLayout = mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT, "0");
if (ThemeChooser.themeRequiresRestartOfUI() || !newListLayout.equals(oldListLayout)) {
NewsReaderListActivity.this.recreate();
} else if (data.hasExtra(SettingsActivity.CACHE_CLEARED)) {
resetUiAndStartSync();
}
} | [
"CWE-829"
] | CVE-2021-41256 | MEDIUM | 5.8 | nextcloud/news-android | ensureCorrectTheme | News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java | 05449cb666059af7de2302df9d5c02997a23df85 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public void checkExit(int status) {
try {
if (enterPublicInterface())
return;
if (Thread.currentThread() == SecurityConstants.MAIN_THREAD && getNonWhitelistedStackFrames().isEmpty()) {
// always allow maven to exit
return;
}
throw new SecurityException(localized("security.error_system_exit")); //$NON-NLS-1$
} finally {
exitPublicInterface();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkExit
File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
Repository: ls1intum/Ares
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2024-23683 | HIGH | 8.2 | ls1intum/Ares | checkExit | src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java | af4f28a56e2fe600d8750b3b415352a0a3217392 | 0 |
Analyze the following code function for security vulnerabilities | public boolean hasMessage(String messageId) {
return this.keyToBundleMap.containsKey(messageId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasMessage
File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
Repository: spacewalkproject/spacewalk
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2016-3079 | MEDIUM | 4.3 | spacewalkproject/spacewalk | hasMessage | java/code/src/com/redhat/rhn/common/localization/LocalizationService.java | 7b9ff9ad | 0 |
Analyze the following code function for security vulnerabilities | @Override
public MergeTarget newMergeTargetForField(
Descriptors.FieldDescriptor descriptor, Message defaultInstance) {
throw new UnsupportedOperationException("newMergeTargetForField() called on FieldSet object");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: newMergeTargetForField
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobuf
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | newMergeTargetForField | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 0 |
Analyze the following code function for security vulnerabilities | @Nullable
public String getIdAttribute() {
final int id = nativeGetIdAttribute(mParseState);
if (id == ERROR_NULL_DOCUMENT) {
throw new NullPointerException("Null document");
}
return id >= 0 ? getSequenceString(mStrings.getSequence(id)) : null;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getIdAttribute
File: core/java/android/content/res/XmlBlock.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getIdAttribute | core/java/android/content/res/XmlBlock.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean isToolbarEnabled() {
return false;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isToolbarEnabled
File: src/com/android/settings/password/ChooseLockPassword.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | isToolbarEnabled | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Set<? extends LocallyAvailableResource> search(String pattern) {
if (!getBaseDir().exists()) {
return Collections.emptySet();
}
final Set<LocallyAvailableResource> entries = new HashSet<LocallyAvailableResource>();
findFiles(pattern).visit(new EmptyFileVisitor() {
@Override
public void visitFile(FileVisitDetails fileDetails) {
final File file = fileDetails.getFile();
// We cannot clean in progress markers, or in progress files here because
// the file system visitor stuff can't handle the file system mutating while visiting
if (!isInProgressMarkerFile(file) && !isInProgressFile(file)) {
entries.add(entryAt(file));
}
}
});
return entries;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: search
File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
Repository: gradle
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2023-35946 | MEDIUM | 5.5 | gradle | search | subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java | 859eae2b2acf751ae7db3c9ffefe275aa5da0d5d | 0 |
Analyze the following code function for security vulnerabilities | private boolean loadFromUserStoreAfterUnlockOrSwitch(int userId) {
try {
List<WifiConfigStore.StoreFile> userStoreFiles =
WifiConfigStore.createUserFiles(
userId, mFrameworkFacade.isNiapModeOn(mContext));
if (userStoreFiles == null) {
Log.e(TAG, "Failed to create user store files");
return false;
}
mWifiConfigStore.switchUserStoresAndRead(userStoreFiles);
} catch (IOException | IllegalStateException e) {
Log.wtf(TAG, "Reading from new store failed. All saved private networks are lost!", e);
return handleConfigStoreFailure(true);
} catch (XmlPullParserException e) {
Log.wtf(TAG, "XML deserialization of store failed. All saved private networks are "
+ "lost!", e);
return handleConfigStoreFailure(true);
}
loadInternalDataFromUserStore(mNetworkListUserStoreData.getConfigurations());
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadFromUserStoreAfterUnlockOrSwitch
File: service/java/com/android/server/wifi/WifiConfigManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | loadFromUserStoreAfterUnlockOrSwitch | service/java/com/android/server/wifi/WifiConfigManager.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | public static String escape(String s) {
return Util.escape(s);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: escape
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | escape | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getGameAction(int keyCode) {
switch (keyCode) {
case DROID_IMPL_KEY_DOWN:
return Display.GAME_DOWN;
case DROID_IMPL_KEY_UP:
return Display.GAME_UP;
case DROID_IMPL_KEY_LEFT:
return Display.GAME_LEFT;
case DROID_IMPL_KEY_RIGHT:
return Display.GAME_RIGHT;
case DROID_IMPL_KEY_FIRE:
return Display.GAME_FIRE;
default:
return 0;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getGameAction
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | getGameAction | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | private Provider<DocumentReference> getDefaultDocumentReferenceProvider()
{
if (this.defaultDocumentReferenceProvider == null) {
this.defaultDocumentReferenceProvider = Utils.getComponent(DocumentReference.TYPE_PROVIDER);
}
return this.defaultDocumentReferenceProvider;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getDefaultDocumentReferenceProvider
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getDefaultDocumentReferenceProvider | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void clearAccounts(String packageName) {
synchronized (mLock) {
try {
Log.startSession("TSI.cA");
enforcePhoneAccountModificationForPackage(packageName);
mPhoneAccountRegistrar
.clearAccounts(packageName, Binder.getCallingUserHandle());
} catch (Exception e) {
Log.e(this, e, "clearAccounts %s", packageName);
throw e;
} finally {
Log.endSession();
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: clearAccounts
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21394 | MEDIUM | 5.5 | android | clearAccounts | src/com/android/server/telecom/TelecomServiceImpl.java | 68dca62035c49e14ad26a54f614199cb29a3393f | 0 |
Analyze the following code function for security vulnerabilities | public void addResourceProvider(String key, ResourceProvider provider) {
if (resourceProviders == null) {
resourceProviders = new LinkedHashMap<String, ResourceProvider>();
}
boolean addedInDevMode = UiFrameworkUtil.checkAndSetDevelopmentModeForProvider(key, provider);
if (addedInDevMode) {
resourceProvidersInDevelopmentMode.add(key);
}
resourceProviders.put(key, provider);
} | Vulnerability Classification:
- CWE: CWE-22
- CVE: CVE-2020-24621
- Severity: MEDIUM
- CVSS Score: 6.5
Description: UIFR-215: Do not allow loading arbitrary files
Function: addResourceProvider
File: api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java
Repository: openmrs/openmrs-module-uiframework
Fixed Code:
public void addResourceProvider(String key, ResourceProvider provider) {
if (resourceProviders == null) {
resourceProviders = new LinkedHashMap<String, ResourceProvider>();
}
boolean addedInDevMode = UiFrameworkUtil.checkAndSetDevelopmentModeForProvider(key, provider);
if (addedInDevMode) {
resourceProvidersInDevelopmentMode.add(key);
}
resourceProviders.put(key, provider);
} | [
"CWE-22"
] | CVE-2020-24621 | MEDIUM | 6.5 | openmrs/openmrs-module-uiframework | addResourceProvider | api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java | 0422fa52c7eba3d96cce2936cb92897dca4b680a | 1 |
Analyze the following code function for security vulnerabilities | public List<File> getImageFiles(String input) {
List<File> files = new ArrayList<>();
String regex = "(\\!\\[.*?\\]\\((.*?)\\))";
Pattern pattern = Pattern.compile(regex);
if (StringUtils.isBlank(input)) {
return new ArrayList<>();
}
Matcher matcher = pattern.matcher(input);
while (matcher.find()) {
try {
String path = matcher.group(2);
if (!path.contains("/resource/md/get/url")) {
if (path.contains("/resource/md/get/")) { // 兼容旧数据
String name = path.substring(path.indexOf("/resource/md/get/") + 17);
files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + name));
} else if (path.contains("/resource/md/get")) { // 新数据走这里
String name = path.substring(path.indexOf("/resource/md/get") + 26);
files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + URLDecoder.decode(name, StandardCharsets.UTF_8.name())));
}
}
} catch (Exception e) {
LogUtil.error(e.getMessage(), e);
}
}
return files;
} | Vulnerability Classification:
- CWE: CWE-918
- CVE: CVE-2022-23544
- Severity: MEDIUM
- CVSS Score: 6.1
Description: fix(测试跟踪): 缺陷平台请求转发添加白名单
Function: getImageFiles
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
Fixed Code:
public List<File> getImageFiles(String input) {
List<File> files = new ArrayList<>();
String regex = "(\\!\\[.*?\\]\\((.*?)\\))";
Pattern pattern = Pattern.compile(regex);
if (StringUtils.isBlank(input)) {
return new ArrayList<>();
}
Matcher matcher = pattern.matcher(input);
while (matcher.find()) {
try {
String path = matcher.group(2);
if (!path.contains("/resource/md/get/url") && !path.contains("/resource/md/get/path")) {
if (path.contains("/resource/md/get/")) { // 兼容旧数据
String name = path.substring(path.indexOf("/resource/md/get/") + 17);
files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + name));
} else if (path.contains("/resource/md/get")) { // 新数据走这里
String name = path.substring(path.indexOf("/resource/md/get") + 26);
files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + URLDecoder.decode(name, StandardCharsets.UTF_8.name())));
}
}
} catch (Exception e) {
LogUtil.error(e.getMessage(), e);
}
}
return files;
} | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | getImageFiles | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 1 |
Analyze the following code function for security vulnerabilities | @Override
void cancelAnimation() {
super.cancelAnimation();
clearThumbnail();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelAnimation
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | cancelAnimation | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | public void activityStopped(IBinder token, Bundle state,
PersistableBundle persistentState, CharSequence description) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeStrongBinder(token);
data.writeBundle(state);
data.writePersistableBundle(persistentState);
TextUtils.writeToParcel(description, data, 0);
mRemote.transact(ACTIVITY_STOPPED_TRANSACTION, data, reply, IBinder.FLAG_ONEWAY);
reply.readException();
data.recycle();
reply.recycle();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: activityStopped
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | activityStopped | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | private List<ValidationError> getFieldErrorsAsValidationErrors(Lang lang, BindingResult result) {
return result.getFieldErrors().stream()
.map(
error -> {
String key = error.getObjectName() + "." + error.getField();
if (key.startsWith("target.") && rootName == null) {
key = key.substring(7);
}
if (error.isBindingFailure()) {
ImmutableList.Builder<String> builder = ImmutableList.builder();
final Messages msgs =
lang != null ? new MessagesImpl(lang, this.messagesApi) : null;
for (String code : error.getCodes()) {
code =
REPLACE_TYPEMISMATCH
.matcher(code)
.replaceAll(Matcher.quoteReplacement(INVALID_MSG_KEY));
if (msgs == null || msgs.isDefinedAt(code)) {
builder.add(code);
}
}
final ImmutableList<String> messages = builder.build();
return new ValidationError(
key,
messages.isEmpty() ? Arrays.asList(INVALID_MSG_KEY) : messages.reverse(),
convertErrorArguments(error.getArguments()));
} else {
return new ValidationError(
key, error.getDefaultMessage(), convertErrorArguments(error.getArguments()));
}
})
.collect(Collectors.toList());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFieldErrorsAsValidationErrors
File: web/play-java-forms/src/main/java/play/data/Form.java
Repository: playframework
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-31018 | MEDIUM | 5 | playframework | getFieldErrorsAsValidationErrors | web/play-java-forms/src/main/java/play/data/Form.java | 15393b736df939e35e275af2347155f296c684f2 | 0 |
Analyze the following code function for security vulnerabilities | protected void overrideByteOrder() {
String byteOrderOverride = System.getProperty(BYTE_ORDER_OVERRIDE_PROPERTY);
if (StringUtil.isNullOrEmpty(byteOrderOverride)) {
return;
}
if (BIG_ENDIAN.toString().equals(byteOrderOverride)) {
byteOrder = BIG_ENDIAN;
} else if (LITTLE_ENDIAN.toString().equals(byteOrderOverride)) {
byteOrder = LITTLE_ENDIAN;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: overrideByteOrder
File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | overrideByteOrder | hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void updateAppWidgetOptions(String callingPackage, int appWidgetId, Bundle options) {
final int userId = UserHandle.getCallingUserId();
if (DEBUG) {
Slog.i(TAG, "updateAppWidgetOptions() " + userId);
}
// Make sure the package runs under the caller uid.
mSecurityPolicy.enforceCallFromPackage(callingPackage);
synchronized (mLock) {
ensureGroupStateLoadedLocked(userId);
// NOTE: The lookup is enforcing security across users by making
// sure the caller can only access widgets it hosts or provides.
Widget widget = lookupWidgetLocked(appWidgetId,
Binder.getCallingUid(), callingPackage);
if (widget == null) {
return;
}
// Merge the options.
widget.options.putAll(options);
// Send the broacast to notify the provider that options changed.
sendOptionsChangedIntentLocked(widget);
saveGroupStateAsync(userId);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateAppWidgetOptions
File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-1541 | MEDIUM | 4.3 | android | updateAppWidgetOptions | services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java | 0b98d304c467184602b4c6bce76fda0b0274bc07 | 0 |
Analyze the following code function for security vulnerabilities | Configuration[] getSizeAndUiModeConfigurations() {
synchronized (this) {
ensureValidLocked();
return nativeGetSizeAndUiModeConfigurations(mObject);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSizeAndUiModeConfigurations
File: core/java/android/content/res/AssetManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-415"
] | CVE-2023-40103 | HIGH | 7.8 | android | getSizeAndUiModeConfigurations | core/java/android/content/res/AssetManager.java | c3bc12c484ef3bbca4cec19234437c45af5e584d | 0 |
Analyze the following code function for security vulnerabilities | protected abstract void connectInternal() throws SmackException, IOException, XMPPException, InterruptedException; | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: connectInternal
File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
Repository: igniterealtime/Smack
The code follows secure coding practices. | [
"CWE-362"
] | CVE-2016-10027 | MEDIUM | 4.3 | igniterealtime/Smack | connectInternal | smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java | a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 | 0 |
Analyze the following code function for security vulnerabilities | public boolean isUserInGroup(String groupName)
{
boolean result = false;
try {
if (this.user == null) {
LOGGER.warn("User considered not part of group [{}] since user is null", groupName);
} else {
result = this.user.isUserInGroup(groupName, getXWikiContext());
}
} catch (Exception ex) {
LOGGER.warn(new MessageFormat("Unhandled exception while checking if user {0}"
+ " belongs to group {1}").format(new java.lang.Object[] { this.user, groupName }), ex);
}
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isUserInGroup
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2022-41929 | MEDIUM | 4.9 | xwiki/xwiki-platform | isUserInGroup | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java | 0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd | 0 |
Analyze the following code function for security vulnerabilities | @Beta
public static boolean equal(File file1, File file2) throws IOException {
checkNotNull(file1);
checkNotNull(file2);
if (file1 == file2 || file1.equals(file2)) {
return true;
}
/*
* Some operating systems may return zero as the length for files denoting system-dependent
* entities such as devices or pipes, in which case we must fall back on comparing the bytes
* directly.
*/
long len1 = file1.length();
long len2 = file2.length();
if (len1 != 0 && len2 != 0 && len1 != len2) {
return false;
}
return asByteSource(file1).contentEquals(asByteSource(file2));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: equal
File: guava/src/com/google/common/io/Files.java
Repository: google/guava
The code follows secure coding practices. | [
"CWE-732"
] | CVE-2020-8908 | LOW | 2.1 | google/guava | equal | guava/src/com/google/common/io/Files.java | fec0dbc4634006a6162cfd4d0d09c962073ddf40 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isValid(Integer value, ConstraintValidatorContext context) {
if (proxyManager.get(value) != null) {
return true;
}
String errorMessage = String.format("No proxy server found for specified port %d", value);
LOG.warn(errorMessage);
context.buildConstraintViolationWithTemplate(errorMessage).addPropertyNode(PARAM_NAME).addConstraintViolation();
return false;
} | Vulnerability Classification:
- CWE: CWE-74
- CVE: CVE-2020-26282
- Severity: HIGH
- CVSS Score: 7.5
Description: Fix Critical Java EL Injection RCE vulnerability from GHSL-2020-213
Function: isValid
File: browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java
Repository: browserup/browserup-proxy
Fixed Code:
@Override
public boolean isValid(Integer value, ConstraintValidatorContext context) {
if (proxyManager.get(value) != null) {
return true;
}
String escapedValue = MessageSanitizer.escape(value.toString());
String errorMessage = String.format("No proxy server found for specified port %s", escapedValue);
LOG.warn(errorMessage);
context.buildConstraintViolationWithTemplate(errorMessage).addPropertyNode(PARAM_NAME).addConstraintViolation();
return false;
} | [
"CWE-74"
] | CVE-2020-26282 | HIGH | 7.5 | browserup/browserup-proxy | isValid | browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java | 4b38e7a3e20917e5c3329d0d4e9590bed9d578ab | 1 |
Analyze the following code function for security vulnerabilities | private ActivityInfo resolveActivityInfo(Intent intent, int flags, int userId) {
ActivityInfo ai = null;
ComponentName comp = intent.getComponent();
try {
if (comp != null) {
ai = AppGlobals.getPackageManager().getActivityInfo(comp, flags, userId);
} else {
ResolveInfo info = AppGlobals.getPackageManager().resolveIntent(
intent,
intent.resolveTypeIfNeeded(mContext.getContentResolver()),
flags, userId);
if (info != null) {
ai = info.activityInfo;
}
}
} catch (RemoteException e) {
// ignore
}
return ai;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resolveActivityInfo
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2015-3833 | MEDIUM | 4.3 | android | resolveActivityInfo | services/core/java/com/android/server/am/ActivityManagerService.java | aaa0fee0d7a8da347a0c47cef5249c70efee209e | 0 |
Analyze the following code function for security vulnerabilities | public void setSecureSetting(@NonNull ComponentName admin, String setting, String value) {
throwIfParentInstance("setSecureSetting");
if (mService != null) {
try {
mService.setSecureSetting(admin, setting, value);
} catch (RemoteException e) {
throw e.rethrowFromSystemServer();
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSecureSetting
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setSecureSetting | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int sendIntentSender(IIntentSender target, IBinder allowlistToken, int code,
Intent intent, String resolvedType,
IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) {
return ActivityManagerService.this.sendIntentSender(target, allowlistToken, code,
intent, resolvedType, finishedReceiver, requiredPermission, options);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendIntentSender
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | sendIntentSender | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | CrossProfileApps getCrossProfileApps() {
return mContext.getSystemService(CrossProfileApps.class);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCrossProfileApps
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getCrossProfileApps | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Pure
public float getFloat(String columnName) throws SQLException {
return getFloat(findColumn(columnName));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFloat
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | getFloat | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | public static Property<?> createProperty(String pName, Object value) {
Util.assertHasLength(pName);
Util.assertNotNull(value);
if (validPropertyPrimitives.containsKey(value.getClass())) {
return PropertyFactory.createProperty(pName,
validPropertyPrimitives.get(value.getClass()).getName(),
String.valueOf(value), null, null);
}
if (value instanceof Date) {
return PropertyFactory.createProperty(pName,
PropertyDate.class.getName(),
PropertyDate.SDF.format(value), null, null);
}
if (value instanceof Calendar) {
Date valueDate = ((Calendar) value).getTime();
return PropertyFactory.createProperty(pName,
PropertyCalendar.class.getName(),
PropertyCalendar.SDF.format(valueDate), null, null);
}
if (value instanceof Property<?>) {
return (Property<?>) value;
}
// String Value
if (value.getClass().isArray() || Util.isCollection(value)) {
return PropertyFactory.createProperty(pName,
PropertyString.class.getName(),
Util.join(Util.asCollection(value), ","), null, null);
}
throw new IllegalArgumentException("Cannot create property with input type " + value.getClass() + value.toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createProperty
File: ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java
Repository: ff4j
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | createProperty | ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java | 481ca723a57f87eca931196ec9a772967ab70b3b | 0 |
Analyze the following code function for security vulnerabilities | private void handleSAML2UnsolicitedResponse(Request request, Response response) throws ServletException {
SAML2Request samlRequest = new SAML2Request();
String id = IDGenerator.create("ID_");
String assertionConsumerURL = request.getParameter(JBossSAMLConstants.UNSOLICITED_RESPONSE_TARGET.get());
try {
AuthnRequestType authn = samlRequest
.createAuthnRequestType(id, assertionConsumerURL, getIdentityURL(), assertionConsumerURL);
String requestedBinding = request.getParameter(JBossSAMLConstants.UNSOLICITED_RESPONSE_SAML_BINDING.get());
if ("POST".equalsIgnoreCase(requestedBinding)) {
authn.setProtocolBinding(URI.create(JBossSAMLURIConstants.SAML_HTTP_POST_BINDING.get()));
request.setMethod("POST");
} else {
authn.setProtocolBinding(URI.create(JBossSAMLURIConstants.SAML_HTTP_REDIRECT_BINDING.get()));
}
authn.setUnsolicitedResponse(true);
processSAMLRequestMessage(request, response, authn, true);
} catch (Exception e) {
throw new ServletException("Could not handle SAML 2.0 Unsolicited Response.", e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleSAML2UnsolicitedResponse
File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
Repository: picketlink/picketlink-bindings
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2015-3158 | MEDIUM | 4 | picketlink/picketlink-bindings | handleSAML2UnsolicitedResponse | picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java | 341a37aefd69e67b6b5f6d775499730d6ccaff0d | 0 |
Analyze the following code function for security vulnerabilities | private void scanUntilEndTag(final String tagName) throws IOException {
final XMLStringBuffer buffer = new XMLStringBuffer();
final String end = "/" + tagName;
final int lengthToScan = tagName.length() + 2;
while (true) {
int c = fCurrentEntity.read();
if (c == -1) {
break;
}
if (c == '<') {
final String next = nextContent(lengthToScan) + " ";
if (next.length() >= lengthToScan && end.equalsIgnoreCase(next.substring(0, end.length()))
&& ('>' == next.charAt(lengthToScan - 1) || Character.isWhitespace(next.charAt(lengthToScan - 1)))) {
fCurrentEntity.rewind();
break;
}
}
if (c == '\r' || c == '\n') {
fCurrentEntity.rewind();
int newlines = skipNewlines();
for (int i = 0; i < newlines; i++) {
buffer.append('\n');
}
}
else {
appendChar(buffer, c);
}
}
if (buffer.length > 0 && fDocumentHandler != null) {
fEndLineNumber = fCurrentEntity.getLineNumber();
fEndColumnNumber = fCurrentEntity.getColumnNumber();
fEndCharacterOffset = fCurrentEntity.getCharacterOffset();
fDocumentHandler.characters(buffer, locationAugs());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scanUntilEndTag
File: src/org/cyberneko/html/HTMLScanner.java
Repository: sparklemotion/nekohtml
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2022-24839 | MEDIUM | 5 | sparklemotion/nekohtml | scanUntilEndTag | src/org/cyberneko/html/HTMLScanner.java | a800fce3b079def130ed42a408ff1d09f89e773d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int hashCode() {
return Objects.hash(host, port, protocol, credentials, options, tags, cluster, replicaNum, shardNum,
shardWeight, weight);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hashCode
File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
Repository: ClickHouse/clickhouse-java
The code follows secure coding practices. | [
"CWE-209"
] | CVE-2024-23689 | HIGH | 8.8 | ClickHouse/clickhouse-java | hashCode | clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java | 4f8d9303eb991b39ec7e7e34825241efa082238a | 0 |
Analyze the following code function for security vulnerabilities | public static VFSContainer getAllSubdirs(VFSContainer base, String subDirPath, Identity identity, boolean create) {
StringTokenizer st;
if (subDirPath.indexOf('/') != -1) {
st = new StringTokenizer(subDirPath, "/", false);
} else {
// try it windows style, backslash is also valid format
st = new StringTokenizer(subDirPath, "\\", false);
}
VFSRepositoryService vfsRepositoryService = CoreSpringFactory.getImpl(VFSRepositoryService.class);
VFSContainer currentPath = base;
while (st.hasMoreTokens()) {
String nextSubpath = st.nextToken();
VFSItem vfsSubpath = currentPath.resolve(nextSubpath);
if (vfsSubpath == null && !create) {
return null;
}
if (vfsSubpath == null || (vfsSubpath instanceof VFSLeaf)) {
vfsSubpath = currentPath.createChildContainer(nextSubpath);
if (vfsSubpath == null) return null;
if (identity != null && vfsSubpath.canMeta() == VFSConstants.YES) {
VFSMetadata info = vfsSubpath.getMetaInfo();
if(info != null) {
info.setAuthor(identity);
vfsRepositoryService.updateMetadata(info);
}
}
}
currentPath = (VFSContainer)vfsSubpath;
}
return currentPath;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllSubdirs
File: src/main/java/org/olat/core/util/ZipUtil.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | getAllSubdirs | src/main/java/org/olat/core/util/ZipUtil.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected boolean recordLogRec(Message msg) {
switch (msg.what) {
case CMD_RSSI_POLL:
return mVerboseLoggingEnabled;
default:
return true;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recordLogRec
File: service/java/com/android/server/wifi/ClientModeImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21242 | CRITICAL | 9.8 | android | recordLogRec | service/java/com/android/server/wifi/ClientModeImpl.java | 72e903f258b5040b8f492cf18edd124b5a1ac770 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean requestPinAppWidget(@NonNull String callingPackage,
@NonNull AppWidgetProviderInfo appWidget, @Nullable Bundle extras,
@Nullable IntentSender resultIntent, int userId) {
Objects.requireNonNull(appWidget);
return requestPinItem(callingPackage, userId, null, appWidget, extras, resultIntent);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: requestPinAppWidget
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | requestPinAppWidget | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | private static Charset getCharset() {
return CHARSET;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCharset
File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java
Repository: rabbitmq/rabbitmq-jms-client
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2020-36282 | HIGH | 7.5 | rabbitmq/rabbitmq-jms-client | getCharset | src/main/java/com/rabbitmq/jms/client/RMQMessage.java | f647e5dbfe055a2ca8cbb16dd70f9d50d888b638 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public int getNearbyAppStreamingPolicy(final int userId) {
if (!mHasFeature) {
return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isProfileOwner(caller) || isDefaultDeviceOwner(caller)
|| hasCallingOrSelfPermission(permission.READ_NEARBY_STREAMING_POLICY));
synchronized (getLockObject()) {
if (mOwners.hasProfileOwner(userId) || mOwners.hasDeviceOwner()) {
final ActiveAdmin admin = getDeviceOrProfileOwnerAdminLocked(userId);
return admin.mNearbyAppStreamingPolicy;
}
}
return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getNearbyAppStreamingPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2023-21284 | MEDIUM | 5.5 | android | getNearbyAppStreamingPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | ed3f25b7222d4cff471f2b7d22d1150348146957 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onDevicePolicyManagerStateChanged() {
showPrimarySecurityScreen(false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onDevicePolicyManagerStateChanged
File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21245 | HIGH | 7.8 | android | onDevicePolicyManagerStateChanged | packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java | a33159e8cb297b9eee6fa5c63c0e343d05fad622 | 0 |
Analyze the following code function for security vulnerabilities | public String convertUsername(String username)
{
return this.xwiki.convertUsername(username, getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: convertUsername
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2023-37911 | MEDIUM | 6.5 | xwiki/xwiki-platform | convertUsername | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java | f471f2a392aeeb9e51d59fdfe1d76fccf532523f | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void init(FilterConfig filterConfig) throws ServletException {
LOGGER.debug("(XssFilter) initialize");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: init
File: sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java
Repository: shopizer-ecommerce/shopizer
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2021-33561 | LOW | 3.5 | shopizer-ecommerce/shopizer | init | sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java | 197f8c78c8f673b957e41ca2c823afc654c19271 | 0 |
Analyze the following code function for security vulnerabilities | public String getXMLContent() throws XWikiException
{
String xml = this.doc.getXMLContent(getXWikiContext());
return getXWikiContext().getUtil().substitute("s/<email>.*?<\\/email>/<email>********<\\/email>/goi",
getXWikiContext().getUtil().substitute("s/<password>.*?<\\/password>/<password>********<\\/password>/goi",
xml));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXMLContent
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getXMLContent | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | public void onTextChanged(CharSequence s, int start, int before, int count) {
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTextChanged
File: src/com/android/settings/password/ChooseLockPassword.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | onTextChanged | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | private XWikiContext getXWikiContext()
{
return (XWikiContext) execution.getContext().getProperty("xwikicontext");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getXWikiContext
File: xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-94"
] | CVE-2021-32621 | MEDIUM | 6.5 | xwiki/xwiki-platform | getXWikiContext | xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java | bb7068bd911f91e5511f3cfb03276c7ac81100bc | 0 |
Analyze the following code function for security vulnerabilities | boolean setSystemGestureExclusion(List<Rect> exclusionRects) {
if (mExclusionRects.equals(exclusionRects)) {
return false;
}
mExclusionRects.clear();
mExclusionRects.addAll(exclusionRects);
return true;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSystemGestureExclusion
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | setSystemGestureExclusion | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | private void acceptRingingCallInternal() {
Call call = mCallsManager.getFirstCallWithState(CallState.RINGING);
if (call != null) {
call.answer(call.getVideoState());
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: acceptRingingCallInternal
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | acceptRingingCallInternal | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void sendResetPasswordEmailRequest(ResetPasswordRequestResponse requestResponse)
throws ResetPasswordException
{
if (this.checkUserReference(requestResponse.getUserReference())) {
AuthenticationResourceReference resourceReference =
new AuthenticationResourceReference(AuthenticationAction.RESET_PASSWORD);
UserReference userReference = requestResponse.getUserReference();
UserProperties userProperties = this.userPropertiesResolver.resolve(userReference);
InternetAddress email = userProperties.getEmail();
String serializedUserReference = this.referenceSerializer.serialize(userReference);
// FIXME: this should be provided as part of the User API.
String formattedName = "";
if (!StringUtils.isBlank(userProperties.getFirstName())) {
formattedName += userProperties.getFirstName();
}
if (!StringUtils.isBlank(userProperties.getLastName())) {
if (!StringUtils.isBlank(formattedName)) {
formattedName += " ";
}
formattedName += userProperties.getLastName();
}
if (StringUtils.isBlank(formattedName)) {
formattedName = serializedUserReference;
}
resourceReference.addParameter("u", serializedUserReference);
resourceReference.addParameter("v", requestResponse.getVerificationCode());
XWikiContext context = contextProvider.get();
ExtendedURL extendedURL = null;
try {
extendedURL = this.resourceReferenceSerializer.serialize(resourceReference);
extendedURL = this.urlNormalizer.normalize(extendedURL);
URL serverURL = context.getURLFactory().getServerURL(context);
URL externalVerificationURL = new URL(serverURL, extendedURL.serialize());
this.resetPasswordMailSenderProvider.get()
.sendResetPasswordEmail(formattedName, email, externalVerificationURL);
} catch (SerializeResourceReferenceException | UnsupportedResourceReferenceException
| MalformedURLException e) {
throw new ResetPasswordException("Error when processing information for creating the email.", e);
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: sendResetPasswordEmailRequest
File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/DefaultResetPasswordManager.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2022-41933 | MEDIUM | 6.5 | xwiki/xwiki-platform | sendResetPasswordEmailRequest | xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/DefaultResetPasswordManager.java | 443e8398b75a1295067d74afb5898370782d863a | 0 |
Analyze the following code function for security vulnerabilities | public Intent getResult() {
try {
return mResult.take();
} catch (InterruptedException e) {
throw new RuntimeException(e);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getResult
File: cmds/pm/src/com/android/commands/pm/Pm.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3833 | HIGH | 9.3 | android | getResult | cmds/pm/src/com/android/commands/pm/Pm.java | 4e4743a354e26467318b437892a9980eb9b8328a | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void mergexWikiObjects(XWikiDocument templatedoc)
{
mergeXObjects(templatedoc);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: mergexWikiObjects
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2023-26470 | HIGH | 7.5 | xwiki/xwiki-platform | mergexWikiObjects | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java | db3d1c62fc5fb59fefcda3b86065d2d362f55164 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public KBTemplate findByUuid_Last(String uuid,
OrderByComparator<KBTemplate> orderByComparator)
throws NoSuchTemplateException {
KBTemplate kbTemplate = fetchByUuid_Last(uuid, orderByComparator);
if (kbTemplate != null) {
return kbTemplate;
}
StringBundler msg = new StringBundler(4);
msg.append(_NO_SUCH_ENTITY_WITH_KEY);
msg.append("uuid=");
msg.append(uuid);
msg.append(StringPool.CLOSE_CURLY_BRACE);
throw new NoSuchTemplateException(msg.toString());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findByUuid_Last
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
Repository: brianchandotcom/liferay-portal
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | findByUuid_Last | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 0 |
Analyze the following code function for security vulnerabilities | public boolean checkPasswordHistory(String password, int userId) {
String passwordHashString = new String(
passwordToHash(password, userId), StandardCharsets.UTF_8);
String passwordHistory = getString(PASSWORD_HISTORY_KEY, userId);
if (passwordHistory == null) {
return false;
}
// Password History may be too long...
int passwordHashLength = passwordHashString.length();
int passwordHistoryLength = getRequestedPasswordHistoryLength(userId);
if(passwordHistoryLength == 0) {
return false;
}
int neededPasswordHistoryLength = passwordHashLength * passwordHistoryLength
+ passwordHistoryLength - 1;
if (passwordHistory.length() > neededPasswordHistoryLength) {
passwordHistory = passwordHistory.substring(0, neededPasswordHistoryLength);
}
return passwordHistory.contains(passwordHashString);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkPasswordHistory
File: core/java/com/android/internal/widget/LockPatternUtils.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3908 | MEDIUM | 4.3 | android | checkPasswordHistory | core/java/com/android/internal/widget/LockPatternUtils.java | 96daf7d4893f614714761af2d53dfb93214a32e4 | 0 |
Analyze the following code function for security vulnerabilities | public void setIssuerDN(String issuerDN) {
this.issuerDN = issuerDN;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setIssuerDN
File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
Repository: dogtagpki/pki
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2022-2414 | HIGH | 7.5 | dogtagpki/pki | setIssuerDN | base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java | 16deffdf7548e305507982e246eb9fd1eac414fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onBootCompleted() {
synchronized (this) {
if (mContext.getResources().getBoolean(
com.android.internal.R.bool.config_guestUserAutoCreated)) {
// TODO(b/191067027): Move post-boot guest creation to system_server
mUserSwitcherController.schedulePostBootGuestCreation();
}
mBootCompleted = true;
adjustStatusBarLocked(false, true);
if (mBootSendUserPresent) {
sendUserPresentBroadcast();
}
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onBootCompleted
File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21267 | MEDIUM | 5.5 | android | onBootCompleted | packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java | d18d8b350756b0e89e051736c1f28744ed31e93a | 0 |
Analyze the following code function for security vulnerabilities | private String lockTaskModeToString() {
switch (mLockTaskModeState) {
case LOCK_TASK_MODE_LOCKED:
return "LOCKED";
case LOCK_TASK_MODE_PINNED:
return "PINNED";
case LOCK_TASK_MODE_NONE:
return "NONE";
default: return "unknown=" + mLockTaskModeState;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: lockTaskModeToString
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | lockTaskModeToString | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void onUnsuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, AuthenticationException failed) throws IOException {
super.onUnsuccessfulAuthentication(request, response, failed);
LOGGER.log(Level.INFO, "Login attempt failed", failed);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUnsuccessfulAuthentication
File: core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2014-2066 | MEDIUM | 6.8 | jenkinsci/jenkins | onUnsuccessfulAuthentication | core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java | 8ac74c350779921598f9d5edfed39dd35de8842a | 0 |
Analyze the following code function for security vulnerabilities | private String normalizeJarBasePath(String rawPath) {
if (rawPath == null || rawPath.isEmpty()) {
return "";
}
return rawPath.endsWith(JAR_PATH_SEPARATOR) ? rawPath
: rawPath + JAR_PATH_SEPARATOR;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: normalizeJarBasePath
File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-379"
] | CVE-2021-31411 | MEDIUM | 4.6 | vaadin/flow | normalizeJarBasePath | flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java | 82cea56045b8430f7a26f037c01486b1feffa51d | 0 |
Analyze the following code function for security vulnerabilities | public int getCarrierId() {
return mCarrierId;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCarrierId
File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
Repository: android
The code follows secure coding practices. | [
"CWE-120"
] | CVE-2023-21243 | MEDIUM | 5.5 | android | getCarrierId | framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java | 5b49b8711efaadadf5052ba85288860c2d7ca7a6 | 0 |
Analyze the following code function for security vulnerabilities | protected Editor<T> createEditor() {
return new EditorImpl<>(propertySet);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createEditor
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | createEditor | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Configuration getConfiguration() {
// If the process has not registered to any display area to listen to the configuration
// change, we can simply return the mFullConfiguration as default.
if (!registeredForDisplayAreaConfigChanges()) {
return super.getConfiguration();
}
// We use the process config this window is associated with as the based global config since
// the process can override its config, but isn't part of the window hierarchy.
mTempConfiguration.setTo(getProcessGlobalConfiguration());
mTempConfiguration.updateFrom(getMergedOverrideConfiguration());
return mTempConfiguration;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getConfiguration
File: services/core/java/com/android/server/wm/WindowState.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-35674 | HIGH | 7.8 | android | getConfiguration | services/core/java/com/android/server/wm/WindowState.java | 7428962d3b064ce1122809d87af65099d1129c9e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<KBTemplate> findByUuid(String uuid, int start, int end) {
return findByUuid(uuid, start, end, null);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findByUuid
File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
Repository: brianchandotcom/liferay-portal
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2017-12647 | MEDIUM | 4.3 | brianchandotcom/liferay-portal | findByUuid | modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java | ef93d984be9d4d478a5c4b1ca9a86f4e80174774 | 0 |
Analyze the following code function for security vulnerabilities | private UI getUI() {
assert isAttached();
assert getOwner() instanceof StateTree
: "Attach should only be called when the node has been attached to the tree, not to a null owner";
return ((StateTree) getOwner()).getUI();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUI
File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2023-25499 | MEDIUM | 6.5 | vaadin/flow | getUI | flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java | 428cc97eaa9c89b1124e39f0089bbb741b6b21cc | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean isAssistDataAllowedOnCurrentActivity() {
int userId;
synchronized (this) {
userId = mUserController.getCurrentUserIdLocked();
ActivityRecord activity = getFocusedStack().topActivity();
if (activity == null) {
return false;
}
userId = activity.userId;
}
DevicePolicyManager dpm = (DevicePolicyManager) mContext.getSystemService(
Context.DEVICE_POLICY_SERVICE);
return (dpm == null) || (!dpm.getScreenCaptureDisabled(null, userId));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isAssistDataAllowedOnCurrentActivity
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3912 | HIGH | 9.3 | android | isAssistDataAllowedOnCurrentActivity | services/core/java/com/android/server/am/ActivityManagerService.java | 6c049120c2d749f0c0289d822ec7d0aa692f55c5 | 0 |
Analyze the following code function for security vulnerabilities | public void setGroupedWithParent(boolean groupedWithParent) {
mGroupedWithParent = groupedWithParent;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setGroupedWithParent
File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2014-3159 | MEDIUM | 6.4 | chromium | setGroupedWithParent | chrome/android/java/src/org/chromium/chrome/browser/Tab.java | 98a50b76141f0b14f292f49ce376e6554142d5e2 | 0 |
Analyze the following code function for security vulnerabilities | protected String emptyJsonResponse() {
return sendJson(JSONCodec.encodeObject(o -> o));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: emptyJsonResponse
File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
Repository: Silverpeas/Silverpeas-Core
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-47324 | MEDIUM | 5.4 | Silverpeas/Silverpeas-Core | emptyJsonResponse | core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java | 9a55728729a3b431847045c674b3e883507d1e1a | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onDismiss(DialogInterface dialog) {
assert mNativeWebsiteSettingsPopup != 0;
webContentsObserver.destroy();
nativeDestroy(mNativeWebsiteSettingsPopup);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onDismiss
File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-20"
] | CVE-2015-1261 | MEDIUM | 5 | chromium | onDismiss | chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java | 5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f | 0 |
Analyze the following code function for security vulnerabilities | public void close() throws IOException {
if (rof != null) {
rof.close();
rof = null;
}
if (unpack != null) {
unpack.cleanUp();
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: close
File: src/main/java/com/github/junrar/Archive.java
Repository: junrar
The code follows secure coding practices. | [
"CWE-835"
] | CVE-2018-12418 | MEDIUM | 4.3 | junrar | close | src/main/java/com/github/junrar/Archive.java | ad8d0ba8e155630da8a1215cee3f253e0af45817 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Collection<LBPool> listPool(String poolId) {
Collection<LBPool> result = new HashSet<LBPool>();
result.add(pools.get(poolId));
return result;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: listPool
File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
Repository: floodlight
The code follows secure coding practices. | [
"CWE-362",
"CWE-476"
] | CVE-2015-6569 | MEDIUM | 4.3 | floodlight | listPool | src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java | 7f5bedb625eec3ff4d29987c31cef2553a962b36 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.