instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void setupEdgeToEdge() { WindowCompat.setDecorFitsSystemWindows(getWindow(), false); ViewCompat.setOnApplyWindowInsetsListener(findViewById(android.R.id.content), (v, windowInsets) -> { Insets insets = windowInsets.getInsets(WindowInsetsCompat.Type.systemBars()); // Apply the insets paddings to the view. v.setPadding(insets.left, insets.top, insets.right, insets.bottom); // Return CONSUMED if you don't want the window insets to keep being // passed down to descendant views. return WindowInsetsCompat.CONSUMED; }); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setupEdgeToEdge File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
setupEdgeToEdge
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
public String getActiveClass() { if (this.currentObj == null) { return null; } else { return this.currentObj.getName(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getActiveClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getActiveClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public synchronized void updateAsciiStream( String columnName, java.io.@Nullable InputStream x, int length) throws SQLException { updateAsciiStream(findColumn(columnName), x, length); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAsciiStream File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateAsciiStream
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
@Override public boolean isSystemPriority() { return (mFlags & MediaSession.FLAG_EXCLUSIVE_GLOBAL_PRIORITY) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSystemPriority File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
isSystemPriority
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
boolean cancelBondProcess(BluetoothDevice device) { enforceCallingOrSelfPermission(BLUETOOTH_ADMIN_PERM, "Need BLUETOOTH ADMIN permission"); byte[] addr = Utils.getBytesFromAddress(device.getAddress()); return cancelBondNative(addr); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelBondProcess File: src/com/android/bluetooth/btservice/AdapterService.java Repository: android The code follows secure coding practices.
[ "CWE-362", "CWE-20" ]
CVE-2016-3760
MEDIUM
5.4
android
cancelBondProcess
src/com/android/bluetooth/btservice/AdapterService.java
122feb9a0b04290f55183ff2f0384c6c53756bd8
0
Analyze the following code function for security vulnerabilities
private Map<String, CWLElement> getInputsOutputs(JsonNode inputsOutputs) { Map<String, CWLElement> returnMap = new HashMap<>(); if (inputsOutputs.getClass() == ArrayNode.class) { // Explicit ID and other fields within each list for (JsonNode inputOutput : inputsOutputs) { String id = inputOutput.get(ID).asText(); if (id.charAt(0) == '#') { id = id.substring(1); } returnMap.put(id, getDetails(inputOutput)); } } else if (inputsOutputs.getClass() == ObjectNode.class) { // ID is the key of each object Iterator<Map.Entry<String, JsonNode>> iterator = inputsOutputs.fields(); while (iterator.hasNext()) { Map.Entry<String, JsonNode> inputOutputNode = iterator.next(); returnMap.put(inputOutputNode.getKey(), getDetails(inputOutputNode.getValue())); } } return returnMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInputsOutputs File: src/main/java/org/commonwl/view/cwl/CWLService.java Repository: common-workflow-language/cwlviewer The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-41110
HIGH
7.5
common-workflow-language/cwlviewer
getInputsOutputs
src/main/java/org/commonwl/view/cwl/CWLService.java
f6066f09edb70033a2ce80200e9fa9e70a5c29de
0
Analyze the following code function for security vulnerabilities
private BeanManager getBeanManager() { if (beanManager == null) { FacesContext facesContext = FacesContext.getCurrentInstance(); beanManager = Util.getCdiBeanManager(facesContext); } return beanManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBeanManager File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
getBeanManager
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
@Override public void onConnectionServiceFocusReleased(Session.Info sessionInfo) throws RemoteException { Log.startSession(sessionInfo, "CSW.oCSFR", mPackageAbbreviation); long token = Binder.clearCallingIdentity(); try { synchronized (mLock) { mConnSvrFocusListener.onConnectionServiceReleased( ConnectionServiceWrapper.this); } } catch (Throwable t) { Log.e(ConnectionServiceWrapper.this, t, ""); throw t; } finally { Binder.restoreCallingIdentity(token); Log.endSession(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onConnectionServiceFocusReleased File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
onConnectionServiceFocusReleased
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
public static boolean isSecurityParamsValid(SecurityParams params) { if (!params.isEnabled()) return false; if (!isSecurityParamsSupported(params)) return false; return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecurityParamsValid File: service/java/com/android/server/wifi/WifiConfigurationUtil.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21252
MEDIUM
5.5
android
isSecurityParamsValid
service/java/com/android/server/wifi/WifiConfigurationUtil.java
50b08ee30e04d185e5ae97a5f717d436fd5a90f3
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private void ensureValidLocked() { if (mObject == 0) { throw new RuntimeException("AssetManager has been destroyed"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ensureValidLocked File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
ensureValidLocked
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void saveAsAuthor() throws XWikiException { saveAsAuthor("", false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAsAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
saveAsAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
void initiateOneRestore(PackageInfo app, int appVersionCode) { final String packageName = app.packageName; if (DEBUG) Slog.d(TAG, "initiateOneRestore packageName=" + packageName); // !!! TODO: get the dirs from the transport mBackupDataName = new File(mDataDir, packageName + ".restore"); mStageName = new File(mDataDir, packageName + ".stage"); mNewStateName = new File(mStateDir, packageName + ".new"); mSavedStateName = new File(mStateDir, packageName); // don't stage the 'android' package where the wallpaper data lives. this is // an optimization: we know there's no widget data hosted/published by that // package, and this way we avoid doing a spurious copy of MB-sized wallpaper // data following the download. boolean staging = !packageName.equals("android"); ParcelFileDescriptor stage; File downloadFile = (staging) ? mStageName : mBackupDataName; final int token = generateToken(); try { // Run the transport's restore pass stage = ParcelFileDescriptor.open(downloadFile, ParcelFileDescriptor.MODE_READ_WRITE | ParcelFileDescriptor.MODE_CREATE | ParcelFileDescriptor.MODE_TRUNCATE); if (!SELinux.restorecon(mBackupDataName)) { if (MORE_DEBUG) Slog.e(TAG, "SElinux restorecon failed for " + downloadFile); } if (mTransport.getRestoreData(stage) != BackupTransport.TRANSPORT_OK) { // Transport-level failure, so we wind everything up and // terminate the restore operation. Slog.e(TAG, "Error getting restore data for " + packageName); EventLog.writeEvent(EventLogTags.RESTORE_TRANSPORT_FAILURE); stage.close(); downloadFile.delete(); executeNextState(UnifiedRestoreState.FINAL); return; } // We have the data from the transport. Now we extract and strip // any per-package metadata (typically widget-related information) // if appropriate if (staging) { stage.close(); stage = ParcelFileDescriptor.open(downloadFile, ParcelFileDescriptor.MODE_READ_ONLY); mBackupData = ParcelFileDescriptor.open(mBackupDataName, ParcelFileDescriptor.MODE_READ_WRITE | ParcelFileDescriptor.MODE_CREATE | ParcelFileDescriptor.MODE_TRUNCATE); BackupDataInput in = new BackupDataInput(stage.getFileDescriptor()); BackupDataOutput out = new BackupDataOutput(mBackupData.getFileDescriptor()); byte[] buffer = new byte[8192]; // will grow when needed while (in.readNextHeader()) { final String key = in.getKey(); final int size = in.getDataSize(); // is this a special key? if (key.equals(KEY_WIDGET_STATE)) { if (DEBUG) { Slog.i(TAG, "Restoring widget state for " + packageName); } mWidgetData = new byte[size]; in.readEntityData(mWidgetData, 0, size); } else { if (size > buffer.length) { buffer = new byte[size]; } in.readEntityData(buffer, 0, size); out.writeEntityHeader(key, size); out.writeEntityData(buffer, size); } } mBackupData.close(); } // Okay, we have the data. Now have the agent do the restore. stage.close(); mBackupData = ParcelFileDescriptor.open(mBackupDataName, ParcelFileDescriptor.MODE_READ_ONLY); mNewState = ParcelFileDescriptor.open(mNewStateName, ParcelFileDescriptor.MODE_READ_WRITE | ParcelFileDescriptor.MODE_CREATE | ParcelFileDescriptor.MODE_TRUNCATE); // Kick off the restore, checking for hung agents. The timeout or // the operationComplete() callback will schedule the next step, // so we do not do that here. prepareOperationTimeout(token, TIMEOUT_RESTORE_INTERVAL, this); mAgent.doRestore(mBackupData, appVersionCode, mNewState, token, mBackupManagerBinder); } catch (Exception e) { Slog.e(TAG, "Unable to call app for restore: " + packageName, e); EventLog.writeEvent(EventLogTags.RESTORE_AGENT_FAILURE, packageName, e.toString()); keyValueAgentErrorCleanup(); // clears any pending timeout messages as well // After a restore failure we go back to running the queue. If there // are no more packages to be restored that will be handled by the // next step. executeNextState(UnifiedRestoreState.RUNNING_QUEUE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: initiateOneRestore File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
initiateOneRestore
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
private <T extends AnnotatedMember> T _fixAccess(T member) { if (member != null && _canFixAccess) { ClassUtil.checkAndFixAccess((Member) member.getAnnotated(), _forceAccess); } return member; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _fixAccess File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_fixAccess
src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public void setRows(int rows) { setIntValue("rows", rows); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRows File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-41046
MEDIUM
6.3
xwiki/xwiki-platform
setRows
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/objects/classes/TextAreaClass.java
edc52579eeaab1b4514785c134044671a1ecd839
0
Analyze the following code function for security vulnerabilities
public static Class<?> findCollectionFallback(JavaType type) { return _collectionFallbacks.get(type.getRawClass().getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findCollectionFallback File: src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java Repository: FasterXML/jackson-databind The code follows secure coding practices.
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
findCollectionFallback
src/main/java/com/fasterxml/jackson/databind/deser/BasicDeserializerFactory.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
0
Analyze the following code function for security vulnerabilities
public String buildAjaxResultContainer(String title) { StringBuffer html = new StringBuffer(512); html.append(dialogBlockStart(title)); html.append(dialogWhiteBoxStart()); html.append("<div id='ajaxreport' >"); html.append(buildAjaxWaitMessage()); html.append("</div>\n"); html.append(dialogWhiteBoxEnd()); html.append(dialogBlockEnd()); html.append("&nbsp;<br>\n"); return html.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: buildAjaxResultContainer File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
buildAjaxResultContainer
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
static Certificate[] verifyBytes(byte[] blockBytes, byte[] sfBytes) throws GeneralSecurityException { Object obj = null; try { obj = Providers.startJarVerification(); PKCS7 block = new PKCS7(blockBytes); SignerInfo[] verifiedSignerInfos = block.verify(sfBytes); if ((verifiedSignerInfos == null) || (verifiedSignerInfos.length == 0)) { throw new GeneralSecurityException( "Failed to verify signature: no verified SignerInfos"); } // Ignore any SignerInfo other than the first one, to be compatible with older Android // platforms which have been doing this for years. See // libcore/luni/src/main/java/org/apache/harmony/security/utils/JarUtils.java // verifySignature method of older platforms. SignerInfo verifiedSignerInfo = verifiedSignerInfos[0]; List<X509Certificate> verifiedSignerCertChain = verifiedSignerInfo.getCertificateChain(block); if (verifiedSignerCertChain == null) { // Should never happen throw new GeneralSecurityException( "Failed to find verified SignerInfo certificate chain"); } else if (verifiedSignerCertChain.isEmpty()) { // Should never happen throw new GeneralSecurityException( "Verified SignerInfo certificate chain is emtpy"); } return verifiedSignerCertChain.toArray( new X509Certificate[verifiedSignerCertChain.size()]); } catch (IOException e) { throw new GeneralSecurityException("IO exception verifying jar cert", e); } finally { Providers.stopJarVerification(obj); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyBytes File: core/java/android/util/jar/StrictJarVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
verifyBytes
core/java/android/util/jar/StrictJarVerifier.java
84df68840b6f2407146e722ebd95a7d8bc6e3529
0
Analyze the following code function for security vulnerabilities
Endpoint getEndpoint() { return endpoint; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getEndpoint File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getEndpoint
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
@Override public Iterable<File> successors(File file) { // check isDirectory() just because it may be faster than listFiles() on a non-directory if (file.isDirectory()) { File[] files = file.listFiles(); if (files != null) { return Collections.unmodifiableList(Arrays.asList(files)); } } return ImmutableList.of(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: successors File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
successors
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
private static Optional<Method> findMethod(Component instance, Class<?> clazz, String methodName) { List<Method> methods = Stream.of(clazz.getDeclaredMethods()) .filter(method -> methodName.equals(method.getName())) .filter(method -> hasMethodAnnotation(method)) .collect(Collectors.toList()); if (methods.size() > 1) { String msg = String.format("Class '%s' contains " + "several event handler method with the same name '%s'", instance.getClass().getName(), methodName); getLogger().error(msg); throw new IllegalStateException( "Method conflict in event handler with multiple methods with same name."); } else if (methods.size() == 1) { return Optional.of(methods.get(0)); } else if (!Component.class.equals(clazz)) { return findMethod(instance, clazz.getSuperclass(), methodName); } else { return Optional.empty(); } }
Vulnerability Classification: - CWE: CWE-200 - CVE: CVE-2023-25500 - Severity: MEDIUM - CVSS Score: 4.3 Description: Update messages to point to logs. Start both error and log with same string. Function: findMethod File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java Repository: vaadin/flow Fixed Code: private static Optional<Method> findMethod(Component instance, Class<?> clazz, String methodName) { List<Method> methods = Stream.of(clazz.getDeclaredMethods()) .filter(method -> methodName.equals(method.getName())) .filter(method -> hasMethodAnnotation(method)) .collect(Collectors.toList()); if (methods.size() > 1) { getLogger().error(String.format( "Method conflict in event handler. Class '%s' contains " + "several event handler methods with the same name '%s'", instance.getClass().getName(), methodName)); throw new IllegalStateException( "Method conflict in event handler with multiple methods with same name. See server log for more details."); } else if (methods.size() == 1) { return Optional.of(methods.get(0)); } else if (!Component.class.equals(clazz)) { return findMethod(instance, clazz.getSuperclass(), methodName); } else { return Optional.empty(); } }
[ "CWE-200" ]
CVE-2023-25500
MEDIUM
4.3
vaadin/flow
findMethod
flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
e13da1c685fa1b5fdd74774813a028748bc4b62b
1
Analyze the following code function for security vulnerabilities
@TestOnly public void fetchAndResetToHead(ConsoleOutputStreamConsumer outputStreamConsumer, boolean shallow) { fetch(outputStreamConsumer); resetWorkingDir(outputStreamConsumer, new StringRevision(remoteBranch()), shallow); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fetchAndResetToHead File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
fetchAndResetToHead
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public int setSocketOpt(int optionName, byte [] optionVal, int optionLen) throws IOException { int ret = 0; if (mSocketState == SocketState.CLOSED) throw new IOException("socket closed"); IBluetooth bluetoothProxy = BluetoothAdapter.getDefaultAdapter().getBluetoothService(null); if (bluetoothProxy == null) { Log.e(TAG, "setSocketOpt fail, reason: bluetooth is off"); return -1; } try { if(VDBG) Log.d(TAG, "setSocketOpt(), mType: " + mType + " mPort: " + mPort); ret = bluetoothProxy.setSocketOpt(mType, mPort, optionName, optionVal, optionLen); } catch (RemoteException e) { Log.e(TAG, Log.getStackTraceString(new Throwable())); return -1; } return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSocketOpt File: core/java/android/bluetooth/BluetoothSocket.java Repository: Genymobile/f2ut_platform_frameworks_base The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-9908
LOW
3.3
Genymobile/f2ut_platform_frameworks_base
setSocketOpt
core/java/android/bluetooth/BluetoothSocket.java
f24cec326f5f65c693544fb0b92c37f633bacda2
0
Analyze the following code function for security vulnerabilities
public void delete(String id) { //及连删除外键表 this.preDelete(id); testPlanScenarioCaseService.deleteByScenarioId(id); apiScenarioMapper.deleteByPrimaryKey(id); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
delete
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
public void setPassword(char[] password) { this.password = password; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPassword File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
setPassword
src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
public void removeColumnVisibilityChangeListener( ColumnVisibilityChangeListener listener) { removeListener(ColumnVisibilityChangeEvent.class, listener, COLUMN_VISIBILITY_METHOD); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeColumnVisibilityChangeListener File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
removeColumnVisibilityChangeListener
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Override public void updateTopComponentForFactoryTest() { synchronized (mGlobalLock) { if (mFactoryTest != FACTORY_TEST_LOW_LEVEL) { return; } final ResolveInfo ri = mContext.getPackageManager() .resolveActivity(new Intent(Intent.ACTION_FACTORY_TEST), STOCK_PM_FLAGS); final CharSequence errorMsg; if (ri != null) { final ActivityInfo ai = ri.activityInfo; final ApplicationInfo app = ai.applicationInfo; if ((app.flags & ApplicationInfo.FLAG_SYSTEM) != 0) { mTopAction = Intent.ACTION_FACTORY_TEST; mTopData = null; mTopComponent = new ComponentName(app.packageName, ai.name); errorMsg = null; } else { errorMsg = mContext.getResources().getText( com.android.internal.R.string.factorytest_not_system); } } else { errorMsg = mContext.getResources().getText( com.android.internal.R.string.factorytest_no_action); } if (errorMsg == null) { return; } mTopAction = null; mTopData = null; mTopComponent = null; mUiHandler.post(() -> { Dialog d = new FactoryErrorDialog(mUiContext, errorMsg); d.show(); mAmInternal.ensureBootCompleted(); }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateTopComponentForFactoryTest File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
updateTopComponentForFactoryTest
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public void write(final ObjectDataOutput out, final Class obj) throws IOException { out.writeUTF(obj.getName()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: write File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
write
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/JavaDefaultSerializers.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@NonNull private RemoteViews makeMessagingView(int viewType) { boolean isCollapsed = viewType != StandardTemplateParams.VIEW_TYPE_BIG; boolean hideRightIcons = viewType != StandardTemplateParams.VIEW_TYPE_NORMAL; boolean isConversationLayout = mConversationType != CONVERSATION_TYPE_LEGACY; boolean isImportantConversation = mConversationType == CONVERSATION_TYPE_IMPORTANT; boolean isHeaderless = !isConversationLayout && isCollapsed; CharSequence conversationTitle = !TextUtils.isEmpty(super.mBigContentTitle) ? super.mBigContentTitle : mConversationTitle; boolean atLeastP = mBuilder.mContext.getApplicationInfo().targetSdkVersion >= Build.VERSION_CODES.P; boolean isOneToOne; CharSequence nameReplacement = null; if (!atLeastP) { isOneToOne = TextUtils.isEmpty(conversationTitle); if (hasOnlyWhiteSpaceSenders()) { isOneToOne = true; nameReplacement = conversationTitle; conversationTitle = null; } } else { isOneToOne = !isGroupConversation(); } if (isHeaderless && isOneToOne && TextUtils.isEmpty(conversationTitle)) { conversationTitle = getOtherPersonName(); } Icon largeIcon = mBuilder.mN.mLargeIcon; TemplateBindResult bindResult = new TemplateBindResult(); StandardTemplateParams p = mBuilder.mParams.reset() .viewType(viewType) .highlightExpander(isConversationLayout) .hideProgress(true) .title(isHeaderless ? conversationTitle : null) .text(null) .hideLeftIcon(isOneToOne) .hideRightIcon(hideRightIcons || isOneToOne) .headerTextSecondary(isHeaderless ? null : conversationTitle); RemoteViews contentView = mBuilder.applyStandardTemplateWithActions( isConversationLayout ? mBuilder.getConversationLayoutResource() : isCollapsed ? mBuilder.getMessagingLayoutResource() : mBuilder.getBigMessagingLayoutResource(), p, bindResult); if (isConversationLayout) { mBuilder.setTextViewColorPrimary(contentView, R.id.conversation_text, p); mBuilder.setTextViewColorSecondary(contentView, R.id.app_name_divider, p); } addExtras(mBuilder.mN.extras); contentView.setInt(R.id.status_bar_latest_event_content, "setLayoutColor", mBuilder.getSmallIconColor(p)); contentView.setInt(R.id.status_bar_latest_event_content, "setSenderTextColor", mBuilder.getPrimaryTextColor(p)); contentView.setInt(R.id.status_bar_latest_event_content, "setMessageTextColor", mBuilder.getSecondaryTextColor(p)); contentView.setInt(R.id.status_bar_latest_event_content, "setNotificationBackgroundColor", mBuilder.getBackgroundColor(p)); contentView.setBoolean(R.id.status_bar_latest_event_content, "setIsCollapsed", isCollapsed); contentView.setIcon(R.id.status_bar_latest_event_content, "setAvatarReplacement", mBuilder.mN.mLargeIcon); contentView.setCharSequence(R.id.status_bar_latest_event_content, "setNameReplacement", nameReplacement); contentView.setBoolean(R.id.status_bar_latest_event_content, "setIsOneToOne", isOneToOne); contentView.setCharSequence(R.id.status_bar_latest_event_content, "setConversationTitle", conversationTitle); if (isConversationLayout) { contentView.setIcon(R.id.status_bar_latest_event_content, "setShortcutIcon", mShortcutIcon); contentView.setBoolean(R.id.status_bar_latest_event_content, "setIsImportantConversation", isImportantConversation); } if (isHeaderless) { // Collapsed legacy messaging style has a 1-line limit. contentView.setInt(R.id.notification_messaging, "setMaxDisplayedLines", 1); } contentView.setIcon(R.id.status_bar_latest_event_content, "setLargeIcon", largeIcon); contentView.setBundle(R.id.status_bar_latest_event_content, "setData", mBuilder.mN.extras); return contentView; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeMessagingView File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
makeMessagingView
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public synchronized void save() { if(BulkChange.contains(this)) return; try { getConfigFile().write(this); SaveableListener.fireOnChange(this, getConfigFile()); } catch (IOException e) { LOGGER.log(Level.WARNING, "Failed to save "+getConfigFile(),e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: save File: core/src/main/java/hudson/model/Descriptor.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
save
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
static public void noteWakeupAlarm(PendingIntent ps, int sourceUid, String sourcePkg, String tag) { try { getDefault().noteWakeupAlarm(ps.getTarget(), sourceUid, sourcePkg, tag); } catch (RemoteException ex) { } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: noteWakeupAlarm File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
noteWakeupAlarm
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private final void moveTaskBackwardsLocked(int task) { Slog.e(TAG, "moveTaskBackwards not yet implemented!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTaskBackwardsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
moveTaskBackwardsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static String getPayloadOneLineString(final IBaseDataObject payload) { final StringBuilder sb = new StringBuilder(); final String fn = payload.getFilename(); final int attPos = fn.indexOf(emissary.core.Family.SEP); if (attPos != -1) { sb.append(fn.substring(attPos + 1)).append(" "); } final List<String> th = payload.transformHistory(); String prev = ""; for (final String h : th) { final int pos = h.indexOf("."); if (pos > 0) { final String prefix = h.substring(0, pos); if (!prev.equals(prefix)) { if (prev.length() != 0) { sb.append(","); } sb.append(prefix); prev = prefix; } } } sb.append(">>").append(payload.getAllCurrentForms()); sb.append("//").append(payload.getFileType()); sb.append("//").append(payload.getCreationTimestamp()); return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPayloadOneLineString File: src/main/java/emissary/util/PayloadUtil.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
getPayloadOneLineString
src/main/java/emissary/util/PayloadUtil.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public void setDateHeader(String name, long date) { setHeader(name, formatHeaderDate(new Date(date))); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDateHeader File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
setDateHeader
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
private void ensureCorrectTheme(Intent data) { String oldListLayout = data.getStringExtra(SettingsActivity.SP_FEED_LIST_LAYOUT); String newListLayout = mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT,"0"); if (ThemeChooser.themeRequiresRestartOfUI() || !newListLayout.equals(oldListLayout)) { NewsReaderListActivity.this.recreate(); } else if (data.hasExtra(SettingsActivity.CACHE_CLEARED)) { resetUiAndStartSync(); } }
Vulnerability Classification: - CWE: CWE-829 - CVE: CVE-2021-41256 - Severity: MEDIUM - CVSS Score: 5.8 Description: fix GHSL-2021-1033 Signed-off-by: David Luhmer <david-dev@live.de> Function: ensureCorrectTheme File: News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java Repository: nextcloud/news-android Fixed Code: private void ensureCorrectTheme(Intent data) { String oldListLayout = data.getStringExtra(SettingsActivity.AI_FEED_LIST_LAYOUT); String newListLayout = mPrefs.getString(SettingsActivity.SP_FEED_LIST_LAYOUT, "0"); if (ThemeChooser.themeRequiresRestartOfUI() || !newListLayout.equals(oldListLayout)) { NewsReaderListActivity.this.recreate(); } else if (data.hasExtra(SettingsActivity.CACHE_CLEARED)) { resetUiAndStartSync(); } }
[ "CWE-829" ]
CVE-2021-41256
MEDIUM
5.8
nextcloud/news-android
ensureCorrectTheme
News-Android-App/src/main/java/de/luhmer/owncloudnewsreader/NewsReaderListActivity.java
05449cb666059af7de2302df9d5c02997a23df85
1
Analyze the following code function for security vulnerabilities
@Override public void checkExit(int status) { try { if (enterPublicInterface()) return; if (Thread.currentThread() == SecurityConstants.MAIN_THREAD && getNonWhitelistedStackFrames().isEmpty()) { // always allow maven to exit return; } throw new SecurityException(localized("security.error_system_exit")); //$NON-NLS-1$ } finally { exitPublicInterface(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkExit File: src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java Repository: ls1intum/Ares The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2024-23683
HIGH
8.2
ls1intum/Ares
checkExit
src/main/java/de/tum/in/test/api/security/ArtemisSecurityManager.java
af4f28a56e2fe600d8750b3b415352a0a3217392
0
Analyze the following code function for security vulnerabilities
public boolean hasMessage(String messageId) { return this.keyToBundleMap.containsKey(messageId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasMessage File: java/code/src/com/redhat/rhn/common/localization/LocalizationService.java Repository: spacewalkproject/spacewalk The code follows secure coding practices.
[ "CWE-79" ]
CVE-2016-3079
MEDIUM
4.3
spacewalkproject/spacewalk
hasMessage
java/code/src/com/redhat/rhn/common/localization/LocalizationService.java
7b9ff9ad
0
Analyze the following code function for security vulnerabilities
@Override public MergeTarget newMergeTargetForField( Descriptors.FieldDescriptor descriptor, Message defaultInstance) { throw new UnsupportedOperationException("newMergeTargetForField() called on FieldSet object"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newMergeTargetForField File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
newMergeTargetForField
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
@Nullable public String getIdAttribute() { final int id = nativeGetIdAttribute(mParseState); if (id == ERROR_NULL_DOCUMENT) { throw new NullPointerException("Null document"); } return id >= 0 ? getSequenceString(mStrings.getSequence(id)) : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIdAttribute File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getIdAttribute
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isToolbarEnabled() { return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isToolbarEnabled File: src/com/android/settings/password/ChooseLockPassword.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
isToolbarEnabled
src/com/android/settings/password/ChooseLockPassword.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
@Override public Set<? extends LocallyAvailableResource> search(String pattern) { if (!getBaseDir().exists()) { return Collections.emptySet(); } final Set<LocallyAvailableResource> entries = new HashSet<LocallyAvailableResource>(); findFiles(pattern).visit(new EmptyFileVisitor() { @Override public void visitFile(FileVisitDetails fileDetails) { final File file = fileDetails.getFile(); // We cannot clean in progress markers, or in progress files here because // the file system visitor stuff can't handle the file system mutating while visiting if (!isInProgressMarkerFile(file) && !isInProgressFile(file)) { entries.add(entryAt(file)); } } }); return entries; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: search File: subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java Repository: gradle The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35946
MEDIUM
5.5
gradle
search
subprojects/core/src/main/java/org/gradle/internal/resource/local/DefaultPathKeyFileStore.java
859eae2b2acf751ae7db3c9ffefe275aa5da0d5d
0
Analyze the following code function for security vulnerabilities
private boolean loadFromUserStoreAfterUnlockOrSwitch(int userId) { try { List<WifiConfigStore.StoreFile> userStoreFiles = WifiConfigStore.createUserFiles( userId, mFrameworkFacade.isNiapModeOn(mContext)); if (userStoreFiles == null) { Log.e(TAG, "Failed to create user store files"); return false; } mWifiConfigStore.switchUserStoresAndRead(userStoreFiles); } catch (IOException | IllegalStateException e) { Log.wtf(TAG, "Reading from new store failed. All saved private networks are lost!", e); return handleConfigStoreFailure(true); } catch (XmlPullParserException e) { Log.wtf(TAG, "XML deserialization of store failed. All saved private networks are " + "lost!", e); return handleConfigStoreFailure(true); } loadInternalDataFromUserStore(mNetworkListUserStoreData.getConfigurations()); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadFromUserStoreAfterUnlockOrSwitch File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
loadFromUserStoreAfterUnlockOrSwitch
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public static String escape(String s) { return Util.escape(s); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escape File: core/src/main/java/hudson/Functions.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-310" ]
CVE-2014-2061
MEDIUM
5
jenkinsci/jenkins
escape
core/src/main/java/hudson/Functions.java
bf539198564a1108b7b71a973bf7de963a6213ef
0
Analyze the following code function for security vulnerabilities
@Override public int getGameAction(int keyCode) { switch (keyCode) { case DROID_IMPL_KEY_DOWN: return Display.GAME_DOWN; case DROID_IMPL_KEY_UP: return Display.GAME_UP; case DROID_IMPL_KEY_LEFT: return Display.GAME_LEFT; case DROID_IMPL_KEY_RIGHT: return Display.GAME_RIGHT; case DROID_IMPL_KEY_FIRE: return Display.GAME_FIRE; default: return 0; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGameAction File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
getGameAction
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private Provider<DocumentReference> getDefaultDocumentReferenceProvider() { if (this.defaultDocumentReferenceProvider == null) { this.defaultDocumentReferenceProvider = Utils.getComponent(DocumentReference.TYPE_PROVIDER); } return this.defaultDocumentReferenceProvider; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDocumentReferenceProvider File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getDefaultDocumentReferenceProvider
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public void clearAccounts(String packageName) { synchronized (mLock) { try { Log.startSession("TSI.cA"); enforcePhoneAccountModificationForPackage(packageName); mPhoneAccountRegistrar .clearAccounts(packageName, Binder.getCallingUserHandle()); } catch (Exception e) { Log.e(this, e, "clearAccounts %s", packageName); throw e; } finally { Log.endSession(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearAccounts File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
clearAccounts
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
public void addResourceProvider(String key, ResourceProvider provider) { if (resourceProviders == null) { resourceProviders = new LinkedHashMap<String, ResourceProvider>(); } boolean addedInDevMode = UiFrameworkUtil.checkAndSetDevelopmentModeForProvider(key, provider); if (addedInDevMode) { resourceProvidersInDevelopmentMode.add(key); } resourceProviders.put(key, provider); }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-24621 - Severity: MEDIUM - CVSS Score: 6.5 Description: UIFR-215: Do not allow loading arbitrary files Function: addResourceProvider File: api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java Repository: openmrs/openmrs-module-uiframework Fixed Code: public void addResourceProvider(String key, ResourceProvider provider) { if (resourceProviders == null) { resourceProviders = new LinkedHashMap<String, ResourceProvider>(); } boolean addedInDevMode = UiFrameworkUtil.checkAndSetDevelopmentModeForProvider(key, provider); if (addedInDevMode) { resourceProvidersInDevelopmentMode.add(key); } resourceProviders.put(key, provider); }
[ "CWE-22" ]
CVE-2020-24621
MEDIUM
6.5
openmrs/openmrs-module-uiframework
addResourceProvider
api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java
0422fa52c7eba3d96cce2936cb92897dca4b680a
1
Analyze the following code function for security vulnerabilities
public List<File> getImageFiles(String input) { List<File> files = new ArrayList<>(); String regex = "(\\!\\[.*?\\]\\((.*?)\\))"; Pattern pattern = Pattern.compile(regex); if (StringUtils.isBlank(input)) { return new ArrayList<>(); } Matcher matcher = pattern.matcher(input); while (matcher.find()) { try { String path = matcher.group(2); if (!path.contains("/resource/md/get/url")) { if (path.contains("/resource/md/get/")) { // 兼容旧数据 String name = path.substring(path.indexOf("/resource/md/get/") + 17); files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + name)); } else if (path.contains("/resource/md/get")) { // 新数据走这里 String name = path.substring(path.indexOf("/resource/md/get") + 26); files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + URLDecoder.decode(name, StandardCharsets.UTF_8.name()))); } } } catch (Exception e) { LogUtil.error(e.getMessage(), e); } } return files; }
Vulnerability Classification: - CWE: CWE-918 - CVE: CVE-2022-23544 - Severity: MEDIUM - CVSS Score: 6.1 Description: fix(测试跟踪): 缺陷平台请求转发添加白名单 Function: getImageFiles File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere Fixed Code: public List<File> getImageFiles(String input) { List<File> files = new ArrayList<>(); String regex = "(\\!\\[.*?\\]\\((.*?)\\))"; Pattern pattern = Pattern.compile(regex); if (StringUtils.isBlank(input)) { return new ArrayList<>(); } Matcher matcher = pattern.matcher(input); while (matcher.find()) { try { String path = matcher.group(2); if (!path.contains("/resource/md/get/url") && !path.contains("/resource/md/get/path")) { if (path.contains("/resource/md/get/")) { // 兼容旧数据 String name = path.substring(path.indexOf("/resource/md/get/") + 17); files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + name)); } else if (path.contains("/resource/md/get")) { // 新数据走这里 String name = path.substring(path.indexOf("/resource/md/get") + 26); files.add(new File(FileUtils.MD_IMAGE_DIR + "/" + URLDecoder.decode(name, StandardCharsets.UTF_8.name()))); } } } catch (Exception e) { LogUtil.error(e.getMessage(), e); } } return files; }
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getImageFiles
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
1
Analyze the following code function for security vulnerabilities
@Override void cancelAnimation() { super.cancelAnimation(); clearThumbnail(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cancelAnimation File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
cancelAnimation
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
public void activityStopped(IBinder token, Bundle state, PersistableBundle persistentState, CharSequence description) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); data.writeBundle(state); data.writePersistableBundle(persistentState); TextUtils.writeToParcel(description, data, 0); mRemote.transact(ACTIVITY_STOPPED_TRANSACTION, data, reply, IBinder.FLAG_ONEWAY); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityStopped File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
activityStopped
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
private List<ValidationError> getFieldErrorsAsValidationErrors(Lang lang, BindingResult result) { return result.getFieldErrors().stream() .map( error -> { String key = error.getObjectName() + "." + error.getField(); if (key.startsWith("target.") && rootName == null) { key = key.substring(7); } if (error.isBindingFailure()) { ImmutableList.Builder<String> builder = ImmutableList.builder(); final Messages msgs = lang != null ? new MessagesImpl(lang, this.messagesApi) : null; for (String code : error.getCodes()) { code = REPLACE_TYPEMISMATCH .matcher(code) .replaceAll(Matcher.quoteReplacement(INVALID_MSG_KEY)); if (msgs == null || msgs.isDefinedAt(code)) { builder.add(code); } } final ImmutableList<String> messages = builder.build(); return new ValidationError( key, messages.isEmpty() ? Arrays.asList(INVALID_MSG_KEY) : messages.reverse(), convertErrorArguments(error.getArguments())); } else { return new ValidationError( key, error.getDefaultMessage(), convertErrorArguments(error.getArguments())); } }) .collect(Collectors.toList()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFieldErrorsAsValidationErrors File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
getFieldErrorsAsValidationErrors
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
protected void overrideByteOrder() { String byteOrderOverride = System.getProperty(BYTE_ORDER_OVERRIDE_PROPERTY); if (StringUtil.isNullOrEmpty(byteOrderOverride)) { return; } if (BIG_ENDIAN.toString().equals(byteOrderOverride)) { byteOrder = BIG_ENDIAN; } else if (LITTLE_ENDIAN.toString().equals(byteOrderOverride)) { byteOrder = LITTLE_ENDIAN; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: overrideByteOrder File: hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
overrideByteOrder
hazelcast/src/main/java/com/hazelcast/internal/serialization/impl/DefaultSerializationServiceBuilder.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
@Override public void updateAppWidgetOptions(String callingPackage, int appWidgetId, Bundle options) { final int userId = UserHandle.getCallingUserId(); if (DEBUG) { Slog.i(TAG, "updateAppWidgetOptions() " + userId); } // Make sure the package runs under the caller uid. mSecurityPolicy.enforceCallFromPackage(callingPackage); synchronized (mLock) { ensureGroupStateLoadedLocked(userId); // NOTE: The lookup is enforcing security across users by making // sure the caller can only access widgets it hosts or provides. Widget widget = lookupWidgetLocked(appWidgetId, Binder.getCallingUid(), callingPackage); if (widget == null) { return; } // Merge the options. widget.options.putAll(options); // Send the broacast to notify the provider that options changed. sendOptionsChangedIntentLocked(widget); saveGroupStateAsync(userId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAppWidgetOptions File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
updateAppWidgetOptions
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
Configuration[] getSizeAndUiModeConfigurations() { synchronized (this) { ensureValidLocked(); return nativeGetSizeAndUiModeConfigurations(mObject); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSizeAndUiModeConfigurations File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getSizeAndUiModeConfigurations
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
protected abstract void connectInternal() throws SmackException, IOException, XMPPException, InterruptedException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectInternal File: smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java Repository: igniterealtime/Smack The code follows secure coding practices.
[ "CWE-362" ]
CVE-2016-10027
MEDIUM
4.3
igniterealtime/Smack
connectInternal
smack-core/src/main/java/org/jivesoftware/smack/AbstractXMPPConnection.java
a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
0
Analyze the following code function for security vulnerabilities
public boolean isUserInGroup(String groupName) { boolean result = false; try { if (this.user == null) { LOGGER.warn("User considered not part of group [{}] since user is null", groupName); } else { result = this.user.isUserInGroup(groupName, getXWikiContext()); } } catch (Exception ex) { LOGGER.warn(new MessageFormat("Unhandled exception while checking if user {0}" + " belongs to group {1}").format(new java.lang.Object[] { this.user, groupName }), ex); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUserInGroup File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-41929
MEDIUM
4.9
xwiki/xwiki-platform
isUserInGroup
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/User.java
0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd
0
Analyze the following code function for security vulnerabilities
@Beta public static boolean equal(File file1, File file2) throws IOException { checkNotNull(file1); checkNotNull(file2); if (file1 == file2 || file1.equals(file2)) { return true; } /* * Some operating systems may return zero as the length for files denoting system-dependent * entities such as devices or pipes, in which case we must fall back on comparing the bytes * directly. */ long len1 = file1.length(); long len2 = file2.length(); if (len1 != 0 && len2 != 0 && len1 != len2) { return false; } return asByteSource(file1).contentEquals(asByteSource(file2)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equal File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
equal
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
@Override public boolean isValid(Integer value, ConstraintValidatorContext context) { if (proxyManager.get(value) != null) { return true; } String errorMessage = String.format("No proxy server found for specified port %d", value); LOG.warn(errorMessage); context.buildConstraintViolationWithTemplate(errorMessage).addPropertyNode(PARAM_NAME).addConstraintViolation(); return false; }
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2020-26282 - Severity: HIGH - CVSS Score: 7.5 Description: Fix Critical Java EL Injection RCE vulnerability from GHSL-2020-213 Function: isValid File: browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java Repository: browserup/browserup-proxy Fixed Code: @Override public boolean isValid(Integer value, ConstraintValidatorContext context) { if (proxyManager.get(value) != null) { return true; } String escapedValue = MessageSanitizer.escape(value.toString()); String errorMessage = String.format("No proxy server found for specified port %s", escapedValue); LOG.warn(errorMessage); context.buildConstraintViolationWithTemplate(errorMessage).addPropertyNode(PARAM_NAME).addConstraintViolation(); return false; }
[ "CWE-74" ]
CVE-2020-26282
HIGH
7.5
browserup/browserup-proxy
isValid
browserup-proxy-rest/src/main/java/com/browserup/bup/rest/validation/PortWithExistingProxyConstraint.java
4b38e7a3e20917e5c3329d0d4e9590bed9d578ab
1
Analyze the following code function for security vulnerabilities
private ActivityInfo resolveActivityInfo(Intent intent, int flags, int userId) { ActivityInfo ai = null; ComponentName comp = intent.getComponent(); try { if (comp != null) { ai = AppGlobals.getPackageManager().getActivityInfo(comp, flags, userId); } else { ResolveInfo info = AppGlobals.getPackageManager().resolveIntent( intent, intent.resolveTypeIfNeeded(mContext.getContentResolver()), flags, userId); if (info != null) { ai = info.activityInfo; } } } catch (RemoteException e) { // ignore } return ai; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveActivityInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
resolveActivityInfo
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void setSecureSetting(@NonNull ComponentName admin, String setting, String value) { throwIfParentInstance("setSecureSetting"); if (mService != null) { try { mService.setSecureSetting(admin, setting, value); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSecureSetting File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setSecureSetting
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public int sendIntentSender(IIntentSender target, IBinder allowlistToken, int code, Intent intent, String resolvedType, IIntentReceiver finishedReceiver, String requiredPermission, Bundle options) { return ActivityManagerService.this.sendIntentSender(target, allowlistToken, code, intent, resolvedType, finishedReceiver, requiredPermission, options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
sendIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
CrossProfileApps getCrossProfileApps() { return mContext.getSystemService(CrossProfileApps.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCrossProfileApps File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getCrossProfileApps
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Pure public float getFloat(String columnName) throws SQLException { return getFloat(findColumn(columnName)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFloat File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
getFloat
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public static Property<?> createProperty(String pName, Object value) { Util.assertHasLength(pName); Util.assertNotNull(value); if (validPropertyPrimitives.containsKey(value.getClass())) { return PropertyFactory.createProperty(pName, validPropertyPrimitives.get(value.getClass()).getName(), String.valueOf(value), null, null); } if (value instanceof Date) { return PropertyFactory.createProperty(pName, PropertyDate.class.getName(), PropertyDate.SDF.format(value), null, null); } if (value instanceof Calendar) { Date valueDate = ((Calendar) value).getTime(); return PropertyFactory.createProperty(pName, PropertyCalendar.class.getName(), PropertyCalendar.SDF.format(valueDate), null, null); } if (value instanceof Property<?>) { return (Property<?>) value; } // String Value if (value.getClass().isArray() || Util.isCollection(value)) { return PropertyFactory.createProperty(pName, PropertyString.class.getName(), Util.join(Util.asCollection(value), ","), null, null); } throw new IllegalArgumentException("Cannot create property with input type " + value.getClass() + value.toString()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createProperty File: ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java Repository: ff4j The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-44262
CRITICAL
9.8
ff4j
createProperty
ff4j-core/src/main/java/org/ff4j/property/util/PropertyFactory.java
481ca723a57f87eca931196ec9a772967ab70b3b
0
Analyze the following code function for security vulnerabilities
private void handleSAML2UnsolicitedResponse(Request request, Response response) throws ServletException { SAML2Request samlRequest = new SAML2Request(); String id = IDGenerator.create("ID_"); String assertionConsumerURL = request.getParameter(JBossSAMLConstants.UNSOLICITED_RESPONSE_TARGET.get()); try { AuthnRequestType authn = samlRequest .createAuthnRequestType(id, assertionConsumerURL, getIdentityURL(), assertionConsumerURL); String requestedBinding = request.getParameter(JBossSAMLConstants.UNSOLICITED_RESPONSE_SAML_BINDING.get()); if ("POST".equalsIgnoreCase(requestedBinding)) { authn.setProtocolBinding(URI.create(JBossSAMLURIConstants.SAML_HTTP_POST_BINDING.get())); request.setMethod("POST"); } else { authn.setProtocolBinding(URI.create(JBossSAMLURIConstants.SAML_HTTP_REDIRECT_BINDING.get())); } authn.setUnsolicitedResponse(true); processSAMLRequestMessage(request, response, authn, true); } catch (Exception e) { throw new ServletException("Could not handle SAML 2.0 Unsolicited Response.", e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSAML2UnsolicitedResponse File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
handleSAML2UnsolicitedResponse
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
private void scanUntilEndTag(final String tagName) throws IOException { final XMLStringBuffer buffer = new XMLStringBuffer(); final String end = "/" + tagName; final int lengthToScan = tagName.length() + 2; while (true) { int c = fCurrentEntity.read(); if (c == -1) { break; } if (c == '<') { final String next = nextContent(lengthToScan) + " "; if (next.length() >= lengthToScan && end.equalsIgnoreCase(next.substring(0, end.length())) && ('>' == next.charAt(lengthToScan - 1) || Character.isWhitespace(next.charAt(lengthToScan - 1)))) { fCurrentEntity.rewind(); break; } } if (c == '\r' || c == '\n') { fCurrentEntity.rewind(); int newlines = skipNewlines(); for (int i = 0; i < newlines; i++) { buffer.append('\n'); } } else { appendChar(buffer, c); } } if (buffer.length > 0 && fDocumentHandler != null) { fEndLineNumber = fCurrentEntity.getLineNumber(); fEndColumnNumber = fCurrentEntity.getColumnNumber(); fEndCharacterOffset = fCurrentEntity.getCharacterOffset(); fDocumentHandler.characters(buffer, locationAugs()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scanUntilEndTag File: src/org/cyberneko/html/HTMLScanner.java Repository: sparklemotion/nekohtml The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-24839
MEDIUM
5
sparklemotion/nekohtml
scanUntilEndTag
src/org/cyberneko/html/HTMLScanner.java
a800fce3b079def130ed42a408ff1d09f89e773d
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return Objects.hash(host, port, protocol, credentials, options, tags, cluster, replicaNum, shardNum, shardWeight, weight); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java Repository: ClickHouse/clickhouse-java The code follows secure coding practices.
[ "CWE-209" ]
CVE-2024-23689
HIGH
8.8
ClickHouse/clickhouse-java
hashCode
clickhouse-client/src/main/java/com/clickhouse/client/ClickHouseNode.java
4f8d9303eb991b39ec7e7e34825241efa082238a
0
Analyze the following code function for security vulnerabilities
public static VFSContainer getAllSubdirs(VFSContainer base, String subDirPath, Identity identity, boolean create) { StringTokenizer st; if (subDirPath.indexOf('/') != -1) { st = new StringTokenizer(subDirPath, "/", false); } else { // try it windows style, backslash is also valid format st = new StringTokenizer(subDirPath, "\\", false); } VFSRepositoryService vfsRepositoryService = CoreSpringFactory.getImpl(VFSRepositoryService.class); VFSContainer currentPath = base; while (st.hasMoreTokens()) { String nextSubpath = st.nextToken(); VFSItem vfsSubpath = currentPath.resolve(nextSubpath); if (vfsSubpath == null && !create) { return null; } if (vfsSubpath == null || (vfsSubpath instanceof VFSLeaf)) { vfsSubpath = currentPath.createChildContainer(nextSubpath); if (vfsSubpath == null) return null; if (identity != null && vfsSubpath.canMeta() == VFSConstants.YES) { VFSMetadata info = vfsSubpath.getMetaInfo(); if(info != null) { info.setAuthor(identity); vfsRepositoryService.updateMetadata(info); } } } currentPath = (VFSContainer)vfsSubpath; } return currentPath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllSubdirs File: src/main/java/org/olat/core/util/ZipUtil.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
getAllSubdirs
src/main/java/org/olat/core/util/ZipUtil.java
5668a41ab3f1753102a89757be013487544279d5
0
Analyze the following code function for security vulnerabilities
@Override protected boolean recordLogRec(Message msg) { switch (msg.what) { case CMD_RSSI_POLL: return mVerboseLoggingEnabled; default: return true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: recordLogRec File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
recordLogRec
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
@Override public boolean requestPinAppWidget(@NonNull String callingPackage, @NonNull AppWidgetProviderInfo appWidget, @Nullable Bundle extras, @Nullable IntentSender resultIntent, int userId) { Objects.requireNonNull(appWidget); return requestPinItem(callingPackage, userId, null, appWidget, extras, resultIntent); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestPinAppWidget File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
requestPinAppWidget
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private static Charset getCharset() { return CHARSET; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCharset File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
getCharset
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
@Override public int getNearbyAppStreamingPolicy(final int userId) { if (!mHasFeature) { return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY; } final CallerIdentity caller = getCallerIdentity(); Preconditions.checkCallAuthorization( isProfileOwner(caller) || isDefaultDeviceOwner(caller) || hasCallingOrSelfPermission(permission.READ_NEARBY_STREAMING_POLICY)); synchronized (getLockObject()) { if (mOwners.hasProfileOwner(userId) || mOwners.hasDeviceOwner()) { final ActiveAdmin admin = getDeviceOrProfileOwnerAdminLocked(userId); return admin.mNearbyAppStreamingPolicy; } } return NEARBY_STREAMING_NOT_CONTROLLED_BY_POLICY; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNearbyAppStreamingPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getNearbyAppStreamingPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void onDevicePolicyManagerStateChanged() { showPrimarySecurityScreen(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDevicePolicyManagerStateChanged File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
onDevicePolicyManagerStateChanged
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
public String convertUsername(String username) { return this.xwiki.convertUsername(username, getXWikiContext()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertUsername File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-668" ]
CVE-2023-37911
MEDIUM
6.5
xwiki/xwiki-platform
convertUsername
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/XWiki.java
f471f2a392aeeb9e51d59fdfe1d76fccf532523f
0
Analyze the following code function for security vulnerabilities
@Override public void init(FilterConfig filterConfig) throws ServletException { LOGGER.debug("(XssFilter) initialize"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: init File: sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java Repository: shopizer-ecommerce/shopizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-33561
LOW
3.5
shopizer-ecommerce/shopizer
init
sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java
197f8c78c8f673b957e41ca2c823afc654c19271
0
Analyze the following code function for security vulnerabilities
public String getXMLContent() throws XWikiException { String xml = this.doc.getXMLContent(getXWikiContext()); return getXWikiContext().getUtil().substitute("s/<email>.*?<\\/email>/<email>********<\\/email>/goi", getXWikiContext().getUtil().substitute("s/<password>.*?<\\/password>/<password>********<\\/password>/goi", xml)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXMLContent File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
getXMLContent
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
public void onTextChanged(CharSequence s, int start, int before, int count) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onTextChanged File: src/com/android/settings/password/ChooseLockPassword.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onTextChanged
src/com/android/settings/password/ChooseLockPassword.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
private XWikiContext getXWikiContext() { return (XWikiContext) execution.getContext().getProperty("xwikicontext"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXWikiContext File: xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-94" ]
CVE-2021-32621
MEDIUM
6.5
xwiki/xwiki-platform
getXWikiContext
xwiki-platform-core/xwiki-platform-dashboard/xwiki-platform-dashboard-macro/src/main/java/org/xwiki/rendering/internal/macro/dashboard/DefaultGadgetSource.java
bb7068bd911f91e5511f3cfb03276c7ac81100bc
0
Analyze the following code function for security vulnerabilities
boolean setSystemGestureExclusion(List<Rect> exclusionRects) { if (mExclusionRects.equals(exclusionRects)) { return false; } mExclusionRects.clear(); mExclusionRects.addAll(exclusionRects); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSystemGestureExclusion File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
setSystemGestureExclusion
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private void acceptRingingCallInternal() { Call call = mCallsManager.getFirstCallWithState(CallState.RINGING); if (call != null) { call.answer(call.getVideoState()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: acceptRingingCallInternal File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
acceptRingingCallInternal
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
@Override public void sendResetPasswordEmailRequest(ResetPasswordRequestResponse requestResponse) throws ResetPasswordException { if (this.checkUserReference(requestResponse.getUserReference())) { AuthenticationResourceReference resourceReference = new AuthenticationResourceReference(AuthenticationAction.RESET_PASSWORD); UserReference userReference = requestResponse.getUserReference(); UserProperties userProperties = this.userPropertiesResolver.resolve(userReference); InternetAddress email = userProperties.getEmail(); String serializedUserReference = this.referenceSerializer.serialize(userReference); // FIXME: this should be provided as part of the User API. String formattedName = ""; if (!StringUtils.isBlank(userProperties.getFirstName())) { formattedName += userProperties.getFirstName(); } if (!StringUtils.isBlank(userProperties.getLastName())) { if (!StringUtils.isBlank(formattedName)) { formattedName += " "; } formattedName += userProperties.getLastName(); } if (StringUtils.isBlank(formattedName)) { formattedName = serializedUserReference; } resourceReference.addParameter("u", serializedUserReference); resourceReference.addParameter("v", requestResponse.getVerificationCode()); XWikiContext context = contextProvider.get(); ExtendedURL extendedURL = null; try { extendedURL = this.resourceReferenceSerializer.serialize(resourceReference); extendedURL = this.urlNormalizer.normalize(extendedURL); URL serverURL = context.getURLFactory().getServerURL(context); URL externalVerificationURL = new URL(serverURL, extendedURL.serialize()); this.resetPasswordMailSenderProvider.get() .sendResetPasswordEmail(formattedName, email, externalVerificationURL); } catch (SerializeResourceReferenceException | UnsupportedResourceReferenceException | MalformedURLException e) { throw new ResetPasswordException("Error when processing information for creating the email.", e); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendResetPasswordEmailRequest File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/DefaultResetPasswordManager.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-522" ]
CVE-2022-41933
MEDIUM
6.5
xwiki/xwiki-platform
sendResetPasswordEmailRequest
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authentication/xwiki-platform-security-authentication-default/src/main/java/org/xwiki/security/authentication/internal/DefaultResetPasswordManager.java
443e8398b75a1295067d74afb5898370782d863a
0
Analyze the following code function for security vulnerabilities
public Intent getResult() { try { return mResult.take(); } catch (InterruptedException e) { throw new RuntimeException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getResult File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
getResult
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
@Deprecated public void mergexWikiObjects(XWikiDocument templatedoc) { mergeXObjects(templatedoc); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergexWikiObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
mergexWikiObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public KBTemplate findByUuid_Last(String uuid, OrderByComparator<KBTemplate> orderByComparator) throws NoSuchTemplateException { KBTemplate kbTemplate = fetchByUuid_Last(uuid, orderByComparator); if (kbTemplate != null) { return kbTemplate; } StringBundler msg = new StringBundler(4); msg.append(_NO_SUCH_ENTITY_WITH_KEY); msg.append("uuid="); msg.append(uuid); msg.append(StringPool.CLOSE_CURLY_BRACE); throw new NoSuchTemplateException(msg.toString()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByUuid_Last File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByUuid_Last
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public boolean checkPasswordHistory(String password, int userId) { String passwordHashString = new String( passwordToHash(password, userId), StandardCharsets.UTF_8); String passwordHistory = getString(PASSWORD_HISTORY_KEY, userId); if (passwordHistory == null) { return false; } // Password History may be too long... int passwordHashLength = passwordHashString.length(); int passwordHistoryLength = getRequestedPasswordHistoryLength(userId); if(passwordHistoryLength == 0) { return false; } int neededPasswordHistoryLength = passwordHashLength * passwordHistoryLength + passwordHistoryLength - 1; if (passwordHistory.length() > neededPasswordHistoryLength) { passwordHistory = passwordHistory.substring(0, neededPasswordHistoryLength); } return passwordHistory.contains(passwordHashString); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPasswordHistory File: core/java/com/android/internal/widget/LockPatternUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3908
MEDIUM
4.3
android
checkPasswordHistory
core/java/com/android/internal/widget/LockPatternUtils.java
96daf7d4893f614714761af2d53dfb93214a32e4
0
Analyze the following code function for security vulnerabilities
public void setIssuerDN(String issuerDN) { this.issuerDN = issuerDN; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setIssuerDN File: base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setIssuerDN
base/common/src/main/java/com/netscape/certsrv/cert/CertDataInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
@Override public void onBootCompleted() { synchronized (this) { if (mContext.getResources().getBoolean( com.android.internal.R.bool.config_guestUserAutoCreated)) { // TODO(b/191067027): Move post-boot guest creation to system_server mUserSwitcherController.schedulePostBootGuestCreation(); } mBootCompleted = true; adjustStatusBarLocked(false, true); if (mBootSendUserPresent) { sendUserPresentBroadcast(); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onBootCompleted File: packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21267
MEDIUM
5.5
android
onBootCompleted
packages/SystemUI/src/com/android/systemui/keyguard/KeyguardViewMediator.java
d18d8b350756b0e89e051736c1f28744ed31e93a
0
Analyze the following code function for security vulnerabilities
private String lockTaskModeToString() { switch (mLockTaskModeState) { case LOCK_TASK_MODE_LOCKED: return "LOCKED"; case LOCK_TASK_MODE_PINNED: return "PINNED"; case LOCK_TASK_MODE_NONE: return "NONE"; default: return "unknown=" + mLockTaskModeState; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lockTaskModeToString File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
lockTaskModeToString
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
@Override protected void onUnsuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, AuthenticationException failed) throws IOException { super.onUnsuccessfulAuthentication(request, response, failed); LOGGER.log(Level.INFO, "Login attempt failed", failed); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUnsuccessfulAuthentication File: core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-287" ]
CVE-2014-2066
MEDIUM
6.8
jenkinsci/jenkins
onUnsuccessfulAuthentication
core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java
8ac74c350779921598f9d5edfed39dd35de8842a
0
Analyze the following code function for security vulnerabilities
private String normalizeJarBasePath(String rawPath) { if (rawPath == null || rawPath.isEmpty()) { return ""; } return rawPath.endsWith(JAR_PATH_SEPARATOR) ? rawPath : rawPath + JAR_PATH_SEPARATOR; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: normalizeJarBasePath File: flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-379" ]
CVE-2021-31411
MEDIUM
4.6
vaadin/flow
normalizeJarBasePath
flow-server/src/main/java/com/vaadin/flow/server/frontend/JarContentsManager.java
82cea56045b8430f7a26f037c01486b1feffa51d
0
Analyze the following code function for security vulnerabilities
public int getCarrierId() { return mCarrierId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCarrierId File: framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
getCarrierId
framework/java/android/net/wifi/hotspot2/PasspointConfiguration.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
protected Editor<T> createEditor() { return new EditorImpl<>(propertySet); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createEditor File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
createEditor
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public Configuration getConfiguration() { // If the process has not registered to any display area to listen to the configuration // change, we can simply return the mFullConfiguration as default. if (!registeredForDisplayAreaConfigChanges()) { return super.getConfiguration(); } // We use the process config this window is associated with as the based global config since // the process can override its config, but isn't part of the window hierarchy. mTempConfiguration.setTo(getProcessGlobalConfiguration()); mTempConfiguration.updateFrom(getMergedOverrideConfiguration()); return mTempConfiguration; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfiguration File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
getConfiguration
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override public List<KBTemplate> findByUuid(String uuid, int start, int end) { return findByUuid(uuid, start, end, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findByUuid File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
findByUuid
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
private UI getUI() { assert isAttached(); assert getOwner() instanceof StateTree : "Attach should only be called when the node has been attached to the tree, not to a null owner"; return ((StateTree) getOwner()).getUI(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUI File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
getUI
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAssistDataAllowedOnCurrentActivity() { int userId; synchronized (this) { userId = mUserController.getCurrentUserIdLocked(); ActivityRecord activity = getFocusedStack().topActivity(); if (activity == null) { return false; } userId = activity.userId; } DevicePolicyManager dpm = (DevicePolicyManager) mContext.getSystemService( Context.DEVICE_POLICY_SERVICE); return (dpm == null) || (!dpm.getScreenCaptureDisabled(null, userId)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAssistDataAllowedOnCurrentActivity File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
isAssistDataAllowedOnCurrentActivity
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public void setGroupedWithParent(boolean groupedWithParent) { mGroupedWithParent = groupedWithParent; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setGroupedWithParent File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
setGroupedWithParent
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
protected String emptyJsonResponse() { return sendJson(JSONCodec.encodeObject(o -> o)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: emptyJsonResponse File: core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
emptyJsonResponse
core-web/src/main/java/org/silverpeas/core/web/mvc/route/ComponentRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@Override public void onDismiss(DialogInterface dialog) { assert mNativeWebsiteSettingsPopup != 0; webContentsObserver.destroy(); nativeDestroy(mNativeWebsiteSettingsPopup); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onDismiss File: chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2015-1261
MEDIUM
5
chromium
onDismiss
chrome/android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java
5bf8a2dccf4777c5f065d918d1d9a2bbaa013f9f
0
Analyze the following code function for security vulnerabilities
public void close() throws IOException { if (rof != null) { rof.close(); rof = null; } if (unpack != null) { unpack.cleanUp(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: src/main/java/com/github/junrar/Archive.java Repository: junrar The code follows secure coding practices.
[ "CWE-835" ]
CVE-2018-12418
MEDIUM
4.3
junrar
close
src/main/java/com/github/junrar/Archive.java
ad8d0ba8e155630da8a1215cee3f253e0af45817
0
Analyze the following code function for security vulnerabilities
@Override public Collection<LBPool> listPool(String poolId) { Collection<LBPool> result = new HashSet<LBPool>(); result.add(pools.get(poolId)); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listPool File: src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java Repository: floodlight The code follows secure coding practices.
[ "CWE-362", "CWE-476" ]
CVE-2015-6569
MEDIUM
4.3
floodlight
listPool
src/main/java/net/floodlightcontroller/loadbalancer/LoadBalancer.java
7f5bedb625eec3ff4d29987c31cef2553a962b36
0