instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public int getShortcutCount() { synchronized (mLock) { return mShortcuts.size(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShortcutCount File: services/core/java/com/android/server/pm/ShortcutPackage.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40075
MEDIUM
5.5
android
getShortcutCount
services/core/java/com/android/server/pm/ShortcutPackage.java
ae768fbb9975fdab267f525831cb52f485ab0ecc
0
Analyze the following code function for security vulnerabilities
private ArrayList<ComponentName> getSuppressors() { ArrayList<ComponentName> names = new ArrayList<ComponentName>(); for (int i = mListenersDisablingEffects.size() - 1; i >= 0; --i) { ArraySet<ManagedServiceInfo> serviceInfoList = mListenersDisablingEffects.valueAt(i); for (ManagedServiceInfo info : serviceInfoList) { names.add(info.component); } } return names; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSuppressors File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
getSuppressors
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public boolean addHomepageLoadedListener(HomepageLoadedListener listener) { if (mHomepageView == null) { return false; } else { if (!mLoadedListeners.contains(listener)) { mLoadedListeners.add(listener); } return true; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addHomepageLoadedListener File: src/com/android/settings/homepage/SettingsHomepageActivity.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21256
HIGH
7.8
android
addHomepageLoadedListener
src/com/android/settings/homepage/SettingsHomepageActivity.java
62fc1d269f5e754fc8f00b6167d79c3933b4c1f4
0
Analyze the following code function for security vulnerabilities
@Override public boolean isSharingShortcut(int callingUserId, @NonNull String callingPackage, @NonNull String packageName, @NonNull String shortcutId, int userId, @NonNull IntentFilter filter) { Preconditions.checkStringNotEmpty(callingPackage, "callingPackage"); Preconditions.checkStringNotEmpty(packageName, "packageName"); Preconditions.checkStringNotEmpty(shortcutId, "shortcutId"); return ShortcutService.this.isSharingShortcut(callingUserId, callingPackage, packageName, shortcutId, userId, filter); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSharingShortcut File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
isSharingShortcut
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public boolean resourceExists(String name) { if (getEngineContext() != null) { try { if (getResource(name) != null) { return true; } } catch (IOException e) { } } try { File file = new File(name); return file.exists(); } catch (Exception e) { // Could be running under -security, which prevents calling file.exists(). } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resourceExists File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
resourceExists
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public String getAndExprConditionSQL(Condition[] conditions) { return _getLogicalExprConditionSQL(conditions, "AND"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAndExprConditionSQL File: dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java Repository: dashbuilder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-4999
HIGH
7.5
dashbuilder
getAndExprConditionSQL
dashbuilder-backend/dashbuilder-dataset-sql/src/main/java/org/dashbuilder/dataprovider/sql/dialect/DefaultDialect.java
8574899e3b6455547b534f570b2330ff772e524b
0
Analyze the following code function for security vulnerabilities
public final Set<MessageHandler> getHandlers() { Set<MessageHandler> msgHandlers = new HashSet<>(); for (HandlerWrapper handler : handlers.values()) { msgHandlers.add(handler.getHandler()); } return msgHandlers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getHandlers File: websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-401" ]
CVE-2021-3690
HIGH
7.5
undertow-io/undertow
getHandlers
websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java
c7e84a0b7efced38506d7d1dfea5902366973877
0
Analyze the following code function for security vulnerabilities
public long getExpireSearchResultsAfterMillis() { return myExpireSearchResultsAfterMillis; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExpireSearchResultsAfterMillis File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getExpireSearchResultsAfterMillis
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
private void exceptionHandler(Invocation ai, Exception e) { if (ai.getActionKey().startsWith("/api")) { ExceptionResponse exceptionResponse = new ExceptionResponse(); exceptionResponse.setError(1); exceptionResponse.setMessage(e.getMessage()); exceptionResponse.setStack(ExceptionUtils.recordStackTraceMsg(e)); ai.getController().renderJson(exceptionResponse); } else { ai.getController().redirect(Constants.ERROR_PAGE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: exceptionHandler File: web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
exceptionHandler
web/src/main/java/com/zrlog/web/interceptor/AdminInterceptor.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@Override public List<AppWidgetProviderInfo> getInstalledProvidersForProfile(int categoryFilter, int profileId) { final int userId = UserHandle.getCallingUserId(); if (DEBUG) { Slog.i(TAG, "getInstalledProvidersForProfiles() " + userId); } // Ensure the profile is in the group and enabled. if (!mSecurityPolicy.isEnabledGroupProfile(profileId)) { return null; } synchronized (mLock) { ensureGroupStateLoadedLocked(userId); ArrayList<AppWidgetProviderInfo> result = null; final int providerCount = mProviders.size(); for (int i = 0; i < providerCount; i++) { Provider provider = mProviders.get(i); AppWidgetProviderInfo info = provider.info; // Ignore an invalid provider or one not matching the filter. if (provider.zombie || (info.widgetCategory & categoryFilter) == 0) { continue; } // Add providers only for the requested profile that are white-listed. final int providerProfileId = info.getProfile().getIdentifier(); if (providerProfileId == profileId && mSecurityPolicy.isProviderInCallerOrInProfileAndWhitelListed( provider.id.componentName.getPackageName(), providerProfileId)) { if (result == null) { result = new ArrayList<>(); } result.add(cloneIfLocalBinder(info)); } } return result; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getInstalledProvidersForProfile File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
getInstalledProvidersForProfile
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
private int convertToUsabilityStatsTriggerType(int unusableEventTriggerType) { int triggerType; switch (unusableEventTriggerType) { case WifiIsUnusableEvent.TYPE_DATA_STALL_BAD_TX: triggerType = WifiUsabilityStats.TYPE_DATA_STALL_BAD_TX; break; case WifiIsUnusableEvent.TYPE_DATA_STALL_TX_WITHOUT_RX: triggerType = WifiUsabilityStats.TYPE_DATA_STALL_TX_WITHOUT_RX; break; case WifiIsUnusableEvent.TYPE_DATA_STALL_BOTH: triggerType = WifiUsabilityStats.TYPE_DATA_STALL_BOTH; break; case WifiIsUnusableEvent.TYPE_FIRMWARE_ALERT: triggerType = WifiUsabilityStats.TYPE_FIRMWARE_ALERT; break; case WifiIsUnusableEvent.TYPE_IP_REACHABILITY_LOST: triggerType = WifiUsabilityStats.TYPE_IP_REACHABILITY_LOST; break; default: triggerType = WifiUsabilityStats.TYPE_UNKNOWN; Log.e(getTag(), "Unknown WifiIsUnusableEvent: " + unusableEventTriggerType); } return triggerType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: convertToUsabilityStatsTriggerType File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
convertToUsabilityStatsTriggerType
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private boolean canReadPhoneState(String callingPackage, String message) { // The system/default dialer can always read phone state - so that emergency calls will // still work. if (isPrivilegedDialerCalling(callingPackage)) { return true; } try { mContext.enforceCallingOrSelfPermission(READ_PRIVILEGED_PHONE_STATE, message); // SKIP checking run-time OP_READ_PHONE_STATE since caller or self has PRIVILEGED // permission return true; } catch (SecurityException e) { // Accessing phone state is gated by a special permission. mContext.enforceCallingOrSelfPermission(READ_PHONE_STATE, message); // Some apps that have the permission can be restricted via app ops. return mAppOpsManager.noteOp(AppOpsManager.OP_READ_PHONE_STATE, Binder.getCallingUid(), callingPackage) == AppOpsManager.MODE_ALLOWED; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: canReadPhoneState File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
canReadPhoneState
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
public boolean getUserCanSkipBouncer(int userId) { return getUserHasTrust(userId) || (mUserFingerprintAuthenticated.get(userId) && isUnlockingWithFingerprintAllowed()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserCanSkipBouncer File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
getUserCanSkipBouncer
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public void updateResources() { int panelWidth = getResources().getDimensionPixelSize(R.dimen.notification_panel_width); int panelGravity = getResources().getInteger(R.integer.notification_panel_layout_gravity); FrameLayout.LayoutParams lp = (FrameLayout.LayoutParams) mQsFrame.getLayoutParams(); if (lp.width != panelWidth || lp.gravity != panelGravity) { lp.width = panelWidth; lp.gravity = panelGravity; mQsFrame.setLayoutParams(lp); } lp = (FrameLayout.LayoutParams) mNotificationStackScroller.getLayoutParams(); if (lp.width != panelWidth || lp.gravity != panelGravity) { lp.width = panelWidth; lp.gravity = panelGravity; mNotificationStackScroller.setLayoutParams(lp); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateResources File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
updateResources
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Override public int getUserId() { return mUserId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserId File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
getUserId
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
public static void writeByteArray(ObjectDataOutput out, byte[] value) throws IOException { int size = (value == null) ? 0 : value.length; out.writeInt(size); if (size > 0) { out.write(value); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeByteArray File: hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
writeByteArray
hazelcast/src/main/java/com/hazelcast/nio/IOUtil.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
WebSession createNewSession(String hostAddr) { String newId; do { newId = generateSessionId(); } while (sessions.get(newId) != null); WebSession session = new WebSession(this); session.lastAccess = System.currentTimeMillis(); session.put("sessionId", newId); session.put("ip", hostAddr); session.put("language", DEFAULT_LANGUAGE); session.put("frame-border", "0"); session.put("frameset-border", "4"); sessions.put(newId, session); // always read the english translation, // so that untranslated text appears at least in english readTranslations(session, DEFAULT_LANGUAGE); return getSession(newId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNewSession File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
createNewSession
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
@RequestMapping("reCreateIndex") @Csrf public String reCreateIndex(@RequestAttribute SysSite site, @SessionAttribute SysUser admin, HttpServletRequest request, ModelMap model) { contentService.reCreateIndex(); Long userId = admin.getId(); logOperateService.save(new LogOperate(site.getId(), userId, LogLoginService.CHANNEL_WEB_MANAGER, "reCreateIndex", RequestUtils.getIpAddress(request), CommonUtils.getDate(), CommonConstants.BLANK)); return CommonConstants.TEMPLATE_DONE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reCreateIndex File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/sys/SysSiteAdminController.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-89" ]
CVE-2020-20914
CRITICAL
9.8
sanluan/PublicCMS
reCreateIndex
publiccms-parent/publiccms-core/src/main/java/com/publiccms/controller/admin/sys/SysSiteAdminController.java
bf24c5dd9177cb2da30d0f0a62cf8e130003c2ae
0
Analyze the following code function for security vulnerabilities
@Override public boolean isPackageAvailable(String packageName, int userId) { if (!sUserManager.exists(userId)) return false; enforceCrossUserPermission(Binder.getCallingUid(), userId, false, false, "is package available"); synchronized (mPackages) { PackageParser.Package p = mPackages.get(packageName); if (p != null) { final PackageSetting ps = (PackageSetting) p.mExtras; if (ps != null) { final PackageUserState state = ps.readUserState(userId); if (state != null) { return PackageParser.isAvailable(state); } } } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackageAvailable File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isPackageAvailable
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void setEnforceReferentialIntegrityOnWrite(boolean theEnforceReferentialIntegrityOnWrite) { myEnforceReferentialIntegrityOnWrite = theEnforceReferentialIntegrityOnWrite; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setEnforceReferentialIntegrityOnWrite File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
setEnforceReferentialIntegrityOnWrite
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
@Override public SetValuedMap<String, String> getProgramOrganisationUnitsAssociations( Set<String> programUids ) { return jdbcOrgUnitAssociationsStore.getOrganisationUnitsAssociations( programUids ); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProgramOrganisationUnitsAssociations File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java Repository: dhis2/dhis2-core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24848
MEDIUM
6.5
dhis2/dhis2-core
getProgramOrganisationUnitsAssociations
dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/program/DefaultProgramService.java
ef04483a9b177d62e48dcf4e498b302a11f95e7d
0
Analyze the following code function for security vulnerabilities
public double getFooterRowHeight() { return getState(false).footerRowHeight; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFooterRowHeight File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getFooterRowHeight
server/src/main/java/com/vaadin/ui/Grid.java
c40bed109c3723b38694ed160ea647fef5b28593
0
Analyze the following code function for security vulnerabilities
@Override public void afterPropertiesSet() throws Exception { boolean hasContextPath = StringUtils.hasLength(this.contextPath); boolean hasClassesToBeBound = !ObjectUtils.isEmpty(this.classesToBeBound); boolean hasPackagesToScan = !ObjectUtils.isEmpty(this.packagesToScan); if (hasContextPath && (hasClassesToBeBound || hasPackagesToScan) || (hasClassesToBeBound && hasPackagesToScan)) { throw new IllegalArgumentException("Specify either 'contextPath', 'classesToBeBound', " + "or 'packagesToScan'"); } if (!hasContextPath && !hasClassesToBeBound && !hasPackagesToScan) { throw new IllegalArgumentException( "Setting either 'contextPath', 'classesToBeBound', " + "or 'packagesToScan' is required"); } if (!this.lazyInit) { getJaxbContext(); } if (!ObjectUtils.isEmpty(this.schemaResources)) { this.schema = loadSchema(this.schemaResources, this.schemaLanguage); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: afterPropertiesSet File: spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-4152
MEDIUM
6.8
spring-projects/spring-framework
afterPropertiesSet
spring-oxm/src/main/java/org/springframework/oxm/jaxb/Jaxb2Marshaller.java
2843b7d2ee12e3f9c458f6f816befd21b402e3b9
0
Analyze the following code function for security vulnerabilities
protected boolean encoderEnforceMaxConcurrentStreams() { return encoderEnforceMaxConcurrentStreams != null ? encoderEnforceMaxConcurrentStreams : false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: encoderEnforceMaxConcurrentStreams File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java Repository: netty The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
netty
encoderEnforceMaxConcurrentStreams
codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
58f75f665aa81a8cbcf6ffa74820042a285c5e61
0
Analyze the following code function for security vulnerabilities
public void setSemanticModules(SemanticModules modules) { this.modules = modules; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSemanticModules File: drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java Repository: apache/incubator-kie-drools The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2014-8125
HIGH
7.5
apache/incubator-kie-drools
setSemanticModules
drools-core/src/main/java/org/drools/core/xml/ExtensibleXmlParser.java
c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3
0
Analyze the following code function for security vulnerabilities
public String getDialogUri() { if (!useNewStyle()) { return getDialogRealUri(); } else { return CmsToolManager.linkForToolPath(getJsp(), getCurrentToolPath()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDialogUri File: src/org/opencms/workplace/CmsDialog.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
getDialogUri
src/org/opencms/workplace/CmsDialog.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
public Builder setScopes(Collection<String> scopes) { this.scopes = Preconditions.checkNotNull(scopes); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setScopes File: google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java Repository: googleapis/google-oauth-java-client The code follows secure coding practices.
[ "CWE-863" ]
CVE-2020-7692
MEDIUM
6.4
googleapis/google-oauth-java-client
setScopes
google-oauth-client/src/main/java/com/google/api/client/auth/oauth2/AuthorizationCodeFlow.java
13433cd7dd06267fc261f0b1d4764f8e3432c824
0
Analyze the following code function for security vulnerabilities
public void setShutdownHandler(ShutdownHandler shutdownHandler) { this.shutdownHandler = shutdownHandler; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setShutdownHandler File: h2/src/main/org/h2/tools/Server.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
setShutdownHandler
h2/src/main/org/h2/tools/Server.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private void dumpDumpFiles(PrintWriter pw) { synchronized (mLock) { pw.println("** SHORTCUT MANAGER FILES (dumpsys shortcut -n -f)"); mShortcutDumpFiles.dumpAll(pw); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dumpDumpFiles File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
dumpDumpFiles
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
private byte[] derEncode( BigInteger r, BigInteger s) throws IOException { ASN1Integer[] rs = new ASN1Integer[]{ new ASN1Integer(r), new ASN1Integer(s) }; return new DERSequence(rs).getEncoded(ASN1Encoding.DER); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: derEncode File: prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-347" ]
CVE-2016-1000338
MEDIUM
5
bcgit/bc-java
derEncode
prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java
b0c3ce99d43d73a096268831d0d120ffc89eac7f
0
Analyze the following code function for security vulnerabilities
public int getParentId() { return mParentId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getParentId File: chrome/android/java/src/org/chromium/chrome/browser/Tab.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
getParentId
chrome/android/java/src/org/chromium/chrome/browser/Tab.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
public ServerBuilder connectionDrainDurationMicros(long durationMicros) { checkArgument(connectionDrainDurationMicros >= 0, "connectionDrainDurationMicros: %s (expected: >= 0)", connectionDrainDurationMicros); connectionDrainDurationMicros = durationMicros; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: connectionDrainDurationMicros File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
connectionDrainDurationMicros
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public void setCreateDate(Date createDate) { this.createDate = createDate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCreateDate File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setCreateDate
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
@Override public DocumentFragment createDocumentFragment() { return doc.createDocumentFragment(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createDocumentFragment File: HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java Repository: LoboEvolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000540
MEDIUM
6.8
LoboEvolution
createDocumentFragment
HTML_Renderer/src/main/java/org/loboevolution/html/js/xml/XMLDocument.java
9b75694cedfa4825d4a2330abf2719d470c654cd
0
Analyze the following code function for security vulnerabilities
@Nullable public static String rescaleImageAndEncodeAsBase64(@Nonnull final InputStream in, final int maxSize) throws IOException { final Image image = ImageIO.read(in); String result = null; if (image != null) { result = rescaleImageAndEncodeAsBase64(image, maxSize); } return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rescaleImageAndEncodeAsBase64 File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java Repository: raydac/netbeans-mmd-plugin The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000542
MEDIUM
6.8
raydac/netbeans-mmd-plugin
rescaleImageAndEncodeAsBase64
mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
9fba652bf06e649186b8f9e612d60e9cc15097e9
0
Analyze the following code function for security vulnerabilities
private PlaybackState getStateWithUpdatedPosition() { PlaybackState state; long duration; synchronized (mLock) { if (mDestroyed) { return null; } state = mPlaybackState; duration = mDuration; } PlaybackState result = null; if (state != null) { if (state.getState() == PlaybackState.STATE_PLAYING || state.getState() == PlaybackState.STATE_FAST_FORWARDING || state.getState() == PlaybackState.STATE_REWINDING) { long updateTime = state.getLastPositionUpdateTime(); long currentTime = SystemClock.elapsedRealtime(); if (updateTime > 0) { long position = (long) (state.getPlaybackSpeed() * (currentTime - updateTime)) + state.getPosition(); if (duration >= 0 && position > duration) { position = duration; } else if (position < 0) { position = 0; } PlaybackState.Builder builder = new PlaybackState.Builder(state); builder.setState(state.getState(), position, state.getPlaybackSpeed(), currentTime); result = builder.build(); } } } return result == null ? state : result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getStateWithUpdatedPosition File: services/core/java/com/android/server/media/MediaSessionRecord.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21280
MEDIUM
5.5
android
getStateWithUpdatedPosition
services/core/java/com/android/server/media/MediaSessionRecord.java
06e772e05514af4aa427641784c5eec39a892ed3
0
Analyze the following code function for security vulnerabilities
@SystemApi @RequiresPermission(anyOf = { android.Manifest.permission.MANAGE_USERS, android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS }) public boolean isUnattendedManagedKiosk() { throwIfParentInstance("isUnattendedManagedKiosk"); if (mService != null) { try { return mService.isUnattendedManagedKiosk(); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isUnattendedManagedKiosk File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
isUnattendedManagedKiosk
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void addDeny(String name) { if (name == null || name.length() == 0) { return; } long hash = TypeUtils.fnv1a_64(name); if (Arrays.binarySearch(this.denyHashCodes, hash) >= 0) { return; } long[] hashCodes = new long[this.denyHashCodes.length + 1]; hashCodes[hashCodes.length - 1] = hash; System.arraycopy(this.denyHashCodes, 0, hashCodes, 0, this.denyHashCodes.length); Arrays.sort(hashCodes); this.denyHashCodes = hashCodes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addDeny File: src/main/java/com/alibaba/fastjson/parser/ParserConfig.java Repository: alibaba/fastjson The code follows secure coding practices.
[ "CWE-502" ]
CVE-2022-25845
MEDIUM
6.8
alibaba/fastjson
addDeny
src/main/java/com/alibaba/fastjson/parser/ParserConfig.java
8f3410f81cbd437f7c459f8868445d50ad301f15
0
Analyze the following code function for security vulnerabilities
private void migrate102(File dataDir, Stack<Integer> versions) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate102 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate102
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
protected boolean _isEnumValueOf(AnnotatedWithParams creator) { return creator.getDeclaringClass().isEnum() && "valueOf".equals(creator.getName()); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2019-16942 - Severity: HIGH - CVSS Score: 7.5 Description: More clean up after #2478 Function: _isEnumValueOf File: src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java Repository: FasterXML/jackson-databind Fixed Code: protected boolean _isEnumValueOf(AnnotatedWithParams creator) { return ClassUtil.isEnumType(creator.getDeclaringClass()) && "valueOf".equals(creator.getName()); }
[ "CWE-502" ]
CVE-2019-16942
HIGH
7.5
FasterXML/jackson-databind
_isEnumValueOf
src/main/java/com/fasterxml/jackson/databind/deser/impl/CreatorCollector.java
54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
1
Analyze the following code function for security vulnerabilities
private void stopNotificationLogging() { // Report all notifications as invisible and turn down the // reporter. if (!mCurrentlyVisibleNotifications.isEmpty()) { logNotificationVisibilityChanges(Collections.<NotificationVisibility>emptyList(), mCurrentlyVisibleNotifications); recycleAllVisibilityObjects(mCurrentlyVisibleNotifications); } mHandler.removeCallbacks(mVisibilityReporter); mStackScroller.setChildLocationsChangedListener(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopNotificationLogging File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
stopNotificationLogging
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@FrameIteratorSkip private final int invokeExact_thunkArchetype_I(Object receiver, int argPlaceholder) { return ComputedCalls.dispatchVirtual_I(jittedMethodAddress(receiver), vtableIndexArgument(receiver), receiver, argPlaceholder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeExact_thunkArchetype_I File: jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java Repository: eclipse-openj9/openj9 The code follows secure coding practices.
[ "CWE-440", "CWE-250" ]
CVE-2021-41035
HIGH
7.5
eclipse-openj9/openj9
invokeExact_thunkArchetype_I
jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java
c6e0d9296ff9a3084965d83e207403de373c0bad
0
Analyze the following code function for security vulnerabilities
public int runListUsers() { try { IActivityManager am = ActivityManagerNative.getDefault(); List<UserInfo> users = mUm.getUsers(false); if (users == null) { System.err.println("Error: couldn't get users"); return 1; } else { System.out.println("Users:"); for (int i = 0; i < users.size(); i++) { String running = am.isUserRunning(users.get(i).id, false) ? " running" : ""; System.out.println("\t" + users.get(i).toString() + running); } return 0; } } catch (RemoteException e) { System.err.println(e.toString()); System.err.println(PM_NOT_RUNNING_ERR); return 1; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: runListUsers File: cmds/pm/src/com/android/commands/pm/Pm.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3833
HIGH
9.3
android
runListUsers
cmds/pm/src/com/android/commands/pm/Pm.java
4e4743a354e26467318b437892a9980eb9b8328a
0
Analyze the following code function for security vulnerabilities
private void loadSettingsLocked(DevicePolicyData policy, int userHandle) { DevicePolicyData.load(policy, makeJournaledFile(userHandle), component -> findAdmin( component, userHandle, /* throwForMissingPermission= */ false), getOwnerComponent(userHandle)); policy.validatePasswordOwner(); updateMaximumTimeToLockLocked(userHandle); if (!isPolicyEngineForFinanceFlagEnabled()) { updateLockTaskPackagesLocked(mContext, policy.mLockTaskPackages, userHandle); updateLockTaskFeaturesLocked(policy.mLockTaskFeatures, userHandle); } if (policy.mStatusBarDisabled) { setStatusBarDisabledInternal(policy.mStatusBarDisabled, userHandle); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadSettingsLocked File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
loadSettingsLocked
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
protected void handleDeviceProvisioned() { for (int i = 0; i < mCallbacks.size(); i++) { KeyguardUpdateMonitorCallback cb = mCallbacks.get(i).get(); if (cb != null) { cb.onDeviceProvisioned(); } } if (mDeviceProvisionedObserver != null) { // We don't need the observer anymore... mContext.getContentResolver().unregisterContentObserver(mDeviceProvisionedObserver); mDeviceProvisionedObserver = null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleDeviceProvisioned File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
handleDeviceProvisioned
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private void clearInternalData() { mPendingRootCaCertDepth = -1; mPendingRootCaCert = null; mPendingServerCert = null; mPendingServerCertSubjectInfo = null; mPendingServerCertIssuerInfo = null; mCurrentTofuConfig = null; }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-21242 - Severity: CRITICAL - CVSS Score: 9.8 Description: [TOFU] Validate full cert chains before displaying dialog When a full chain including a Root CA is provided by the server, perform a full validation of the chain before displaying the TOFU dialog. If validation passes: Display a TOFU dialog and ask the user if they trust this network. Saying yes means that the Root can be installed safely for that network. They might say no - this is possible if an attacker creates a full chain they control which results in a different SHA-256 (everything else looks correct). If they say no, we stop the connection. If validation fails: Display an error message saying that the validation failed, we stop the connection and won't display the TOFU dialog. Use server certificate pinning for servers that send only a leaf or a partial chain with no Root CA. Additionally: clean up the debug logs to reduce the noise and focus only on the important details. Bug: 277824547 Test: atest InsecureEapNetworkHandler Test: Connect to various Enterprise networks Negative test: Confirm verification fails for invalid chains (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b0ee00ddf38bb677876a6cffb876e6f511e2c139) Merged-In: I224c80e2787497634d3e68760122dac5f177585a Change-Id: I224c80e2787497634d3e68760122dac5f177585a Function: clearInternalData File: service/java/com/android/server/wifi/InsecureEapNetworkHandler.java Repository: android Fixed Code: private void clearInternalData() { mPendingRootCaCertDepth = -1; mPendingRootCaCert = null; mPendingServerCert = null; mPendingServerCertSubjectInfo = null; mPendingServerCertIssuerInfo = null; mCurrentTofuConfig = null; mServerCertHash = null; }
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
clearInternalData
service/java/com/android/server/wifi/InsecureEapNetworkHandler.java
72e903f258b5040b8f492cf18edd124b5a1ac770
1
Analyze the following code function for security vulnerabilities
private void updateResumedAppTrace(@Nullable ActivityRecord resumed) { if (mTracedResumedActivity != null) { Trace.asyncTraceEnd(TRACE_TAG_ACTIVITY_MANAGER, constructResumedTraceName(mTracedResumedActivity.packageName), 0); } if (resumed != null) { Trace.asyncTraceBegin(TRACE_TAG_ACTIVITY_MANAGER, constructResumedTraceName(resumed.packageName), 0); } mTracedResumedActivity = resumed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateResumedAppTrace File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
updateResumedAppTrace
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public final TextPaint getPaint() { return mPaint; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPaint File: core/java/android/text/Layout.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2018-9452
MEDIUM
4.3
android
getPaint
core/java/android/text/Layout.java
3b6f84b77c30ec0bab5147b0cffc192c86ba2634
0
Analyze the following code function for security vulnerabilities
private void createIdmapsForPackageLI(PackageParser.Package pkg) { ArrayMap<String, PackageParser.Package> overlays = mOverlays.get(pkg.packageName); if (overlays == null) { Slog.w(TAG, "Unable to create idmap for " + pkg.packageName + ": no overlay packages"); return; } for (PackageParser.Package opkg : overlays.values()) { // Not much to do if idmap fails: we already logged the error // and we certainly don't want to abort installation of pkg simply // because an overlay didn't fit properly. For these reasons, // ignore the return value of createIdmapForPackagePairLI. createIdmapForPackagePairLI(pkg, opkg); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createIdmapsForPackageLI File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
createIdmapsForPackageLI
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Override public boolean equals(Object obj) { if (this == obj) return true; if (!super.equals(obj)) return false; if (getClass() != obj.getClass()) return false; CertRequestInfo other = (CertRequestInfo) obj; if (certId == null) { if (other.certId != null) return false; } else if (!certId.equals(other.certId)) return false; if (certRequestType == null) { if (other.certRequestType != null) return false; } else if (!certRequestType.equals(other.certRequestType)) return false; if (certURL == null) { if (other.certURL != null) return false; } else if (!certURL.equals(other.certURL)) return false; return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
equals
base/common/src/main/java/com/netscape/certsrv/cert/CertRequestInfo.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
void onServiceConnected() { synchronized(mLock) { if (mListeners != null && !mListeners.isEmpty()) { setSoftKeyboardCallbackEnabled(true); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onServiceConnected File: core/java/android/accessibilityservice/AccessibilityService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3923
MEDIUM
4.3
android
onServiceConnected
core/java/android/accessibilityservice/AccessibilityService.java
5f256310187b4ff2f13a7abb9afed9126facd7bc
0
Analyze the following code function for security vulnerabilities
public int getLaunchedFromUid(IBinder activityToken) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(activityToken); mRemote.transact(GET_LAUNCHED_FROM_UID_TRANSACTION, data, reply, 0); reply.readException(); int result = reply.readInt(); data.recycle(); reply.recycle(); return result; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLaunchedFromUid File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
getLaunchedFromUid
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public static SubscriptionResponse jsFunction_addAPISubscription(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws APIManagementException { if (!isStringArray(args)) { throw new APIManagementException("Invalid input parameters for AddAPISubscription method"); } APIConsumer apiConsumer = getAPIConsumer(thisObj); SubscriptionResponse addSubscriptionResponse = null; String providerName = APIUtil.replaceEmailDomain(args[0].toString()); String apiName = args[1].toString(); String version = args[2].toString(); String tier = args[3].toString(); String applicationName = ((String) args[4]); String userId = args[5].toString(); String groupId = null; if (args.length > 6 && args[6] != null) { groupId = (String) args[6]; } APIIdentifier apiIdentifier = new APIIdentifier(providerName, apiName, version); //Check whether tier is denied or not before adding Set<String> tiers = apiConsumer.getDeniedTiers(); if (!tiers.contains(tier)) { apiIdentifier.setTier(tier); try { int applicationId = APIUtil.getApplicationId(applicationName, userId); addSubscriptionResponse = apiConsumer.addSubscription(apiIdentifier, userId, applicationId, groupId); } catch (APIManagementException e) { handleException("Error while adding the subscription for user: " + userId, e); } } else { handleException("Cannot add subscription to with the denied tier"); } return addSubscriptionResponse; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_addAPISubscription File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_addAPISubscription
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
public static LoadPaths of( final List<File> paths, final boolean unlimitedAccess ) { if (paths == null || paths.isEmpty()) { return new LoadPaths(null, unlimitedAccess); } else { final List<File> savePaths = new ArrayList<>(); for(File p : paths) { if (p != null) { if (p.isFile() || p.isDirectory()) { savePaths.add(canonical(p.getAbsoluteFile())); } else { // skip silently } } } return new LoadPaths(savePaths, unlimitedAccess); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: of File: src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java Repository: jlangch/venice The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-36007
LOW
3.3
jlangch/venice
of
src/main/java/com/github/jlangch/venice/impl/util/io/LoadPaths.java
c942c73136333bc493050910f171a48e6f575b23
0
Analyze the following code function for security vulnerabilities
void postOnSystemServerInitThreadPool(Runnable runnable) { SystemServerInitThreadPool.submit(runnable, LOG_TAG); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: postOnSystemServerInitThreadPool File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
postOnSystemServerInitThreadPool
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public File getDestDirectory() { return destDirectory; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDestDirectory File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java Repository: codehaus-plexus/plexus-archiver The code follows secure coding practices.
[ "CWE-22", "CWE-61" ]
CVE-2023-37460
CRITICAL
9.8
codehaus-plexus/plexus-archiver
getDestDirectory
src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
54759839fbdf85caf8442076f001d5fd64e0dcb2
0
Analyze the following code function for security vulnerabilities
private void enforcePermission(String permission, int adminPolicy, String callerPackageName, int targetUserId) throws SecurityException { if (hasAdminPolicy(adminPolicy, callerPackageName)) { return; } enforcePermission(permission, callerPackageName, targetUserId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforcePermission File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
enforcePermission
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private String getPersonalAppSuspensionText() { return getUpdatableString( PERSONAL_APP_SUSPENSION_MESSAGE, R.string.personal_apps_suspension_text); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPersonalAppSuspensionText File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPersonalAppSuspensionText
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private FileProvider getFileProvider(Path folder) { return fileProviders.stream() .filter(provider -> provider.canHandle(folder)) .findFirst() .orElseThrow(() -> new RuntimeException("no file provider found for " + folder.toString())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFileProvider File: lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java Repository: lukashinsch/spring-boot-actuator-logview The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-21234
MEDIUM
4
lukashinsch/spring-boot-actuator-logview
getFileProvider
lib/src/main/java/eu/hinsch/spring/boot/actuator/logview/LogViewEndpoint.java
760acbb939a8d1f7d1a7dfcd51ca848eea04e772
0
Analyze the following code function for security vulnerabilities
public void readStructEnd() {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readStructEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readStructEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
public void setItemCVOIDsTypesExpected() { this.unsetTypeExpected(); int i = 1; this.setTypeExpected(i, TypeNames.INT); // crf_id ++i; this.setTypeExpected(i, TypeNames.INT); // crf_version_id ++i; this.setTypeExpected(i, TypeNames.INT); // item_id ++i; this.setTypeExpected(i, TypeNames.STRING); // cv_oid ++i; this.setTypeExpected(i, TypeNames.STRING); // item_oid }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setItemCVOIDsTypesExpected File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
setItemCVOIDsTypesExpected
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private static Iterable<Element> getGrandChildrenByTagName(Element parent, String immediateChildName, String subChild){ NodeList elementsByTagName = parent.getElementsByTagName(immediateChildName); if (elementsByTagName.getLength() == 0) return Collections.emptyList(); Element regExpListNode = (Element) elementsByTagName.item(0); return getByTagName( regExpListNode, subChild); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getGrandChildrenByTagName File: src/main/java/org/owasp/validator/html/Policy.java Repository: nahsra/antisamy The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-14735
MEDIUM
4.3
nahsra/antisamy
getGrandChildrenByTagName
src/main/java/org/owasp/validator/html/Policy.java
82da009e733a989a57190cd6aa1b6824724f6d36
0
Analyze the following code function for security vulnerabilities
protected String evaluateTitle(String title, DocumentReference documentReference, DocumentDisplayerParameters parameters) { StringWriter writer = new StringWriter(); String namespace = defaultEntityReferenceSerializer.serialize(parameters.isTransformationContextIsolated() ? documentReference : documentAccessBridge.getCurrentDocumentReference()); // Get the velocity engine VelocityEngine velocityEngine; try { velocityEngine = this.velocityManager.getVelocityEngine(); } catch (Exception e) { throw new RuntimeException(e); } // Execute Velocity code Map<String, Object> backupObjects = null; boolean canPop = false; EntityReference currentWikiReference = this.modelContext.getCurrentEntityReference(); try { if (parameters.isExecutionContextIsolated()) { backupObjects = new HashMap<>(); // The following method call also clones the execution context. documentAccessBridge.pushDocumentInContext(backupObjects, documentReference); // Pop the document from the context only if the push was successful! canPop = true; // Make sure to synchronize the context wiki with the context document's wiki. modelContext.setCurrentEntityReference(documentReference.getWikiReference()); } velocityEngine.evaluate(velocityManager.getVelocityContext(), writer, namespace, title); } catch (Exception e) { throw new RuntimeException(e); } finally { if (canPop) { documentAccessBridge.popDocumentFromContext(backupObjects); // Also restore the context wiki. this.modelContext.setCurrentEntityReference(currentWikiReference); } } return writer.toString(); }
Vulnerability Classification: - CWE: CWE-863 - CVE: CVE-2023-46244 - Severity: HIGH - CVSS Score: 8.8 Description: XWIKI-20624: Improve title display for modified documents Function: evaluateTitle File: xwiki-platform-core/xwiki-platform-display/xwiki-platform-display-api/src/main/java/org/xwiki/display/internal/AbstractDocumentTitleDisplayer.java Repository: xwiki/xwiki-platform Fixed Code: protected String evaluateTitle(String title, DocumentModelBridge document, DocumentDisplayerParameters parameters) { StringWriter writer = new StringWriter(); String namespace = defaultEntityReferenceSerializer.serialize(parameters.isTransformationContextIsolated() ? document.getDocumentReference() : documentAccessBridge.getCurrentDocumentReference()); // Get the velocity engine VelocityEngine velocityEngine; try { velocityEngine = this.velocityManager.getVelocityEngine(); } catch (Exception e) { throw new RuntimeException(e); } // Execute Velocity code Map<String, Object> backupObjects = null; boolean canPop = false; EntityReference currentWikiReference = this.modelContext.getCurrentEntityReference(); try { if (parameters.isExecutionContextIsolated()) { backupObjects = new HashMap<>(); // The following method call also clones the execution context. documentAccessBridge.pushDocumentInContext(backupObjects, document); // Pop the document from the context only if the push was successful! canPop = true; // Make sure to synchronize the context wiki with the context document's wiki. modelContext.setCurrentEntityReference(document.getDocumentReference().getWikiReference()); } velocityEngine.evaluate(velocityManager.getVelocityContext(), writer, namespace, title); } catch (Exception e) { throw new RuntimeException(e); } finally { if (canPop) { documentAccessBridge.popDocumentFromContext(backupObjects); // Also restore the context wiki. this.modelContext.setCurrentEntityReference(currentWikiReference); } } return writer.toString(); }
[ "CWE-863" ]
CVE-2023-46244
HIGH
8.8
xwiki/xwiki-platform
evaluateTitle
xwiki-platform-core/xwiki-platform-display/xwiki-platform-display-api/src/main/java/org/xwiki/display/internal/AbstractDocumentTitleDisplayer.java
11a9170dfe63e59f4066db67f84dbfce4ed619c6
1
Analyze the following code function for security vulnerabilities
private static boolean isCompatible(SSLConfig c1, SSLConfig c2) { boolean c1Disabled = c1 == null || !c1.isEnabled(); boolean c2Disabled = c2 == null || !c2.isEnabled(); return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.getFactoryClassName(), c2.getFactoryClassName()) && nullSafeEqual(c1.getFactoryImplementation(), c2.getFactoryImplementation())) && nullSafeEqual(c1.getProperties(), c2.getProperties()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCompatible File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
isCompatible
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public static SvnMaterial svnMaterial(String svnUrl, String folder, String userName, String password, boolean checkExternals, String filterPattern) { SvnMaterial svnMaterial = new SvnMaterial(svnUrl, userName, password, checkExternals, folder); if (filterPattern != null) svnMaterial.setFilter(new Filter(new IgnoredFiles(filterPattern))); return svnMaterial; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: svnMaterial File: domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
svnMaterial
domain/src/test/java/com/thoughtworks/go/helper/MaterialsMother.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
public void setSerialNum(CertId serialNum) { this.serialNum = serialNum; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSerialNum File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setSerialNum
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static String unescapeXMLComment(String content) { StringBuffer str = new StringBuffer(content.length()); char[] buff = content.toCharArray(); boolean escaped = false; for (char c : buff) { if (!escaped && c == '\\') { escaped = true; continue; } str.append(c); escaped = false; } return str.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: unescapeXMLComment File: xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java Repository: xwiki/xwiki-commons The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-24898
MEDIUM
4
xwiki/xwiki-commons
unescapeXMLComment
xwiki-commons-core/xwiki-commons-xml/src/main/java/org/xwiki/xml/XMLUtils.java
947e8921ebd95462d5a7928f397dd1b64f77c7d5
0
Analyze the following code function for security vulnerabilities
@UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553) boolean resolveAttrs(long themePtr, @AttrRes int defStyleAttr, @StyleRes int defStyleRes, @Nullable int[] inValues, @NonNull int[] inAttrs, @NonNull int[] outValues, @NonNull int[] outIndices) { Objects.requireNonNull(inAttrs, "inAttrs"); Objects.requireNonNull(outValues, "outValues"); Objects.requireNonNull(outIndices, "outIndices"); synchronized (this) { // Need to synchronize on AssetManager because we will be accessing // the native implementation of AssetManager. ensureValidLocked(); return nativeResolveAttrs(mObject, themePtr, defStyleAttr, defStyleRes, inValues, inAttrs, outValues, outIndices); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveAttrs File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
resolveAttrs
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public String getRealAssetsRootPath() { String realPath = Config.getStringProperty("ASSET_REAL_PATH"); if (UtilMethods.isSet(realPath) && !realPath.endsWith(java.io.File.separator)) realPath = realPath + java.io.File.separator; if (!UtilMethods.isSet(realPath)) return FileUtil.getRealPath(getRelativeAssetsRootPath()); else return realPath; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRealAssetsRootPath File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
getRealAssetsRootPath
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
private static void handleForwardError(String url, Exception exception, HttpServletResponse response) { debug.error("SAMLUtils.sendError: Exception occurred while trying to forward to resource: " + url, exception); try { response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, exception.getMessage()); } catch (IOException ioE) { debug.error("Failed to inform the response of caught exception", ioE); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleForwardError File: openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java Repository: OpenIdentityPlatform/OpenAM The code follows secure coding practices.
[ "CWE-287" ]
CVE-2023-37471
CRITICAL
9.8
OpenIdentityPlatform/OpenAM
handleForwardError
openam-federation/openam-federation-library/src/main/java/com/sun/identity/saml/common/SAMLUtils.java
7c18543d126e8a567b83bb4535631825aaa9d742
0
Analyze the following code function for security vulnerabilities
private RemoteViews makeCallLayout(int viewType) { final boolean isCollapsed = viewType == StandardTemplateParams.VIEW_TYPE_NORMAL; Bundle extras = mBuilder.mN.extras; CharSequence title = mPerson != null ? mPerson.getName() : null; CharSequence text = mBuilder.processLegacyText(extras.getCharSequence(EXTRA_TEXT)); if (text == null) { text = getDefaultText(); } // Bind standard template StandardTemplateParams p = mBuilder.mParams.reset() .viewType(viewType) .callStyleActions(true) .allowTextWithProgress(true) .hideLeftIcon(true) .hideRightIcon(true) .hideAppName(isCollapsed) .titleViewId(R.id.conversation_text) .title(title) .text(text) .summaryText(mBuilder.processLegacyText(mVerificationText)); mBuilder.mActions = getActionsListWithSystemActions(); final RemoteViews contentView; if (isCollapsed) { contentView = mBuilder.applyStandardTemplate( R.layout.notification_template_material_call, p, null /* result */); } else { contentView = mBuilder.applyStandardTemplateWithActions( R.layout.notification_template_material_big_call, p, null /* result */); } // Bind some extra conversation-specific header fields. if (!p.mHideAppName) { mBuilder.setTextViewColorSecondary(contentView, R.id.app_name_divider, p); contentView.setViewVisibility(R.id.app_name_divider, View.VISIBLE); } bindCallerVerification(contentView, p); // Bind some custom CallLayout properties contentView.setInt(R.id.status_bar_latest_event_content, "setLayoutColor", mBuilder.getSmallIconColor(p)); contentView.setInt(R.id.status_bar_latest_event_content, "setNotificationBackgroundColor", mBuilder.getBackgroundColor(p)); contentView.setIcon(R.id.status_bar_latest_event_content, "setLargeIcon", mBuilder.mN.mLargeIcon); contentView.setBundle(R.id.status_bar_latest_event_content, "setData", mBuilder.mN.extras); return contentView; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeCallLayout File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
makeCallLayout
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
public Optional<Lang> lang() { return Optional.ofNullable(this.lang); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: lang File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
lang
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
public boolean checkSaltedPassword(final String raw, final String encrypted) { return s_passwordEncryptor.checkPassword(raw, encrypted); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkSaltedPassword File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
checkSaltedPassword
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
private int jjMoveStringLiteralDfa2_1(long old0, long active0) { if (((active0 &= old0)) == 0L) return jjStartNfa_1(0, old0); try { curChar = input_stream.readChar(); } catch(java.io.IOException e) { jjStopStringLiteralDfa_1(1, active0); return 2; } switch(curChar) { case 100: if ((active0 & 0x40000000000L) != 0L) return jjStartNfaWithStates_1(2, 42, 6); else if ((active0 & 0x40000000000000L) != 0L) return jjStartNfaWithStates_1(2, 54, 6); break; case 108: return jjMoveStringLiteralDfa3_1(active0, 0x60000L); case 112: return jjMoveStringLiteralDfa3_1(active0, 0x200000000000L); case 115: return jjMoveStringLiteralDfa3_1(active0, 0x400000000000L); case 116: if ((active0 & 0x10000000000L) != 0L) return jjStartNfaWithStates_1(2, 40, 6); break; case 117: return jjMoveStringLiteralDfa3_1(active0, 0x10000L); case 118: if ((active0 & 0x10000000000000L) != 0L) return jjStartNfaWithStates_1(2, 52, 6); break; default : break; } return jjStartNfa_1(1, active0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jjMoveStringLiteralDfa2_1 File: impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java Repository: jakartaee/expression-language The code follows secure coding practices.
[ "CWE-917" ]
CVE-2021-28170
MEDIUM
5
jakartaee/expression-language
jjMoveStringLiteralDfa2_1
impl/src/main/java/com/sun/el/parser/ELParserTokenManager.java
b6a3943ac5fba71cbc6719f092e319caa747855b
0
Analyze the following code function for security vulnerabilities
void notifyTaskStackChangedLocked() { mHandler.removeMessages(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG); Message nmsg = mHandler.obtainMessage(NOTIFY_TASK_STACK_CHANGE_LISTENERS_MSG); mHandler.sendMessageDelayed(nmsg, NOTIFY_TASK_STACK_CHANGE_LISTENERS_DELAY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyTaskStackChangedLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
notifyTaskStackChangedLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void backgroundResourcesReleased(IBinder token) throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: backgroundResourcesReleased File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
backgroundResourcesReleased
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = SET_TIME_ZONE, conditional = true) public boolean setTimeZone(@Nullable ComponentName admin, String timeZone) { throwIfParentInstance("setTimeZone"); if (mService != null) { try { return mService.setTimeZone(admin, mContext.getPackageName(), timeZone); } catch (RemoteException e) { throw e.rethrowFromSystemServer(); } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setTimeZone File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setTimeZone
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public boolean startAsCaller(Activity activity, Bundle options, int userId) { final Intent intent = getBaseIntentToSend(); if (intent == null) { return false; } intent.setComponent(mChooserTarget.getComponentName()); intent.putExtras(mChooserTarget.getIntentExtras()); activity.startActivityAsCaller(intent, options, true, userId); return true; }
Vulnerability Classification: - CWE: CWE-254, CWE-19 - CVE: CVE-2016-3752 - Severity: HIGH - CVSS Score: 7.5 Description: Backport ChooserTarget package source check from N Fix a bug where a ChooserTargetService could supply a ChooserTarget pointing at a non-exported activity outside of its own package and have it launch. Bug 28384423 Change-Id: I3f5854f91c5695ad9253d71055ef58224df47008 Function: startAsCaller File: core/java/com/android/internal/app/ChooserActivity.java Repository: android Fixed Code: @Override public boolean startAsCaller(Activity activity, Bundle options, int userId) { final Intent intent = getBaseIntentToSend(); if (intent == null) { return false; } intent.setComponent(mChooserTarget.getComponentName()); intent.putExtras(mChooserTarget.getIntentExtras()); // Important: we will ignore the target security checks in ActivityManager // if and only if the ChooserTarget's target package is the same package // where we got the ChooserTargetService that provided it. This lets a // ChooserTargetService provide a non-exported or permission-guarded target // to the chooser for the user to pick. // // If mSourceInfo is null, we got this ChooserTarget from the caller or elsewhere // so we'll obey the caller's normal security checks. final boolean ignoreTargetSecurity = mSourceInfo != null && mSourceInfo.getResolvedComponentName().getPackageName() .equals(mChooserTarget.getComponentName().getPackageName()); activity.startActivityAsCaller(intent, options, ignoreTargetSecurity, userId); return true; }
[ "CWE-254", "CWE-19" ]
CVE-2016-3752
HIGH
7.5
android
startAsCaller
core/java/com/android/internal/app/ChooserActivity.java
ddbf2db5b946be8fdc45c7b0327bf560b2a06988
1
Analyze the following code function for security vulnerabilities
private Class<? extends XWikiAuthService> getAuthServiceClass() throws ClassNotFoundException { String authClass = getConfiguration().getProperty("xwiki.authentication.authclass"); if (StringUtils.isEmpty(authClass)) { if (isLDAP()) { authClass = "com.xpn.xwiki.user.impl.LDAP.XWikiLDAPAuthServiceImpl"; } else { authClass = "com.xpn.xwiki.user.impl.xwiki.XWikiAuthServiceImpl"; } } // Get main wiki ClassLoader ClassLoaderManager clManager = Utils.getComponent(ClassLoaderManager.class); ClassLoader classloader = null; if (clManager != null) { classloader = clManager.getURLClassLoader("wiki:xwiki", false); } // Get the class if (classloader != null) { return (Class<? extends XWikiAuthService>) Class.forName(authClass, true, classloader); } else { return (Class<? extends XWikiAuthService>) Class.forName(authClass); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthServiceClass File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
getAuthServiceClass
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
private boolean isBackgroundColorized(StandardTemplateParams p) { return p.allowColorization && mN.isColorized(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isBackgroundColorized File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
isBackgroundColorized
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public String getMessage() { return sb.toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessage File: web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-16643
LOW
3.5
94fzb/zrlog
getMessage
web/src/main/java/com/zrlog/web/plugin/WarUpdateVersionThread.java
4a91c83af669e31a22297c14f089d8911d353fa1
0
Analyze the following code function for security vulnerabilities
@Override public void setChunkedStreamingMode(Object connection, int bufferLen){ HttpURLConnection con = ((HttpURLConnection) connection); con.setChunkedStreamingMode(bufferLen); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setChunkedStreamingMode File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
setChunkedStreamingMode
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void migrateAutoTimezonePolicy() { Slogf.i(LOG_TAG, "Skipping Migration of AUTO_TIMEZONE policy to device policy engine," + "as no way to identify if the value was set by the admin or the user."); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateAutoTimezonePolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
migrateAutoTimezonePolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public boolean findNonExcludedChanges(SVNURL url, long from, long to, ISVNAuthenticationProvider authProvider) throws SVNException { if (from>to) return false; // empty revision range, meaning no change // if no exclusion rules are defined, don't waste time going through "svn log". if (!filter.hasExclusionRule()) return true; final SvnClientManager manager = createClientManager(authProvider); try { manager.getLogClient().doLog(url, null, SVNRevision.UNDEFINED, SVNRevision.create(from), // get log entries from the local revision + 1 SVNRevision.create(to), // to the remote revision false, // Don't stop on copy. true, // Report paths. false, // Don't included merged revisions 0, // Retrieve log entries for unlimited number of revisions. null, // Retrieve all revprops this); } finally { manager.dispose(); } return isChangesFound(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findNonExcludedChanges File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
findNonExcludedChanges
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
public static void listen(final Consumer<String[]> consumer) throws Exception { final ServerSocket listener = new ServerSocket(PORT); Runnable runnable = new Runnable() { @Override public void run() { while (true) { try (Socket socket = listener.accept(); ObjectInputStream ois = new FilterObjectInputStream(socket.getInputStream())) { // Receive args from another JD-GUI instance String[] args = (String[])ois.readObject(); consumer.accept(args); } catch (IOException|ClassNotFoundException e) { assert ExceptionUtil.printStackTrace(e); } } } }; new Thread(runnable).start(); }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-26235 - Severity: MEDIUM - CVSS Score: 6.1 Description: fix Function: listen File: app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java Repository: java-decompiler/jd-gui Fixed Code: public static void listen(final Consumer<String[]> consumer) throws Exception { final ServerSocket listener = new ServerSocket(PORT); Runnable runnable = new Runnable() { @Override public void run() { while (true) { try (Socket socket = listener.accept(); ObjectInputStream ois = new FilterObjectInputStream(socket.getInputStream())) { // Receive args from another JD-GUI instance String[] args = (String[]) ois.readObject(); for (String arg : args) { if (arg.toLowerCase().contains("<html>")) { throw new RuntimeException(String.format("evil arg: %s", arg)); } } consumer.accept(args); } catch (IOException | ClassNotFoundException e) { assert ExceptionUtil.printStackTrace(e); } } } }; new Thread(runnable).start(); }
[ "CWE-79" ]
CVE-2023-26235
MEDIUM
6.1
java-decompiler/jd-gui
listen
app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java
fbec621d9ff1ffadb97c5768f22bfa13e14c0ab7
1
Analyze the following code function for security vulnerabilities
public static byte[] compress(double[] input) throws IOException { return rawCompress(input, input.length * 8); // double uses 8 bytes }
Vulnerability Classification: - CWE: CWE-190 - CVE: CVE-2023-34454 - Severity: HIGH - CVSS Score: 7.5 Description: Merge pull request from GHSA-fjpj-2g6w-x25r * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * Fixed integer overflow by checking if bytesize is bigger than input length, then throwing exception * improved error messages by adding new error enum INPUT_TOO_LARGE in SnappyErrorCode.java, and added happy and sad cases in SnappyTest.java * fixed mispelling: validArrayInputLength --> isInvalidArrayInputLength * switched SnappyError into ILLEGAL_ARGUMENT in SnappyErrorCode.java and Snappy.java and fixed a typo in error comment * Fix buffer size boundary tests * Remove negative array size tests * updated comments for unit test --------- Co-authored-by: Taro L. Saito <leo@xerial.org> Function: compress File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java Fixed Code: public static byte[] compress(double[] input) throws IOException { int byteSize = input.length * 8; if (byteSize < input.length) { throw new SnappyError(SnappyErrorCode.TOO_LARGE_INPUT, "input array size is too large: " + input.length); } return rawCompress(input, byteSize); // double uses 8 bytes }
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
compress
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
1
Analyze the following code function for security vulnerabilities
@Override public long[] getProcessPss(int[] pids) { enforceNotIsolatedCaller("getProcessPss"); long[] pss = new long[pids.length]; for (int i=pids.length-1; i>=0; i--) { ProcessRecord proc; int oomAdj; synchronized (this) { synchronized (mPidsSelfLocked) { proc = mPidsSelfLocked.get(pids[i]); oomAdj = proc != null ? proc.setAdj : 0; } } long[] tmpUss = new long[1]; pss[i] = Debug.getPss(pids[i], tmpUss, null); if (proc != null) { synchronized (this) { if (proc.thread != null && proc.setAdj == oomAdj) { // Record this for posterity if the process has been stable. proc.baseProcessTracker.addPss(pss[i], tmpUss[0], false, proc.pkgList); } } } } return pss; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getProcessPss File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
getProcessPss
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private boolean isCMISResource(HttpServletRequest request) { return request.getRequestURI().contains(getApplicationURL() + "/cmis/"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCMISResource File: core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
isCMISResource
core-war/src/main/java/org/silverpeas/web/token/SessionSynchronizerTokenValidator.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
private boolean isGestureNavigateEnabled() { final int navigationMode = getContext().getResources().getInteger( com.android.internal.R.integer.config_navBarInteractionMode); return navigationMode == NAV_BAR_MODE_GESTURAL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isGestureNavigateEnabled File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
isGestureNavigateEnabled
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
@Override public void onAnimationUpdate(ValueAnimator animation) { mKeyguardStatusBarAnimateAlpha = (float) animation.getAnimatedValue(); updateHeaderKeyguardAlpha(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAnimationUpdate File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onAnimationUpdate
packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void taskBack(String procInsId, Map<String, Object> variables) { taskBack(getCurrentTask(procInsId), variables); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: taskBack File: src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java Repository: thinkgem/jeesite The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-34601
CRITICAL
9.8
thinkgem/jeesite
taskBack
src/main/java/com/thinkgem/jeesite/modules/act/service/ActTaskService.java
30750011b49f7c8d45d0f3ab13ed3a1a422655bb
0
Analyze the following code function for security vulnerabilities
public Map<DocumentReference, List<BaseObject>> getXObjects() { return this.xObjects; }
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2023-26470 - Severity: HIGH - CVSS Score: 7.5 Description: XWIKI-19223: Improve xobject memory storage in XWikidocument Function: getXObjects File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform Fixed Code: public Map<DocumentReference, List<BaseObject>> getXObjects() { return (Map) this.xObjects; }
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getXObjects
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
1
Analyze the following code function for security vulnerabilities
public <T extends AccessibleObject> T openAccess(T object) { checkTrusted(); Root.OpenAccess.openAccess0(object, true); return object; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openAccess File: api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java Repository: Karlatemp/UnsafeAccessor The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-31139
MEDIUM
4.3
Karlatemp/UnsafeAccessor
openAccess
api/src/main/java/io/github/karlatemp/unsafeaccessor/UnsafeAccess.java
4ef83000184e8f13239a1ea2847ee401d81585fd
0
Analyze the following code function for security vulnerabilities
@NonNull public BigPictureStyle bigPicture(@Nullable Icon icon) { mPictureIcon = icon; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bigPicture File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
bigPicture
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
@Override public void setAnimationScale(int which, float scale) { if (!checkCallingPermission(android.Manifest.permission.SET_ANIMATION_SCALE, "setAnimationScale()")) { throw new SecurityException("Requires SET_ANIMATION_SCALE permission"); } scale = fixScale(scale); switch (which) { case 0: mWindowAnimationScaleSetting = scale; break; case 1: mTransitionAnimationScaleSetting = scale; break; case 2: mAnimatorDurationScaleSetting = scale; break; } // Persist setting mH.sendEmptyMessage(H.PERSIST_ANIMATION_SCALE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAnimationScale File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setAnimationScale
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public ServerBuilder clientAddressMapper( Function<? super ProxiedAddresses, ? extends InetSocketAddress> clientAddressMapper) { this.clientAddressMapper = requireNonNull(clientAddressMapper, "clientAddressMapper"); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clientAddressMapper File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
clientAddressMapper
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
private WikiDescriptorManager getWikiDescriptorManager() { if (this.wikiDescriptorManager == null) { this.wikiDescriptorManager = Utils.getComponent(WikiDescriptorManager.class); } return this.wikiDescriptorManager; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWikiDescriptorManager File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
getWikiDescriptorManager
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public <T> T getConfig(String platform, Class<T> clazz) { String config = getPlatformConfig(platform); if (StringUtils.isBlank(config)) { MSException.throwException("配置为空"); } return JSON.parseObject(config, clazz); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConfig File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
getConfig
test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
private void migrate59(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("Settings.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { if (element.elementTextTrim("key").equals("MAIL")) { Element valueElement = element.element("value"); if (valueElement != null) { valueElement.element("sendAsHtml").detach(); Element senderAddressElement = valueElement.element("senderAddress"); if (senderAddressElement != null) { senderAddressElement.setName("emailAddress"); } else { String hostName; try { hostName = InetAddress.getLocalHost().getHostName(); } catch (UnknownHostException e) { hostName = "localhost"; } valueElement.addElement("emailAddress").setText("onedev@" + hostName); } } } } dom.writeToFile(file, false); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate59 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate59
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
public boolean isTitleInCompatibilityMode() { return "1".equals(getConfiguration().getProperty("xwiki.title.compatibility", "0")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isTitleInCompatibilityMode File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
isTitleInCompatibilityMode
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0