instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
private void elideTrailingComma(int closeBracketPos) { // The content before closeBracketPos is stored in two places. // 1. sanitizedJson // 2. jsonish.substring(cleaned, closeBracketPos) // We walk over whitespace characters in both right-to-left looking for a // comma. for (int i = closeBracketPos; --i >= cleaned;) { switch (jsonish.charAt(i)) { case '\t': case '\n': case '\r': case ' ': continue; case ',': elide(i, i+1); return; default: throw new AssertionError("" + jsonish.charAt(i)); } } assert sanitizedJson != null; for (int i = sanitizedJson.length(); --i >= 0;) { switch (sanitizedJson.charAt(i)) { case '\t': case '\n': case '\r': case ' ': continue; case ',': sanitizedJson.setLength(i); return; default: throw new AssertionError("" + sanitizedJson.charAt(i)); } } throw new AssertionError( "Trailing comma not found in " + jsonish + " or " + sanitizedJson); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: elideTrailingComma File: src/main/java/com/google/json/JsonSanitizer.java Repository: OWASP/json-sanitizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-13973
MEDIUM
4.3
OWASP/json-sanitizer
elideTrailingComma
src/main/java/com/google/json/JsonSanitizer.java
53ceaac3e0a10e86d512ce96a0056578f2d1978f
0
Analyze the following code function for security vulnerabilities
private Response sendRequest(String method, Invocation.Builder invocationBuilder, Entity<?> entity) { Response response; if ("POST".equals(method)) { response = invocationBuilder.post(entity); } else if ("PUT".equals(method)) { response = invocationBuilder.put(entity); } else if ("DELETE".equals(method)) { response = invocationBuilder.method("DELETE", entity); } else if ("PATCH".equals(method)) { response = invocationBuilder.method("PATCH", entity); } else { response = invocationBuilder.method(method); } return response; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendRequest File: samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
sendRequest
samples/client/petstore/java/okhttp-gson/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private void completeCloningAccount(IAccountManagerResponse response, final Bundle accountCredentials, final Account account, final UserAccounts targetUser, final int parentUserId){ Bundle.setDefusable(accountCredentials, true); final long id = clearCallingIdentity(); try { new Session(targetUser, response, account.type, false, false /* stripAuthTokenFromResult */, account.name, false /* authDetailsRequired */) { @Override protected String toDebugString(long now) { return super.toDebugString(now) + ", getAccountCredentialsForClone" + ", " + account.type; } @Override public void run() throws RemoteException { // Confirm that the owner's account still exists before this step. for (Account acc : getAccounts(parentUserId, mContext.getOpPackageName())) { if (acc.equals(account)) { mAuthenticator.addAccountFromCredentials( this, account, accountCredentials); break; } } } @Override public void onResult(Bundle result) { Bundle.setDefusable(result, true); // TODO: Anything to do if if succedded? // TODO: If it failed: Show error notification? Should we remove the shadow // account to avoid retries? // TODO: what we do with the visibility? super.onResult(result); } @Override public void onError(int errorCode, String errorMessage) { super.onError(errorCode, errorMessage); // TODO: Show error notification to user // TODO: Should we remove the shadow account so that it doesn't keep trying? } }.bind(); } finally { restoreCallingIdentity(id); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: completeCloningAccount File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
completeCloningAccount
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
public void handleFrame(Frame frame) throws IOException { AMQCommand command = _command; if (command.handleFrame(frame)) { // a complete command has rolled off the assembly line _command = new AMQCommand(); // prepare for the next one handleCompleteInboundCommand(command); } }
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2023-46120 - Severity: HIGH - CVSS Score: 7.5 Description: Add max inbound message size to ConnectionFactory To avoid OOM with a very large message. The default value is 64 MiB. Fixes #1062 (cherry picked from commit 9ed45fde52224ec74fc523321efdf9a157d5cfca) Function: handleFrame File: src/main/java/com/rabbitmq/client/impl/AMQChannel.java Repository: rabbitmq/rabbitmq-java-client Fixed Code: public void handleFrame(Frame frame) throws IOException { AMQCommand command = _command; if (command.handleFrame(frame)) { // a complete command has rolled off the assembly line _command = new AMQCommand(this.maxInboundMessageBodySize); // prepare for the next one handleCompleteInboundCommand(command); } }
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
handleFrame
src/main/java/com/rabbitmq/client/impl/AMQChannel.java
714aae602dcae6cb4b53cadf009323ebac313cc8
1
Analyze the following code function for security vulnerabilities
public void onAuthenticationHelp(int helpCode, CharSequence helpString) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onAuthenticationHelp File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
onAuthenticationHelp
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
public String getAuthenticatorId() { return authenticatorId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAuthenticatorId File: base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
getAuthenticatorId
base/common/src/main/java/com/netscape/certsrv/profile/ProfileData.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static void removeChildren(Node e) { NodeList list = e.getChildNodes(); for (int i = 0; i < list.getLength(); i++) { Node n = list.item(i); e.removeChild(n); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeChildren File: src/edu/stanford/nlp/time/XMLUtils.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3869
MEDIUM
5
stanfordnlp/CoreNLP
removeChildren
src/edu/stanford/nlp/time/XMLUtils.java
5d83f1e8482ca304db8be726cad89554c88f136a
0
Analyze the following code function for security vulnerabilities
public Map<Integer, String> getRequiredProtoPortMap() { return mRequiredProtoPortMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequiredProtoPortMap File: framework/java/android/net/wifi/hotspot2/pps/Policy.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21240
MEDIUM
5.5
android
getRequiredProtoPortMap
framework/java/android/net/wifi/hotspot2/pps/Policy.java
69119d1d3102e27b6473c785125696881bce9563
0
Analyze the following code function for security vulnerabilities
public static String uncompressString(byte[] input, int offset, int length, String encoding) throws IOException, UnsupportedEncodingException { byte[] uncompressed = new byte[uncompressedLength(input, offset, length)]; uncompress(input, offset, length, uncompressed, 0); return new String(uncompressed, encoding); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uncompressString File: src/main/java/org/xerial/snappy/Snappy.java Repository: xerial/snappy-java The code follows secure coding practices.
[ "CWE-190" ]
CVE-2023-34454
HIGH
7.5
xerial/snappy-java
uncompressString
src/main/java/org/xerial/snappy/Snappy.java
d0042551e4a3509a725038eb9b2ad1f683674d94
0
Analyze the following code function for security vulnerabilities
@Override public void getMemoryInfo(ActivityManager.MemoryInfo outInfo) { mProcessList.getMemoryInfo(outInfo); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMemoryInfo File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getMemoryInfo
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static String getCurrentDescriptorByNameUrl() { StaplerRequest req = Stapler.getCurrentRequest(); // this override allows RenderOnDemandClosure to preserve the proper value Object url = req.getAttribute("currentDescriptorByNameUrl"); if (url!=null) return url.toString(); Ancestor a = req.findAncestor(DescriptorByNameOwner.class); return a.getUrl(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCurrentDescriptorByNameUrl File: core/src/main/java/hudson/model/Descriptor.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
getCurrentDescriptorByNameUrl
core/src/main/java/hudson/model/Descriptor.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
private void updateFingerprintListeningState() { boolean shouldListenForFingerprint = shouldListenForFingerprint(); if (mFingerprintRunningState == FINGERPRINT_STATE_RUNNING && !shouldListenForFingerprint) { stopListeningForFingerprint(); } else if (mFingerprintRunningState != FINGERPRINT_STATE_RUNNING && shouldListenForFingerprint) { startListeningForFingerprint(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateFingerprintListeningState File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
updateFingerprintListeningState
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
@Override public boolean addOneIntentFilterVerification(int verifierUid, int userId, int verificationId, ActivityIntentInfo filter, String packageName) { if (!hasValidDomains(filter)) { return false; } IntentFilterVerificationState ivs = mIntentFilterVerificationStates.get(verificationId); if (ivs == null) { ivs = createDomainVerificationState(verifierUid, userId, verificationId, packageName); } if (DEBUG_DOMAIN_VERIFICATION) { Slog.d(TAG, "Adding verification filter for " + packageName + " : " + filter); } ivs.addFilter(filter); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addOneIntentFilterVerification File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
addOneIntentFilterVerification
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public static AsciiString of(AsciiString name) { final AsciiString lowerCased = name.toLowerCase(); final AsciiString cached = map.get(lowerCased); return cached != null ? cached : lowerCased; }
Vulnerability Classification: - CWE: CWE-74 - CVE: CVE-2019-16771 - Severity: MEDIUM - CVSS Score: 5.0 Description: Merge pull request from GHSA-35fr-h7jr-hh86 Motivation: An `HttpService` can produce a malformed HTTP response when a user specified a malformed HTTP header values, such as: ResponseHeaders.of(HttpStatus.OK "my-header", "foo\r\nbad-header: bar"); Modification: - Add strict header value validation to `HttpHeadersBase` - Add strict header name validation to `HttpHeaderNames.of()`, which is used by `HttpHeadersBase`. Result: - It is not possible anymore to send a bad header value which can be misused for sending additional headers or injecting arbitrary content. Function: of File: core/src/main/java/com/linecorp/armeria/common/HttpHeaderNames.java Repository: line/armeria Fixed Code: public static AsciiString of(AsciiString name) { final AsciiString lowerCased = name.toLowerCase(); final AsciiString cached = map.get(lowerCased); if (cached != null) { return cached; } return validate(lowerCased); }
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
of
core/src/main/java/com/linecorp/armeria/common/HttpHeaderNames.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
1
Analyze the following code function for security vulnerabilities
@Override public void visit(Material material, Revision revision) { material.toJson(materialJson, revision); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: visit File: server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java Repository: gocd The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-28629
MEDIUM
5.4
gocd
visit
server/src/main/java/com/thoughtworks/go/server/presentation/models/MaterialRevisionsJsonBuilder.java
95f758229d419411a38577608709d8552cccf193
0
Analyze the following code function for security vulnerabilities
@Override public int update(Uri uri, ContentValues values, String where, String[] whereArgs) { if (DEBUG) { Slog.v(LOG_TAG, "update() for user: " + UserHandle.getCallingUserId()); } Arguments args = new Arguments(uri, where, whereArgs, false); // If a legacy table that is gone, done. if (REMOVED_LEGACY_TABLES.contains(args.table)) { return 0; } String name = values.getAsString(Settings.Secure.NAME); if (!isKeyValid(name)) { return 0; } String value = values.getAsString(Settings.Secure.VALUE); switch (args.table) { case TABLE_GLOBAL: { final int userId = UserHandle.getCallingUserId(); return updateGlobalSetting(args.name, value, null, false, userId, false) ? 1 : 0; } case TABLE_SECURE: { final int userId = UserHandle.getCallingUserId(); return updateSecureSetting(args.name, value, null, false, userId, false) ? 1 : 0; } case TABLE_SYSTEM: { final int userId = UserHandle.getCallingUserId(); return updateSystemSetting(args.name, value, userId) ? 1 : 0; } default: { throw new IllegalArgumentException("Invalid Uri path:" + uri); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: update File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
update
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
public List<SearchHit> getRelatedItems(String identifierField) throws PresentationException, IndexUnreachableException, DAOException, ViewerConfigurationException { logger.trace("getRelatedItems: {}", identifierField); if (identifierField == null) { return null; } if (viewManager == null) { return null; } String query = getRelatedItemsQueryString(identifierField); if (query == null) { return null; } List<SearchHit> ret = SearchHelper.searchWithAggregation(query, 0, SolrSearchIndex.MAX_HITS, null, null, null, null, null, null, navigationHelper.getLocale(), 0); logger.trace("{} related items found", ret.size()); return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRelatedItems File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getRelatedItems
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
private static DashboardCategory createCategory(Context context, String categoryKey) { DashboardCategory category = new DashboardCategory(); category.key = categoryKey; PackageManager pm = context.getPackageManager(); List<ResolveInfo> results = pm.queryIntentActivities(new Intent(categoryKey), 0); if (results.size() == 0) { return null; } for (ResolveInfo resolved : results) { if (!resolved.system) { // Do not allow any app to add to settings, only system ones. continue; } category.title = resolved.activityInfo.loadLabel(pm); category.priority = SETTING_PKG.equals( resolved.activityInfo.applicationInfo.packageName) ? resolved.priority : 0; if (DEBUG) Log.d(LOG_TAG, "Adding category " + category.title); } return category; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createCategory File: packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
createCategory
packages/SettingsLib/src/com/android/settingslib/drawer/TileUtils.java
e206f02d46ae5e38c74d138b51f6e1637e261abe
0
Analyze the following code function for security vulnerabilities
public void setMode(Mode m) throws IOException { this.mode = m; save(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setMode File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
setMode
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public void writeByte(byte b) throws TException { buffer[0] = b; trans_.write(buffer, 0, 1); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeByte File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
writeByte
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TBinaryProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@Override public synchronized void flush() throws IOException { out.flush(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: flush File: android/guava/src/com/google/common/io/FileBackedOutputStream.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
flush
android/guava/src/com/google/common/io/FileBackedOutputStream.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
private boolean isRoamingBetweenOperators(boolean cdmaRoaming, ServiceState s) { String spn = ((TelephonyManager) mPhone.getContext(). getSystemService(Context.TELEPHONY_SERVICE)). getSimOperatorNameForPhone(mPhoneBase.getPhoneId()); // NOTE: in case of RUIM we should completely ignore the ERI data file and // mOperatorAlphaLong is set from RIL_REQUEST_OPERATOR response 0 (alpha ONS) String onsl = s.getVoiceOperatorAlphaLong(); String onss = s.getVoiceOperatorAlphaShort(); boolean equalsOnsl = onsl != null && spn != null && !spn.isEmpty() && spn.equals(onsl); boolean equalsOnss = onss != null && spn != null && !spn.isEmpty() && spn.equals(onss); return cdmaRoaming && !(equalsOnsl || equalsOnss); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isRoamingBetweenOperators File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
isRoamingBetweenOperators
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
@Override public void onLlcpFirstPacketReceived(NfcDepEndpoint device) { sendMessage(NfcService.MSG_LLCP_LINK_FIRST_PACKET, device); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onLlcpFirstPacketReceived File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
onLlcpFirstPacketReceived
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Nullable @Override public final Float getFloat(CharSequence name) { final String v = get(name); return toFloat(v); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getFloat File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
getFloat
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@Override public boolean supportsResetOp(int op) { return op == AppOpsManager.OP_INTERACT_ACROSS_PROFILES && LocalServices.getService(CrossProfileAppsInternal.class) != null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: supportsResetOp File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
supportsResetOp
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private ProcessStartResult startProcess(String hostingType, String entryPoint, ProcessRecord app, int uid, int[] gids, int runtimeFlags, int mountExternal, String seInfo, String requiredAbi, String instructionSet, String invokeWith, long startTime) { try { Trace.traceBegin(Trace.TRACE_TAG_ACTIVITY_MANAGER, "Start proc: " + app.processName); checkTime(startTime, "startProcess: asking zygote to start proc"); final ProcessStartResult startResult; if (hostingType.equals("webview_service")) { startResult = startWebView(entryPoint, app.processName, uid, uid, gids, runtimeFlags, mountExternal, app.info.targetSdkVersion, seInfo, requiredAbi, instructionSet, app.info.dataDir, null, new String[] {PROC_START_SEQ_IDENT + app.startSeq}); } else { startResult = Process.start(entryPoint, app.processName, uid, uid, gids, runtimeFlags, mountExternal, app.info.targetSdkVersion, seInfo, requiredAbi, instructionSet, app.info.dataDir, invokeWith, new String[] {PROC_START_SEQ_IDENT + app.startSeq}); } checkTime(startTime, "startProcess: returned from zygote!"); return startResult; } finally { Trace.traceEnd(Trace.TRACE_TAG_ACTIVITY_MANAGER); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startProcess File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
startProcess
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
private boolean isInitialized(UserInfo user) { return (user.flags & UserInfo.FLAG_INITIALIZED) != 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isInitialized File: src/com/android/settings/users/UserSettings.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3889
HIGH
7.2
android
isInitialized
src/com/android/settings/users/UserSettings.java
bd5d5176c74021e8cf4970f93f273ba3023c3d72
0
Analyze the following code function for security vulnerabilities
private void performUpgradeLocked(int fromVersion) { if (fromVersion < CURRENT_VERSION) { Slog.v(TAG, "Upgrading widget database from " + fromVersion + " to " + CURRENT_VERSION); } int version = fromVersion; // Update 1: keyguard moved from package "android" to "com.android.keyguard" if (version == 0) { HostId oldHostId = new HostId(Process.myUid(), KEYGUARD_HOST_ID, OLD_KEYGUARD_HOST_PACKAGE); Host host = lookupHostLocked(oldHostId); if (host != null) { final int uid = getUidForPackage(NEW_KEYGUARD_HOST_PACKAGE, UserHandle.USER_OWNER); if (uid >= 0) { host.id = new HostId(uid, KEYGUARD_HOST_ID, NEW_KEYGUARD_HOST_PACKAGE); } } version = 1; } if (version != CURRENT_VERSION) { throw new IllegalStateException("Failed to upgrade widget database"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: performUpgradeLocked File: services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-1541
MEDIUM
4.3
android
performUpgradeLocked
services/appwidget/java/com/android/server/appwidget/AppWidgetServiceImpl.java
0b98d304c467184602b4c6bce76fda0b0274bc07
0
Analyze the following code function for security vulnerabilities
@Override public short getShort(CharSequence name, short defaultValue) { return headers.getShort(name, defaultValue); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShort File: codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-444" ]
CVE-2021-43797
MEDIUM
4.3
netty
getShort
codec-http/src/main/java/io/netty/handler/codec/http/DefaultHttpHeaders.java
07aa6b5938a8b6ed7a6586e066400e2643897323
0
Analyze the following code function for security vulnerabilities
@POST @Path("assessment/{nodeId}") @Operation(summary = "Update an assessment building block", description = "Updates an assessment building block") @ApiResponse(responseCode = "200", description = "The course node metadatas", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = CourseNodeVO.class)), @Content(mediaType = "application/xml", schema = @Schema(implementation = CourseNodeVO.class)) }) @ApiResponse(responseCode = "401", description = "The roles of the authenticated user are not sufficient") @ApiResponse(responseCode = "404", description = "The course or parentNode not found") @Consumes(MediaType.APPLICATION_FORM_URLENCODED) @Produces({MediaType.APPLICATION_XML, MediaType.APPLICATION_JSON}) public Response updateAssessment(@PathParam("courseId") Long courseId, @PathParam("nodeId") String nodeId, @FormParam("shortTitle") @DefaultValue("undefined") String shortTitle, @FormParam("longTitle") @DefaultValue("undefined") String longTitle, @FormParam("objectives") @DefaultValue("undefined") String objectives, @FormParam("visibilityExpertRules") String visibilityExpertRules, @FormParam("accessExpertRules") String accessExpertRules, @Context HttpServletRequest request) { AssessmentCustomConfig config = new AssessmentCustomConfig(); return update(courseId, nodeId, shortTitle, longTitle, objectives, visibilityExpertRules, accessExpertRules, config, request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateAssessment File: src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
updateAssessment
src/main/java/org/olat/restapi/repository/course/CourseElementWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
boolean setKeepClearAreas(List<Rect> restricted, List<Rect> unrestricted) { final boolean newRestrictedAreas = !mKeepClearAreas.equals(restricted); final boolean newUnrestrictedAreas = !mUnrestrictedKeepClearAreas.equals(unrestricted); if (!newRestrictedAreas && !newUnrestrictedAreas) { return false; } if (newRestrictedAreas) { mKeepClearAreas.clear(); mKeepClearAreas.addAll(restricted); } if (newUnrestrictedAreas) { mUnrestrictedKeepClearAreas.clear(); mUnrestrictedKeepClearAreas.addAll(unrestricted); } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeepClearAreas File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
setKeepClearAreas
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private User loadUserById(String userId) { final User user = userManagementService.loadById(userId); if (user == null) { throw new NotFoundException("Couldn't find user with ID <" + userId + ">"); } return user; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: loadUserById File: graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-613" ]
CVE-2023-41041
LOW
3.1
Graylog2/graylog2-server
loadUserById
graylog2-server/src/main/java/org/graylog2/rest/resources/users/UsersResource.java
bb88f3d0b2b0351669ab32c60b595ab7242a3fe3
0
Analyze the following code function for security vulnerabilities
@Override public void removeContentProvider(IBinder connection, boolean stable) { mCpHelper.removeContentProvider(connection, stable); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeContentProvider File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
removeContentProvider
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
void createNewUserLILPw(int userHandle) { if (mInstaller != null) { mInstaller.createUserConfig(userHandle); mSettings.createNewUserLILPw(this, mInstaller, userHandle); applyFactoryDefaultBrowserLPw(userHandle); primeDomainVerificationsLPw(userHandle); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createNewUserLILPw File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
createNewUserLILPw
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
@Beta public static void copy(File from, File to) throws IOException { checkArgument(!from.equals(to), "Source %s and destination %s must be different", from, to); asByteSource(from).copyTo(asByteSink(to)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copy File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-8908
LOW
2.1
google/guava
copy
guava/src/com/google/common/io/Files.java
fec0dbc4634006a6162cfd4d0d09c962073ddf40
0
Analyze the following code function for security vulnerabilities
protected void onNextButtonClick(View view) { handleRightButton(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNextButtonClick File: src/com/android/settings/password/ChooseLockPattern.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onNextButtonClick
src/com/android/settings/password/ChooseLockPattern.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public boolean isCurrentUserPage(XWikiContext context) { DocumentReference userReference = context.getUserReference(); if (userReference == null) { return false; } return userReference.equals(getDocumentReference()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCurrentUserPage File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
isCurrentUserPage
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private IMountService getMountService() { final IBinder service = ServiceManager.getService("mount"); if (service != null) { return IMountService.Stub.asInterface(service); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMountService File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
getMountService
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
public Form<T> withGlobalError(final String error, final List<Object> args) { return withError("", error, args); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: withGlobalError File: web/play-java-forms/src/main/java/play/data/Form.java Repository: playframework The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-31018
MEDIUM
5
playframework
withGlobalError
web/play-java-forms/src/main/java/play/data/Form.java
15393b736df939e35e275af2347155f296c684f2
0
Analyze the following code function for security vulnerabilities
@Override public Object parseMessageFromBytes( ByteString bytes, ExtensionRegistryLite registry, Descriptors.FieldDescriptor field, Message defaultInstance) throws IOException { Message.Builder subBuilder = defaultInstance.newBuilderForType(); if (!field.isRepeated()) { Message originalMessage = (Message) getField(field); if (originalMessage != null) { subBuilder.mergeFrom(originalMessage); } } subBuilder.mergeFrom(bytes, registry); return subBuilder.buildPartial(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseMessageFromBytes File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
parseMessageFromBytes
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
public void addCookie(Cookie[] cookiesArray, boolean addToWebViewCookieManager){ addCookie(cookiesArray, addToWebViewCookieManager, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addCookie File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
addCookie
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
private void clearDeviceOwnerUserRestriction(UserHandle userHandle) { if (isHeadlessFlagEnabled()) { for (int userId : mUserManagerInternal.getUserIds()) { UserHandle user = UserHandle.of(userId); // ManagedProvisioning/DPC sets DISALLOW_ADD_USER. Clear to recover to the // original state if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_USER, user)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_USER, false, user); } // When a device owner is set, the system automatically restricts adding a // managed profile. // Remove this restriction when the device owner is cleared. if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_MANAGED_PROFILE, user)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_MANAGED_PROFILE, false, user); } // When a device owner is set, the system automatically restricts adding a // clone profile. // Remove this restriction when the device owner is cleared. if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_CLONE_PROFILE, user)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_CLONE_PROFILE, false, user); } } } else { // ManagedProvisioning/DPC sets DISALLOW_ADD_USER. Clear to recover to the original state if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_USER, userHandle)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_USER, false, userHandle); } // When a device owner is set, the system automatically restricts adding a // managed profile. // Remove this restriction when the device owner is cleared. if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_MANAGED_PROFILE, userHandle)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_MANAGED_PROFILE, false, userHandle); } // When a device owner is set, the system automatically restricts adding a clone // profile. // Remove this restriction when the device owner is cleared. if (mUserManager.hasUserRestriction(UserManager.DISALLOW_ADD_CLONE_PROFILE, userHandle)) { mUserManager.setUserRestriction(UserManager.DISALLOW_ADD_CLONE_PROFILE, false, userHandle); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearDeviceOwnerUserRestriction File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
clearDeviceOwnerUserRestriction
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private String getDocumentVersionQueryString(DocumentReference documentReference, XWikiContext context) { return "docVersion=" + sanitize(getDocumentVersion(documentReference, context)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDocumentVersionQueryString File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
getDocumentVersionQueryString
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractDocumentSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@Override public int hashCode() { return subDirectory.hashCode(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hashCode File: common/src/main/java/com/thoughtworks/go/domain/FolderDirectoryEntry.java Repository: gocd The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-43288
LOW
3.5
gocd
hashCode
common/src/main/java/com/thoughtworks/go/domain/FolderDirectoryEntry.java
f5c1d2aa9ab302a97898a6e4b16218e64fe8e9e4
0
Analyze the following code function for security vulnerabilities
private boolean setActiveAdminAndDeviceOwner( @UserIdInt int userId, ComponentName adminComponent, String name) { enableAndSetActiveAdmin(userId, userId, adminComponent); // TODO(b/178187130): Directly set DO and remove the check once silent provisioning is no // longer used. if (getDeviceOwnerComponent(/* callingUserOnly= */ true) == null) { return setDeviceOwner(adminComponent, name, userId, /* setProfileOwnerOnCurrentUserIfNecessary= */ true); } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setActiveAdminAndDeviceOwner File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setActiveAdminAndDeviceOwner
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Deprecated public List<String> getChildren(XWikiContext context) throws XWikiException { return getChildren(0, 0, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChildren File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getChildren
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
public Map<String, String> getOptions() { return Collections.unmodifiableMap(options); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOptions File: jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java Repository: geosolutions-it/jai-ext The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-24816
HIGH
7.5
geosolutions-it/jai-ext
getOptions
jt-jiffle/jt-jiffle-language/src/main/java/it/geosolutions/jaiext/jiffle/parser/node/Script.java
cb1d6565d38954676b0a366da4f965fef38da1cb
0
Analyze the following code function for security vulnerabilities
public void setConfigFile(final String configFile) { this.configFile = configFile; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setConfigFile File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding practices.
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
setConfigFile
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
@Override public XDOM getXDOM() { if (this.xdomCache == null) { try { this.xdomCache = parseContent(getContent()); } catch (XWikiException e) { ErrorBlockGenerator errorBlockGenerator = Utils.getComponent(ErrorBlockGenerator.class); return new XDOM(errorBlockGenerator.generateErrorBlocks(false, TM_FAILEDDOCUMENTPARSE, "Failed to parse document content", null, e)); } } return this.xdomCache.clone(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXDOM File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getXDOM
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
@Override public void render(HtmlRenderer renderer) { if (isArtifactsDeleted || isEmpty()) { HtmlElement element = p().content("Artifacts for this job instance are unavailable as they may have been <a href='" + CurrentGoCDVersion.docsUrl("configuration/delete_artifacts.html") + "' target='blank'>purged by Go</a> or deleted externally. " + "Re-run the stage or job to generate them again."); element.render(renderer); } for (DirectoryEntry entry : this) { entry.toHtml().render(renderer); } }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2021-43288 - Severity: LOW - CVSS Score: 3.5 Description: #000 - Escape filenames in artifact tab Function: render File: common/src/main/java/com/thoughtworks/go/domain/DirectoryEntries.java Repository: gocd Fixed Code: @Override public void render(HtmlRenderer renderer) { if (isArtifactsDeleted || isEmpty()) { HtmlElement element = p().unsafecontent("Artifacts for this job instance are unavailable as they may have been <a href='" + CurrentGoCDVersion.docsUrl("configuration/delete_artifacts.html") + "' target='blank'>purged by Go</a> or deleted externally. " + "Re-run the stage or job to generate them again."); element.render(renderer); } for (DirectoryEntry entry : this) { entry.toHtml().render(renderer); } }
[ "CWE-79" ]
CVE-2021-43288
LOW
3.5
gocd
render
common/src/main/java/com/thoughtworks/go/domain/DirectoryEntries.java
f5c1d2aa9ab302a97898a6e4b16218e64fe8e9e4
1
Analyze the following code function for security vulnerabilities
void mergeConference(Call call) { final String callId = mCallIdMapper.getCallId(call); if (callId != null && isServiceValid("mergeConference")) { try { logOutgoing("mergeConference %s", callId); mServiceInterface.mergeConference(callId, Log.getExternalSession(TELECOM_ABBREVIATION)); } catch (RemoteException ignored) { } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeConference File: src/com/android/server/telecom/ConnectionServiceWrapper.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
mergeConference
src/com/android/server/telecom/ConnectionServiceWrapper.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
private static native Object newInstance(Class<?> instantiationClass, long methodId);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: newInstance File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
newInstance
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public void setStringValue(EntityReference classReference, String fieldName, String value) { BaseObject bobject = prepareXObject(classReference); bobject.setStringValue(fieldName, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStringValue File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
setStringValue
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
RestorePolicy readAppManifest(FileMetadata info, InputStream instream) throws IOException { // Fail on suspiciously large manifest files if (info.size > 64 * 1024) { throw new IOException("Restore manifest too big; corrupt? size=" + info.size); } byte[] buffer = new byte[(int) info.size]; if (readExactly(instream, buffer, 0, (int)info.size) == info.size) { mBytes += info.size; } else throw new IOException("Unexpected EOF in manifest"); RestorePolicy policy = RestorePolicy.IGNORE; String[] str = new String[1]; int offset = 0; try { offset = extractLine(buffer, offset, str); int version = Integer.parseInt(str[0]); if (version == BACKUP_MANIFEST_VERSION) { offset = extractLine(buffer, offset, str); String manifestPackage = str[0]; // TODO: handle <original-package> if (manifestPackage.equals(info.packageName)) { offset = extractLine(buffer, offset, str); version = Integer.parseInt(str[0]); // app version offset = extractLine(buffer, offset, str); // This is the platform version, which we don't use, but we parse it // as a safety against corruption in the manifest. Integer.parseInt(str[0]); offset = extractLine(buffer, offset, str); info.installerPackageName = (str[0].length() > 0) ? str[0] : null; offset = extractLine(buffer, offset, str); boolean hasApk = str[0].equals("1"); offset = extractLine(buffer, offset, str); int numSigs = Integer.parseInt(str[0]); if (numSigs > 0) { Signature[] sigs = new Signature[numSigs]; for (int i = 0; i < numSigs; i++) { offset = extractLine(buffer, offset, str); sigs[i] = new Signature(str[0]); } mManifestSignatures.put(info.packageName, sigs); // Okay, got the manifest info we need... try { PackageInfo pkgInfo = mPackageManager.getPackageInfo( info.packageName, PackageManager.GET_SIGNATURES); // Fall through to IGNORE if the app explicitly disallows backup final int flags = pkgInfo.applicationInfo.flags; if ((flags & ApplicationInfo.FLAG_ALLOW_BACKUP) != 0) { // Restore system-uid-space packages only if they have // defined a custom backup agent if ((pkgInfo.applicationInfo.uid >= Process.FIRST_APPLICATION_UID) || (pkgInfo.applicationInfo.backupAgentName != null)) { // Verify signatures against any installed version; if they // don't match, then we fall though and ignore the data. The // signatureMatch() method explicitly ignores the signature // check for packages installed on the system partition, because // such packages are signed with the platform cert instead of // the app developer's cert, so they're different on every // device. if (signaturesMatch(sigs, pkgInfo)) { if (pkgInfo.versionCode >= version) { Slog.i(TAG, "Sig + version match; taking data"); policy = RestorePolicy.ACCEPT; } else { // The data is from a newer version of the app than // is presently installed. That means we can only // use it if the matching apk is also supplied. Slog.d(TAG, "Data version " + version + " is newer than installed version " + pkgInfo.versionCode + " - requiring apk"); policy = RestorePolicy.ACCEPT_IF_APK; } } else { Slog.w(TAG, "Restore manifest signatures do not match " + "installed application for " + info.packageName); } } else { Slog.w(TAG, "Package " + info.packageName + " is system level with no agent"); } } else { if (DEBUG) Slog.i(TAG, "Restore manifest from " + info.packageName + " but allowBackup=false"); } } catch (NameNotFoundException e) { // Okay, the target app isn't installed. We can process // the restore properly only if the dataset provides the // apk file and we can successfully install it. if (DEBUG) Slog.i(TAG, "Package " + info.packageName + " not installed; requiring apk in dataset"); policy = RestorePolicy.ACCEPT_IF_APK; } if (policy == RestorePolicy.ACCEPT_IF_APK && !hasApk) { Slog.i(TAG, "Cannot restore package " + info.packageName + " without the matching .apk"); } } else { Slog.i(TAG, "Missing signature on backed-up package " + info.packageName); } } else { Slog.i(TAG, "Expected package " + info.packageName + " but restore manifest claims " + manifestPackage); } } else { Slog.i(TAG, "Unknown restore manifest version " + version + " for package " + info.packageName); } } catch (NumberFormatException e) { Slog.w(TAG, "Corrupt restore manifest for package " + info.packageName); } catch (IllegalArgumentException e) { Slog.w(TAG, e.getMessage()); } return policy; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readAppManifest File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
readAppManifest
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@Override public boolean getBoolean(String key, boolean defaultValue, int userId) throws RemoteException { checkReadPermission(key, userId); String value = getStringUnchecked(key, null, userId); return TextUtils.isEmpty(value) ? defaultValue : (value.equals("1") || value.equals("true")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBoolean File: services/core/java/com/android/server/LockSettingsService.java Repository: android The code follows secure coding practices.
[ "CWE-255" ]
CVE-2016-3749
MEDIUM
4.6
android
getBoolean
services/core/java/com/android/server/LockSettingsService.java
e83f0f6a5a6f35323f5367f99c8e287c440f33f5
0
Analyze the following code function for security vulnerabilities
@Override public void startAssist(Bundle args) { if (mAssistManager != null) { mAssistManager.startAssist(args); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startAssist File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
startAssist
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
boolean isDisplayed() { final ActivityRecord atoken = mActivityRecord; return isDrawn() && isVisibleByPolicy() && ((!isParentWindowHidden() && (atoken == null || atoken.mVisibleRequested)) || isAnimating(TRANSITION | PARENTS)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDisplayed File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
isDisplayed
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
@Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); // Change the title for accessibility so we announce "Compose" instead // of the app_name while still showing the app_name in recents. setTitle(R.string.compose_title); setContentView(R.layout.compose); final ActionBar actionBar = getSupportActionBar(); if (actionBar != null) { // Hide the app icon. actionBar.setIcon(null); actionBar.setDisplayUseLogoEnabled(false); } mInnerSavedState = (savedInstanceState != null) ? savedInstanceState.getBundle(KEY_INNER_SAVED_STATE) : null; checkValidAccounts(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreate File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
onCreate
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
@Override public void setPermissionPolicy(ComponentName admin, String callerPackage, int policy) { final CallerIdentity caller = getCallerIdentity(admin, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() && (isProfileOwner(caller) || isDefaultDeviceOwner(caller))) || (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_PERMISSION_GRANT))); checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_PERMISSION_POLICY); final int forUser = caller.getUserId(); synchronized (getLockObject()) { DevicePolicyData userPolicy = getUserData(forUser); if (userPolicy.mPermissionPolicy != policy) { userPolicy.mPermissionPolicy = policy; mPolicyCache.setPermissionPolicy(forUser, policy); saveSettingsLocked(forUser); } } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_PERMISSION_POLICY) .setAdmin(caller.getPackageName()) .setInt(policy) .setBoolean(/* isDelegate */ admin == null) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPermissionPolicy File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
setPermissionPolicy
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
private static void invokeMethod(Component instance, Method method, JsonArray args, int promiseId, boolean inert) { if (inert && !method.isAnnotationPresent(AllowInert.class)) { return; } if (promiseId == -1) { invokeMethod(instance, method, args); } else { try { Serializable returnValue = (Serializable) invokeMethod(instance, method, args); instance.getElement() .executeJs("this.$server['" + JsonConstants.RPC_PROMISE_CALLBACK_NAME + "']($0, true, $1)", Integer.valueOf(promiseId), returnValue); } catch (RuntimeException e) { instance.getElement() .executeJs("this.$server['" + JsonConstants.RPC_PROMISE_CALLBACK_NAME + "']($0, false)", Integer.valueOf(promiseId)); throw e; } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeMethod File: flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25500
MEDIUM
4.3
vaadin/flow
invokeMethod
flow-server/src/main/java/com/vaadin/flow/server/communication/rpc/PublishedServerEventHandlerRpcHandler.java
1fa4976902a117455bf2f98b191f8c80692b53c8
0
Analyze the following code function for security vulnerabilities
private void resetInteractAcrossProfilesAppOps(@UserIdInt int userId) { mInjector.getCrossProfileApps(userId).clearInteractAcrossProfilesAppOps(); pregrantDefaultInteractAcrossProfilesAppOps(userId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resetInteractAcrossProfilesAppOps File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
resetInteractAcrossProfilesAppOps
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public void onIsVoipAudioModeChanged(Call call) { for (CallsManagerListener listener : mListeners) { listener.onIsVoipAudioModeChanged(call); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onIsVoipAudioModeChanged File: src/com/android/server/telecom/CallsManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2423
MEDIUM
6.6
android
onIsVoipAudioModeChanged
src/com/android/server/telecom/CallsManager.java
a06c9a4aef69ae27b951523cf72bf72412bf48fa
0
Analyze the following code function for security vulnerabilities
private void referralAuthenticate(String absoluteName, Object credential) throws LoginException { URI uri; try { uri = new URI(absoluteName); } catch (URISyntaxException e) { LoginException le = new LoginException("Unable to find user DN in referral LDAP"); le.initCause(e); throw le; } String name = localUserDN(absoluteName); String namingProviderURL = uri.getScheme() + "://" + uri.getAuthority(); InitialLdapContext refCtx = null; try { Properties refEnv = constructLdapContextEnvironment(namingProviderURL, name, credential, null); refCtx = new InitialLdapContext(refEnv, null); refCtx.close(); } catch (NamingException e) { LoginException le = new LoginException("Unable to create referral LDAP context"); le.initCause(e); throw le; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: referralAuthenticate File: jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java Repository: wildfly-security/jboss-negotiation The code follows secure coding practices.
[ "CWE-200" ]
CVE-2015-1849
MEDIUM
4.3
wildfly-security/jboss-negotiation
referralAuthenticate
jboss-negotiation-extras/src/main/java/org/jboss/security/negotiation/AdvancedLdapLoginModule.java
0dc9d191b6eb1d13b8f0189c5b02ba6576f4722e
0
Analyze the following code function for security vulnerabilities
public static String sanitizePath(String path, char substitute) { //on windows, we can receive both c:/path/ and c:\path\ path = path.replace("\\", "/"); if (OsUtil.isWindows() && path.matches("^[a-zA-Z]\\:.*")) { path = path.replaceFirst(":", WIN_DRIVE_LETTER_COLON_WILDCHAR); } for (int i = 0; i < INVALID_PATH.size(); i++) { if (-1 != path.indexOf(INVALID_PATH.get(i))) { path = path.replace(INVALID_PATH.get(i), substitute); } } if (OsUtil.isWindows()) { path = path.replaceFirst(WIN_DRIVE_LETTER_COLON_WILDCHAR, ":"); } return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sanitizePath File: core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
sanitizePath
core/src/main/java/net/sourceforge/jnlp/util/FileUtils.java
2ab070cdac087bd208f64fa8138bb709f8d7680c
0
Analyze the following code function for security vulnerabilities
@Override public boolean propertyExists(String name) throws JMSException { return this.userJmsProperties.containsKey(name) || this.rmqProperties.containsKey(name); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: propertyExists File: src/main/java/com/rabbitmq/jms/client/RMQMessage.java Repository: rabbitmq/rabbitmq-jms-client The code follows secure coding practices.
[ "CWE-502" ]
CVE-2020-36282
HIGH
7.5
rabbitmq/rabbitmq-jms-client
propertyExists
src/main/java/com/rabbitmq/jms/client/RMQMessage.java
f647e5dbfe055a2ca8cbb16dd70f9d50d888b638
0
Analyze the following code function for security vulnerabilities
final double getDoubleAndRemove(CharSequence name, double defaultValue) { final Double v = getDoubleAndRemove(name); return v != null ? v : defaultValue; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDoubleAndRemove File: core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-74" ]
CVE-2019-16771
MEDIUM
5
line/armeria
getDoubleAndRemove
core/src/main/java/com/linecorp/armeria/common/HttpHeadersBase.java
b597f7a865a527a84ee3d6937075cfbb4470ed20
0
Analyze the following code function for security vulnerabilities
@NonNull public Builder removeOpenFlags(@DatabaseOpenFlags int openFlags) { mOpenFlags &= ~openFlags; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeOpenFlags File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
removeOpenFlags
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override public boolean isGalleryTypeSupported(int type) { if (super.isGalleryTypeSupported(type)) { return true; } if (type == -9999 || type == -9998) { return true; } if (android.os.Build.VERSION.SDK_INT >= 16) { switch (type) { case Display.GALLERY_ALL_MULTI: case Display.GALLERY_VIDEO_MULTI: case Display.GALLERY_IMAGE_MULTI: return true; } } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isGalleryTypeSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isGalleryTypeSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
protected void answerJSON(int status, Map<String, String> answer) throws IOException { ObjectMapper mapper = new ObjectMapper(); XWikiContext context = contextProvider.get(); XWikiResponse response = context.getResponse(); String jsonAnswerAsString = mapper.writeValueAsString(answer); String encoding = context.getWiki().getEncoding(); response.setContentType("application/json"); // Set the content length to the number of bytes, not the // string length, so as to handle multi-byte encodings response.setContentLength(jsonAnswerAsString.getBytes(encoding).length); response.setStatus(status); response.setCharacterEncoding(encoding); response.getWriter().print(jsonAnswerAsString); context.setResponseSent(true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: answerJSON File: application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java Repository: xwiki-contrib/application-changerequest The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-49280
MEDIUM
6.5
xwiki-contrib/application-changerequest
answerJSON
application-changerequest-default/src/main/java/org/xwiki/contrib/changerequest/internal/handlers/AbstractChangeRequestActionHandler.java
ff0f5368ea04f0e4aa7b33821c707dc68a8c5ca8
0
Analyze the following code function for security vulnerabilities
protected ByteArrayBuilder _getByteArrayBuilder() { if (_byteArrayBuilder == null) { _byteArrayBuilder = new ByteArrayBuilder(); } else { _byteArrayBuilder.reset(); } return _byteArrayBuilder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: _getByteArrayBuilder File: cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java Repository: FasterXML/jackson-dataformats-binary The code follows secure coding practices.
[ "CWE-770" ]
CVE-2020-28491
MEDIUM
5
FasterXML/jackson-dataformats-binary
_getByteArrayBuilder
cbor/src/main/java/com/fasterxml/jackson/dataformat/cbor/CBORParser.java
de072d314af8f5f269c8abec6930652af67bc8e6
0
Analyze the following code function for security vulnerabilities
public XmlGraphMLReader nodeLabels(boolean readLabels) { this.labels = readLabels; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: nodeLabels File: core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java Repository: neo4j/apoc The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-23926
HIGH
8.1
neo4j/apoc
nodeLabels
core/src/main/java/apoc/export/graphml/XmlGraphMLReader.java
3202b421b21973b2f57a43b33c88f3f6901cfd2a
0
Analyze the following code function for security vulnerabilities
@Override public String getDefaultDialerPackage() { final long token = Binder.clearCallingIdentity(); try { return DefaultDialerManager.getDefaultDialerApplication(mContext); } finally { Binder.restoreCallingIdentity(token); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultDialerPackage File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0847
HIGH
7.2
android
getDefaultDialerPackage
src/com/android/server/telecom/TelecomServiceImpl.java
2750faaa1ec819eed9acffea7bd3daf867fda444
0
Analyze the following code function for security vulnerabilities
private void rejectRemoteInitiatedRenegation() throws SSLHandshakeException { if (rejectRemoteInitiatedRenegation && SSL.getHandshakeCount(ssl) > 1) { // TODO: In future versions me may also want to send a fatal_alert to the client and so notify it // that the renegotiation failed. shutdown(); throw new SSLHandshakeException("remote-initiated renegotation not allowed"); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: rejectRemoteInitiatedRenegation File: handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java Repository: netty The code follows secure coding practices.
[ "CWE-835" ]
CVE-2016-4970
HIGH
7.8
netty
rejectRemoteInitiatedRenegation
handler/src/main/java/io/netty/handler/ssl/OpenSslEngine.java
bc8291c80912a39fbd2303e18476d15751af0bf1
0
Analyze the following code function for security vulnerabilities
public void writeResult(Object iResult, final String iFormat, final String iAccept) throws InterruptedException, IOException { writeResult(iResult, iFormat, iAccept, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writeResult File: server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java Repository: orientechnologies/orientdb The code follows secure coding practices.
[ "CWE-352" ]
CVE-2015-2912
MEDIUM
6.8
orientechnologies/orientdb
writeResult
server/src/main/java/com/orientechnologies/orient/server/network/protocol/http/OHttpResponse.java
d5a45e608ba8764fd817c1bdd7cf966564e828e9
0
Analyze the following code function for security vulnerabilities
private static boolean isZeroSafe(byte[] bytes, int startPos, int length) { final int end = startPos + length; for (; startPos < end; ++startPos) { if (bytes[startPos] != 0) { return false; } } return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isZeroSafe File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
isZeroSafe
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
@Nullable @TestApi public String getDevicePolicyManagementRoleHolderUpdaterPackage() { String devicePolicyManagementUpdaterConfig = mContext.getString( com.android.internal.R.string.config_devicePolicyManagementUpdater); if (TextUtils.isEmpty(devicePolicyManagementUpdaterConfig)) { return null; } return devicePolicyManagementUpdaterConfig; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDevicePolicyManagementRoleHolderUpdaterPackage File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getDevicePolicyManagementRoleHolderUpdaterPackage
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public P4Material getP4Material() { return getExistingOrDefaultMaterial(new P4Material("", "")); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getP4Material File: domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java Repository: gocd The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
getP4Material
domain/src/main/java/com/thoughtworks/go/config/materials/Materials.java
691b479f1310034992da141760e9c5d1f5b60e8a
0
Analyze the following code function for security vulnerabilities
protected String getOCEventDataAuditsSql(String studySubjectOids) { return "select ss.oc_oid as study_subject_oid, sed.oc_oid as definition_oid, ale.audit_id," + " alet.name, ale.user_id, ale.audit_date, ale.reason_for_change, ale.old_value, ale.new_value," + " ale.audit_log_event_type_id" + " from audit_log_event ale, study_subject ss, study_event se, study_event_definition sed, audit_log_event_type alet" + " where audit_table = 'study_event' and ss.oc_oid in (" + studySubjectOids + ") and ss.study_subject_id = se.study_subject_id" + " and ale.entity_id = se.study_event_id" + " and se.study_event_definition_id = sed.study_event_definition_id" + " and ale.audit_log_event_type_id = alet.audit_log_event_type_id" + " order by ss.oc_oid, sed.oc_oid, ale.audit_id asc"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getOCEventDataAuditsSql File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
getOCEventDataAuditsSql
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
private static String cleanURLMap(String urlMap){ if(!UtilMethods.isSet(urlMap)){ return null; } urlMap = urlMap.trim(); if(!urlMap.startsWith("/")){ urlMap = "/" + urlMap; } return urlMap; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cleanURLMap File: src/com/dotmarketing/portlets/structure/factories/StructureFactory.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
cleanURLMap
src/com/dotmarketing/portlets/structure/factories/StructureFactory.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "14.0RC1") public DocumentReference getCreatorReference() { UserReference creator = this.getAuthors().getCreator(); if (creator != null && creator != GuestUserReference.INSTANCE) { return this.getUserReferenceDocumentReferenceSerializer().serialize(creator); } else { return null; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCreatorReference File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
getCreatorReference
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
public int sendInner(int code, Intent intent, String resolvedType, IBinder allowlistToken, IIntentReceiver finishedReceiver, String requiredPermission, IBinder resultTo, String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle options) { if (intent != null) intent.setDefusable(true); if (options != null) options.setDefusable(true); TempAllowListDuration duration = null; Intent finalIntent = null; Intent[] allIntents = null; String[] allResolvedTypes = null; SafeActivityOptions mergedOptions = null; synchronized (controller.mLock) { if (canceled) { return ActivityManager.START_CANCELED; } sent = true; if ((key.flags & PendingIntent.FLAG_ONE_SHOT) != 0) { controller.cancelIntentSender(this, true); } finalIntent = key.requestIntent != null ? new Intent(key.requestIntent) : new Intent(); final boolean immutable = (key.flags & PendingIntent.FLAG_IMMUTABLE) != 0; if (!immutable) { if (intent != null) { int changes = finalIntent.fillIn(intent, key.flags); if ((changes & Intent.FILL_IN_DATA) == 0) { resolvedType = key.requestResolvedType; } } else { resolvedType = key.requestResolvedType; } flagsMask &= ~Intent.IMMUTABLE_FLAGS; flagsValues &= flagsMask; finalIntent.setFlags((finalIntent.getFlags() & ~flagsMask) | flagsValues); } else { resolvedType = key.requestResolvedType; } // Apply any launch flags from the ActivityOptions. This is to ensure that the caller // can specify a consistent launch mode even if the PendingIntent is immutable final ActivityOptions opts = ActivityOptions.fromBundle(options); if (opts != null) { finalIntent.addFlags(opts.getPendingIntentLaunchFlags()); } // Extract options before clearing calling identity mergedOptions = key.options; if (mergedOptions == null) { mergedOptions = new SafeActivityOptions(opts); } else { mergedOptions.setCallerOptions(opts); } if (mAllowlistDuration != null) { duration = mAllowlistDuration.get(allowlistToken); } if (key.type == ActivityManager.INTENT_SENDER_ACTIVITY && key.allIntents != null && key.allIntents.length > 1) { // Copy all intents and resolved types while we have the controller lock so we can // use it later when the lock isn't held. allIntents = new Intent[key.allIntents.length]; allResolvedTypes = new String[key.allIntents.length]; System.arraycopy(key.allIntents, 0, allIntents, 0, key.allIntents.length); if (key.allResolvedTypes != null) { System.arraycopy(key.allResolvedTypes, 0, allResolvedTypes, 0, key.allResolvedTypes.length); } allIntents[allIntents.length - 1] = finalIntent; allResolvedTypes[allResolvedTypes.length - 1] = resolvedType; } } // We don't hold the controller lock beyond this point as we will be calling into AM and WM. final int callingUid = Binder.getCallingUid(); final int callingPid = Binder.getCallingPid(); final long origId = Binder.clearCallingIdentity(); int res = START_SUCCESS; try { if (duration != null) { StringBuilder tag = new StringBuilder(64); tag.append("setPendingIntentAllowlistDuration,reason:"); tag.append(duration.reason == null ? "" : duration.reason); tag.append(",pendingintent:"); UserHandle.formatUid(tag, callingUid); tag.append(":"); if (finalIntent.getAction() != null) { tag.append(finalIntent.getAction()); } else if (finalIntent.getComponent() != null) { finalIntent.getComponent().appendShortString(tag); } else if (finalIntent.getData() != null) { tag.append(finalIntent.getData().toSafeString()); } controller.mAmInternal.tempAllowlistForPendingIntent(callingPid, callingUid, uid, duration.duration, duration.type, duration.reasonCode, tag.toString()); } else if (key.type == ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE && options != null) { // If this is a getForegroundService() type pending intent, use its BroadcastOptions // temp allowlist duration as its pending intent temp allowlist duration. BroadcastOptions brOptions = new BroadcastOptions(options); if (brOptions.getTemporaryAppAllowlistDuration() > 0) { controller.mAmInternal.tempAllowlistForPendingIntent(callingPid, callingUid, uid, brOptions.getTemporaryAppAllowlistDuration(), brOptions.getTemporaryAppAllowlistType(), brOptions.getTemporaryAppAllowlistReasonCode(), brOptions.getTemporaryAppAllowlistReason()); } } boolean sendFinish = finishedReceiver != null; int userId = key.userId; if (userId == UserHandle.USER_CURRENT) { userId = controller.mUserController.getCurrentOrTargetUserId(); } // temporarily allow receivers and services to open activities from background if the // PendingIntent.send() caller was foreground at the time of sendInner() call final boolean allowTrampoline = uid != callingUid && controller.mAtmInternal.isUidForeground(callingUid) && isPendingIntentBalAllowedByCaller(options); // note: we on purpose don't pass in the information about the PendingIntent's creator, // like pid or ProcessRecord, to the ActivityTaskManagerInternal calls below, because // it's not unusual for the creator's process to not be alive at this time switch (key.type) { case ActivityManager.INTENT_SENDER_ACTIVITY: try { // Note when someone has a pending intent, even from different // users, then there's no need to ensure the calling user matches // the target user, so validateIncomingUser is always false below. if (key.allIntents != null && key.allIntents.length > 1) { res = controller.mAtmInternal.startActivitiesInPackage( uid, callingPid, callingUid, key.packageName, key.featureId, allIntents, allResolvedTypes, resultTo, mergedOptions, userId, false /* validateIncomingUser */, this /* originatingPendingIntent */, mAllowBgActivityStartsForActivitySender.contains( allowlistToken)); } else { res = controller.mAtmInternal.startActivityInPackage(uid, callingPid, callingUid, key.packageName, key.featureId, finalIntent, resolvedType, resultTo, resultWho, requestCode, 0, mergedOptions, userId, null, "PendingIntentRecord", false /* validateIncomingUser */, this /* originatingPendingIntent */, mAllowBgActivityStartsForActivitySender.contains( allowlistToken)); } } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startActivity intent", e); } break; case ActivityManager.INTENT_SENDER_ACTIVITY_RESULT: controller.mAtmInternal.sendActivityResult(-1, key.activity, key.who, key.requestCode, code, finalIntent); break; case ActivityManager.INTENT_SENDER_BROADCAST: try { final boolean allowedByToken = mAllowBgActivityStartsForBroadcastSender.contains(allowlistToken); final IBinder bgStartsToken = (allowedByToken) ? allowlistToken : null; // If a completion callback has been requested, require // that the broadcast be delivered synchronously int sent = controller.mAmInternal.broadcastIntentInPackage(key.packageName, key.featureId, uid, callingUid, callingPid, finalIntent, resolvedType, finishedReceiver, code, null, null, requiredPermission, options, (finishedReceiver != null), false, userId, allowedByToken || allowTrampoline, bgStartsToken, null /* broadcastAllowList */); if (sent == ActivityManager.BROADCAST_SUCCESS) { sendFinish = false; } } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startActivity intent", e); } break; case ActivityManager.INTENT_SENDER_SERVICE: case ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE: try { final boolean allowedByToken = mAllowBgActivityStartsForServiceSender.contains(allowlistToken); final IBinder bgStartsToken = (allowedByToken) ? allowlistToken : null; controller.mAmInternal.startServiceInPackage(uid, finalIntent, resolvedType, key.type == ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE, key.packageName, key.featureId, userId, allowedByToken || allowTrampoline, bgStartsToken); } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startService intent", e); } catch (TransactionTooLargeException e) { res = ActivityManager.START_CANCELED; } break; } if (sendFinish && res != ActivityManager.START_CANCELED) { try { finishedReceiver.performReceive(new Intent(finalIntent), 0, null, null, false, false, key.userId); } catch (RemoteException e) { } } } finally { Binder.restoreCallingIdentity(origId); } return res; }
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-20918 - Severity: CRITICAL - CVSS Score: 9.8 Description: Ensure that only SysUI can override pending intent launch flags - Originally added in ag/5139951, this method ensured that activities launched from widgets are always started in a new task (if the activity is launched in the home task, the task is not brough forward with the recents transition). We can restrict this to only recents callers since this only applies to 1p launchers in gesture nav (both the gesture with 3p launchers and button nav in general will always start the home intent directly, which makes adding the NEW_TASK flag unnecessary). Bug: 243794108 Test: Ensure that the original bug b/112508020 still works (with the test app in the bug, swipe up still works after launching an activity from the widget, and fails without applying the override flags) Change-Id: Id53c6a2aa6da5933d488ca06a0bfc4ef89a4c343 (cherry picked from commit c4d3106e347922610f8c554de3ae238175ed393e) Merged-In: Id53c6a2aa6da5933d488ca06a0bfc4ef89a4c343 Function: sendInner File: services/core/java/com/android/server/am/PendingIntentRecord.java Repository: android Fixed Code: public int sendInner(int code, Intent intent, String resolvedType, IBinder allowlistToken, IIntentReceiver finishedReceiver, String requiredPermission, IBinder resultTo, String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle options) { if (intent != null) intent.setDefusable(true); if (options != null) options.setDefusable(true); TempAllowListDuration duration = null; Intent finalIntent = null; Intent[] allIntents = null; String[] allResolvedTypes = null; SafeActivityOptions mergedOptions = null; synchronized (controller.mLock) { if (canceled) { return ActivityManager.START_CANCELED; } sent = true; if ((key.flags & PendingIntent.FLAG_ONE_SHOT) != 0) { controller.cancelIntentSender(this, true); } finalIntent = key.requestIntent != null ? new Intent(key.requestIntent) : new Intent(); final boolean immutable = (key.flags & PendingIntent.FLAG_IMMUTABLE) != 0; if (!immutable) { if (intent != null) { int changes = finalIntent.fillIn(intent, key.flags); if ((changes & Intent.FILL_IN_DATA) == 0) { resolvedType = key.requestResolvedType; } } else { resolvedType = key.requestResolvedType; } flagsMask &= ~Intent.IMMUTABLE_FLAGS; flagsValues &= flagsMask; finalIntent.setFlags((finalIntent.getFlags() & ~flagsMask) | flagsValues); } else { resolvedType = key.requestResolvedType; } // Apply any launch flags from the ActivityOptions. This is used only by SystemUI // to ensure that we can launch the pending intent with a consistent launch mode even // if the provided PendingIntent is immutable (ie. to force an activity to launch into // a new task, or to launch multiple instances if supported by the app) final ActivityOptions opts = ActivityOptions.fromBundle(options); if (opts != null) { // TODO(b/254490217): Move this check into SafeActivityOptions if (controller.mAtmInternal.isCallerRecents(Binder.getCallingUid())) { finalIntent.addFlags(opts.getPendingIntentLaunchFlags()); } } // Extract options before clearing calling identity mergedOptions = key.options; if (mergedOptions == null) { mergedOptions = new SafeActivityOptions(opts); } else { mergedOptions.setCallerOptions(opts); } if (mAllowlistDuration != null) { duration = mAllowlistDuration.get(allowlistToken); } if (key.type == ActivityManager.INTENT_SENDER_ACTIVITY && key.allIntents != null && key.allIntents.length > 1) { // Copy all intents and resolved types while we have the controller lock so we can // use it later when the lock isn't held. allIntents = new Intent[key.allIntents.length]; allResolvedTypes = new String[key.allIntents.length]; System.arraycopy(key.allIntents, 0, allIntents, 0, key.allIntents.length); if (key.allResolvedTypes != null) { System.arraycopy(key.allResolvedTypes, 0, allResolvedTypes, 0, key.allResolvedTypes.length); } allIntents[allIntents.length - 1] = finalIntent; allResolvedTypes[allResolvedTypes.length - 1] = resolvedType; } } // We don't hold the controller lock beyond this point as we will be calling into AM and WM. final int callingUid = Binder.getCallingUid(); final int callingPid = Binder.getCallingPid(); final long origId = Binder.clearCallingIdentity(); int res = START_SUCCESS; try { if (duration != null) { StringBuilder tag = new StringBuilder(64); tag.append("setPendingIntentAllowlistDuration,reason:"); tag.append(duration.reason == null ? "" : duration.reason); tag.append(",pendingintent:"); UserHandle.formatUid(tag, callingUid); tag.append(":"); if (finalIntent.getAction() != null) { tag.append(finalIntent.getAction()); } else if (finalIntent.getComponent() != null) { finalIntent.getComponent().appendShortString(tag); } else if (finalIntent.getData() != null) { tag.append(finalIntent.getData().toSafeString()); } controller.mAmInternal.tempAllowlistForPendingIntent(callingPid, callingUid, uid, duration.duration, duration.type, duration.reasonCode, tag.toString()); } else if (key.type == ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE && options != null) { // If this is a getForegroundService() type pending intent, use its BroadcastOptions // temp allowlist duration as its pending intent temp allowlist duration. BroadcastOptions brOptions = new BroadcastOptions(options); if (brOptions.getTemporaryAppAllowlistDuration() > 0) { controller.mAmInternal.tempAllowlistForPendingIntent(callingPid, callingUid, uid, brOptions.getTemporaryAppAllowlistDuration(), brOptions.getTemporaryAppAllowlistType(), brOptions.getTemporaryAppAllowlistReasonCode(), brOptions.getTemporaryAppAllowlistReason()); } } boolean sendFinish = finishedReceiver != null; int userId = key.userId; if (userId == UserHandle.USER_CURRENT) { userId = controller.mUserController.getCurrentOrTargetUserId(); } // temporarily allow receivers and services to open activities from background if the // PendingIntent.send() caller was foreground at the time of sendInner() call final boolean allowTrampoline = uid != callingUid && controller.mAtmInternal.isUidForeground(callingUid) && isPendingIntentBalAllowedByCaller(options); // note: we on purpose don't pass in the information about the PendingIntent's creator, // like pid or ProcessRecord, to the ActivityTaskManagerInternal calls below, because // it's not unusual for the creator's process to not be alive at this time switch (key.type) { case ActivityManager.INTENT_SENDER_ACTIVITY: try { // Note when someone has a pending intent, even from different // users, then there's no need to ensure the calling user matches // the target user, so validateIncomingUser is always false below. if (key.allIntents != null && key.allIntents.length > 1) { res = controller.mAtmInternal.startActivitiesInPackage( uid, callingPid, callingUid, key.packageName, key.featureId, allIntents, allResolvedTypes, resultTo, mergedOptions, userId, false /* validateIncomingUser */, this /* originatingPendingIntent */, mAllowBgActivityStartsForActivitySender.contains( allowlistToken)); } else { res = controller.mAtmInternal.startActivityInPackage(uid, callingPid, callingUid, key.packageName, key.featureId, finalIntent, resolvedType, resultTo, resultWho, requestCode, 0, mergedOptions, userId, null, "PendingIntentRecord", false /* validateIncomingUser */, this /* originatingPendingIntent */, mAllowBgActivityStartsForActivitySender.contains( allowlistToken)); } } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startActivity intent", e); } break; case ActivityManager.INTENT_SENDER_ACTIVITY_RESULT: controller.mAtmInternal.sendActivityResult(-1, key.activity, key.who, key.requestCode, code, finalIntent); break; case ActivityManager.INTENT_SENDER_BROADCAST: try { final boolean allowedByToken = mAllowBgActivityStartsForBroadcastSender.contains(allowlistToken); final IBinder bgStartsToken = (allowedByToken) ? allowlistToken : null; // If a completion callback has been requested, require // that the broadcast be delivered synchronously int sent = controller.mAmInternal.broadcastIntentInPackage(key.packageName, key.featureId, uid, callingUid, callingPid, finalIntent, resolvedType, finishedReceiver, code, null, null, requiredPermission, options, (finishedReceiver != null), false, userId, allowedByToken || allowTrampoline, bgStartsToken, null /* broadcastAllowList */); if (sent == ActivityManager.BROADCAST_SUCCESS) { sendFinish = false; } } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startActivity intent", e); } break; case ActivityManager.INTENT_SENDER_SERVICE: case ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE: try { final boolean allowedByToken = mAllowBgActivityStartsForServiceSender.contains(allowlistToken); final IBinder bgStartsToken = (allowedByToken) ? allowlistToken : null; controller.mAmInternal.startServiceInPackage(uid, finalIntent, resolvedType, key.type == ActivityManager.INTENT_SENDER_FOREGROUND_SERVICE, key.packageName, key.featureId, userId, allowedByToken || allowTrampoline, bgStartsToken); } catch (RuntimeException e) { Slog.w(TAG, "Unable to send startService intent", e); } catch (TransactionTooLargeException e) { res = ActivityManager.START_CANCELED; } break; } if (sendFinish && res != ActivityManager.START_CANCELED) { try { finishedReceiver.performReceive(new Intent(finalIntent), 0, null, null, false, false, key.userId); } catch (RemoteException e) { } } } finally { Binder.restoreCallingIdentity(origId); } return res; }
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
sendInner
services/core/java/com/android/server/am/PendingIntentRecord.java
16c604aa7c253ce5cf075368a258c0b21386160d
1
Analyze the following code function for security vulnerabilities
@Override public void stopLockTaskModeOnCurrent() throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); mRemote.transact(STOP_LOCK_TASK_BY_CURRENT_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopLockTaskModeOnCurrent File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
stopLockTaskModeOnCurrent
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public void saveCommandHistoryList(ArrayList<String> commandHistory) { StringBuilder sb = new StringBuilder(); for (String s : commandHistory) { if (sb.length() > 0) { sb.append(';'); } sb.append(s.replace("\\", "\\\\").replace(";", "\\;")); } commandHistoryString = sb.toString(); saveProperties(null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveCommandHistoryList File: h2/src/main/org/h2/server/web/WebServer.java Repository: h2database The code follows secure coding practices.
[ "CWE-312" ]
CVE-2022-45868
HIGH
7.8
h2database
saveCommandHistoryList
h2/src/main/org/h2/server/web/WebServer.java
23ee3d0b973923c135fa01356c8eaed40b895393
0
Analyze the following code function for security vulnerabilities
private Class<?> resolveConstructorClass(Class<?> objectClass) throws InvalidClassException { if (resolvedConstructorClass != null) { return resolvedConstructorClass; } // The class of the instance may not be the same as the class of the // constructor to run // This is the constructor to run if Externalizable Class<?> constructorClass = objectClass; // WARNING - What if the object is serializable and externalizable ? // Is that possible ? boolean wasSerializable = (flags & ObjectStreamConstants.SC_SERIALIZABLE) != 0; if (wasSerializable) { // Now we must run the constructor of the class just above the // one that implements Serializable so that slots that were not // dumped can be initialized properly while (constructorClass != null && ObjectStreamClass.isSerializable(constructorClass)) { constructorClass = constructorClass.getSuperclass(); } } // Fetch the empty constructor, or null if none. Constructor<?> constructor = null; if (constructorClass != null) { try { constructor = constructorClass.getDeclaredConstructor(EmptyArray.CLASS); } catch (NoSuchMethodException ignored) { } } // Has to have an empty constructor if (constructor == null) { String className = constructorClass != null ? constructorClass.getName() : null; throw new InvalidClassException(className, "IllegalAccessException"); } int constructorModifiers = constructor.getModifiers(); boolean isPublic = Modifier.isPublic(constructorModifiers); boolean isProtected = Modifier.isProtected(constructorModifiers); boolean isPrivate = Modifier.isPrivate(constructorModifiers); // Now we must check if the empty constructor is visible to the // instantiation class boolean wasExternalizable = (flags & ObjectStreamConstants.SC_EXTERNALIZABLE) != 0; if (isPrivate || (wasExternalizable && !isPublic)) { throw new InvalidClassException(constructorClass.getName(), "IllegalAccessException"); } // We know we are testing from a subclass, so the only other case // where the visibility is not allowed is when the constructor has // default visibility and the instantiation class is in a different // package than the constructor class if (!isPublic && !isProtected) { // Not public, not private and not protected...means default // visibility. Check if same package if (!inSamePackage(constructorClass, objectClass)) { throw new InvalidClassException(constructorClass.getName(), "IllegalAccessException"); } } resolvedConstructorClass = constructorClass; resolvedConstructorMethodId = getConstructorId(resolvedConstructorClass); return constructorClass; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveConstructorClass File: luni/src/main/java/java/io/ObjectStreamClass.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
resolveConstructorClass
luni/src/main/java/java/io/ObjectStreamClass.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
public Jooby http2() { this.http2 = true; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: http2 File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
http2
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public Page<E> reasonable(Boolean reasonable) { setReasonable(reasonable); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reasonable File: src/main/java/com/github/pagehelper/Page.java Repository: pagehelper/Mybatis-PageHelper The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-28111
HIGH
7.5
pagehelper/Mybatis-PageHelper
reasonable
src/main/java/com/github/pagehelper/Page.java
554a524af2d2b30d09505516adc412468a84d8fa
0
Analyze the following code function for security vulnerabilities
protected DocumentBuilder getDocumentBuilder( ) throws ServiceException { DocumentBuilder documentBuilder = null; DocumentBuilderFactory documentBuilderFactory = null; try { documentBuilderFactory = DocumentBuilderFactory.newInstance(); documentBuilderFactory.setNamespaceAware(true); documentBuilder = documentBuilderFactory.newDocumentBuilder(); } catch (ParserConfigurationException e) { throw new ServiceException(e); } return documentBuilder; }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2023-46502 - Severity: CRITICAL - CVSS Score: 9.8 Description: fixes XML eXternal Entity injection (XXE) Function: getDocumentBuilder File: core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java Repository: opencrx Fixed Code: protected DocumentBuilder getDocumentBuilder( ) throws ServiceException { DocumentBuilder documentBuilder = null; DocumentBuilderFactory documentBuilderFactory = null; documentBuilderFactory = DocumentBuilderFactory.newInstance(); documentBuilderFactory.setNamespaceAware(true); // Flags required to prevent XML eXternal Entity injection (XXE) try { documentBuilderFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); } catch (ParserConfigurationException e) { throw new ServiceException(e); } try { documentBuilderFactory.setFeature("http://xml.org/sax/features/external-general-entities", false); } catch (ParserConfigurationException e) { throw new ServiceException(e); } try { documentBuilderFactory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); } catch (ParserConfigurationException e) { throw new ServiceException(e); } try { documentBuilderFactory.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false); } catch (ParserConfigurationException e) { throw new ServiceException(e); } try { documentBuilder = documentBuilderFactory.newDocumentBuilder(); } catch (ParserConfigurationException e) { throw new ServiceException(e); } return documentBuilder; }
[ "CWE-611" ]
CVE-2023-46502
CRITICAL
9.8
opencrx
getDocumentBuilder
core/src/main/java/org/opencrx/application/uses/net/sf/webdav/methods/WebDavMethod.java
ce7a71db0bb34ecbcb0e822d40598e410a48b399
1
Analyze the following code function for security vulnerabilities
private void setBypassDevicePolicyManagementRoleQualificationStateInternal( String currentRoleHolder, boolean allowBypass) { boolean stateChanged = false; DevicePolicyData policy = getUserData(UserHandle.USER_SYSTEM); if (policy.mBypassDevicePolicyManagementRoleQualifications != allowBypass) { policy.mBypassDevicePolicyManagementRoleQualifications = allowBypass; stateChanged = true; } if (!Objects.equals(currentRoleHolder, policy.mCurrentRoleHolder)) { policy.mCurrentRoleHolder = currentRoleHolder; stateChanged = true; } if (stateChanged) { synchronized (getLockObject()) { saveSettingsLocked(UserHandle.USER_SYSTEM); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setBypassDevicePolicyManagementRoleQualificationStateInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setBypassDevicePolicyManagementRoleQualificationStateInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
private void updateBackgroundColor(RemoteViews contentView, StandardTemplateParams p) { if (isBackgroundColorized(p)) { contentView.setInt(R.id.status_bar_latest_event_content, "setBackgroundColor", getBackgroundColor(p)); } else { // Clear it! contentView.setInt(R.id.status_bar_latest_event_content, "setBackgroundResource", 0); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateBackgroundColor File: core/java/android/app/Notification.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-21288
MEDIUM
5.5
android
updateBackgroundColor
core/java/android/app/Notification.java
726247f4f53e8cc0746175265652fa415a123c0c
0
Analyze the following code function for security vulnerabilities
protected void updateValue(@Positive int columnIndex, @Nullable Object value) throws SQLException { checkUpdateable(); if (!onInsertRow && (isBeforeFirst() || isAfterLast() || castNonNull(rows, "rows").isEmpty())) { throw new PSQLException( GT.tr( "Cannot update the ResultSet because it is either before the start or after the end of the results."), PSQLState.INVALID_CURSOR_STATE); } checkColumnIndex(columnIndex); doingUpdates = !onInsertRow; if (value == null) { updateNull(columnIndex); } else { PGResultSetMetaData md = (PGResultSetMetaData) getMetaData(); castNonNull(updateValues, "updateValues") .put(md.getBaseColumnName(columnIndex), value); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateValue File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java Repository: pgjdbc The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-31197
HIGH
8
pgjdbc
updateValue
pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
739e599d52ad80f8dcd6efedc6157859b1a9d637
0
Analyze the following code function for security vulnerabilities
public float getWindowAnimationScaleLocked() { return mAnimationsDisabled ? 0 : mWindowAnimationScaleSetting; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getWindowAnimationScaleLocked File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
getWindowAnimationScaleLocked
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
protected void setDataProvider(DataProvider<T, ?> dataProvider) { detachDataProviderListener(); dropAllData(); this.dataProvider = dataProvider; getKeyMapper().setIdentifierGetter(dataProvider::getId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setDataProvider File: server/src/main/java/com/vaadin/data/provider/DataCommunicator.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-20" ]
CVE-2021-33609
MEDIUM
4
vaadin/framework
setDataProvider
server/src/main/java/com/vaadin/data/provider/DataCommunicator.java
9a93593d9f3802d2881fc8ad22dbc210d0d1d295
0
Analyze the following code function for security vulnerabilities
public void setServiceForeground(ComponentName className, IBinder token, int id, Notification notification, boolean removeNotification) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); ComponentName.writeToParcel(className, data); data.writeStrongBinder(token); data.writeInt(id); if (notification != null) { data.writeInt(1); notification.writeToParcel(data, 0); } else { data.writeInt(0); } data.writeInt(removeNotification ? 1 : 0); mRemote.transact(SET_SERVICE_FOREGROUND_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServiceForeground File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
setServiceForeground
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Override public List<String> getDelegatedPermissionNames() { return mDelegatedPermissionNames == null ? null : new ArrayList<>(mDelegatedPermissionNames); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDelegatedPermissionNames File: services/core/java/com/android/server/pm/permission/PermissionManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
getDelegatedPermissionNames
services/core/java/com/android/server/pm/permission/PermissionManagerService.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public void calculatePlanReport(String planId, TestPlanSimpleReportDTO report) { List<PlanReportIssueDTO> planReportIssueDTOS = extIssuesMapper.selectForPlanReport(planId); planReportIssueDTOS = DistinctKeyUtil.distinctByKey(planReportIssueDTOS, PlanReportIssueDTO::getId); TestPlanFunctionResultReportDTO functionResult = report.getFunctionResult(); List<TestCaseReportStatusResultDTO> statusResult = new ArrayList<>(); Map<String, TestCaseReportStatusResultDTO> statusResultMap = new HashMap<>(); planReportIssueDTOS.forEach(item -> { String status; // 本地缺陷 if (StringUtils.equalsIgnoreCase(item.getPlatform(), IssuesManagePlatform.Local.name()) || StringUtils.isBlank(item.getPlatform())) { status = item.getStatus(); } else { status = item.getPlatformStatus(); } if (StringUtils.isBlank(status)) { status = IssuesStatus.NEW.toString(); } TestPlanStatusCalculator.buildStatusResultMap(statusResultMap, status); }); Set<String> status = statusResultMap.keySet(); status.forEach(item -> { TestPlanStatusCalculator.addToReportStatusResultList(statusResultMap, statusResult, item); }); functionResult.setIssueData(statusResult); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: calculatePlanReport File: test-track/backend/src/main/java/io/metersphere/service/IssuesService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-918" ]
CVE-2022-23544
MEDIUM
6.1
metersphere
calculatePlanReport
test-track/backend/src/main/java/io/metersphere/service/IssuesService.java
d0f95b50737c941b29d507a4cc3545f2dc6ab121
0
Analyze the following code function for security vulnerabilities
public long getTotalFileSize() { return totalFileSize; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTotalFileSize File: src/main/java/emissary/pickup/WorkBundle.java Repository: NationalSecurityAgency/emissary The code follows secure coding practices.
[ "CWE-502" ]
CVE-2021-32634
MEDIUM
6.5
NationalSecurityAgency/emissary
getTotalFileSize
src/main/java/emissary/pickup/WorkBundle.java
40260b1ec1f76cc92361702cc14fa1e4388e19d7
0
Analyze the following code function for security vulnerabilities
public ApiClient setApiKey(String apiKey) { for (Authentication auth : authentications.values()) { if (auth instanceof ApiKeyAuth) { ((ApiKeyAuth) auth).setApiKey(apiKey); return this; } } throw new RuntimeException("No API key authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setApiKey File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setApiKey
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public static @Nullable String extractPathOwnerPackageName(@Nullable String path) { if (path == null) return null; final Matcher m = PATTERN_OWNED_PATH.matcher(path); if (m.matches()) { return m.group(1); } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extractPathOwnerPackageName File: src/com/android/providers/media/util/FileUtils.java Repository: android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-35670
HIGH
7.8
android
extractPathOwnerPackageName
src/com/android/providers/media/util/FileUtils.java
db3c69afcb0a45c8aa2f333fcde36217889899fe
0
Analyze the following code function for security vulnerabilities
@Override public void mergeMessage( CodedInputStream input, ExtensionRegistryLite extensionRegistry, FieldDescriptor field, Message defaultInstance) throws IOException { if (!field.isRepeated()) { if (hasField(field)) { Object fieldOrBuilder = extensions.getFieldAllowBuilders(field); MessageLite.Builder subBuilder; if (fieldOrBuilder instanceof MessageLite.Builder) { subBuilder = (MessageLite.Builder) fieldOrBuilder; } else { subBuilder = ((MessageLite) fieldOrBuilder).toBuilder(); extensions.setField(field, subBuilder); } input.readMessage(subBuilder, extensionRegistry); return; } Message.Builder subBuilder = defaultInstance.newBuilderForType(); input.readMessage(subBuilder, extensionRegistry); Object unused = setField(field, subBuilder); } else { Message.Builder subBuilder = defaultInstance.newBuilderForType(); input.readMessage(subBuilder, extensionRegistry); Object unused = addRepeatedField(field, subBuilder.buildPartial()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: mergeMessage File: java/core/src/main/java/com/google/protobuf/MessageReflection.java Repository: protocolbuffers/protobuf The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2022-3509
HIGH
7.5
protocolbuffers/protobuf
mergeMessage
java/core/src/main/java/com/google/protobuf/MessageReflection.java
a3888f53317a8018e7a439bac4abeb8f3425d5e9
0
Analyze the following code function for security vulnerabilities
public static void send(String[] args) { try (Socket socket = new Socket(InetAddress.getLocalHost(), PORT); ObjectOutputStream oos = new ObjectOutputStream(socket.getOutputStream())) { // Send args to the main JD-GUI instance oos.writeObject(args); } catch (IOException e) { assert ExceptionUtil.printStackTrace(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: send File: app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java Repository: java-decompiler/jd-gui The code follows secure coding practices.
[ "CWE-502", "CWE-79" ]
CVE-2023-26234
CRITICAL
9.8
java-decompiler/jd-gui
send
app/src/main/java/org/jd/gui/util/net/InterProcessCommunicationUtil.java
0b1f57e0a906269fa4e7bc9d9878925f0d859fb0
0