instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@PostMapping({"/upload/files"}) @ResponseBody public Result uploadV2(HttpServletRequest httpServletRequest) throws URISyntaxException { List<MultipartFile> multipartFiles = new ArrayList<>(8); if (standardServletMultipartResolver.isMultipart(httpServletRequest)) { MultipartHttpServle...
Vulnerability Classification: - CWE: CWE-434 - CVE: CVE-2022-27477 - Severity: HIGH - CVSS Score: 7.5 Description: :bug: Fixing a bug ##https://github.com/newbee-ltd/newbee-mall/issues/63 Function: uploadV2 File: src/main/java/ltd/newbee/mall/controller/common/UploadController.java Repository: newbee-ltd/newbee-mall ...
[ "CWE-434" ]
CVE-2022-27477
HIGH
7.5
newbee-ltd/newbee-mall
uploadV2
src/main/java/ltd/newbee/mall/controller/common/UploadController.java
a3aff8b6223c348eb723beda78c918a27941b1b2
1
Analyze the following code function for security vulnerabilities
protected void checkChildHierarchy(final Node newChild) throws DOMException { Node parentNode = this; while (parentNode != null) { if (parentNode == newChild) { throw new DOMException(DOMException.HIERARCHY_REQUEST_ERR, "Child node is already a parent."); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkChildHierarchy File: src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java Repository: HtmlUnit/htmlunit The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-2798
HIGH
7.5
HtmlUnit/htmlunit
checkChildHierarchy
src/main/java/com/gargoylesoftware/htmlunit/html/DomNode.java
940dc7fd
0
Analyze the following code function for security vulnerabilities
private void saveToScanDetailCacheForNetwork( WifiConfiguration config, ScanDetail scanDetail) { ScanResult scanResult = scanDetail.getScanResult(); WifiScoreCard.PerNetwork network = mWifiScoreCard.lookupNetwork(config.SSID); network.addFrequency(scanResult.frequency); Scan...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveToScanDetailCacheForNetwork File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
saveToScanDetailCacheForNetwork
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private boolean isIncluding() { return this.outputStream.isIncluding(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isIncluding File: src/java/winstone/WinstoneResponse.java Repository: jenkinsci/winstone The code follows secure coding practices.
[ "CWE-79" ]
CVE-2011-4344
LOW
2.6
jenkinsci/winstone
isIncluding
src/java/winstone/WinstoneResponse.java
410ed3001d51c689cf59085b7417466caa2ded7b
0
Analyze the following code function for security vulnerabilities
@GetMapping("{postId:\\d+}/comments/tree_view") @ApiOperation("Lists comments with tree view") public Page<BaseCommentVO> listCommentsTree(@PathVariable("postId") Integer postId, @RequestParam(name = "page", required = false, defaultValue = "0") int page, ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: listCommentsTree File: src/main/java/run/halo/app/controller/content/api/PostController.java Repository: halo-dev/halo The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-19007
LOW
3.5
halo-dev/halo
listCommentsTree
src/main/java/run/halo/app/controller/content/api/PostController.java
d6b3d6cb5d681c7d8d64fd48de6c7c99b696bb8b
0
Analyze the following code function for security vulnerabilities
private void bindDelegate() { TextView delegateView = findViewById(R.id.delegate_name); if (!TextUtils.equals(mPackageName, mDelegatePkg)) { // this notification was posted by a delegate! delegateView.setVisibility(View.VISIBLE); } else { delegateView.setVisi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bindDelegate File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
bindDelegate
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
public ApiClient setPassword(String password) { for (Authentication auth : authentications.values()) { if (auth instanceof HttpBasicAuth) { ((HttpBasicAuth) auth).setPassword(password); return this; } } throw new RuntimeException("No HTTP basic authentication configured!"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setPassword File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setPassword
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public String getApplicationRestrictionsManagingPackage(ComponentName admin) { final List<String> delegatePackages = getDelegatePackages(admin, DELEGATION_APP_RESTRICTIONS); return delegatePackages.size() > 0 ? delegatePackages.get(0) : null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getApplicationRestrictionsManagingPackage File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getApplicationRestrictionsManagingPackage
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public int getPasswordMinimumNonLetter(ComponentName who, int userHandle, boolean parent) { return getStrictestPasswordRequirement(who, userHandle, parent, admin -> admin.mPasswordPolicy.nonLetter, PASSWORD_QUALITY_COMPLEX); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPasswordMinimumNonLetter File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPasswordMinimumNonLetter
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
void setActions(Rect stackBounds, @Nullable List<RemoteAction> actions, @Nullable RemoteAction closeAction) { mActions.clear(); if (actions != null && !actions.isEmpty()) { mActions.addAll(actions); } mCloseAction = closeAction; if (mMenuState == MENU_STAT...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setActions File: libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40123
MEDIUM
5.5
android
setActions
libs/WindowManager/Shell/src/com/android/wm/shell/pip/phone/PipMenuView.java
7212a4bec2d2f1a74fa54a12a04255d6a183baa9
0
Analyze the following code function for security vulnerabilities
public ActivityManagerService getService() { return mService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getService File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
getService
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void startLockTaskModeOnCurrent() throws RemoteException;
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startLockTaskModeOnCurrent File: core/java/android/app/IActivityManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
startLockTaskModeOnCurrent
core/java/android/app/IActivityManager.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Deprecated @InlineMe( replacement = "Files.asByteSource(file).hash(hashFunction)", imports = "com.google.common.io.Files") public static HashCode hash(File file, HashFunction hashFunction) throws IOException { return asByteSource(file).hash(hashFunction); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hash File: android/guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
hash
android/guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@Nullable private String getConnectedBssidInternal() { return mLastBssid; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectedBssidInternal File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getConnectedBssidInternal
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public BaseObject getXObject(DocumentReference classReference, String key, String value, boolean failover) { try { if (value == null) { if (failover) { return getXObject(classReference); } else { return null; ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getXObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-787" ]
CVE-2023-26470
HIGH
7.5
xwiki/xwiki-platform
getXObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
db3d1c62fc5fb59fefcda3b86065d2d362f55164
0
Analyze the following code function for security vulnerabilities
private String checkNull(String value) { return TextUtils.isEmpty(value) ? sNotSet : value; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkNull File: src/com/android/settings/network/apn/ApnEditor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40125
HIGH
7.8
android
checkNull
src/com/android/settings/network/apn/ApnEditor.java
63d464c3fa5c7b9900448fef3844790756e557eb
0
Analyze the following code function for security vulnerabilities
@RequiresFeature(PackageManager.FEATURE_SECURE_LOCK_SCREEN) public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin) { return getMaximumFailedPasswordsForWipe(admin, myUserId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMaximumFailedPasswordsForWipe File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getMaximumFailedPasswordsForWipe
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
public void setServletRelativeAction(String servletRelativeaction) { this.servletRelativeAction = (servletRelativeaction != null ? servletRelativeaction : ""); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setServletRelativeAction File: spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java Repository: spring-projects/spring-framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-1904
MEDIUM
4.3
spring-projects/spring-framework
setServletRelativeAction
spring-webmvc/src/main/java/org/springframework/web/servlet/tags/form/FormTag.java
741b4b229ae032bd17175b46f98673ce0bd2d485
0
Analyze the following code function for security vulnerabilities
@Override public void close() { if (!closed) { try { tokenizer.close(); closed = true; } catch (IOException e) { throw new JsonException(JsonMessages.PARSER_TOKENIZER_CLOSE_IO(), e); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: close File: impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java Repository: eclipse-ee4j/parsson The code follows secure coding practices.
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
close
impl/src/main/java/org/eclipse/parsson/JsonParserImpl.java
ab239fee273cb262910890f1a6fe666ae92cd623
0
Analyze the following code function for security vulnerabilities
@Override public void onUserStopping(@NonNull TargetUser user) { if (user.isPreCreated()) return; mService.handleStopUser(user.getUserIdentifier()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUserStopping File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
onUserStopping
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Nullable public BackgroundActivityStartCallback getBackgroundActivityStartCallback() { return mBackgroundActivityStartCallback; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getBackgroundActivityStartCallback File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
getBackgroundActivityStartCallback
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public boolean isAlphaMutableImageSupported() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAlphaMutableImageSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isAlphaMutableImageSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public void setSuccessRedirectURI(URI uri) { setSessionAttribute(PROP_INITIAL_REQUEST, uri); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSuccessRedirectURI File: oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java Repository: xwiki-contrib/oidc The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-39387
HIGH
7.5
xwiki-contrib/oidc
setSuccessRedirectURI
oidc-authenticator/src/main/java/org/xwiki/contrib/oidc/auth/internal/OIDCClientConfiguration.java
0247af1417925b9734ab106ad7cd934ee870ac89
0
Analyze the following code function for security vulnerabilities
private boolean hasDocuments(SpaceReference spaceReference, Session session, String extraWhere, Map<String, ?> parameters) { StringBuilder builder = new StringBuilder( "select distinct xwikidoc.space from XWikiDocument as xwikidoc where (space = :space OR space LIKE :like)"); if...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: hasDocuments File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
hasDocuments
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
@Override public void setCommonCriteriaModeEnabled(ComponentName who, boolean enabled) { Objects.requireNonNull(who, "Admin component name must be provided"); final CallerIdentity caller = getCallerIdentity(who); Preconditions.checkCallAuthorization( isDefaultDeviceOwner(call...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setCommonCriteriaModeEnabled File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setCommonCriteriaModeEnabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Test(description = "Test push all packages in project to central", enabled = false) public void testPushAllPackages() throws Exception { // Test ballerina init Path projectPath = tempProjectDirectory.resolve("pushAllPackageTest"); // Create project balClient.runMain("new", ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: testPushAllPackages File: tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java Repository: ballerina-platform/ballerina-lang The code follows secure coding practices.
[ "CWE-306" ]
CVE-2021-32700
MEDIUM
5.8
ballerina-platform/ballerina-lang
testPushAllPackages
tests/jballerina-integration-test/src/test/java/org/ballerinalang/test/packaging/PackagingTestCase.java
4609ffee1744ecd16aac09303b1783bf0a525816
0
Analyze the following code function for security vulnerabilities
public ViewPage createPage(List<String> spaces, String page, String content, String title) { return createPage(spaces, page, content, title, null); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPage File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
createPage
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public void onNotificationClick(int callingUid, int callingPid, String key) { synchronized (mNotificationList) { NotificationRecord r = mNotificationsByKey.get(key); if (r == null) { Log.w(TAG, "No notification with key: " + key); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNotificationClick File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
onNotificationClick
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
public void handleApplicationStrictModeViolation( IBinder app, int penaltyMask, StrictMode.ViolationInfo info) { // We're okay if the ProcessRecord is missing; it probably means that // we're reporting a violation from the system process itself. final ProcessR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleApplicationStrictModeViolation File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
handleApplicationStrictModeViolation
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public JSONArray getUserNav(ID user, HttpServletRequest request) { ConfigBean config = null; if (request != null) { String useNav = ServletUtils.readCookie(request, "AppHome.Nav"); ID useNavId; if ((useNavId = MetadataHelper.checkSpecEntityId(useNav, EntityHelper.Lay...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserNav File: src/main/java/com/rebuild/core/configuration/NavBuilder.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
getUserNav
src/main/java/com/rebuild/core/configuration/NavBuilder.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
private ConsoleResult diffTree(String node) { CommandLine gitCmd = gitWd().withArgs("diff-tree", "--name-status", "--root", "-r", node); return runOrBomb(gitCmd); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: diffTree File: domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java Repository: gocd The code follows secure coding practices.
[ "CWE-77" ]
CVE-2021-43286
MEDIUM
6.5
gocd
diffTree
domain/src/main/java/com/thoughtworks/go/domain/materials/git/GitCommand.java
6fa9fb7a7c91e760f1adc2593acdd50f2d78676b
0
Analyze the following code function for security vulnerabilities
public boolean onGenericMotionEvent(MotionEvent event) { if ((event.getSource() & InputDevice.SOURCE_CLASS_POINTER) != 0) { switch (event.getAction()) { case MotionEvent.ACTION_SCROLL: if (mNativeContentViewCore == 0) return false; nativeSendM...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onGenericMotionEvent File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onGenericMotionEvent
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Test public void parseQueryMTypeWWildcardFilterExplicit() throws Exception { HttpQuery query = NettyMocks.getQuery(tsdb, "/api/query?start=1h-ago&m=sum:sys.cpu.0{}{host=wildcard(*quirm)}"); TSQuery tsq = (TSQuery) parseQuery.invoke(rpc, tsdb, query, expressions); TSSubQuery sub = tsq.getQueries().g...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseQueryMTypeWWildcardFilterExplicit File: test/tsd/TestQueryRpc.java Repository: OpenTSDB/opentsdb The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-25827
MEDIUM
6.1
OpenTSDB/opentsdb
parseQueryMTypeWWildcardFilterExplicit
test/tsd/TestQueryRpc.java
ff02c1e95e60528275f69b31bcbf7b2ac625cea8
0
Analyze the following code function for security vulnerabilities
public ConnectionFactory load(String propertyFileLocation) throws IOException { ConnectionFactoryConfigurator.load(this, propertyFileLocation); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: load File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
load
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
public String getResourceAsString(String providerName, String resourcePath) throws IOException { File file = getResource(providerName, resourcePath); if (file == null) { return null; } return OpenmrsUtil.getFileAsString(file); }
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2020-24621 - Severity: MEDIUM - CVSS Score: 6.5 Description: UIFR-215: Do not allow loading arbitrary files Function: getResourceAsString File: api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java Repository: openmrs/openmrs-module-uiframework...
[ "CWE-22" ]
CVE-2020-24621
MEDIUM
6.5
openmrs/openmrs-module-uiframework
getResourceAsString
api/src/main/java/org/openmrs/ui/framework/resource/ResourceFactory.java
0422fa52c7eba3d96cce2936cb92897dca4b680a
1
Analyze the following code function for security vulnerabilities
@Override public void onModeChange(AjaxRequestTarget target, Mode mode, @Nullable String newPath) { onModeChange(target, mode, false, newPath); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onModeChange File: server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-434" ]
CVE-2021-21245
HIGH
7.5
theonedev/onedev
onModeChange
server-core/src/main/java/io/onedev/server/web/page/project/blob/ProjectBlobPage.java
0c060153fb97c0288a1917efdb17cc426934dacb
0
Analyze the following code function for security vulnerabilities
@Override public Jooby use(final String path, final Jooby app) { return use(prefixPath(path), app); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: use File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
use
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
public static boolean sanitizeUrl(String url) { if (url != null) { try { URL parsedUrl = new URL(url); String protocol = parsedUrl.getProtocol(); String host = parsedUrl.getHost(); InetAddress address = InetAddress.getByName(host); String hostAddress = address.getHostAddress(); host =...
Vulnerability Classification: - CWE: CWE-284, CWE-79 - CVE: CVE-2022-3065 - Severity: HIGH - CVSS Score: 7.5 Description: 20.2.8 release Function: sanitizeUrl File: src/main/java/com/mxgraph/online/Utils.java Repository: jgraph/drawio Fixed Code: public static boolean sanitizeUrl(String url) { if (url != null) ...
[ "CWE-284", "CWE-79" ]
CVE-2022-3065
HIGH
7.5
jgraph/drawio
sanitizeUrl
src/main/java/com/mxgraph/online/Utils.java
59887e45b36f06c8dd4919a32bacd994d9f084da
1
Analyze the following code function for security vulnerabilities
public void setVersioningStore(XWikiVersioningStoreInterface versioningStore) { this.versioningStore = versioningStore; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setVersioningStore File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
setVersioningStore
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
@Override public void startAddAccountSession( final IAccountManagerResponse response, final String accountType, final String authTokenType, final String[] requiredFeatures, final boolean expectActivityLaunch, final Bundle optionsIn) { B...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startAddAccountSession File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
startAddAccountSession
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
@RequiresPermission(value = Manifest.permission.WHITELIST_AUTO_REVOKE_PERMISSIONS, conditional = true) public boolean isAutoRevokeExempted(@NonNull String packageName) { try { return mPermissionManager.isAutoRevokeExempted(packageName, mContext.getUserId()); } catch (RemoteEx...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAutoRevokeExempted File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
isAutoRevokeExempted
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
public void onScreenTurningOn() { mScreenTurningOn = true; mFalsingManager.onScreenTurningOn(); mNotificationPanel.onScreenTurningOn(); if (mLaunchCameraOnScreenTurningOn) { mNotificationPanel.launchCamera(false, mLastCameraLaunchSource); mLaunchCameraOnScreenTurn...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onScreenTurningOn File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
onScreenTurningOn
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
@Deprecated public boolean getCrossProfileContactsSearchDisabled(@NonNull UserHandle userHandle) { if (mService != null) { try { return mService .getCrossProfileContactsSearchDisabledForUser(userHandle.getIdentifier()); } catch (RemoteException...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getCrossProfileContactsSearchDisabled File: core/java/android/app/admin/DevicePolicyManager.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40089
HIGH
7.8
android
getCrossProfileContactsSearchDisabled
core/java/android/app/admin/DevicePolicyManager.java
e2e05f488da6abc765a62e7faf10cb74e729732e
0
Analyze the following code function for security vulnerabilities
@Override public BigDecimal bigDecimalValue() { return bigDecimal; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: bigDecimalValue File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repository: eclipse-ee4j/parsson The code follows secure coding practices.
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
bigDecimalValue
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
84764ffbe3d0376da242b27a9a526138d0dfb8e6
0
Analyze the following code function for security vulnerabilities
private <T> Map<String, T> stripCallResult(Map<String, CallResult<T>> input) { return input.entrySet().stream() .filter(e -> e.getValue().response() != null && e.getValue().response().entity().isPresent()) .collect(Collectors.toMap(Map.Entry::getKey, v -> v.getValue().response()....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stripCallResult File: graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java Repository: Graylog2/graylog2-server The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-41044
LOW
3.8
Graylog2/graylog2-server
stripCallResult
graylog2-server/src/main/java/org/graylog2/rest/resources/system/debug/bundle/SupportBundleService.java
02b8792e6f4b829f0c1d87fcbf2d58b73458b938
0
Analyze the following code function for security vulnerabilities
public Integer getModified() { return modified; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getModified File: src/main/java/cn/luischen/model/ContentDomain.java Repository: WinterChenS/my-site The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29638
MEDIUM
5.4
WinterChenS/my-site
getModified
src/main/java/cn/luischen/model/ContentDomain.java
d104f38aaae2f1b76c33fadfcf6b1ef1c6c340ed
0
Analyze the following code function for security vulnerabilities
public void clickAdd(Object idOrAlias) { Log log = findByIdOrAlias(idOrAlias); if (log != null) { log.set("logId", log.getInt("logId")).set("click", log.getInt("click") + 1).update(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clickAdd File: data/src/main/java/com/zrlog/model/Log.java Repository: 94fzb/zrlog The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-17420
MEDIUM
6.5
94fzb/zrlog
clickAdd
data/src/main/java/com/zrlog/model/Log.java
157b8fbbb64eb22ddb52e7c5754e88180b7c3d4f
0
Analyze the following code function for security vulnerabilities
public List<MsExecResponseDTO> run(RunScenarioRequest request) { return apiScenarioExecuteService.run(request); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: run File: backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2021-45789
MEDIUM
6.5
metersphere
run
backend/src/main/java/io/metersphere/api/service/ApiAutomationService.java
d74e02cdff47cdf7524d305d098db6ffb7f61b47
0
Analyze the following code function for security vulnerabilities
void invokeNextAgent() { mStatus = BackupTransport.TRANSPORT_OK; addBackupTrace("invoke q=" + mQueue.size()); // Sanity check that we have work to do. If not, skip to the end where // we reestablish the wakelock invariants etc. if (mQueue.isEmpty()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: invokeNextAgent File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
invokeNextAgent
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private <K, V> RemoteCache<K, V> createRemoteCache(String cacheName, Boolean forceReturnValueOverride) { synchronized (cacheName2RemoteCache) { RemoteCacheKey key = new RemoteCacheKey(cacheName, forceReturnValueOverride); if (!cacheName2RemoteCache.containsKey(k...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createRemoteCache File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
createRemoteCache
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
efc44b7b0a5dd4f44773808840dd9785cabcf21c
0
Analyze the following code function for security vulnerabilities
@Override public List<UserHandle> getPolicyManagedProfiles(@NonNull UserHandle user) { Preconditions.checkCallAuthorization(hasCallingOrSelfPermission( android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS)); int userId = user.getIdentifier(); return mInjector.binderWi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPolicyManagedProfiles File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getPolicyManagedProfiles
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
boolean isClosed() { return mClosed; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isClosed File: core/java/android/os/Process.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3911
HIGH
9.3
android
isClosed
core/java/android/os/Process.java
2c7008421cb67f5d89f16911bdbe36f6c35311ad
0
Analyze the following code function for security vulnerabilities
public static String issueJwt(String subject, Long period, List<String> roles, Map<String, Object> customClaimMap){ String id = UUID.randomUUID().toString(); String issuer = "sureness-token-server"; return issueJwt(id, subject, issuer, period, ro...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: issueJwt File: core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java Repository: dromara/sureness The code follows secure coding practices.
[ "CWE-798" ]
CVE-2023-31581
CRITICAL
9.8
dromara/sureness
issueJwt
core/src/main/java/com/usthe/sureness/util/JsonWebTokenUtil.java
4f5fefaf673168d74820020a191fab2904629742
0
Analyze the following code function for security vulnerabilities
public UserDTO getUserDTO(String userId) { User user = userMapper.selectByPrimaryKey(userId); if (user == null) { return null; } if (StringUtils.equals(user.getStatus(), UserStatus.DISABLED)) { throw new RuntimeException(Translator.get("user_has_been_disabled"));...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUserDTO File: framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java Repository: metersphere The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-32699
MEDIUM
6.5
metersphere
getUserDTO
framework/gateway/src/main/java/io/metersphere/gateway/service/UserLoginService.java
c59e381d368990214813085a1a4877c5ef865411
0
Analyze the following code function for security vulnerabilities
@CalledByNative void onNativeContentViewCoreDestroyed(long nativeContentViewCore) { assert nativeContentViewCore == mNativeContentViewCore; mNativeContentViewCore = 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onNativeContentViewCoreDestroyed File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
onNativeContentViewCoreDestroyed
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override protected boolean isPackageForFilter(String packageName, PackageParser.ActivityIntentInfo info) { return packageName.equals(info.activity.owner.packageName); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isPackageForFilter File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
isPackageForFilter
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public Set<String> getTreatReferencesAsLogical() { return myModelConfig.getTreatReferencesAsLogical(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTreatReferencesAsLogical File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getTreatReferencesAsLogical
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
public void setSiteId(short siteId) { this.siteId = siteId; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSiteId File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java Repository: sanluan/PublicCMS The code follows secure coding practices.
[ "CWE-79" ]
CVE-2020-21333
LOW
3.5
sanluan/PublicCMS
setSiteId
publiccms-parent/publiccms-core/src/main/java/com/publiccms/entities/trade/TradeOrder.java
b4d5956e65b14347b162424abb197a180229b3db
0
Analyze the following code function for security vulnerabilities
private String getNetworkLoggingText() { return getUpdatableString( NETWORK_LOGGING_MESSAGE, R.string.network_logging_notification_text); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getNetworkLoggingText File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getNetworkLoggingText
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
protected CacheKeyGenerator resolveKeyGenerator(Class<? extends CacheKeyGenerator> type) { if (type == null) { type = DefaultCacheKeyGenerator.class; } return keyGenerators.computeIfAbsent(type, aClass -> { if (beanContext.containsBean(aClass)) { return b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: resolveKeyGenerator File: runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
resolveKeyGenerator
runtime/src/main/java/io/micronaut/cache/interceptor/CacheInterceptor.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
private boolean deleteGlobalSetting(String name, int requestingUserId, boolean forceNotify) { if (DEBUG) { Slog.v(LOG_TAG, "deleteGlobalSetting(" + name + ", " + requestingUserId + ", " + forceNotify + ")"); } return mutateGlobalSetting(name, null, null, false, re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteGlobalSetting File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
deleteGlobalSetting
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
private void dismissWaitingDialog() { Fragment frag = getSupportFragmentManager().findFragmentByTag(WAIT_DIALOG_TAG); if (frag instanceof DialogFragment) { DialogFragment dialog = (DialogFragment) frag; try { dialog.dismiss(); } catch (IllegalStateExc...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dismissWaitingDialog File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
dismissWaitingDialog
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private void migrate90(File dataDir, Stack<Integer> versions) { for (File file: dataDir.listFiles()) { if (file.getName().startsWith("PullRequests.xml")) { VersionedXmlDoc dom = VersionedXmlDoc.fromFile(file); for (Element element: dom.getRootElement().elements()) { Element closeInfoElement = element....
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrate90 File: server-core/src/main/java/io/onedev/server/migration/DataMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-338" ]
CVE-2023-24828
HIGH
8.8
theonedev/onedev
migrate90
server-core/src/main/java/io/onedev/server/migration/DataMigrator.java
d67dd9686897fe5e4ab881d749464aa7c06a68e5
0
Analyze the following code function for security vulnerabilities
private void handleRouteMatch( RouteMatch<?> route, NettyHttpRequest<?> request, ChannelHandlerContext context) { // Set the matched route on the request request.setMatchedRoute(route); // try to fulfill the argument requirements of the route route = requestArgum...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleRouteMatch File: http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
handleRouteMatch
http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
boolean isCurrentProfileLocked(int userId) { if (userId == mCurrentUser) return true; for (int i = 0; i < mService.mCurrentProfileIds.length; i++) { if (mService.mCurrentProfileIds[i] == userId) return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCurrentProfileLocked File: services/core/java/com/android/server/am/ActivityStackSupervisor.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3838
MEDIUM
4.3
android
isCurrentProfileLocked
services/core/java/com/android/server/am/ActivityStackSupervisor.java
468651c86a8adb7aa56c708d2348e99022088af3
0
Analyze the following code function for security vulnerabilities
private void retryUploads(Intent intent, User user, List<String> requestedUploads) { boolean onWifiOnly; boolean whileChargingOnly; OCUpload upload = intent.getParcelableExtra(KEY_RETRY_UPLOAD); onWifiOnly = upload.isUseWifiOnly(); whileChargingOnly = upload.isWhileChargingOnly(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: retryUploads File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-39210
MEDIUM
5.5
nextcloud/android
retryUploads
app/src/main/java/com/owncloud/android/files/services/FileUploader.java
cd3bd0845a97e1d43daa0607a122b66b0068c751
0
Analyze the following code function for security vulnerabilities
public int getAttributeListValue(String namespace, String attribute, String[] options, int defaultValue) { int idx = nativeGetAttributeIndex(mParseState, namespace, attribute); if (idx >= 0) { return getAttributeListValue(idx, options, defaultValue); }...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAttributeListValue File: core/java/android/content/res/XmlBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
getAttributeListValue
core/java/android/content/res/XmlBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
private void setOnAnimationStartedListener(final Handler handler, final OnAnimationStartedListener listener) { if (listener != null) { mAnimationStartedListener = new IRemoteCallback.Stub() { @Override public void sendResult(Bundle data) throws RemoteExcep...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setOnAnimationStartedListener File: core/java/android/app/ActivityOptions.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-20918
CRITICAL
9.8
android
setOnAnimationStartedListener
core/java/android/app/ActivityOptions.java
51051de4eb40bb502db448084a83fd6cbfb7d3cf
0
Analyze the following code function for security vulnerabilities
public FrameHandler create(Socket sock) throws IOException { return new SocketFrameHandler(sock, this.shutdownExecutor); }
Vulnerability Classification: - CWE: CWE-400 - CVE: CVE-2023-46120 - Severity: HIGH - CVSS Score: 7.5 Description: Add max inbound message size to ConnectionFactory To avoid OOM with a very large message. The default value is 64 MiB. Fixes #1062 (cherry picked from commit 9ed45fde52224ec74fc523321efdf9a157d5cfca) ...
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
create
src/main/java/com/rabbitmq/client/impl/SocketFrameHandlerFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
1
Analyze the following code function for security vulnerabilities
@Override protected void handlePollStateResult(int what, AsyncResult ar) { // Ignore stale requests from last poll. if (ar.userObj != mPollingContext) return; if (ar.exception != null) { CommandException.Error err=null; if (ar.exception instanceof CommandException) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handlePollStateResult File: src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2016-3831
MEDIUM
5
android
handlePollStateResult
src/java/com/android/internal/telephony/cdma/CdmaServiceStateTracker.java
f47bc301ccbc5e6d8110afab5a1e9bac1d4ef058
0
Analyze the following code function for security vulnerabilities
public void collectObserversLocked(Uri uri, int index, IContentObserver observer, boolean observerWantsSelfNotifications, int targetUserHandle, ArrayList<ObserverCall> calls) { String segment = null; int segmentCount = countUriSegments(uri); if (index ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: collectObserversLocked File: services/core/java/com/android/server/content/ContentService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2426
MEDIUM
4.3
android
collectObserversLocked
services/core/java/com/android/server/content/ContentService.java
63363af721650e426db5b0bdfb8b2d4fe36abdb0
0
Analyze the following code function for security vulnerabilities
@Override public boolean isStarted() { return started; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isStarted File: client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java Repository: infinispan The code follows secure coding practices.
[ "CWE-502" ]
CVE-2017-15089
MEDIUM
6.5
infinispan
isStarted
client/hotrod-client/src/main/java/org/infinispan/client/hotrod/RemoteCacheManager.java
efc44b7b0a5dd4f44773808840dd9785cabcf21c
0
Analyze the following code function for security vulnerabilities
void setName(String name) { mName = name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setName File: src/com/android/certinstaller/CredentialHelper.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-2422
HIGH
9.3
android
setName
src/com/android/certinstaller/CredentialHelper.java
70dde9870e9450e10418a32206ac1bb30f036b2c
0
Analyze the following code function for security vulnerabilities
private boolean toBoolean(K name, V value) { try { return valueConverter.convertToBoolean(value); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("Failed to convert header value to boolean for header '" + name + '\''); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toBoolean File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
toBoolean
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
@Override public boolean isVoiceMailNumber(PhoneAccountHandle accountHandle, String number, String callingPackage, String callingFeatureId) { try { Log.startSession("TSI.iVMN"); synchronized (mLock) { if (!canReadPhoneState(callingP...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isVoiceMailNumber File: src/com/android/server/telecom/TelecomServiceImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21394
MEDIUM
5.5
android
isVoiceMailNumber
src/com/android/server/telecom/TelecomServiceImpl.java
68dca62035c49e14ad26a54f614199cb29a3393f
0
Analyze the following code function for security vulnerabilities
@Override public boolean takeFocus(boolean reverse) { int direction = (reverse == (mContainerView.getLayoutDirection() == View.LAYOUT_DIRECTION_RTL)) ? View.FOCUS_RIGHT : View.FOCUS_LEFT; if (tryToMoveFocus(direction)) return true; direction = reverse ? View.FOCUS_UP ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: takeFocus File: android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
takeFocus
android_webview/java/src/org/chromium/android_webview/AwWebContentsDelegateAdapter.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
@Override public void onClientRemoved(RealmModel realm, ClientModel client) { onClientRemoved(client.getId()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onClientRemoved File: model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java Repository: keycloak The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-6563
HIGH
7.7
keycloak
onClientRemoved
model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java
11eb952e1df7cbb95b1e2c101dfd4839a2375695
0
Analyze the following code function for security vulnerabilities
public Set<String> getExcludedUsersNormalized() { String s = fixEmptyAndTrim(excludedUsers); if (s==null) return Collections.emptySet(); Set<String> users = new HashSet<String>(); for (String user : s.split("[\\r\\n]+")) users.add(user.trim()); return use...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExcludedUsersNormalized File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getExcludedUsersNormalized
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
private Response sendRequest(String method, Invocation.Builder invocationBuilder, Entity<?> entity) { Response response; if ("POST".equals(method)) { response = invocationBuilder.post(entity); } else if ("PUT".equals(method)) { response = invocationBuilder.put(entity); } else if ("DELETE".eq...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendRequest File: samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
sendRequest
samples/client/petstore/java/okhttp-gson-parcelableModel/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public int countByUuid(String uuid) { FinderPath finderPath = FINDER_PATH_COUNT_BY_UUID; Object[] finderArgs = new Object[] { uuid }; Long count = (Long)finderCache.getResult(finderPath, finderArgs, this); if (count == null) { StringBundler query = new StringBundler(2); query.append(_SQL_CO...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: countByUuid File: modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java Repository: brianchandotcom/liferay-portal The code...
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
countByUuid
modules/apps/knowledge-base/knowledge-base-service/src/main/java/com/liferay/knowledge/base/service/persistence/impl/KBTemplatePersistenceImpl.java
ef93d984be9d4d478a5c4b1ca9a86f4e80174774
0
Analyze the following code function for security vulnerabilities
public Path getDirectory() { return directory; }
Vulnerability Classification: - CWE: CWE-611 - CVE: CVE-2022-41967 - Severity: HIGH - CVSS Score: 7.5 Description: fix: CVE-2022-41967 Dragonfly v0.3.0-SNAPSHOT fails to properly configure the DocumentBuilderFactory to prevent XML enternal entity (XXE) attacks when parsing maven-metadata.xml files provided by externa...
[ "CWE-611" ]
CVE-2022-41967
HIGH
7.5
HyperaDev/Dragonfly
getDirectory
src/main/java/dev/hypera/dragonfly/Dragonfly.java
9661375e1135127ca6cdb5712e978bec33cc06b3
1
Analyze the following code function for security vulnerabilities
@Override public void endWikiObject(String name, FilterEventParameters parameters) throws FilterException { super.endWikiObject(name, parameters); BaseObject baseObject = getBaseObjectOutputFilterStream().getEntity(); if (baseObject.getNumber() < 0) { this.entity.addXObject...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: endWikiObject File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java Repository: xwiki/xwiki-platform The code follows secure coding pr...
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
endWikiObject
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/filter/output/XWikiDocumentOutputFilterStream.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
default Optional<String> getMessage(Object error) { if (error == null) { return Optional.empty(); } if (error instanceof JsonError) { return Optional.ofNullable(((JsonError) error).getMessage()); } else { if (error instanceof Described) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMessage File: http-client/src/main/java/io/micronaut/http/client/exceptions/HttpClientErrorDecoder.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
getMessage
http-client/src/main/java/io/micronaut/http/client/exceptions/HttpClientErrorDecoder.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
int build(String[] args, int opti) { for (; opti<args.length; opti++) { String name = args[opti]; if ("--".equals(name)) { return opti+1; } build(name); } return opti; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: build File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
build
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
protected void finishSetup(int action, Intent intent, Bundle savedInstanceState) { setFocus(action); // Don't bother with the intent if we have procured a message from the // intent already. if (!hadSavedInstanceStateMessage(savedInstanceState)) { initAttachmentsFromIntent(in...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishSetup File: src/com/android/mail/compose/ComposeActivity.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2425
MEDIUM
4.3
android
finishSetup
src/com/android/mail/compose/ComposeActivity.java
0d9dfd649bae9c181e3afc5d571903f1eb5dc46f
0
Analyze the following code function for security vulnerabilities
public void dispatchToPath(final HttpServerExchange exchange, final ServletPathMatch pathInfo, final DispatcherType dispatcherType) throws Exception { final ServletRequestContext servletRequestContext = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY); servletRequestContext.setServletPathMat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: dispatchToPath File: servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java Repository: undertow-io/undertow The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10184
MEDIUM
5
undertow-io/undertow
dispatchToPath
servlet/src/main/java/io/undertow/servlet/handlers/ServletInitialHandler.java
d2715e3afa13f50deaa19643676816ce391551e9
0
Analyze the following code function for security vulnerabilities
@Override public void setStrictModeVisualIndicatorPreference(String value) { SystemProperties.set(StrictMode.VISUAL_PROPERTY, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setStrictModeVisualIndicatorPreference File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setStrictModeVisualIndicatorPreference
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
public boolean isDbLockedByCurrentThread() { acquireReference(); try { return getThreadSession().hasConnection(); } finally { releaseReference(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDbLockedByCurrentThread File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
isDbLockedByCurrentThread
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
public void receivedWnmFrame(WnmData data) { mPasspointEventHandler.notifyWnmFrameReceived(data); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: receivedWnmFrame File: service/java/com/android/server/wifi/hotspot2/PasspointManager.java Repository: android The code follows secure coding practices.
[ "CWE-120" ]
CVE-2023-21243
MEDIUM
5.5
android
receivedWnmFrame
service/java/com/android/server/wifi/hotspot2/PasspointManager.java
5b49b8711efaadadf5052ba85288860c2d7ca7a6
0
Analyze the following code function for security vulnerabilities
@Override public int getSize(Paint paint, CharSequence text, int start, int end, Paint.FontMetricsInt fm) { return (int) paint.measureText(ELLIPSIS); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSize File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java Repository: chromium The code follows secure coding practices.
[ "CWE-254" ]
CVE-2016-5163
MEDIUM
4.3
chromium
getSize
chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
3bd33fee094e863e5496ac24714c558bd58d28ef
0
Analyze the following code function for security vulnerabilities
public boolean isSimPinVoiceSecure() { // TODO: only count SIMs that handle voice return isSimPinSecure(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSimPinVoiceSecure File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
isSimPinVoiceSecure
packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
f5334952131afa835dd3f08601fb3bced7b781cd
0
Analyze the following code function for security vulnerabilities
private Class<?> readNewClass(boolean unshared) throws ClassNotFoundException, IOException { ObjectStreamClass classDesc = readClassDesc(); if (classDesc == null) { throw missingClassDescriptor(); } Class<?> localClass = classDesc.forClass(); if (localClass != null) {...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readNewClass File: luni/src/main/java/java/io/ObjectInputStream.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-7911
HIGH
7.2
android
readNewClass
luni/src/main/java/java/io/ObjectInputStream.java
738c833d38d41f8f76eb7e77ab39add82b1ae1e2
0
Analyze the following code function for security vulnerabilities
private void handleSavePolicyFile() { if (DBG) Slog.d(TAG, "handleSavePolicyFile"); synchronized (mPolicyFile) { final FileOutputStream stream; try { stream = mPolicyFile.startWrite(); } catch (IOException e) { Slog.w(TAG, "Failed to sa...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleSavePolicyFile File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
handleSavePolicyFile
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
private boolean tryDelete() { if (folder == null) { return true; } return recursiveDelete(folder); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tryDelete File: src/main/java/org/junit/rules/TemporaryFolder.java Repository: junit-team/junit4 The code follows secure coding practices.
[ "CWE-732" ]
CVE-2020-15250
LOW
1.9
junit-team/junit4
tryDelete
src/main/java/org/junit/rules/TemporaryFolder.java
610155b8c22138329f0723eec22521627dbc52ae
0
Analyze the following code function for security vulnerabilities
@Override public int startActivityIntentSender(IApplicationThread caller, IntentSender intent, Intent fillInIntent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int flagsMask, int flagsValues, Bundle options) { enforceNotIsolatedCaller("startA...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivityIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startActivityIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public void setChannelShouldCheckRpcResponseType(boolean channelShouldCheckRpcResponseType) { this.channelShouldCheckRpcResponseType = channelShouldCheckRpcResponseType; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setChannelShouldCheckRpcResponseType File: src/main/java/com/rabbitmq/client/ConnectionFactory.java Repository: rabbitmq/rabbitmq-java-client The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-46120
HIGH
7.5
rabbitmq/rabbitmq-java-client
setChannelShouldCheckRpcResponseType
src/main/java/com/rabbitmq/client/ConnectionFactory.java
714aae602dcae6cb4b53cadf009323ebac313cc8
0
Analyze the following code function for security vulnerabilities
@Override public int available() throws IOException { assertStreamOpen(); return entryEOFReached ? 0 : 1; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: available File: src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java Repository: srikanth-lingala/zip4j The code follows secure coding practices.
[ "CWE-346" ]
CVE-2023-22899
MEDIUM
5.9
srikanth-lingala/zip4j
available
src/main/java/net/lingala/zip4j/io/inputstream/ZipInputStream.java
ddd8fdc8ad0583eb4a6172dc86c72c881485c55b
0
Analyze the following code function for security vulnerabilities
private boolean isSecureSettingsKey(int key) { return getTypeFromKey(key) == SETTINGS_TYPE_SECURE; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isSecureSettingsKey File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3876
HIGH
7.2
android
isSecureSettingsKey
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
91fc934bb2e5ea59929bb2f574de6db9b5100745
0
Analyze the following code function for security vulnerabilities
private void writePolicyXml(OutputStream stream, boolean forBackup) throws IOException { final XmlSerializer out = new FastXmlSerializer(); out.setOutput(stream, StandardCharsets.UTF_8.name()); out.startDocument(null, true); out.startTag(null, TAG_NOTIFICATION_POLICY); out.attrib...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: writePolicyXml File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
writePolicyXml
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
0
Analyze the following code function for security vulnerabilities
@Override public void onPackageAdded(String packageName, int uid) { // Called on a handler, and running as the system cancelAccountAccessRequestNotificationIfNeeded(uid, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onPackageAdded File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
onPackageAdded
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0