instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
@Override public void setAccountManagementDisabled(ComponentName who, String accountType, boolean disabled, boolean parent) { if (!mHasFeature) { return; } Objects.requireNonNull(who, "ComponentName is null"); final CallerIdentity caller = getCallerIdentity(wh...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2023-21284 - Severity: MEDIUM - CVSS Score: 5.5 Description: Ensure policy has no absurdly long strings The following APIs now enforce limits and throw IllegalArgumentException when limits are violated: * DPM.setTrustAgentConfiguration() limits agent packgage nam...
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setAccountManagementDisabled
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
1
Analyze the following code function for security vulnerabilities
public List<Diagnostic> doDiagnostics(DOMDocument xmlDocument, CancelChecker monitor, XMLValidationSettings validationSettings) { return diagnostics.doDiagnostics(xmlDocument, monitor, validationSettings); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: doDiagnostics File: org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java Repository: eclipse/lemminx The code follows secure coding practices.
[ "CWE-22" ]
CVE-2019-18212
MEDIUM
4
eclipse/lemminx
doDiagnostics
org.eclipse.lsp4xml/src/main/java/org/eclipse/lsp4xml/services/XMLLanguageService.java
e37c399aa266be1b7a43061d4afc43dc230410d2
0
Analyze the following code function for security vulnerabilities
@Override public void onCreateContextMenu(ContextMenu menu, View v, ContextMenuInfo menuInfo) { synchronized (this.messageList) { super.onCreateContextMenu(menu, v, menuInfo); AdapterView.AdapterContextMenuInfo acmi = (AdapterContextMenuInfo) menuInfo; this.selectedMessag...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onCreateContextMenu File: src/main/java/eu/siacs/conversations/ui/ConversationFragment.java Repository: iNPUTmice/Conversations The code follows secure coding practices.
[ "CWE-200" ]
CVE-2018-18467
MEDIUM
5
iNPUTmice/Conversations
onCreateContextMenu
src/main/java/eu/siacs/conversations/ui/ConversationFragment.java
7177c523a1b31988666b9337249a4f1d0c36f479
0
Analyze the following code function for security vulnerabilities
private static void securityXmlGenerator(XmlGenerator gen, Config config) { SecurityConfig c = config.getSecurityConfig(); if (c == null) { return; } gen.open("security", "enabled", c.isEnabled()) .node("client-block-unmapped-actions", c.getClientBlockUnmappedActi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: securityXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
securityXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public String getPreviousDocstructUrl() throws IndexUnreachableException, PresentationException, DAOException, ViewerConfigurationException { // logger.trace("getPreviousDocstructUrl"); if (viewManager == null) { return null; } List<String> docstructTypes = Da...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPreviousDocstructUrl File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/goobi-viewer-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
getPreviousDocstructUrl
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
0
Analyze the following code function for security vulnerabilities
public ResourceInfo findResource(String libraryName, String resourceName, String contentType, boolean isViewResource, FacesContext ctx) { String localePrefix = getLocalePrefix(ctx); List<String> contracts = getResourceLibraryContracts(ctx); ResourceInfo info = getFromCache(reso...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findResource File: impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
findResource
impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
void tearDownAgentAndKill(ApplicationInfo app) { try { // unbind and tidy up even on timeout or failure, just in case mActivityManager.unbindBackupAgent(app); // The agent was running with a stub Application object, so shut it down. // !!! We hardcode the confirm...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: tearDownAgentAndKill File: services/backup/java/com/android/server/backup/BackupManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3759
MEDIUM
5
android
tearDownAgentAndKill
services/backup/java/com/android/server/backup/BackupManagerService.java
9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
0
Analyze the following code function for security vulnerabilities
public void setImageToShow(String imageToShow) { synchronized (lock) { this.imageToShow = imageToShow; if (viewManager != null) { viewManager.setDropdownSelected(String.valueOf(imageToShow)); } // Reset LOGID (the LOGID setter is called later by Pr...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2023-29014 - Severity: MEDIUM - CVSS Score: 6.1 Description: Only allow setting logId to a value matching [\w-]+ refs #24571 Function: setImageToShow File: goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java Repository: intranda/...
[ "CWE-79" ]
CVE-2023-29014
MEDIUM
6.1
intranda/goobi-viewer-core
setImageToShow
goobi-viewer-core/src/main/java/io/goobi/viewer/managedbeans/ActiveDocumentBean.java
c29efe60e745a94d03debc17681c4950f3917455
1
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") public <P extends ParaObject> P populate(HttpServletRequest req, P pobj, String... paramName) { if (pobj == null || paramName == null) { return pobj; } Map<String, Object> data = new LinkedHashMap<String, Object>(); if (isApiRequest(req)) { try { data = (Map<String, Obj...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: populate File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
populate
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public File downloadFileFromResponse(Response response) throws ApiException { try { File file = prepareDownloadFile(response); Files.copy(response.readEntity(InputStream.class), file.toPath(), StandardCopyOption.REPLACE_EXISTING); return file; } catch (IOException e) { throw new ApiExcep...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: downloadFileFromResponse File: samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
downloadFileFromResponse
samples/client/petstore/java/retrofit2-play26/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
public List<IFileAsset> fromContentletsI(List<Contentlet> cons) { List<IFileAsset> fas = new ArrayList<IFileAsset>(); for (Contentlet con : cons) { fas.add(fromContentlet(con)); } return fas; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fromContentletsI File: dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-434" ]
CVE-2017-11466
HIGH
9
dotCMS/core
fromContentletsI
dotCMS/src/main/java/com/dotmarketing/portlets/fileassets/business/FileAssetAPIImpl.java
ab2bb2e00b841d131b8734227f9106e3ac31bb99
0
Analyze the following code function for security vulnerabilities
private List<? extends Post> getPostsForUser(String type, Pager pager) { pager.setSortby("votes"); return client().findTerms(type, Collections.singletonMap(Config._CREATORID, getId()), true, pager); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getPostsForUser File: src/main/java/com/erudika/scoold/core/Profile.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
getPostsForUser
src/main/java/com/erudika/scoold/core/Profile.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public static Map<Object,Object> getSystemProperties(VirtualChannel channel) throws IOException, InterruptedException { if(channel==null) return Collections.<Object,Object>singletonMap("N/A","N/A"); return channel.call(new GetSystemProperties()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSystemProperties File: core/src/main/java/hudson/util/RemotingDiagnostics.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-2068
LOW
3.5
jenkinsci/jenkins
getSystemProperties
core/src/main/java/hudson/util/RemotingDiagnostics.java
0530a6645aac10fec005614211660e98db44b5eb
0
Analyze the following code function for security vulnerabilities
private List<ResolveInfo> collectReceiverComponents(Intent intent, String resolvedType, int callingUid, int[] users) { // TODO: come back and remove this assumption to triage all broadcasts int pmFlags = STOCK_PM_FLAGS | MATCH_DEBUG_TRIAGED_MISSING; List<ResolveInfo> receivers = nul...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: collectReceiverComponents File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
collectReceiverComponents
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public static long estimateMaxDirectMemory() { long maxDirectMemory = 0; ClassLoader systemClassLoader = null; try { systemClassLoader = getSystemClassLoader(); // When using IBM J9 / Eclipse OpenJ9 we should not use VM.maxDirectMemory() as it not reflects the ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: estimateMaxDirectMemory File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
estimateMaxDirectMemory
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
private void scheduleSaveBaseState() { scheduleSaveInner(UserHandle.USER_NULL); // Special case -- use USER_NULL for base state. }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: scheduleSaveBaseState File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
scheduleSaveBaseState
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public void reload(boolean checkForRepost) { mAccessibilityInjector.addOrRemoveAccessibilityApisIfNecessary(); if (mNativeContentViewCore != 0) { nativeReload(mNativeContentViewCore, checkForRepost); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: reload File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-20" ]
CVE-2014-3159
MEDIUM
6.4
chromium
reload
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
98a50b76141f0b14f292f49ce376e6554142d5e2
0
Analyze the following code function for security vulnerabilities
private void addNewJar(final JARDesc desc, UpdatePolicy updatePolicy) { available.add(desc); tracker.addResource(desc.getLocation(), desc.getVersion(), null, updatePolicy ); // Give read permissions to the cached jar file AccessC...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addNewJar File: core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Repository: AdoptOpenJDK/IcedTea-Web The code follows secure coding practices.
[ "CWE-345", "CWE-94", "CWE-22" ]
CVE-2019-10182
MEDIUM
5.8
AdoptOpenJDK/IcedTea-Web
addNewJar
core/src/main/java/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
e0818f521a0711aeec4b913b49b5fc6a52815662
0
Analyze the following code function for security vulnerabilities
private void quitRoom(String room) { Log.d(TAG, "Leaving MUC " + room); MultiUserChat muc = multiUserChats.get(room); muc.leave(); multiUserChats.remove(room); mucLastPong.remove(room); mContentResolver.delete(RosterProvider.CONTENT_URI, "jid = ?", new String[] {room}); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: quitRoom File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
quitRoom
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
void adjustStartingWindowFlags() { if (mAttrs.type == TYPE_BASE_APPLICATION && mActivityRecord != null && mActivityRecord.mStartingWindow != null) { // Special handling of starting window over the base // window of the app: propagate lock screen flags to it, /...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: adjustStartingWindowFlags File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
adjustStartingWindowFlags
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
private static void memberAddressProviderConfigXmlGenerator(XmlGenerator gen, NetworkConfig netCfg) { MemberAddressProviderConfig memberAddressProviderConfig = netCfg.getMemberAddressProviderConfig(); if (memberAddressProviderConfig == null) { return; } String className = cla...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: memberAddressProviderConfigXmlGenerator File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
memberAddressProviderConfigXmlGenerator
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public boolean equals( Object obj) { if (!(obj instanceof DHPublicKeyParameters)) { return false; } DHPublicKeyParameters other = (DHPublicKeyParameters)obj; return other.getY().equals(y) && super.equals(obj); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: equals File: core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java Repository: bcgit/bc-java The code follows secure coding practices.
[ "CWE-310" ]
CVE-2016-1000339
MEDIUM
5
bcgit/bc-java
equals
core/src/main/java/org/bouncycastle/crypto/params/DHPublicKeyParameters.java
413b42f4d770456508585c830cfcde95f9b0e93b
0
Analyze the following code function for security vulnerabilities
private static boolean isCompatible(HotRestartConfig c1, HotRestartConfig c2) { boolean c1Disabled = c1 == null || !c1.isEnabled(); boolean c2Disabled = c2 == null || !c2.isEnabled(); return c1 == c2 || (c1Disabled && c2Disabled) || (c1 != null && c2 != null && nullSafeEqual(c1.isFsync(), c2.isF...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isCompatible File: hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-502" ]
CVE-2016-10750
MEDIUM
6.8
hazelcast
isCompatible
hazelcast/src/test/java/com/hazelcast/config/ConfigCompatibilityChecker.java
c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9
0
Analyze the following code function for security vulnerabilities
public WifiEnterpriseConfig createFromParcel(Parcel in) { WifiEnterpriseConfig enterpriseConfig = new WifiEnterpriseConfig(); int count = in.readInt(); for (int i = 0; i < count; i++) { String key = in.readString(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createFromParcel File: wifi/java/android/net/wifi/WifiEnterpriseConfig.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3897
MEDIUM
4.3
android
createFromParcel
wifi/java/android/net/wifi/WifiEnterpriseConfig.java
81be4e3aac55305cbb5c9d523cf5c96c66604b39
0
Analyze the following code function for security vulnerabilities
@Override public void onError(Exception exception) { error = true; errorException = exception; if (paused) { if (FileDownloadLog.NEED_LOG) { FileDownloadLog.d(this, "the task[%d] has already been paused, so pass the" + " error callback", m...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onError File: library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java Repository: lingochamp/FileDownloader The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-11248
HIGH
7.5
lingochamp/FileDownloader
onError
library/src/main/java/com/liulishuo/filedownloader/download/DownloadLaunchRunnable.java
b023cc081bbecdd2a9f3549a3ae5c12a9647ed7f
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") private void finishForceStopPackageLocked(final String packageName, int uid) { Intent intent = new Intent(Intent.ACTION_PACKAGE_RESTARTED, Uri.fromParts("package", packageName, null)); if (!mProcessesReady) { intent.addFlags(Intent.FLAG_RECEIVER_REGISTE...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: finishForceStopPackageLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
finishForceStopPackageLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static JSONObject toJSONObject(Reader reader, XMLParserConfiguration config) throws JSONException { JSONObject jo = new JSONObject(); XMLTokener x = new XMLTokener(reader); while (x.more()) { x.skipPast("<"); if(x.more()) { parse(x, jo, null, config...
Vulnerability Classification: - CWE: CWE-787 - CVE: CVE-2022-45688 - Severity: HIGH - CVSS Score: 7.5 Description: fix: limit the nesting depth Function: toJSONObject File: src/main/java/org/json/XML.java Repository: stleary/JSON-java Fixed Code: public static JSONObject toJSONObject(Reader reader, XMLParserConfigur...
[ "CWE-787" ]
CVE-2022-45688
HIGH
7.5
stleary/JSON-java
toJSONObject
src/main/java/org/json/XML.java
f566a1d9ee1f8139357017dc6c7def1da19cd8d4
1
Analyze the following code function for security vulnerabilities
@Nullable private FileInput toFileInput(String fileUri, Settings withClauseOptions) { URI uri = toURI(fileUri); FileInputFactory fileInputFactory = fileInputFactories.get(uri.getScheme()); if (fileInputFactory != null) { try { return fileInputFactory.create(uri, w...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2024-24565 - Severity: MEDIUM - CVSS Score: 6.5 Description: Restrict `COPY FROM` using local files to superuser Fixing a security issue where any user could read/import content of any file on the host system, the CrateDB process user has read access to. Functio...
[ "CWE-22" ]
CVE-2024-24565
MEDIUM
6.5
crate
toFileInput
server/src/main/java/io/crate/execution/engine/collect/files/FileReadingIterator.java
4e857d675683095945dd524d6ba03e692c70ecd6
1
Analyze the following code function for security vulnerabilities
private void applyConfiguredHeaders(MutableHttpHeaders headers) { if (serverConfiguration.isDateHeader() && !headers.contains("Date")) { headers.date(LocalDateTime.now()); } serverConfiguration.getServerHeader().ifPresent((server) -> { if (!headers.contains("Server")) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: applyConfiguredHeaders File: http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java Repository: micronaut-projects/micronaut-core The code follows secure coding practices.
[ "CWE-400" ]
CVE-2022-21700
MEDIUM
5
micronaut-projects/micronaut-core
applyConfiguredHeaders
http-server-netty/src/main/java/io/micronaut/http/server/netty/RoutingInBoundHandler.java
b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
0
Analyze the following code function for security vulnerabilities
@Override public SaReactorFilter addInclude(String... paths) { includeList.addAll(Arrays.asList(paths)); return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addInclude File: sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
addInclude
sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/filter/SaReactorFilter.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
protected long indexCount(String query) { String qq=findAndReplaceQueryDates(translateQuery(query, null).getQuery()); // we check the query to figure out wich indexes to hit String indexToHit; IndiciesInfo info; try { info=APILocator.getIndiciesAPI().loadIndicies(); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: indexCount File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java Repository: dotCMS/core The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-2355
HIGH
7.5
dotCMS/core
indexCount
src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
897f3632d7e471b7a73aabed5b19f6f53d4e5562
0
Analyze the following code function for security vulnerabilities
private int getAccountVisibilityFromCache(Account account, String packageName, UserAccounts accounts) { synchronized (accounts.cacheLock) { Map<String, Integer> accountVisibility = getPackagesAndVisibilityForAccountLocked(account, accounts); Integer visibi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAccountVisibilityFromCache File: services/core/java/com/android/server/accounts/AccountManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other", "CWE-502" ]
CVE-2023-45777
HIGH
7.8
android
getAccountVisibilityFromCache
services/core/java/com/android/server/accounts/AccountManagerService.java
f810d81839af38ee121c446105ca67cb12992fc6
0
Analyze the following code function for security vulnerabilities
KeyMapper<Object> getKeyMapper() { return datasourceExtension.getKeyMapper(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getKeyMapper File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
getKeyMapper
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") private HashMap<String, String> getExtraPropertyValues(HttpServletRequest request) { // process extra properties HashMap<String, String> properties = new HashMap<>(); Enumeration<String> parameters = request.getParameterNames(); while (parameters.hasMoreElements()) { ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getExtraPropertyValues File: core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getExtraPropertyValues
core-war/src/main/java/org/silverpeas/web/jobdomain/servlets/JobDomainPeasRequestRouter.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
@PermissionCheckerManager.PermissionResult @RequiresPermission(value = Manifest.permission.UPDATE_APP_OPS_STATS, conditional = true) public int checkPermissionForStartDataDelivery(@NonNull String permission, @NonNull AttributionSource attributionSource, @Nullable String message) { return Per...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkPermissionForStartDataDelivery File: core/java/android/permission/PermissionManager.java Repository: android The code follows secure coding practices.
[ "CWE-281" ]
CVE-2023-21249
MEDIUM
5.5
android
checkPermissionForStartDataDelivery
core/java/android/permission/PermissionManager.java
c00b7e7dbc1fa30339adef693d02a51254755d7f
0
Analyze the following code function for security vulnerabilities
@Override public String getRobotNames() { return "tested.robots.HttpAttack,sample.Target"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRobotNames File: robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java Repository: robo-code/robocode The code follows secure coding practices.
[ "CWE-862" ]
CVE-2019-10648
HIGH
7.5
robo-code/robocode
getRobotNames
robocode.tests/src/test/java/net/sf/robocode/test/robots/TestHttpAttack.java
836c84635e982e74f2f2771b2c8640c3a34221bd
0
Analyze the following code function for security vulnerabilities
public static Version getVersion() { return VERSION; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getVersion File: modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java Repository: geotools The code follows secure coding practices.
[ "CWE-917" ]
CVE-2022-24818
HIGH
7.5
geotools
getVersion
modules/library/metadata/src/main/java/org/geotools/util/factory/GeoTools.java
4f70fa3234391dd0cda883a20ab0ec75688cba49
0
Analyze the following code function for security vulnerabilities
@Override protected FooterRow createRow() { return new FooterRow(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createRow File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
createRow
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
public String getRootUrlFromRequest() { StaplerRequest req = Stapler.getCurrentRequest(); StringBuilder buf = new StringBuilder(); buf.append(req.getScheme()+"://"); buf.append(req.getServerName()); if(req.getServerPort()!=80) buf.append(':').append(req.getServerPort(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRootUrlFromRequest File: core/src/main/java/jenkins/model/Jenkins.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-79" ]
CVE-2014-2065
MEDIUM
4.3
jenkinsci/jenkins
getRootUrlFromRequest
core/src/main/java/jenkins/model/Jenkins.java
a0b00508eeb74d7033dc4100eb382df4e8fa72e7
0
Analyze the following code function for security vulnerabilities
public static String getTagText(Element element, String tag) { try { // From root element, identify first with tag, then find the // first child under that, which we treat as a TEXT node. Element firstElt = getFirstTag(element, tag); if (firstElt == null) return ""; return getEltText(f...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTagText File: src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java Repository: stanfordnlp/CoreNLP The code follows secure coding practices.
[ "CWE-611" ]
CVE-2021-3878
HIGH
7.5
stanfordnlp/CoreNLP
getTagText
src/edu/stanford/nlp/semgraph/semgrex/ssurgeon/Ssurgeon.java
e5bbe135a02a74b952396751ed3015e8b8252e99
0
Analyze the following code function for security vulnerabilities
private void revisitSequenceFlows(Definitions def, String orig) { try { Map<String, Map<String, String>> sequenceFlowMapping = new HashMap<String, Map<String,String>>(); XMLInputFactory factory = XMLInputFactory.newInstance(); XMLStreamReader reader = factory.createXMLStreamR...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: revisitSequenceFlows File: jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java Repository: kiegroup/jbpm-designer The code follows secure coding practices.
[ "CWE-611" ]
CVE-2017-7545
MEDIUM
4
kiegroup/jbpm-designer
revisitSequenceFlows
jbpm-designer-backend/src/main/java/org/jbpm/designer/web/server/TransformerServlet.java
a143f3b92a6a5a527d929d68c02a0c5d914ab81d
0
Analyze the following code function for security vulnerabilities
String getName();
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getName File: ethereum/api/src/main/java/org/hyperledger/besu/ethereum/api/jsonrpc/internal/methods/JsonRpcMethod.java Repository: hyperledger/besu The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-21369
MEDIUM
4
hyperledger/besu
getName
ethereum/api/src/main/java/org/hyperledger/besu/ethereum/api/jsonrpc/internal/methods/JsonRpcMethod.java
06e35a58c07a30c0fbdc0aae45a3e8b06b53c022
0
Analyze the following code function for security vulnerabilities
public void setClientKeyId(String clientKeyId) { attributes.put(CLIENT_KEY_ID, clientKeyId); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setClientKeyId File: base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
setClientKeyId
base/common/src/main/java/com/netscape/certsrv/key/KeyArchivalRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
public static void zipFolder(String srcFolder, String destZipFile, String ignore) throws Exception { try (FileOutputStream fileWriter = new FileOutputStream(destZipFile); ZipOutputStream zip = new ZipOutputStream(fileWriter)){ addFolderToZip("", srcFolder, zip, ignore); zip....
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2022-21675 - Severity: MEDIUM - CVSS Score: 6.8 Description: Mitigate Zip Slip exlpoit Function: zipFolder File: src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java Repository: Konloch/bytecode-viewer Fixed Code: public static void zipFolder(String...
[ "CWE-22" ]
CVE-2022-21675
MEDIUM
6.8
Konloch/bytecode-viewer
zipFolder
src/main/java/the/bytecode/club/bytecodeviewer/util/ZipUtils.java
c968e94b2c93da434a4ecfac6d08eda162d615d0
1
Analyze the following code function for security vulnerabilities
@Select("delete from sys_dict where id = #{id}") public void deleteOneById(@Param("id") String id);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteOneById File: jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java Repository: jeecgboot/jeecg-boot The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-45207
CRITICAL
9.8
jeecgboot/jeecg-boot
deleteOneById
jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/mapper/SysDictMapper.java
8632a835c23f558dfee3584d7658cc6a13ccec6f
0
Analyze the following code function for security vulnerabilities
@Override public WorkflowInstance ingest(MediaPackage mp, String wd, Map<String, String> properties) throws IngestException, NotFoundException { try { return ingest(mp, wd, properties, null); } catch (UnauthorizedException e) { throw new IllegalStateException(e); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: ingest File: modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java Repository: opencast The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-29237
MEDIUM
5.5
opencast
ingest
modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java
8d5ec1614eed109b812bc27b0c6d3214e456d4e7
0
Analyze the following code function for security vulnerabilities
@Override public void stopLockTaskModeOnCurrent() throws RemoteException { enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, "stopLockTaskModeOnCurrent"); long ident = Binder.clearCallingIdentity(); try { stopLockTaskMode(); } fi...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopLockTaskModeOnCurrent File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
stopLockTaskModeOnCurrent
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override @Nullable public WifiConfiguration getConnectedWifiConfiguration() { if (!isConnected()) return null; return getConnectedWifiConfigurationInternal(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getConnectedWifiConfiguration File: service/java/com/android/server/wifi/ClientModeImpl.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
getConnectedWifiConfiguration
service/java/com/android/server/wifi/ClientModeImpl.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private boolean deliverPreBootCompleted(final Runnable onFinishCallback, ArrayList<ComponentName> doneReceivers, int userId) { boolean waitingUpdate = false; Intent intent = new Intent(Intent.ACTION_PRE_BOOT_COMPLETED); List<ResolveInfo> ris = null; try { ris = Ap...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deliverPreBootCompleted File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
deliverPreBootCompleted
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public AppointmentService getAppointmentService() { return appointmentService; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAppointmentService File: api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java Repository: openmrs/openmrs-module-appointmentscheduling The code follows secure coding pr...
[ "CWE-79" ]
CVE-2020-36635
MEDIUM
5.4
openmrs/openmrs-module-appointmentscheduling
getAppointmentService
api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java
34213c3f6ea22df427573076fb62744694f601d8
0
Analyze the following code function for security vulnerabilities
@Override public void abortPulsing() { mDozeScrimController.abortPulsing(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: abortPulsing File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
abortPulsing
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public static Traverser<File> fileTraverser() { return Traverser.forTree(FILE_TREE); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: fileTraverser File: guava/src/com/google/common/io/Files.java Repository: google/guava The code follows secure coding practices.
[ "CWE-552" ]
CVE-2023-2976
HIGH
7.1
google/guava
fileTraverser
guava/src/com/google/common/io/Files.java
feb83a1c8fd2e7670b244d5afd23cba5aca43284
0
Analyze the following code function for security vulnerabilities
@Override public String getTagForIntentSender(IIntentSender pendingResult, String prefix) { if (!(pendingResult instanceof PendingIntentRecord)) { return null; } try { PendingIntentRecord res = (PendingIntentRecord)pendingResult; Intent intent = res.key.re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTagForIntentSender File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
getTagForIntentSender
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@SuppressWarnings("unchecked") @Override public T deserialize(JsonParser parser, DeserializationContext context) throws IOException { //NOTE: Timestamps contain no timezone info, and are always in configured TZ. Only //string values have to be adjusted to the configured TZ. switch (p...
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2018-1000873 - Severity: MEDIUM - CVSS Score: 4.3 Description: Avoid latency problems converting decimal to time. Fixes https://github.com/FasterXML/jackson-databind/issues/2141 Function: deserialize File: datetime/src/main/java/com/fasterxml/jackson/datatype/js...
[ "CWE-20" ]
CVE-2018-1000873
MEDIUM
4.3
FasterXML/jackson-modules-java8
deserialize
datetime/src/main/java/com/fasterxml/jackson/datatype/jsr310/deser/InstantDeserializer.java
ba27ce5909dfb49bcaf753ad3e04ecb980010b0b
1
Analyze the following code function for security vulnerabilities
static long parseLongAttribute(TypedXmlPullParser parser, String attribute) { return parseLongAttribute(parser, attribute, 0); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parseLongAttribute File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
parseLongAttribute
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
public ApiClient setHttpClient(Client httpClient) { this.httpClient = httpClient; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setHttpClient File: samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
setHttpClient
samples/client/petstore/java/jersey2-java8-localdatetime/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Nonnull public Long getTranslationCachesExpireAfterWriteInMinutes() { return myTranslationCachesExpireAfterWriteInMinutes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTranslationCachesExpireAfterWriteInMinutes File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
getTranslationCachesExpireAfterWriteInMinutes
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
protected void extendLink(EntityReference reference, Set<String> linksExtended) { for (EntityReference parent = reference.getParameters().isEmpty() ? reference : new EntityReference(reference.getName(), reference.getType(), reference.getParent(), null); parent != null; parent = p...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: extendLink File: xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java Repository: ...
[ "CWE-312", "CWE-200" ]
CVE-2023-50719
HIGH
7.5
xwiki/xwiki-platform
extendLink
xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-api/src/main/java/org/xwiki/search/solr/internal/metadata/AbstractSolrMetadataExtractor.java
3e5272f2ef0dff06a8f4db10afd1949b2f9e6eea
0
Analyze the following code function for security vulnerabilities
OortComet createOortComet(String cometURL) { return _membership.createOortComet(cometURL); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createOortComet File: cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java Repository: cometd The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-24721
MEDIUM
5.5
cometd
createOortComet
cometd-java/cometd-java-oort/src/main/java/org/cometd/oort/Oort.java
bb445a143fbf320f17c62e340455cd74acfb5929
0
Analyze the following code function for security vulnerabilities
@Override public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException { Path relativeFile = source.relativize(file); final Path destFile = Paths.get(destDir.toString(), relativeFile.toString()); if(filter.matches(file)) { String filename = file.getFileName().toString(); if...
Vulnerability Classification: - CWE: CWE-22 - CVE: CVE-2021-39180 - Severity: HIGH - CVSS Score: 9.0 Description: OO-5549: check parent by unzip Function: visitFile File: src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java Repository: OpenOLAT Fixed Code: @Override public FileVisitResult...
[ "CWE-22" ]
CVE-2021-39180
HIGH
9
OpenOLAT
visitFile
src/main/java/org/olat/ims/qti21/repository/handlers/CopyAndConvertVisitor.java
5668a41ab3f1753102a89757be013487544279d5
1
Analyze the following code function for security vulnerabilities
Library findLibrary(String lib_name) throws XmlReaderException { if (lib_name == null || lib_name.equals("")) { return file; } Library ret = libs.get(lib_name); if (ret == null) { throw new XmlReaderException(StringUtil.format( Strings.get("libMissingError"), lib_name)); } else { retur...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findLibrary File: src/com/cburch/logisim/file/XmlReader.java Repository: logisim-evolution The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000889
MEDIUM
6.8
logisim-evolution
findLibrary
src/com/cburch/logisim/file/XmlReader.java
90aee8f8ceef463884cc400af4f6d1f109fb0972
0
Analyze the following code function for security vulnerabilities
@Override public void destroy() { LOGGER.debug("(XssFilter) destroy"); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java Repository: shopizer-ecommerce/shopizer The code follows secure coding practices.
[ "CWE-79" ]
CVE-2021-33561
LOW
3.5
shopizer-ecommerce/shopizer
destroy
sm-shop/src/main/java/com/salesmanager/shop/filter/XssFilter.java
197f8c78c8f673b957e41ca2c823afc654c19271
0
Analyze the following code function for security vulnerabilities
private String getRequestPath(HttpServletRequest request) { String path = request.getRequestURI(); if (path.startsWith(request.getContextPath())) { path = path.substring(request.getContextPath().length()); } return path; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getRequestPath File: core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java Repository: Silverpeas/Silverpeas-Core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-47324
MEDIUM
5.4
Silverpeas/Silverpeas-Core
getRequestPath
core-rs/src/main/java/org/silverpeas/core/web/token/SynchronizerTokenService.java
9a55728729a3b431847045c674b3e883507d1e1a
0
Analyze the following code function for security vulnerabilities
public HashMap<String, String> toParams() { HashMap<String, String> ret = new HashMap<>(); ret.put("isRenewal", Boolean.valueOf(renewal).toString()); if (profileId != null) ret.put(PROFILE_ID, profileId); if (serialNum != null) ret.put(SERIAL_NUM, serialNum.toHexString()); if (re...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toParams File: base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java Repository: dogtagpki/pki The code follows secure coding practices.
[ "CWE-611" ]
CVE-2022-2414
HIGH
7.5
dogtagpki/pki
toParams
base/common/src/main/java/com/netscape/certsrv/cert/CertEnrollmentRequest.java
16deffdf7548e305507982e246eb9fd1eac414fd
0
Analyze the following code function for security vulnerabilities
protected boolean sendGlobalRedirect(XWikiResponse response, String url, XWikiContext context) throws Exception { if ("1".equals(context.getWiki().Param("xwiki.preferences.redirect"))) { // Note: This implementation is not performant at all and will slow down the wiki as the number /...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendGlobalRedirect File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-862" ]
CVE-2022-23617
MEDIUM
4
xwiki/xwiki-platform
sendGlobalRedirect
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/web/XWikiAction.java
b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554
0
Analyze the following code function for security vulnerabilities
public boolean isAssistDataAllowedOnCurrentActivity() throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); mRemote.transact(IS_SCREEN_CAPTURE_ALLOWED_ON_CURRENT_ACTIVITY_TRANSACTION, data, reply, 0)...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isAssistDataAllowedOnCurrentActivity File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
isAssistDataAllowedOnCurrentActivity
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
public String getTextPage(final String userID) throws IOException { return getContactServiceProvider(userID, ContactType.textPage.toString()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTextPage File: opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352" ]
CVE-2021-25931
MEDIUM
6.8
OpenNMS/opennms
getTextPage
opennms-config/src/main/java/org/opennms/netmgt/config/UserManager.java
607151ea8f90212a3fb37c977fa57c7d58d26a84
0
Analyze the following code function for security vulnerabilities
private void handleOnDetach() { assert isAttached(); // Ensure detach change is sent markAsDirty(); owner.unregister(this); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleOnDetach File: flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java Repository: vaadin/flow The code follows secure coding practices.
[ "CWE-200" ]
CVE-2023-25499
MEDIUM
6.5
vaadin/flow
handleOnDetach
flow-server/src/main/java/com/vaadin/flow/internal/StateNode.java
428cc97eaa9c89b1124e39f0089bbb741b6b21cc
0
Analyze the following code function for security vulnerabilities
boolean attachedToProcess() { return hasProcess() && app.hasThread(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: attachedToProcess File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
attachedToProcess
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
boolean isDreaming() { return mDreaming; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isDreaming File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
isDreaming
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public static void copyFromCursorToContentValues(@NonNull String column, @NonNull Cursor cursor, @NonNull ContentValues values) { final int index = cursor.getColumnIndex(column); if (index != -1) { if (cursor.isNull(index)) { values.putNull(column); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: copyFromCursorToContentValues File: src/com/android/providers/media/util/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-35683
MEDIUM
5.5
android
copyFromCursorToContentValues
src/com/android/providers/media/util/DatabaseUtils.java
23d156ed1bed6d2c2b325f0be540d0afca510c49
0
Analyze the following code function for security vulnerabilities
private ModelAndView saveGroup(HttpServletRequest request, HttpServletResponse response) throws Exception { HttpSession session = request.getSession(false); if (session != null) { WebGroup newGroup = (WebGroup) session.getAttribute("group.modifyGroup.jsp"); updateGroup(...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveGroup File: opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-352", "CWE-79" ]
CVE-2021-25929
LOW
3.5
OpenNMS/opennms
saveGroup
opennms-webapp/src/main/java/org/opennms/web/controller/admin/group/GroupController.java
eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c
0
Analyze the following code function for security vulnerabilities
@Override public void onReceive(Context context, Intent intent){ String action = intent.getAction(); if (DevicePolicyManager.ACTION_DEVICE_POLICY_MANAGER_STATE_CHANGED .equals(action)) { enforceBeamShareActivityPolicy(context, n...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onReceive File: src/com/android/nfc/NfcService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-3761
LOW
2.1
android
onReceive
src/com/android/nfc/NfcService.java
9ea802b5456a36f1115549b645b65c791eff3c2c
0
Analyze the following code function for security vulnerabilities
@Test public void saveBatchEmpty(TestContext context) { Async async = context.async(); List<Object> list = Collections.emptyList(); createFoo(context).saveBatch(FOO, list, res -> { assertSuccess(context, res); context.assertEquals(0, res.result().getRows().size()); context.assertEquals("...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveBatchEmpty File: domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java Repository: folio-org/raml-module-builder The code follows secure coding practices.
[ "CWE-89" ]
CVE-2019-15534
HIGH
7.5
folio-org/raml-module-builder
saveBatchEmpty
domain-models-runtime/src/test/java/org/folio/rest/persist/PostgresClientIT.java
b7ef741133e57add40aa4cb19430a0065f378a94
0
Analyze the following code function for security vulnerabilities
@Override public boolean moveTopActivityToPinnedStack(int stackId, Rect bounds) { enforceCallerIsRecentsOrHasPermission(MANAGE_ACTIVITY_STACKS, "moveTopActivityToPinnedStack()"); synchronized (this) { if (!mSupportsPictureInPicture) { throw new IllegalStat...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: moveTopActivityToPinnedStack File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
moveTopActivityToPinnedStack
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void startKeyguardExitAnimation(long startTime, long fadeoutDuration) { if (mKeyguardDelegate != null) { if (DEBUG_KEYGUARD) Slog.d(TAG, "PWM.startKeyguardExitAnimation"); mKeyguardDelegate.startKeyguardExitAnimation(startTime, fadeoutDuration); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startKeyguardExitAnimation File: policy/src/com/android/internal/policy/impl/PhoneWindowManager.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-0812
MEDIUM
6.6
android
startKeyguardExitAnimation
policy/src/com/android/internal/policy/impl/PhoneWindowManager.java
84669ca8de55d38073a0dcb01074233b0a417541
0
Analyze the following code function for security vulnerabilities
@Override public int stopUser(final int userId, final IStopUserCallback callback) { if (checkCallingPermission(INTERACT_ACROSS_USERS_FULL) != PackageManager.PERMISSION_GRANTED) { String msg = "Permission Denial: switchUser() from pid=" + Binder.getCallingPid()...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopUser File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
stopUser
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
private static boolean getSettingOverrideableByRestore(Bundle args) { return (args != null) && args.getBoolean(Settings.CALL_METHOD_OVERRIDEABLE_BY_RESTORE_KEY); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSettingOverrideableByRestore File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
getSettingOverrideableByRestore
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
private void updatePersonalAppsSuspensionOnUserStart(int userHandle) { final int profileUserHandle = getManagedUserId(userHandle); if (profileUserHandle >= 0) { // Given that the parent user has just started, profile should be locked. updatePersonalAppsSuspension(profileUserHandl...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updatePersonalAppsSuspensionOnUserStart File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
updatePersonalAppsSuspensionOnUserStart
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@PUT @Path("posts/{messageKey}") @Operation(summary = "Put posts", description = "Creates a new reply in the forum of the course node.") @ApiResponse(responseCode = "200", description = "Ok.", content = { @Content(mediaType = "application/json", schema = @Schema(implementation = MessageVO.class)), @Co...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: replyToPost File: src/main/java/org/olat/modules/fo/restapi/ForumWebService.java Repository: OpenOLAT The code follows secure coding practices.
[ "CWE-22" ]
CVE-2021-41242
HIGH
7.9
OpenOLAT
replyToPost
src/main/java/org/olat/modules/fo/restapi/ForumWebService.java
c450df7d7ffe6afde39ebca6da9136f1caa16ec4
0
Analyze the following code function for security vulnerabilities
@Override void suppressFitsSystemWindows() { binding.controllerCallLayout.setFitsSystemWindows(false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: suppressFitsSystemWindows File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java Repository: nextcloud/talk-android The code follows secure coding practices.
[ "CWE-732", "CWE-200" ]
CVE-2022-41926
MEDIUM
5.5
nextcloud/talk-android
suppressFitsSystemWindows
app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0
0
Analyze the following code function for security vulnerabilities
@CalledByNative private void onSmartClipDataExtracted(String text, String html, Rect clipRect) { // Translate the positions by the offsets introduced by location bar. Note that the // coordinates are in dp scale, and that this definitely has the potential to be // different from the offsets ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onSmartClipDataExtracted File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
onSmartClipDataExtracted
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
@Override public void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { String userID = request.getParameter("userID"); String newID = request.getParameter("newID"); // now save to the xml file try { UserManager userF...
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2021-25933 - Severity: LOW - CVSS Score: 3.5 Description: NMS-13125: user ID and group ID must not contain any HTML markup Function: doPost File: opennms-webapp/src/main/java/org/opennms/web/admin/users/RenameUserServlet.java Repository: OpenNMS/opennms Fixed Co...
[ "CWE-79" ]
CVE-2021-25933
LOW
3.5
OpenNMS/opennms
doPost
opennms-webapp/src/main/java/org/opennms/web/admin/users/RenameUserServlet.java
8a97e6869d6e49da18b208c837438ace80049c01
1
Analyze the following code function for security vulnerabilities
@Override public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) throws IOException, ServletException { try { // 执行全局过滤器 beforeAuth.run(null); SaRouter.match(includeList).notMatch(excludeList).check(r -> { auth.run(null); }); } catch (StopMatchException e) ...
Vulnerability Classification: - CWE: CWE-Other - CVE: CVE-2023-44794 - Severity: CRITICAL - CVSS Score: 9.8 Description: 修复路由拦截鉴权可被绕过的问题 fix #515 Function: doFilter File: sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java Repository: dromara/Sa-Token Fixed Code: ...
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
doFilter
sa-token-starter/sa-token-spring-boot-starter/src/main/java/cn/dev33/satoken/filter/SaServletFilter.java
954efeb73277f924f836da2a25322ea35ee1bfa3
1
Analyze the following code function for security vulnerabilities
private void sendMessage(String iface, int what, int arg1, int arg2, Object obj) { sendMessage(iface, Message.obtain(null, what, arg1, arg2, obj)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendMessage File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
sendMessage
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
private void setup(byte[] ad) throws InvalidKeyException, InvalidAlgorithmParameterException { // Check for nonce wrap-around. if (n == -1L) throw new IllegalStateException("Nonce has wrapped around"); // Format the counter/IV block for AES/CTR/NoPadding. iv[0] = 0; iv[1] = 0; iv[2] = 0; iv[3] = 0;...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setup File: src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java Repository: rweather/noise-java The code follows secure coding practices.
[ "CWE-125", "CWE-787" ]
CVE-2020-25021
HIGH
7.5
rweather/noise-java
setup
src/main/java/com/southernstorm/noise/protocol/AESGCMOnCtrCipherState.java
18e86b6f8bea7326934109aa9ffa705ebf4bde90
0
Analyze the following code function for security vulnerabilities
public void aliasSystemAttribute(String alias, String systemAttributeName) { if (systemAttributeAliasingMapper == null) { throw new com.thoughtworks.xstream.InitializationException("No " + SystemAttributeAliasingMapper.class.getName() + " available"); } ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: aliasSystemAttribute File: xstream/src/java/com/thoughtworks/xstream/XStream.java Repository: x-stream/xstream The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-43859
MEDIUM
5
x-stream/xstream
aliasSystemAttribute
xstream/src/java/com/thoughtworks/xstream/XStream.java
e8e88621ba1c85ac3b8620337dd672e0c0c3a846
0
Analyze the following code function for security vulnerabilities
@Override public ParceledListSlice getShareTargets(String packageName, IntentFilter filter, @UserIdInt int userId) { Preconditions.checkStringNotEmpty(packageName, "packageName"); Objects.requireNonNull(filter, "intentFilter"); if (!isCallerChooserActivity()) { verify...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getShareTargets File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40079
HIGH
7.8
android
getShareTargets
services/core/java/com/android/server/pm/ShortcutService.java
96e0524c48c6e58af7d15a2caf35082186fc8de2
0
Analyze the following code function for security vulnerabilities
protected String determineLoginType(boolean isSecure) { String result = JBossSAMLURIConstants.AC_PASSWORD.get(); LoginConfig loginConfig = getContext().getLoginConfig(); if (loginConfig != null) { String auth = loginConfig.getAuthMethod(); if (StringUtil.isNotNull(auth)) ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: determineLoginType File: picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java Repository: picketlink/picketlink-bindings The code follows secure coding pr...
[ "CWE-264" ]
CVE-2015-3158
MEDIUM
4
picketlink/picketlink-bindings
determineLoginType
picketlink-tomcat-common/src/main/java/org/picketlink/identity/federation/bindings/tomcat/idp/AbstractIDPValve.java
341a37aefd69e67b6b5f6d775499730d6ccaff0d
0
Analyze the following code function for security vulnerabilities
public static String migrate(String xml) { Document xmlDoc; try { xmlDoc = new SAXReader().read(new StringReader(xml)); } catch (DocumentException e) { throw new RuntimeException(e); } List<NodeTuple> tuples = new ArrayList<>(); Node keyNode = new ScalarNode(Tag.STR, "version"); Node valueNode = ...
Vulnerability Classification: - CWE: CWE-538 - CVE: CVE-2021-21250 - Severity: MEDIUM - CVSS Score: 4.0 Description: Fix XXE injection attack by disabling XML DTD handling Function: migrate File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java Repository: theonedev/onedev Fixed Code: p...
[ "CWE-538" ]
CVE-2021-21250
MEDIUM
4
theonedev/onedev
migrate
server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
9196fd795e87dab069b4260a3590a0ea886e770f
1
Analyze the following code function for security vulnerabilities
@Override public final void activityIdle(IBinder token, Configuration config, boolean stopProfiling) { final long origId = Binder.clearCallingIdentity(); synchronized (this) { ActivityStack stack = ActivityRecord.getStackLocked(token); if (stack != null) { Act...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: activityIdle File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
activityIdle
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
void onUiSelection(UserSelectionDialogResult selection);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUiSelection File: services/credentials/java/com/android/server/credentials/CredentialManagerUi.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40076
MEDIUM
5.5
android
onUiSelection
services/credentials/java/com/android/server/credentials/CredentialManagerUi.java
9b68987df85b681f9362a3cadca6496796d23bbc
0
Analyze the following code function for security vulnerabilities
@Override public void updateApplicationByResourceId(String resourceId, ServiceProvider updatedApp, String tenantDomain, String username) throws IdentityApplicationManagementException { validateApplicationConfigurations(updatedApp, tenantDomain, username); ...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateApplicationByResourceId File: components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java Repository: wso2/carb...
[ "CWE-611" ]
CVE-2021-42646
MEDIUM
6.4
wso2/carbon-identity-framework
updateApplicationByResourceId
components/application-mgt/org.wso2.carbon.identity.application.mgt/src/main/java/org/wso2/carbon/identity/application/mgt/ApplicationManagementServiceImpl.java
e9119883ee02a884f3c76c7bbc4022a4f4c58fc0
0
Analyze the following code function for security vulnerabilities
public abstract Set<String> getAlwaysUsedExtensions(XWikiContext context);
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAlwaysUsedExtensions File: xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java Repository: xwiki/xwiki-platform The code follo...
[ "CWE-79" ]
CVE-2023-29206
MEDIUM
5.4
xwiki/xwiki-platform
getAlwaysUsedExtensions
xwiki-platform-core/xwiki-platform-skin/xwiki-platform-skin-skinx/src/main/java/com/xpn/xwiki/plugin/skinx/AbstractSkinExtensionPlugin.java
fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
0
Analyze the following code function for security vulnerabilities
@Override public void setRenderThread(int tid) { synchronized (mProcLock) { ProcessRecord proc; int pid = Binder.getCallingPid(); if (pid == Process.myPid()) { demoteSystemServerRenderThread(tid); return; } synchroni...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setRenderThread File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
setRenderThread
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
@GuardedBy(anyOf = {"this", "mProcLock"}) private boolean uidOnBackgroundAllowlistLOSP(final int uid) { final int appId = UserHandle.getAppId(uid); final int[] allowlist = mBackgroundAppIdAllowlist; for (int i = 0, len = allowlist.length; i < len; i++) { if (appId == allowlist[i]...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: uidOnBackgroundAllowlistLOSP File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
uidOnBackgroundAllowlistLOSP
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
static String renderNavItem(JSONObject item, String activeNav) { final String navType = item.getString("type"); final boolean isUrlType = "URL".equals(navType); String navName = item.getString("value"); String navUrl = item.getString("value"); String navEntity = null; b...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderNavItem File: src/main/java/com/rebuild/core/configuration/NavBuilder.java Repository: getrebuild/rebuild The code follows secure coding practices.
[ "CWE-89" ]
CVE-2023-1495
MEDIUM
6.5
getrebuild/rebuild
renderNavItem
src/main/java/com/rebuild/core/configuration/NavBuilder.java
c9474f84e5f376dd2ade2078e3039961a9425da7
0
Analyze the following code function for security vulnerabilities
public synchronized void deregisterHandler(String iface, int what, Handler handler) { SparseArray<Set<Handler>> ifaceHandlers = mHandlerMap.get(iface); if (ifaceHandlers == null) { return; } Set<Handler> ifaceWhatHandlers = ifaceHandlers.get(what); if (ifaceWhatHandle...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deregisterHandler File: service/java/com/android/server/wifi/WifiMonitor.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
deregisterHandler
service/java/com/android/server/wifi/WifiMonitor.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void setShowBackURL(boolean showBackURL) { _showBackURL = showBackURL; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setShowBackURL File: util-taglib/src/com/liferay/taglib/ui/HeaderTag.java Repository: brianchandotcom/liferay-portal The code follows secure coding practices.
[ "CWE-79" ]
CVE-2017-12647
MEDIUM
4.3
brianchandotcom/liferay-portal
setShowBackURL
util-taglib/src/com/liferay/taglib/ui/HeaderTag.java
bd92daa70ab77a40eff0eb18e8e91f3e095694e1
0
Analyze the following code function for security vulnerabilities
@Override public int startVoiceActivity(String callingPackage, String callingFeatureId, int callingPid, int callingUid, Intent intent, String resolvedType, IVoiceInteractionSession session, IVoiceInteractor interactor, int startFlags, ProfilerInfo profilerInfo, Bundle bOptions, i...
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startVoiceActivity File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
startVoiceActivity
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0