instruction
string
input
string
output
string
cwe_ids
list
cve_id
string
severity
string
cvss_score
float64
repo_name
string
func_name
string
file_path
string
commit_hash
string
is_vulnerable
int64
Analyze the following code function for security vulnerabilities
public boolean containsAllocatedTable() { synchronized (this) { ensureValidLocked(); return nativeContainsAllocatedTable(mObject); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: containsAllocatedTable File: core/java/android/content/res/AssetManager.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
containsAllocatedTable
core/java/android/content/res/AssetManager.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
static JsonNumber getJsonNumber(double value, int bigIntegerScaleLimit) { //bigDecimal = new BigDecimal(value); // This is the preferred way to convert double to BigDecimal return new JsonBigDecimalNumber(BigDecimal.valueOf(value), bigIntegerScaleLimit); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getJsonNumber File: impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java Repository: eclipse-ee4j/parsson The code follows secure coding practices.
[ "CWE-834" ]
CVE-2023-4043
HIGH
7.5
eclipse-ee4j/parsson
getJsonNumber
impl/src/main/java/org/eclipse/parsson/JsonNumberImpl.java
84764ffbe3d0376da242b27a9a526138d0dfb8e6
0
Analyze the following code function for security vulnerabilities
private void stopLockTaskModeInternal(@Nullable TaskRecord task, boolean isSystemCaller) { final int callingUid = Binder.getCallingUid(); long ident = Binder.clearCallingIdentity(); try { synchronized (this) { mLockTaskController.stopLockTaskMode(task, isSystemCaller, callingUid); } // Launch in-call UI if a call is ongoing. This is necessary to allow stopping the lock // task and jumping straight into a call in the case of emergency call back. TelecomManager tm = (TelecomManager) mContext.getSystemService(Context.TELECOM_SERVICE); if (tm != null) { tm.showInCallScreen(false); } } finally { Binder.restoreCallingIdentity(ident); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: stopLockTaskModeInternal File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
stopLockTaskModeInternal
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
public void goToKeyguard() { if (mState == StatusBarState.SHADE_LOCKED) { mStackScroller.onGoToKeyguard(); setBarState(StatusBarState.KEYGUARD); updateKeyguardState(false /* goingToFullShade */, true /* fromShadeLocked*/); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: goToKeyguard File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
goToKeyguard
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
int getUidState(int uid) { synchronized (mProcLock) { return mProcessList.getUidProcStateLOSP(uid); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUidState File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
getUidState
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public String resolveDriverClassName(DriverClassNameResolveRequest request) { return driverResources.resolveSqlDriverNameFromJar(request.getJdbcDriverFileUrl()); }
Vulnerability Classification: - CWE: CWE-20 - CVE: CVE-2022-24861 - Severity: MEDIUM - CVSS Score: 6.5 Description: fix some security bug (#103) * fix: use hard-code secret * feat: add driver class validate * feat: optimize drvier resource code * fix:ut failed Function: resolveDriverClassName File: core/src/main/java/com/databasir/core/domain/database/service/DatabaseTypeService.java Repository: vran-dev/databasir Fixed Code: public String resolveDriverClassName(DriverClassNameResolveRequest request) { return driverResources.resolveDriverClassName(request.getJdbcDriverFileUrl()); }
[ "CWE-20" ]
CVE-2022-24861
MEDIUM
6.5
vran-dev/databasir
resolveDriverClassName
core/src/main/java/com/databasir/core/domain/database/service/DatabaseTypeService.java
ca22a8fef7a31c0235b0b2951260a7819b89993b
1
Analyze the following code function for security vulnerabilities
@Override public boolean isNotificationSupported() { return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isNotificationSupported File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
isNotificationSupported
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public ViewPage createPageWithAttachment(List<String> spaces, String page, String content, String title, String syntaxId, String parentFullPageName, String attachmentName, InputStream attachmentData, UsernamePasswordCredentials credentials) throws Exception { ViewPage vp = createPage(spaces, page, content, title, syntaxId, parentFullPageName); attachFile(spaces, page, attachmentName, attachmentData, false, credentials); return vp; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createPageWithAttachment File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2023-35166
HIGH
8.8
xwiki/xwiki-platform
createPageWithAttachment
xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263
0
Analyze the following code function for security vulnerabilities
@Override public Object createImage(int[] rgb, int width, int height) { return Bitmap.createBitmap(rgb, width, height, Bitmap.Config.ARGB_8888); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: createImage File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java Repository: codenameone/CodenameOne The code follows secure coding practices.
[ "CWE-668" ]
CVE-2022-4903
MEDIUM
5.1
codenameone/CodenameOne
createImage
Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
dad49c9ef26a598619fc48d2697151a02987d478
0
Analyze the following code function for security vulnerabilities
public String renderTemplate(String template, XWikiContext context) { try { return getOldRendering().renderTemplate(template, context); } catch (Exception ex) { LOGGER.error("Failed to render template [" + template + "]", ex); return parseTemplate(template, context); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renderTemplate File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
renderTemplate
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
private void handleKickedFromMUC(String room, boolean banned, String actor, String reason) { mucLastPong.remove(room); ContentValues cvR = new ContentValues(); String message; if (actor != null && actor.length() > 0) message = mService.getString(banned ? R.string.muc_banned_by : R.string.muc_kicked_by, actor, reason); else message = mService.getString(banned ? R.string.muc_banned : R.string.muc_kicked, reason); cvR.put(RosterProvider.RosterConstants.STATUS_MESSAGE, message); cvR.put(RosterProvider.RosterConstants.STATUS_MODE, StatusMode.offline.ordinal()); upsertRoster(cvR, room); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleKickedFromMUC File: src/org/yaxim/androidclient/service/SmackableImp.java Repository: ge0rg/yaxim The code follows secure coding practices.
[ "CWE-20", "CWE-346" ]
CVE-2017-5589
MEDIUM
4.3
ge0rg/yaxim
handleKickedFromMUC
src/org/yaxim/androidclient/service/SmackableImp.java
65a38dc77545d9568732189e86089390f0ceaf9f
0
Analyze the following code function for security vulnerabilities
void setSingleQuotedExecutableEscaped( boolean singleQuotedExecutableEscaped ) { this.singleQuotedExecutableEscaped = singleQuotedExecutableEscaped; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setSingleQuotedExecutableEscaped File: src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java Repository: apache/maven-shared-utils The code follows secure coding practices.
[ "CWE-116" ]
CVE-2022-29599
HIGH
7.5
apache/maven-shared-utils
setSingleQuotedExecutableEscaped
src/main/java/org/apache/maven/shared/utils/cli/shell/Shell.java
2735facbbbc2e13546328cb02dbb401b3776eea3
0
Analyze the following code function for security vulnerabilities
protected String getTemplatePrefix() { return "org/openmrs/web/filter/"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getTemplatePrefix File: web/src/main/java/org/openmrs/web/filter/StartupFilter.java Repository: openmrs/openmrs-core The code follows secure coding practices.
[ "CWE-22" ]
CVE-2022-23612
MEDIUM
5
openmrs/openmrs-core
getTemplatePrefix
web/src/main/java/org/openmrs/web/filter/StartupFilter.java
db8454bf19a092a78d53ee4dba2af628b730a6e7
0
Analyze the following code function for security vulnerabilities
private String getDefaultJson(List<TValue> values) { if (values.size() > 1) return values.get(1).toString(); return VALUE_DEFAULT_DEFAULT; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getDefaultJson File: src/net/sourceforge/plantuml/tim/stdlib/LoadJson.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getDefaultJson
src/net/sourceforge/plantuml/tim/stdlib/LoadJson.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public static void cursorShortToContentValuesIfPresent(Cursor cursor, ContentValues values, String column) { final int index = cursor.getColumnIndex(column); if (index != -1 && !cursor.isNull(index)) { values.put(column, cursor.getShort(index)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: cursorShortToContentValuesIfPresent File: core/java/android/database/DatabaseUtils.java Repository: android The code follows secure coding practices.
[ "CWE-502" ]
CVE-2023-40121
MEDIUM
5.5
android
cursorShortToContentValuesIfPresent
core/java/android/database/DatabaseUtils.java
3287ac2d2565dc96bf6177967f8e3aed33954253
0
Analyze the following code function for security vulnerabilities
public void delete() { internal.delete(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: delete File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
delete
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Override public boolean requestAssistDataForTask(IAssistDataReceiver receiver, int taskId, String callingPackageName) { mAmInternal.enforceCallingPermission(android.Manifest.permission.GET_TOP_ACTIVITY_INFO, "requestAssistDataForTask()"); final long callingId = Binder.clearCallingIdentity(); LocalService.ActivityTokens tokens = null; try { tokens = mInternal.getAttachedNonFinishingActivityForTask(taskId, null); } finally { Binder.restoreCallingIdentity(callingId); } if (tokens == null) { Log.e(TAG, "Could not find activity for task " + taskId); return false; } final AssistDataReceiverProxy proxy = new AssistDataReceiverProxy(receiver, callingPackageName); Object lock = new Object(); AssistDataRequester requester = new AssistDataRequester(mContext, mWindowManager, getAppOpsManager(), proxy, lock, AppOpsManager.OP_ASSIST_STRUCTURE, AppOpsManager.OP_NONE); List<IBinder> topActivityToken = new ArrayList<>(); topActivityToken.add(tokens.getActivityToken()); requester.requestAssistData(topActivityToken, true /* fetchData */, false /* fetchScreenshot */, false /* fetchStructure */, true /* allowFetchData */, false /* allowFetchScreenshot*/, true /* ignoreFocusCheck */, Binder.getCallingUid(), callingPackageName); return true; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: requestAssistDataForTask File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
requestAssistDataForTask
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
public void triggerHookEvent(String eventName, Object payload) { if (isWebhooksEnabled() && HOOK_EVENTS.contains(eventName)) { Para.asyncExecute(() -> { Webhook trigger = new Webhook(); trigger.setTriggeredEvent(eventName); trigger.setCustomPayload(payload); pc.create(trigger); }); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: triggerHookEvent File: src/main/java/com/erudika/scoold/utils/ScooldUtils.java Repository: Erudika/scoold The code follows secure coding practices.
[ "CWE-130" ]
CVE-2022-1543
MEDIUM
6.5
Erudika/scoold
triggerHookEvent
src/main/java/com/erudika/scoold/utils/ScooldUtils.java
62a0e92e1486ddc17676a7ead2c07ff653d167ce
0
Analyze the following code function for security vulnerabilities
public List<IssueWithParams> getErrors() { return mErrors; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getErrors File: src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
getErrors
src/main/java/com/android/apksig/internal/apk/v1/V1SchemeVerifier.java
41d882324288085fd32ae0bb70dc85f5fd0e2be7
0
Analyze the following code function for security vulnerabilities
private void openInner() { synchronized (mLock) { assert mConnectionPoolLocked == null; mConnectionPoolLocked = SQLiteConnectionPool.open(mConfigurationLocked); mCloseGuardLocked.open("close"); } synchronized (sActiveDatabases) { sActiveDatabases.put(this, null); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: openInner File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
openInner
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
public VirtualHostBuilder virtualHost(String hostnamePattern) { final VirtualHostBuilder virtualHostBuilder = new VirtualHostBuilder(this, false).hostnamePattern(hostnamePattern); virtualHostBuilders.add(virtualHostBuilder); return virtualHostBuilder; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: virtualHost File: core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java Repository: line/armeria The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-44487
HIGH
7.5
line/armeria
virtualHost
core/src/main/java/com/linecorp/armeria/server/ServerBuilder.java
df7f85824a62e997b910b5d6194a3335841065fd
0
Analyze the following code function for security vulnerabilities
public static NativeArray jsFunction_getUserFields(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws ScriptException { UserFieldDTO[] userFields = getOrderedUserFieldDTO(); NativeArray myn = new NativeArray(0); int limit = userFields.length; for (int i = 0; i < limit; i++) { NativeObject row = new NativeObject(); row.put("fieldName", row, userFields[i].getFieldName()); row.put("claimUri", row, userFields[i].getClaimUri()); row.put("required", row, userFields[i].getRequired()); myn.put(i, myn, row); } return myn; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_getUserFields File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_getUserFields
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
@Override public Material toOldMaterial(String name, String folder, String password) { TfsMaterial tfsMaterial = new TfsMaterial(new GoCipher(), new UrlArgument(url), username, domain, password, projectPath); tfsMaterial.setFolder(folder); setName(name,tfsMaterial); return tfsMaterial; }
Vulnerability Classification: - CWE: CWE-668 - CVE: CVE-2022-39309 - Severity: MEDIUM - CVSS Score: 6.5 Description: SCMMaterial changes #000 * SCMMaterial unlike SCMMaterialConfig objects are used for polling, they do not need to encrypt the password. Hence removing the encryptedPassword attribute. Function: toOldMaterial File: domain/src/main/java/com/thoughtworks/go/domain/materials/tfs/TfsMaterialInstance.java Repository: gocd Fixed Code: @Override public Material toOldMaterial(String name, String folder, String password) { TfsMaterial tfsMaterial = new TfsMaterial(new UrlArgument(url), username, domain, password, projectPath); tfsMaterial.setFolder(folder); setName(name,tfsMaterial); return tfsMaterial; }
[ "CWE-668" ]
CVE-2022-39309
MEDIUM
6.5
gocd
toOldMaterial
domain/src/main/java/com/thoughtworks/go/domain/materials/tfs/TfsMaterialInstance.java
691b479f1310034992da141760e9c5d1f5b60e8a
1
Analyze the following code function for security vulnerabilities
public static void putShort(long address, short value) { PlatformDependent0.putShort(address, value); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: putShort File: common/src/main/java/io/netty/util/internal/PlatformDependent.java Repository: netty The code follows secure coding practices.
[ "CWE-668", "CWE-378", "CWE-379" ]
CVE-2022-24823
LOW
1.9
netty
putShort
common/src/main/java/io/netty/util/internal/PlatformDependent.java
185f8b2756a36aaa4f973f1a2a025e7d981823f1
0
Analyze the following code function for security vulnerabilities
public boolean isStatusBasedReindexingDisabled() { return myStatusBasedReindexingDisabled; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isStatusBasedReindexingDisabled File: hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java Repository: hapifhir/hapi-fhir The code follows secure coding practices.
[ "CWE-400" ]
CVE-2021-32053
MEDIUM
5
hapifhir/hapi-fhir
isStatusBasedReindexingDisabled
hapi-fhir-jpaserver-api/src/main/java/ca/uhn/fhir/jpa/api/config/DaoConfig.java
f2934b229c491235ab0e7782dea86b324521082a
0
Analyze the following code function for security vulnerabilities
protected String getSubjectEventFormSqlSS(String studyIds, String sedIds, String itemIds, String dateConstraint, int datasetItemStatusId, String studySubjectIds) { return "select ss.oc_oid as study_subject_oid, sed.ordinal as definition_order, sed.oc_oid as definition_oid," + " sed.repeating as definition_repeating, se.sample_ordinal as sample_ordinal, edc.ordinal as crf_order, " + " cv.oc_oid as crf_version_oid, ec.event_crf_id from (select study_event_id, study_event_definition_id, study_subject_id," + " sample_ordinal from study_event where study_event_definition_id in " + sedIds + " and study_subject_id in ( " + studySubjectIds + ")) se, (select ss.oc_oid, ss.study_subject_id from study_subject ss where ss.study_subject_id in (" + studySubjectIds + ") " + ") ss," + " study_event_definition sed, event_definition_crf edc," + " (select event_crf_id, crf_version_id, study_event_id from event_crf where event_crf_id in (" + getEventCrfIdsByItemDataSqlSS(studyIds, sedIds, itemIds, dateConstraint, datasetItemStatusId, studySubjectIds) + ")) ec, crf_version cv" + " where sed.study_event_definition_id in " + sedIds + " and sed.study_event_definition_id = se.study_event_definition_id and se.study_subject_id = ss.study_subject_id" + " and sed.study_event_definition_id = edc.study_event_definition_id and se.study_event_id = ec.study_event_id" + " and edc.crf_id = cv.crf_id and ec.crf_version_id = cv.crf_version_id order by ss.oc_oid, sed.ordinal, se.sample_ordinal, edc.ordinal"; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getSubjectEventFormSqlSS File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java Repository: OpenClinica The code follows secure coding practices.
[ "CWE-89" ]
CVE-2022-24831
HIGH
7.5
OpenClinica
getSubjectEventFormSqlSS
core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
b152cc63019230c9973965a98e4386ea5322c18f
0
Analyze the following code function for security vulnerabilities
@Deprecated(since = "2.2M1") public String displayForm(String className, String header, String format, XWikiContext context) { return displayForm(className, header, format, true, context); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: displayForm File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-74" ]
CVE-2023-29523
HIGH
8.8
xwiki/xwiki-platform
displayForm
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/doc/XWikiDocument.java
0d547181389f7941e53291af940966413823f61c
0
Analyze the following code function for security vulnerabilities
private final boolean checkHoldingPermissionsLocked( IPackageManager pm, ProviderInfo pi, GrantUri grantUri, int uid, final int modeFlags) { if (DEBUG_URI_PERMISSION) Slog.v(TAG_URI_PERMISSION, "checkHoldingPermissionsLocked: uri=" + grantUri + " uid=" + uid); if (UserHandle.getUserId(uid) != grantUri.sourceUserId) { if (ActivityManager.checkComponentPermission(INTERACT_ACROSS_USERS, uid, -1, true) != PERMISSION_GRANTED) { return false; } } return checkHoldingPermissionsInternalLocked(pm, pi, grantUri, uid, modeFlags, true); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkHoldingPermissionsLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-863" ]
CVE-2018-9492
HIGH
7.2
android
checkHoldingPermissionsLocked
services/core/java/com/android/server/am/ActivityManagerService.java
962fb40991f15be4f688d960aa00073683ebdd20
0
Analyze the following code function for security vulnerabilities
@Override public void renderHead(IHeaderResponse response) { super.renderHead(response); response.render(JavaScriptHeaderItem.forReference(new MarkdownResourceReference())); String encodedAttachmentSupport; if (getAttachmentSupport() != null) { encodedAttachmentSupport = Base64.encodeBase64String(SerializationUtils.serialize(getAttachmentSupport())); encodedAttachmentSupport = StringUtils.deleteWhitespace(encodedAttachmentSupport); encodedAttachmentSupport = StringEscapeUtils.escapeEcmaScript(encodedAttachmentSupport); encodedAttachmentSupport = "'" + encodedAttachmentSupport + "'"; } else { encodedAttachmentSupport = "undefined"; } String callback = ajaxBehavior.getCallbackFunction(explicit("action"), explicit("param1"), explicit("param2"), explicit("param3")).toString(); String autosaveKey = getAutosaveKey(); if (autosaveKey != null) autosaveKey = "'" + JavaScriptEscape.escapeJavaScript(autosaveKey) + "'"; else autosaveKey = "undefined"; String script = String.format("onedev.server.markdown.onDomReady('%s', %s, %d, %s, %d, %b, %b, '%s', %s);", container.getMarkupId(), callback, ATWHO_LIMIT, encodedAttachmentSupport, getAttachmentSupport()!=null?getAttachmentSupport().getAttachmentMaxSize():0, getUserMentionSupport() != null, getReferenceSupport() != null, JavaScriptEscape.escapeJavaScript(ProjectNameValidator.PATTERN.pattern()), autosaveKey); response.render(OnDomReadyHeaderItem.forScript(script)); script = String.format("onedev.server.markdown.onLoad('%s');", container.getMarkupId()); response.render(OnLoadHeaderItem.forScript(script)); }
Vulnerability Classification: - CWE: CWE-502 - CVE: CVE-2021-21242 - Severity: HIGH - CVSS Score: 7.5 Description: Do not use deserialized AttachmentSupport from client side to avoid security vulnerabilities Function: renderHead File: server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java Repository: theonedev/onedev Fixed Code: @Override public void renderHead(IHeaderResponse response) { super.renderHead(response); response.render(JavaScriptHeaderItem.forReference(new MarkdownResourceReference())); String actionCallback = actionBehavior.getCallbackFunction(explicit("action"), explicit("param1"), explicit("param2"), explicit("param3")).toString(); String attachmentUploadUrl = attachmentUploadBehavior.getCallbackUrl().toString(); String autosaveKey = getAutosaveKey(); if (autosaveKey != null) autosaveKey = "'" + JavaScriptEscape.escapeJavaScript(autosaveKey) + "'"; else autosaveKey = "undefined"; String script = String.format("onedev.server.markdown.onDomReady('%s', %s, %d, %s, %d, %b, %b, '%s', %s);", container.getMarkupId(), actionCallback, ATWHO_LIMIT, getAttachmentSupport()!=null? "'" + attachmentUploadUrl + "'": "undefined", getAttachmentSupport()!=null? getAttachmentSupport().getAttachmentMaxSize(): 0, getUserMentionSupport() != null, getReferenceSupport() != null, JavaScriptEscape.escapeJavaScript(ProjectNameValidator.PATTERN.pattern()), autosaveKey); response.render(OnDomReadyHeaderItem.forScript(script)); script = String.format("onedev.server.markdown.onLoad('%s');", container.getMarkupId()); response.render(OnLoadHeaderItem.forScript(script)); }
[ "CWE-502" ]
CVE-2021-21242
HIGH
7.5
theonedev/onedev
renderHead
server-core/src/main/java/io/onedev/server/web/component/markdown/MarkdownEditor.java
f864053176c08f59ef2d97fea192ceca46a4d9be
1
Analyze the following code function for security vulnerabilities
public SFile getAbsoluteFile() { return new SFile(internal.getAbsoluteFile()); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAbsoluteFile File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
getAbsoluteFile
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
public boolean renameTo(SFile dest) { return internal.renameTo(dest.internal); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: renameTo File: src/net/sourceforge/plantuml/security/SFile.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
renameTo
src/net/sourceforge/plantuml/security/SFile.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
@Nonnull public static String makeShortTextVersion(@Nonnull String text, final int maxLength) { if (text.length() > maxLength) { text = text.substring(0, maxLength) + "..."; //NOI18N } return text; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: makeShortTextVersion File: mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java Repository: raydac/netbeans-mmd-plugin The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-1000542
MEDIUM
6.8
raydac/netbeans-mmd-plugin
makeShortTextVersion
mind-map/mind-map-swing-panel/src/main/java/com/igormaznitsa/mindmap/swing/panel/utils/Utils.java
9fba652bf06e649186b8f9e612d60e9cc15097e9
0
Analyze the following code function for security vulnerabilities
protected void handleVisibleToUserChanged(boolean visibleToUser) { if (visibleToUser) { handleVisibleToUserChangedImpl(visibleToUser); startNotificationLogging(); } else { stopNotificationLogging(); handleVisibleToUserChangedImpl(visibleToUser); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: handleVisibleToUserChanged File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
handleVisibleToUserChanged
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public String escapeString(String str) { try { return URLEncoder.encode(str, "utf8").replaceAll("\\+", "%20"); } catch (UnsupportedEncodingException e) { return str; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeString File: samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
escapeString
samples/openapi3/client/petstore/java/jersey2-java8/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
private static Node migrateChoiceProvider(Element choiceProviderElement) { List<NodeTuple> tuples = new ArrayList<>(); String classTag = getClassTag(choiceProviderElement.attributeValue("class")); Element scriptNameElement = choiceProviderElement.element("scriptName"); if (scriptNameElement != null) { tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "scriptName"), new ScalarNode(Tag.STR, scriptNameElement.getText().trim()))); } Element choicesElement = choiceProviderElement.element("choices"); if (choicesElement != null) { List<Node> choiceNodes = new ArrayList<>(); for (Element choiceElement: choicesElement.elements()) { List<NodeTuple> choiceTuples = new ArrayList<>(); choiceTuples.add(new NodeTuple( new ScalarNode(Tag.STR, "value"), new ScalarNode(Tag.STR, choiceElement.elementText("value").trim()))); choiceTuples.add(new NodeTuple( new ScalarNode(Tag.STR, "color"), new ScalarNode(Tag.STR, choiceElement.elementText("color").trim()))); choiceNodes.add(new MappingNode(Tag.MAP, choiceTuples, FlowStyle.BLOCK)); } tuples.add(new NodeTuple( new ScalarNode(Tag.STR, "choices"), new SequenceNode(Tag.SEQ, choiceNodes, FlowStyle.BLOCK))); } return new MappingNode(new Tag(classTag), tuples, FlowStyle.BLOCK); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: migrateChoiceProvider File: server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java Repository: theonedev/onedev The code follows secure coding practices.
[ "CWE-538" ]
CVE-2021-21250
MEDIUM
4
theonedev/onedev
migrateChoiceProvider
server-core/src/main/java/io/onedev/server/migration/XmlBuildSpecMigrator.java
9196fd795e87dab069b4260a3590a0ea886e770f
0
Analyze the following code function for security vulnerabilities
public void updateLinkedNetworks(int networkId) { WifiConfiguration internalConfig = getInternalConfiguredNetwork(networkId); if (internalConfig == null) { return; } internalConfig.linkedConfigurations = new HashMap<>(); attemptNetworkLinking(internalConfig); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateLinkedNetworks File: service/java/com/android/server/wifi/WifiConfigManager.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21242
CRITICAL
9.8
android
updateLinkedNetworks
service/java/com/android/server/wifi/WifiConfigManager.java
72e903f258b5040b8f492cf18edd124b5a1ac770
0
Analyze the following code function for security vulnerabilities
public void saveAsAuthor(String comment) throws XWikiException { saveAsAuthor(comment, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: saveAsAuthor File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2022-23615
MEDIUM
5.5
xwiki/xwiki-platform
saveAsAuthor
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
7ab0fe7b96809c7a3881454147598d46a1c9bbbe
0
Analyze the following code function for security vulnerabilities
@Override public void setArchiveFinalizers(final List<ArchiveFinalizer> archiveFinalizers) { finalizers = archiveFinalizers; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setArchiveFinalizers File: src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java Repository: codehaus-plexus/plexus-archiver The code follows secure coding practices.
[ "CWE-22", "CWE-61" ]
CVE-2023-37460
CRITICAL
9.8
codehaus-plexus/plexus-archiver
setArchiveFinalizers
src/main/java/org/codehaus/plexus/archiver/AbstractUnArchiver.java
54759839fbdf85caf8442076f001d5fd64e0dcb2
0
Analyze the following code function for security vulnerabilities
@Override public void handleMessage(android.os.Message msg) { switch(msg.what) { case MSG_ENROLL_RESULT: sendEnrollResult((Fingerprint) msg.obj, msg.arg1 /* remaining */); break; case MSG_ACQUIRED: sendAcquiredResult((Long) msg.obj /* deviceId */, msg.arg1 /* acquire info */); break; case MSG_AUTHENTICATION_SUCCEEDED: sendAuthenticatedSucceeded((Fingerprint) msg.obj); break; case MSG_AUTHENTICATION_FAILED: sendAuthenticatedFailed(); break; case MSG_ERROR: sendErrorResult((Long) msg.obj /* deviceId */, msg.arg1 /* errMsgId */); break; case MSG_REMOVED: sendRemovedResult((Long) msg.obj /* deviceId */, msg.arg1 /* fingerId */, msg.arg2 /* groupId */); } }
Vulnerability Classification: - CWE: CWE-264 - CVE: CVE-2016-3917 - Severity: HIGH - CVSS Score: 7.2 Description: Bind fingerprint when we start authentication This fixes a bug where it was possible to authenticate the wrong user. We now bind the userId when we start authentication and confirm it when authentication completes. Fixes bug 30744668 (Cherry pick from Change-Id: I346d92c301414ed81e11fa9c171584c7ae4341c2) Change-Id: I3584790c39eb2e8c435ad1b2d887bf9b8ebd36fe (cherry picked from commit 837d052ed4b5b75dfd4af44f5ad268e683bf2e13) Function: handleMessage File: core/java/android/hardware/fingerprint/FingerprintManager.java Repository: android Fixed Code: @Override public void handleMessage(android.os.Message msg) { switch(msg.what) { case MSG_ENROLL_RESULT: sendEnrollResult((Fingerprint) msg.obj, msg.arg1 /* remaining */); break; case MSG_ACQUIRED: sendAcquiredResult((Long) msg.obj /* deviceId */, msg.arg1 /* acquire info */); break; case MSG_AUTHENTICATION_SUCCEEDED: sendAuthenticatedSucceeded((Fingerprint) msg.obj, msg.arg1 /* userId */); break; case MSG_AUTHENTICATION_FAILED: sendAuthenticatedFailed(); break; case MSG_ERROR: sendErrorResult((Long) msg.obj /* deviceId */, msg.arg1 /* errMsgId */); break; case MSG_REMOVED: sendRemovedResult((Long) msg.obj /* deviceId */, msg.arg1 /* fingerId */, msg.arg2 /* groupId */); } }
[ "CWE-264" ]
CVE-2016-3917
HIGH
7.2
android
handleMessage
core/java/android/hardware/fingerprint/FingerprintManager.java
f5334952131afa835dd3f08601fb3bced7b781cd
1
Analyze the following code function for security vulnerabilities
void grantUriPermissionUncheckedFromIntentLocked(NeededUriGrants needed, UriPermissionOwner owner) { if (needed != null) { for (int i=0; i<needed.size(); i++) { GrantUri grantUri = needed.get(i); grantUriPermissionUncheckedLocked(needed.targetUid, needed.targetPkg, grantUri, needed.flags, owner); } } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: grantUriPermissionUncheckedFromIntentLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
grantUriPermissionUncheckedFromIntentLocked
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
public boolean isKeyguardCurrentlySecure() { return !mUnlockMethodCache.canSkipBouncer(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isKeyguardCurrentlySecure File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
isKeyguardCurrentlySecure
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public void beginTransactionWithListenerNonExclusive( SQLiteTransactionListener transactionListener) { beginTransaction(transactionListener, false); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: beginTransactionWithListenerNonExclusive File: core/java/android/database/sqlite/SQLiteDatabase.java Repository: android The code follows secure coding practices.
[ "CWE-89" ]
CVE-2018-9493
LOW
2.1
android
beginTransactionWithListenerNonExclusive
core/java/android/database/sqlite/SQLiteDatabase.java
ebc250d16c747f4161167b5ff58b3aea88b37acf
0
Analyze the following code function for security vulnerabilities
@Override void prepareSurfaces() { mIsDimming = false; applyDims(); updateSurfacePositionNonOrganized(); // Send information to SurfaceFlinger about the priority of the current window. updateFrameRateSelectionPriorityIfNeeded(); updateScaleIfNeeded(); mWinAnimator.prepareSurfaceLocked(getSyncTransaction()); super.prepareSurfaces(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: prepareSurfaces File: services/core/java/com/android/server/wm/WindowState.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-35674
HIGH
7.8
android
prepareSurfaces
services/core/java/com/android/server/wm/WindowState.java
7428962d3b064ce1122809d87af65099d1129c9e
0
Analyze the following code function for security vulnerabilities
final int startActivitiesInPackage(int uid, String callingPackage, Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle options, int userId) { userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, false, ALLOW_FULL_ONLY, "startActivityInPackage", null); // TODO: Switch to user app stacks here. int ret = mStackSupervisor.startActivities(null, uid, callingPackage, intents, resolvedTypes, resultTo, options, userId); return ret; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: startActivitiesInPackage File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-284" ]
CVE-2015-3833
MEDIUM
4.3
android
startActivitiesInPackage
services/core/java/com/android/server/am/ActivityManagerService.java
aaa0fee0d7a8da347a0c47cef5249c70efee209e
0
Analyze the following code function for security vulnerabilities
@Override public boolean processLogin(String username, String password, String rememberme, SecurityRequestWrapper request, HttpServletResponse response, XWikiContext context) throws Exception { Principal principal = authenticate(username, password, context); AuthenticationFailureManager authenticationFailureManager = Utils.getComponent(AuthenticationFailureManager.class); if (principal != null && authenticationFailureManager.validateForm(username, request)) { // login successful if (LOGGER.isInfoEnabled()) { LOGGER.info("User " + principal.getName() + " has been logged-in"); } authenticationFailureManager.resetAuthenticationFailureCounter(username); // invalidate old session if the user was already authenticated, and they logged in as a different user if (request.getUserPrincipal() != null && !username.equals(request.getRemoteUser())) { request.getSession().invalidate(); } // manage persistent login info, if persistent login management is enabled if (this.persistentLoginManager != null) { // did the user request that their login be persistent? if (rememberme != null) { // remember login this.persistentLoginManager.rememberLogin(request, response, username, password); } else { // forget login this.persistentLoginManager.forgetLogin(request, response); } } // make sure the Principal contains wiki name information if (!StringUtils.contains(principal.getName(), ':')) { principal = new SimplePrincipal(context.getWikiId() + ":" + principal.getName()); } request.setUserPrincipal(principal); this.getUserAuthenticatedEventNotifier().notify(principal.getName()); Boolean bAjax = (Boolean) context.get("ajax"); if ((bAjax == null) || (!bAjax.booleanValue())) { String continueToURL = getContinueToURL(request); // This is the url that the user was initially accessing before being prompted for login. response.sendRedirect(response.encodeRedirectURL(continueToURL)); } } else { // login failed // set response status and forward to error page if (LOGGER.isInfoEnabled()) { LOGGER.info("User " + username + " login has failed"); } authenticationFailureManager.recordAuthenticationFailure(username, request); String returnCode = context.getWiki().Param("xwiki.authentication.unauthorized_code"); int rCode = HttpServletResponse.SC_UNAUTHORIZED; if ((returnCode != null) && (!returnCode.equals(""))) { try { rCode = Integer.parseInt(returnCode); } catch (Exception e) { rCode = HttpServletResponse.SC_UNAUTHORIZED; } } response.setStatus(rCode); // TODO: Does this work? (200 in case of error) } return true; }
Vulnerability Classification: - CWE: CWE-601 - CVE: CVE-2022-23618 - Severity: MEDIUM - CVSS Score: 5.8 Description: XWIKI-10309: Check URL domains based on a whitelist (#1592) Introduce a new property for listing the trusted domains and API to check an URL against that list and the aliases used in subwikis. * Add new property url.trustedDomains in xwiki.properties * Add new API in URLConfiguration to retrieve this configuration value * Create a new URLSecurityManager responsible to check if an URL can be trusted based on this property and on the subwikis configurations * Introduce a new listener to invalidate the cache of URLSecurityManager whenever a XWikiServerClass xobject is added/updated/deleted * Move URL API implementations to URL default module * Add a new property url.enableTrustedDomains as a global switch off the checks on domains to avoid breaking behaviours on existing instances * Add a constant property in URLSecurityManager to be set in ExecutionContext to allow temporary switch off the check for extensions * Use both those switches in DefaultURLSecurityManager to prevent performing the check when needed Function: processLogin File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/user/impl/xwiki/MyFormAuthenticator.java Repository: xwiki/xwiki-platform Fixed Code: @Override public boolean processLogin(String username, String password, String rememberme, SecurityRequestWrapper request, HttpServletResponse response, XWikiContext context) throws Exception { Principal principal = authenticate(username, password, context); AuthenticationFailureManager authenticationFailureManager = Utils.getComponent(AuthenticationFailureManager.class); if (principal != null && authenticationFailureManager.validateForm(username, request)) { // login successful if (LOGGER.isInfoEnabled()) { LOGGER.info("User " + principal.getName() + " has been logged-in"); } authenticationFailureManager.resetAuthenticationFailureCounter(username); // invalidate old session if the user was already authenticated, and they logged in as a different user if (request.getUserPrincipal() != null && !username.equals(request.getRemoteUser())) { request.getSession().invalidate(); } // manage persistent login info, if persistent login management is enabled if (this.persistentLoginManager != null) { // did the user request that their login be persistent? if (rememberme != null) { // remember login this.persistentLoginManager.rememberLogin(request, response, username, password); } else { // forget login this.persistentLoginManager.forgetLogin(request, response); } } // make sure the Principal contains wiki name information if (!StringUtils.contains(principal.getName(), ':')) { principal = new SimplePrincipal(context.getWikiId() + ":" + principal.getName()); } request.setUserPrincipal(principal); this.getUserAuthenticatedEventNotifier().notify(principal.getName()); Boolean bAjax = (Boolean) context.get("ajax"); if ((bAjax == null) || (!bAjax.booleanValue())) { // This is the url that the user was initially accessing before being prompted for login. String continueToURL = getContinueToURL(request); response.sendRedirect(response.encodeRedirectURL(continueToURL)); } } else { // login failed // set response status and forward to error page if (LOGGER.isInfoEnabled()) { LOGGER.info("User " + username + " login has failed"); } authenticationFailureManager.recordAuthenticationFailure(username, request); String returnCode = context.getWiki().Param("xwiki.authentication.unauthorized_code"); int rCode = HttpServletResponse.SC_UNAUTHORIZED; if ((returnCode != null) && (!returnCode.equals(""))) { try { rCode = Integer.parseInt(returnCode); } catch (Exception e) { rCode = HttpServletResponse.SC_UNAUTHORIZED; } } response.setStatus(rCode); // TODO: Does this work? (200 in case of error) } return true; }
[ "CWE-601" ]
CVE-2022-23618
MEDIUM
5.8
xwiki/xwiki-platform
processLogin
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/user/impl/xwiki/MyFormAuthenticator.java
5251c02080466bf9fb55288f04a37671108f8096
1
Analyze the following code function for security vulnerabilities
public Object optQuery(String jsonPointer) { return optQuery(new JSONPointer(jsonPointer)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: optQuery File: src/main/java/org/json/JSONObject.java Repository: stleary/JSON-java The code follows secure coding practices.
[ "CWE-770" ]
CVE-2023-5072
HIGH
7.5
stleary/JSON-java
optQuery
src/main/java/org/json/JSONObject.java
661114c50dcfd53bb041aab66f14bb91e0a87c8a
0
Analyze the following code function for security vulnerabilities
public static String[] splitAsArray(String source, String delimiter) { List<String> result = splitAsList(source, delimiter); return result.toArray(new String[result.size()]); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: splitAsArray File: src/org/opencms/util/CmsStringUtil.java Repository: alkacon/opencms-core The code follows secure coding practices.
[ "CWE-79" ]
CVE-2013-4600
MEDIUM
4.3
alkacon/opencms-core
splitAsArray
src/org/opencms/util/CmsStringUtil.java
72a05e3ea1cf692e2efce002687272e63f98c14a
0
Analyze the following code function for security vulnerabilities
@Override public void printXMLEndCData() { handleSpaceWhenEndlement(); super.printXMLEndCData(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: printXMLEndCData File: xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
printXMLEndCData
xwiki-rendering-xml/src/main/java/org/xwiki/rendering/renderer/printer/XHTMLWikiPrinter.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public String getUrl() { String currDomain = SaManager.getConfig().getCurrDomain(); if( ! SaFoxUtil.isEmpty(currDomain)) { return currDomain + this.getRequestPath(); } return request.getURI().toString(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUrl File: sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java Repository: dromara/Sa-Token The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-44794
CRITICAL
9.8
dromara/Sa-Token
getUrl
sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java
954efeb73277f924f836da2a25322ea35ee1bfa3
0
Analyze the following code function for security vulnerabilities
final Intent verifyBroadcastLocked(Intent intent) { // Refuse possible leaked file descriptors if (intent != null && intent.hasFileDescriptors() == true) { throw new IllegalArgumentException("File descriptors passed in Intent"); } int flags = intent.getFlags(); if (!mProcessesReady) { // if the caller really truly claims to know what they're doing, go // ahead and allow the broadcast without launching any receivers if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT) != 0) { // This will be turned into a FLAG_RECEIVER_REGISTERED_ONLY later on if needed. } else if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY) == 0) { Slog.e(TAG, "Attempt to launch receivers of broadcast intent " + intent + " before boot completion"); throw new IllegalStateException("Cannot broadcast before boot completed"); } } if ((flags&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0) { throw new IllegalArgumentException( "Can't use FLAG_RECEIVER_BOOT_UPGRADE here"); } return intent; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyBroadcastLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-200" ]
CVE-2016-2500
MEDIUM
4.3
android
verifyBroadcastLocked
services/core/java/com/android/server/am/ActivityManagerService.java
9878bb99b77c3681f0fda116e2964bac26f349c3
0
Analyze the following code function for security vulnerabilities
public boolean isActive() { if (session != null && session.isOpen()) { return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isActive File: kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/WebSocketKieServerControllerClient.java Repository: kiegroup/droolsjbpm-integration The code follows secure coding practices.
[ "CWE-260" ]
CVE-2016-7043
MEDIUM
5
kiegroup/droolsjbpm-integration
isActive
kie-server-parent/kie-server-controller/kie-server-controller-websocket-client/src/main/java/org/kie/server/controller/websocket/client/WebSocketKieServerControllerClient.java
e916032edd47aa46d15f3a11909b4804ee20a7e8
0
Analyze the following code function for security vulnerabilities
private static void enforceSystemOrPhoneCaller(String tag) { int callingUid = Binder.getCallingUid(); if (callingUid != Process.PHONE_UID && callingUid != Process.SYSTEM_UID) { throw new SecurityException( "Cannot call " + tag + " from UID " + callingUid); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: enforceSystemOrPhoneCaller File: services/core/java/com/android/server/pm/PackageManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-119" ]
CVE-2016-2497
HIGH
7.5
android
enforceSystemOrPhoneCaller
services/core/java/com/android/server/pm/PackageManagerService.java
a75537b496e9df71c74c1d045ba5569631a16298
0
Analyze the following code function for security vulnerabilities
public void refreshAllRows() { datasourceExtension.refreshCache(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: refreshAllRows File: server/src/main/java/com/vaadin/ui/Grid.java Repository: vaadin/framework The code follows secure coding practices.
[ "CWE-79" ]
CVE-2019-25028
MEDIUM
4.3
vaadin/framework
refreshAllRows
server/src/main/java/com/vaadin/ui/Grid.java
b9ba10adaa06a0977c531f878c3f0046b67f9cc0
0
Analyze the following code function for security vulnerabilities
@Override public void clearPendingIntentAllowBgActivityStarts(IIntentSender target, IBinder allowlistToken) { if (!(target instanceof PendingIntentRecord)) { Slog.w(TAG, "clearPendingIntentAllowBgActivityStarts():" + " not a PendingIntentRecord: " + target); return; } synchronized (ActivityManagerService.this) { ((PendingIntentRecord) target).clearAllowBgActivityStarts(allowlistToken); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearPendingIntentAllowBgActivityStarts File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
clearPendingIntentAllowBgActivityStarts
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
private static void updateInsetsForBounds(Rect bounds, int displayWidth, int displayHeight, Rect inset) { inset.left = Math.max(0, inset.left - bounds.left); inset.top = Math.max(0, inset.top - bounds.top); inset.right = Math.max(0, bounds.right - displayWidth + inset.right); inset.bottom = Math.max(0, bounds.bottom - displayHeight + inset.bottom); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateInsetsForBounds File: services/core/java/com/android/server/wm/ActivityRecord.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21145
HIGH
7.8
android
updateInsetsForBounds
services/core/java/com/android/server/wm/ActivityRecord.java
44aeef1b82ecf21187d4903c9e3666a118bdeaf3
0
Analyze the following code function for security vulnerabilities
@Override public int getMetricsCategory() { return 0; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getMetricsCategory File: packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21289
MEDIUM
5.5
android
getMetricsCategory
packages/SystemUI/src/com/android/systemui/qs/tiles/QuickAccessWalletTile.java
7a5e51c918b7097be3c7e669e1825a4d159c4185
0
Analyze the following code function for security vulnerabilities
public String escapeString(String str) { try { return URLEncoder.encode(str, "utf8").replaceAll("\\+", "%20"); } catch (UnsupportedEncodingException e) { return str; } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: escapeString File: samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java Repository: OpenAPITools/openapi-generator The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-21430
LOW
2.1
OpenAPITools/openapi-generator
escapeString
samples/client/petstore/java/okhttp-gson-dynamicOperations/src/main/java/org/openapitools/client/ApiClient.java
2c576483f26f85b3979c6948a131f585c237109a
0
Analyze the following code function for security vulnerabilities
@Override public void notifyEnterAnimationComplete(IBinder token) throws RemoteException { Parcel data = Parcel.obtain(); Parcel reply = Parcel.obtain(); data.writeInterfaceToken(IActivityManager.descriptor); data.writeStrongBinder(token); mRemote.transact(NOTIFY_ENTER_ANIMATION_COMPLETE_TRANSACTION, data, reply, 0); reply.readException(); data.recycle(); reply.recycle(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: notifyEnterAnimationComplete File: core/java/android/app/ActivityManagerNative.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3832
HIGH
8.3
android
notifyEnterAnimationComplete
core/java/android/app/ActivityManagerNative.java
e7cf91a198de995c7440b3b64352effd2e309906
0
Analyze the following code function for security vulnerabilities
@Unstable public void deleteDocumentVersions(XWikiDocument document, String version1, String version2, XWikiContext context) throws XWikiException { Version v1 = new Version(version1); Version v2 = new Version(version2); // Find the lower and upper bounds Version upperBound = v1; Version lowerBound = v2; if (upperBound.compareVersions(lowerBound) < 0) { Version tmp = upperBound; upperBound = lowerBound; lowerBound = tmp; } XWikiDocumentArchive archive = document.getDocumentArchive(context); // Remove the versions archive.removeVersions(upperBound, lowerBound, context); // Is this the last remaining version? If so, then recycle the document. if (archive.getLatestVersion() == null) { // Wrap the work as a batch operation. BatchOperationExecutor batchOperationExecutor = Utils.getComponent(BatchOperationExecutor.class); batchOperationExecutor.execute(() -> { if (document.getLocale().equals(Locale.ROOT)) { context.getWiki().deleteAllDocuments(document, context); } else { // Only delete the translation context.getWiki().deleteDocument(document, context); } }); } else { // Notify before versions delete getObservationManager() .notify(new DocumentVersionRangeDeletingEvent(document.getDocumentReferenceWithLocale(), lowerBound.toString(), upperBound.toString()), document, context); // Update the archive context.getWiki().getVersioningStore().saveXWikiDocArchive(archive, true, context); document.setDocumentArchive(archive); // There are still some versions left. // If we delete the most recent (current) version, then rollback to latest undeleted version. Version previousVersion = archive.getLatestVersion(); if (!document.getRCSVersion().equals(previousVersion)) { context.getWiki().rollback(document, previousVersion.toString(), false, context); } // Notify after versions delete getObservationManager() .notify(new DocumentVersionRangeDeletedEvent(document.getDocumentReferenceWithLocale(), lowerBound.toString(), upperBound.toString()), document, context); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: deleteDocumentVersions File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-287" ]
CVE-2022-36092
HIGH
7.5
xwiki/xwiki-platform
deleteDocumentVersions
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb
0
Analyze the following code function for security vulnerabilities
protected void addNotificationViews(Entry entry) { if (entry == null) { return; } // Add the expanded view and icon. mNotificationData.add(entry); updateNotifications(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addNotificationViews File: packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2017-0822
HIGH
7.5
android
addNotificationViews
packages/SystemUI/src/com/android/systemui/statusbar/phone/StatusBar.java
c574568aaede7f652432deb7707f20ae54bbdf9a
0
Analyze the following code function for security vulnerabilities
public boolean onEditorAction(TextView v, int actionId, KeyEvent event) { // Check if this was the result of hitting the enter or "done" key if (actionId == EditorInfo.IME_NULL || actionId == EditorInfo.IME_ACTION_DONE || actionId == EditorInfo.IME_ACTION_NEXT) { handleNext(); return true; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onEditorAction File: src/com/android/settings/password/ChooseLockPassword.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
onEditorAction
src/com/android/settings/password/ChooseLockPassword.java
11815817de2f2d70fe842b108356a1bc75d44ffb
0
Analyze the following code function for security vulnerabilities
public static Date clearTimeComponent(Date date) { // Get Calendar object set to the date and time of the given Date object Calendar cal = Calendar.getInstance(); cal.setTime(date); // Set time fields to zero cal.set(Calendar.HOUR_OF_DAY, 0); cal.set(Calendar.MINUTE, 0); cal.set(Calendar.SECOND, 0); cal.set(Calendar.MILLISECOND, 0); return cal.getTime(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: clearTimeComponent File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java Repository: openmrs/openmrs-module-htmlformentry The code follows secure coding practices.
[ "CWE-611" ]
CVE-2018-16521
HIGH
7.5
openmrs/openmrs-module-htmlformentry
clearTimeComponent
api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
9dcd304688e65c31cac5532fe501b9816ed975ae
0
Analyze the following code function for security vulnerabilities
public Jooby parser(final Parser parser) { if (parser instanceof BeanParser) { beanParser = Optional.of(parser); } else { bag.add(requireNonNull(parser, "A parser is required.")); } return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: parser File: jooby/src/main/java/org/jooby/Jooby.java Repository: jooby-project/jooby The code follows secure coding practices.
[ "CWE-22" ]
CVE-2020-7647
MEDIUM
5
jooby-project/jooby
parser
jooby/src/main/java/org/jooby/Jooby.java
34f526028e6cd0652125baa33936ffb6a8a4a009
0
Analyze the following code function for security vulnerabilities
@Override public Response processRollbackTransaction(TransactionInfo info) throws Exception { TransportConnectionState cs = lookupConnectionState(info.getConnectionId()); context = cs.getContext(); cs.removeTransactionState(info.getTransactionId()); broker.rollbackTransaction(context, info.getTransactionId()); return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: processRollbackTransaction File: activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java Repository: apache/activemq The code follows secure coding practices.
[ "CWE-264" ]
CVE-2014-3576
MEDIUM
5
apache/activemq
processRollbackTransaction
activemq-broker/src/main/java/org/apache/activemq/broker/TransportConnection.java
00921f2
0
Analyze the following code function for security vulnerabilities
@GuardedBy("this") final void forceStopAppZygoteLocked(String packageName, int appId, int userId) { if (packageName == null) { return; } if (appId < 0) { appId = UserHandle.getAppId(getPackageManagerInternal().getPackageUid(packageName, MATCH_DEBUG_TRIAGED_MISSING | MATCH_ANY_USER, UserHandle.USER_SYSTEM)); } mProcessList.killAppZygotesLocked(packageName, appId, userId, true /* force */); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: forceStopAppZygoteLocked File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21292
MEDIUM
5.5
android
forceStopAppZygoteLocked
services/core/java/com/android/server/am/ActivityManagerService.java
d10b27e539f7bc91c2360d429b9d05f05274670d
0
Analyze the following code function for security vulnerabilities
public static NativeObject jsFunction_getSubscriber(Context cx, Scriptable thisObj, Object[] args, Function funObj) throws ScriptException, APIManagementException { if (args != null && isStringArray(args)) { NativeObject user = new NativeObject(); String userName = args[0].toString(); Subscriber subscriber = null; APIConsumer apiConsumer = getAPIConsumer(thisObj); try { subscriber = apiConsumer.getSubscriber(userName); } catch (APIManagementException e) { handleException("Error while getting Subscriber", e); } catch (Exception e) { handleException("Error while getting Subscriber", e); } if (subscriber != null) { user.put("name", user, subscriber.getName()); user.put("id", user, subscriber.getId()); user.put("email", user, subscriber.getEmail()); user.put("subscribedDate", user, subscriber.getSubscribedDate()); return user; } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: jsFunction_getSubscriber File: components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java Repository: wso2/carbon-apimgt The code follows secure coding practices.
[ "CWE-79" ]
CVE-2018-20736
LOW
3.5
wso2/carbon-apimgt
jsFunction_getSubscriber
components/apimgt/org.wso2.carbon.apimgt.hostobjects/src/main/java/org/wso2/carbon/apimgt/hostobjects/APIStoreHostObject.java
490f2860822f89d745b7c04fa9570bd86bef4236
0
Analyze the following code function for security vulnerabilities
boolean updateConfigurationLocked(Configuration values, ActivityRecord starting, boolean initLocale, boolean persistent, int userId, boolean deferResume, ActivityTaskManagerService.UpdateConfigurationResult result) { int changes = 0; boolean kept = true; deferWindowLayout(); try { if (values != null) { changes = updateGlobalConfigurationLocked(values, initLocale, persistent, userId); } if (!deferResume) { kept = ensureConfigAndVisibilityAfterUpdate(starting, changes); } } finally { continueWindowLayout(); } if (result != null) { result.changes = changes; result.activityRelaunched = !kept; } return kept; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateConfigurationLocked File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-862" ]
CVE-2023-40094
HIGH
7.8
android
updateConfigurationLocked
services/core/java/com/android/server/wm/ActivityTaskManagerService.java
1120bc7e511710b1b774adf29ba47106292365e7
0
Analyze the following code function for security vulnerabilities
@Override public String toString() { return name; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: toString File: core/src/main/java/org/keycloak/KeycloakPrincipal.java Repository: keycloak The code follows secure coding practices.
[ "CWE-20" ]
CVE-2020-1714
MEDIUM
6.5
keycloak
toString
core/src/main/java/org/keycloak/KeycloakPrincipal.java
5821e37eb63ff3ef45c0c0cd2ae2b54a8a242724
0
Analyze the following code function for security vulnerabilities
private static void checkCallerIsSystemOrSameApp(String pkg) { if (isCallerSystem()) { return; } final int uid = Binder.getCallingUid(); try { ApplicationInfo ai = AppGlobals.getPackageManager().getApplicationInfo( pkg, 0, UserHandle.getCallingUserId()); if (ai == null) { throw new SecurityException("Unknown package " + pkg); } if (!UserHandle.isSameApp(ai.uid, uid)) { throw new SecurityException("Calling uid " + uid + " gave package" + pkg + " which is owned by uid " + ai.uid); } } catch (RemoteException re) { throw new SecurityException("Unknown package " + pkg + "\n" + re); } }
Vulnerability Classification: - CWE: CWE-284 - CVE: CVE-2016-3884 - Severity: MEDIUM - CVSS Score: 4.3 Description: Check uid for notification policy access. Bug: 29421441 Change-Id: Ia0a7b06112dde1c925ec3232f50bf4d90b17b5e5 (cherry picked from commit 0cd1b789567b60b963fc7b8935e898ea0e61a617) Function: checkCallerIsSystemOrSameApp File: services/core/java/com/android/server/notification/NotificationManagerService.java Repository: android Fixed Code: private static void checkCallerIsSystemOrSameApp(String pkg) { if (isCallerSystem()) { return; } checkCallerIsSameApp(pkg); }
[ "CWE-284" ]
CVE-2016-3884
MEDIUM
4.3
android
checkCallerIsSystemOrSameApp
services/core/java/com/android/server/notification/NotificationManagerService.java
61e9103b5725965568e46657f4781dd8f2e5b623
1
Analyze the following code function for security vulnerabilities
public void sendSetStatusHints(String id) throws Exception { for (IConnectionServiceAdapter a : mConnectionServiceAdapters) { a.setStatusHints(id, mConnectionById.get(id).statusHints, null /*Session.Info*/); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: sendSetStatusHints File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21283
MEDIUM
5.5
android
sendSetStatusHints
tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
9b41a963f352fdb3da1da8c633d45280badfcb24
0
Analyze the following code function for security vulnerabilities
@Override public void onChange(boolean selfChange, Uri uri) { if (mFontScaleUri.equals(uri)) { updateFontScaleIfNeeded(); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onChange File: services/core/java/com/android/server/am/ActivityManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3912
HIGH
9.3
android
onChange
services/core/java/com/android/server/am/ActivityManagerService.java
6c049120c2d749f0c0289d822ec7d0aa692f55c5
0
Analyze the following code function for security vulnerabilities
public static X509Certificate getX509CertificateFromError(SslError error) { Bundle bundle = SslCertificate.saveState(error.getCertificate()); X509Certificate x509Certificate; byte[] bytes = bundle.getByteArray("x509-certificate"); if (bytes == null) { x509Certificate = null; } else { try { CertificateFactory certFactory = CertificateFactory.getInstance("X.509"); Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); x509Certificate = (X509Certificate) cert; } catch (CertificateException e) { x509Certificate = null; } } return x509Certificate; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getX509CertificateFromError File: src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java Repository: nextcloud/android The code follows secure coding practices.
[ "CWE-248" ]
CVE-2021-32694
MEDIUM
4.3
nextcloud/android
getX509CertificateFromError
src/main/java/com/owncloud/android/authentication/AuthenticatorActivity.java
9343bdd85d70625a90e0c952897957a102c2421b
0
Analyze the following code function for security vulnerabilities
private static void appendSettingToCursor(MatrixCursor cursor, Setting setting) { if (setting == null || setting.isNull()) { return; } final int columnCount = cursor.getColumnCount(); String[] values = new String[columnCount]; for (int i = 0; i < columnCount; i++) { String column = cursor.getColumnName(i); switch (column) { case Settings.NameValueTable._ID: { values[i] = setting.getId(); } break; case Settings.NameValueTable.NAME: { values[i] = setting.getName(); } break; case Settings.NameValueTable.VALUE: { values[i] = setting.getValue(); } break; case Settings.NameValueTable.IS_PRESERVED_IN_RESTORE: { values[i] = String.valueOf(setting.isValuePreservedInRestore()); } break; } } cursor.addRow(values); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: appendSettingToCursor File: packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40117
HIGH
7.8
android
appendSettingToCursor
packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
ff86ff28cf82124f8e65833a2dd8c319aea08945
0
Analyze the following code function for security vulnerabilities
private void updateEntry(XarEntry packageFile) { if (this.entries.containsKey(packageFile)) { this.entries.put(packageFile, packageFile); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: updateEntry File: xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-27480
HIGH
7.7
xwiki/xwiki-platform
updateEntry
xwiki-platform-core/xwiki-platform-xar/xwiki-platform-xar-model/src/main/java/org/xwiki/xar/XarPackage.java
e3527b98fdd8dc8179c24dc55e662b2c55199434
0
Analyze the following code function for security vulnerabilities
@Override public void checkAccess(Right right) throws AccessDeniedException { if (CONTENT_AUTHOR_RIGHTS.contains(right)) { checkAccess(right, getCurrentUser(right, null), getCurrentAuthorDocumentReference(right)); } else { checkAccess(right, getCurrentEntity()); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: checkAccess File: xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContextualAuthorizationManager.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-459" ]
CVE-2023-36468
HIGH
8.8
xwiki/xwiki-platform
checkAccess
xwiki-platform-core/xwiki-platform-security/xwiki-platform-security-authorization/xwiki-platform-security-authorization-bridge/src/main/java/org/xwiki/security/authorization/internal/DefaultContextualAuthorizationManager.java
15a6f845d8206b0ae97f37aa092ca43d4f9d6e59
0
Analyze the following code function for security vulnerabilities
private static boolean verifyMessageDigest(byte[] expected, byte[] encodedActual) { byte[] actual; try { actual = java.util.Base64.getDecoder().decode(encodedActual); } catch (IllegalArgumentException e) { return false; } return MessageDigest.isEqual(expected, actual); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: verifyMessageDigest File: core/java/android/util/jar/StrictJarVerifier.java Repository: android The code follows secure coding practices.
[ "CWE-400" ]
CVE-2023-21253
MEDIUM
5.5
android
verifyMessageDigest
core/java/android/util/jar/StrictJarVerifier.java
84df68840b6f2407146e722ebd95a7d8bc6e3529
0
Analyze the following code function for security vulnerabilities
@Override public T addObject(K name, Object value) { return add(name, fromObject(name, value)); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addObject File: codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java Repository: netty The code follows secure coding practices.
[ "CWE-436", "CWE-113" ]
CVE-2022-41915
MEDIUM
6.5
netty
addObject
codec/src/main/java/io/netty/handler/codec/DefaultHeaders.java
fe18adff1c2b333acb135ab779a3b9ba3295a1c4
0
Analyze the following code function for security vulnerabilities
public String getChr() { return chr; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getChr File: src/main/java/object/Variant.java Repository: nickzren/alsdb The code follows secure coding practices.
[ "CWE-89" ]
CVE-2016-15021
MEDIUM
5.2
nickzren/alsdb
getChr
src/main/java/object/Variant.java
cbc79a68145e845f951113d184b4de207c341599
0
Analyze the following code function for security vulnerabilities
private static URL removeUserInfo(URL url) throws MalformedURLException { return new URL(removeUserInfoFromUrlPath(url.toExternalForm())); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: removeUserInfo File: src/net/sourceforge/plantuml/security/SURL.java Repository: plantuml The code follows secure coding practices.
[ "CWE-284" ]
CVE-2023-3431
MEDIUM
5.3
plantuml
removeUserInfo
src/net/sourceforge/plantuml/security/SURL.java
fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e
0
Analyze the following code function for security vulnerabilities
LockSettingsInternal getLockSettingsInternal() { return LocalServices.getService(LockSettingsInternal.class); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getLockSettingsInternal File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
getLockSettingsInternal
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
@Override public void onRawText(String text, Syntax syntax) { // Directly inject the HTML content in the wiki printer (bypassing the XHTML printer) if (SyntaxType.HTML_FAMILY_TYPES.contains(syntax.getType())) { getXHTMLWikiPrinter().printRaw(text); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onRawText File: xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java Repository: xwiki/xwiki-rendering The code follows secure coding practices.
[ "CWE-79" ]
CVE-2023-32070
MEDIUM
6.1
xwiki/xwiki-rendering
onRawText
xwiki-rendering-syntaxes/xwiki-rendering-syntax-xhtml/src/main/java/org/xwiki/rendering/internal/renderer/xhtml/XHTMLChainingRenderer.java
c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
0
Analyze the following code function for security vulnerabilities
public void setJDK(JDK jdk) throws IOException { this.jdk = jdk.getName(); save(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setJDK File: core/src/main/java/hudson/model/AbstractProject.java Repository: jenkinsci/jenkins The code follows secure coding practices.
[ "CWE-264" ]
CVE-2013-7330
MEDIUM
4
jenkinsci/jenkins
setJDK
core/src/main/java/hudson/model/AbstractProject.java
36342d71e29e0620f803a7470ce96c61761648d8
0
Analyze the following code function for security vulnerabilities
@RequestMapping(value = "/uploadImage") public void uploadImage(@RequestParam MultipartFile[] upload) { String callback = request.getParameter("CKEditorFuncNum"); PrintWriter out = null; try { response.setCharacterEncoding("utf-8"); out = response.getWriter(); } catch (IOException e) { e.printStackTrace(); } if (!ServletFileUpload.isMultipartContent(request)) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'请选择文件');</script>"); out.flush(); out.close(); } String fileName;//上传的图片文件名 String suffix;//上传图片的文件扩展名 for (MultipartFile file : upload) { if (file.getSize() > 1 * 1024 * 1024) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'文件大小不得大于10M');</script>"); out.flush(); out.close(); } fileName = file.getOriginalFilename(); suffix = fileName.substring(fileName.lastIndexOf("."), fileName.length()).toLowerCase(); String[] imageExtensionNameArray = {".jpg", ".jpeg", ".png", ".gif", ".bmp"}; String allImageExtensionName = ""; boolean isContain = false;//默认不包含上传图片文件扩展名 for (int i = 0; i < imageExtensionNameArray.length; i++) { if (suffix.equals(imageExtensionNameArray[i])) { isContain = true; } if (i == 0) { allImageExtensionName += imageExtensionNameArray[i]; } else { allImageExtensionName += " , " + imageExtensionNameArray[i]; } } String newFileName = UUID.randomUUID() + suffix; SimpleDateFormat sdf = new SimpleDateFormat("yyyyMMdd"); String ymd = sdf.format(new Date()); String path = Const.UPLOAD_PATH + "/images/" + ymd + "/"; String savePath = request.getServletContext().getRealPath(path); if (isContain) {//包含 File baseFile = new File(savePath); if (!baseFile.exists()) { // 如果路径不存在,创建 baseFile.mkdirs(); } File targetFile = new File(baseFile, newFileName); try { file.transferTo(targetFile); } catch (IOException e) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'"+e+"');</script>"); out.flush(); out.close(); } String imageUrl = request.getContextPath() + path + newFileName; out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",'"+imageUrl+"'," + "'');</script>"); out.flush(); out.close(); } else { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'文件格式不正确(必须为" + allImageExtensionName + "文件)');</script>"); out.flush(); out.close(); } } }
Vulnerability Classification: - CWE: CWE-79 - CVE: CVE-2020-18035 - Severity: MEDIUM - CVSS Score: 4.3 Description: 修复BUG 反射型xss #8 Function: uploadImage File: jeesns-web/src/main/java/com/lxinet/jeesns/web/common/CkeditorUploadController.java Repository: lxinet/jeesns Fixed Code: @RequestMapping(value = "/uploadImage") public void uploadImage(@RequestParam MultipartFile[] upload) { //回调函数的序号 String callback = request.getParameter("CKEditorFuncNum"); PrintWriter out = null; try { response.setCharacterEncoding("utf-8"); out = response.getWriter(); } catch (IOException e) { e.printStackTrace(); } try { Integer.parseInt(callback); }catch (NumberFormatException e){ out.print("<script type='text/javascript'>alert('参数错误');</script>"); out.flush(); out.close(); } if (!ServletFileUpload.isMultipartContent(request)) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'请选择文件');</script>"); out.flush(); out.close(); } String fileName;//上传的图片文件名 String suffix;//上传图片的文件扩展名 for (MultipartFile file : upload) { if (file.getSize() > 1 * 1024 * 1024) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'文件大小不得大于10M');</script>"); out.flush(); out.close(); } fileName = file.getOriginalFilename(); suffix = fileName.substring(fileName.lastIndexOf("."), fileName.length()).toLowerCase(); String[] imageExtensionNameArray = {".jpg", ".jpeg", ".png", ".gif", ".bmp"}; String allImageExtensionName = ""; boolean isContain = false;//默认不包含上传图片文件扩展名 for (int i = 0; i < imageExtensionNameArray.length; i++) { if (suffix.equals(imageExtensionNameArray[i])) { isContain = true; } if (i == 0) { allImageExtensionName += imageExtensionNameArray[i]; } else { allImageExtensionName += " , " + imageExtensionNameArray[i]; } } String newFileName = UUID.randomUUID() + suffix; SimpleDateFormat sdf = new SimpleDateFormat("yyyyMMdd"); String ymd = sdf.format(new Date()); String path = Const.UPLOAD_PATH + "/images/" + ymd + "/"; String savePath = request.getServletContext().getRealPath(path); if (isContain) {//包含 File baseFile = new File(savePath); if (!baseFile.exists()) { // 如果路径不存在,创建 baseFile.mkdirs(); } File targetFile = new File(baseFile, newFileName); try { file.transferTo(targetFile); } catch (IOException e) { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'"+e+"');</script>"); out.flush(); out.close(); } String imageUrl = request.getContextPath() + path + newFileName; out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",'"+imageUrl+"'," + "'');</script>"); out.flush(); out.close(); } else { out.print("<script type='text/javascript'>window.parent.CKEDITOR.tools.callFunction(" + callback + ",''," + "'文件格式不正确(必须为" + allImageExtensionName + "文件)');</script>"); out.flush(); out.close(); } } }
[ "CWE-79" ]
CVE-2020-18035
MEDIUM
4.3
lxinet/jeesns
uploadImage
jeesns-web/src/main/java/com/lxinet/jeesns/web/common/CkeditorUploadController.java
55ea8026aaef8a7f0cd59c790e5fa90d47617406
1
Analyze the following code function for security vulnerabilities
public boolean needsInput() { return getCurrentSecurityController().needsInput(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: needsInput File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-21245
HIGH
7.8
android
needsInput
packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
a33159e8cb297b9eee6fa5c63c0e343d05fad622
0
Analyze the following code function for security vulnerabilities
public static Path findFile(Path directoryPath, String fileName) { File[] files = directoryPath.toFile().listFiles(); if (files != null) { for (File file : files) { if (file.isFile()) { if (file.getName().equals(fileName)) { return file.toPath(); } } else if (file.isDirectory()) { Path foundFile = findFile(file.toPath(), fileName); if (foundFile != null) { return foundFile; } } } } return null; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: findFile File: pf4j/src/main/java/org/pf4j/util/FileUtils.java Repository: pf4j The code follows secure coding practices.
[ "CWE-22" ]
CVE-2023-40827
HIGH
7.5
pf4j
findFile
pf4j/src/main/java/org/pf4j/util/FileUtils.java
ed9392069fe14c6c30d9f876710e5ad40f7ea8c1
0
Analyze the following code function for security vulnerabilities
public void addComponent(String componentType, String componentClass) { notNull(COMPONENT_TYPE, componentType); notNull(COMPONENT_CLASS, componentClass); if (LOGGER.isLoggable(FINE) && componentMap.containsKey(componentType)) { LOGGER.log(FINE, "componentType {0} has already been registered. Replacing existing component class type {1} with {2}.", new Object[] { componentType, componentMap.get(componentType), componentClass }); } componentMap.put(componentType, componentClass); if (LOGGER.isLoggable(FINE)) { LOGGER.fine(MessageFormat.format("added component of type ''{0}'' and class ''{1}''", componentType, componentClass)); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addComponent File: impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java Repository: eclipse-ee4j/mojarra The code follows secure coding practices.
[ "CWE-22" ]
CVE-2018-14371
MEDIUM
5
eclipse-ee4j/mojarra
addComponent
impl/src/main/java/com/sun/faces/application/applicationimpl/InstanceFactory.java
1b434748d9239f42eae8aa7d37d7a0930c061e24
0
Analyze the following code function for security vulnerabilities
public UUID getUUID(AbstractProject context) throws SVNException { if(repositoryUUID==null || repositoryRoot==null) { synchronized (this) { SVNRepository r = openRepository(context); r.testConnection(); // make sure values are fetched repositoryUUID = UUID.fromString(r.getRepositoryUUID(false)); repositoryRoot = r.getRepositoryRoot(false); } } return repositoryUUID; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getUUID File: src/main/java/hudson/scm/SubversionSCM.java Repository: jenkinsci/subversion-plugin The code follows secure coding practices.
[ "CWE-255" ]
CVE-2013-6372
LOW
2.1
jenkinsci/subversion-plugin
getUUID
src/main/java/hudson/scm/SubversionSCM.java
7d4562d6f7e40de04bbe29577b51c79f07d05ba6
0
Analyze the following code function for security vulnerabilities
ActivityStarter setAllowBackgroundActivityStart(boolean allowBackgroundActivityStart) { mRequest.allowBackgroundActivityStart = allowBackgroundActivityStart; return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setAllowBackgroundActivityStart File: services/core/java/com/android/server/wm/ActivityStarter.java Repository: android The code follows secure coding practices.
[ "CWE-269" ]
CVE-2023-21269
HIGH
7.8
android
setAllowBackgroundActivityStart
services/core/java/com/android/server/wm/ActivityStarter.java
70ec64dc5a2a816d6aa324190a726a85fd749b30
0
Analyze the following code function for security vulnerabilities
public boolean isReadOnly() { return this.isReadOnly; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isReadOnly File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java Repository: xwiki/xwiki-platform The code follows secure coding practices.
[ "CWE-863" ]
CVE-2021-32620
MEDIUM
4
xwiki/xwiki-platform
isReadOnly
xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
f9a677408ffb06f309be46ef9d8df1915d9099a4
0
Analyze the following code function for security vulnerabilities
public void destroy() { if (mNativeContentViewCore != 0) { nativeOnJavaContentViewCoreDestroyed(mNativeContentViewCore); } mWebContentsObserver.detachFromWebContents(); mWebContentsObserver = null; setSmartClipDataListener(null); setZoomControlsDelegate(null); // TODO(igsolla): address TODO in ContentViewClient because ContentViewClient is not // currently a real Null Object. // // Instead of deleting the client we use the Null Object pattern to avoid null checks // in this class. mContentViewClient = new ContentViewClient(); mWebContents = null; if (mViewAndroid != null) mViewAndroid.destroy(); mNativeContentViewCore = 0; mContentSettings = null; mJavaScriptInterfaces.clear(); mRetainedJavaScriptObjects.clear(); unregisterAccessibilityContentObserver(); mGestureStateListeners.clear(); ScreenOrientationListener.getInstance().removeObserver(this); mPositionObserver.clearListener(); mContainerViewObservers.clear(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: destroy File: content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java Repository: chromium The code follows secure coding practices.
[ "CWE-1021" ]
CVE-2015-1241
MEDIUM
4.3
chromium
destroy
content/public/android/java/src/org/chromium/content/browser/ContentViewCore.java
9d343ad2ea6ec395c377a4efa266057155bfa9c1
0
Analyze the following code function for security vulnerabilities
private boolean isFrameworkStarted() { Optional<Bundle> framework = Stream.of(context.getBundles()).filter( bundle -> Framework.class.isAssignableFrom(bundle.getClass())) .findFirst(); if (framework.isPresent()) { return (Bundle.ACTIVE & framework.get().getState()) > 0; } return false; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: isFrameworkStarted File: flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java Repository: vaadin/osgi The code follows secure coding practices.
[ "CWE-668" ]
CVE-2021-31407
MEDIUM
5
vaadin/osgi
isFrameworkStarted
flow-osgi/src/main/java/com/vaadin/flow/osgi/support/AppConfigFactoryTracker.java
3e17674c2e3f88b6e682872c42b7d0ad7d9c4ad8
0
Analyze the following code function for security vulnerabilities
private static Collection<Class<?>> getAllRelatedClasses(final Class<?> clazz) { final Set<Class<?>> classes = new HashSet<Class<?>>(); classes.add(clazz); // Get any XmlSeeAlsos on the class final XmlSeeAlso seeAlso = clazz.getAnnotation(XmlSeeAlso.class); if (seeAlso != null && seeAlso.value() != null) { for (final Class<?> c : seeAlso.value()) { classes.addAll(getAllRelatedClasses(c)); } } LOG.trace("getAllRelatedClasses({}): {}", clazz, classes); return classes; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getAllRelatedClasses File: core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java Repository: OpenNMS/opennms The code follows secure coding practices.
[ "CWE-611" ]
CVE-2023-0871
MEDIUM
6.1
OpenNMS/opennms
getAllRelatedClasses
core/xml/src/main/java/org/opennms/core/xml/JaxbUtils.java
3c17231714e3d55809efc580a05734ed530f9ad4
0
Analyze the following code function for security vulnerabilities
@Override public View getContentView() { return this; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getContentView File: packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40098
MEDIUM
5.5
android
getContentView
packages/SystemUI/src/com/android/systemui/statusbar/notification/row/NotificationConversationInfo.java
d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
0
Analyze the following code function for security vulnerabilities
@Nullable public String getIcon() { return icon; }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: getIcon File: spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java Repository: codecentric/spring-boot-admin The code follows secure coding practices.
[ "CWE-94" ]
CVE-2022-46166
CRITICAL
9.8
codecentric/spring-boot-admin
getIcon
spring-boot-admin-server/src/main/java/de/codecentric/boot/admin/server/notify/SlackNotifier.java
c14c3ec12533f71f84de9ce3ce5ceb7991975f75
0
Analyze the following code function for security vulnerabilities
private static void addRealmReference(XmlGenerator gen, String refName, String realmName) { if (realmName != null) { gen.node(refName, null, "realm", realmName); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addRealmReference File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java Repository: hazelcast The code follows secure coding practices.
[ "CWE-522" ]
CVE-2023-33264
MEDIUM
4.3
hazelcast
addRealmReference
hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
80a502d53cc48bf895711ab55f95e3a51e344ac1
0
Analyze the following code function for security vulnerabilities
private static void addParagraphSpan(Spannable buffer, Object what, int start, int end) { int len = buffer.length(); if (start != 0 && start != len && buffer.charAt(start - 1) != '\n') { for (start--; start > 0; start--) { if (buffer.charAt(start - 1) == '\n') { break; } } } if (end != 0 && end != len && buffer.charAt(end - 1) != '\n') { for (end++; end < len; end++) { if (buffer.charAt(end - 1) == '\n') { break; } } } buffer.setSpan(what, start, end, Spannable.SPAN_PARAGRAPH); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: addParagraphSpan File: core/java/android/content/res/StringBlock.java Repository: android The code follows secure coding practices.
[ "CWE-415" ]
CVE-2023-40103
HIGH
7.8
android
addParagraphSpan
core/java/android/content/res/StringBlock.java
c3bc12c484ef3bbca4cec19234437c45af5e584d
0
Analyze the following code function for security vulnerabilities
public void readListEnd() throws TException {}
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: readListEnd File: thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java Repository: facebook/fbthrift The code follows secure coding practices.
[ "CWE-770" ]
CVE-2019-11938
MEDIUM
5
facebook/fbthrift
readListEnd
thrift/lib/java/src/main/java/com/facebook/thrift/protocol/TCompactProtocol.java
08c2d412adb214c40bb03be7587057b25d053030
0
Analyze the following code function for security vulnerabilities
@Override public void setKeepUninstalledPackages(ComponentName who, String callerPackage, List<String> packageList) { if (!mHasFeature) { return; } Objects.requireNonNull(packageList, "packageList is null"); final CallerIdentity caller = getCallerIdentity(who, callerPackage); Preconditions.checkCallAuthorization((caller.hasAdminComponent() && isDefaultDeviceOwner(caller)) || (caller.hasPackage() && isCallerDelegate(caller, DELEGATION_KEEP_UNINSTALLED_PACKAGES))); checkCanExecuteOrThrowUnsafe(DevicePolicyManager.OPERATION_SET_KEEP_UNINSTALLED_PACKAGES); synchronized (getLockObject()) { // Get the device owner ActiveAdmin deviceOwner = getDeviceOwnerAdminLocked(); // Set list of packages to be kept even if uninstalled. deviceOwner.keepUninstalledPackages = packageList; // Save settings. saveSettingsLocked(caller.getUserId()); // Notify package manager. mInjector.getPackageManagerInternal().setKeepUninstalledPackages(packageList); } DevicePolicyEventLogger .createEvent(DevicePolicyEnums.SET_KEEP_UNINSTALLED_PACKAGES) .setAdmin(caller.getPackageName()) .setBoolean(/* isDelegate */ who == null) .setStrings(packageList.toArray(new String[0])) .write(); }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setKeepUninstalledPackages File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-20" ]
CVE-2023-21284
MEDIUM
5.5
android
setKeepUninstalledPackages
services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
ed3f25b7222d4cff471f2b7d22d1150348146957
0
Analyze the following code function for security vulnerabilities
void setInsetsWindow(Session session, IWindow client, int touchableInsets, Rect contentInsets, Rect visibleInsets, Region touchableRegion) { long origId = Binder.clearCallingIdentity(); try { synchronized (mWindowMap) { WindowState w = windowForClientLocked(session, client, false); if (w != null) { w.mGivenInsetsPending = false; w.mGivenContentInsets.set(contentInsets); w.mGivenVisibleInsets.set(visibleInsets); w.mGivenTouchableRegion.set(touchableRegion); w.mTouchableInsets = touchableInsets; if (w.mGlobalScale != 1) { w.mGivenContentInsets.scale(w.mGlobalScale); w.mGivenVisibleInsets.scale(w.mGlobalScale); w.mGivenTouchableRegion.scale(w.mGlobalScale); } final DisplayContent displayContent = w.getDisplayContent(); if (displayContent != null) { displayContent.layoutNeeded = true; } performLayoutAndPlaceSurfacesLocked(); } } } finally { Binder.restoreCallingIdentity(origId); } }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: setInsetsWindow File: services/core/java/com/android/server/wm/WindowManagerService.java Repository: android The code follows secure coding practices.
[ "CWE-264" ]
CVE-2016-3875
HIGH
7.2
android
setInsetsWindow
services/core/java/com/android/server/wm/WindowManagerService.java
69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c
0
Analyze the following code function for security vulnerabilities
@Override public void onUidActive(int uid) { }
No Vulnerability Detected: This code is secure and does not contain known vulnerabilities. Function: onUidActive File: services/core/java/com/android/server/pm/ShortcutService.java Repository: android The code follows secure coding practices.
[ "CWE-Other" ]
CVE-2023-40092
MEDIUM
5.5
android
onUidActive
services/core/java/com/android/server/pm/ShortcutService.java
a5e55363e69b3c84d3f4011c7b428edb1a25752c
0